CN108881184A - Access request processing method, terminal, server and computer readable storage medium - Google Patents
Access request processing method, terminal, server and computer readable storage medium Download PDFInfo
- Publication number
- CN108881184A CN108881184A CN201810541428.5A CN201810541428A CN108881184A CN 108881184 A CN108881184 A CN 108881184A CN 201810541428 A CN201810541428 A CN 201810541428A CN 108881184 A CN108881184 A CN 108881184A
- Authority
- CN
- China
- Prior art keywords
- access request
- server
- processing method
- terminal
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention provides a kind of access request processing method, terminal, server and computer readable storage medium, the access request sended over by receiving access request terminal;Access request includes checking parameter and request content;Legitimacy verifies are carried out to checking parameter;When verifying checking parameter by the way that access request is determined as effective access request, the request content of access request is sent to service server;The response data that service server is handled and determined to request content is sent to access request terminal.Implementation through the invention, the checking procedure of access request is handled from business server migration to independent verification server, service server only needs processing business process, the performance that non-functional business is consumed is reduced, and improves the overall load ability of server and the treatment effeciency of access request.
Description
Technical field
The present invention relates to Internet technical fields, more specifically to a kind of access request processing method, terminal, clothes
Business device and computer readable storage medium.
Background technique
When interacting between each system, such as the FTP client FTP of terminal is corresponding in corresponding service server
When system interacts, what is generallyd use is that HTTP (Hyper Text Transfer Protocol) agreement interacts.And
Http protocol is a kind of stateless interaction protocol, and it is that who is being requested access to, and is the company of hold mode that server, which is not aware that,
Continuous property, it will usually which subscriber identity information is verified;And client, when requesting access to, client initiates the request of request
Content may be monitored by malicious attacker, easy to forge request according to the format for requesting and responding both sides and ring
It answers, modifies and steal various information, to avoid potential security risk, server system engineer can send out in FTP client FTP
Authentication is carried out to it when playing request, come judge to initiate request whether the user and solicited message are tampered.
And existing client initiate request when, the concurrency of usual client request is very big, all visit
It asks that request all enters service server and handled, carries out proof of identity processing first by service server to determine whether request has
Then effect carries out business logic processing to effective request again, and since existing service server oncurrent processing ability is limited, make
Obtain the bottleneck for being treated as business of access request.If illegal connection is more, service server needs to consume more property
Abnormal connection can be handled, so that the overall load ability of service server declines, access request treatment effeciency is lower.Thus may be used
To see, server in the prior art is not well positioned to meet the use demand of user also in terms of access request processing, so that
User experience is bad.
Summary of the invention
The technical problem to be solved in the present invention is that service server needs first ask the access of client in the prior art
It asks and carries out proof of identity processing, business logic processing, the overall load of caused server then are carried out to effective request again
Ability decline, access request treatment effeciency are low, for the technical problem, provide a kind of access request processing method, terminal, service
Device and computer readable storage medium.
In order to solve the above technical problems, the present invention provides a kind of access request processing method, the access request processing method
Including:
Receive the access request that access request terminal sends over;Access request includes checking parameter and request content;
Legitimacy verifies are carried out to checking parameter;
When verifying checking parameter by the way that access request is determined as effective access request, by the request of access request
Content is sent to service server;
The response data that service server is handled and determined to request content is sent to access request terminal.
Optionally, carrying out legitimacy verifies to checking parameter includes:
It is legal to carry out to the checking parameter that access request terminal itself is generated according to preset checking parameter create-rule
Property verification;
Or, carrying out legitimacy verifies to the checking parameter of verification server request to access request terminal.
Optionally, receiving the access request that access request terminal sends over includes:
Receive the access request that the access request terminal after load balancing sends over.
The present invention also provides a kind of access request processing method, which includes:
Access request is sent to verification server;Access request includes checking parameter and request content;
When checking parameter is confirmed as effective access request by verifying the legitimacy verifies access request of server,
Receive the response data for handle to request content determination that service server is sended over by verifying server.
Optionally, sending access request to verification server includes:
The access request being sent out is input to verification server after load balancing.
The present invention also provides a kind of access request processing method, which includes:
Receive asking for the effective access request for the legitimacy verifies by verifying server that verification server sends over
Seek content;
Request content is handled and determines response data;
Response data is sent to verification server.
Further, the present invention also provides a kind of verification server, which includes first processor, first
Memory, the first communication bus;
First communication bus is for realizing the connection communication between first processor and first memory;
First processor is for executing one or more program stored in first memory, to realize above-mentioned be applied to
The step of verifying the access request processing method of server.
Further, the present invention also provides a kind of access request terminal, the access request terminal include second processor,
Second memory, the second communication bus;
Second communication bus is for realizing the connection communication between second processor and second memory;
Second processor is for executing one or more program stored in second memory, to realize above-mentioned be applied to
The step of access request processing method of access request terminal.
Further, the present invention also provides a kind of service server, which includes third processor, third
Memory, third communication bus;
Third communication bus is for realizing the connection communication between third processor and third memory;
Third processor is for executing one or more program stored in third memory, to realize above-mentioned be applied to
The step of access request processing method of service server.
Further, the present invention also provides a kind of computer readable storage medium, which is deposited
The first access request processing routine is contained, the first access request processing routine can be executed by one or more processor, with reality
The step of existing above-mentioned access request processing method for being applied to verification server;Or, the computer-readable recording medium storage has
Second access request processing routine, the second access request processing routine can be executed by one or more processor, on realizing
The step of stating the access request processing method applied to access request terminal;Or, the computer-readable recording medium storage has
Three access request processing routines, third access request processing routine can be executed by one or more processor, above-mentioned to realize
The step of access request processing method applied to service server.
Beneficial effect
The present invention provides a kind of access request processing method, terminal, server and computer readable storage medium, for existing
Some service servers need first to carry out proof of identity processing to the access request of client, then carry out industry to effective request again
Business logical process, the low defect of the overall load ability decline of caused server, access request treatment effeciency, passes through reception
The access request that access request terminal sends over;Access request includes checking parameter and request content;Checking parameter is carried out
Legitimacy verifies;When verifying checking parameter by the way that access request is determined as effective access request, by access request
Request content is sent to service server;The response data that service server is handled and determined to request content is sent to
Access request terminal.From the checking procedure of access request is carried out to independent verification server from business server migration
Reason, service server only need processing business process, and the performance that non-functional business is consumed is reduced, and improve the entirety of server
The treatment effeciency of load capacity and access request.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the structural schematic diagram for the access request processing system that first embodiment of the invention provides;
Fig. 4 is the basic flow for the access request processing method for being applied to verification server that first embodiment of the invention provides
Cheng Tu;
Fig. 5 is the basic of the access request processing method applied to access request terminal that first embodiment of the invention provides
Flow chart;
Fig. 6 is the basic flow for the access request processing method applied to service server that first embodiment of the invention provides
Cheng Tu;
Fig. 7 is the refinement for the access request processing method applied to access request system that second embodiment of the invention provides
Flow chart;
Fig. 8 is the structural schematic diagram for the access request processing system that second embodiment of the invention provides;
Fig. 9 is the structural schematic diagram for the verification server that third embodiment of the invention provides;
Figure 10 is the structural schematic diagram for the access request terminal that third embodiment of the invention provides;
Figure 11 is the structural schematic diagram for the service server that third embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element
Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move
The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,
Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need
It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or
The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103
Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model.
Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc.
It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system
System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection
Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
First embodiment
System in the present embodiment includes the FTP client FTP of access request terminal side and the accessed system of server side,
Wherein server side includes verification server and service server, the access request processing system being illustrated in figure 3 in the present embodiment
The structural schematic diagram of system.When being interacted between FTP client FTP and accessed system, need using to accessed system
Interface, and then need first to carry out identity legitimacy verification before the use, only in verification by being confirmed to be legitimate request
It just can be carried out use later, being accessed the interface of system in the present embodiment includes but is not limited to HTTP interface.
It needs first to carry out proof of identity processing to the access request of client to solve existing service server, then again
Business logic processing, the overall load ability decline of caused server, access request treatment effeciency are carried out to effective request
Low defect provides a kind of corresponding institute of verification server in the present embodiment when FTP client FTP will access accessed system
The access request processing method of progress is illustrated in figure 4 at the access request provided in this embodiment for being applied to verification server
The basic flow chart of reason method, the access request processing method specifically include following steps:
S401, the access request that access request terminal sends over is received;Access request includes in checking parameter and request
Hold.
In practical applications, access request terminal sends access request, this implementation to server side by FTP client FTP
First the non-functional business of the access request of FTP client FTP is handled by the participation of verification server in example, i.e. progress identity
Legitimacy verifies.Here checking parameter is used for identity, is verified to it and determines whether request is legal effectively, can
To include:Cookie information, check token Token etc., request content here then include the data such as parameter, return value, head.
Optionally, receiving the access request that access request terminal sends over includes:Receive the visit after load balancing
Ask the access request that requesting terminal sends over.
Specifically, in practical applications, in the very big feelings of request Concurrency amount of the FTP client FTP of access request terminal
Under condition, integrally connection quantity to be treated is more for server, and all concurrent requests first pass through load balancing in the present embodiment
(SLB, Server Load Balancer) then shares on multiple verification servers again and is handled.It should be noted that
Load Balancing Solution includes that software load is balanced or hardware load is balanced, and software load equilibrium refers in one or more clothes
One or more Add-ons are installed to realize load balancing in the business corresponding system of device, and hardware load equilibrium is then directly to exist
The load-balancing device installed between server and external network, such as proxy server, independently of the system of server side.By
Load balancing is distributed flowing of access, extends server integrally external service ability, realizes the visit of large concurrent
It asks the processing of request, and impact when single server occurs abnormal to business can also be reduced, promote the availability of business.
S402, legitimacy verifies are carried out to checking parameter.
Specifically, verification server carries out legitimacy according to the difference of the checking parameter acquisition modes of access request terminal
Verification also correspond to it is different, to checking parameter carry out legitimacy verifies include but is not limited to following two mode:
Mode one:The checking parameter that access request terminal itself is generated according to preset checking parameter create-rule into
Row legitimacy verifies.
Specifically, access request terminal and server end go out specific checking parameter according to specific service negotiation and generate rule
Then, checking parameter voluntarily then is generated according to the create-rule when accessing and requesting by access request terminal.Such as visitor
Family end is according to field:A/B/C/D/ timestamp (wherein field B can be obtained in server by field A correlation inquiry) is by adding
Close rule calculates Token information, when user end to server initiates request, by A/C/D/ timestamp/Token information by asking
Packet header is asked to be sent to verification server, upon receiving a request, the checking parameter progress extracted in request is legal for verification server
Property verification, detailed process is:Corresponding B field is got by A field, is then calculated by A/B/C/D and timestamp
Then Token information is believed using calculated Token information and access request terminal by the Token that FTP client FTP reports
Whether the two is consistent from the point of view of breath compares, to achieve the purpose that request identity legitimacy verifying.It should be noted that being assisted
The specific checking parameter create-rule of quotient can also use other implementations, not limit uniquely herein, and in order to be promoted
Access security can renegotiate checking parameter create-rule.
Mode two:Legitimacy verifies are carried out to the checking parameter of verification server request to access request terminal.
Specifically, access request terminal can be only when logging in access for the first time to verification server request verification ginseng
Number, such as the client of access request terminal are logged in using information requests such as user name, password, identifying codes, verify server pair
The logging request received is verified, and after the Information Authentications such as user name, password, identifying code pass through, can be serviced by verification
Device signs and issues a check token Token and is sent to client, and client can be it after receiving this check token Token
Store, for example, be put into Cookie or Local Storage in, then after access request terminal asked every time to server
Asking can go to carry out legitimacy verifies with the Token that the verification server stored is signed and issued when access;It should illustrate
, in order to guarantee the safety of access request, can be specified to the Token that verification server is signed and issued a validity period, here
The specified of validity period itself can be specified by verification server, can also be specified by service server, specified rule is excellent
Choosing can be carried out according to client type or request type, and verification server can realize Token according to Token validity period
It updates, and access request terminal determines whether the Token of storage fails also based on Token validity period, need to also be after if failure
Continue to verification server request and signs and issues updated Token.It should also be noted that in further embodiments, being also possible to
Verification server first can make checking parameter to it in each request of access request terminal and sign and issue, and for example, promoted and visited
Ask safety, access request terminal can delete checking parameter after completing an access request, thus when subsequent access
Verification server is required to carry out checking parameter to it again to sign and issue.
S403, to checking parameter verify by the way that access request is determined as effective access request when, by access request
Request content be sent to service server.
Specifically, verification server is only handled non-functional business, i.e., the legitimacy verifies process of request is moved
It moves on to verification server, abnormal and illegal request is filtered to verify server, is only effectively requested legal
The processing for carrying out follow-up business logic is sent to service server in request, in the application scenarios for having more exception and illegal request
Under, so that the performance of server entirety is guaranteed.Certainly, if the result that server verifies check information is not pass through
When, that is, it is determined as invalid access request, can feeds back the request results of mistake to client in some embodiments.
S404, the response data for handling request content service server and determining are sent to access request end
End.
Specifically, the service server of the present embodiment only needs the processing for being absorbed in operation flow, i.e., to effective access request
Business logic processing is carried out, after the completion of service server processing, response data is returned to by access request by verification server
FTP client FTP in terminal.Under the application scenarios of access request high concurrent, by the conjunction of verification server special disposal identity
Method verification in order to avoid reducing the load capacity of server entirety when abnormal and illegal request is more, and verifies server
Have after being completed to all access requests that can currently carry verification, and by service server to what verification screening server went out
While imitating access request progress business logic processing, the legitimacy verifies for carrying out the access request of next batch can be started,
The performance consumption accounting that processing connects extremely is reduced, whole business processing of the server under high concurrent application scenarios is improved
Performance.
It is corresponding, in the present embodiment when FTP client FTP will access accessed system, additionally provide a kind of access request
The access request processing method that terminal is accordingly carried out is illustrated in figure 5 provided in this embodiment applied to access request terminal
Access request processing method basic flow chart, which specifically includes following steps:
S501, access request is sent to verification server;Access request includes checking parameter and request content.
Access request terminal sends access request to server side by FTP client FTP, needs first to be joined by verification server
It is handled with the non-functional business of the access request to FTP client FTP, that is, carries out the legitimacy verifies of identity.
Here checking parameter can generate for access request terminal itself according to preset checking parameter create-rule
Checking parameter, such as under the application scenarios of request server side of FTP client FTP, access request terminal and server end
Go out specific checking parameter create-rule according to specific service negotiation, then by access request terminal access request when from
Row generates checking parameter according to the create-rule;Furthermore it is also possible to be that access request terminal requests to obtain to verification server
The checking parameter got, such as under the application scenarios of FTP client FTP Twice requests server side, client requests school for the first time
Server verification identity legitimacy is tested, verifies and signs and issues a token after server verifies successfully for FTP client FTP, then client
End system takes the token obtained for the first time for the second time and request content is sent to verification server.
Optionally, sending access request to verification server includes:The access request being sent out is after load balancing
It is input to verification server.
Specifically, to guarantee the integrally external service energy of the server under the biggish scene of request Concurrency amount in the present embodiment
Power, access request terminal need to first pass through load balancing by the access request that FTP client FTP issues, and then share again more
Legitimacy verifies processing is carried out on a verification server, and flowing of access is distributed by load balancing, extends server
Whole external service ability, realizes the processing of the access request of large concurrent.
S502, it is confirmed as effectively accessing by the legitimacy verifies access request of verification server in checking parameter and ask
When asking, the number of responses for handle to request content determination that service server is sended over by verifying server is received
According to.
It is just sent when the access request of access request terminal is verified legal to service server and carries out business logic processing,
To obtain corresponding response data and realize access request, and in the case where verifying unacceptable situation, then can be serviced by verification
The request results of mistake are directly returned to access request terminal by device.
It is corresponding, in the present embodiment when FTP client FTP will access accessed system, additionally provide a kind of business service
The access request processing method that device is accordingly carried out is illustrated in figure 6 the visit provided in this embodiment applied to service server
Ask the basic flow chart of request processing method, which specifically includes following steps:
S601, the effective access request for receiving the legitimacy verifies by verifying server that verification server sends over
Request content.
S602, request content is handled and determines response data.
S603, response data is sent to verification server.
As described above, service server only needs to carry out the processing of the follow-up business logic of effective access request, and it is abnormal or
It is filtered with illegal request by verification server, reduces the performance consumption accounting that processing connects extremely, even if
The load capacity that server entirety can be significantly improved under the more scene of abnormal and illegal request, improves server in height
Whole service process performance under concurrent application scenarios.
The present invention provides a kind of access request processing method, needs for existing service server first to the visit of client
It asks that request carries out proof of identity processing, business logic processing, the entirety of caused server then is carried out to effective request again
The low defect of load capacity decline, access request treatment effeciency, the access request sended over by receiving access request terminal;
Access request includes checking parameter and request content;Legitimacy verifies are carried out to checking parameter;Pass through to checking parameter verification
And when access request is determined as effective access request, the request content of access request is sent to service server;By business
The response data that server is handled and determined to request content is sent to access request terminal.By the verification of access request
Journey is handled from business server migration to independent verification server, and service server only needs processing business process, will
The performance of non-functional business consumption is reduced, and improves the overall load ability of server and the treatment effeciency of access request.
Second embodiment
In order to better understand the present invention, the present embodiment says access request processing method with a specific example
Bright, Fig. 7 is the refined flow chart for the access request processing method that second embodiment of the invention provides, the access request processing method
Using access request processing system in this present embodiment, which includes:Seek requesting terminal, verification clothes
Business device and service server, are illustrated in figure 8 the structural schematic diagram of the access request processing system in the present embodiment, server is whole
Body uses the deployment scheme of Ngnix+Lua+Tomcat, and Ngnix+Lua is as verification server, and Tomcat is as business service
Device.Specifically include following steps:
S701, access request terminal itself generate checking parameter according to preset checking parameter create-rule.
S702, access request terminal are sent out the access request including checking parameter and request content.
The create-rule of checking parameter, such as the client of access request terminal are formulated in the present embodiment according to specific business
According to field:A/B/C/D/ timestamp (wherein field B can be obtained in server by field A correlation inquiry) passes through encryption rule
Token information is then calculated, when then user end to server initiates request, by A/C/D/ timestamp/Token information by asking
Packet header is asked to be sent to verification server.
The access request that S703, access request terminal issue is sent to verification server after load balancing.
To guarantee the integrally external service ability of the server under the biggish scene of request Concurrency amount, access in the present embodiment
Requesting terminal needs to first pass through load balancing (SLB, Server Load by the access request that FTP client FTP issues
Balancer), then share progress legitimacy verifies processing on multiple verification servers again.
S704, verification server carry out legitimacy verifies to the checking parameter in the access request received, and judgement is
No verification passes through, if so, S705 is executed, if it is not, then executing S706.
Preferably, the verification server in the present embodiment is proxy server, uses the deployment scheme of Ngnix+Lua,
Nginx is designed as the operating mode of the multiple progresses of work of host process, and each process is single thread to handle multiple connections, and
And each progress of work uses Non-Blocking I/O to handle multiple connections, to reduce thread context switching, to realize
Generally acknowledged high-performance, high concurrent, on the machine of same performance, Nginx process performance is 30 times or more of tomcat performance;
Lua is the scripting language of a kind of lightweight, insertion type, can very easily be embedded into other language use in this way, will
Lua is embedded into Nginx, writes script so as to use Lua, Lua thus can be used writes application scenarios, disposes
It is run into Nginx.After Ngnix receives access request, the checking parameter in request is extracted by Lua script and carries out identity school
It tests, accepts aforementioned citing, after Lua script extracts A/C/D/ timestamp/Token information, got by A field corresponding
Then B field calculates Token information by A/B/C/D and timestamp, then use calculated Token and access request
The Token information that terminal is reported by FTP client FTP compares, and determines whether the two is consistent, tests to reach request identity
The purpose of card.
Access request is determined as effective access request by S705, verification server, and by the request content of the access request
It is sent to service server.
Access request is determined as invalid access request by S706, verification server, and returns to mistake to access request terminal
Request results.
S707, service server handle the request content of the access request received and determine response data.
Response data is sent back access request terminal via verification server by S708, service server.
Service server in the present embodiment is preferably Tomcat server, and service server only needs effectively access to ask
The processing for the follow-up business logic asked, and abnormal and illegal request is filtered by verification server, reduces processing
Extremely the performance consumption accounting connected, even if it is whole to significantly improve server under the more scene of abnormal and illegal request
The load capacity of body improves whole service process performance of the server under high concurrent application scenarios.
The present invention provides a kind of access request processing method, and the access request of access request terminal output passes through load balancing
After be sent to verification server;It verifies server and legitimacy verifies is carried out to the checking parameter in access request, verify server
When verifying checking parameter by the way that access request is determined as effective access request, the request content of access request is sent
To service server;Service server handles the request content of the access request received and determines response data, so
Response data is sent back into access request terminal via verification server afterwards.By the checking procedure of access request from service server
Independent verification server is moved to be handled, service server only needs processing business process, and non-functional business is disappeared
The performance of consumption is reduced, and improves the overall load ability of server and the treatment effeciency of access request.
3rd embodiment
A kind of verification server is present embodiments provided, it is shown in Figure 9, including first processor 901, first memory
902, the first communication bus 903;
First communication bus 903 is for realizing the connection communication between first processor 901, first memory 902;
First memory 902 is for storing one or more programs, and first processor 901 is for executing first memory
One or more program stored in 902, to realize in access request processing method shown in the various embodiments described above
Following steps:
Receive the access request that access request terminal sends over;Access request includes checking parameter and request content;
Legitimacy verifies are carried out to checking parameter;
When verifying checking parameter by the way that access request is determined as effective access request, by the request of access request
Content is sent to service server;
The response data that service server is handled and determined to request content is sent to access request terminal.
The present embodiment additionally provides a kind of access request terminal, shown in Figure 10, including second processor 1001, second
Memory 1002, the second communication bus 1003;
Second communication bus 1003 is for realizing the connection communication between second processor 1001, second memory 1002;
Second memory 1002 is for storing one or more programs, and second processor 1001 is for executing second memory
One or more program stored in 1002, to realize in access request processing method shown in the various embodiments described above
Following steps:
Access request is sent to verification server;Access request includes checking parameter and request content;
When checking parameter is confirmed as effective access request by verifying the legitimacy verifies access request of server,
Receive the response data for handle to request content determination that service server is sended over by verifying server.
The present embodiment additionally provides a kind of service server, shown in Figure 11, including third processor 1101, third are deposited
Reservoir 1102, third communication bus 1103;
Third communication bus 1103 is for realizing the connection communication between third processor 1101, third memory 1102;
Third memory 1102 is for storing one or more programs, and third processor 1101 is for executing third memory
One or more program stored in 1102, to realize in access request processing method shown in the various embodiments described above
Following steps:
Receive asking for the effective access request for the legitimacy verifies by verifying server that verification server sends over
Seek content;
Request content is handled and determines response data;
Response data is sent to verification server.
Fourth embodiment
The present invention also provides a kind of computer readable storage medium, which has the first visit
Ask that request handler, the first access request processing routine can be executed by one or more processor, to realize above-mentioned each reality
The step of applying the access request processing method for being applied to verification server shown in example;Or, the computer-readable storage medium
Matter is stored with the second access request processing routine, and the second access request processing routine can be executed by one or more processor,
With the step of realizing the access request processing method for being applied to access request terminal shown in the various embodiments described above;Or, should
Computer-readable recording medium storage has a third access request processing routine, third access request processing routine can by one or
Multiple processors execute, to realize the access request processing method for being applied to service server shown in the various embodiments described above
The step of.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of access request processing method, which is characterized in that the access request processing method includes:
Receive the access request that access request terminal sends over;The access request includes checking parameter and request content;
Legitimacy verifies are carried out to the checking parameter;
When verifying the checking parameter by the way that the access request is determined as effective access request, the access is asked
The request content asked is sent to service server;
The response data that the service server is handled and determined to the request content is sent to the access request
Terminal.
2. access request processing method as described in claim 1, which is characterized in that described legal to checking parameter progress
Property verification include:
It is legal to carry out to the checking parameter that the access request terminal itself is generated according to preset checking parameter create-rule
Property verification;
Or, carrying out legitimacy verifies to the checking parameter of verification server request to the access request terminal.
3. access request processing method as claimed in claim 1 or 2, which is characterized in that the reception access request terminal hair
The access request brought includes:
Receive the access request that the access request terminal after load balancing sends over.
4. a kind of access request processing method, which is characterized in that the access request processing method includes:
Access request is sent to verification server;The access request includes checking parameter and request content;
It is confirmed as effectively visiting by the legitimacy verifies access request of the verification server in the checking parameter
When asking request, receive service server by it is described verification server send over the request content handle it is true
Fixed response data.
5. access request processing method as claimed in claim 4, which is characterized in that described to be asked to verification server transmission access
Ask including:
The access request being sent out is input to verification server after load balancing.
6. a kind of access request processing method, which is characterized in that the access request processing method includes:
Receive asking for the effective access request for the legitimacy verifies by the verification server that verification server sends over
Seek content;
The request content is handled and determines response data;
The response data is sent to the verification server.
7. a kind of verification server, which is characterized in that the verification server includes first processor, first memory, first
Communication bus;
First communication bus is for realizing the connection communication between the first processor and the first memory;
The first processor is for executing one or more program stored in the first memory, to realize such as right
It is required that described in any one of 1 to 3 the step of access request processing method.
8. a kind of access request terminal, which is characterized in that the access request terminal include second processor, second memory,
Second communication bus;
Second communication bus is for realizing the connection communication between the second processor and the second memory;
The second processor is for executing one or more program stored in the second memory, to realize such as right
It is required that described in 4 or 5 the step of access request processing method.
9. a kind of service server, which is characterized in that the service server includes third processor, third memory, third
Communication bus;
The third communication bus is for realizing the connection communication between the third processor and the third memory;
The third processor is for executing one or more program stored in the third memory, to realize such as right
It is required that described in 6 the step of access request processing method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has the first access
Request handler, the first access request processing routine can be executed by one or more processor, to realize such as right
It is required that described in any one of 1 to 3 the step of access request processing method;Or, the computer-readable recording medium storage has
Second access request processing routine, the second access request processing routine can be executed by one or more processor, with reality
Now the step of access request processing method as described in claim 4 or 5;Or, the computer-readable recording medium storage has
Third access request processing routine, the third access request processing routine can be executed by one or more processor, with reality
Now the step of access request processing method as claimed in claim 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810541428.5A CN108881184A (en) | 2018-05-30 | 2018-05-30 | Access request processing method, terminal, server and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810541428.5A CN108881184A (en) | 2018-05-30 | 2018-05-30 | Access request processing method, terminal, server and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108881184A true CN108881184A (en) | 2018-11-23 |
Family
ID=64335703
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810541428.5A Pending CN108881184A (en) | 2018-05-30 | 2018-05-30 | Access request processing method, terminal, server and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881184A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743303A (en) * | 2018-12-25 | 2019-05-10 | 中国移动通信集团江苏有限公司 | Using guard method, device, system and storage medium |
CN109769010A (en) * | 2018-12-04 | 2019-05-17 | 平安科技(深圳)有限公司 | Method, apparatus, equipment and storage medium based on SDK access CloudStack server |
CN111352740A (en) * | 2018-12-21 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Application interaction processing method and device |
CN111431959A (en) * | 2020-02-19 | 2020-07-17 | 中国船舶工业系统工程研究院 | Service load balancing method and device based on publish-subscribe interceptor mechanism |
CN111428237A (en) * | 2020-03-06 | 2020-07-17 | 支付宝(杭州)信息技术有限公司 | Attack risk identification method, system and device and electronic equipment |
CN111563075A (en) * | 2020-05-06 | 2020-08-21 | 政采云有限公司 | Service checking system, method and equipment and storage medium |
CN111708647A (en) * | 2020-06-23 | 2020-09-25 | 北银金融科技有限责任公司 | Service request processing method |
CN112149106A (en) * | 2020-08-27 | 2020-12-29 | 福建摩尔软件有限公司 | Login method, device, equipment and medium for enterprise private applet |
CN112995265A (en) * | 2019-12-18 | 2021-06-18 | 中国移动通信集团四川有限公司 | Request distribution method and device and electronic equipment |
CN113965557A (en) * | 2021-11-25 | 2022-01-21 | 杭州安恒信息技术股份有限公司 | Service development method, device, equipment and medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459836A (en) * | 2008-12-29 | 2009-06-17 | 中兴通讯股份有限公司 | Service processing method and system for content distributing network of interactive network television |
CN101677329A (en) * | 2008-09-18 | 2010-03-24 | 中兴通讯股份有限公司 | Comprehensive voice resource platform proxy server and its data processing method |
CN102404390A (en) * | 2011-11-07 | 2012-04-04 | 广东电网公司电力科学研究院 | Intelligent dynamic load balancing method for high-speed real-time database |
CN103905395A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团陕西有限公司 | WEB access control method and system based on redirection |
CN104320458A (en) * | 2014-10-24 | 2015-01-28 | 国家电网公司 | Informatization achieving system based on Domino servers and Nginx server |
CN105208026A (en) * | 2015-09-29 | 2015-12-30 | 努比亚技术有限公司 | Hostile attack preventing method and network system |
CN106572132A (en) * | 2015-10-09 | 2017-04-19 | 中兴通讯股份有限公司 | Chain establishing distribution method, device and system |
CN106708976A (en) * | 2016-12-07 | 2017-05-24 | 安徽尚果信息科技有限公司 | Method for managing businesses via standard data interface |
-
2018
- 2018-05-30 CN CN201810541428.5A patent/CN108881184A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677329A (en) * | 2008-09-18 | 2010-03-24 | 中兴通讯股份有限公司 | Comprehensive voice resource platform proxy server and its data processing method |
CN101459836A (en) * | 2008-12-29 | 2009-06-17 | 中兴通讯股份有限公司 | Service processing method and system for content distributing network of interactive network television |
CN102404390A (en) * | 2011-11-07 | 2012-04-04 | 广东电网公司电力科学研究院 | Intelligent dynamic load balancing method for high-speed real-time database |
CN103905395A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团陕西有限公司 | WEB access control method and system based on redirection |
CN104320458A (en) * | 2014-10-24 | 2015-01-28 | 国家电网公司 | Informatization achieving system based on Domino servers and Nginx server |
CN105208026A (en) * | 2015-09-29 | 2015-12-30 | 努比亚技术有限公司 | Hostile attack preventing method and network system |
CN106572132A (en) * | 2015-10-09 | 2017-04-19 | 中兴通讯股份有限公司 | Chain establishing distribution method, device and system |
CN106708976A (en) * | 2016-12-07 | 2017-05-24 | 安徽尚果信息科技有限公司 | Method for managing businesses via standard data interface |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109769010A (en) * | 2018-12-04 | 2019-05-17 | 平安科技(深圳)有限公司 | Method, apparatus, equipment and storage medium based on SDK access CloudStack server |
CN109769010B (en) * | 2018-12-04 | 2021-11-30 | 平安科技(深圳)有限公司 | Method, device, equipment and storage medium for accessing CloudStack server based on SDK |
CN111352740A (en) * | 2018-12-21 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Application interaction processing method and device |
CN111352740B (en) * | 2018-12-21 | 2023-04-18 | 腾讯科技(深圳)有限公司 | Application interaction processing method and device |
CN109743303B (en) * | 2018-12-25 | 2021-10-01 | 中国移动通信集团江苏有限公司 | Application protection method, device, system and storage medium |
CN109743303A (en) * | 2018-12-25 | 2019-05-10 | 中国移动通信集团江苏有限公司 | Using guard method, device, system and storage medium |
CN112995265A (en) * | 2019-12-18 | 2021-06-18 | 中国移动通信集团四川有限公司 | Request distribution method and device and electronic equipment |
CN111431959A (en) * | 2020-02-19 | 2020-07-17 | 中国船舶工业系统工程研究院 | Service load balancing method and device based on publish-subscribe interceptor mechanism |
CN111431959B (en) * | 2020-02-19 | 2022-10-21 | 中国船舶工业系统工程研究院 | Service load balancing method and device based on publish-subscribe interceptor mechanism |
CN111428237A (en) * | 2020-03-06 | 2020-07-17 | 支付宝(杭州)信息技术有限公司 | Attack risk identification method, system and device and electronic equipment |
CN111428237B (en) * | 2020-03-06 | 2022-08-12 | 支付宝(杭州)信息技术有限公司 | Attack risk identification method, system and device and electronic equipment |
CN111563075A (en) * | 2020-05-06 | 2020-08-21 | 政采云有限公司 | Service checking system, method and equipment and storage medium |
CN111563075B (en) * | 2020-05-06 | 2024-01-23 | 政采云有限公司 | Service verification system, method and equipment and storage medium |
CN111708647A (en) * | 2020-06-23 | 2020-09-25 | 北银金融科技有限责任公司 | Service request processing method |
CN112149106A (en) * | 2020-08-27 | 2020-12-29 | 福建摩尔软件有限公司 | Login method, device, equipment and medium for enterprise private applet |
CN112149106B (en) * | 2020-08-27 | 2024-01-09 | 摩尔元数(福建)科技有限公司 | Login method, device, equipment and medium of enterprise private applet |
CN113965557A (en) * | 2021-11-25 | 2022-01-21 | 杭州安恒信息技术股份有限公司 | Service development method, device, equipment and medium |
CN113965557B (en) * | 2021-11-25 | 2024-04-26 | 杭州安恒信息技术股份有限公司 | Service development method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881184A (en) | Access request processing method, terminal, server and computer readable storage medium | |
CN109257740A (en) | Profile method for down loading, mobile terminal and readable storage medium storing program for executing | |
CN107038245B (en) | Page switching method, mobile terminal and storage medium | |
CN109165499A (en) | Single-point logging method, mobile terminal and computer readable storage medium | |
CN109033801A (en) | Method, mobile terminal and the storage medium of application program verification user identity | |
CN108616499A (en) | A kind of method for authenticating of application program, terminal and computer readable storage medium | |
CN107451460A (en) | Interface processing method, equipment, server and computer-readable recording medium | |
CN109618316A (en) | Network share method, mobile terminal and storage medium | |
CN109102297A (en) | A kind of voidable method of payment and device | |
CN111339572A (en) | Method and system for verifying integrity of cloud data, terminal device and storage medium | |
CN107395560A (en) | Safety check and its initiation, management method, equipment, server and storage medium | |
CN108881103A (en) | A kind of method and device accessing network | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN109687974A (en) | APK verification method, device, mobile terminal and readable storage medium storing program for executing | |
CN109922078A (en) | Upgrade control method, mobile terminal and computer readable storage medium | |
CN110213765A (en) | APN information acquisition methods, terminal, server and storage medium | |
CN108833690A (en) | authority control method, terminal and computer readable storage medium | |
CN108196762A (en) | A kind of terminal control method, terminal and computer readable storage medium | |
CN111427709B (en) | Application program splitting control method, device and computer readable storage medium | |
CN109275146A (en) | A kind of pseudo-base station detection method, terminal and computer readable storage medium | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN107330314A (en) | Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic | |
CN107330313A (en) | Application control method, mobile terminal and readable storage medium storing program for executing | |
CN109639834A (en) | A kind of synchronizing information processing method, system and mobile terminal | |
CN110062106A (en) | A kind of call method of application program, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |
|
RJ01 | Rejection of invention patent application after publication |