CN110611674A - Protocol interaction method, system and storage medium between different computer systems - Google Patents

Protocol interaction method, system and storage medium between different computer systems Download PDF

Info

Publication number
CN110611674A
CN110611674A CN201910892454.7A CN201910892454A CN110611674A CN 110611674 A CN110611674 A CN 110611674A CN 201910892454 A CN201910892454 A CN 201910892454A CN 110611674 A CN110611674 A CN 110611674A
Authority
CN
China
Prior art keywords
protocol
template file
computer system
information
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910892454.7A
Other languages
Chinese (zh)
Other versions
CN110611674B (en
Inventor
李一凡
赵保新
崔洪振
赵楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201910892454.7A priority Critical patent/CN110611674B/en
Publication of CN110611674A publication Critical patent/CN110611674A/en
Application granted granted Critical
Publication of CN110611674B publication Critical patent/CN110611674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion

Abstract

The application discloses a protocol interaction method, a device and a storage medium among different computer systems, wherein the method is applied to the field of computer networks and comprises the following steps: acquiring a protocol template file corresponding to a second computer system, wherein the second computer system and the first computer system adopt different internal protocols and are computer systems with interconnection adaptation protocols, and the protocol template file is obtained by performing function arrangement according to at least one self-defined instruction and/or at least one self-defined function; sending end processing is carried out on first information according to the protocol template file, wherein the first information is information sent from the first computer system to the second computer system; and carrying out receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system. The method realizes protocol interaction between different computer systems by utilizing the protocol template.

Description

Protocol interaction method, system and storage medium between different computer systems
Technical Field
The present application relates to the field of computer networks, and in particular, to a method, a system, and a storage medium for protocol interaction between different computer systems.
Background
A network protocol is a set of conventions that must be followed in common by two communicating computer systems. E.g. how to establish a connection, how to identify each other, etc. Only by following a convention can computer systems communicate with each other. In order for data to reach its destination from a source on a network, participants in network communication must follow the same rules, called protocols, which ultimately embody the format of data packets transmitted over the network. Illustratively, the protocols include communication protocols, media types, encryption and decryption, signatures, and the like.
In the related art, a first computer system interfaces with a plurality of banking systems for point service, and different banking systems conform to different network protocols with different formats, contents, parameter names, encryption and decryption, signatures, character sets and the like. The computer system I creates different network interfaces or abstract classes aiming at different bank systems, and when a new bank system is accessed, internal logic is rewritten or reloaded so as to adapt to the requirements of different banks.
The related technology needs to research, develop, construct and release different interfaces again aiming at different bank systems.
Disclosure of Invention
The embodiment of the application provides a protocol interaction method, a protocol interaction system and a storage medium among different computer systems, and can solve the problem that different interfaces are required to be researched, constructed and issued again aiming at different bank systems. The technical scheme is as follows:
according to one aspect of the present application, there is provided a protocol interaction method between different computer systems, the method being applied to a first computer system, the method comprising:
acquiring a protocol template file corresponding to a second computer system, wherein the second computer system and the first computer system adopt different internal protocols and are computer systems with interconnection adaptation protocols, and the protocol template file is obtained by performing function arrangement according to at least one self-defined instruction and/or at least one self-defined function;
sending end processing is carried out on first information according to the protocol template file, wherein the first information is information sent from the first computer system to the second computer system;
and carrying out receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
According to another aspect of the present application, there is provided a protocol interaction system between different computer systems, the system including:
the gateway system is used for acquiring a protocol template file corresponding to a second computer system, wherein the second computer system and the first computer system adopt different internal protocols and are computer systems with interconnection adaptation protocols, and the protocol template file is obtained by performing function arrangement according to at least one custom instruction and/or at least one custom function;
the gateway system performs sending end processing on first information according to the protocol template file, wherein the first information is information sent from the first computer system to the second computer system;
and the gateway system carries out receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
According to another aspect of the present application, there is provided a computer device comprising: a processor and a memory, the memory having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by the processor to implement a method of protocol interaction between different computer systems as described above.
According to another aspect of the present application, there is provided a computer readable storage medium having stored therein at least one instruction, at least one program, set of codes, or set of instructions that is loaded and executed by the processor to implement a method of protocol interaction between different computer systems as described above.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
by additionally arranging the protocol template file obtained by performing function arrangement by using at least one custom instruction and/or at least one custom function, when the first computer system needs to communicate with other computer systems using different protocols, the protocol template file corresponding to the other computer systems can be quickly obtained by performing rearrangement by using the custom instruction or/and the function, and the first computer system can process the first information sending end or the second information receiving end by using the protocol template file to complete information communication with different computer systems.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a block diagram of an implementation environment for a system provided by an exemplary embodiment of the present application;
FIG. 2 is a flowchart of a method of protocol interaction between different computer systems provided by an exemplary embodiment of the present application;
FIG. 3 is a flowchart of a method of protocol interaction between different computer systems provided by another exemplary embodiment of the present application;
FIG. 4 is a flowchart of a method of protocol interaction between different computer systems provided by another exemplary embodiment of the present application;
FIG. 5 is a flowchart of a method of protocol interaction between different computer systems provided by another exemplary embodiment of the present application;
FIG. 6 is a flowchart of a method of protocol interaction between different computer systems provided by another exemplary embodiment of the present application;
FIG. 7 is a block diagram of a protocol interaction system between different computer systems provided by another exemplary embodiment of the present application;
fig. 8 is a schematic structural diagram of a server in a computer system according to another exemplary embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, a schematic structural diagram of a computer system provided in an exemplary embodiment of the present application is shown, the computer system including a first computer system 120 and a second computer system 140 for interfacing.
The second computer system 140 for interfacing and the first computer system 120 are computer systems that employ different internal protocols and have interconnect-compliant protocols. The first computer system 120 and the second computer system 140 for interfacing are connected to each other through a wired or wireless network.
An interconnect adaptation protocol, i.e., a network protocol or protocol, is a set of conventions that must be followed in common by two communicating computer systems. E.g. how to establish a connection, how to identify each other, etc. Only by following a convention can computer systems communicate with each other. In order for data to reach a destination from a source on a network, participants in network communications must follow the same rules, called protocols, which ultimately embody the format of data packets transmitted over the network. Illustratively, the protocols include communication protocols, media types, encryption and decryption, signatures, and the like.
The communication Protocol refers to rules and conventions that must be followed by two computer systems to complete communication or service, such as TCP/IP (Transport Control Protocol/Internet Protocol).
The Media Type, also called Internet Media Type (Internet Media Type), is a classification Type given to contents transmitted over the Internet, and the Internet Media Type of a piece of contents is determined by its file format and contents. The internet media type corresponds to a file extension, for example, the media type of an image file is image/JPEG (joint photographic Experts Group).
Encryption and decryption, encryption technology is the most common security and secrecy means, and important data is changed into scrambled code by using technical means, encrypted and transmitted, and is restored by using the same or different means after reaching a destination to be decrypted. The encryption technique includes two elements: an algorithm and a key. An algorithm is a step of combining ordinary information or understandable information with a string of numbers (keys), which is an algorithm used to encode and decrypt data, to generate an unintelligible ciphertext. Encryption techniques can be divided into symmetric encryption and asymmetric encryption. Symmetric encryption uses symmetric cryptographic encoding techniques and is characterized by the use of the same key for file encryption and decryption, i.e., an encryption key can also be used as a decryption key, a method known in cryptography as symmetric encryption algorithm. Exemplary symmetric encryption algorithms are: AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption algorithm). Asymmetric encryption algorithms require two keys: public key (public) and private key (Privatekey). The public key and the private key are a pair, and if the public key is used for encrypting data, only the corresponding private key can be used for decrypting the data; if the data is encrypted with a private key, it can only be decrypted with the corresponding public key. Since two different keys are used for encryption and decryption, this algorithm is called an asymmetric encryption algorithm. An exemplary asymmetric encryption algorithm is the RSA (Rivest Shamir Adleman, liewster sammor aldmann) encryption algorithm.
Signature, an algorithm that prevents data content from being tampered with, is also called salting. Salt (Salt), in cryptography, refers to inserting an arbitrarily fixed location of the hash content into a particular string before hashing (data). This way of adding strings to the hash is called salting, i.e. signing. The effect is that the signed hash result is different from the result without signature, and whether the data is falsified can be verified by verifying the signature. This process may add additional security in different application scenarios. The salt may be a randomly generated string, and the location of its insertion may or may not be arbitrary. The signature has irreversibility. Exemplary, signature algorithms are: MD5(Message-Digest Algorithm 5), SHA (Secure Hash Algorithm) 1, SHA256, CFCA (China financial certification Authority) signature Algorithm, and the like. A Hash (Hash) algorithm is generally used.
The hash algorithm is also called as hash algorithm, is a cryptographic algorithm which can only encrypt and can not decrypt, and can convert information with any length into a string with fixed length, wherein the string with fixed length is a hash value. The hash value is a character string obtained after information is subjected to a hash algorithm. When the information is the same, the hash value is the same; the similarity of information does not make the hash values identical, so the hash values can be used to verify whether the information is identical. Since there is no regularity in the transition between the information and the hash value, the information cannot be reversely deduced from the hash value.
Optionally, there are at least two second computer systems 140 for interfacing.
Optionally, first computer system 120 includes a file storage system 121, a configuration center 122, and a gateway system 123. Illustratively, the File storage system 121 may be an SFTP (Secure File Transfer Protocol) system.
File storage system 121, configuration center 122, and gateway system 123 are connected in pairs. The gateway server 123 is connected to the docking system 140.
The file storage system 121 is used to store protocol template files. The file storage system 121 stores the protocol template file written by the gateway system 123 and synchronizes information related to the protocol template file to the configuration center 122. The related information of the protocol template file comprises: at least one of a hash value corresponding to the protocol template file, a protocol template file name, and a corresponding computer system.
Configuration center 122 is used to store information about second computer system 140 for interfacing. The information about the second computer system 140 used for interfacing is information required for information communication between the two computer systems, and includes: at least one of a name, code, address, network, protocol template file name, hash value of the protocol template file, service provided by the computer system of the second computer system to interface. The configuration center 122 stores the related information of the protocol template file synchronized by the file storage system 121, and sends the related information of the second computer system for docking to the gateway system 123 when receiving the second computer system information query request for docking sent by the gateway system 123.
The gateway system 123 is a control center for internal information communication and external information communication of the first computer system. Gateway system 123 sends various requests to file storage system 121 and configuration center 122 and receives various information back. The gateway system 123 sends a request to the second computer system 140 for docking using the protocol template file and processes the information returned by the second computer system 140 for docking using the protocol template file. Gateway system 123 writes the protocol template file to the file storage system. Gateway system 123 caches protocol template files for each second computer system that interfaces.
FIG. 2 is a flowchart illustrating a protocol interaction method between different computer systems according to an exemplary embodiment of the present application. The method may be performed by a first computer system as shown in fig. 1. The method comprises the following steps:
step 101, acquiring a protocol template file corresponding to a second computer system.
The first computer system obtains a protocol template file corresponding to the second computer system.
The second computer system and the first computer system adopt different internal protocols and have an interconnection adaptive protocol, and the protocol template file is obtained by performing function arrangement according to at least one custom instruction and/or at least one custom function.
Internal protocols are rules that are followed by a computer system to communicate information internally. For example, a first system and a second system are provided in a computer system, and a network protocol that the first system and the second system commonly follow when communicating information is an internal protocol.
The custom instruction is an extensible instruction, and part of parameters or operations in the custom instruction can be changed to meet the requirements of the interconnection adaptation protocol. Exemplary custom instructions are MD5 Sign Directive (MD5 symbolic instruction), Base64Directive (64 based (printable characters represent binary data) instruction), SHA256 Sign Directive (symbolic instruction with a hash value of 256 bits).
The custom function is an extensible function, and part of parameters or operations in the custom function can be changed to meet the requirements of the interconnection adaptation protocol.
The function arrangement is that the self-defined instruction or the self-defined function can be arbitrarily arranged and combined in the protocol template file according to the requirement to adapt to the requirements of different interconnection adaptation protocols. Illustratively, the first self-defined instruction and the first self-defined function are subjected to function arrangement to obtain a first protocol template file.
The protocol template file is a template file corresponding to the second computer system. The protocol template file may process the information to conform to an interconnection adaptation protocol of the first computer system and the second computer system.
And 102, carrying out sending end processing on first information according to the protocol template file, wherein the first information is information sent from the first computer system to the second computer system.
The first computer system sends end processing to the first information according to the protocol template file, and the first information is information which needs to be sent from the first computer system to the second computer system.
The sending end processing is that the first computer system processes the first information according to the protocol template file, so that the processed first information can be received and identified by the second computer system.
And 103, performing receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
And the first computer system performs receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
The receiving end processing is that the first computer system processes the second information according to the protocol template file, so that the first computer system identifies the second information sent by the second computer system.
In summary, in the method provided in this embodiment, by adding the protocol template file obtained by performing function arrangement by using at least one custom instruction and/or at least one custom function, when the first computer system needs to communicate with other computer systems using different protocols, the protocol template file corresponding to the other computer systems can be obtained by quickly performing rearrangement by using the custom instruction and/or the custom function, and the first computer system can perform sending-end processing on the first information or perform receiving-end processing on the second information by using the protocol template file, thereby completing information communication with different computer systems.
Illustratively, the above exemplary embodiment further comprises the step of writing the protocol template file to the first computer system before step 101. Exemplary embodiments are presented for processing information according to a protocol template file.
FIG. 3 is a flowchart illustrating a protocol interaction method between different computer systems according to an exemplary embodiment of the present application. The method may be performed by a first computer system as shown in fig. 1. The method comprises the following steps:
step 401, when the interconnection adaptation protocol changes, performing function arrangement again according to at least one custom instruction and/or at least one custom function to obtain an updated protocol template file.
When the interconnection adaptation protocol is changed, the first computer system conducts function arrangement again according to at least one user-defined instruction and/or at least one user-defined function to obtain an updated protocol template file.
At least one custom instruction and/or at least one custom function, comprising: at least one custom instruction and/or at least one custom function for information insertion; at least one custom instruction and/or at least one custom function for encoding; at least one custom instruction and/or at least one custom function for signing; at least one custom instruction and/or at least one custom function for encryption; at least one custom instruction and/or at least one custom function for verifying the signature; at least one custom instruction and/or at least one custom function for decryption; at least one custom instruction and/or at least one custom function for decoding; at least one custom instruction and/or at least one custom function for information extraction.
The change in the interconnection adaptation protocol may be at least one of an appearance of a new third computer system, a change in the interconnection adaptation protocol of the second computer system, and a cancellation of the interconnection adaptation protocol of the second computer system.
Step 101, acquiring a protocol template file corresponding to a second computer system.
Illustratively, the protocol template file includes a first template file and a second template file.
Step 201, performing a first templating process on the first information according to the first template file, the first templating process including: at least one of an information insertion operation, an encoding operation, a signing operation, and an encryption operation.
The first computer system performs a first templating process on the first information according to the first template file, illustratively, the first templating process includes: at least one of an information insertion operation, an encoding operation, a signing operation, and an encryption operation.
The first template file is a template for processing first information, that is, a protocol template file for templating information sent from the first computer system to the second computer system.
The templating process is a process of adding information to a template and processing the information according to a mode specified by an interconnection adaptation protocol, or reversely processing the information according to the mode specified by the interconnection adaptation protocol and extracting the information.
The first templated process is the process of converting the first information into first information conforming to an interconnection adaptation protocol of the first computer system and the second computer system.
The information insertion operation is an operation of inserting the first information into the first template file. Illustratively, the bank credit query template is "bank: xxx, user account: xxx ", when a user requests to query a bank credit, inserting the bank and the user account into a bank credit query template to obtain a' bank: bank, user account: abc ".
The encoding operation is a process of converting the first information from one form or format to another form or format according to at least one custom instruction and/or at least one custom function in the first template file. Illustratively, the encoding transforms the first information conforming to a protocol internal to the first computer system into information conforming to a form or format of a protocol for interconnecting the first computer system to the second computer system. For example, the first information in the text format is converted into information in the digital format.
And the signature operation is a process of adding a string of character strings at any position of the first information. The signature operation is used to verify whether the information received by the second computer system is the information sent by the first computer system, i.e., whether the information has been tampered during the information transmission process. For example, the signature "1100" is added to the information "0000", and the first information "00001100" is obtained.
And the encryption operation is to change the first information according to the algorithm in the first template file so that the first information is converted into information which cannot be understood by other computer systems or users. The encryption technique includes two elements: an algorithm and a key. The first template file and the second template file have at least one custom instruction and/or at least one custom function to form an algorithm or a key. The algorithm combines the understandable information (first information) with a string of characters (keys) to produce an unintelligible ciphertext, i.e., an encryption operation. A key is an algorithm used to encode and decode data, and the key converts an unintelligible ciphertext (second information) into intelligible information through encoding and decoding, i.e., a decryption operation. Illustratively, the first information is "1100", the key is "0001", the algorithm is to add the first information to the key, and the unintelligible information resulting from the encryption operation is "1101".
Step 301, performing a second templating process on the second information according to the second template file, the second templating process including: at least one of a verification signature operation, a decryption operation, a decoding operation, and an information extraction operation.
The first computer system performs a second templating process on the second information according to the second template file, illustratively, the second templating process includes: at least one of a verification signature operation, a decryption operation, a decoding operation, and an information extraction operation.
The second template file is a template for processing the second information, that is, a protocol template file for templating information sent by the second computer system received by the first computer system.
The second templating process is the process of converting the second information into information conforming to the protocol internal to the first computer system. Illustratively, the second templating process further includes a process of extracting useful information from the converted information centers.
The verification signature operation is an operation of verifying whether the second information content is changed or tampered. The signature (salt) is a string of characters generated by the first computer system or the second computer system according to the interconnection adaptation protocol and commonly known by the first computer system and the second computer system. The first computer system verifies whether the second information is complete, tampered with or not by verifying whether a signature is present within the second information, whether the signature is complete or altered. Illustratively, the signature is "1100", the second information is "00001100", and the second information has not been tampered with.
The decryption operation is the inverse of the encryption operation. The decryption operation converts the unintelligible second information into intelligible information using the key in the second template file. Illustratively, the second information is "1101", the key is "0100", the encryption algorithm is to add the information to the key, and the intelligible information resulting from the decryption operation is "1001".
The decoding operation is the inverse of the encoding operation. The decoding operation converts the second information from one form or format to another form or format in accordance with at least one custom instruction and/or at least one custom function in the second template file. Illustratively, the decoding operation converts the second information conforming to the interconnection adaptation protocol of the first computer system and the second computer system into a form or format conforming to a protocol internal to the first computer system. For example, the second information is in a digital format, and the second information is converted into a text format through a decoding operation.
The information extracting operation is an operation of extracting useful information from the second information using the second template file. Illustratively, the second information is a bank credit query result sent by the second computer system, and the second information is "bank: bank, user account: abc, integral: 100 ", the information" bank a "," abc "," 100 "is extracted through the information extraction operation.
Illustratively, the second information is information before being subjected to a signing operation, a decrypting operation, a decoding operation, and an information extracting operation. The second information may be the original second information sent by the second computer system to the first computer system, or may be an intermediate transition state of the second information after any one of the signing operation, the decryption operation, the decoding operation and the information extraction operation.
In summary, in the method provided in this embodiment, the updated protocol template file is obtained by rearranging the function of the at least one custom instruction and/or the at least one custom function. When the interconnection adaptation protocol of other computer systems which are in butt joint with the first computer system changes, the protocol template file corresponding to the other computer systems can be quickly obtained without researching, developing, constructing and releasing different interfaces aiming at different bank systems.
Performing first templating processing on first information by using a first template file to enable the information sent by a first computer system to conform to an interconnection adaptation protocol of the first computer system and a second computer system; performing second templating processing on the second information by using a second template to convert the second information received by the first computer system into information conforming to the internal protocol of the first computer system; and completing the information communication process between the first computer system and the second computer system.
Exemplary embodiments of the internal composition of the first computer system in the above exemplary embodiments are given, and exemplary embodiments of the method for implementing protocol interaction between different computer systems provided by the present application are given according to the internal composition of the computer system.
The first computer system includes at least one of a grid relationship system, a file storage system, a configuration center, and a management console. The method provided by the above exemplary embodiment may be performed by a particular system within the first computer system. Based on the exemplary embodiment shown in fig. 2, the following exemplary embodiment is given.
Step 101 may be replaced with steps 601 to 603, which provide an exemplary embodiment of obtaining a protocol template file corresponding to the second computer system according to the template name.
There are also steps 71 to 72 before step 101, which give an exemplary embodiment of obtaining the template name corresponding to the protocol template.
Before step 101 there are further steps 801 to 803, which present an exemplary embodiment of writing a protocol template file to a first computer system.
Steps 801 to 803 may also replace step 401 in the exemplary embodiment shown in fig. 3.
FIG. 4 is a flowchart illustrating a protocol interaction method between different computer systems according to an exemplary embodiment of the present application. The method may be performed by a first computer system as shown in fig. 1. The method comprises the following steps:
step 801, the management console writes the updated protocol template file into the file storage system.
The management console is a system for managing the writing and updating of protocol template files. The management console writes the new protocol template file to the file storage system. When the protocol template file changes, the management console inquires about the update condition of the protocol template file from the file storage system and then sends the updated protocol template file to the gateway system. Illustratively, the management console is a subsystem within the gateway system.
At least one custom instruction and/or at least one custom function is stored within the management console. And the management console writes a new protocol template file obtained by performing function arrangement on at least one custom instruction and/or at least one custom function into the file storage system.
Step 802, the file storage system synchronizes the updated hash value of the protocol template file to the configuration center.
And when receiving the updated protocol template file written by the management console, the file storage system synchronizes the hash value of the updated protocol template file to the configuration center. Illustratively, the file storage system sends the template name and hash value of the protocol template file to the configuration center.
The template name is at least one of a name, a character string, a number, and a code corresponding to the protocol template file. Since the protocol template file corresponds to the second computer system, the template name may also be a name corresponding to the second computer system. The template name is used to identify the protocol template file.
Step 803, when the gateway system monitors that the hash value is updated, it sends a template update request to the management console.
The gateway system is internally provided with a listener which is used for monitoring the hash value of the protocol template file stored in the configuration center. When the gateway system monitors that the hash value in the configuration center is updated, the gateway system sends a template updating request to the management console.
The template updating request corresponds to the protocol template file which is monitored by the gateway system and the hash value of which is updated. The template update request includes at least a template name. The template update request is used for requesting an updated protocol template file from the management console.
Step 804, after inquiring the updated protocol template file from the file storage system, the management console returns the updated protocol template file to the gateway system.
After receiving the template updating request of the gateway system, the management console inquires the updated protocol template file from the file storage system. Illustratively, the management console sends a protocol template file query request to the file storage system, the protocol template file query request including at least a template name of the protocol template file. And the file storage system inquires the updated protocol template file according to the protocol template file inquiry request and sends the updated protocol template file to the management console. And after receiving the updated protocol template file, the management console sends the updated protocol template file to the gateway system. Illustratively, the gateway system caches the updated protocol template file.
Step 71, the gateway system sends a configuration query request corresponding to the second computer system to the configuration center.
When the first computer system needs to send information to the second computer system, the gateway system sends a configuration query request corresponding to the second computer system to the configuration center.
Illustratively, when the configuration center receives a configuration query request corresponding to the second computer system, the configuration center queries the configuration of the second computer system and sends the configuration of the second computer system to the gateway system. The configuration of the second computer system includes: at least one of a web address, an address, a number, a template name, a hash value of the protocol template file of the second computer system.
And step 72, the gateway system receives the template name fed back by the configuration center.
And the gateway system acquires the template name corresponding to the second computer system after receiving the configuration of the second computer system sent by the configuration center.
Step 601, the gateway system sends a template name to the file storage system, wherein the template name is a template name corresponding to a protocol template file corresponding to the second computer system.
And the gateway system sends the template name to the file storage system or sends a template acquisition request, wherein the template acquisition request comprises the template name. The template name is a template name corresponding to a protocol template file corresponding to the second computer system.
Step 602, the file storage system sends the protocol template file to the gateway system according to the template name.
And after receiving the template name sent by the gateway system, the file storage system inquires a corresponding protocol template file according to the template name and sends the protocol template file to the gateway system.
Step 603, the gateway system receives the protocol template file sent by the file storage system.
And 102, carrying out sending end processing on first information according to the protocol template file, wherein the first information is information sent from the first computer system to the second computer system.
And the gateway system carries out sending end processing on the first information according to the protocol template file, wherein the first information is information needing to be sent from the first computer system to the second computer system.
And 103, performing receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
And the gateway system carries out receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
In summary, in the method provided in this embodiment, a gateway system, a file storage system, a configuration center, and a management console are arranged in a first computer system, so that a method for writing a new protocol template file into the computer system, obtaining a template name of the protocol template file, and obtaining the protocol template file according to the template name is provided. The method carries out function arrangement again on at least one user-defined instruction and/or at least one user-defined function to obtain an updated protocol template file. When the interconnection adaptation protocol of other computer systems which are in butt joint with the first computer system is changed, the protocol template files corresponding to the other computer systems can be quickly obtained, and different interfaces do not need to be researched, developed, constructed and issued again aiming at different computer systems.
Two exemplary embodiments of the protocol interaction method between different computer systems provided herein are given by way of example.
First, an exemplary embodiment of a method of updating a protocol template file is presented.
FIG. 5 is a flowchart illustrating a protocol interaction method between different computer systems according to an exemplary embodiment of the present application. The method may be performed by a first computer system as shown in fig. 1. The method comprises the following steps:
and step 901, writing the updated protocol template file.
And the management console writes the updated protocol template file into the file storage system.
And step 902, synchronizing the updated protocol template file hash value.
And after receiving the updated protocol template file, the file storage system synchronizes the hash value of the updated protocol template file to the configuration center.
Step 903, register the listener.
The gateway system registers the listener.
Step 904 listens for hash value changes.
The gateway system listens for hash value changes in the configuration center with a listener.
Step 905, whether a change occurs.
When a hash value in the configuration center changes, a hash value change notification is sent to the gateway system.
Step 906, a template update request is sent.
And after receiving the hash value change notification, the gateway system sends a template updating request to the management console. Illustratively, the template update request has a template name therein.
Step 907, the updated protocol template file is queried.
And after receiving the template updating request sent by the gateway system, the management console sends an updated protocol template file query request to the file storage system according to the template updating request. Illustratively, the updated protocol template file query request has a template name therein.
Step 908, the updated protocol template file is sent.
And after receiving the updated protocol template file query request sent by the management console, the file storage system queries the updated protocol template file according to the updated protocol template file query request. And the file storage system sends the inquired updated protocol template file to the management console.
Step 909 returns the updated protocol template file.
And the management console receives the updated protocol template file sent by the file storage system and sends the updated protocol template file to the gateway system.
At step 910, the cache is deleted and the template content is updated.
And after receiving the protocol template file sent by the management control center, the gateway system deletes the original protocol template file and updates the cache into an updated protocol template file.
In summary, the method provided in this embodiment completes the writing, storing, updating, and caching processes of the protocol update template by using the management console, the file storage system, the configuration center, and the gateway system. The method carries out function arrangement again on at least one user-defined instruction and/or at least one user-defined function to obtain an updated protocol template file. When the interconnection adaptation protocol of other computer systems which are in butt joint with the first computer system is changed, the protocol template files corresponding to the other computer systems can be quickly obtained, and different interfaces do not need to be researched, developed, constructed and issued again aiming at different computer systems.
Next, an exemplary embodiment in which the protocol interaction method between different computer systems provided in the present application is applied to a bank credit inquiry system is given.
FIG. 6 is a flowchart illustrating a protocol interaction method between different computer systems according to an exemplary embodiment of the present application. The method may be performed by a first computer system and a second computer system as shown in fig. 1. The point system, the gateway system, the configuration center and the file storage system belong to a first computer system, and the bank point system is a second computer system. The method comprises the following steps:
step 1001, a credit inquiry request is sent.
When the bank credit inquiry is needed, the credit inquiry system sends a credit inquiry request to the gateway system. The integral inquiry request comprises integral inquiry information. The point query information includes:
at least one of bank name, code and number;
and/or the first and/or second light sources,
at least one of a user account number, name, number and code;
step 1002, send a bank service configuration query request.
And after receiving the score query request sent by the score system, the gateway system sends a bank service configuration query request to the configuration center. The bank service configuration inquiry request comprises at least one of a bank name, a code and a number.
Step 1003, sending the special line, service, template name and the like of the bank.
The configuration center sends the special line, service, template name, etc. of the bank to the gateway system.
The special line of the bank is the address information of the bank credit system. The service is a service provided by a bank credit system, for example, whether the bank has a credit service, whether the bank having the credit service provides a credit exchange service, and the like. The template name is the template name corresponding to the protocol template file corresponding to the bank credit system.
Step 1004, sending a first template download request according to the template name.
And the gateway system sends a first template downloading request corresponding to a first template file of the protocol template file to the file storage system according to the received template name.
Step 1005, returning the template information.
And after receiving the first template downloading request, the file storage system sends the first template file to the gateway system.
Step 1006, rendering the template, signing, encrypting, etc. according to the score query request.
And the gateway system performs first templating treatment on the integral query information according to the first template file to obtain treated information, wherein the treated information is the information in the message format required by the bank.
Step 1007, sending the inquiry request of the bank request message format.
And the gateway system sends a query request in a message format required by the bank to the bank scoring system.
Step 1008, returns the message content.
And the bank score system sends message content to the gateway system. The message content includes the score query result.
Step 1009, send the second template download request according to the template name.
And the gateway system sends a second template downloading request of a second template file in the protocol template files to Yining to the file storage system according to the template name.
Step 1010, second template information is returned.
The file storage system sends the second template file to the gateway system.
And step 1011, decrypting the message, checking the signature and the like by using the second template.
And after receiving the second template file sent by the file storage system, the gateway system performs second templated processing on the message according to the second template file. And extracting integral query results, namely integral information.
At step 1012, the point information is returned.
And the gateway system sends the integral information to the integral system. The integral query process is completed.
In summary, the method provided in this embodiment provides a complete method flow for interacting protocols between different computer systems provided in this application. The method carries out function arrangement again on at least one user-defined instruction and/or at least one user-defined function to obtain an updated protocol template file. When the interconnection adaptation protocol of other computer systems which are in butt joint with the first computer system changes, the protocol template file corresponding to the other computer systems can be quickly obtained without researching, developing, constructing and releasing different interfaces aiming at different bank systems.
The following are system embodiments of the present application, and details that are not described in detail in the system embodiments may be combined with corresponding descriptions in the above method embodiments, and are not described herein again.
Fig. 7 shows a schematic structural diagram of a protocol interaction system between different computer systems according to an exemplary embodiment of the present application. The system is applied to a first computer system and comprises: gateway system 1101.
The gateway system 1101 is configured to obtain a protocol template file corresponding to a second computer system, where the second computer system and the first computer system are computer systems that adopt different internal protocols and have an interconnection adaptation protocol, and the protocol template file is obtained by performing function arrangement according to at least one custom instruction and/or at least one custom function;
the gateway system 1101 performs sending-end processing on first information according to the protocol template file, where the first information is information sent from the first computer system to the second computer system;
the gateway system 1101 performs receiving-end processing on second information according to the protocol template file, where the second information is information sent from the second computer system to the first computer system.
In an alternative embodiment, the protocol template file includes: a first template file;
the gateway system 1101 performs a first templating process on the first information according to the first template file, where the first templating process includes: at least one of an information insertion operation, an encoding operation, a signing operation, and an encryption operation.
In an alternative embodiment, the protocol template file includes: a second template file;
the gateway system 1101 performs a second templating process on the second information according to the second template file, where the second templating process includes: at least one of a verification signature operation, a decryption operation, a decoding operation, and an information extraction operation.
In an optional embodiment, when the interconnection adaptation protocol changes, the gateway system 1101 performs function arrangement again according to the at least one custom instruction and/or the at least one custom function to obtain an updated protocol template file.
In an optional embodiment, the at least one custom instruction and/or at least one custom function includes:
at least one custom instruction and/or at least one custom function for information insertion;
at least one custom instruction and/or at least one custom function for encoding;
at least one custom instruction and/or at least one custom function for signing;
at least one custom instruction and/or at least one custom function for encryption;
at least one custom instruction and/or at least one custom function for verifying the signature;
at least one custom instruction and/or at least one custom function for decryption;
at least one custom instruction and/or at least one custom function for decoding;
at least one custom instruction and/or at least one custom function for information extraction.
In an optional embodiment, the first computer system further comprises: a file storage system 1104;
the gateway system 1101 sends a template name to the file storage system 1104, where the template name is a template name corresponding to a protocol template file corresponding to the second computer system;
the file storage system 1104 sends the protocol template file to the gateway system 1101 according to the template name;
the gateway system 1101 receives the protocol template file sent by the file storage system 1104.
In an optional embodiment, the first computer system further comprises: a configuration center 1102;
the gateway system 1101 sends a configuration query request corresponding to the second computer system to the configuration center 1102;
the gateway system 1101 receives the template name fed back by the configuration center 1102.
In an optional embodiment, the first computer system further comprises: a management console 1103;
the management console 1103 writes the updated protocol template file into the file storage system;
the file storage system 1104 synchronizes the hash value of the updated protocol template file to the configuration center 1102;
the gateway system 1101, when monitoring that the hash value is updated, sends a template update request to the management console 1103;
the management console 1103 queries the updated protocol template file from the file storage system 1104, and returns the updated protocol template file to the gateway system 1101
Fig. 8 is a schematic structural diagram of a server constituting a computer system according to an embodiment of the present application. Specifically, the method comprises the following steps: the server 700 includes a Central Processing Unit (CPU) 701, a system memory 704 including a Random Access Memory (RAM) 702 and a read-only memory (ROM) 703, and a system bus 705 connecting the system memory 704 and the CPU 701. The server 700 also includes a basic input/output system (I/O system) 706, which facilitates transfer of information between devices within the computer, and a mass storage device 707 for storing an operating system 713, application programs 714, and other program modules 715.
The basic input/output system 706 includes a display 708 for displaying information and an input device 709, such as a mouse, keyboard, etc., for a user to input information. Wherein the display 708 and the input device 709 are connected to the central processing unit 701 through an input/output controller 710 connected to the system bus 705. The basic input/output system 706 may also include an input/output controller 710 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, an input/output controller 710 may also provide output to a display screen, a printer, or other type of output device.
The mass storage device 707 is connected to the central processing unit 701 through a mass storage controller (not shown) connected to the system bus 705. The mass storage device 707 and its associated computer-readable media provide non-volatile storage for the server 700. That is, the mass storage device 707 may include a computer-readable medium (not shown) such as a hard disk or a Compact Disc-Only Memory (CD-ROM) drive.
Without loss of generality, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media include RAM, ROM, erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other solid state memory technology, CD-ROM, Digital Versatile Disks (DVD), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage, or other magnetic storage devices. Of course, those skilled in the art will appreciate that computer storage media is not limited to the foregoing. The system memory 704 and mass storage device 707 described above may be collectively referred to as memory.
According to various embodiments of the present application, server 700 may also operate as a remote computer connected to a network via a network, such as the Internet. That is, the server 700 may be connected to the network 712 through a network interface unit 711 connected to the system bus 705, or the network interface unit 711 may be used to connect to other types of networks or remote computer systems (not shown).
The present application further provides a computer device, comprising: a processor and a memory, the storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by the processor to implement the protocol interaction method between different computer systems provided by the above-described method embodiments.
The present application further provides a computer-readable storage medium, in which at least one instruction, at least one program, a code set, or a set of instructions is stored, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by a processor to implement the protocol interaction method between different computer systems provided by the above-mentioned method embodiments.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The present application is intended to cover various modifications, alternatives, and equivalents, which may be included within the spirit and scope of the present application.

Claims (18)

1. A protocol interaction method between different computer systems, which is applied to a first computer system, is characterized in that the method comprises the following steps:
acquiring a protocol template file corresponding to a second computer system, wherein the second computer system and the first computer system adopt different internal protocols and are computer systems with interconnection adaptation protocols, and the protocol template file is obtained by performing function arrangement according to at least one self-defined instruction and/or at least one self-defined function;
sending end processing is carried out on first information according to the protocol template file, wherein the first information is information sent from the first computer system to the second computer system;
and carrying out receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
2. The method of claim 1, wherein the protocol template file comprises: a first template file;
the sending end processing of the first information according to the protocol template file comprises:
performing a first templating process on the first information according to the first template file, the first templating process including: at least one of an information insertion operation, an encoding operation, a signing operation, and an encryption operation.
3. The method of claim 1, wherein the protocol template file comprises: a second template file;
the receiving end processing of the second information according to the protocol template file comprises:
performing second templating on the second information according to the second template file, the second templating including: at least one of a verification signature operation, a decryption operation, a decoding operation, and an information extraction operation.
4. The method of any of claims 1 to 3, further comprising:
when the interconnection adaptation protocol is changed, function arrangement is carried out again according to the at least one user-defined instruction and/or the at least one user-defined function, and an updated protocol template file is obtained.
5. The method of claim 4, wherein the at least one custom instruction and/or at least one custom function comprises:
at least one custom instruction and/or at least one custom function for information insertion;
at least one custom instruction and/or at least one custom function for encoding;
at least one custom instruction and/or at least one custom function for signing;
at least one custom instruction and/or at least one custom function for encryption;
at least one custom instruction and/or at least one custom function for verifying the signature;
at least one custom instruction and/or at least one custom function for decryption;
at least one custom instruction and/or at least one custom function for decoding;
at least one custom instruction and/or at least one custom function for information extraction.
6. The method of any of claims 1 to 5, wherein the first computer system comprises: a gateway system and a file storage system;
the acquiring of the protocol template file corresponding to the second computer system includes:
the gateway system sends a template name to the file storage system, wherein the template name is a template name corresponding to a protocol template file corresponding to the second computer system;
the file storage system sends the protocol template file to the gateway system according to the template name;
and the gateway system receives the protocol template file sent by the file storage system.
7. The method of claim 6, wherein the first computer system further comprises: a configuration center; the method further comprises the following steps:
the gateway system sends a configuration query request corresponding to the second computer system to the configuration center;
and the gateway system receives the template name fed back by the configuration center.
8. The method of claim 7, wherein the first computer system further comprises: the system comprises a management console, a file storage system, a configuration center and a gateway system;
when the interconnection adaptation protocol is changed, rearranging the function according to the at least one user-defined instruction and/or the at least one user-defined function to obtain an updated protocol template file, including:
the management console writes the updated protocol template file into the file storage system;
the file storage system synchronizes the hash value of the updated protocol template file to the configuration center;
when monitoring that the hash value is updated, the gateway system sends a template updating request to the management console;
and after inquiring the updated protocol template file from the file storage system, the management console returns the updated protocol template file to the gateway system.
9. A protocol interaction system between different computer systems, wherein the system is applied to a first computer system, the system comprises:
the gateway system is used for acquiring a protocol template file corresponding to a second computer system, wherein the second computer system and the first computer system adopt different internal protocols and are computer systems with interconnection adaptation protocols, and the protocol template file is obtained by performing function arrangement according to at least one custom instruction and/or at least one custom function;
the gateway system performs sending end processing on first information according to the protocol template file, wherein the first information is information sent from the first computer system to the second computer system;
and the gateway system carries out receiving end processing on second information according to the protocol template file, wherein the second information is information sent from the second computer system to the first computer system.
10. The system of claim 9, wherein the protocol template file comprises: a first template file;
the gateway system performs a first templating process on the first information according to the first template file, wherein the first templating process includes: at least one of an information insertion operation, an encoding operation, a signing operation, and an encryption operation.
11. The system of claim 9, wherein the protocol template file comprises: a second template file;
the gateway system performs second templating processing on the second information according to the second template file, where the second templating processing includes: at least one of a verification signature operation, a decryption operation, a decoding operation, and an information extraction operation.
12. The system according to any one of claims 9 to 11,
and when the interconnection adaptation protocol is changed, the gateway system carries out function arrangement again according to the at least one user-defined instruction and/or the at least one user-defined function to obtain an updated protocol template file.
13. The system of claim 12, wherein the at least one custom instruction and/or at least one custom function comprises:
at least one custom instruction and/or at least one custom function for information insertion;
at least one custom instruction and/or at least one custom function for encoding;
at least one custom instruction and/or at least one custom function for signing;
at least one custom instruction and/or at least one custom function for encryption;
at least one custom instruction and/or at least one custom function for verifying the signature;
at least one custom instruction and/or at least one custom function for decryption;
at least one custom instruction and/or at least one custom function for decoding;
at least one custom instruction and/or at least one custom function for information extraction.
14. The system of any of claims 9 to 13, wherein the first computer system further comprises: a file storage system;
the gateway system sends a template name to the file storage system, wherein the template name is a template name corresponding to a protocol template file corresponding to the second computer system;
the file storage system sends the protocol template file to the gateway system according to the template name;
and the gateway system receives the protocol template file sent by the file storage system.
15. The system of claim 14, wherein the first computer system further comprises: a configuration center;
the gateway system sends a configuration query request corresponding to the second computer system to the configuration center;
and the gateway system receives the template name fed back by the configuration center.
16. The system of claim 12, wherein the first computer system further comprises: a management console, a file storage system and a configuration center;
the management console writes the updated protocol template file into the file storage system;
the file storage system synchronizes the hash value of the updated protocol template file to the configuration center;
the gateway system sends a template updating request to the management console when monitoring that the hash value is updated;
and the management console returns the updated protocol template file to the gateway system after inquiring the updated protocol template file from the file storage system.
17. A computer device, characterized in that the computer device comprises: a processor and a memory, said memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by said processor to implement the protocol interaction method between different computer systems according to any of claims 1 to 8.
18. A computer-readable storage medium, having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement a method of protocol interaction between different computer systems as claimed in any one of claims 1 to 8.
CN201910892454.7A 2019-09-20 2019-09-20 Protocol interaction method, system and storage medium between different computer systems Active CN110611674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910892454.7A CN110611674B (en) 2019-09-20 2019-09-20 Protocol interaction method, system and storage medium between different computer systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910892454.7A CN110611674B (en) 2019-09-20 2019-09-20 Protocol interaction method, system and storage medium between different computer systems

Publications (2)

Publication Number Publication Date
CN110611674A true CN110611674A (en) 2019-12-24
CN110611674B CN110611674B (en) 2021-01-01

Family

ID=68891634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910892454.7A Active CN110611674B (en) 2019-09-20 2019-09-20 Protocol interaction method, system and storage medium between different computer systems

Country Status (1)

Country Link
CN (1) CN110611674B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113315842A (en) * 2021-05-31 2021-08-27 中国民航信息网络股份有限公司 Information interaction method and related equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572087A (en) * 2014-12-25 2015-04-29 深圳联友科技有限公司 Adaptation mode method and system for business logic implementation
US20160147777A1 (en) * 2014-11-25 2016-05-26 Emerson Process Management, Valve Automation, Inc. Methods and apparatus of using customizable templates in process control systems
CN106656998A (en) * 2016-11-09 2017-05-10 腾讯科技(深圳)有限公司 Server communication method and device
CN107948200A (en) * 2017-12-29 2018-04-20 广州天高软件科技有限公司 A kind of configurable network interface protocols adaptation engine based on source template
EP3451627A1 (en) * 2017-08-29 2019-03-06 eperi GmbH Gateway computer system with intermediate data processing according to rules that are specified by templates
CN109561104A (en) * 2018-12-28 2019-04-02 深圳市创梦天地科技有限公司 A kind of communication protocol conversion method and device
CN109787768A (en) * 2018-12-12 2019-05-21 平安科技(深圳)有限公司 A kind of authentication configuration method, device and computer readable storage medium
CN109933310A (en) * 2019-03-11 2019-06-25 山东鲁能软件技术有限公司 A kind of configurable JAVA development platform based on data template

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160147777A1 (en) * 2014-11-25 2016-05-26 Emerson Process Management, Valve Automation, Inc. Methods and apparatus of using customizable templates in process control systems
CN104572087A (en) * 2014-12-25 2015-04-29 深圳联友科技有限公司 Adaptation mode method and system for business logic implementation
CN106656998A (en) * 2016-11-09 2017-05-10 腾讯科技(深圳)有限公司 Server communication method and device
EP3451627A1 (en) * 2017-08-29 2019-03-06 eperi GmbH Gateway computer system with intermediate data processing according to rules that are specified by templates
CN107948200A (en) * 2017-12-29 2018-04-20 广州天高软件科技有限公司 A kind of configurable network interface protocols adaptation engine based on source template
CN109787768A (en) * 2018-12-12 2019-05-21 平安科技(深圳)有限公司 A kind of authentication configuration method, device and computer readable storage medium
CN109561104A (en) * 2018-12-28 2019-04-02 深圳市创梦天地科技有限公司 A kind of communication protocol conversion method and device
CN109933310A (en) * 2019-03-11 2019-06-25 山东鲁能软件技术有限公司 A kind of configurable JAVA development platform based on data template

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113315842A (en) * 2021-05-31 2021-08-27 中国民航信息网络股份有限公司 Information interaction method and related equipment

Also Published As

Publication number Publication date
CN110611674B (en) 2021-01-01

Similar Documents

Publication Publication Date Title
US11451386B2 (en) Method and system for many-to-many symmetric cryptography and a network employing the same
US10439804B2 (en) Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes
Barsoum et al. Enabling dynamic data and indirect mutual trust for cloud computing storage systems
JP7454564B2 (en) Methods, user devices, management devices, storage media and computer program products for key management
US20160127131A1 (en) Distributed Validation of Digitally Signed Electronic Documents
CN110912920A (en) Data processing method, apparatus and medium
KR101648364B1 (en) Method for improving encryption/decryption speed by complexly applying for symmetric key encryption and asymmetric key double encryption
CN103731423A (en) Safe method for repeated data deleting
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN111181944B (en) Communication system, information distribution method, device, medium, and apparatus
CN110224824B (en) Digital certificate processing method and device, computer equipment and storage medium
JP2007201522A (en) Encryption communication system, key sharing method, key providing apparatus, and information processing apparatus
CN114785524A (en) Electronic seal generation method, device, equipment and medium
US9825920B1 (en) Systems and methods for multi-function and multi-purpose cryptography
CN112947967B (en) Software updating method, blockchain application store and software uploading terminal
CN110611674B (en) Protocol interaction method, system and storage medium between different computer systems
JP2006279269A (en) Information management device, information management system, network system, user terminal, and their programs
WO2020177109A1 (en) Lot-drawing processing method, trusted chip, node, storage medium and electronic device
US20220216999A1 (en) Blockchain system for supporting change of plain text data included in transaction
JP6792191B2 (en) Information transmission method, information processing method, program, decoding method, program
CN112350920A (en) Instant communication system based on block chain
JP6519601B2 (en) Information processing apparatus, information processing method, device, method of updating encryption key, system and program
CN113342802A (en) Method and device for storing block chain data
US9189638B1 (en) Systems and methods for multi-function and multi-purpose cryptography
CN113382398B (en) Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant