CN116841654A - Service system access method and device and computer equipment - Google Patents

Service system access method and device and computer equipment Download PDF

Info

Publication number
CN116841654A
CN116841654A CN202310718264.XA CN202310718264A CN116841654A CN 116841654 A CN116841654 A CN 116841654A CN 202310718264 A CN202310718264 A CN 202310718264A CN 116841654 A CN116841654 A CN 116841654A
Authority
CN
China
Prior art keywords
access
service system
input stream
standard input
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310718264.XA
Other languages
Chinese (zh)
Inventor
柳明
张彬
王海楠
邵亮
季晔
赵寒
刘长宇
于剑飞
韦方红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank Of Beijing Consumer Finance Co
Original Assignee
Bank Of Beijing Consumer Finance Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank Of Beijing Consumer Finance Co filed Critical Bank Of Beijing Consumer Finance Co
Priority to CN202310718264.XA priority Critical patent/CN116841654A/en
Publication of CN116841654A publication Critical patent/CN116841654A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4488Object-oriented
    • G06F9/449Object-oriented method invocation or resolution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Abstract

The application discloses a service system access method, a device and computer equipment, wherein the method comprises the following steps: the method comprises the steps of obtaining access request information, wherein the access request information comprises access identification and access data, the access identification data are used for representing the type of the access data, and the type of the access data can be determined efficiently and accurately so as to select a corresponding preset configuration script; when the access identifier accords with a preset standard in a preset configuration script, converting the access data into a standard input stream according to a conversion protocol in the preset configuration script, and then sending the standard input stream to a service system, wherein the service system already has the follow-up service system to finish the processing of the access data. The method solves the problem that secondary development is not needed when the service system accesses data, and improves the efficiency of data access and conversion.

Description

Service system access method and device and computer equipment
Technical Field
The present application relates to the field of service system access technologies, and in particular, to a service system access method, device and computer equipment.
Background
In a financial system, a process of interaction with external systems is involved in a business system, the external interaction mode of each external system is different from one external system, the interaction interface, the communication mode, the encryption mode of a message, a secret key, even message fields and attributes of interfaces of the corresponding external systems are different, how to realize that a set of interfaces are in butt joint with all external channels, and the business system does not need to develop or modify codes to reissue projects when accessing channels.
Disclosure of Invention
Therefore, in order to solve the problems in the prior art, the embodiment of the application provides a service system access method, a service system access device and computer equipment.
According to a first aspect, an embodiment of the present application discloses a service system access method, including:
acquiring access request information, wherein the access request information comprises an access identifier and access data;
when the access identifier accords with a preset standard in a preset configuration script, converting the access data into a standard input stream according to a conversion protocol in the preset configuration script;
the standard input stream is sent to the business system so that the business system completes processing the access data.
Optionally, the standard input stream is sent to the service system, so that the service system can complete the processing of the access data, and the method specifically comprises the following steps:
when the flow of the standard input stream is greater than a preset standard, carrying out peak clipping treatment on the standard input stream;
and sending the standard input stream subjected to peak clipping processing to a service system so that the service system can finish processing the access data.
Optionally, the preset configuration script adopts a visibility template engine rendering technology, a Drools rule engine and a Groovy script engine so that the preset configuration script meets multiple types of access requests.
Optionally, the overall architecture of the service system is onion architecture.
Optionally, when multiple access requests are acquired, a RocketMQ is adopted for asynchronous processing, so as to weaken flow impact and improve service system reliability.
Optionally, the method further comprises:
after the service system finishes processing the access data, the processed access data is converted into parameters required by the service system.
According to a second aspect, the embodiment of the application also discloses a service system access device, which comprises:
the acquisition module is used for acquiring access request information, wherein the access request information comprises an access identifier and access data;
the conversion module is used for converting the access data into a standard input stream according to a conversion protocol in the preset configuration script when the access identifier accords with the preset standard in the preset configuration script;
and the processing module is used for sending the standard input stream to the service system so that the service system can complete the processing of the access data.
Optionally, the processing module specifically includes:
the peak clipping module is used for clipping the standard input stream when the flow of the standard input stream is greater than a preset standard;
and the sending module is used for sending the standard input stream subjected to peak clipping processing to the service system so that the service system can finish processing the access data.
According to a third aspect, an embodiment of the present application further discloses a controller, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform steps of the business system access method as in the first aspect or any alternative implementation of the first aspect.
According to a fourth aspect, the present application further discloses a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the service system access method as in the first aspect or any of the alternative embodiments of the first aspect.
The technical scheme of the application has the following advantages:
the service system access method, the service system access device and the computer equipment provided by the application acquire the access request information, wherein the access request information comprises the access identifier and the access data, wherein the access identifier data is used for representing the type of the access data, and the type of the access data can be determined efficiently and accurately so as to select the corresponding preset configuration script; when the access identifier accords with a preset standard in a preset configuration script, converting the access data into a standard input stream according to a conversion protocol in the preset configuration script, and then sending the standard input stream to a service system, wherein the service system already has the follow-up service system to finish the processing of the access data. The method solves the problem that secondary development is not needed when the service system accesses data, and improves the efficiency of data access and conversion.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present application, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a specific example of a service system access method in an embodiment of the present application;
fig. 2 is a schematic diagram of a specific example of a service system access method in an embodiment of the present application;
fig. 3 is a schematic diagram of a specific example of a service system access method in an embodiment of the present application;
fig. 4 is a schematic block diagram of a specific example of a service system access apparatus in an embodiment of the present application;
fig. 5 is a diagram showing a specific example of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the application are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the description of the present application, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present application and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present application. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present application, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; the two components can be directly connected or indirectly connected through an intermediate medium, or can be communicated inside the two components, or can be connected wirelessly or in a wired way. The specific meaning of the above terms in the present application will be understood in specific cases by those of ordinary skill in the art.
In addition, the technical features of the different embodiments of the present application described below may be combined with each other as long as they do not collide with each other.
Aiming at the technical problems mentioned in the background art, the embodiment of the application provides a service system access method, and the scene suitable for the application is introduced before introducing the service system access method, the application is suitable for the service system involved in the financial transaction process, wherein the service system is the outermost layer of the financial transaction, is a protective layer of an internal core system in the whole financial transaction process, can be called an anti-corrosion layer, and the core content is channel access and conversion.
The traditional financial system is a single three-layer architecture model, along with the development of technology, a plurality of traditional financial companies are continuously upgrading own financial systems, and although a micro-service architecture system is adopted, a basic architecture system is also the splitting of the data layer on the surface, and the access of business requirements is hard coded completely by research personnel. For example: the financial system accesses the channel A for authorization, and then a set of authorization interfaces and the subsequent underlying authorization logic are needed to be written. The access channels are too complicated, each new access channel needs to be written with a set of standard interface for access, and the access efficiency is low; the model boundaries of each class of system are not clear enough to be detrimental to subsequent upgrade iterations, for example: the service model is a trusted service model, but contains presentation service attributes, trusted payment service attributes, and the like. The technical system is behind, and the operation and maintenance capability is too dependent on manpower. The coupling between each module is too high, and the maintenance difficulty is too high.
Therefore, the service system access method disclosed in the embodiment of the present application solves the above-mentioned problems, and specifically referring to fig. 1, the method includes:
step 101, access request information is acquired, wherein the access request information comprises an access identifier and access data.
The access request information is an access request of a corresponding other system acquired by the service system, specifically, the access request information for determining identity information of the access request information includes an access identifier, where the access data is actual request content in the access request information.
Step 102, when the access identifier meets a preset standard in a preset configuration script, converting the access data into a standard input stream according to a conversion protocol in the preset configuration script.
The method includes the steps that after access request information is acquired, when an access identifier meets preset standards in a preset configuration script, a conversion protocol in the preset configuration script converts access data into a standard input stream.
Wherein the preset configuration script may be a customized channel access policy. Firstly, carrying out channel related system configuration through a background management system; after the programming is completed, the programmed script is uploaded to the system through a background management system, if the access channel has a relatively complex logic rule, the rule can be configured through the background management system, then the programmed script is refreshed into the memory of the service system through refreshing the cache, the whole process does not need to be reissued by the service system, then service personnel need to configure service parameters related to the channel, and the access to the channel is completed through refreshing the cache.
The preset configuration script is set by adopting a rendering technology of a Velocity template engine, a Drools rule engine and a Groovy script engine, so that the preset configuration script meets multiple types of access requests. And (3) channel configuration management, namely, a set of standard interfaces are written for processing necessary channel adaptation, and all other channel related functions can be completed through background configuration.
The whole architecture of the preset configuration script adopts onion architecture design, the unstable factors are blocked as an outer layer, and a set of standard input flow and output flow is kept in the pair, so that the stability of the system is improved. Meanwhile, F5 and Nginx software and hardware loads are used for solving the problem of large flow statistics, flow cleaning, current limiting, degradation and fusing are performed through Gateway and Sentinel, and meanwhile, rocketMQ is used for performing asynchronous processing, so that flow impact is further weakened, and the processing capacity of hundred million-level flow is achieved.
Illustratively, different models are created according to different services, different fields are divided, and later service splitting is facilitated. The method adopts a plurality of design modes, such as an abstract factory mode, a template mode, an adapter mode and a channel access mode, and can complete the access by writing a small amount of codes.
Fig. 2 is a schematic diagram illustrating the construction of a preset configuration script. 1. The architect makes an overall design plan, and filters, cleans, hardware loads, software loads and traffic systems flow peak clipping are carried out for dealing with large-flow impact, so that the system reliability is ensured, and some current limiting, degrading and fusing strategies are configured. 2. The architect extracts the business system, abstracts a set of general design system, extracts the change part, adopts a template engine and a rule engine to carry out business adaptation, and informs a development engineer to develop according to the requirement. 3. And the development engineer writes the script according to the business requirement interface document and configures the script through the background system. 4. And the business personnel can complete channel access by configuring corresponding channel parameters through a background management system.
The overall process in the above embodiment may be (1) programming the interface of the adaptation channel to convert the channel parameters into a standard input stream and output stream. (2) Network policies, load policies, are configured for channels. (3) Configuring a current limiting strategy, a degrading strategy and a fusing strategy. (4) And configuring relevant channel access information for the channel, and opening a channel switch. The preset configuration script in the embodiment of the method comprises the following steps: has the following effects: (1) the internal core system is more stable, the core functions are protected, and the internal core system cannot be easily changed; (2) the channel access is faster, and the channel can be accessed only by being in the outermost layer through adaptation; (3) the response is faster, the demand response is fast, and the system response is fast; (4) the system is more stable, and the core system can easily cope with large-flow impact. (5) Only a script is required to be written, channel access is completed, development is faster, and the research and development period is greatly reduced.
Step 103, sending the standard input stream to the service system so that the service system can complete the processing of the access data.
Illustratively, after converting the access data into a standard input stream, the standard input stream needs to be transmitted to the service system, so that the service system completes processing and responding to the access request information.
In a preferred embodiment, the standard input stream is sent to the service system so that the service system completes the processing of the access data, and specifically includes:
when the flow of the standard input stream is greater than a preset standard, carrying out peak clipping treatment on the standard input stream; and sending the standard input stream subjected to peak clipping processing to a service system so that the service system can finish processing the access data.
Illustratively, traffic peaking is done by the RocketMQ middleware, which is passed into the underlying system in the business system that processes the data. After the lower system processes the service, the output standard output stream is transmitted into the access layer, and finally converted into parameters needed by the channel through the access layer. As shown in fig. 3, after the access data is subjected to the service system, the access data may be allocated to each specific service cluster. Channel traffic is loaded to the service gateway cluster through the NGINX after entering. And loading the flow again in the gateway cluster, and accessing the service cluster to the channel. And the channel access layer carries out traffic load again and distributes the traffic load to each specific service cluster evenly.
On the basis of the embodiment, when a plurality of access requests are acquired, the RocketMQ is adopted for asynchronous processing so as to weaken flow impact and improve the reliability of a service system.
By setting the service system access method, access request information is obtained, wherein the access request information comprises access identification and access data, the access identification data is used for representing the type of the access data, and the type of the access data can be determined efficiently and accurately so as to select a corresponding preset configuration script; when the access identifier accords with a preset standard in a preset configuration script, converting the access data into a standard input stream according to a conversion protocol in the preset configuration script, and then sending the standard input stream to a service system, wherein the service system already has the follow-up service system to finish the processing of the access data. The method solves the problem that secondary development is not needed when the service system accesses data, and improves the efficiency of data access and conversion.
In the foregoing, for the embodiment of the service system access method provided by the present application, other embodiments of the service system access method provided by the present application are described below, and specific reference is made to the following.
The embodiment of the application provides a service system access method, and particularly referring to fig. 4, the device comprises:
an obtaining module 401, configured to obtain access request information, where the access request information includes an access identifier and access data;
the conversion module 402 is configured to convert the access data into a standard input stream according to a conversion protocol in a preset configuration script when the access identifier meets a preset standard in the preset configuration script;
a processing module 403, configured to send the standard input stream to the service system, so that the service system completes processing the access data.
As an alternative embodiment of the present application, the processing module specifically includes:
the peak clipping module is used for clipping the standard input stream when the flow of the standard input stream is greater than a preset standard;
and the sending module is used for sending the standard input stream subjected to peak clipping processing to the service system so that the service system can finish processing the access data.
As an optional implementation mode of the application, the preset configuration script is set by adopting a rendering technology of a Velocity template engine, a Drools rule engine and a Groovy script engine so that the preset configuration script meets multiple types of access requests.
As an alternative embodiment of the present application, the overall architecture of the service system is onion architecture.
As an alternative implementation mode of the application, when a plurality of access requests are acquired, the RocketMQ is adopted for asynchronous processing so as to weaken flow impact and improve the reliability of a service system.
As an alternative embodiment of the present application, the apparatus further comprises:
after the service system finishes processing the access data, the processed access data is converted into parameters required by the service system.
The functions executed by each component in the service system access device provided in the embodiment of the present application are described in detail in any of the above method embodiments, so that a detailed description is omitted here.
By executing the device, access request information is acquired, wherein the access request information comprises access identification and access data, the access identification data is used for representing the type of the access data, and the type of the access data can be determined efficiently and accurately so as to select a corresponding preset configuration script; when the access identifier accords with a preset standard in a preset configuration script, converting the access data into a standard input stream according to a conversion protocol in the preset configuration script, and then sending the standard input stream to a service system, wherein the service system already has the follow-up service system to finish the processing of the access data. The method solves the problem that secondary development is not needed when the service system accesses data, and improves the efficiency of data access and conversion.
Embodiments of the present application also provide a computer device, as shown in fig. 5, which may include a processor 501 and a memory 502, where the processor 501 and the memory 502 may be connected by a bus or otherwise, and in fig. 5, the connection is exemplified by a bus.
The processor 501 may be a central processing unit (Central Processing Unit, CPU). The processor 501 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or a combination thereof.
The memory 502, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the service system access method in the embodiment of the present application. The processor 501 executes various functional applications of the processor and data processing, i.e. implements the service system access method in the above-described method embodiments, by running non-transitory software programs, instructions, and modules stored in the memory 502.
Memory 502 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created by the processor 501, etc. In addition, memory 502 may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 502 may optionally include memory located remotely from processor 501, which may be connected to processor 501 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more modules are stored in memory 502 that, when executed by processor 501, perform the business system access method of the embodiment shown in fig. 1.
The details of the above computer device may be understood correspondingly with respect to the corresponding relevant descriptions and effects in the embodiment shown in fig. 1, which are not repeated here.
It will be appreciated by those skilled in the art that implementing all or part of the above-described embodiment method may be implemented by a computer program to instruct related hardware, and the program may be stored in a computer readable storage medium, and the program may include the above-described embodiment method when executed. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a Flash Memory (Flash Memory), a Hard Disk (HDD), or a Solid State Drive (SSD); the storage medium may also comprise a combination of memories of the kind described above.
Although embodiments of the present application have been described in connection with the accompanying drawings, various modifications and variations may be made by those skilled in the art without departing from the spirit and scope of the application, and such modifications and variations are within the scope of the application as defined by the appended claims.

Claims (10)

1. A method for accessing a service system, the method comprising:
acquiring access request information, wherein the access request information comprises an access identifier and access data;
when the access identifier meets preset standards in a preset configuration script, converting the access data into a standard input stream according to a conversion protocol in the preset configuration script;
and sending the standard input stream to a service system so that the service system can finish processing the access data.
2. The method according to claim 1, wherein said sending said standard input stream to a service system for said service system to complete processing of said access data, comprises:
when the flow of the standard input stream is greater than a preset standard, carrying out peak clipping treatment on the standard input stream;
and sending the standard input stream subjected to peak clipping processing to the service system so that the service system finishes processing the access data.
3. The method of claim 1, wherein the preset configuration script is set using a Velocity template engine rendering technique, a Drools rule engine, and a Groovy script engine, such that the preset configuration script satisfies multiple types of access requests.
4. The method of claim 1, wherein the overall architecture of the business system is an onion architecture.
5. The method according to any of claims 1-4, characterized in that when multiple access requests are acquired, a asynchronization process is performed with a dockmq in order to attenuate traffic shocks and improve the reliability of the service system.
6. The method according to any one of claims 1-4, further comprising:
after the service system finishes processing the access data, the processed access data is converted into parameters required by the service system.
7. A service system access apparatus, the apparatus comprising:
the access request module is used for acquiring access request information, wherein the access request information comprises an access identifier and access data;
the conversion module is used for converting the access data into a standard input stream according to a conversion protocol in a preset configuration script when the access identifier meets the preset standard in the preset configuration script;
and the processing module is used for sending the standard input stream to a service system so that the service system can complete the processing of the access data.
8. The device according to claim 7, characterized in that said processing module comprises in particular:
the peak clipping module is used for clipping the standard input stream when the flow rate of the standard input stream is greater than a preset standard;
and the sending module is used for sending the standard input stream subjected to peak clipping processing to the service system so that the service system finishes processing the access data.
9. A controller, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the business system access method of any of claims 1-6.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed by a terminal device, implements the service system access method according to any of claims 1-6.
CN202310718264.XA 2023-06-16 2023-06-16 Service system access method and device and computer equipment Pending CN116841654A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310718264.XA CN116841654A (en) 2023-06-16 2023-06-16 Service system access method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310718264.XA CN116841654A (en) 2023-06-16 2023-06-16 Service system access method and device and computer equipment

Publications (1)

Publication Number Publication Date
CN116841654A true CN116841654A (en) 2023-10-03

Family

ID=88162706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310718264.XA Pending CN116841654A (en) 2023-06-16 2023-06-16 Service system access method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN116841654A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246188A (en) * 2018-08-03 2019-01-18 银联数据服务有限公司 A method of supporting the system traded by all kinds of means and by all kinds of means trading processing
CN113849562A (en) * 2021-09-16 2021-12-28 支付宝(杭州)信息技术有限公司 Method and device for accessing external service system
CN114553669A (en) * 2022-02-17 2022-05-27 支付宝(杭州)信息技术有限公司 Method, device and equipment for identifying change event
CN115082185A (en) * 2022-06-16 2022-09-20 平安付科技服务有限公司 Method, device, equipment and medium for channel fast access loan service system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246188A (en) * 2018-08-03 2019-01-18 银联数据服务有限公司 A method of supporting the system traded by all kinds of means and by all kinds of means trading processing
CN113849562A (en) * 2021-09-16 2021-12-28 支付宝(杭州)信息技术有限公司 Method and device for accessing external service system
CN114553669A (en) * 2022-02-17 2022-05-27 支付宝(杭州)信息技术有限公司 Method, device and equipment for identifying change event
CN115082185A (en) * 2022-06-16 2022-09-20 平安付科技服务有限公司 Method, device, equipment and medium for channel fast access loan service system

Similar Documents

Publication Publication Date Title
US20150281002A1 (en) Universal support system for internet of things
US10666511B1 (en) Internet service provider management platform
WO2019118903A1 (en) Distributed ledger system for management and implementation of exchanges of wireless services between wireless service providers
CN110602252B (en) Block chain enhanced open Internet of things access architecture
CN101783795A (en) Security level authentication method and system
CN111885172A (en) Cross-network platform cascading method, computer storage medium and electronic device
CN111369337B (en) Block chain-based trust air control system, method, equipment and medium
CN109766217A (en) A kind of vehicle system fault repairing method and device
CN112671936B (en) Special transmission module adapting method and device for different domestic systems
CN102523236B (en) Method and equipment for establishing dynamic connection
CN102355650B (en) A kind of method for processing business and system
CN115934303A (en) Shared operation method and shared operation device
CN116841654A (en) Service system access method and device and computer equipment
WO2020114310A1 (en) Method, network node and network for recording and providing data,
CN113364820A (en) Equipment control method and device of Internet of things service system
CN110096543A (en) Data manipulation method, device, server and the medium of application program
CN106452815A (en) Informatization management method, device and system
CN106936615A (en) A kind of message processing method and device
CN113590575A (en) Service integration sharing-based method, device, terminal and storage medium
CN109756702B (en) Integration method, gateway and system of closed circuit television system
KR20210111202A (en) Self lubricator system based on billing stand-alone, and method thereof
CN116962170A (en) Management method of open interface, electronic device and storage medium
KR102436385B1 (en) System for terminal access based beacon using protocol for Internet of Things, Method thereof, and Compueter readable storage medium having the same
US11799859B2 (en) Automated authorization policy creation for interrelated services
CN108848156A (en) access gateway processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination