CN105550022B - A kind for the treatment of method and apparatus of business datum - Google Patents
A kind for the treatment of method and apparatus of business datum Download PDFInfo
- Publication number
- CN105550022B CN105550022B CN201510982753.1A CN201510982753A CN105550022B CN 105550022 B CN105550022 B CN 105550022B CN 201510982753 A CN201510982753 A CN 201510982753A CN 105550022 B CN105550022 B CN 105550022B
- Authority
- CN
- China
- Prior art keywords
- business datum
- coding
- application container
- business
- user identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/466—Transaction processing
Abstract
The embodiment of the invention provides a kind for the treatment of method and apparatus of business datum, this method comprises: receiving the processing request sent based on a user identifier in the agency of an application container;Business datum coding is extracted from processing request;Judge whether the business datum coding is effective;If so, searching the business datum encodes corresponding business datum;The user identifier is written into the agency of the application container in the business datum.The embodiment of the present invention avoids the problem of causing business processing to malfunction because of permission variation, also, due to being the request of user's sending, avoids carrying out inactive user business processing, reduce treating capacity, reduce the wasting of resources.
Description
Technical field
The present invention relates to the technical fields of computer disposal, more particularly to the processing method and one kind of a kind of business datum
The processing unit of business datum.
Background technique
As the development of the network technology, such as networking products enter people's lives, study, work field extensively.
Due to edition upgrading, product promotion etc., the business such as upgrading, the modification of a wheel are often carried out to user data
Processing, the time range of these business processings is wider, then several days short, long then several moons or even permanently effective.
But due to the permission of each user difference, the business processing carried out to it is also different, carries out in user
In the case where business processing, user data update is very fast, and permission changes greatly, also, the time range of business processing is wider,
The business processings such as uniformly upgraded, modified in the case where persistent service, is easy to appear mistake.
In addition, many users be it is sluggish, the business processings such as uniformly upgraded, modified, be easy to causeing the wasting of resources.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
State the processing method and a kind of corresponding processing unit of business datum of a kind of business datum of problem.
According to one aspect of the present invention, a kind of processing method of business datum is provided, comprising:
Receive the processing request sent based on a user identifier in the agency of an application container;
Business datum coding is extracted from processing request;
Judge whether the business datum coding is effective;If so, searching the business datum encodes corresponding business number
According to;
The user identifier is written into the agency of the application container in the business datum.
Optionally, described to judge whether effective step includes: the business datum coding
Judge whether the business datum coding belongs to the application container;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
Optionally, described to judge whether effective step includes: the business datum coding
Whether the frequency of usage for judging the business datum coding is more than preset frequency threshold value;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
Optionally, described to judge whether effective step includes: the business datum coding
Inquire whether the user identifier uses and business datum coding in the agency of the application container
Belong to other business datums coding of the same business datum;
If so, determining that the business datum coding is invalid;
If not, it is determined that the business datum coding is effective.
Optionally, the business datum includes data name, data value;
It is described that step packet of the user identifier in the agency of the application container is written into the business datum
It includes:
It is identical with the data name to judge whether the user identifier has in the agency of the application container
Business datum;
If so, the data value to be added to the data value of the business datum of identical data name;
If it is not, then increasing a business datum newly with the data name, the data value is configured to the data name.
Optionally, further includes:
Establish the mapping relations of business datum and one or more business datum codings;
The application container applicable to the configuration of one or more of business datums;
By one or more of business datum code storages into first database.
Optionally, further includes:
When the first acquisition request for receiving business datum that a user identifier is sent, for a certain application container
When, according to first acquisition request inquire the user identifier whether be labeled with the business datum, answer suitable for described
It is encoded with the business datum of container;
If so, forbidding business datum to task identification transmission business datum, suitable for the application container
Coding;
If it is not, then extracting the business datum, business datum suitable for the application container from first database
The business datum coding of extraction is returned to the user identifier by coding.
Optionally, after described the step of being encoded from the business datum for extracting the business datum in first database,
The method also includes:
To the user identifier mark the business datum, suitable for the application container business datum encode.
Optionally, after described the step of being encoded from the business datum for extracting the business datum in first database,
The method also includes:
A task is generated for the business datum coding of extraction;
After by the preset time, starts the task, the business datum is encoded to the second database of write-in.
Optionally, further includes:
When the second acquisition request for receiving business datum that a user identifier is sent, for a certain application container
When, according to second acquisition request from second database extract the business datum, be suitable for the application container
Business datum coding;
The business datum coding of extraction is returned into the user identifier.
According to another aspect of the present invention, a kind of processing unit of business datum is provided, comprising:
Request receiving module is handled, is asked based on a user identifier in the processing that the agency of an application container sends suitable for receiving
It asks;
First business datum encodes extraction module, is suitable for extracting business datum coding from processing request;
Effective judgement module is suitable for judging whether the business datum coding is effective;If so, business datum is called to look into
Look for module;
Business datum searching module is suitable for searching the business datum and encodes corresponding business datum;
Business datum writing module, suitable for the user identifier is written in the institute of the application container in the business datum
It states in agency.
Optionally, the Effective judgement module is further adapted for:
Judge whether the business datum coding belongs to the application container;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
Optionally, the Effective judgement module is further adapted for:
Whether the frequency of usage for judging the business datum coding is more than preset frequency threshold value;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
Optionally, the Effective judgement module is further adapted for:
Inquire whether the user identifier uses and business datum coding in the agency of the application container
Belong to other business datums coding of the same business datum;
If so, determining that the business datum coding is invalid;
If not, it is determined that the business datum coding is effective.
Optionally, the business datum includes data name, data value;
The business datum writing module is further adapted for:
It is identical with the data name to judge whether the user identifier has in the agency of the application container
Business datum;
If so, the data value to be added to the data value of the business datum of identical data name;
If it is not, then increasing a business datum newly with the data name, the data value is configured to the data name.
Optionally, further includes:
Mapping relations establish module, are adapted to set up the mapping relations of business datum and one or more business datum codings;
Application container configuration module, suitable for the application container applicable to the configuration of one or more of business datums;
Database storage module is suitable for one or more of business datum code storages into first database.
Optionally, further includes:
Molality block is sentenced, suitable for receiving business datum that a user identifier is sent, for a certain application container
The first acquisition request when, inquire whether the user identifier is labeled with the business datum according to first acquisition request
, suitable for the application container business datum encode;If so, disabled module is called, if it is not, then calling the second business number
According to coding extraction module;
Disabled module, suitable for forbidding industry to task identification transmission business datum, suitable for the application container
Business data encoding;
Second business datum encode extraction module, suitable for extracted from first database the business datum, be suitable for
The business datum of the application container encodes;
First business datum encodes return module, and the business datum coding suitable for that will extract returns to the user identifier.
Optionally, further includes:
Business datum encodes labeling module, suitable for the user identifier mark the business datum, be suitable for it is described
The business datum of application container encodes.
Optionally, further includes:
Task generation module, suitable for generating a task for the business datum coding extracted;
Task call module is suitable for after by the preset time, starts the task, encodes the business datum
The second database is written.
Optionally, further includes:
Third business datum encodes extraction module, suitable for receive user identifier transmission, a certain answer for described
When with the second acquisition request of the business datum of container, extract according to second acquisition request from second database described in
Business datum, suitable for the application container business datum encode;
Second business datum encodes return module, and the business datum coding suitable for that will extract returns to the user identifier.
The embodiment of the present invention is being received based on a user identifier in the processing request that the agency of an application container sends, from
Business datum coding is extracted in processing request, and when confirming that business datum coding is effective, its corresponding business datum is written
User identifier in the agency of application container, by distribution service data encoding realize dynamic service processing, avoid because
Permission change and the problem of cause business processing to malfunction, also, due to being request that user issues, avoid to inactive user into
Row business processing reduces treating capacity, reduces the wasting of resources.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of the step of processing method embodiment 1 of business datum according to an embodiment of the invention stream
Cheng Tu;
Fig. 2 shows a kind of the step of processing method embodiment 2 of business datum according to an embodiment of the invention to flow
Cheng Tu;And
Fig. 3 shows a kind of structural frames of the processing device embodiment of business datum according to an embodiment of the invention
Figure.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Referring to Fig.1, a kind of step of the processing method embodiment 1 of business datum according to an embodiment of the invention is shown
Rapid flow chart, can specifically include following steps:
Step 101, the processing request sent based on a user identifier in the agency of an application container is received;
It should be noted that the embodiment of the present invention can be applied to application service platform, the application clothes of product can be provided
Business, can be independent server, or server cluster, such as distributed system.
Since the form of product is different, application service provided by application service platform is also different.
In the concrete realization, in order to which business service is isolated, the same application can be directed in application service platform
Product creates one or more application container.
In each application container of the same application product, some base application data of product can be multiplexed, are such as matched
Happy, UI (User Interface, user interface) element etc., imports user data after the user logs, answers in user
After processing, it can produce expanded application data.
For a user, after user is by account, password login application service platform, one or more can be logined
Application container can create one or more agencies after logining application container, with the one or more proxy call application
Service.
It should be noted that typically only allow for logining an agency in the same application container, when detecting while stepping on
Enter two or more agencies, retain the newest agency logined, other agencies exit by force to login.
In embodiments of the present invention, business datum can be configured one or more business datums and compiled by application service platform
Code, is distributed to user, user's (characterizing with user identifier, such as user account) is logining some application container by various modes
Agency after, processing request can be sent to application service platform with incoming traffic data encoding.
Step 102, business datum coding is extracted from processing request;
If application service platform receives processing request, business datum coding can be extracted, and record user identifier, answer
With information such as container, agencies.
Step 103, judge whether the business datum coding is effective;If so, thening follow the steps 104;
Since business datum coding is distributed by application service platform, it, can be right before carrying out business processing
The business datum coding that user submits carries out validity check, if business processing can be carried out, if not by validity check
By validity check, then refuse to carry out business processing.
In the concrete realization, validity check can be carried out by following one or more modes:
One, application container ownership verification;
In the manner, application service platform can encode the application container of configuration ownership to business datum in advance, i.e., together
The business datum coding of one business datum, can be for different application containers.
Therefore, in verification, it can be determined that whether business datum coding belongs to the application container, if so, the business of determination
Data encoding is effective, if not, it is determined that business datum coding is invalid.
Two, frequency of usage verifies;
In the manner, application service platform is based on after some business datum coding progress business processing, can be to this
Business datum coded markings frequency of usage, and frequency threshold value is configured, usually 1 time.
Therefore, in verification, it can be determined that whether the frequency of usage of business datum coding is more than preset frequency threshold value, if
It is, it is determined that business datum coding is effective, if not, it is determined that business datum coding is invalid.
Three, same type verifies;
In the manner, after application service platform carries out business processing for user identifier, it can recorde application container,
Used business datum coding, and forbid in same application container using other business numbers for belonging to the same business datum
According to coding.
Therefore, in verification, it can inquire whether user identifier uses and the business in the agency of the application container
Data encoding belongs to other business datums coding of the same business datum, if so, determine that business datum coding is invalid, if
It is no, it is determined that business datum coding is effective.
It should be noted that the verification of application container ownership, frequency of usage verification and same type verification can be used alone,
It can use simultaneously, the embodiments of the present invention are not limited thereto.
If using simultaneously, need simultaneously by all verifications after, just think through validity check, if wherein one
A verification does not pass through, it may be considered that not passing through validity check.
Certainly, the mode of above-mentioned validity check is intended only as example, in implementing the embodiments of the present invention, can be according to reality
The mode of other validity checks is arranged in border situation, and the embodiments of the present invention are not limited thereto.In addition, in addition to above-mentioned validity
Outside the mode of verification, those skilled in the art can also be according to actual needs by the way of other validity checks, the present invention
Embodiment is also without restriction to this.
Step 104, it searches the business datum and encodes corresponding business datum;
If business datum coding can respond the processing request of user's sending, in the database by validity check
It searches the business datum and encodes corresponding business datum.
It should be noted that the form due to product is different, business datum provided by application service platform also has
Institute is different.
Step 105, the user identifier is written into the agency of the application container in the business datum.
In embodiments of the present invention, the business datum of extraction can be written to the user identifier in the generation of the application container
In reason, finishing service processing.
In one example, business datum may include data name (key), data value (value).
Therefore, when business datum is written, it can be determined that whether the user identifier has in the agency of the application container
There is business datum identical with the data name;
If so, the data value is added in the data value of the business datum of identical data name;
If it is not, then increasing a business datum newly with the data name, which is configured to the data name.
It should be noted that in certain scenarios, needing the agency of user that there is corresponding permission can just be directed to certain
Business datum coding carries out business processing.
After business processing completion, new business datum can be loaded on interface on agency.
The embodiment of the present invention is being received based on a user identifier in the processing request that the agency of an application container sends, from
Business datum coding is extracted in processing request, and when confirming that business datum coding is effective, its corresponding business datum is written
User identifier realizes dynamic by distribution service data encoding and handles, avoid because of permission in the agency of application container
Change and cause processing malfunction the problem of, also, due to be user issue request, avoid handling inactive user,
Treating capacity is reduced, the wasting of resources is reduced.
Referring to Fig. 2, a kind of step of the processing method embodiment 2 of business datum according to an embodiment of the invention is shown
Rapid flow chart, can specifically include following steps:
Step 201, the mapping relations of business datum and one or more business datum codings are established;
Step 202, the application container applicable to the configuration of one or more of business datums;
Step 203, by one or more of business datum code storages into first database;
In embodiments of the present invention, business datum can be formulated by technical staff, and establish the business datum with one or
The mapping relations of multiple business datum codings, by various modes distribute away business datum coding, pending business processing.
Hold it should be noted that business datum coding other than corresponding business datum, can also configure applicable application
The information such as device, frequency of usage, permission.
Step 204, when receiving user identifier transmission, business datum for a certain application container first
When acquisition request, according to first acquisition request inquire the user identifier whether be labeled with the business datum, be applicable in
It is encoded in the business datum of the application container;If so, 205 are thened follow the steps, if it is not, thening follow the steps 206;
Step 205, forbid business datum to task identification transmission business datum, suitable for the application container
Coding;
Step 206, the business datum, business datum suitable for the application container are extracted from first database
Coding;
Step 207, the business datum coding of extraction is returned into the user identifier;
Step 208, the business datum, business datum suitable for the application container are marked to the user identifier
Coding;
In embodiments of the present invention, user's (being characterized with user identifier, such as user account) can ask to application service platform
Seek the business datum of a certain application container.
To avoid the wasting of resources, application service platform can verify user's (characterizing with user identifier, such as user account)
Formerly whether obtain the business datum coding of the business datum of the application container.
If user's (being characterized with user identifier, such as user account) has obtained, then refuse again to the user (with user identifier
Characterization, such as user account) distribution service data encoding.
If user's (being characterized with user identifier, such as user account) has not been obtained, then (characterized to the user with user identifier, such as
User account) distribution service data encoding.
It should be noted that business datum coding can encode for the business datum that do not distributed online, for
The business datum of distribution encodes, and can be marked.
Therefore, user can be recorded by query history, the business datum coding that inquiry has formerly obtained.
It, can be not new, not with the quantity of limit service data encoding, if user requests in addition, in some cases
The business datum of distribution encodes, then user service data coding can be prompted to have got and finished.
Step 209, a task is generated for the business datum coding of extraction;
Step 210, after by the preset time, start the task, business datum coding is written second
Database;
For prevent criminal malice get business datum coding, alternatively, certain user get business datum coding after
Forget to carry out business processing, result in waste of resources.
In embodiments of the present invention, a task (Job) can be configured to it, and set after business datum encodes distribution
Set a timer.
It is completed when timer, then can star task, which is encoded into the second database of write-in.
Step 211, when receiving user identifier transmission, business datum for a certain application container second
When acquisition request, according to second acquisition request from second database extract the business datum, be suitable for it is described
The business datum of application container encodes;
Step 212, the business datum coding of extraction is returned into the user identifier.
In embodiments of the present invention, the business datum got in the second database is encoded, then can directly rung
It is distributed, which (is not characterized, such as with user identifier using the request of family (being characterized with user identifier, such as user account)
User account) formerly whether obtain the application container business datum business datum coding verified, to improve business
The utilization rate of data encoding reduces the wasting of resources.
For embodiment of the method, for simple description, therefore, it is stated as a series of action combinations, but this field
Technical staff should be aware of, and embodiment of that present invention are not limited by the describe sequence of actions, because implementing according to the present invention
Example, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know that, specification
Described in embodiment belong to preferred embodiment, the actions involved are not necessarily necessary for embodiments of the present invention.
Referring to Fig. 3, a kind of knot of the processing device embodiment of business datum according to an embodiment of the invention is shown
Structure block diagram, can specifically include following module:
Request receiving module 301 is handled, suitable for receiving based on a user identifier at the place that the agency of an application container sends
Reason request;
First business datum encodes extraction module 302, is suitable for extracting business datum coding from processing request;
Effective judgement module 303 is suitable for judging whether the business datum coding is effective;If so, calling business number
According to searching module 304;
Business datum searching module 304 is suitable for searching the business datum and encodes corresponding business datum;
Business datum writing module 305 is suitable for the business datum user identifier is written in the application container
The agency in.
In an alternative embodiment of the invention, the Effective judgement module 303 can be adapted to:
Judge whether the business datum coding belongs to the application container;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
In an alternative embodiment of the invention, the Effective judgement module 303 can be adapted to:
Whether the frequency of usage for judging the business datum coding is more than preset frequency threshold value;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
In an alternative embodiment of the invention, the Effective judgement module 303 can be adapted to:
Inquire whether the user identifier uses and business datum coding in the agency of the application container
Belong to other business datums coding of the same business datum;
If so, determining that the business datum coding is invalid;
If not, it is determined that the business datum coding is effective.
In an alternative embodiment of the invention, the business datum includes data name, data value;
The business datum writing module 304 can be adapted to:
It is identical with the data name to judge whether the user identifier has in the agency of the application container
Business datum;
If so, the data value to be added to the data value of the business datum of identical data name;
If it is not, then increasing a business datum newly with the data name, the data value is configured to the data name.
In an alternative embodiment of the invention, which can also include following module:
Mapping relations establish module, are adapted to set up the mapping relations of business datum and one or more business datum codings;
Application container configuration module, suitable for the application container applicable to the configuration of one or more of business datums;
Database storage module is suitable for one or more of business datum code storages into first database.
In an alternative embodiment of the invention, which can also include following module:
Molality block is sentenced, suitable for receiving business datum that a user identifier is sent, for a certain application container
The first acquisition request when, inquire whether the user identifier is labeled with the business datum according to first acquisition request
, suitable for the application container business datum encode;If so, disabled module is called, if it is not, then calling the second business number
According to coding extraction module;
Disabled module, suitable for forbidding industry to task identification transmission business datum, suitable for the application container
Business data encoding;
Second business datum encode extraction module, suitable for extracted from first database the business datum, be suitable for
The business datum of the application container encodes;
First business datum encodes return module, and the business datum coding suitable for that will extract returns to the user identifier.
In an alternative embodiment of the invention, which can also include following module:
Business datum encodes labeling module, suitable for the user identifier mark the business datum, be suitable for it is described
The business datum of application container encodes.
In an alternative embodiment of the invention, which can also include following module:
Task generation module, suitable for generating a task for the business datum coding extracted;
Task call module is suitable for after by the preset time, starts the task, encodes the business datum
The second database is written.
In an alternative embodiment of the invention, which can also include following module:
Third business datum encodes extraction module, suitable for receive user identifier transmission, a certain answer for described
When with the second acquisition request of the business datum of container, extract according to second acquisition request from second database described in
Business datum, suitable for the application container business datum encode;
Second business datum encodes return module, and the business datum coding suitable for that will extract returns to the user identifier.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
In the processing equipment of microprocessor or digital signal processor (DSP) to realize business datum according to an embodiment of the present invention
The some or all functions of some or all components.The present invention is also implemented as executing method as described herein
Some or all device or device programs (for example, computer program and computer program product).Such reality
Existing program of the invention can store on a computer-readable medium, or may be in the form of one or more signals.
Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or in any other forms
It provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
Claims (20)
1. a kind of processing method of business datum, comprising:
Receive the processing request sent based on a user identifier in the agency of an application container;
Business datum coding is extracted from processing request;
Judge whether the business datum coding is effective;If so, searching the business datum encodes corresponding business datum;
The user identifier is written into the agency of the application container in the business datum;
Wherein, the application container is created by application service platform for application product, described in the application container multiplexing
The base application parameter of application product.
2. the method as described in claim 1, which is characterized in that it is described judge business datum coding whether effective step
Include:
Judge whether the business datum coding belongs to the application container;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
3. the method as described in claim 1, which is characterized in that it is described judge business datum coding whether effective step
Include:
Whether the frequency of usage for judging the business datum coding is more than preset frequency threshold value;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
4. the method as described in claim 1, which is characterized in that it is described judge business datum coding whether effective step
Include:
It inquires the user identifier and whether is used in the agency of the application container and belonged to business datum coding
Other business datums of the same business datum encode;
If so, determining that the business datum coding is invalid;
If not, it is determined that the business datum coding is effective.
5. the method as claimed in claim 1 or 2 or 3 or 4, which is characterized in that the business datum includes data name, data
Value;
It is described step of the user identifier in the agency of the application container is written into the business datum to include:
Judge whether the user identifier has business identical with the data name in the agency of the application container
Data;
If so, the data value to be added to the data value of the business datum of identical data name;
If it is not, then increasing a business datum newly with the data name, the data value is configured to the data name.
6. the method as claimed in claim 1 or 2 or 3 or 4, which is characterized in that further include:
Establish the mapping relations of business datum and one or more business datum codings;
The application container applicable to the configuration of one or more of business datums;
By one or more of business datum code storages into first database.
7. method as claimed in claim 6, which is characterized in that further include:
When receiving the first acquisition request of business datum that a user identifier is sent, for a certain application container,
According to first acquisition request inquire the user identifier whether be labeled with the business datum, be suitable for the application hold
The business datum of device encodes;
If so, forbidding business datum coding to task identification transmission business datum, suitable for the application container;
If it is not, then extracted from first database the business datum, suitable for the application container business datum encode,
The business datum coding of extraction is returned into the user identifier.
8. the method for claim 7, which is characterized in that extract the business datum from first database described
After the step of business datum encodes, the method also includes:
To the user identifier mark the business datum, suitable for the application container business datum encode.
9. the method for claim 7, which is characterized in that extract the business datum from first database described
After the step of business datum encodes, the method also includes:
A task is generated for the business datum coding of extraction;
After by the preset time, starts the task, the business datum is encoded to the second database of write-in.
10. method as claimed in claim 9, which is characterized in that further include:
When receiving the second acquisition request of business datum that a user identifier is sent, for a certain application container,
The business datum, industry suitable for the application container are extracted from second database according to second acquisition request
Business data encoding;
The business datum coding of extraction is returned into the user identifier.
11. a kind of processing unit of business datum, comprising:
Request receiving module is handled, suitable for receiving the processing request sent based on a user identifier in the agency of an application container;
First business datum encodes extraction module, is suitable for extracting business datum coding from processing request;
Effective judgement module is suitable for judging whether the business datum coding is effective;If so, business datum is called to search mould
Block;
Business datum searching module is suitable for searching the business datum and encodes corresponding business datum;
Business datum writing module, suitable for the user identifier is written in the generation of the application container in the business datum
In reason;
Wherein, the application container is created by application service platform for application product, described in the application container multiplexing
The base application parameter of application product.
12. device as claimed in claim 11, which is characterized in that the Effective judgement module is further adapted for:
Judge whether the business datum coding belongs to the application container;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
13. device as claimed in claim 11, which is characterized in that the Effective judgement module is further adapted for:
Whether the frequency of usage for judging the business datum coding is more than preset frequency threshold value;
If so, determining that the business datum coding is effective;
If not, it is determined that the business datum coding is invalid.
14. device as claimed in claim 11, which is characterized in that the Effective judgement module is further adapted for:
It inquires the user identifier and whether is used in the agency of the application container and belonged to business datum coding
Other business datums of the same business datum encode;
If so, determining that the business datum coding is invalid;
If not, it is determined that the business datum coding is effective.
15. the device as described in claim 11 or 12 or 13 or 14, which is characterized in that the business datum include data name,
Data value;
The business datum writing module is further adapted for:
Judge whether the user identifier has business identical with the data name in the agency of the application container
Data;
If so, the data value to be added to the data value of the business datum of identical data name;
If it is not, then increasing a business datum newly with the data name, the data value is configured to the data name.
16. the device as described in claim 11 or 12 or 13 or 14, which is characterized in that further include:
Mapping relations establish module, are adapted to set up the mapping relations of business datum and one or more business datum codings;
Application container configuration module, suitable for the application container applicable to the configuration of one or more of business datums;
Database storage module is suitable for one or more of business datum code storages into first database.
17. device as claimed in claim 16, which is characterized in that further include:
Molality block is sentenced, suitable for receiving user identifier transmission, business datum for a certain application container the
When one acquisition request, according to first acquisition request inquire the user identifier whether be labeled with it is the business datum, suitable
Business datum for the application container encodes;If so, disabled module is called, if it is not, the second business datum is then called to compile
Code extraction module;
Disabled module, suitable for forbidding business datum volume to task identification transmission business datum, suitable for the application container
Code;
Second business datum encodes extraction module, suitable for extracted from first database the business datum, be suitable for it is described
The business datum of application container encodes;
First business datum encodes return module, and the business datum coding suitable for that will extract returns to the user identifier.
18. device as claimed in claim 17, which is characterized in that further include:
Business datum encode labeling module, suitable for the user identifier mark the business datum, be suitable for the application
The business datum of container encodes.
19. device as claimed in claim 17, which is characterized in that further include:
Task generation module, suitable for generating a task for the business datum coding extracted;
Task call module is suitable for after by the preset time, starts the task, the business datum is encoded write-in
Second database.
20. device as claimed in claim 19, which is characterized in that further include:
Third business datum encodes extraction module, suitable for receive user identifier transmission, hold for a certain application
When the second acquisition request of the business datum of device, the business is extracted from second database according to second acquisition request
Data, suitable for the application container business datum encode;
Second business datum encodes return module, and the business datum coding suitable for that will extract returns to the user identifier.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510982753.1A CN105550022B (en) | 2015-12-23 | 2015-12-23 | A kind for the treatment of method and apparatus of business datum |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510982753.1A CN105550022B (en) | 2015-12-23 | 2015-12-23 | A kind for the treatment of method and apparatus of business datum |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105550022A CN105550022A (en) | 2016-05-04 |
CN105550022B true CN105550022B (en) | 2019-06-04 |
Family
ID=55829220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510982753.1A Active CN105550022B (en) | 2015-12-23 | 2015-12-23 | A kind for the treatment of method and apparatus of business datum |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105550022B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924258B (en) * | 2018-08-14 | 2022-07-08 | 深圳壹账通智能科技有限公司 | Background information pushing method and device, computer equipment and storage medium |
CN113553133B (en) * | 2021-07-26 | 2022-11-04 | 上海哔哩哔哩科技有限公司 | Page display method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789009A (en) * | 2010-01-26 | 2010-07-28 | 恒生电子股份有限公司 | Method for processing business data, device and system |
CN104899518A (en) * | 2015-03-12 | 2015-09-09 | 深圳市腾讯计算机系统有限公司 | Service processing method and apparatus |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2751554C (en) * | 2009-02-05 | 2015-07-21 | Wwpass Corporation | Centralized authentication system with safe private data storage and method |
US9177169B2 (en) * | 2012-02-13 | 2015-11-03 | Wwpass Corporation | Secure digital storage |
-
2015
- 2015-12-23 CN CN201510982753.1A patent/CN105550022B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789009A (en) * | 2010-01-26 | 2010-07-28 | 恒生电子股份有限公司 | Method for processing business data, device and system |
CN104899518A (en) * | 2015-03-12 | 2015-09-09 | 深圳市腾讯计算机系统有限公司 | Service processing method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN105550022A (en) | 2016-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110096857B (en) | Authority management method, device, equipment and medium for block chain system | |
CN104978191B (en) | Using dispositions method and service device | |
CN103826215B (en) | A kind of method and apparatus for carrying out Root authority management on the terminal device | |
JP6595625B2 (en) | Automatic recharge system, method and server | |
CN105490815A (en) | Short message identification code obtaining method and apparatus, and registration method, apparatus and system | |
US20210374110A1 (en) | Detection system and method, and related apparatus | |
CN106487815A (en) | A kind of container operation safety verification processing method based on white list and system | |
CN108416212A (en) | Method for identifying application program and device | |
CN110138767B (en) | Transaction request processing method, device, equipment and storage medium | |
CN114143066A (en) | Intranet and extranet docking system and method based on agent isolation device | |
CN101763593A (en) | Method and device for realizing audit log of system | |
CN106487883A (en) | Network registration process method and module | |
CN105550022B (en) | A kind for the treatment of method and apparatus of business datum | |
CN111124480A (en) | Application package generation method and device, electronic equipment and storage medium | |
US11544050B1 (en) | Software patch automation | |
CN105187399A (en) | Resource processing method and device | |
CN112491848B (en) | Method and equipment for supporting extensible secure docking of third-party system | |
CN114443171A (en) | Configurable service platform and configurable service implementation method | |
EP3345371A1 (en) | System and method for authentication | |
CN111324799B (en) | Search request processing method and device | |
CN107402761A (en) | Using restorative procedure and device | |
CN106599637A (en) | Method and device for inputting verification code into verification interface | |
CN106161665B (en) | A kind of method and system accessing domain suffix | |
US9298432B1 (en) | Systems and methods for performing hooking in a jitted environment | |
CN107592217A (en) | A kind of user identification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220715 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |