CN108833355A - Data processing method, device, computer equipment and computer readable storage medium - Google Patents

Data processing method, device, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN108833355A
CN108833355A CN201810486132.8A CN201810486132A CN108833355A CN 108833355 A CN108833355 A CN 108833355A CN 201810486132 A CN201810486132 A CN 201810486132A CN 108833355 A CN108833355 A CN 108833355A
Authority
CN
China
Prior art keywords
data
server
interface
terminal
party system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810486132.8A
Other languages
Chinese (zh)
Other versions
CN108833355B (en
Inventor
朱武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunzhijia Network Co Ltd
Original Assignee
Shenzhen Yunzhijia Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunzhijia Network Co Ltd filed Critical Shenzhen Yunzhijia Network Co Ltd
Priority to CN201810486132.8A priority Critical patent/CN108833355B/en
Publication of CN108833355A publication Critical patent/CN108833355A/en
Application granted granted Critical
Publication of CN108833355B publication Critical patent/CN108833355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

This application involves a kind of data processing method, device, computer equipment and computer readable storage mediums.The method includes:The data acquisition request that server receiving terminal is initiated according to trigger control event, data acquisition request includes control mark and event argument, server identifies according to control and obtains data-interface, and corresponding data set is obtained from third party system by data-interface according to event argument, server based on data collection and associate field obtain associated data, and associated data is sent to terminal.The simplicity of third party's data acquisition can be improved using this method.

Description

Data processing method, device, computer equipment and computer readable storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of data processing method, device, computer equipment and Computer readable storage medium.
Background technique
With the development of computer technology, the working way of OA (Office Automation) office automation is increasingly Generally, enterprise can realize the automation of approval process by OA workflow examination and approval system.Pass through the integrated service in approval process The data of system, it is possible to reduce the workload that text inputs in approval process, and prevent input error etc..
In current technology, in OA workflow examination and approval system, data information maintenance management interface is provided, allows system administration people Member can manual typing or batch import third party system data, there is a problem of that data acquisition operations are cumbersome.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of number for capableing of easy acquisition third party system data According to processing method, device, computer equipment and computer storage medium.
A kind of data processing method, the method includes:
The data acquisition request that server receiving terminal is initiated according to trigger control event, the data acquisition request packet Include control mark and event argument;
Server is identified according to the control obtains data-interface, and passes through the data-interface according to the event argument Corresponding data set is obtained from third party system;
Server obtains associated data according to the data set and associate field, and the associated data is sent to end End.
The server identifies according to the control and obtains data-interface in one of the embodiments, and according to described Before event argument obtains corresponding data set from third party system by the data-interface, further include:
Server receives the terminal and sends the token and customer parameter carried when data acquisition request, according to the token With the user information of customer parameter verifying terminal;
When the user information verifying of the terminal is obstructed out-of-date, then to the information of terminal transmission authentication failed;
When the user information of the terminal is verified, then the server is executed according to the control and identifies acquisition number According to interface, and the step of corresponding data set is obtained from third party system by the data-interface according to the event argument.
In one of the embodiments, the method also includes:
The identity information of the event argument and the terminal is encrypted in server, and encrypted event is joined Several and terminal identity information is sent to the third party system by the data-interface;
The encrypted event argument and the identity information of terminal are used to indicate third party system and are decrypted, and Corresponding data set is obtained according to the event argument after decryption and the identity information of terminal.
It is described in one of the embodiments, to be obtained by the data-interface from third party system according to the event argument Corresponding data set is taken, including:
Server sends the request of data comprising event argument, the data to third party system according to the data-interface Request includes server identification;
Whether the server identification is used to indicate the third party system verifying server legal;
When the server is illegal, the server receives the failure information that third party system returns and is sent to institute State terminal;
When the server legitimacy, the event argument is used to indicate the third party system according to the event argument It obtains corresponding data set and is sent to the server.
In one of the embodiments, the method also includes:
When the data set format that the server is obtained according to the data-interface from the third party system is correct and is When non-empty, then the data set is cached in the server, and the cache invalidation time is set.
In one of the embodiments, the method also includes:
When data-interface response is more than preset duration or responds the number of mistake more than preset times, the service Device obtains corresponding data set according to the event argument from the caching, and is more than when presetting by data-interface response Long or response mistake information is sent to pre-set user mark.
A kind of data processing method, the method includes:
Terminal receiving interface checking command, and the data for obtaining the configuration of data interconnection control are instructed according to the interface check Interface;
The terminal generates interface check request Concurrency according to the interface check instruction and data interface and gives server, The interface check request is used to indicate the server and obtains corresponding data set from third party system and return to the end End;
Associate field is arranged according to the data set of the return in the terminal, and the associate field is used for from the data set Middle acquisition associated data.
A kind of data processing equipment, described device include:
Request receiving module, the data acquisition request initiated for receiving terminal according to trigger control event, the number It include control mark and event argument according to acquisition request;
Data acquisition module obtains data-interface for identifying according to the control, and is passed through according to the event argument The data-interface obtains corresponding data set from third party system;
Data transmission blocks, for obtaining associated data according to the data set and associate field, and by the incidence number According to being sent to terminal.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device realizes following steps when executing the computer program:
The data acquisition request that server receiving terminal is initiated according to trigger control event, the data acquisition request packet Include control mark and event argument;
Server is identified according to the control obtains data-interface, and passes through the data-interface according to the event argument Corresponding data set is obtained from third party system;
Server obtains associated data according to the data set and associate field, and the associated data is sent to end End.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor Following steps are realized when row:
The data acquisition request that server receiving terminal is initiated according to trigger control event, the data acquisition request packet Include control mark and event argument;
Server is identified according to the control obtains data-interface, and passes through the data-interface according to the event argument Corresponding data set is obtained from third party system;
Server obtains associated data according to the data set and associate field, and the associated data is sent to end End.
Above-mentioned data processing method, device, computer equipment and storage medium, server can receive terminal according to triggering What control event was initiated includes the data acquisition request of control mark and event argument, identifies acquisition data according to control and connects Mouthful, and corresponding data set is obtained from third party system by the data-interface according to the event argument, according to data set Associated data is obtained with associate field, and associated data is sent to terminal.Due to can be according to the control of trigger control event Mark obtains data-interface, obtains data set from third party system by data-interface, does not need manually to be imported and safeguarded, Improve the simplicity of third party's data acquisition.
Detailed description of the invention
Fig. 1 is the applied environment figure of data processing method in one embodiment;
Fig. 2 is the flow diagram of data processing method in one embodiment;
Fig. 3 is the flow diagram of user information verifying in one embodiment;
Fig. 4 is the flow diagram of encrypted event parameter and terminal identity information in one embodiment;
Fig. 5 is the flow diagram of authentication server in one embodiment;
Fig. 6 is the flow diagram of data processing method in another embodiment;
Fig. 7 is the timing diagram of data processing method in one embodiment;
Fig. 8 is the timing diagram of data processing method in another embodiment;
Fig. 9 is the timing diagram of data processing method in another embodiment;
Figure 10 is the structural block diagram of data processing equipment in one embodiment;
Figure 11 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Data processing method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, server 104 are communicated by network with terminal 102 and third party system 106.Server 104 receives terminal 102 according to trigger control What event request was initiated includes the data acquisition request of control mark and event argument, and server 104 is obtained according to control mark Data-interface is taken, and corresponding data set, server are obtained from third party system 106 by data-interface according to event argument 104 obtain associated data according to data set and associate field, and associated data is sent to terminal 102.Wherein, terminal 102 can With but be not limited to various personal computers, laptop, smart phone, tablet computer and portable wearable device, take Business device 104 and third party system 106 can be with the server clusters of the either multiple servers compositions of independent server come real It is existing.
In one embodiment, as shown in Fig. 2, providing a kind of data processing method, it is applied in Fig. 1 in this way It is illustrated, includes the following steps for server:
Step 202, the data acquisition request that terminal is initiated according to trigger control event is received, data acquisition request includes Control mark and event argument.
Control refers to the data interconnection control in list.Specifically, the data interconnection control in list is developer in table When setting up designing form in gauge, data interconnection control is dragged to Form Designer, to data interconnection control allocation list single pair It is generated when the data-interface answered.List can be OA (Office Automation, office automation) workflow examination and approval list. OA workflow examination and approval is the process automation platform that can according to need and change, by by OA approval process and third party system such as When budgeting system, financial system, HR (human resources) system of enterprise etc. are integrated, working efficiency can be improved.Event is to accuse The corresponding event of part.Specifically, the corresponding event of control can have multiple.For example, can have in an overtime work examination & approval list Control is examined in corresponding overtime work, and overtime work examination & approval control can correspond to different event, as worked overtime number of days event, this month this month adds Class's date event, accumulative overtime work number event etc. are without being limited thereto.
Data acquisition request can be user by click display screen on button generate, be also possible to user by by The control on touch screen is pressed to generate.Control identifies the unique identification for referring to control, and the corresponding control mark of different controls is not Together.Event corresponding parameter when event argument refers to trigger control event.Specifically, event argument may include request time, Event identifier, user identifier etc. are without being limited thereto.For example, having worked overtime in number of days event in this month, event argument may include triggering The worked overtime time of number of days event, this month, has worked overtime number of days event identifier, the user identifier for initiating overtime work examination & approval etc..Data acquisition Request may include control mark and event argument, can also include list mark, the User Agent of list corresponding to control Enterprise's mark of enterprise where (user agent), list initiate time corresponding timestamp, user etc. is without being limited thereto.
Terminal is triggered the data acquisition request of the control event generation in list by acquisition user and is sent to server, What server can receive terminal transmission includes the data acquisition request of control mark and event argument.
Step 204, it is identified according to control and obtains data-interface, and be from third party by data-interface according to event argument System obtains corresponding data set.
Data-interface refers to the data-interface of third party system.Specifically, data-interface is developer in Form Designer When middle designing form, data interconnection control is dragged to Form Designer, data interconnection control is configured.In a reality It applies in example, the data-interface of different event can be different in control, and server can be identified according to control and event identifier obtains Corresponding data-interface.Data set refers to the set for the data that server is obtained according to event argument.For example, having worked overtime in this month In number of days event, the data set of acquisition may include the data of overtime work date, overtime, overtime work number of days etc., without being limited thereto.
Server obtains the corresponding data-interface of control configured by developer according to control mark, is visited by data-interface It asks third party system, initiates the request of data comprising event argument to third party system, third party system is according in request of data Event argument inquire to obtain corresponding data set, and obtained data set is returned into server after encapsulation process, taken Business device receives the data set that third party system returns.
Step 206, associated data is obtained according to data set and associate field, and associated data is sent to terminal.
Associate field refers to the field obtained required for control event.Specifically, associate field can be developer and match When setting form controls data-interface, after being verified to data-interface according in the data set of return field and form fields into What row map bindings determined.For example, the field of data set can have the overtime work date, add in overtime work of above-mentioned this month number of days event Class's time, overtime work number of days, form fields are date, overtime, then server can be obtained according to associate field from data set Date it is corresponding overtime work the date data, and overtime work number of days data and return to terminal.
Server obtains associated data corresponding with associate field from data set according to associate field, and associated data is sent out Give terminal.The associated data that terminal can be will acquire with demand is shown, can be required for the selection of the associated data of acquisition Associated data be shown.
In above-mentioned data processing method, server by receive terminal according to trigger control event initiated include control The data acquisition request of mark and event argument identifies according to control and obtains data-interface, is from third party according to data-interface System obtains the data set that obtains according to event argument, according to data set and associate field acquisition associated data, and by associated data It is sent to terminal.Data-interface is obtained due to that can identify according to the control of trigger control event, and by data-interface from the Three method, systems obtain data set, do not need manually to be imported and safeguarded, improve the simplicity of third party's data acquisition, and subtract Maintenance cost is lacked.
As shown in figure 3, the data processing method provided in one embodiment further includes:
Step 302, it receives terminal and sends the token and customer parameter carried when data acquisition request, according to token and user The user information of Verification terminal.
After token is terminal to server register account number, what invoking server authorization interface obtained.Specifically, terminal is to clothes Available account and key when device login account of being engaged in, before terminal to server initiates data acquisition request, according to terminal and Key calls authorization interface to initiate token acquisition request, and receives the token returned from server.When token is expired, terminal can Refresh token with request and obtains new token.Customer parameter can be user identifier, and customer parameter can also be enterprise where user Industry mark etc. is without being limited thereto.
Server, can be with invoking server authentication interface, according to data acquisition request when receiving data acquisition request The token and customer parameter of carrying verify the user information of terminal.
Step 304, when the user information verifying of terminal is obstructed out-of-date, then to the information of terminal transmission authentication failed.
The user information verifying of terminal by can be in data acquisition request token failure or expired, is not also possible to count It is mismatched according to the information of customer parameter in acquisition request and authentication center, can also be that customer parameter does not obtain the permission of data Deng.When the user information verifying of terminal is obstructed out-of-date, server sends the information of authentication failed to terminal, and terminal is tested receiving It can update token after demonstrate,proving the information of failure or change after customer parameter and initiate data acquisition request to server again.
Step 306, when the user information of terminal is verified, then execute server identifies acquisition data according to control and connects Mouthful, and the step of corresponding data set is obtained from third party system by data-interface according to event argument.
When the user information of terminal is verified, server is identified by control and obtains data-interface, is joined according to event Number obtains corresponding data set from third party system by data-interface.
It is verified by the token and customer parameter that are carried to data acquisition request, when being verified just according to control Mark obtains data-interface, and the safety of data can be improved.
As shown in figure 4, the data processing method provided in one embodiment further includes:
Step 402, the identity information of event argument and terminal is encrypted, by encrypted event argument and end The identity information at end is sent to third party system by data-interface.
The identity information of terminal may include the user agent (UserAgent) of terminal, request time stamp (timestamp), enterprise where URL (Uniform Resource Locator, uniform resource locator), user identifier, user Industry mark etc. is without being limited thereto.Encryption technology used by server can be asymmetric encryption.Asymmetric encryption needs two are close Key is encrypted and decrypted, the two keys are public-key cryptography (public key, abbreviation public key) and private cipher key (private key, abbreviation private key).Server can obtain the public key of third party system in advance, according to public key to data acquisition The event argument of request and the identity information of terminal are encrypted.
Step 404, encrypted event argument and the identity information of terminal are used to indicate third party system and place are decrypted Reason, and corresponding data set is obtained according to the event argument after decryption and the identity information of terminal.
Third party system can receive server and pass through the data acquisition request that the data-interface configured is sent.Work as server When using asymmetric encryption, place is decrypted according to the event argument of private key pair encryption and the identity information of terminal in third party system Reason, and corresponding data set is obtained according to the event argument of decryption and the identity information of terminal and returns to server.
Using the technology of asymmetric encryption when server calls third party system data-interface, can to avoid server with In third party system integrating process the problem of leaking data, the safety of data is improved.
In one embodiment, a kind of data processing method provided is as shown in figure 5, further include:
Step 502, the request of data comprising event argument, data request packet are sent to third party system according to data-interface Include server identification.
Event argument includes request time, event identifier, user identifier, control mark etc. for inquiring the ginseng of data set Number.Server identification can be the DNS (Domain Name System, domain name) of server, be also possible to the IP of server (Internet Protocol, network protocol) address.Event argument in request of data is the data that server is sent from terminal It is obtained in acquisition request.
Step 504, whether legal server identification is used to indicate third party system authentication server.
Whether third party system can legal according to the server identification authentication server in request of data.Specifically, Three method, systems can determine whether server has access authority according to server identification, and then can also determine whether server has Obtain the permission etc. of data.
Step 506, it when server is illegal, receives the failure information that third party system returns and is sent to terminal.
The illegal permission that can be server and do not access third party system of server, is also possible to server and does not obtain Take the permission etc. of third party system data.When server is illegal, third party system returns to server and obtains data failure Information and terminal is sent to by server.
Step 508, when server legitimacy, event argument is used to indicate third party system and obtains correspondence according to event argument Data set and be sent to server.
When server legitimacy, third party system obtains corresponding data set according to event argument and is sent to server. For example, when data-interface be ask for leave control it is corresponding ask for leave data-interface when, include annual leave residue number of days event in event argument Mark, third party system can be according to the numbers of ask for leave data-interface and annual leave residue number of days event identifier acquisition annual leave residue number of days According to collecting and be sent to server.
In one embodiment, a kind of data processing method provided further includes:When server based on data interface is from The data set format that three method, systems obtain is correct and when being non-empty, then data set is cached in server, and caching is arranged and loses Imitate the time.
Data set format is the formatting of data, including data type and data length.The cache invalidation time can root It is determined according to actual demand.For example, the cache invalidation time can be 2 hours, 1 day, 1 month etc. it is without being limited thereto.Server according to Whether the data set validation data set format that data-interface returns is correct and is non-empty, when data set format mistake or when being empty, Server can call data-interface to initiate request of data to third party system again;When data set format is correct and is non-empty When, data set can be cached in server by server, and the cache invalidation time is arranged.It, can after server buffer data set To obtain corresponding associated data from the data set of caching according to the preconfigured associate field of developer, and return to end End.
By when data set is cached to server, the cache invalidation time is set, can not only guarantee availability of data but also Data buffer storage can be made to fail after the preset cache invalidation time, the data carrying cost of server can be reduced, mentioned simultaneously The safety of high data storage.
In one embodiment, a kind of data processing method provided further includes:When data-interface response is more than default When long or response mistake number is more than preset times, server obtains corresponding data set according to event argument from caching, And data-interface response is sent to pre-set user mark more than the information of preset duration or response mistake.
The mistake that server returns when response mistake refers to calling data-interface.For example, response mistake can be internal clothes Business device mistake (HTTP500) can not find file (HTTP404), forbid accessing (HTTP403), access denied (HTTP401) Deng.Preset duration should be greater than the normal response time of third party system.For example, when the normal response time of third party's response is When within 0.2s, it is without being limited thereto that preset duration can be 0.5s, 1s, 1.5s etc..When the different periods can have different default Length, such as third party system can be greater than the preset duration that third party uses low peak period using the preset duration of peak period.Work as number When being more than preset duration or response mistake according to interface response, server can call data-interface to initiate to third party system again Request of data, when data-interface response be more than preset duration or response mistake number be more than preset times when, server according to Event argument obtains corresponding data set from the data of server buffer, and is more than preset duration or sound by data-interface response The information of mistake is answered to be sent to pre-set user mark.Preset times can for 1 time, it is 2 inferior without being limited thereto.Pre-set user mark can To be the user identifier of server developer, the user identifier for being also possible to the corresponding maintenance personnel of server etc..
As shown in fig. 6, providing a kind of data processing method, it is applied to be said for the terminal in Fig. 1 in this way It is bright, include the following steps:
Step 602, receiving interface checking command, and the data for obtaining the configuration of data interconnection control are instructed according to interface check Interface.
Interface check instruction is the request by being verified to the data-interface of configuration.Interface check instruction can be user It is generated by the button clicked on display screen, is also possible to what user was generated by the control on pressing touch screen.Interface school Testing button or control can be located in data interconnection control, when developer is configured with the data-interface of list in Form Designer Afterwards, it triggers interface check button or control generates interface check instruction, instructed and obtained in data interconnection control according to interface check Corresponding data-interface.Data-interface refers to the data-interface address of third party system.Specifically, data-interface is that developer exists In Form Designer when designing form, data interconnection control is dragged to Form Designer, data interconnection control is configured 's.
Step 604, interface check request Concurrency is generated according to interface check instruction and data interface and gives server, interface Verification request is used to indicate server and obtains corresponding data set from third party system and return to terminal.
Server according to interface check request in data-interface to third party system send request of data, third party system Terminal will be returned to by server after corresponding data set map field object according to request of data.
Step 606, associate field is arranged according to the data set of return, associate field from data set for obtaining incidence number According to.
It include the corresponding data of whole fields of the data-interface in the data set that third party system returns, terminal can root According to the demand of different event, data required for list event are set.For example, when including Business Name word in the data set returned When section, spending amount field, consumption time field, consumer's digital section, association can be arranged in terminal in spending amount event Field be company name field and spending amount field, thus, in list use process, server can be according to default association Field extracts company name field and the corresponding data of spending amount field from data set.
Due to that associate field can be arranged by data interconnection control configuration data interface and according to the data set of return, make It obtains to be obtained according to the data-interface of configuration to third party system in list use process by trigger control event and correspond to Data set, do not need to call the data-interface of third party system by customizing and developing and realize the integrated of data, while side Just data-interface is modified and is expanded, improve the simplicity of data acquisition.
As shown in fig. 7, for the timing diagram of the data processing method in one embodiment.Realize the tool of the data processing method That steps are as follows is described for body:
Firstly, terminal starts Form Designer, the drag operation to data interconnection control is received, data interconnection control position is made In Form Designer, the data-interface of data interconnection control configuration, and data-interface checking command based on the received are received It generates data-interface verification request and is sent to server.
Then, after server receives data-interface verification request, according to the token carried in data-interface verification request It is verified with user information of the customer parameter to terminal, it is obstructed out-of-date when verifying, failure information is returned to terminal;When terminal When user information is verified, server encrypts the corresponding event argument of control in the list and the identity information of terminal After processing, corresponding data-interface is obtained according to control mark, and request of data is sent to third party system by data-interface, Obtain corresponding data set.
Then, after third party system receives the request of data that server is sent, according to the server mark in request of data Whether legal know authentication server, when server is illegal, it is concurrent that server receives the failure information that third party system returns Give terminal;When server legitimacy, third party system is sent out according to the corresponding data set of event argument acquisition and after being packaged Give server.
Then, after server receives the data set of return, the data set format for verifying return is correct and when for non-empty, will The data set of return is sent to terminal.Association required for the field configuration form controls event of terminal data set based on the received Field.And the corresponding data of associate field in data set are shown.
As shown in figure 8, for the timing diagram of the data processing method in one embodiment.Realize the specific steps of this method such as It is lower described:
Firstly, the data acquisition request that server receiving terminal is initiated according to trigger control event, data acquisition request Including control mark and event argument.Control refers to the data interconnection control in list.Specifically, the data interconnection control in list Part is that data interconnection control when designing form, is dragged to Form Designer, to data interconnection in Form Designer by developer It is generated when the corresponding data-interface of control allocation list list.Event refers to the corresponding event of control.Specifically, the corresponding thing of control Part can have multiple.Event corresponding parameter when event argument refers to trigger control event.Specifically, event argument may include Request time, event identifier, user identifier etc. are without being limited thereto.Terminal is generated by obtaining the control event in user's triggering list Data acquisition request and be sent to server, what server can receive terminal transmission includes control mark and event argument Data acquisition request.
Then, server is identified according to control obtains data-interface, and passes through data-interface from third according to event argument Method, system obtains corresponding data set.Data-interface refers to the data-interface address of third party system.Specifically, data-interface is Data interconnection control when designing form, is dragged to Form Designer, to data interconnection control in Form Designer by developer It is configured.Server obtains the corresponding data-interface of control configured by developer according to control mark, and data is called to connect Mouth access third party system, initiates the request of data comprising event argument to third party system, third party system is asked according to data Event argument in asking is inquired to obtain corresponding data set, and data set is returned to server after encapsulation process, service Device receives the data set that third party system returns.
Optionally, before server obtains data-interface, receive when terminal sends data acquisition request the token that carries and Customer parameter, according to token and customer parameter verifying terminal user information, when terminal user information verifying it is obstructed out-of-date, then The information of authentication failed is sent to terminal, when the user information of terminal is verified, then execute server is according to the control Mark obtains data-interface, and obtains the step of corresponding data set from third party system by data-interface according to event argument Suddenly.After token is terminal to server register account number, what invoking server authorization interface obtained.Customer parameter can be user's mark Know, enterprise's mark etc. is without being limited thereto where customer parameter can also be user.By the token that is carried to data acquisition request and Customer parameter is verified, and is just identified according to control when being verified and is obtained data-interface, the safety of data can be improved.
Optionally, after the user information of server authentication terminal, the identity information of event argument and terminal is added The identity information of encrypted event argument and terminal is sent to third party system by data-interface by close processing.After encryption Event argument and the identity information of terminal be used to indicate third party system and be decrypted, and joined according to the event after decryption Several and terminal identity information obtains corresponding data set.Encryption technology used by server can be asymmetric encryption.It is non- Symmetric cryptography needs two keys to be encrypted and decrypted, the two keys are public-key cryptography (public key, referred to as public affairs Key) and private cipher key (private key, abbreviation private key).Server can obtain the public key of third party system in advance, according to public affairs The event argument of data acquisition request and the identity information of terminal is encrypted in key, and third party system is according to private key to adding The identity information of close event argument and terminal is decrypted, and according to the identity information of the event argument of decryption and terminal It obtains corresponding data set and returns to server.
Optionally, before the identity information of encrypted event argument and terminal is decrypted in third party system, Whether legal according to the server identification authentication server for including in request of data, when server is illegal, server is received The failure information of third party system return is simultaneously sent to terminal;When server legitimacy, event argument is used to indicate third party system System obtains corresponding data set according to event argument and is sent to server.
Then, server based on data collection and associate field obtain associated data, and associated data is sent to terminal.It closes Connection field refers to the field obtained required for control event.Specifically, associate field can be developer in configuration form controls When data-interface, according to the field and form fields progress map bindings in the data set of return after being verified to data-interface Determining.Server obtains associated data corresponding with associate field from data set according to associate field, and associated data is sent out Give terminal.The associated data that terminal can be will acquire with demand is shown, can be required for the selection of the associated data of acquisition Associated data be shown.
As shown in figure 9, the timing diagram for the data processing method in one embodiment applied to workflow examination and approval of asking for leave.It realizes The data processing method is shown in specific step is as follows:
Firstly, terminal opens request examination & approval document, the triggering command to vacation amount event in control of asking for leave is received, is generated Vacation amount acquisition request is simultaneously sent to server.It include ask for leave control mark, vacation amount thing in vacation amount acquisition request Part parameter, user identifier etc..
Then, after server receives vacation amount acquisition request, according to the token carried in vacation amount acquisition request It is verified with user information of the customer parameter to terminal, it is obstructed out-of-date when verifying, failure information is returned to terminal;When terminal When user information is verified, after the identity information of vacation amount event argument and terminal is encrypted in server, root Corresponding vacation data-interface is obtained according to control mark of asking for leave, and vacation number is sent to third party system by vacation data-interface According to request, vacation data set corresponding with vacation amount event argument is obtained.
Then, after third party system receives the vacation request of data that server is sent, according in vacation request of data Whether server identification authentication server is legal, and when server is illegal, server receives the failure that third party system returns Information is simultaneously sent to terminal;When server legitimacy, third party system obtains corresponding vacation according to vacation amount event argument Data set is simultaneously sent to server.
Then, after server receives the vacation data set of return, the vacation data set format for verifying return is correct and be When non-empty, the vacation data set of return is cached in server, and is vacation according to the vacation preset associate field of amount event Phase amount field and user identifier obtain the corresponding vacation quota data of user identifier and return to terminal;When interface response timeout Or when response mistake, server can initiate to request again, when request is more than preset times, server is according to vacation amount thing Part parameter, which enters in server buffer, inquires corresponding vacation quota data and returns to terminal, while error message being sent to Pre-set user mark.
Then, after terminal receives the vacation quota data of return, vacation is shown after rendering to vacation quota data Quota data.
For embodiment provided by the present application in the approval process for examining document of asking for leave, approving person checks hair in which can be convenient It rises to ask for leave and examines the vacation quota data of the user of document.It does not need artificially to safeguard approval system, avoids providing yet When batch data introducting interface is called to third party system, business data concentrates on causing data storage when storing in approval system The low problem of safety, and improve the simplicity of data acquisition.
It should be understood that although each step in the flow chart of Fig. 2-9 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-9 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in Figure 10, a kind of data processing equipment is provided, including:Request receiving module 1010, data acquisition module 1020 and data transmission blocks 1030, wherein:
Request receiving module 1010, the data acquisition request initiated for receiving terminal according to trigger control event, number It include control mark and event argument according to acquisition request;
Data acquisition module 1020 obtains data-interface for identifying according to control, and passes through data according to event argument Interface obtains corresponding data set from third party system;
Data transmission blocks 1030 for obtaining associated data according to data set and associate field, and associated data are sent out Give terminal.
In one embodiment, the data processing equipment further includes Data Verification module 1040, Data Verification module 1040, for receiving the token and customer parameter that carry when terminal sends data acquisition request, verify according to token and customer parameter The user information of terminal, when terminal user information verifying it is obstructed out-of-date, then to terminal send authentication failed information, work as terminal User information when being verified, then execute server identifies according to the control and obtains data-interface, and according to event argument The step of obtaining corresponding data set from third party system by data-interface.
In one embodiment, the data processing equipment further includes data encryption module 1050, data encryption module 1050 for being encrypted the identity information of event argument and terminal, by the identity of encrypted event argument and terminal Information is sent to third party system by data-interface, and the identity information of encrypted event argument and terminal is used to indicate third Method, system is decrypted, and obtains corresponding data set according to the event argument after decryption and the identity information of terminal.
In one embodiment, Data Verification module 1040 can be also used for being sent according to data-interface to third party system Request of data comprising event argument, request of data include server identification;Server identification is used to indicate third party system and tests Whether legal demonstrate,prove server;When server is illegal, receives the failure information that third party system returns and be sent to terminal;When When server legitimacy, event argument is used to indicate third party system and obtains corresponding data set according to event argument and be sent to clothes Business device.
In one embodiment, data acquisition module 1020 can be also used for working as server based on data interface from third party The data set format that system obtains is correct and when being non-empty, then when data set being cached in server, and cache invalidation is arranged Between.
In one embodiment, data transmission blocks 1030 can be also used for when data-interface response be more than preset duration or When the number of response mistake is more than preset times, server obtains corresponding data set according to the event argument from caching, And data-interface response is sent to pre-set user mark more than the information of preset duration or response mistake.
In one embodiment, a kind of data processing equipment is provided, including:Interface obtains module, data acquisition module. Wherein:
Interface obtains module and is used for receiving interface checking command, and instructs acquisition data interconnection control to match according to interface check The data-interface set.
Data acquisition module, which is used to generate interface check request Concurrency according to interface check instruction and data interface, gives clothes Business device, interface check request are used to indicate server and obtain corresponding data set from third party system and return to terminal.
Data acquisition module is also used to that associate field is arranged according to the data set of return, and associate field is used for from data set Obtain associated data.
Specific about data processing equipment limits the restriction that may refer to above for data processing method, herein not It repeats again.Modules in above-mentioned data processing equipment can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in figure 11.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is used for the third party system data of memory buffers.The network interface of the computer equipment is used for and outside Terminal passes through network connection communication.To realize a kind of data processing method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 11, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor realize following steps when executing computer program:
The data acquisition request that terminal is initiated according to trigger control event is received, data acquisition request includes control mark And event argument;
It is identified according to control and obtains data-interface, and data-interface is passed through from third party system acquisition pair according to event argument The data set answered;
Associated data is obtained according to data set and associate field, and associated data is sent to terminal.
In one embodiment, following steps are also realized when processor executes computer program:
It receives terminal and sends the token and customer parameter carried when data acquisition request, verified according to token and customer parameter The user information of terminal;
When the user information verifying of terminal is obstructed out-of-date, then to the information of terminal transmission authentication failed;
When the user information of terminal is verified, then execute server identifies according to the control and obtains data-interface, And the step of corresponding data set is obtained from third party system by data-interface according to event argument.
In one embodiment, following steps are also realized when processor executes computer program:
The identity information of event argument and terminal is encrypted, by the identity of encrypted event argument and terminal Information is sent to third party system by data-interface;
Encrypted event argument and the identity information of terminal are used to indicate third party system and are decrypted, and according to The identity information of event argument and terminal after decryption obtains corresponding data set.
In one embodiment, following steps are also realized when processor executes computer program:
The request of data comprising event argument is sent to third party system according to data-interface, request of data includes server Mark;
Whether server identification is used to indicate third party system authentication server legal;
When server is illegal, receives the failure information that third party system returns and be sent to terminal;
When server legitimacy, event argument is used to indicate third party system and obtains corresponding data set according to event argument And it is sent to server.
In one embodiment, following steps are also realized when processor executes computer program:
When server based on data interface is correct from the data set format that third party system obtains and when being non-empty, then will count According to set cache into server, and the cache invalidation time is set.
In one embodiment, following steps are also realized when processor executes computer program:
When data-interface response is more than preset duration or responds the number of mistake more than preset times, server is according to institute It states event argument and obtains corresponding data set from caching, and be more than the letter of preset duration or response mistake by data-interface response Breath is sent to pre-set user mark.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor realize following steps when executing computer program:
Receiving interface checking command, and the data-interface for obtaining the configuration of data interconnection control is instructed according to interface check;
Interface check request Concurrency, which is generated, according to interface check instruction and data interface gives server, interface check request Server is used to indicate to obtain corresponding data set from third party system and return to terminal;
Associate field is set according to the data set of return, associate field from data set for obtaining associated data.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:
The data acquisition request that terminal is initiated according to trigger control event is received, data acquisition request includes control mark And event argument;
It is identified according to control and obtains data-interface, and data-interface is passed through from third party system acquisition pair according to event argument The data set answered;
Associated data is obtained according to data set and associate field, and associated data is sent to terminal.
In one embodiment, following steps are also realized when computer program is executed by processor:
It receives terminal and sends the token and customer parameter carried when data acquisition request, verified according to token and customer parameter The user information of terminal;
When the user information verifying of terminal is obstructed out-of-date, then to the information of terminal transmission authentication failed;
When the user information of terminal is verified, then execute server identifies according to the control and obtains data-interface, And the step of corresponding data set is obtained from third party system by data-interface according to event argument.
In one embodiment, following steps are also realized when computer program is executed by processor:
The identity information of event argument and terminal is encrypted, by the identity of encrypted event argument and terminal Information is sent to third party system by data-interface;
Encrypted event argument and the identity information of terminal are used to indicate third party system and are decrypted, and according to The identity information of event argument and terminal after decryption obtains corresponding data set.
In one embodiment, following steps are also realized when computer program is executed by processor:
The request of data comprising event argument is sent to third party system according to data-interface, request of data includes server Mark;
Whether server identification is used to indicate third party system authentication server legal;
When server is illegal, receives the failure information that third party system returns and be sent to terminal;
When server legitimacy, event argument is used to indicate third party system and obtains corresponding data set according to event argument And it is sent to server.
In one embodiment, following steps are also realized when computer program is executed by processor:
When server based on data interface is correct from the data set format that third party system obtains and when being non-empty, then will count According to set cache into server, and the cache invalidation time is set.
In one embodiment, following steps are also realized when computer program is executed by processor:
When data-interface response is more than preset duration or responds the number of mistake more than preset times, server is according to institute It states event argument and obtains corresponding data set from caching, and be more than the letter of preset duration or response mistake by data-interface response Breath is sent to pre-set user mark.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:
Receiving interface checking command, and the data-interface for obtaining the configuration of data interconnection control is instructed according to interface check;
Interface check request Concurrency, which is generated, according to interface check instruction and data interface gives server, interface check request Server is used to indicate to obtain corresponding data set from third party system and return to terminal;
Associate field is set according to the data set of return, associate field from data set for obtaining associated data.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, database or other media used in each embodiment provided herein, may each comprise Non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of data processing method, the method includes:
The data acquisition request that server receiving terminal is initiated according to trigger control event, the data acquisition request include control Part mark and event argument;
Server is identified according to the control obtains data-interface, and according to the event argument by the data-interface from the Three method, systems obtain corresponding data set;
Server obtains associated data according to the data set and associate field, and the associated data is sent to terminal.
2. according to the method described in claim 1, the server is identified according to the control obtains data-interface, and according to institute It states event argument and passes through the data-interface before the corresponding data set of third party system acquisition, further include:
Server receives the terminal and sends the token and customer parameter carried when data acquisition request, according to the token and use The user information of family Verification terminal;
When the user information verifying of the terminal is obstructed out-of-date, then to the information of terminal transmission authentication failed;
When the user information of the terminal is verified, then executes the server and connect according to control mark acquisition data Mouthful, and the step of corresponding data set is obtained from third party system by the data-interface according to the event argument.
3. according to the method described in claim 1, the method also includes:
The identity information of the event argument and the terminal is encrypted in server, by encrypted event argument and The identity information of terminal is sent to the third party system by the data-interface;
The encrypted event argument and the identity information of terminal are used to indicate third party system and are decrypted, and according to The event argument after decryption and the identity information of terminal obtain corresponding data set.
4. according to the method described in claim 1, described be from third party by the data-interface according to the event argument System obtains corresponding data set, including:
Server sends the request of data comprising event argument, the request of data to third party system according to the data-interface Including server identification;
Whether the server identification is used to indicate the third party system verifying server legal;
When the server is illegal, the server receives the failure information that third party system returns and is sent to the end End;
When the server legitimacy, the event argument is used to indicate the third party system and is obtained according to the event argument Corresponding data set is simultaneously sent to the server.
5. according to the method described in claim 1, the method also includes:
When data set format that the server is obtained from the third party system according to the data-interface is correct and is non-empty When, then the data set is cached in the server, and the cache invalidation time is set.
6. according to the method described in claim 5, the method also includes:
When data-interface response is more than preset duration or responds the number of mistake more than preset times, the server root Obtain corresponding data set from the caching according to the event argument, and by data-interface response be more than preset duration or The information of response mistake is sent to pre-set user mark.
7. a kind of data processing method, the method includes:
Terminal receiving interface checking command, and instruct the data for obtaining the configuration of data interconnection control to connect according to the interface check Mouthful;
The terminal generates interface check request Concurrency according to the interface check instruction and data interface and gives server, described Interface check request is used to indicate the server and obtains corresponding data set from third party system and return to the terminal;
Associate field is arranged according to the data set of the return in the terminal, and the associate field from the data set for obtaining Take associated data.
8. a kind of data processing equipment, which is characterized in that described device includes:
Request receiving module, the data acquisition request initiated for receiving terminal according to trigger control event, the data obtain Taking request includes control mark and event argument;
Data acquisition module obtains data-interface for identifying according to the control, and according to the event argument described in Data-interface obtains corresponding data set from third party system;
Data transmission blocks for obtaining associated data according to the data set and associate field, and the associated data are sent out Give terminal.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201810486132.8A 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium Active CN108833355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810486132.8A CN108833355B (en) 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810486132.8A CN108833355B (en) 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108833355A true CN108833355A (en) 2018-11-16
CN108833355B CN108833355B (en) 2020-12-29

Family

ID=64148084

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810486132.8A Active CN108833355B (en) 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108833355B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109828908A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Interface testing parameter encryption method, device, electronic equipment and storage medium
CN109857479A (en) * 2018-12-14 2019-06-07 平安科技(深圳)有限公司 Interface data processing method, device, computer equipment and storage medium
CN110149356A (en) * 2019-02-28 2019-08-20 深圳点猫科技有限公司 Method and device is uniformly processed in a kind of network request abnormality
CN110650186A (en) * 2019-09-06 2020-01-03 上海陆家嘴国际金融资产交易市场股份有限公司 Interface calling method and device, computer equipment and storage medium
CN110855656A (en) * 2019-11-06 2020-02-28 云深互联(北京)科技有限公司 Plug-in flow proxy method, device and system capable of realizing application server protection
CN110888901A (en) * 2019-10-22 2020-03-17 浙江大搜车软件技术有限公司 System management method, device, computer equipment and storage medium
CN111046245A (en) * 2019-12-11 2020-04-21 杭州趣链科技有限公司 Multi-source heterogeneous data source fusion calculation method, system, equipment and storage medium
CN111104187A (en) * 2019-10-28 2020-05-05 广州朗国电子科技有限公司 Interface aggregation method and device based on interface aggregation server
CN111385123A (en) * 2018-12-29 2020-07-07 广州市百果园信息技术有限公司 WEB service distributed intelligent monitoring method, device, computer equipment and storage medium
CN111459475A (en) * 2020-03-30 2020-07-28 北京三快在线科技有限公司 Interface calling method, interface docking configuration method, device, equipment and medium
CN112199281A (en) * 2020-09-30 2021-01-08 中国平安财产保险股份有限公司 Data processing method and device, terminal equipment and readable storage medium
CN112464201A (en) * 2020-11-02 2021-03-09 中国建设银行股份有限公司 Token automatic issuing system, method and storage medium
CN112491101A (en) * 2019-09-12 2021-03-12 北京国双科技有限公司 Control method and system of storage battery pack, storage medium and electronic device
WO2021082824A1 (en) * 2019-10-28 2021-05-06 腾讯科技(深圳)有限公司 Data processing method, device, and computer-readable storage medium
CN113364890A (en) * 2021-06-30 2021-09-07 北京奇艺世纪科技有限公司 Data processing method, device, network equipment and medium
CN115168354A (en) * 2022-07-11 2022-10-11 广州市玄武无线科技股份有限公司 Integrated processing method and device for mobile terminal event stream

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007067349A1 (en) * 2005-12-06 2007-06-14 Boncle, Inc. Single one-time password token with single pin for access to multiple providers
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing
CN103593443A (en) * 2013-11-18 2014-02-19 南京新模式软件集成有限公司 Method for electronic file metadata expansion
CN104978622A (en) * 2014-04-11 2015-10-14 携程计算机技术(上海)有限公司 Business process management system and method
US20160080530A1 (en) * 2013-02-22 2016-03-17 Dell Products L.P. Network communication protocol processing optimization system
CN105553920A (en) * 2014-10-29 2016-05-04 腾讯科技(深圳)有限公司 Data interaction method, apparatus, and system
CN105718540A (en) * 2016-01-18 2016-06-29 北京京东尚科信息技术有限公司 Data loading method and apparatus
CN106293743A (en) * 2016-08-11 2017-01-04 上海泛微网络科技股份有限公司 A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue
CN107426266A (en) * 2017-03-14 2017-12-01 阿里巴巴集团控股有限公司 Data processing method and server
CN107679413A (en) * 2017-09-18 2018-02-09 苏州市卫生计生统计信息中心 A kind of health care data-sharing systems and data sharing method
CN107977277A (en) * 2017-12-21 2018-05-01 金蝶软件(中国)有限公司 The method, apparatus and computer equipment of third party system are integrated in ERP system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007067349A1 (en) * 2005-12-06 2007-06-14 Boncle, Inc. Single one-time password token with single pin for access to multiple providers
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing
US20160080530A1 (en) * 2013-02-22 2016-03-17 Dell Products L.P. Network communication protocol processing optimization system
CN103593443A (en) * 2013-11-18 2014-02-19 南京新模式软件集成有限公司 Method for electronic file metadata expansion
CN104978622A (en) * 2014-04-11 2015-10-14 携程计算机技术(上海)有限公司 Business process management system and method
CN105553920A (en) * 2014-10-29 2016-05-04 腾讯科技(深圳)有限公司 Data interaction method, apparatus, and system
CN105718540A (en) * 2016-01-18 2016-06-29 北京京东尚科信息技术有限公司 Data loading method and apparatus
CN106293743A (en) * 2016-08-11 2017-01-04 上海泛微网络科技股份有限公司 A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue
CN107426266A (en) * 2017-03-14 2017-12-01 阿里巴巴集团控股有限公司 Data processing method and server
CN107679413A (en) * 2017-09-18 2018-02-09 苏州市卫生计生统计信息中心 A kind of health care data-sharing systems and data sharing method
CN107977277A (en) * 2017-12-21 2018-05-01 金蝶软件(中国)有限公司 The method, apparatus and computer equipment of third party system are integrated in ERP system

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857479A (en) * 2018-12-14 2019-06-07 平安科技(深圳)有限公司 Interface data processing method, device, computer equipment and storage medium
CN109828908A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Interface testing parameter encryption method, device, electronic equipment and storage medium
CN111385123A (en) * 2018-12-29 2020-07-07 广州市百果园信息技术有限公司 WEB service distributed intelligent monitoring method, device, computer equipment and storage medium
CN110149356A (en) * 2019-02-28 2019-08-20 深圳点猫科技有限公司 Method and device is uniformly processed in a kind of network request abnormality
CN110650186A (en) * 2019-09-06 2020-01-03 上海陆家嘴国际金融资产交易市场股份有限公司 Interface calling method and device, computer equipment and storage medium
CN112491101A (en) * 2019-09-12 2021-03-12 北京国双科技有限公司 Control method and system of storage battery pack, storage medium and electronic device
CN110888901B (en) * 2019-10-22 2023-07-04 浙江大搜车软件技术有限公司 System management method, device, computer equipment and storage medium
CN110888901A (en) * 2019-10-22 2020-03-17 浙江大搜车软件技术有限公司 System management method, device, computer equipment and storage medium
CN111104187A (en) * 2019-10-28 2020-05-05 广州朗国电子科技有限公司 Interface aggregation method and device based on interface aggregation server
WO2021082824A1 (en) * 2019-10-28 2021-05-06 腾讯科技(深圳)有限公司 Data processing method, device, and computer-readable storage medium
CN110855656B (en) * 2019-11-06 2022-07-12 云深互联(北京)科技有限公司 Plug-in flow proxy method, device and system capable of realizing application server protection
CN110855656A (en) * 2019-11-06 2020-02-28 云深互联(北京)科技有限公司 Plug-in flow proxy method, device and system capable of realizing application server protection
CN111046245A (en) * 2019-12-11 2020-04-21 杭州趣链科技有限公司 Multi-source heterogeneous data source fusion calculation method, system, equipment and storage medium
CN111459475A (en) * 2020-03-30 2020-07-28 北京三快在线科技有限公司 Interface calling method, interface docking configuration method, device, equipment and medium
CN111459475B (en) * 2020-03-30 2023-05-16 北京三快在线科技有限公司 Interface calling method, interface docking configuration method, device, equipment and medium
CN112199281A (en) * 2020-09-30 2021-01-08 中国平安财产保险股份有限公司 Data processing method and device, terminal equipment and readable storage medium
CN112464201A (en) * 2020-11-02 2021-03-09 中国建设银行股份有限公司 Token automatic issuing system, method and storage medium
CN112464201B (en) * 2020-11-02 2024-03-01 中国建设银行股份有限公司 Automatic token issuing system, method and storage medium
CN113364890A (en) * 2021-06-30 2021-09-07 北京奇艺世纪科技有限公司 Data processing method, device, network equipment and medium
CN113364890B (en) * 2021-06-30 2022-10-28 北京奇艺世纪科技有限公司 Data processing method, device, network equipment and medium
CN115168354A (en) * 2022-07-11 2022-10-11 广州市玄武无线科技股份有限公司 Integrated processing method and device for mobile terminal event stream

Also Published As

Publication number Publication date
CN108833355B (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN108833355A (en) Data processing method, device, computer equipment and computer readable storage medium
EP3618394A1 (en) Data sharing method, client, server, computing device, and storage medium
CN108804336A (en) Interactive system test method, device, computer equipment and storage medium
CN108268375A (en) Applied program testing method, device, computer equipment and storage medium
CN110365670A (en) Blacklist sharing method, device, computer equipment and storage medium
CN111241555B (en) Access method and device for simulating user login, computer equipment and storage medium
JP2008276756A (en) Web services intermediary
CN110213223A (en) Business management method, device, system, computer equipment and storage medium
CN110489393A (en) Promise breaking information query method, device, computer equipment and storage medium
CN110083384B (en) Application programming interface creating method and device
US20190097811A1 (en) Open, secure electronic signature system and associated method
CN110135175A (en) Information processing, acquisition methods, device, equipment and medium based on block chain
CN109697370A (en) Database data encipher-decipher method, device, computer equipment and storage medium
CN109088812A (en) Information processing method, device, computer equipment and storage medium
CN110442654A (en) Promise breaking information query method, device, computer equipment and storage medium
CN112446780A (en) Account management method and device, computer equipment and storage medium
CN110163658A (en) Virtual resource data processing method, device, computer equipment and storage medium
CN111211911A (en) Collaborative signature method, device, equipment and system
CN109474600A (en) A kind of account binding method, system, device and its equipment
CN114491436A (en) Contract signing method and device, electronic equipment and storage medium
CN110445757A (en) Personnel information encryption method, device, computer equipment and storage medium
CN111339177A (en) SAP platform-based data export method and system
CN109040284B (en) Information display and information push method, device, equipment and storage medium
CN112241544B (en) Service system, access method, access device, computer equipment and storage medium
CN112528268B (en) Cross-channel applet login management method and device and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant