CN106487925A - Service access control method and service access control system - Google Patents

Service access control method and service access control system Download PDF

Info

Publication number
CN106487925A
CN106487925A CN201611074473.1A CN201611074473A CN106487925A CN 106487925 A CN106487925 A CN 106487925A CN 201611074473 A CN201611074473 A CN 201611074473A CN 106487925 A CN106487925 A CN 106487925A
Authority
CN
China
Prior art keywords
service
request
resource
resource limit
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611074473.1A
Other languages
Chinese (zh)
Inventor
丁贤明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yonyou Network Technology Co Ltd
Original Assignee
Yonyou Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yonyou Network Technology Co Ltd filed Critical Yonyou Network Technology Co Ltd
Priority to CN201611074473.1A priority Critical patent/CN106487925A/en
Publication of CN106487925A publication Critical patent/CN106487925A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a kind of service access control method and service access control system.Wherein, service access control method, including:To service customization resource limit strategy;Receive and process long-range service request;Receive service invocation request, and judge whether the corresponding current service of service invocation request exceeds resource limit;When current service exceeds resource limit, according to the treatment mechanism being pre-configured with, service request is processed.The service access control method that the present invention provides, is directly processed to service request it is ensured that the stable operation of key service, so that resource allocation is more reasonable, is realized the maximization to the utilization of resources for the enterprise, improved the experience of user in enterprise application system.Further, service request is directly processed, mitigate the pressure of system operation, improve the reliability of system operation.Further it is not necessary to increase server resource, reduce operation cost of enterprises, mitigate the pressure of system maintenance.

Description

Service access control method and service access control system
Technical field
The present invention relates to service access control technology field, in particular to a kind of service access control method kimonos Business access control system.
Background technology
With the popularization of IT application in enterprises, the combination of business information services system (i.e. ERP system) and enterprise production process More and more tightr.Different from internet, applications, the complexity of enterprise's application is higher, and operation flow is more complicated, in particular, in industry Business peak period, such as enterprise's accounting period the end of month, a large amount of service such as enterprise report or settlement operations all can be concentrated within this period Carry out, cause serious system pressure, and this period is often to affect the critical period that user experiences to ERP system, this when The system stable operation of phase is often the key of an Enterprise Informatization system Project Success.Therefore, how in the peak traffic phase The stable operation of key business in guarantee system, coordinates hardware resource Priority Service effectively in the crucial industry of impact enterprise operation Business, becomes a key point of company ERP system stable operation.
For the mode improving systematic function, now more common way is to increase resource, such as extends cluster scale, Improve the hardware configuration of server, using better service device resource.But it is to increase resource and can bring two aspect problems:One side Face, increases the operation cost of business system, and the increase of system scale, and the input of a large amount of servers, for the operation of system Management also can propose higher requirement;On the other hand, if system scale and hardware configuration are according to peak traffic phase Scaledeployment, Substantial amounts of fund and the wasting of resources can be caused in non-traffic peak period.
Enterprise the utilization of resource is all pursued always rationally, efficiently, maximize, particularly with medium-sized and small enterprises, for money With greater need for thinking over, therefore, increase server resource is simultaneously inadvisable for the distribution in source, in the construction of Enterprise Informatization system, Need more effective resource distribution mode badly to alleviate this present situation, allow enterprise can ensure the steady of key business in the peak traffic phase Fixed execution, allows existing resource farthest play its maximum performance, and does not increase operation cost and the system maintenance of enterprise Pressure.
Content of the invention
It is contemplated that at least solving one of technical problem present in prior art or correlation technique.
For this reason, it is an object of the present invention to proposing a kind of service access control method.
Further object is that proposing a kind of service access control system.
In view of this, the present invention proposes a kind of service access control method, including:To service customization resource limit plan Slightly;Receive and process long-range service request;Receive service invocation request, and judge the corresponding current service of service invocation request Whether exceed resource limit;When current service exceeds resource limit, according to the treatment mechanism being pre-configured with, service request is entered Row is processed.
The service access control method that the present invention provides, remote by service customization resource limit strategy, receiving and processing The service request of journey, then receive service invocation request, and judge whether the corresponding current service of service invocation request exceeds resource Limit, when current service exceeds resource limit, according to the treatment mechanism being pre-configured with, service request directly processed, Avoid some non-key and the big service of resource occupation takies substantial amounts of system resource in the peak traffic phase, and then ensure enterprise In application system, the stable operation of key service is so that resource allocation more rationally, effectively, realizes enterprise to the utilization of resources Bigization, improves the experience of user.Further, service request is directly processed, mitigates the pressure of system operation, Improve the reliability of system operation.Further it is not necessary to increase hardware server resource it is possible to realize enterprise application system The stable execution of middle key service, reduces operation cost of enterprises, mitigates the pressure of system maintenance, it is to avoid the money of non-traffic peak period Source wastes.
According to the above-mentioned service access control method of the present invention, can also have the technical characteristic adding as follows:
It is preferable that the occupation condition of real-time detection server in technique scheme, corresponding in resource occupation When data reaches predetermined threshold value, send prompting;Receive the instruction that the resource occupation to service carries out Configuration Online, the money to service Source takies and carries out Configuration Online.
In this technical scheme, by the occupation condition of real-time detection server, in the corresponding data of resource occupation When reaching predetermined threshold value, send prompting, remind the resource occupation of some services of enterprise's operation maintenance personnel to reach the upper limit in time, and receive The instruction of Configuration Online is carried out to the resource occupation of service, Configuration Online is carried out to the resource occupation of service, realizes in real time to non- Key service is made and more accurately being limited, and the preferential stable execution ensureing key service in enterprise application system is so that crucial take The resource allocation of business much sooner, effectively, improves the experience of user.Further it is not necessary to increase hardware server Resource, it is possible to realize the stable execution of key service in enterprise application system, reduces operation cost of enterprises, mitigates system maintenance Pressure, it is to avoid the wasting of resources of non-traffic peak period.
It is preferable that being classified to service according to the significance level of service in technique scheme, it is divided into superfine clothes Business, one-level service, secondary service, three-level service.
In this technical scheme, by being classified to service according to the significance level of service, it is divided into premium service, one-level Service, secondary service, three-level service, realize the resource limit strategy of the service customization different stage of different stage.Wherein, will take Business is classified as premium service, and directly premium service is done with particularly customized resource limit strategy, accounts for when needing the resource to servicing During with carrying out Configuration Online, can be realized more precisely, in time, effectively with the occupation condition of certain specific service of on-line tuning Ground is controlled to the resource occupation of system service.
It is preferable that judging the corresponding current service of service invocation request whether beyond resource limit in technique scheme The step of system, specifically includes:Judge whether current service has resource limit;When current service has resource limit, take to current The resource occupation of business is counted and is calculated, and according to the resource limit strategy that current service is customized, whether judges current service Beyond resource limit.
In this technical scheme, by judging whether current service has resource limit, when current service has resource limit, The resource occupation of current service is counted and is calculated, according to the resource limit strategy that current service is customized, judged current Whether service exceeds resource limit, judges that speed is fast, realizes judging whether current service exceeds resource limit, Jin Ershi in time The now resource occupation of control system service effectively.
In technique scheme it is preferable that when current service does not have resource limit, receive and allow to access company information The instruction of the current service of service system;And allow to access current service.
In this technical scheme, when current service does not have resource limit, illustrate that current service is key service, by connecing Receive the instruction allowing the current service accessing business information services system it is allowed to access current service, realize successfully accessing enterprise The current service of industry information service system, and then realize the stable execution of the key service of business information services system, improve The experience of user.
In technique scheme it is preferable that after current service is without departing from resource limit, receive and allow to access enterprise's letter The instruction of the current service of breath service system;And allow to access current service.
In this technical scheme, after current service is without departing from resource limit, illustrate that current service does not result in system fortune Row pressure increases, by receiving the instruction allowing the current service accessing business information services system it is allowed to access current service, Realize successfully accessing the current service of business information services system, and then realize the key service of business information services system Stable execution, improves the experience of user.
In technique scheme it is preferable that after judging that current service exceeds resource limit, according to the place being pre-configured with Reason mechanism, the step that service request is processed, specifically include:To service request denied access, and send information;Or Person provides queuing mechanism to service request.
In this technical scheme, after judging that current service exceeds resource limit, by service request denied access, and Send information, remind user's denied access current service in time, and then facilitate user's reasonable arrangement working time;Or it is logical Cross and provide queuing mechanism to service request, realize service request is continued with.
It is preferable that the step providing queuing mechanism to service request in technique scheme, specifically include:Judgement is No service request is ranked;If ranking to service request, continue service request is processed;If not to service Request is ranked, and sends prompting.
In this technical scheme, by judging whether service request is ranked, if ranking to service request, Continue service request is processed, realize service request and continued with an orderly manner, if not ranking to service request, Send prompting, point out user to without waiting for service request in time and continue to be processed.
The present invention also proposes a kind of service access control system, including:Service Source Configuration Online module, for service Customization resource limit strategy;Service request handling module, for receiving and processing long-range service request;Service Source analysis system Meter module, for receiving service invocation request, and judges whether the corresponding current service of service invocation request exceeds resource limit; Service post-processing module, for when current service exceeds resource limit, according to the treatment mechanism being pre-configured with, to service request Processed.
The service access control system that the present invention provides, by Service Source Configuration Online module, to service customization resource Restriction strategy, by service request handling module, receives and processes long-range service request, by Service Source analytic statisticss mould Block, receives service invocation request, and judges whether the corresponding current service of service invocation request exceeds resource limit, by service Post-processing module, when current service exceeds resource limit, according to the treatment mechanism being pre-configured with, is directly carried out to service request Process, it is to avoid some non-key and big services of resource occupation take substantial amounts of system resource in the peak traffic phase, and then ensure In enterprise application system, the stable operation of key service is so that resource allocation more rationally, effectively, realizes enterprise to the utilization of resources Maximization, improve the experience of user.Further, service request is directly processed, mitigate system operation Pressure, improves the reliability of system operation.Further answer it is not necessary to increase hardware server resource it is possible to realize enterprise With the stable execution of key service in system, reduce operation cost of enterprises, mitigate the pressure of system maintenance, it is to avoid non-traffic peak The wasting of resources of phase.
According to the above-mentioned service access control system of the present invention, can also have the technical characteristic adding as follows:
It is preferable that Service Source monitoring module in technique scheme, for the resource occupation of real-time detection server Situation, when the corresponding data of resource occupation reaches predetermined threshold value, sends prompting;Service Source Configuration Online module, is additionally operable to Receive the instruction that the resource occupation to server carries out Configuration Online, Configuration Online is carried out to the resource occupation of server.
In this technical scheme, by Service Source monitoring module, the occupation condition of real-time detection server, in money When the source corresponding data of occupancy reaches predetermined threshold value, send prompting, remind the resource of some services of enterprise's operation maintenance personnel to account in time With reaching the upper limit, and pass through Service Source Configuration Online module, receive the instruction that the resource occupation to service carries out Configuration Online, Configuration Online is carried out to the resource occupation of service, realizes in real time non-critical services being made more accurately limiting, preferential guarantee enterprise In industry application system, the stable execution of key service is so that the resource allocation of key service much sooner, effectively, improves user Experience.Further it is not necessary to increase hardware server resource it is possible to realize key service in enterprise application system Stable execution, reduce operation cost of enterprises, mitigate system maintenance pressure, it is to avoid the wasting of resources of non-traffic peak period.
It is preferable that Service Source Configuration Online module in technique scheme, specifically for:Important according to service Degree is classified to service, is divided into premium service, one-level service, secondary service, three-level service.
In this technical scheme, by Service Source Configuration Online module, according to the significance level of service, service is carried out Classification, is divided into premium service, one-level service, secondary service, three-level service, realizes the service customization different stage of different stage Resource limit strategy.Wherein, service hierarchies are premium service, directly premium service is done with particularly customized resource limit plan Slightly, when needing to carry out Configuration Online to the resource occupation of service, can be with the resource occupation feelings of certain specific service of on-line tuning Condition, realizes more precisely, in time, effectively the resource occupation of system service is controlled.
It is preferable that Service Source analytic statisticss module in technique scheme, specifically for:Judge that current service is No have resource limit;When current service does not have resource limit, send the current service allowing to access business information services system Service request to service request handling module;When current service has resource limit, the resource occupation of current service is carried out Statistics and calculating, according to the resource limit strategy to current service customization in Service Source Configuration Online module, judge current clothes Whether business exceeds resource limit;When judging current service without departing from resource limit, send and allow to access business information services system The service request of the current service of system is to service request handling module.
In this technical scheme, by Service Source analytic statisticss module, judge whether current service has resource limit, When current service has resource limit, the resource occupation of current service is counted and is calculated, according to customize to current service Resource limit strategy, judges whether current service exceeds resource limit, judges that speed is fast, realizes judging that current service is in time No beyond resource limit, and then realize efficiently controlling the resource occupation of system service.
Further, when current service does not have resource limit, illustrate that current service is key service, allowed by sending Access business information services system current service service request to service request handling module it is allowed to access current service, Realize successfully accessing the current service of business information services system, and then realize the key service of business information services system Stable execution, improves the experience of user.
Further, when current service is without departing from resource limit, illustrate that current service does not result in system running pressure Increase, by sending the service request allowing the current service accessing business information services system to service request handling module, Allow to access current service, realize successfully accessing the current service of business information services system, and then realize company information clothes The stable execution of the key service of business system, improves the experience of user.
In technique scheme it is preferable that service post-processing module specifically for:To service request denied access, and Send information to service request handling module;Or provide queuing mechanism to service request.
In this technical scheme, when judging that current service exceeds resource limit, by servicing post-processing module, to service Request denied access, and send information, remind user's denied access current service in time, and then facilitate user's reasonable arrangement Working time;Or by servicing post-processing module, provide queuing mechanism to service request, realize to the continuation of service request Reason.
It is preferable that the step providing queuing mechanism to service request specifically includes in technique scheme:If to service Request is ranked, then continue service request is processed;If not ranking to service request, send prompting.
In this technical scheme, by judging whether service request is ranked, if ranking to service request, Continue service request is processed, realize service request and continued with an orderly manner, if not ranking to service request, Send prompting, point out user to without waiting for service request in time and continue to be processed.
The additional aspect of the present invention and advantage will become obvious in following description section, or by the practice of the present invention Recognize.
Brief description
The above-mentioned and/or additional aspect of the present invention and advantage will become from reference to the description to embodiment for the accompanying drawings below Substantially and easy to understand, wherein:
Fig. 1 be one embodiment of the present of invention service access control method schematic flow sheet;
Fig. 2 is the schematic flow sheet of the service access control method of yet another embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the service access control method of another embodiment of the present invention;
Fig. 4 is the schematic flow sheet of the service access control method of another embodiment of the present invention;
Fig. 5 is the schematic flow sheet of the service access control method of an alternative embodiment of the invention;
Fig. 6 is the schematic diagram of the service access control system of one embodiment of the present of invention;
Fig. 7 is the schematic diagram of the service access control system of yet another embodiment of the present invention;
Fig. 8 is that the service access control system of one embodiment of the present of invention carries out processing far with business information services system The schematic diagram of the service request of journey;
Fig. 9 be one embodiment of the present of invention system operation maintenance personnel carry out Configuration Online after, check out at the end of month in enterprise Peak period conducts interviews the schematic flow sheet of report query operation in business information services system.
Specific embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specifically real Mode of applying is further described in detail to the present invention.It should be noted that in the case of not conflicting, the enforcement of the application Feature in example and embodiment can be mutually combined.
Elaborate a lot of details in the following description in order to fully understand the present invention, but, the present invention also may be used To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not limited to following public affairs The restriction of the specific embodiment opened.
As shown in figure 1, the schematic flow sheet of the service access control method of one embodiment of the present of invention:
Step 102, to service customization resource limit strategy;
Step 104, receives and processes long-range service request;
Step 106, receives service invocation request, and judges whether the corresponding current service of service invocation request exceeds resource Limit;When current service exceeds resource limit, enter step 108;
Step 108, according to the treatment mechanism being pre-configured with, is processed to service request.
The service access control method that the present invention provides, remote by service customization resource limit strategy, receiving and processing The service request of journey, then receive service invocation request, and judge whether the corresponding current service of service invocation request exceeds resource Limit, when current service exceeds resource limit, according to the treatment mechanism being pre-configured with, service request directly processed, Avoid some non-key and the big service of resource occupation takies substantial amounts of system resource in the peak traffic phase, and then ensure enterprise In application system, the stable operation of key service is so that resource allocation more rationally, effectively, realizes enterprise to the utilization of resources Bigization, improves the experience of user.Further, service request is directly processed, mitigates the pressure of system operation, Improve the reliability of system operation.Further it is not necessary to increase hardware server resource it is possible to realize enterprise application system The stable execution of middle key service, reduces operation cost of enterprises, mitigates the pressure of system maintenance, it is to avoid the money of non-traffic peak period Source wastes.
As shown in Fig. 2 the schematic flow sheet of the service access control method of yet another embodiment of the present invention:
Step 202, to service customization resource limit strategy;
Step 204, receives and processes long-range service request;
Step 206, receives service invocation request, and judges whether the corresponding current service of service invocation request exceeds resource Limit;When current service exceeds resource limit, enter step 208;
Step 208, according to the treatment mechanism being pre-configured with, is processed to service request;
Step 210, the occupation condition of real-time detection server, reach predetermined threshold value in the corresponding data of resource occupation When, send prompting;And
Step 212, receives the instruction that the resource occupation to service carries out Configuration Online, and the resource occupation of service is carried out Line configures.
In this embodiment, by the occupation condition of real-time detection server, reach in the corresponding data of resource occupation During to predetermined threshold value, send prompting, remind in time the resource occupation of some services of enterprise's operation maintenance personnel to reach the upper limit, and receive right The resource occupation of service carries out the instruction of Configuration Online, carries out Configuration Online to the resource occupation of service, realizes in real time to non-pass Key service is made and more accurately being limited, and the preferential stable execution ensureing key service in enterprise application system is so that key service Resource allocation much sooner, effectively, improve the experience of user.Further it is not necessary to increase hardware server money Source, it is possible to realize the stable execution of key service in enterprise application system, reduces operation cost of enterprises, mitigates system maintenance Pressure, it is to avoid the wasting of resources of non-traffic peak period.
In specific embodiment, after the corresponding data of resource occupation reaches predetermined threshold value, send prompting, can take and one be The Forewarning Measures of row, such as report to the police or automatic transmission mail informing system operation maintenance personnel, system operation maintenance personnel is according to pressure report Announcement or the judgement of skilled addressee, carry out Configuration Online to the resource occupation of service.It is possible to further by system O&M According to actual situation, the concurrent visit capacity of the non-key business service of On-line Control, is limited to non-critical services to personnel in time Resources allocation.
In one embodiment of the invention it is preferable that being classified to service according to the significance level of service, it is divided into spy Level service, one-level service, secondary service, three-level service.
In this embodiment, by being classified to service according to the significance level of service, it is divided into premium service, one-level clothes Business, secondary service, three-level service, realize the resource limit strategy of the service customization different stage of different stage.Wherein, will service It is classified as premium service, directly premium service is done with particularly customized resource limit strategy, when the resource occupation to service for the needs When carrying out Configuration Online, can be realized more precisely, in time, effectively with the occupation condition of certain specific service of on-line tuning The resource occupation of system service is controlled.
In specific embodiment, system operation maintenance personnel can be divided into premium service, one-level service, two grades of clothes different services Business, three-level service, and more stages other N level service, the value of N is the integer more than 3, realizes different stage corresponding not Same resource limit strategy.Wherein, operation maintenance personnel directly does particularly customized resource limit strategy, on-line tuning to premium service The occupation condition of certain specific service, this adjustment comes into force in time so that operation maintenance personnel can more be accurately controlled system clothes The resource occupation of business.
As shown in figure 3, the schematic flow sheet of the service access control method of another embodiment of the present invention:
Step 302, to service customization resource limit strategy;
Step 304, receives and processes long-range service request;
Step 306, receives service invocation request, and judges whether current service has resource limit;In described current service When having resource limit, enter step 308;
Step 308, is counted to the resource occupation of current service and is calculated, according to the resource limit that current service is customized System strategy, judges whether current service exceeds resource limit;When current service exceeds resource limit, enter step 310;
Step 310, according to the treatment mechanism being pre-configured with, is processed to service request;
Step 312, the occupation condition of real-time detection server, reach predetermined threshold value in the corresponding data of resource occupation When, send prompting;And
Step 314, receives the instruction that the resource occupation to service carries out Configuration Online, and the resource occupation of service is carried out Line configures.
In this embodiment, by judging whether current service has resource limit, when current service has resource limit, right The resource occupation of current service is counted and is calculated, and according to the resource limit strategy that current service is customized, judges current clothes Whether business exceeds resource limit, judges that speed is fast, realizes judging whether current service exceeds resource limit in time, and then realizes Efficiently control the resource occupation of system service.
As shown in figure 3, the schematic flow sheet of the service access control method of another embodiment of the present invention:
Step 302, to service customization resource limit strategy;
Step 304, receives and processes long-range service request;
Step 306, receives service invocation request, and judges whether current service has resource limit;There is money in current service When source limits, enter step 308;When current service does not have resource limit, enter step 316;
Step 308, is counted to the resource occupation of current service and is calculated, according to the resource limit that current service is customized System strategy, judges whether current service exceeds resource limit;When current service exceeds resource limit, enter step 310;
Step 310, according to the treatment mechanism being pre-configured with, is processed to service request;
Step 312, the occupation condition of real-time detection server, reach predetermined threshold value in the corresponding data of resource occupation When, send prompting;
Step 314, receives the instruction that the resource occupation to service carries out Configuration Online, and the resource occupation of service is carried out Line configures;
Step 316, receives the instruction allowing the current service accessing business information services system;And allow to access currently Service.
In this embodiment, when current service does not have resource limit, illustrate that current service is key service, by receiving Allow to access the instruction of the current service of business information services system it is allowed to access current service, realize successfully accessing enterprise The current service of information service system, and then realize the stable execution of the key service of business information services system, improve use The experience at family.
As shown in figure 3, the schematic flow sheet of the service access control method of another embodiment of the present invention:
Step 302, to service customization resource limit strategy;
Step 304, receives and processes long-range service request;
Step 306, receives service invocation request, and judges whether current service has resource limit;There is money in current service When source limits, enter step 308;When current service does not have resource limit, enter step 316;In current service without departing from money When source limits, enter step 316;
Step 308, is counted to the resource occupation of current service and is calculated, according to the resource limit that current service is customized System strategy, judges whether current service exceeds resource limit;When current service exceeds resource limit, enter step 310;
Step 310, according to the treatment mechanism being pre-configured with, is processed to service request;
Step 312, the occupation condition of real-time detection server, reach predetermined threshold value in the corresponding data of resource occupation When, send prompting;
Step 314, receives the instruction that the resource occupation to service carries out Configuration Online, and the resource occupation of service is carried out Line configures;And
Step 316, receives the service request allowing the current service accessing business information services system;And allow to access Current service.
In this embodiment, when current service is without departing from resource limit, illustrate that current service does not result in system operation Pressure increases, by receiving the instruction allowing the current service accessing business information services system it is allowed to access current service, real Now successfully access business information services system current service, and then realize business information services system key service steady Fixed execution, improves the experience of user.
In one embodiment of the invention it is preferable that when judging that current service exceeds resource limit, according to joining in advance The treatment mechanism put, the step that service request is processed, specifically include:To service request denied access, and send prompting Information;Or provide queuing mechanism to service request.
In this embodiment, when judging that current service exceeds resource limit, by service request denied access, concurrently Send information, remind user's denied access current service in time, and then facilitate user's reasonable arrangement working time;Or pass through There is provided queuing mechanism to service request, realize service request is continued with.
In one embodiment of the invention it is preferable that the step providing queuing mechanism to service request, specifically include: Judge whether service request is ranked;If ranking to service request, continue service request is processed;If no Service request is ranked, sends prompting.
In this embodiment, by judging whether service request is ranked, if ranking to service request, continue Continuing and service request is processed, realize service request and continued with an orderly manner, if not ranking to service request, sending out Go out prompting, point out user to without waiting for service request in time and continue to be processed.
In specific embodiment, if ranking to service request, queue and timeout mechanism being provided, waits for a period of time Afterwards, if resource is released, this service request continues to be processed.If do not ranked to service request, provide prompting, and Can be processed according to abnormal conditions.
As shown in figure 4, the schematic flow sheet of the service access control method of another embodiment of the present invention:
Step 402, to service customization resource limit strategy;
Step 404, receives and processes long-range service request;
Step 406, receives service invocation request, and judges whether current service has resource limit;There is money in current service When source limits, enter step 408;When current service does not have resource limit, enter step 414;In current service without departing from money When source limits, enter step 414;
Step 408, is counted to the resource occupation of current service and is calculated, according to the resource limit that current service is customized System strategy, judges whether current service exceeds resource limit;When current service exceeds resource limit, enter step 410;
Step 410, judges whether service request is ranked;If ranking to service request, return to step 404;If not ranking to service request, enter step 412;
Step 414, receives the service request allowing the current service accessing business information services system;And allow to access Current service.
In this embodiment, by judging whether service request is ranked, if ranking to service request, continue Continuing and service request is processed, realize service request and continued with an orderly manner, if not ranking to service request, sending out Go out prompting, point out user to without waiting for service request in time and continue to be processed.
In specific embodiment, if ranking to service request, queue and timeout mechanism being provided, waits for a period of time Afterwards, if resource is released, this service request continues to be processed.If do not ranked to service request, provide prompting, or Person can be processed according to abnormal conditions.
As shown in figure 5, the schematic flow sheet of the service access control method of an alternative embodiment of the invention:
Step 502, receives service request;
Step 504, receiving data;
Step 506, calls service request handling module;
Step 508, calls Service Source analytic statisticss module;
Step 510, judges whether current service has resource limit;When current service has resource limit, enter step 512;When current service does not have resource limit, enter step 524;
Step 512, obtains the resource occupation configuration of server;
Step 514, the resource that statistics current service takies in systems;
Step 516, judges whether current service exceeds resource limit;When current service exceeds resource limit, enter step Rapid 518;When current service is without departing from resource limit, enter step 524;
Step 518, calls service post-processing module;
Step 520, judges whether service request is ranked;If ranking to service request, return to step 506; If not ranking to service request, enter step 522;
Step 522, sends prompting or can be processed according to abnormal conditions;
Step 524 is it is allowed to access the current service of business information services system.
In this embodiment, by receiving service request receiving data, call service request handling module, recall clothes Business resource analysis statistical module, judges whether current service has resource limit, and current service has resource limit, obtains server Resource occupation configures, the resource taking in systems through statistics current service, judges whether current service exceeds resource limit, If current service exceeds resource limit, call service post-processing module, judge whether service request is ranked, if to service Request is ranked, then continue service request is processed, and realizes service request and is continued with an orderly manner, if not to clothes Business request is ranked, and sends prompting or can be processed according to abnormal conditions, and prompting user withouts waiting for taking in time Business request continues to be processed, by directly processing to service request, it is to avoid some non-key and big services of resource occupation The peak traffic phase take substantial amounts of system resource, and then ensure enterprise application system in key service stable operation so that Resource allocation more rationally, effectively, is realized the maximization to the utilization of resources for the enterprise, is improved the experience of user.Further Ground, is directly processed to service request, mitigates the pressure of system operation, improves the reliability of system operation.Further, no Need to increase hardware server resource it is possible to realize the stable execution of key service in enterprise application system, reduce enterprise's fortune Battalion's cost, mitigates the pressure of system maintenance, it is to avoid the wasting of resources of non-traffic peak period.
Further, when current service does not have resource limit, illustrate that current service is key service, by allowing to access The current service of business information services system, realizes successfully accessing the current service of business information services system, and then realizes The stable execution of the key service of business information services system, improves the experience of user.
Further, when current service is without departing from resource limit, illustrate that current service does not result in system running pressure Increase, realize successfully accessing working as of business information services system by allowing the current service accessing business information services system Front service, and then realize the stable execution of the key service of business information services system, improve the experience of user.
In specific embodiment, if ranking to service request, queue and timeout mechanism being provided, waits for a period of time Afterwards, if resource is released, this service request continues to be processed.If do not ranked to service request, provide prompting, or Person can be processed according to abnormal conditions.
As shown in fig. 6, the schematic diagram of the service access control system 600 of one embodiment of the present of invention:
Service Source Configuration Online module 602, for service customization resource limit strategy;
Service request handling module 604, for receiving and processing long-range service request;
Service Source analytic statisticss module 606, for receiving service invocation request, and judges that service invocation request is corresponding Whether current service exceeds resource limit;
Service post-processing module 608, for after current service exceeds resource limit, according to the datatron being pre-configured with System, is processed to service request.
The service access control system 600 that the present invention provides, by Service Source Configuration Online module 602, fixed to service Resource limit strategy processed, by service request handling module 604, receives and processes long-range service request, by Service Source Analytic statisticss module 606, receives service invocation request, and judges whether the corresponding current service of service invocation request exceeds resource Limit, by servicing post-processing module 608, after current service exceeds resource limit, according to the treatment mechanism being pre-configured with, right Service request is directly processed, it is to avoid some non-key and big services of resource occupation take substantial amounts of in the peak traffic phase System resource, and then ensure the stable operation of key service in enterprise application system so that resource allocation is more reasonable, effective, Realize the maximization to the utilization of resources for the enterprise, improve the experience of user.Further, service request is directly located Reason, mitigates the pressure of system operation, improves the reliability of system operation.Further it is not necessary to increase hardware server resource, The stable execution of key service in enterprise application system just can be realized, reduce operation cost of enterprises, mitigate the pressure of system maintenance Power, it is to avoid the wasting of resources of non-traffic peak period.
As shown in fig. 7, the schematic diagram of the service access control system 700 of yet another embodiment of the present invention:
Service Source Configuration Online module 702, for service customization resource limit strategy;
Service request handling module 704, for receiving and processing long-range service request;
Service Source analytic statisticss module 706, for receiving service invocation request, and judges that service invocation request is corresponding Whether current service exceeds resource limit;
Service post-processing module 708, for after current service exceeds resource limit, according to the datatron being pre-configured with System, is processed to service request;
Service Source monitoring module 710, for the occupation condition of real-time detection server, corresponding in resource occupation When data reaches predetermined threshold value, send prompting;And
Service Source Configuration Online module 702, is additionally operable to receive the finger that the resource occupation to server carries out Configuration Online Order, carries out Configuration Online to the resource occupation of server.
In this embodiment, by Service Source monitoring module 710, the occupation condition of real-time detection server, When the corresponding data of resource occupation reaches predetermined threshold value, send prompting, remind the resource of some services of enterprise's operation maintenance personnel in time Occupancy reaches the upper limit, and passes through Service Source Configuration Online module 702, receives the resource occupation to service and carries out Configuration Online Instruction, carries out Configuration Online to the resource occupation of service, realizes in real time non-critical services being made more accurately limiting, preferential guarantor In card enterprise application system, the stable execution of key service is so that the resource allocation of key service much sooner, effectively, improves The experience of user.Further it is not necessary to increase hardware server resource it is possible to realize crucial in enterprise application system The stable execution of service, reduces operation cost of enterprises, mitigates the pressure of system maintenance, it is to avoid the resource wave of non-traffic peak period Take.
In specific embodiment, after the corresponding data of resource occupation reaches predetermined threshold value, send prompting, can take and one be The Forewarning Measures of row, such as report to the police or automatic transmission mail informing system operation maintenance personnel, system operation maintenance personnel is according to pressure report Announcement or the judgement of skilled addressee, carry out Configuration Online to the resource occupation of service.It is possible to further by system O&M According to actual situation, the concurrent visit capacity of the non-key business service of On-line Control, is limited to non-critical services to personnel in time Resources allocation.
In one embodiment of the invention it is preferable that Service Source Configuration Online module, specifically for:According to service Significance level service is classified, be divided into premium service, one-level service, secondary service, three-level service.
In this embodiment, by Service Source Configuration Online module, service is carried out point according to the significance level of service Level, is divided into premium service, one-level service, secondary service, three-level service, realizes the money of the service customization different stage of different stage Source restriction strategy.Wherein, service hierarchies are premium service, directly premium service are done with particularly customized resource limit strategy, When need to service resource occupation carry out Configuration Online when, can with the occupation condition of certain specific service of on-line tuning, Realize more precisely, in time, effectively the resource occupation of system service is controlled.
In specific embodiment, system operation maintenance personnel can be divided into premium service, one-level service, two grades of clothes different services Business, three-level service, and more stages other N level service, the value of N is the integer more than 3, realizes different stage corresponding not Same resource limit strategy.Wherein, operation maintenance personnel directly does particularly customized resource limit strategy, on-line tuning to premium service The occupation condition of certain specific service, this adjustment comes into force in time so that operation maintenance personnel can more be accurately controlled system clothes The resource occupation of business.
In one embodiment of the invention it is preferable that Service Source analytic statisticss module, specifically for:Judge current Whether service has resource limit;After current service does not have resource limit, send and allow to access working as of business information services system The service request of front service is to service request handling module;When current service has resource limit, the resource of current service is accounted for With being counted and calculating, according to the resource limit strategy to current service customization in Service Source Configuration Online module, judge Whether current service exceeds resource limit;After judging current service without departing from resource limit, send and allow to access company information The service request of the current service of service system is to service request handling module.
In this embodiment, by Service Source analytic statisticss module, judge whether current service has resource limit, working as When front service has resource limit, the resource occupation of current service is counted and is calculated, according to the money that current service is customized Source restriction strategy, judges whether current service exceeds resource limit, judges that speed is fast, realizes whether judging current service in time Beyond resource limit, and then realize efficiently controlling the resource occupation of system service.
Further, when current service does not have resource limit, illustrate that current service is key service, allowed by sending Access business information services system current service service request to service request handling module it is allowed to access current service, Realize successfully accessing the current service of business information services system, and then realize the key service of business information services system Stable execution, improves the experience of user.
Further, when current service is without departing from resource limit, illustrate that current service does not result in system running pressure Increase, by sending the service request allowing the current service accessing business information services system to service request handling module, Allow to access current service, realize successfully accessing the current service of business information services system, and then realize company information clothes The stable execution of the key service of business system, improves the experience of user.
In one embodiment of the invention it is preferable that service post-processing module specifically for:Service request is refused to visit Ask, and send information to service request handling module;Or provide queuing mechanism to service request.
In this embodiment, when judging that current service exceeds resource limit, by servicing post-processing module, please to service Seek denied access, and send information, remind user's denied access current service in time, and then facilitate user's reasonable arrangement work Make the time;Or by servicing post-processing module, provide queuing mechanism to service request, realize to the continuation of service request Reason.
In one embodiment of the invention it is preferable that the step providing queuing mechanism to service request specifically includes:If Service request is ranked, then continues service request is processed;If not ranking to service request, send prompting.
In this embodiment, by judging whether service request is ranked, if ranking to service request, continue Continuing and service request is processed, realize service request and continued with an orderly manner, if not ranking to service request, sending out Go out prompting, point out user to without waiting for service request in time and continue to be processed.
In specific embodiment, if ranked to service request, provide queue and timeout mechanism, when waiting one section Between, if resource is released, this service request continues to be processed.If do not ranked to service request, provide prompting, or Person can be processed according to abnormal conditions.
As shown in figure 8, the service access control system 800 of one embodiment of the present of invention and business information services system are entered Row processes the schematic diagram of long-range service request:
Service Source Configuration Online module 802, for service customization resource limit strategy;
Service request handling module 804, for receiving and processing long-range service request;
Service Source analytic statisticss module 806, for receiving service invocation request, and judges that service invocation request is corresponding Whether current service exceeds resource limit;
Service post-processing module 808, for when current service exceeds resource limit, according to the datatron being pre-configured with System, is processed to service request;
Service Source monitoring module 810, for the occupation condition of real-time detection server, corresponding in resource occupation When data reaches predetermined threshold value, send prompting;And
Service Source Configuration Online module 802, is additionally operable to receive the finger that the resource occupation to server carries out Configuration Online Order, carries out Configuration Online to the resource occupation of server.
In this embodiment, by Service Source Configuration Online module 802, to service customization resource limit strategy, pass through Service request handling module 804, receives and processes long-range service request, by Service Source analytic statisticss module 806, receives Service invocation request, and judge whether the corresponding current service of service invocation request exceeds resource limit, by servicing post processing Module 808, when current service exceeds resource limit, according to the treatment mechanism being pre-configured with, directly locates to service request Reason, it is to avoid some non-key and big services of resource occupation take substantial amounts of system resource in the peak traffic phase, and then ensure enterprise In industry application system, the stable operation of key service is so that resource allocation more rationally, effectively, realizes enterprise to the utilization of resources Maximize, improve the experience of user.Further, service request is directly processed, mitigate the pressure of system operation Power, improves the reliability of system operation.
Specifically, by Service Source analytic statisticss module 806, judge whether current service has resource limit, working as When front service has resource limit, the resource occupation of current service is counted and is calculated, according to the money that current service is customized Source restriction strategy, judges whether current service exceeds resource limit, judges that speed is fast, realizes whether judging current service in time Beyond resource limit, and then realize efficiently controlling the resource occupation of system service.
Further, when current service does not have resource limit, illustrate that current service is key service, allowed by sending The service request of current service accessing business information services system is to service request handling module 804 it is allowed to access current clothes Business, realizes successfully accessing the current service of business information services system, and then realizes the crucial clothes of business information services system The stable execution of business, improves the experience of user.
Further, when current service is without departing from resource limit, illustrate that current service does not result in system running pressure Increase, by sending the service request allowing the current service accessing business information services system to service request handling module 804 it is allowed to access current service, realizes successfully accessing the current service of business information services system, and then realizes enterprise's letter The stable execution of the key service of breath service system, improves the experience of user.
Further, by Service Source monitoring module 810, the occupation condition of real-time detection server, in resource When taking corresponding data and reaching predetermined threshold value, send prompting, notify the resource occupation of some services of system operation maintenance personnel in time Reach the upper limit, and pass through Service Source Configuration Online module 802, receive the finger that the resource occupation to service carries out Configuration Online Order, system operation maintenance personnel carries out online management to the resource occupation of service, realizes in real time non-critical services being made more accurately Limit, the preferential stable execution ensureing key service in enterprise application system so that the resource allocation of key service much sooner, Effectively, improve the experience of user.Further answer it is not necessary to increase hardware server resource it is possible to realize enterprise With the stable execution of key service in system, reduce operation cost of enterprises, mitigate the pressure of system maintenance, it is to avoid non-traffic peak The wasting of resources of phase.
In specific embodiment, after the corresponding data of resource occupation reaches predetermined threshold value, send prompting, can take and one be The Forewarning Measures of row, such as report to the police or automatic transmission mail informing system operation maintenance personnel, system operation maintenance personnel is according to pressure report Announcement or the judgement of skilled addressee, carry out Configuration Online to the resource occupation of service.It is possible to further by system O&M According to actual situation, the concurrent visit capacity of the non-key business service of On-line Control, is limited to non-critical services to personnel in time Resources allocation.
In specific embodiment, service access control system 800 can be deployed in the front end of business information services system.
Specific embodiment one, the service access control method being provided according to the present invention and service access control system, in enterprise The peak period that the industry the end of month checks out, is illustrated with accessing report query operation in business information services system.
The peak period checked out at the end of month in enterprise, operation of checking out is quite crucial for enterprise operation, therefore, in enterprise's moon bear building-up The peak period of account, if it find that system resource is taken ample resources by the non-key operation such as report query, then limits these non-passes Key operation is it is ensured that the stable execution of operation of checking out.On the one hand, after the corresponding data of resource occupation reaches predetermined threshold value, service Access control system can make early warning, notifies system operation maintenance personnel occupation condition, and system operation maintenance personnel can be to service Resource occupation carries out Configuration Online, limits the resource of report query operation.On the other hand, pre-establish restriction strategy, by system Automatically restriction is made to Report Operations.
Specifically, if resource occupation is serious, system operation maintenance personnel can limit in the server cluster on backstage, each Server can only execute two Report Operations simultaneously, and limits the number of concurrent of Report Operations, that is, limit that Report Operations receive please Ask several.For the operation of other report querys, then need to wait in line, if it exceeds maximum time does not still have enough resources, Then do not process this operation, notify service request terminal resource nervous simultaneously, need to wait.
After system operation maintenance personnel carries out Configuration Online, the enterprise as shown in figure 9, peak period checked out at the end of month in enterprise conducts interviews The schematic flow sheet of report query operation in industry information service system:
Step 902, receives report query operation requests, judges whether report query operation has resource limit;Without Resource limit, enters step 914;If there are resource limit, enter step 904;
Step 904, obtains the configuration to report query operation, and determines the number of concurrent of Report Operations;
Step 906, statistical report form inquiry operation takies resource, judges whether current report query operation exceeds Report Operations Number of concurrent;Without exceeding, enter step 914;If exceeded, enter step 908;
Step 908, judges whether report query operation requests are ranked;If not ranking, enter step 910; If ranking, enter step 912;
Step 910, to report query operation requests denied access, and sends information;
Report query operation requests are ranked by step 912, wait Preset Time, if thread is released, have enough Server resource, continue with report query operation requests;If waiting Preset Time still cannot obtain server resource, Then abandon processing report query operation requests, and send information;
Step 914, directly accesses business information services system, carries out report query operation.
Service access control method and service access control system that the present invention provides, in conjunction with business information services system The actually used scene of (i.e. ERP system), on the premise of not needing to increase hardware device, by limiting various non-key operations Resource occupation, to ensure limited hardware resource Priority Service in enterprise's key operation it is ensured that crucial in enterprise application system The stable operation of service.Further it is not necessary to change business information services system, can be in business information services system front end One service access control system of deployment, to business information services system no invasive, and this service access control system can be only Vertical deployment, takies small volume, effectively ensures that service access control system obtains stable operation.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, made any repair Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (14)

1. a kind of service access control method is it is characterised in that include:
To service customization resource limit strategy;
Receive and process long-range service request;
Receive service invocation request, and judge whether the corresponding current service of described service invocation request exceeds resource limit;
When described current service exceeds resource limit, according to the treatment mechanism being pre-configured with, at described service request Reason.
2. service access control method according to claim 1 is it is characterised in that also include:
The occupation condition of real-time detection server, when the corresponding data of described resource occupation reaches predetermined threshold value, sends Prompting;
Receive the instruction that the resource occupation to service carries out Configuration Online, Configuration Online is carried out to the resource occupation of service.
3. service access control method according to claim 1 it is characterised in that described to service customization resource limit plan Step slightly, specifically includes:
According to the significance level of service, service is classified, is divided into premium service, one-level service, secondary service, three-level service.
4. service access control method according to claim 1 is it is characterised in that the described service invocation request of described judgement The step whether corresponding current service exceeds resource limit, specifically includes:
Judge whether described current service has resource limit;
When described current service has resource limit, the resource occupation of described current service is counted and is calculated, according to right The resource limit strategy of described current service customization, judges whether described current service exceeds resource limit.
5. service access control method according to claim 4 is it is characterised in that also include:
When described current service does not have resource limit, receive the described current service allowing to access business information services system Instruction;And
Allow to access described current service.
6. service access control method according to claim 4 is it is characterised in that also include:
When described current service is without departing from resource limit, receive the described current service allowing to access business information services system Instruction;And
Allow to access described current service.
7. service access control method according to claim 1 is it is characterised in that described judging that described current service is super When going out resource limit, according to the treatment mechanism being pre-configured with, the step that described service request is processed, specifically include:
To described service request denied access, and send information;Or
There is provided queuing mechanism to described service request.
8. the service access control method described in 7 is wanted it is characterised in that described described service request is provided is queued up according to right The step of mechanism, specifically includes:
Judge whether described service request is ranked;
If ranking to described service request, continue described service request is processed;
If not ranking to described service request, send prompting.
9. a kind of service access control system is it is characterised in that include:
Service Source Configuration Online module, for service customization resource limit strategy;
Service request handling module, for receiving and processing long-range service request;
Service Source analytic statisticss module, for receiving service invocation request, and judge described service invocation request corresponding work as Whether front service exceeds resource limit;
Service post-processing module is for when described current service exceeds resource limit, according to the treatment mechanism being pre-configured with, right Described service request is processed.
10. service access control system according to claim 9 is it is characterised in that also include:
Service Source monitoring module, for the occupation condition of real-time detection server, in the corresponding number of described resource occupation During according to reaching predetermined threshold value, send prompting;
Described Service Source Configuration Online module, is additionally operable to receive the instruction that the resource occupation to server carries out Configuration Online, Configuration Online is carried out to the resource occupation of server.
11. service access control systems according to claim 9 are it is characterised in that described Service Source Configuration Online mould Block, specifically for:
According to the significance level of service, service is classified, is divided into premium service, one-level service, secondary service, three-level service.
12. service access control systems according to claim 9 are it is characterised in that described Service Source analytic statisticss mould Block, specifically for:
Judge whether described current service has resource limit;
When described current service does not have resource limit, send the described current service allowing to access business information services system Service request is to described service request handling module;
When described current service has resource limit, the resource occupation of described current service is counted and is calculated, according to institute State the resource limit strategy to the customization of described current service in Service Source Configuration Online module, whether judge described current service Beyond resource limit;
After judging described current service without departing from resource limit, send and allow to access the described current of business information services system The service request of service is to described service request handling module.
13. service access control systems according to claim 9 are it is characterised in that described service post-processing module is concrete For:
To described service request denied access, and send information to described service request handling module;Or
There is provided queuing mechanism to described service request.
14. service access control systems according to claim 13 are it is characterised in that described provide to described service request The step of queuing mechanism specifically includes:
Judge whether described service request is ranked;
If ranking to described service request, continue described service request is processed;
If not ranking to described service request, send prompting.
CN201611074473.1A 2016-11-29 2016-11-29 Service access control method and service access control system Pending CN106487925A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611074473.1A CN106487925A (en) 2016-11-29 2016-11-29 Service access control method and service access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611074473.1A CN106487925A (en) 2016-11-29 2016-11-29 Service access control method and service access control system

Publications (1)

Publication Number Publication Date
CN106487925A true CN106487925A (en) 2017-03-08

Family

ID=58275327

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611074473.1A Pending CN106487925A (en) 2016-11-29 2016-11-29 Service access control method and service access control system

Country Status (1)

Country Link
CN (1) CN106487925A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566304A (en) * 2018-04-26 2018-09-21 努比亚技术有限公司 Interface control method, electronic equipment and computer readable storage medium
CN111367645A (en) * 2020-03-18 2020-07-03 中国建设银行股份有限公司 Real-time task scheduling control method, system, equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009583A (en) * 2006-01-24 2007-08-01 华为技术有限公司 Execution method of the scheduled task and execution task of management task, and its terminal device
CN101631120A (en) * 2009-08-20 2010-01-20 中兴通讯股份有限公司 Application server and media resource allocation method
CN102904942A (en) * 2012-09-28 2013-01-30 用友软件股份有限公司 Service resource control system and service resource control method
US20130311645A1 (en) * 2012-05-18 2013-11-21 Akihisa Nagami Management system and management method
CN103841129A (en) * 2012-11-21 2014-06-04 华为技术有限公司 Cloud computing resource information acquisition server, cloud computing resource information acquisition client and information processing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009583A (en) * 2006-01-24 2007-08-01 华为技术有限公司 Execution method of the scheduled task and execution task of management task, and its terminal device
CN101631120A (en) * 2009-08-20 2010-01-20 中兴通讯股份有限公司 Application server and media resource allocation method
US20130311645A1 (en) * 2012-05-18 2013-11-21 Akihisa Nagami Management system and management method
CN102904942A (en) * 2012-09-28 2013-01-30 用友软件股份有限公司 Service resource control system and service resource control method
CN103841129A (en) * 2012-11-21 2014-06-04 华为技术有限公司 Cloud computing resource information acquisition server, cloud computing resource information acquisition client and information processing method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566304A (en) * 2018-04-26 2018-09-21 努比亚技术有限公司 Interface control method, electronic equipment and computer readable storage medium
CN111367645A (en) * 2020-03-18 2020-07-03 中国建设银行股份有限公司 Real-time task scheduling control method, system, equipment and readable storage medium
CN111367645B (en) * 2020-03-18 2023-12-22 中国建设银行股份有限公司 Real-time task scheduling control method, system, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US10129257B2 (en) Authorization server access system
US9077758B1 (en) Test mode authorization logging
CN108683604A (en) concurrent access control method, terminal device and medium
CN110276182A (en) The implementation method of API distribution current limliting
CN104657207B (en) Dispatching method, service server and the scheduling system of remote authorization request
CN103443800A (en) Network rating
WO2020155761A1 (en) Method for logging into multiple service clusters, apparatus, computer device and storage medium
CN103546470A (en) Safe access method, system and device
CN110012075B (en) Data transmission method and related equipment
CN104077663A (en) Service processing method and system
US11128628B2 (en) System for authorising data access
CN106817424A (en) Method and system for controlling flowing of access
CN106487925A (en) Service access control method and service access control system
CN110955528A (en) System and method for processing high-concurrency request by external connection service
CN106384391A (en) Cloud ticket checking system
CN110838987B (en) Queue current limiting method and storage medium
US8510273B2 (en) System, method, and computer-readable medium to facilitate application of arrival rate qualifications to missed throughput server level goals
US11074586B2 (en) Methods and apparatuses for fraud handling
CN109670932B (en) Credit data accounting method, apparatus, system and computer storage medium
CN112399352B (en) Cheating behavior identification method, device and storage medium
CN110191097A (en) Detection method, system, equipment and the storage medium of login page safety
CN109120808A (en) A kind of shutdown fee payment method and device
CN116095013A (en) Service request current limiting method, device and storage medium
CN107124429B (en) Network service safety protection method and system based on double data table design
CN115002044A (en) Method and device for controlling data transmission, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170308

RJ01 Rejection of invention patent application after publication