CN108833355B - Data processing method, data processing device, computer equipment and computer readable storage medium - Google Patents

Data processing method, data processing device, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN108833355B
CN108833355B CN201810486132.8A CN201810486132A CN108833355B CN 108833355 B CN108833355 B CN 108833355B CN 201810486132 A CN201810486132 A CN 201810486132A CN 108833355 B CN108833355 B CN 108833355B
Authority
CN
China
Prior art keywords
data
server
terminal
party system
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810486132.8A
Other languages
Chinese (zh)
Other versions
CN108833355A (en
Inventor
朱武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunzhijia Network Co ltd
Original Assignee
Shenzhen Yunzhijia Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunzhijia Network Co ltd filed Critical Shenzhen Yunzhijia Network Co ltd
Priority to CN201810486132.8A priority Critical patent/CN108833355B/en
Publication of CN108833355A publication Critical patent/CN108833355A/en
Application granted granted Critical
Publication of CN108833355B publication Critical patent/CN108833355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The application relates to a data processing method, a data processing device, computer equipment and a computer readable storage medium. The method comprises the following steps: the server receives a data acquisition request initiated by the terminal according to a trigger control event, the data acquisition request comprises a control identification and an event parameter, the server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter, and the server acquires associated data according to the data set and the associated field and sends the associated data to the terminal. The method can improve the convenience of third-party data acquisition.

Description

Data processing method, data processing device, computer equipment and computer readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, an apparatus, a computer device, and a computer-readable storage medium.
Background
With the development of computer technology, OA (office automation) office automation is becoming more and more common, and enterprises can implement automation of approval process through an OA process approval system. By integrating the data of the business system in the approval process, the workload of character input in the approval process can be reduced, and input errors and the like can be prevented.
In the prior art, in an OA process approval system, a data information maintenance management interface is provided, so that a system manager can manually input or import third-party system data in batch, and the problem of complex data acquisition operation exists.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a data processing method, an apparatus, a computer device, and a computer storage medium, which can easily acquire third-party system data.
A method of data processing, the method comprising:
the method comprises the steps that a server receives a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter;
the server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter;
and the server acquires the associated data according to the data set and the associated field and sends the associated data to the terminal.
In one embodiment, before the server obtains a data interface according to the control identifier and obtains a corresponding data set from a third-party system through the data interface according to the event parameter, the method further includes:
the server receives a token and user parameters carried by the terminal when sending a data acquisition request, and verifies the user information of the terminal according to the token and the user parameters;
when the user information of the terminal is not verified, sending verification failure information to the terminal;
and when the user information of the terminal passes the verification, executing the steps that the server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter.
In one embodiment, the method further comprises:
the server encrypts the event parameters and the identity information of the terminal and sends the encrypted event parameters and the encrypted identity information of the terminal to the third-party system through the data interface;
and the encrypted event parameter and the identity information of the terminal are used for indicating a third-party system to perform decryption processing, and acquiring a corresponding data set according to the decrypted event parameter and the identity information of the terminal.
In one embodiment, the obtaining a corresponding data set from a third-party system through the data interface according to the event parameter includes:
the server sends a data request containing event parameters to a third-party system according to the data interface, wherein the data request comprises a server identifier;
the server identification is used for indicating a third-party system to verify whether the server is legal or not;
when the server is illegal, the server receives failure information returned by a third-party system and sends the failure information to the terminal;
and when the server is legal, the event parameter is used for indicating the third-party system to acquire a corresponding data set according to the event parameter and send the data set to the server.
In one embodiment, the method further comprises:
and when the format of the data set acquired by the server from the third-party system according to the data interface is correct and is not empty, caching the data set into the server, and setting the cache failure time.
In one embodiment, the method further comprises:
and when the response of the data interface exceeds the preset time or the response error exceeds the preset times, the server acquires a corresponding data set from the cache according to the event parameter and sends the information that the response of the data interface exceeds the preset time or the response error to a preset user identifier.
A method of data processing, the method comprising:
the terminal receives an interface checking instruction and acquires a data interface configured by the data interconnection control according to the interface checking instruction;
the terminal generates an interface verification request according to the interface verification instruction and the data interface and sends the interface verification request to the server, wherein the interface verification request is used for indicating the server to obtain a corresponding data set from a third-party system and return the data set to the terminal;
and the terminal sets a correlation field according to the returned data set, wherein the correlation field is used for acquiring correlation data from the data set.
A data processing apparatus, the apparatus comprising:
the request receiving module is used for receiving a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter;
the data acquisition module is used for acquiring a data interface according to the control identification and acquiring a corresponding data set from a third-party system through the data interface according to the event parameter;
and the data sending module is used for acquiring the associated data according to the data set and the associated field and sending the associated data to the terminal.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
the method comprises the steps that a server receives a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter;
the server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter;
and the server acquires the associated data according to the data set and the associated field and sends the associated data to the terminal.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
the method comprises the steps that a server receives a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter;
the server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter;
and the server acquires the associated data according to the data set and the associated field and sends the associated data to the terminal.
According to the data processing method, the data processing device, the computer equipment and the storage medium, the server can receive a data acquisition request which is initiated by the terminal according to a trigger control event and comprises a control identifier and an event parameter, acquire the data interface according to the control identifier, acquire the corresponding data set from the third-party system through the data interface according to the event parameter, acquire the associated data according to the data set and the associated field, and send the associated data to the terminal. Because the data interface can be obtained according to the control identification triggering the control event, and the data set is obtained from the third-party system through the data interface, manual importing and maintenance are not needed, and the simplicity of third-party data obtaining is improved.
Drawings
FIG. 1 is a diagram of an application environment of a data processing method in one embodiment;
FIG. 2 is a flow diagram illustrating a data processing method according to one embodiment;
FIG. 3 is a schematic diagram illustrating a process for user information verification in one embodiment;
FIG. 4 is a flow diagram illustrating encryption of event parameters and terminal identity information in one embodiment;
FIG. 5 is a schematic flow diagram of an authentication server in one embodiment;
FIG. 6 is a flow chart illustrating a data processing method according to another embodiment;
FIG. 7 is a timing diagram of a data processing method in one embodiment;
FIG. 8 is a timing diagram of a data processing method according to another embodiment;
FIG. 9 is a timing diagram of a data processing method in yet another embodiment;
FIG. 10 is a block diagram showing the structure of a data processing apparatus according to an embodiment;
FIG. 11 is a diagram illustrating an internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The data processing method provided by the application can be applied to the application environment shown in fig. 1. Wherein the server 104 communicates with the terminal 102 and the third party system 106 via a network. The server 104 receives a data acquisition request which is initiated by the terminal 102 according to the trigger control event request and comprises a control identifier and an event parameter, the server 104 acquires a data interface according to the control identifier and acquires a corresponding data set from the third-party system 106 through the data interface according to the event parameter, and the server 104 acquires associated data according to the data set and the associated field and sends the associated data to the terminal 102. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 and the third-party system 106 may be implemented by an independent server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a data processing method is provided, which is described by taking the application of the method to the server in fig. 1 as an example, and includes the following steps:
step 202, receiving a data acquisition request initiated by the terminal according to the trigger control event, wherein the data acquisition request comprises a control identification and an event parameter.
The control refers to a data interconnection control in the form. Specifically, the data interconnection control in the form is generated when a developer drags the data interconnection control to the form designer and configures a data interface corresponding to the form for the data interconnection control when the developer designs the form in the form designer. The form may be an OA (Office Automation) process approval form. The OA process approval is a process automation platform that can be changed as needed, and when the OA process approval is integrated with a third-party system such as a budget system, a financial system, and an HR (human resource) system of an enterprise, the work efficiency can be improved. The event refers to the event corresponding to the control. Specifically, there may be a plurality of events corresponding to the control. For example, there may be a corresponding overtime approval control in an overtime approval form, and the overtime approval control may correspond to different events, such as an event of overtime days in the month, an event of overtime dates in the month, an event of cumulative overtime times, and the like.
The data acquisition request can be generated by clicking a button on the display screen by the user or can be generated by pressing a control on the touch screen by the user. The control identification refers to the unique identification of the control, and the control identifications corresponding to different controls are different. The event parameter refers to a parameter corresponding to an event when the control event is triggered. Specifically, the event parameter may include, but is not limited to, a request time, an event identification, a user identification, and the like. For example, in the event of the number of overtime days in the month, the event parameters may include the time that the event of the number of overtime days was triggered, the identification of the event of the number of overtime days in the month, the identification of the user initiating the overtime examination, and the like. The data acquisition request may include a control identifier and an event parameter, and may further include a form identifier of a form corresponding to the control, a User Agent (User Agent), a timestamp corresponding to a form initiation time, an enterprise identifier of an enterprise where the User is located, and the like.
The terminal acquires a data acquisition request generated by a control event in a user trigger form and sends the data acquisition request to the server, and the server can receive the data acquisition request which is sent by the terminal and comprises a control identifier and an event parameter.
And 204, acquiring a data interface according to the control identification, and acquiring a corresponding data set from a third-party system through the data interface according to the event parameter.
The data interface refers to a data interface of a third-party system. Specifically, the data interface is used for dragging the data interconnection control to the form designer and configuring the data interconnection control when a developer designs a form in the form designer. In one embodiment, the data interfaces of different events in the control may be different, and the server may obtain the corresponding data interface according to the control identifier and the event identifier. A data set refers to a collection of data that a server obtains from event parameters. For example, in the overtime days event of the month, the acquired data set may include data of overtime dates, overtime times, overtime days, and the like, without being limited thereto.
The server acquires a data interface corresponding to the control configured by the developer according to the control identification, accesses a third-party system through the data interface, initiates a data request containing event parameters to the third-party system, the third-party system queries according to the event parameters in the data request to obtain a corresponding data set, packages and returns the obtained data set to the server, and the server receives the data set returned by the third-party system.
And step 206, acquiring the associated data according to the data set and the associated field, and sending the associated data to the terminal.
The associated field refers to a field that the control event needs to acquire. Specifically, the associated field may be determined by a developer, when configuring the form control data interface, performing mapping binding between a field in the returned data set and a form field after verifying the data interface. For example, in the above-mentioned monthly shift-in-time days event, the fields of the data set may include shift-in-time date, shift-in-time, and shift-in-time days, and the fields of the form are date and shift-in-time, then the server may obtain the data of the shift-in-time date corresponding to the date and the data of the shift-in-time days from the data set according to the associated fields and return the data to the terminal.
And the server acquires the associated data corresponding to the associated field from the data set according to the associated field and sends the associated data to the terminal. The terminal can display the acquired associated data as required, and can select the required associated data from the acquired associated data for display.
In the data processing method, the server obtains the data interface according to the control identification by receiving a data obtaining request which is initiated by the terminal according to the trigger control event and comprises the control identification and the event parameter, obtains the data set obtained according to the event parameter from the third-party system according to the data interface, obtains the associated data according to the data set and the associated field, and sends the associated data to the terminal. The data interface can be obtained according to the control identification triggering the control event, and the data set is obtained from the third-party system through the data interface, so that manual importing and maintenance are not needed, the simplicity of third-party data obtaining is improved, and the maintenance cost is reduced.
As shown in fig. 3, the data processing method provided in one embodiment further includes:
step 302, receiving a token and user parameters carried by the terminal when sending the data acquisition request, and verifying the user information of the terminal according to the token and the user parameters.
The token is obtained by calling a server authentication interface after the terminal registers an account number with the server. Specifically, the terminal may obtain the account and the secret key when registering the account with the server, and before initiating the data acquisition request to the server, the terminal invokes the authentication interface to initiate the token acquisition request according to the terminal and the secret key, and receives the token returned from the server. When the token expires, the terminal may request a refresh token to obtain a new token. The user parameter may be a user identifier, an enterprise identifier where the user is located, and the like.
When the server receives the data acquisition request, the server can call a server authentication interface, and the user information of the terminal is verified according to the token and the user parameters carried by the data acquisition request.
And step 304, when the user information of the terminal is not verified, sending information of verification failure to the terminal.
The user information verification of the terminal can be failure or overdue of a token in the data acquisition request, or mismatching of user parameters in the data acquisition request and information of the authentication center, or the condition that the user parameters do not have the authority of acquiring data. When the user information of the terminal is not verified, the server sends verification failure information to the terminal, and the terminal can update the token or change the user parameters and then initiate a data acquisition request to the server again after receiving the verification failure information.
And step 306, when the user information of the terminal passes the verification, executing the step that the server acquires the data interface according to the control identification and acquires the corresponding data set from the third-party system through the data interface according to the event parameter.
And when the user information of the terminal passes the verification, the server acquires the data interface through the control identification and acquires the corresponding data set from the third-party system through the data interface according to the event parameter.
The token and the user parameters carried by the data acquisition request are verified, and the data interface is acquired according to the control identification when the verification is passed, so that the data security can be improved.
As shown in fig. 4, the data processing method provided in one embodiment further includes:
and 402, encrypting the event parameters and the identity information of the terminal, and sending the encrypted event parameters and the encrypted identity information of the terminal to a third-party system through a data interface.
The identity information of the terminal may include, but is not limited to, a user agent (user) of the terminal, a request timestamp (timestamp), a URL (Uniform Resource Locator), a user identifier, an enterprise identifier where the user is located, and the like. The encryption technique employed by the server may be asymmetric encryption. Asymmetric encryption requires two keys for encryption and decryption, which are a public key and a private key. The server may obtain a public key of the third-party system in advance, and encrypt the event parameter of the data obtaining request and the identity information of the terminal according to the public key.
And step 404, the encrypted event parameter and the identity information of the terminal are used for instructing a third-party system to perform decryption processing, and a corresponding data set is obtained according to the decrypted event parameter and the identity information of the terminal.
The third-party system may receive a data acquisition request sent by the server through the configured data interface. When the server adopts asymmetric encryption, the third-party system decrypts the encrypted event parameters and the identity information of the terminal according to the private key, and acquires corresponding data sets according to the decrypted event parameters and the identity information of the terminal and returns the data sets to the server.
The server adopts the asymmetric encryption technology when calling the data interface of the third-party system, so that the problem of data leakage in the integration process of the server and the third-party system can be avoided, and the data security is improved.
In an embodiment, a data processing method is provided as shown in fig. 5, further including:
step 502, sending a data request containing event parameters to a third-party system according to a data interface, wherein the data request comprises a server identifier.
The event parameters comprise request time, event identification, user identification, control identification and other parameters for querying the data set. The server identifier may be a DNS (Domain Name System) of the server or an IP (Internet Protocol) address of the server. The event parameter in the data request is acquired by the server from the data acquisition request sent by the terminal.
The server identification is used to indicate to the third party system whether the authentication server is legitimate, step 504.
The third party system may verify that the server is legitimate based on the server identification in the data request. Specifically, the third-party system may determine whether the server has an access right according to the server identifier, and further may determine whether the server has a right to acquire data, and the like.
And step 506, receiving failure information returned by the third-party system and sending the failure information to the terminal when the server is illegal.
The server may not be legal, and the server may not have the right to access the third-party system, or the server may not have the right to acquire the data of the third-party system. And when the server is illegal, the third-party system returns information of data acquisition failure to the server and sends the information to the terminal through the server.
And step 508, when the server is legal, the event parameter is used for indicating the third-party system to acquire a corresponding data set according to the event parameter and send the data set to the server.
And when the server is legal, the third-party system acquires the corresponding data set according to the event parameter and sends the data set to the server. For example, when the data interface is a leave-asking data interface corresponding to the leave-asking control, the event parameter includes an annual leave remaining number event identifier, and the third-party system may acquire a data set of annual leave remaining number of days according to the leave-asking data interface and the annual leave remaining number event identifier and send the data set to the server.
In one embodiment, a data processing method is provided, which further includes: and when the format of the data set acquired by the server from the third-party system according to the data interface is correct and is not empty, caching the data set in the server, and setting the cache failure time.
The data set format is the formatting of the data, including the data type and data length. The cache miss time may be determined according to actual requirements. For example, the cache expiration time may be, but is not limited to, 2 hours, 1 day, 1 month, and the like. The server verifies whether the format of the data set is correct and is not null according to the data set returned by the data interface, and when the format of the data set is wrong or null, the server can call the data interface again to initiate a data request to a third-party system; when the data set format is correct and not empty, the server can cache the data set into the server and set the cache expiration time. After the server caches the data set, the corresponding associated data can be obtained from the cached data set according to the associated field configured in advance by the developer and returned to the terminal.
By setting the cache invalidation time when the data set is cached to the server, the data availability can be ensured, the data cache can be invalidated after the preset cache invalidation time, the data storage cost of the server can be reduced, and the data storage safety is improved.
In one embodiment, a data processing method is provided, which further includes: and when the response of the data interface exceeds the preset duration or the response error exceeds the preset times, the server acquires a corresponding data set from the cache according to the event parameter and sends the information that the response of the data interface exceeds the preset duration or the response error to the preset user identifier.
The response error refers to an error returned by the server when the data interface is called. For example, the response error may be an internal server error (HTTP500), a file not found (HTTP404), a prohibited access (HTTP403), a denied access (HTTP401), and the like. The preset duration should be greater than the normal response time of the third party system. For example, when the normal response time of the third party response is within 0.2s, the preset time period may be 0.5s, 1s, 1.5s, or the like, but is not limited thereto. The different time periods may have different preset durations, for example, the preset duration of the third party system using the peak period may be longer than the preset duration of the third party system using the peak period. When the response of the data interface exceeds the preset duration or the response error exceeds the preset number, the server can call the data interface again to initiate a data request to the third-party system, and when the response of the data interface exceeds the preset duration or the response error exceeds the preset number, the server acquires a corresponding data set from the data cached by the server according to the event parameter and sends the information that the response of the data interface exceeds the preset duration or the response error to the preset user identifier. The preset number of times may be 1 time, 2 times, etc. without being limited thereto. The preset user identifier may be a user identifier of a server developer, or a user identifier of a maintainer corresponding to the server.
As shown in fig. 6, a data processing method is provided, which is described by taking the method as an example applied to the terminal in fig. 1, and includes the following steps:
step 602, receiving an interface verification instruction, and acquiring a data interface configured by the data interconnection control according to the interface verification instruction.
The interface verification instruction is a request for verification of the configured data interface. The interface verification instruction can be generated by clicking a button on the display screen by a user or can be generated by pressing a control on the touch screen by the user. The interface checking button or control can be located in the data interconnection control, when a developer configures a data interface of a form in the form designer, the interface checking button or control is triggered to generate an interface checking instruction, and a corresponding data interface in the data interconnection control is obtained according to the interface checking instruction. The data interface refers to a data interface address of a third-party system. Specifically, the data interface is used for dragging the data interconnection control to the form designer and configuring the data interconnection control when a developer designs a form in the form designer.
And step 604, generating an interface verification request according to the interface verification instruction and the data interface and sending the interface verification request to the server, wherein the interface verification request is used for indicating the server to acquire a corresponding data set from the third-party system and returning the data set to the terminal.
And the server sends a data request to the third-party system according to the data interface in the interface verification request, and the third-party system maps the corresponding data set to the field object according to the data request and then returns the mapped field object to the terminal through the server.
And 606, setting an association field according to the returned data set, wherein the association field is used for acquiring association data from the data set.
The data set returned by the third-party system contains data corresponding to all fields of the data interface, and the terminal can set data required by form events according to the requirements of different events. For example, when the returned data set contains a company name field, a consumption amount field, a consumption time field and a consumption number field, the terminal may set association fields as the company name field and the consumption amount field in a consumption amount event, so that the server may extract data corresponding to the company name field and the consumption amount field from the data set according to the preset association fields during the form use process.
The data interface can be configured through the data interconnection control, and the associated field is set according to the returned data set, so that the corresponding data set can be acquired from the third-party system according to the configured data interface by triggering the control event in the form using process, the data integration is realized without customizing and developing the data interface of the third-party system, meanwhile, the data interface is convenient to modify and expand, and the data acquisition simplicity is improved.
Fig. 7 is a timing diagram of the data processing method in one embodiment. The specific steps for implementing the data processing method are as follows:
firstly, a terminal starts a form designer, receives a dragging operation on a data interconnection control, enables the data interconnection control to be located in the form designer, receives a data interface configured by the data interconnection control, generates a data interface verification request according to a received data interface verification instruction, and sends the data interface verification request to a server.
Then, after receiving the data interface verification request, the server verifies the user information of the terminal according to the token and the user parameters carried in the data interface verification request, and when the verification fails, failure information is returned to the terminal; and when the user information of the terminal passes the verification, the server encrypts the event parameters corresponding to the control in the form and the identity information of the terminal, acquires a corresponding data interface according to the control identification, and sends a data request to a third-party system through the data interface to acquire a corresponding data set.
Then, after receiving a data request sent by the server, the third-party system verifies whether the server is legal or not according to the server identifier in the data request, and when the server is illegal, the server receives failure information returned by the third-party system and sends the failure information to the terminal; and when the server is legal, the third-party system acquires the corresponding data set according to the event parameter, packages the data set and sends the packaged data set to the server.
And then, after the server receives the returned data set, the returned data set is sent to the terminal after the format of the returned data set is verified to be correct and is not empty. And the terminal configures the associated fields required by the form control event according to the fields of the received data set. And displaying the data corresponding to the associated fields in the data set.
Fig. 8 is a timing diagram of the data processing method in one embodiment. The method comprises the following specific steps:
firstly, a server receives a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter. The control refers to a data interconnection control in the form. Specifically, the data interconnection control in the form is generated when a developer drags the data interconnection control to the form designer and configures a data interface corresponding to the form for the data interconnection control when the developer designs the form in the form designer. The event refers to the event corresponding to the control. Specifically, there may be a plurality of events corresponding to the control. The event parameter refers to a parameter corresponding to an event when the control event is triggered. Specifically, the event parameter may include, but is not limited to, a request time, an event identification, a user identification, and the like. The terminal acquires a data acquisition request generated by a control event in a user trigger form and sends the data acquisition request to the server, and the server can receive the data acquisition request which is sent by the terminal and comprises a control identifier and an event parameter.
And then, the server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter. The data interface refers to a data interface address of a third-party system. Specifically, the data interface is used for dragging the data interconnection control to the form designer and configuring the data interconnection control when a developer designs a form in the form designer. The server acquires a data interface corresponding to the control configured by the developer according to the control identification, calls the data interface to access a third-party system, and initiates a data request containing event parameters to the third-party system, the third-party system queries according to the event parameters in the data request to obtain a corresponding data set, packages and returns the data set to the server, and the server receives the data set returned by the third-party system.
Optionally, before the server acquires the data interface, receiving a token and user parameters carried by the terminal when sending the data acquisition request, verifying user information of the terminal according to the token and the user parameters, when the user information of the terminal is not verified, sending verification failure information to the terminal, when the user information of the terminal is verified, executing a step in which the server acquires the data interface according to the control identifier, and acquires a corresponding data set from a third-party system through the data interface according to the event parameters. The token is obtained by calling a server authentication interface after the terminal registers an account number with the server. The user parameter may be a user identifier, an enterprise identifier where the user is located, and the like. The token and the user parameters carried by the data acquisition request are verified, and the data interface is acquired according to the control identification when the verification is passed, so that the data security can be improved.
Optionally, after the server verifies the user information of the terminal, the server encrypts the event parameter and the identity information of the terminal, and sends the encrypted event parameter and the encrypted identity information of the terminal to the third-party system through the data interface. And the encrypted event parameter and the identity information of the terminal are used for indicating a third-party system to perform decryption processing, and acquiring a corresponding data set according to the decrypted event parameter and the identity information of the terminal. The encryption technique employed by the server may be asymmetric encryption. Asymmetric encryption requires two keys for encryption and decryption, which are a public key and a private key. The server can acquire a public key of the third-party system in advance, encrypt the event parameter of the data acquisition request and the identity information of the terminal according to the public key, decrypt the encrypted event parameter and the identity information of the terminal according to the private key, acquire a corresponding data set according to the decrypted event parameter and the identity information of the terminal, and return the data set to the server.
Optionally, before the third-party system decrypts the encrypted event parameter and the identity information of the terminal, verifying whether the server is legal according to a server identifier included in the data request, and when the server is illegal, the server receives failure information returned by the third-party system and sends the failure information to the terminal; and when the server is legal, the event parameter is used for indicating the third-party system to acquire the corresponding data set according to the event parameter and send the data set to the server.
And then, the server acquires the associated data according to the data set and the associated field and sends the associated data to the terminal. The associated field refers to a field that the control event needs to acquire. Specifically, the associated field may be determined by a developer, when configuring the form control data interface, performing mapping binding between a field in the returned data set and a form field after verifying the data interface. And the server acquires the associated data corresponding to the associated field from the data set according to the associated field and sends the associated data to the terminal. The terminal can display the acquired associated data as required, and can select the required associated data from the acquired associated data for display.
Fig. 9 is a timing chart illustrating the application of the data processing method to the approval of the leave request process according to an embodiment. The specific steps for implementing the data processing method are as follows:
firstly, the terminal opens a request for examining and approving the document, receives a trigger instruction of a vacation limit event in a leave-asking control, generates a vacation limit acquisition request and sends the request to the server. The vacation limit acquisition request comprises a leave asking control identification, a vacation limit event parameter, a user identification and the like.
Then, after receiving the vacation limit acquisition request, the server verifies the user information of the terminal according to the token and the user parameters carried in the vacation limit acquisition request, and returns failure information to the terminal when the verification fails; when the user information of the terminal passes verification, the server encrypts the vacation limit event parameter and the identity information of the terminal, acquires a corresponding vacation data interface according to the leave request control identification, and sends a vacation data request to a third-party system through the vacation data interface to acquire a vacation data set corresponding to the vacation limit event parameter.
Then, after receiving a vacation data request sent by the server, the third-party system verifies whether the server is legal or not according to the server identifier in the vacation data request, and when the server is illegal, the server receives failure information returned by the third-party system and sends the failure information to the terminal; and when the server is legal, the third-party system acquires the corresponding vacation data set according to the vacation limit event parameters and sends the vacation data set to the server.
Then, after the server receives the returned vacation data set, verifying that the format of the returned vacation data set is correct and is not empty, caching the returned vacation data set into the server, acquiring vacation line data corresponding to the user identification according to a preset associated field of a vacation line event, namely a vacation line field and the user identification, and returning the data to the terminal; when the interface response is overtime or wrong, the server can initiate the request again, when the request exceeds the preset times, the server enters the server cache according to the vacation limit event parameters to inquire the corresponding vacation limit data and return the same to the terminal, and meanwhile, the error information is sent to the preset user identification.
And then, after receiving the returned vacation line data, the terminal renders the vacation line data and displays the vacation line data.
According to the embodiment of the application, in the process of approving the document requiring the fake approval, the approving personnel can conveniently check the vacation limit data of the user who initiates the document requiring the fake approval. The examination and approval system does not need to be manually maintained, the problem of low data storage safety caused by the fact that enterprise data are stored in the examination and approval system in a centralized mode when a data approval import interface is provided for calling a third-party system is solved, and the simplicity of data acquisition is improved.
It should be understood that although the various steps in the flow charts of fig. 2-9 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-9 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 10, there is provided a data processing apparatus including: a request receiving module 1010, a data obtaining module 1020 and a data sending module 1030, wherein:
a request receiving module 1010, configured to receive a data acquisition request initiated by a terminal according to a trigger control event, where the data acquisition request includes a control identifier and an event parameter;
a data obtaining module 1020, configured to obtain a data interface according to the control identifier, and obtain a corresponding data set from a third-party system through the data interface according to the event parameter;
and a data sending module 1030, configured to obtain the associated data according to the data set and the associated field, and send the associated data to the terminal.
In an embodiment, the data processing apparatus further includes a data verification module 1040, where the data verification module 1040 is configured to receive a token and a user parameter carried when the terminal sends a data acquisition request, verify user information of the terminal according to the token and the user parameter, send information of failed verification to the terminal when the user information of the terminal is not verified, and execute a step in which the server acquires a data interface according to the control identifier and acquires a corresponding data set from a third-party system through the data interface according to the event parameter when the user information of the terminal is verified.
In one embodiment, the data processing apparatus further includes a data encryption module 1050, where the data encryption module 1050 is configured to encrypt the event parameter and the identity information of the terminal, send the encrypted event parameter and the identity information of the terminal to a third-party system through a data interface, and instruct the third-party system to perform decryption processing on the encrypted event parameter and the encrypted identity information of the terminal, and obtain a corresponding data set according to the decrypted event parameter and the identity information of the terminal.
In one embodiment, the data validation module 1040 may be further configured to send a data request including the event parameter to the third-party system according to the data interface, where the data request includes the server identifier; the server identification is used for indicating whether the third-party system verifies that the server is legal or not; when the server is illegal, receiving failure information returned by the third-party system and sending the failure information to the terminal; and when the server is legal, the event parameter is used for indicating the third-party system to acquire the corresponding data set according to the event parameter and send the data set to the server.
In one embodiment, the data obtaining module 1020 may be further configured to cache the data set in the server and set a cache expiration time when the format of the data set obtained by the server from the third-party system according to the data interface is correct and is not empty.
In an embodiment, the data sending module 1030 may be further configured to, when the response of the data interface exceeds the preset duration or the number of response errors exceeds the preset number, the server obtains the corresponding data set from the cache according to the event parameter, and sends the information that the response of the data interface exceeds the preset duration or the number of response errors to the preset user identifier.
In one embodiment, there is provided a data processing apparatus comprising: the device comprises an interface acquisition module and a data acquisition module. Wherein:
the interface acquisition module is used for receiving the interface verification instruction and acquiring the data interface configured by the data interconnection control according to the interface verification instruction.
And the data acquisition module is used for generating an interface verification request according to the interface verification instruction and the data interface and sending the interface verification request to the server, wherein the interface verification request is used for indicating the server to acquire a corresponding data set from the third-party system and return the data set to the terminal.
The data acquisition module is also used for setting an association field according to the returned data set, and the association field is used for acquiring association data from the data set.
For specific limitations of the data processing apparatus, reference may be made to the above limitations of the data processing method, which are not described herein again. The various modules in the data processing apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing cached third-party system data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data processing method.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
receiving a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter;
acquiring a data interface according to the control identification, and acquiring a corresponding data set from a third-party system through the data interface according to the event parameter;
and acquiring the associated data according to the data set and the associated field, and sending the associated data to the terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
receiving a token and user parameters carried by a terminal when sending a data acquisition request, and verifying user information of the terminal according to the token and the user parameters;
when the user information of the terminal is not verified, sending verification failure information to the terminal;
and when the user information of the terminal passes the verification, the execution server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
encrypting the event parameters and the identity information of the terminal, and sending the encrypted event parameters and the encrypted identity information of the terminal to a third-party system through a data interface;
and the encrypted event parameter and the identity information of the terminal are used for indicating a third-party system to perform decryption processing, and acquiring a corresponding data set according to the decrypted event parameter and the identity information of the terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
sending a data request containing event parameters to a third-party system according to a data interface, wherein the data request comprises a server identifier;
the server identification is used for indicating whether the third-party system verifies that the server is legal or not;
when the server is illegal, receiving failure information returned by the third-party system and sending the failure information to the terminal;
and when the server is legal, the event parameter is used for indicating the third-party system to acquire the corresponding data set according to the event parameter and send the data set to the server.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and when the format of the data set acquired by the server from the third-party system according to the data interface is correct and is not empty, caching the data set in the server, and setting the cache failure time.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and when the response of the data interface exceeds the preset duration or the response error exceeds the preset times, the server acquires a corresponding data set from the cache according to the event parameter and sends the information that the response of the data interface exceeds the preset duration or the response error to a preset user identifier.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
receiving an interface checking instruction, and acquiring a data interface configured by the data interconnection control according to the interface checking instruction;
generating an interface verification request according to the interface verification instruction and the data interface and sending the interface verification request to the server, wherein the interface verification request is used for indicating the server to obtain a corresponding data set from a third-party system and returning the data set to the terminal;
and setting an association field according to the returned data set, wherein the association field is used for acquiring association data from the data set.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter;
acquiring a data interface according to the control identification, and acquiring a corresponding data set from a third-party system through the data interface according to the event parameter;
and acquiring the associated data according to the data set and the associated field, and sending the associated data to the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a token and user parameters carried by a terminal when sending a data acquisition request, and verifying user information of the terminal according to the token and the user parameters;
when the user information of the terminal is not verified, sending verification failure information to the terminal;
and when the user information of the terminal passes the verification, the execution server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter.
In one embodiment, the computer program when executed by the processor further performs the steps of:
encrypting the event parameters and the identity information of the terminal, and sending the encrypted event parameters and the encrypted identity information of the terminal to a third-party system through a data interface;
and the encrypted event parameter and the identity information of the terminal are used for indicating a third-party system to perform decryption processing, and acquiring a corresponding data set according to the decrypted event parameter and the identity information of the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
sending a data request containing event parameters to a third-party system according to a data interface, wherein the data request comprises a server identifier;
the server identification is used for indicating whether the third-party system verifies that the server is legal or not;
when the server is illegal, receiving failure information returned by the third-party system and sending the failure information to the terminal;
and when the server is legal, the event parameter is used for indicating the third-party system to acquire the corresponding data set according to the event parameter and send the data set to the server.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and when the format of the data set acquired by the server from the third-party system according to the data interface is correct and is not empty, caching the data set in the server, and setting the cache failure time.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and when the response of the data interface exceeds the preset duration or the response error exceeds the preset times, the server acquires a corresponding data set from the cache according to the event parameter and sends the information that the response of the data interface exceeds the preset duration or the response error to a preset user identifier.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving an interface checking instruction, and acquiring a data interface configured by the data interconnection control according to the interface checking instruction;
generating an interface verification request according to the interface verification instruction and the data interface and sending the interface verification request to the server, wherein the interface verification request is used for indicating the server to obtain a corresponding data set from a third-party system and returning the data set to the terminal;
and setting an association field according to the returned data set, wherein the association field is used for acquiring association data from the data set.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (15)

1. A method of data processing, the method comprising:
the method comprises the steps that a server receives a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter; the control is a data interconnection control in the form;
the server acquires a data interface of a third-party system according to the control identification, and acquires a corresponding data set from the third-party system through the data interface according to the event parameter; the data interface is used for dragging the data interconnection control to a form designer and configuring the data interconnection control when a developer designs a form in the form designer;
the server acquires associated data according to the data set and the associated field and sends the associated data to the terminal; the associated field refers to a field that the control event needs to acquire.
2. The method of claim 1, wherein before the server obtains the data interface according to the control identifier and obtains the corresponding data set from the third-party system through the data interface according to the event parameter, the method further comprises:
the server receives a token and user parameters carried by the terminal when sending a data acquisition request, and verifies the user information of the terminal according to the token and the user parameters;
when the user information of the terminal is not verified, sending verification failure information to the terminal;
and when the user information of the terminal passes the verification, executing the steps that the server acquires a data interface according to the control identification and acquires a corresponding data set from a third-party system through the data interface according to the event parameter.
3. The method of claim 1, further comprising:
the server encrypts the event parameters and the identity information of the terminal and sends the encrypted event parameters and the encrypted identity information of the terminal to the third-party system through the data interface;
and the encrypted event parameter and the identity information of the terminal are used for indicating a third-party system to perform decryption processing, and acquiring a corresponding data set according to the decrypted event parameter and the identity information of the terminal.
4. The method of claim 1, wherein the obtaining a corresponding data set from a third-party system through the data interface according to the event parameter comprises:
the server sends a data request containing event parameters to a third-party system according to the data interface, wherein the data request comprises a server identifier;
the server identification is used for indicating a third-party system to verify whether the server is legal or not;
when the server is illegal, the server receives failure information returned by a third-party system and sends the failure information to the terminal;
and when the server is legal, the event parameter is used for indicating the third-party system to acquire a corresponding data set according to the event parameter and send the data set to the server.
5. The method of claim 1, further comprising:
and when the format of the data set acquired by the server from the third-party system according to the data interface is correct and is not empty, caching the data set into the server, and setting the cache failure time.
6. The method of claim 5, further comprising:
and when the response of the data interface exceeds the preset time or the response error exceeds the preset times, the server acquires a corresponding data set from the cache according to the event parameter and sends the information that the response of the data interface exceeds the preset time or the response error to a preset user identifier.
7. A method of data processing, the method comprising:
the terminal receives an interface verification instruction and acquires a data interface of a third-party system configured by the data interconnection control according to the interface verification instruction; the data interface is used for dragging the data interconnection control to a form designer and configuring the data interconnection control when a developer designs a form in the form designer;
the terminal generates an interface verification request according to the interface verification instruction and the data interface and sends the interface verification request to the server, wherein the interface verification request is used for indicating the server to obtain a corresponding data set from a third-party system and return the data set to the terminal;
and the terminal sets a correlation field according to the returned data set, wherein the correlation field is used for acquiring correlation data from the data set.
8. A data processing apparatus, characterized in that the apparatus comprises:
the request receiving module is used for receiving a data acquisition request initiated by a terminal according to a trigger control event, wherein the data acquisition request comprises a control identification and an event parameter; the control is a data interconnection control in the form;
the data acquisition module is used for acquiring a data interface according to the control identification and acquiring a corresponding data set from a third-party system through the data interface according to the event parameter; the data interface is used for dragging the data interconnection control to a form designer and configuring the data interconnection control when a developer designs a form in the form designer;
the data sending module is used for acquiring the associated data according to the data set and the associated field and sending the associated data to the terminal; the associated field refers to a field that the control event needs to acquire.
9. The apparatus of claim 8, further comprising:
the data verification module is used for receiving a token and user parameters carried by the terminal when sending a data acquisition request and verifying the user information of the terminal according to the token and the user parameters; when the user information of the terminal is not verified, sending verification failure information to the terminal; and when the user information of the terminal passes the verification, executing the steps of acquiring a data interface according to the control identification and acquiring a corresponding data set from a third-party system through the data interface according to the event parameter.
10. The apparatus of claim 8, further comprising:
the data encryption module is used for encrypting the event parameters and the identity information of the terminal and sending the encrypted event parameters and the encrypted identity information of the terminal to the third-party system through the data interface; and the encrypted event parameter and the identity information of the terminal are used for indicating a third-party system to perform decryption processing, and acquiring a corresponding data set according to the decrypted event parameter and the identity information of the terminal.
11. The apparatus of claim 9, wherein the data validation module is further configured to send a data request containing event parameters to a third party system according to the data interface, the data request including a server identification; the server identification is used for indicating a third-party system to verify whether the server is legal or not; when the server is illegal, receiving failure information returned by a third-party system and sending the failure information to the terminal; and when the server is legal, the event parameter is used for indicating the third-party system to acquire a corresponding data set according to the event parameter and send the data set to the server.
12. The apparatus of claim 11, wherein the data obtaining module is further configured to cache the data set in the server and set a cache expiration time when the format of the data set obtained from the third-party system according to the data interface is correct and is not empty.
13. The apparatus of claim 12, wherein the data sending module is further configured to, when the response of the data interface exceeds a preset duration or the number of response errors exceeds a preset number, obtain a corresponding data set from the cache according to the event parameter, and send information that the response of the data interface exceeds the preset duration or the number of response errors to a preset user identifier.
14. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
15. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201810486132.8A 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium Active CN108833355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810486132.8A CN108833355B (en) 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810486132.8A CN108833355B (en) 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108833355A CN108833355A (en) 2018-11-16
CN108833355B true CN108833355B (en) 2020-12-29

Family

ID=64148084

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810486132.8A Active CN108833355B (en) 2018-05-21 2018-05-21 Data processing method, data processing device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108833355B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857479A (en) * 2018-12-14 2019-06-07 平安科技(深圳)有限公司 Interface data processing method, device, computer equipment and storage medium
CN109828908A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Interface testing parameter encryption method, device, electronic equipment and storage medium
CN111385123A (en) * 2018-12-29 2020-07-07 广州市百果园信息技术有限公司 WEB service distributed intelligent monitoring method, device, computer equipment and storage medium
CN110149356A (en) * 2019-02-28 2019-08-20 深圳点猫科技有限公司 Method and device is uniformly processed in a kind of network request abnormality
CN110650186A (en) * 2019-09-06 2020-01-03 上海陆家嘴国际金融资产交易市场股份有限公司 Interface calling method and device, computer equipment and storage medium
CN112491101A (en) * 2019-09-12 2021-03-12 北京国双科技有限公司 Control method and system of storage battery pack, storage medium and electronic device
CN110888901B (en) * 2019-10-22 2023-07-04 浙江大搜车软件技术有限公司 System management method, device, computer equipment and storage medium
CN111104187A (en) * 2019-10-28 2020-05-05 广州朗国电子科技有限公司 Interface aggregation method and device based on interface aggregation server
CN110751485B (en) * 2019-10-28 2021-08-17 腾讯科技(深圳)有限公司 Data processing method and equipment
CN110855656B (en) * 2019-11-06 2022-07-12 云深互联(北京)科技有限公司 Plug-in flow proxy method, device and system capable of realizing application server protection
CN111046245A (en) * 2019-12-11 2020-04-21 杭州趣链科技有限公司 Multi-source heterogeneous data source fusion calculation method, system, equipment and storage medium
CN111459475B (en) * 2020-03-30 2023-05-16 北京三快在线科技有限公司 Interface calling method, interface docking configuration method, device, equipment and medium
CN112199281A (en) * 2020-09-30 2021-01-08 中国平安财产保险股份有限公司 Data processing method and device, terminal equipment and readable storage medium
CN112464201B (en) * 2020-11-02 2024-03-01 中国建设银行股份有限公司 Automatic token issuing system, method and storage medium
CN113364890B (en) * 2021-06-30 2022-10-28 北京奇艺世纪科技有限公司 Data processing method, device, network equipment and medium
CN115168354B (en) * 2022-07-11 2023-06-30 广州市玄武无线科技股份有限公司 Integrated processing method and device for event stream of mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing
CN103593443A (en) * 2013-11-18 2014-02-19 南京新模式软件集成有限公司 Method for electronic file metadata expansion
CN105718540A (en) * 2016-01-18 2016-06-29 北京京东尚科信息技术有限公司 Data loading method and apparatus
CN106293743A (en) * 2016-08-11 2017-01-04 上海泛微网络科技股份有限公司 A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue
CN107679413A (en) * 2017-09-18 2018-02-09 苏州市卫生计生统计信息中心 A kind of health care data-sharing systems and data sharing method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070130463A1 (en) * 2005-12-06 2007-06-07 Eric Chun Wah Law Single one-time password token with single PIN for access to multiple providers
US9191262B2 (en) * 2013-02-22 2015-11-17 Dell Products L.P. Network communication protocol processing optimization system
CN104978622A (en) * 2014-04-11 2015-10-14 携程计算机技术(上海)有限公司 Business process management system and method
CN105553920B (en) * 2014-10-29 2020-06-05 腾讯科技(深圳)有限公司 Data interaction method, device and system
CN107426266B (en) * 2017-03-14 2020-08-04 阿里巴巴集团控股有限公司 Data processing method and server
CN107977277B (en) * 2017-12-21 2021-02-02 金蝶软件(中国)有限公司 Method and device for integrating third-party system in ERP system and computer equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing
CN103593443A (en) * 2013-11-18 2014-02-19 南京新模式软件集成有限公司 Method for electronic file metadata expansion
CN105718540A (en) * 2016-01-18 2016-06-29 北京京东尚科信息技术有限公司 Data loading method and apparatus
CN106293743A (en) * 2016-08-11 2017-01-04 上海泛微网络科技股份有限公司 A kind of mobile modeling and build Mobile solution the method realizing cross-platform issue
CN107679413A (en) * 2017-09-18 2018-02-09 苏州市卫生计生统计信息中心 A kind of health care data-sharing systems and data sharing method

Also Published As

Publication number Publication date
CN108833355A (en) 2018-11-16

Similar Documents

Publication Publication Date Title
CN108833355B (en) Data processing method, data processing device, computer equipment and computer readable storage medium
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN108346191B (en) Attendance checking method and device, computer equipment and storage medium
CN108810894B (en) Terminal authorization method, device, computer equipment and storage medium
US20190116038A1 (en) Attestation With Embedded Encryption Keys
US8850593B2 (en) Data management using a virtual machine-data image
WO2020253061A1 (en) Page generating method and apparatus, computer device, and storage medium
CN111241555B (en) Access method and device for simulating user login, computer equipment and storage medium
CN111708991A (en) Service authorization method, service authorization device, computer equipment and storage medium
CN110704863B (en) Configuration information processing method and device, computer equipment and storage medium
CN112597481A (en) Sensitive data access method and device, computer equipment and storage medium
WO2021003977A1 (en) Default information query method and apparatus, and computer device and storage medium
CN112632581A (en) User data processing method and device, computer equipment and storage medium
CN109560934B (en) Data tamper-proof method and device, computer equipment and storage medium
CN112800393B (en) Authorization authentication method, software development kit generation method, device and electronic equipment
CN110610430B (en) Bill information processing method, device, computer equipment and storage medium
CN111666558B (en) Key rotation method, device, computer equipment and storage medium
CN115622747A (en) API authorization authentication processing method and device, electronic equipment and storage medium
CN110011796B (en) Certificate updating method and device, computer equipment and storage medium
CN112528268B (en) Cross-channel applet login management method and device and related equipment
CN109657170B (en) Webpage loading method and device, computer equipment and storage medium
WO2021169469A1 (en) Voiceprint data processing method and apparatus, computer device, and storage medium
CN111917711B (en) Data access method and device, computer equipment and storage medium
CN110008727B (en) Encryption sensitive parameter processing method and device, computer equipment and storage medium
CN113127818A (en) Block chain-based data authorization method and device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant