CN108170407A - A kind of method and device for obtaining target data - Google Patents
A kind of method and device for obtaining target data Download PDFInfo
- Publication number
- CN108170407A CN108170407A CN201611103938.1A CN201611103938A CN108170407A CN 108170407 A CN108170407 A CN 108170407A CN 201611103938 A CN201611103938 A CN 201611103938A CN 108170407 A CN108170407 A CN 108170407A
- Authority
- CN
- China
- Prior art keywords
- target data
- data
- point
- user credential
- processing function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/20—Software design
- G06F8/22—Procedural
Abstract
The invention discloses a kind of method and devices for obtaining target data, firstly the need of it is confirmed that calling whether the data received after point of penetration processing function are target data during target data is obtained, rather than it goes to judge whether to need to apply for user credential first, the quantity for determining whether to apply user credential added in each interface can be effectively reduced, solves the problems, such as a large amount of code redundancies;Simultaneously as the module design of section, if no longer needing to apply for user credential in business, directly it can be removed from code in a manner of component, other block codes will not be changed so that being more clear of module realizes the high cohesion lower coupling of module.
Description
Technical field
The present invention relates to field of data service, espespecially a kind of method and device for obtaining target data.
Background technology
With the fast development of the Internet, applications such as service inquiry and network payment, the quantity of Internet user has obtained soon
Speed increases, and Internet technology has been similarly obtained development by leaps and bounds;Wherein, declarative state transfer (Representational
State Transfer, REST) distributivity and autgmentability of the technology because paying the utmost attention to module the characteristics of, have in internet arena
It is widely applied.
However, for the REST service realized with software Jersey frames in existing technology, often due to a lack of good
Module maintainability and good modularization, lead to a large amount of code redundancy;For querying the balance, client hair is being received
It after the inquiry request sent, needs to obtain user credential first, then be added in largely in each interface about whether getting use
The judgement of family voucher causes the bulk redundancy of code.
At present, existing known technology in addition to REST technologies, further includes in internet arena:Control reversion
(Inversion of Control, IoC) container technique, towards tangent plane programming (Aspect Oriented Programming,
AOP) technology, database technology etc.;Wherein, IoC container techniques be one possess control reversion, have rely on function of injecting appearance
Device is responsible for the object instantiated in application program and the dependence established between these objects, and IoC is an important object-oriented
The rule of programming cuts down the core of the software Spring frames of the coupled problem of computer program and lightweight;AOP technologies
A kind of unified technology safeguarded of program function is realized by precompile mode and runtime dynamic proxy, it is that object-oriented is compiled
The continuity of journey (Object Oriented Programming, OOP), is an important content in Spring frames, is function
A kind of derivative pattern of formula programming, can be realized using AOP technologies and the various pieces of service logic are isolated, so as to reduce
The degree of coupling between service logic each section, improves the reusability of program, while improves the efficiency of exploitation.
Based on this, how using existing known technology, when obtaining target data, asking for a large amount of code redundancies is solved
Topic, sharpening module realize the high cohesion lower coupling of module, are the technical issues of those skilled in the art are urgently to be resolved hurrily.
Invention content
The embodiment of the present invention provides a kind of method and device for obtaining target data, to solve how to utilize existing public affairs
Know technology, when obtaining target data, solve the problems, such as a large amount of code redundancies, sharpening module realizes that the high cohesion of module is low
Coupling.
An embodiment of the present invention provides it is a kind of obtain target data method, including:
Receive the acquisition target data request that client is sent;
Call preset point of penetration processing function corresponding with the target data in notice;
It determines to call whether the data received after the point of penetration processing function meet the preset and target data
Matched rule;
Determining to call the data fit that is received after point of penetration processing function preset and the target data
During the rule matched, it is target data to determine the data received, and to target data described in the client feedback.
In a kind of possible embodiment, in the method for above-mentioned acquisition target data provided in an embodiment of the present invention,
It is described determining the data received after point of penetration processing function to be called whether to meet preset match with the target data
Rule, specifically include:
It determines to call marking whether and preset target data for the data received after the point of penetration processing function
Label is consistent.
In a kind of possible embodiment, in the method for above-mentioned acquisition target data provided in an embodiment of the present invention,
It is determining that the data received after the point of penetration processing function is called not meet the preset and matched rule of the target data
When then, further include:
Apply for user credential to remote service end;
When determining application to the user credential, the point of penetration is called to handle function again according to the user credential
Obtain target data.
In a kind of possible embodiment, in the method for above-mentioned acquisition target data provided in an embodiment of the present invention,
Before the acquisition target data request for receiving client and sending, further include:
Control reversion IoC containers are respectively configured, transmit REST style frame towards tangent plane programming AOP and declarative state
The software frame Jersey of structure;
According to the characteristics of the REST of the Jersey, the function for obtaining data is determined;
According to the function for being used to obtain data determined, determining to include in section needs to apply for each of user credential
Point of penetration and circular notice.
In a kind of possible embodiment, in the method for above-mentioned acquisition target data provided in an embodiment of the present invention,
It further includes:
When business determines no longer to need to apply user credential, corresponding section is removed in the IoC containers.
The embodiment of the present invention additionally provides a kind of device for obtaining target data, including:
Receiving module, for receiving the acquisition target data request of client transmission;
Calling module, for calling preset point of penetration processing letter corresponding with the target data in notice
Number;
Determining module, for determine to call the data received after point of penetration processing function whether meet it is preset with
The matched rule of target data;Determine to call the data fit that is received after point of penetration processing function preset with
During the matched rule of the target data, it is target data to determine the data received, and to the client feedback institute
State target data.
In a kind of possible embodiment, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention,
The determining module, specifically for determining to call marking whether and presetting for the data received after point of penetration processing function
Target data label it is consistent.
In a kind of possible embodiment, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention,
It further includes:
Apply for module, for applying for user credential to remote service end;
Acquisition module, for determine application to the user credential when, according to the user credential is called again
Point of penetration processing function obtains target data.
In a kind of possible embodiment, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention,
It further includes:
Preprocessing module, for control reversion IoC containers to be respectively configured, towards tangent plane programming AOP and REST style frame
The software frame Jersey of structure;According to the characteristics of the REST of the Jersey, the function for obtaining data is determined;According to described
That determines is used to obtain the function of data, determines in section comprising each point of penetration for needing application user credential and around logical
Know.
In a kind of possible embodiment, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention,
It further includes:
Remove module, for when business determines no longer to need to apply user credential, being removed in the IoC containers corresponding
Section.
The present invention has the beneficial effect that:
A kind of method and device for obtaining target data provided in an embodiment of the present invention, is receiving obtaining for client transmission
It is corresponding with target data in notice by calling into the circular notice of corresponding section after target data is taken to ask
Point of penetration handles function, determines to call whether the data received after point of penetration processing function meet preset and target data
The rule matched;When being determined for compliance with, you can determine the data received as target data, and to client feedback target data;
Therefore, firstly the need of it is confirmed that the data received after calling point of penetration processing function are during target data is obtained
It is no to judge whether to need to apply for user credential for target data rather than go first, it can effectively reduce and be added in each interface
Determine whether apply user credential quantity, solve the problems, such as a large amount of code redundancies;Simultaneously as the module of section is set
Meter if no longer needing to apply for user credential in business, directly can be removed it in a manner of component, Bu Huixiu from code
Change other block codes so that being more clear of module realizes the high cohesion lower coupling of module.
Description of the drawings
Fig. 1 is a kind of one of flow chart of method of acquisition target data provided in the embodiment of the present invention;
Fig. 2 is the two of the flow chart of a kind of method of acquisition target data provided in the embodiment of the present invention;
Fig. 3 is the three of the flow chart of a kind of method of acquisition target data provided in the embodiment of the present invention;
Fig. 4 is the flow diagram of embodiment one provided in the embodiment of the present invention;
Fig. 5 is the structure diagram of the device of a kind of acquisition target data provided in the embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing, to a kind of the specific of method and device for obtaining target data provided in an embodiment of the present invention
Embodiment is described in detail.It should be noted that described embodiment is only part of the embodiment of the present invention, and
The embodiment being not all of.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work
Under the premise of all other embodiments obtained, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a kind of method for obtaining target data, as shown in Figure 1, can specifically include following several
A step:
S101, the acquisition target data request that client is sent is received;
S102, preset point of penetration processing function corresponding with target data in notice is called;
S103, the data that receive is determined to call after point of penetration processing function whether to meet preset match with target data
Rule;If meeting, step S104 is performed;
S104, determine that the data received are target data;
S105, to client feedback target data.
The method of above-mentioned acquisition target data provided in an embodiment of the present invention, needs first during target data is obtained
It will be it is confirmed that calling whether the data received after point of penetration processing function are target data rather than go to judge whether first
It needs to apply for user credential, the quantity for determining whether to apply user credential added in each interface can be effectively reduced, solved
The problem of a large amount of code redundancies;Simultaneously as the module design of section, if no longer need to apply in business user with
Card, it can directly be removed, will not change other block codes so that module is more clear in a manner of component from code
Clearization realizes the high cohesion lower coupling of module.
In the specific implementation, it in order to complete to presetting around notice, above-mentioned is obtained provided in an embodiment of the present invention
The step S101 in the method for target data is taken, before the acquisition target data request that client is sent is received, such as Fig. 2 institutes
Show, following steps can be included:
S201, control reversion IoC containers, the software frame towards tangent plane programming AOP and REST style framework is respectively configured
Frame Jersey;
S202, according to the characteristics of the REST of Jersey, determine the function for obtaining data;
The function for being used to obtain data that S203, basis are determined, determining to include in section needs to apply for user credential
Each point of penetration and circular notice.
Specifically, in order to get data, in the method for above-mentioned acquisition target data provided in an embodiment of the present invention
In step S202, in practical processing procedure, can according to the characteristics of the REST of Jersey, and according to certain rule,
Function is write, for obtaining the long-range middle data stored.
Specifically, in order to obtain user credential using around notice, in above-mentioned acquisition provided in an embodiment of the present invention
Step S203 in the method for target data, it is thus necessary to determine that each point of penetration in section, certainly, point of penetration herein include needing
Apply for the point of penetration of user credential, further include the point of penetration for not needing to application user credential, these points of penetration when determining section
It is required to be configured;In addition, in addition to determining each point of penetration in section, it is also necessary to determine comprising the incision for needing application user credential
The circular notice of point, for applying for user credential.
Wherein, with@Around (" execution (* cmcc.hq.cmri.bgdt.service.QAService.get*
(..)) for ") ,@Around are represented around notice, " execution (*
Cmcc.hq.cmri.bgdt.service.QAService.get* (..)) " represent point of penetration, which is also step simultaneously
What is determined in S202 is used to obtain the function of data.
Specifically, the step S101 in the method for above-mentioned acquisition target data provided in an embodiment of the present invention, is receiving
After the acquisition target data request that client is sent, it is possible thereby into the circular notice of corresponding section, next step is carried out
Operation.
Specifically, the step S102 in the method for above-mentioned acquisition target data provided in an embodiment of the present invention is called pre-
Point of penetration processing function corresponding with target data, can specifically include in the circular notice first set:
First, point of penetration corresponding with target data is triggered;
Secondly, it calls around notice;
Later, into notice, point of penetration corresponding with target data is called to handle function.
Specifically, it in order to determine whether the data received match with target data, is provided in the embodiment of the present invention
Above-mentioned acquisition target data method in step S103, whether determine to call after point of penetration processing function the data that receive
Meet the preset and matched rule of target data, can specifically include:
It determines to call the label marked whether with preset target data of data received after point of penetration processing function
Unanimously.
Certainly, the label of the data received and the label of target data are preset, according to the comparison of label,
It determines whether the data received meet the preset and matched rule of target data, that is, determines whether the data received are mesh
Mark data;Wherein, label can be digital, other can be used for any form marked to character etc., be not limited thereto.
In the specific implementation, the step S103 in the method for above-mentioned acquisition target data provided in an embodiment of the present invention,
After determining that the data received after point of penetration processing function is called not meet the preset matched rule with target data, such as
Shown in Fig. 3, it can also include:
S106, apply for user credential to remote service end;
S107, determine application to user credential when, called again according to user credential point of penetration processing function obtain mesh
Mark data.
In the specific implementation, after voucher is applied for user, it is possible to application to user credential, it is of course also possible to
Do not apply to user credential, when determining application to user credential, point of penetration processing function is called to obtain again according to user credential
Take target data;When determining not applying to user credential, from around the internal throw exception of notice.
In the specific implementation, in the method for above-mentioned acquisition target data provided in an embodiment of the present invention, can also include:
When business determines no longer to need to apply user credential, corresponding section is removed in IoC containers.
Specifically, according to remote service end negotiate as a result, the request of the acquisition target data sent for client,
Sometimes application user credential, which can not needed to, just can get target data and be sent to client, i.e., need not recall section
Around notification logic, it can be used to apply for that the section of user credential is canceled by preset by IoC containers, do not hold at this time
This section of row;Certainly, it when needing to apply user credential, that is, needs that section is called around notification logic by IoC can also to hold
Device is used to apply for that the section of user credential is explained again to preset;Therefore, it by IoC containers, can realize pair
The cancellation of section and note can so break away from intrusive programming, the influence to other codes be avoided, convenient for a group installation and dismantling
It unloads, is advantageously implemented the high cohesion lower coupling of module.
Certainly, the method for above-mentioned acquisition target data provided in an embodiment of the present invention, cannot only be applied to inquiry into balance,
In the inquiry business of integration inquiry etc, being also applied to other needs to apply for user credential and needs the business of condition query
In, it is not limited thereto.
In addition, in practical business procession, the specific system for obtaining target data can specifically include:Business
Logic unit, section unit and frame unit;Wherein, service logic unit, the business for building acquisition target data are patrolled
Volume;Section unit, for writing each point of penetration in the logic of section and surrounding notice;Frame unit obtains target for building
The frame of data system;Therefore, by adding in corresponding section in the system for obtaining target data, the angle point from section
Analysis, it is determined whether application user credential significantly reduces each interface and judges whether to apply for the quantity of user credential, realizes
The high cohesion of system.
It will pass through specific embodiment the present invention will be described in detail embodiment provides the method for above-mentioned acquisition target data below.
Embodiment one:
By taking " querying the balance " request that client is sent as an example, during acquisition queries the balance data, determine to need
When calling section around notice, as shown in figure 4, may comprise steps of:
S401, the request that queries the balance that client is sent is received;
S402, point of penetration corresponding with the data that query the balance is triggered;
S403, it calls around notice;
S404, the point of penetration processing function corresponding with the data that query the balance in notice is called;
S405, it determines to call marking whether and the preset number that queries the balance for the data received after point of penetration processing function
According to label it is consistent;If consistent, step S406 is performed;If inconsistent, step S407 is performed;
S406, the data for determining to receive are the data that query the balance, and are queried the balance data to client feedback, terminate stream
Journey;
S407, it determines to obtain the data failure that queries the balance;
S408, apply for user credential to remote service end;
S409, determine whether application to user credential;If not applying arriving, step S410 is performed;If application is arrived, perform
Step S411;
S410, it notifies internal throw exception from circular, terminates flow;
S411, point of penetration processing function is called to obtain target data again according to user credential;
S412, the target data got is fed back into client.
Based on same inventive concept, the embodiment of the present invention additionally provides a kind of device for obtaining target data, due to the dress
It is similar to a kind of aforementioned method for obtaining target data to put the principle solved the problems, such as, therefore the implementation of the device may refer to method
Implementation, overlaps will not be repeated.
Specifically, an embodiment of the present invention provides a kind of device for obtaining target data, as shown in figure 5, can specifically wrap
Include following module:
Receiving module 501, for receiving the acquisition target data request of client transmission;
Calling module 502, for calling preset point of penetration processing letter corresponding with target data in notice
Number;
Determining module 503, for determine to call after point of penetration processing function the data that receive whether meet it is preset with
The matched rule of target data;The data fit that receives is preset after determining to call point of penetration processing function and target data
During matched rule, the data received are determined as target data, and to client feedback target data.
In the specific implementation, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention, determining module
503, specifically for determining to call marking whether and preset target data for the data received after point of penetration processing function
Label is consistent.
In the specific implementation, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention, as shown in figure 5,
It can also include:
Apply for module 504, for applying for user credential to remote service end;
Acquisition module 505, for when determining application to user credential, point of penetration being called to handle again according to user credential
Function obtains target data.
In the specific implementation, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention, as shown in figure 5,
It can also include:
Preprocessing module 506, for control reversion IoC containers to be respectively configured, towards tangent plane programming AOP and REST wind
The software frame Jersey of screen work structure;According to the characteristics of the REST of Jersey, the function for obtaining data is determined;According to determining
What is gone out is used to obtain the function of data, determines in section comprising each point of penetration for needing application user credential and around notice.
In the specific implementation, in the device of above-mentioned acquisition target data provided in an embodiment of the present invention, as shown in figure 5,
It can also include:
Remove module 507, for when business determines no longer to need to apply user credential, being removed in IoC containers corresponding
Section.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the application
Apply the form of example.Moreover, the computer for wherein including computer usable program code in one or more can be used in the application
The shape of computer program product that usable storage medium is implemented on (including but not limited to magnetic disk storage and optical memory etc.)
Formula.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real
The device of function specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps are performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or
The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then additional changes and modifications may be made to these embodiments.So appended claims be intended to be construed to include it is excellent
It selects embodiment and falls into all change and modification of the scope of the invention.
An embodiment of the present invention provides a kind of method and devices for obtaining target data, are receiving obtaining for client transmission
It is corresponding with target data in notice by calling into the circular notice of corresponding section after target data is taken to ask
Point of penetration handles function, determines to call whether the data received after point of penetration processing function meet preset and target data
The rule matched;When being determined for compliance with, you can determine the data received as target data, and to client feedback target data;
Therefore, firstly the need of it is confirmed that the data received after calling point of penetration processing function are during target data is obtained
It is no to judge whether to need to apply for user credential for target data rather than go first, it can effectively reduce and be added in each interface
Determine whether apply user credential quantity, solve the problems, such as a large amount of code redundancies;Simultaneously as the module of section is set
Meter if no longer needing to apply for user credential in business, directly can be removed it in a manner of component, Bu Huixiu from code
Change other block codes so that being more clear of module realizes the high cohesion lower coupling of module.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
- A kind of 1. method for obtaining target data, which is characterized in that including:Receive the acquisition target data request that client is sent;Call preset point of penetration processing function corresponding with the target data in notice;It determines to call the data received after point of penetration processing function whether to meet preset to match with the target data Rule;It is determining to call the data fit received after the point of penetration processing function preset matched with the target data When regular, it is target data to determine the data received, and to target data described in the client feedback.
- 2. the method as described in claim 1, which is characterized in that received after the determining calling point of penetration processing function Data whether meet preset with the matched rule of the target data, specifically include:It determines to call the label marked whether with preset target data of data received after the point of penetration processing function Unanimously.
- 3. method as claimed in claim 1 or 2, which is characterized in that received after determining to call the point of penetration processing function To data do not meet and preset during matched rule, further include with the target data:Apply for user credential to remote service end;When determining application to the user credential, the point of penetration processing function is called to obtain again according to the user credential Target data.
- 4. method as claimed in claim 1 or 2, which is characterized in that the acquisition target data for receiving client transmission please Before asking, further include:Control reversion IoC containers are respectively configured, transmit REST style framework towards tangent plane programming AOP and declarative state Software frame Jersey;According to the characteristics of the REST of the Jersey, the function for obtaining data is determined;According to the function for being used to obtain data determined, determine in section comprising each incision for needing application user credential It puts and around notice.
- 5. method as claimed in claim 4, which is characterized in that further include:When business determines no longer to need to apply user credential, corresponding section is removed in the IoC containers.
- 6. a kind of device for obtaining target data, which is characterized in that including:Receiving module, for receiving the acquisition target data request of client transmission;Calling module, for calling preset point of penetration processing function corresponding with the target data in notice;Determining module, for determine to call the data received after point of penetration processing function whether meet it is preset with it is described The matched rule of target data;Determine to call the data fit that is received after point of penetration processing function preset with it is described During the matched rule of target data, it is target data to determine the data received, and to mesh described in the client feedback Mark data.
- 7. device as claimed in claim 6, which is characterized in that the determining module, specifically for determining to call the incision Marking whether for the data received after point processing function is consistent with the label of preset target data.
- 8. device as claimed in claims 6 or 7, which is characterized in that further include:Apply for module, for applying for user credential to remote service end;Acquisition module, for when determining application to the user credential, the incision to be called again according to the user credential Point processing function obtains target data.
- 9. device as claimed in claims 6 or 7, which is characterized in that further include:Preprocessing module, for control reversion IoC containers to be respectively configured, towards tangent plane programming AOP and REST style framework Software frame Jersey;According to the characteristics of the REST of the Jersey, the function for obtaining data is determined;It is determined according to described What is gone out is used to obtain the function of data, determines in section comprising each point of penetration for needing application user credential and around notice.
- 10. device as claimed in claim 9, which is characterized in that further include:Remove module, for when business determines no longer to need to apply user credential, removing in the IoC containers and cutting accordingly Face.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611103938.1A CN108170407B (en) | 2016-12-05 | 2016-12-05 | Method and device for acquiring target data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611103938.1A CN108170407B (en) | 2016-12-05 | 2016-12-05 | Method and device for acquiring target data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108170407A true CN108170407A (en) | 2018-06-15 |
CN108170407B CN108170407B (en) | 2020-12-29 |
Family
ID=62525919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611103938.1A Active CN108170407B (en) | 2016-12-05 | 2016-12-05 | Method and device for acquiring target data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108170407B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009088749A2 (en) * | 2008-01-02 | 2009-07-16 | Harmonic, Inc. | Methods and system for efficient data transfer over hybrid fiber coax infrastructure |
CN103049684A (en) * | 2012-12-21 | 2013-04-17 | 大唐软件技术股份有限公司 | Data authority control method and data authority control system based on RBAC (role-based access control) model extension |
CN103618762A (en) * | 2013-11-08 | 2014-03-05 | 中标软件有限公司 | System and method for enterprise service bus state pretreatment based on AOP |
CN103905526A (en) * | 2014-03-05 | 2014-07-02 | 深圳市同洲电子股份有限公司 | Dispatching method and server |
-
2016
- 2016-12-05 CN CN201611103938.1A patent/CN108170407B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009088749A2 (en) * | 2008-01-02 | 2009-07-16 | Harmonic, Inc. | Methods and system for efficient data transfer over hybrid fiber coax infrastructure |
CN103049684A (en) * | 2012-12-21 | 2013-04-17 | 大唐软件技术股份有限公司 | Data authority control method and data authority control system based on RBAC (role-based access control) model extension |
CN103618762A (en) * | 2013-11-08 | 2014-03-05 | 中标软件有限公司 | System and method for enterprise service bus state pretreatment based on AOP |
CN103905526A (en) * | 2014-03-05 | 2014-07-02 | 深圳市同洲电子股份有限公司 | Dispatching method and server |
Non-Patent Citations (1)
Title |
---|
WEIXIN_34068198: "Spring-AOP的五种通知和切面的优先级、通知变量申明", 《CSDN博客 HTTPS://BLOG.CSDN.NET/WEIXIN_34068198/ARTICLE/DETAILS/93784501》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108170407B (en) | 2020-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111201754B (en) | Device for providing cryptographically protected and filtered and ordered collection of transaction data sets for links of a blockchain | |
TWI815443B (en) | Non-transitory machine readable medium for internet of things | |
CN111741026B (en) | Cross-chain transaction request processing method, device, equipment and storage medium | |
CN110189121B (en) | Data processing method and device, block chain client and block chain link point | |
CN106101258A (en) | A kind of interface interchange method of mixed cloud, Apparatus and system | |
CN103530255B (en) | Distributed asynchronous event processing method and system | |
CN105900396A (en) | Mobile cloud service architecture | |
CN107707622A (en) | A kind of method, apparatus and desktop cloud controller for accessing desktop cloud virtual machine | |
CN109582452A (en) | A kind of container dispatching method, dispatching device and electronic equipment | |
CN110245029A (en) | A kind of data processing method, device, storage medium and server | |
US20130290453A1 (en) | System and method for a connector being able to adapt to newer features introduced to a messaging provider with only configuration changes | |
CN105468709A (en) | Data inquiry device and data inquiry method based on HBase | |
CN108830093A (en) | Management method, server and the terminal device of terminal device operating right | |
CN104052679B (en) | The load-balancing method of network traffics and device | |
CN110287266A (en) | A kind of distributed system and data processing method | |
CN105224541B (en) | Uniqueness control method, information storage means and the device of data | |
CN105933270B (en) | A kind of processing method and processing device of cloud encryption equipment | |
CN110008173A (en) | A kind of method and device of data storage | |
CN114254353A (en) | Data processing method and device based on privacy protection and server | |
CN109032693A (en) | Method and device for loading display information, electronic equipment and readable storage medium | |
CN107493251A (en) | A kind of method and terminal for logging in destination server | |
CN108170407A (en) | A kind of method and device for obtaining target data | |
CN111045928A (en) | Interface data testing method, device, terminal and storage medium | |
CN110019456A (en) | Data lead-in method, device and system | |
US20210092042A1 (en) | Configurable system for resolving requests received from multiple client devices in a network system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |