CN109241767A - Security control system and method for unstructured data resources - Google Patents
Security control system and method for unstructured data resources Download PDFInfo
- Publication number
- CN109241767A CN109241767A CN201810871783.9A CN201810871783A CN109241767A CN 109241767 A CN109241767 A CN 109241767A CN 201810871783 A CN201810871783 A CN 201810871783A CN 109241767 A CN109241767 A CN 109241767A
- Authority
- CN
- China
- Prior art keywords
- api
- server
- request
- client
- api gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000012544 monitoring process Methods 0.000 claims abstract description 20
- 238000004458 analytical method Methods 0.000 claims abstract description 9
- 230000004044 response Effects 0.000 claims description 16
- 230000007246 mechanism Effects 0.000 claims description 9
- 238000013475 authorization Methods 0.000 abstract description 3
- 239000012141 concentrate Substances 0.000 abstract description 2
- 238000011161 development Methods 0.000 abstract description 2
- 230000003993 interaction Effects 0.000 abstract description 2
- 239000008186 active pharmaceutical agent Substances 0.000 abstract 6
- 230000008569 process Effects 0.000 description 6
- 239000003795 chemical substances by application Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000007613 environmental effect Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 239000000178 monomer Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a security control system and a security control method for unstructured data resources, and belongs to the technical field of computer software. The safety control system for the unstructured data resources comprises a client, an API gateway and a plurality of service side APIs, wherein the API gateway comprises a plurality of monitoring ports, an access authorization module, a log recording module, a proxy forwarding module, a service current limiting module and an analysis monitoring module, the client is communicated with the API gateway, and the API gateway is communicated with the plurality of service side APIs. The security control system for the unstructured data resources can enable developers to concentrate on the development of specific logics without considering the problem of interaction between the client and the server, and has good popularization and application values.
Description
Technical field
The present invention relates to computer software technical fields, specifically provide the security control of a kind of pair of unstructured data resource
System and method.
Background technique
Client and server API(Application Programming Interface, that is, application program service connects
Mouthful) interaction when, for server end API, API developer is other than developing necessary service logic, it is also necessary to consider
To various work such as access mandate, access log record, request forwarding, analysis and monitoring, development difficulty is increased.For client
For end, each API excessively disperses, none unified entrance increases the difficulty of client call.In traditional monomer
In, these functions are typically all to embed in the application, as an assembly operating.But under micro services architecture mode,
Variety classes and independently operated application might have it is tens of or even hundreds of, continue to use this mode will cause it is very high
Management and publication cost.So just needing above to take out a unified traffic ingress in these applications, these functions are completed
It realizes.
On the other hand, server-side API granularity is usually different from the demand grain size of client.Server-side generally provides fine granularity
API, it means that client needs interacted with multiple services.The data resource that different client needs often is also
Distinguishing, some clients need rough information, and some clients need more detailed data resource.Different
For different clients, permission is also different data resource.Over time, the division for servicing end interface is difficult
Accomplish it is unalterable, so server-side API is needed to client hidden.
Summary of the invention
Technical assignment of the invention is that in view of the above problems, providing one kind can make developer concentrate on energy
In the exploitation of specific logic, without consider in problem that client is interacted with server-side to unstructured data resource
Safety control system.
The further technical assignment of the present invention is to provide the method for controlling security of a kind of pair of unstructured data resource.
To achieve the above object, the present invention provides the following technical scheme that
The safety control system of a kind of pair of unstructured data resource, including client, API gateway and several server-side API,
API gateway includes several listening ports and access mandate module, logger module, agent transmitting module, service current limliting module
With analysis monitoring module, client is communicated with API gateway, and API gateway is communicated with several server-side API.
Preferably, the listening port includes 8000 ports, 8001 ports, 8443 ports and 8444 ports, wherein
8000 ports forward the request to server-side API for monitoring the request from client;8001 ports are used for administrator couple
Component is configured;8443 ports are that component monitors the request from client;8444 monitor the port of request for administrator.
8000 ports are that component is used to monitor the HTTP request from client, and this request is forwarded to server-side
API and the main port used.
8443 ports are the ports for the request that component monitors HTTP.The port has the behavior similar with 8000 ports, but
It is the request of its monitoring HTTPS, forwarding behavior can't be generated.This port can be disabled by configuration file.
8001 ports are used for the port that administrator configures component.
The port of HTTPS request is monitored for administrator in 8444 ports.
Component provides the management server end API of a RESTful form on 8001 ports, is used for admin instance
Or the configuration of cluster.Server-side API is added by administrator.It is forwarded and is requested by component: issuing following CURL request to verify
Whether component will request correctly to be forwarded to server-side API.Under default situations, component is that agency is handled on 8000 ports
Request, a successfully response, it is meant that (http://localhost:8000) request has been forwarded to me by component
In the address that configures in the first step, and response is forwarded.
Preferably, the access mandate module of the API gateway is for providing access mandate, logger module is for mentioning
For log recording, agent transmitting module is for providing agency's forwarding, and service current limliting module is for providing service current limliting, analysis monitoring
Module is for analyzing monitoring.
API gateway encapsulates built-in system framework, and an API is provided separately for each client.There are also other for API gateway
Responsibility, such as load balancing, caching, the modification of request and management, the processing of steady-error coefficient.
Preferably, the API gateway uses synchronization mechanism, such as HTTP.
The method of controlling security of a kind of pair of unstructured data resource, when API gateway operation, each to server-side API
Request first hit by API gateway, for API gateway by the request agency to server-side API to client, API gateway is each right
The entrance of the request of server-side API.
Between request and return, API gateway, which will execute, has been carried out installation and configured any plug-in unit, is awarded
Power.
Because being possible to low-response when a client call service end API or service being unavailable, API gateway must not
Gone down due to waiting server-side API by indefinite obstruction, such as in the scene of product details, if recommendation service is not rung
It answers, remaining product detail information should be returned to client by API gateway, because these things are still useful to user
, recommendation at this moment is empty or is replaced by other contents, such as the product of TOP10.But if product information
Service does not respond, and API gateway should return an error to client.
If server-side API is unavailable, it is exactly so-called time-out that allocating time, which is more than the threshold value of some setting, it is real
Breaker mode is showed, at this moment it can prevent unnecessary waiting of the client to the service being not responding to.If one service
Error rate is more than specified threshold value, then can trigger breaker, then all requests all can be immediately in a time interval
Failure.Return function after request failure, returns to error code.
Preferably, the API gateway calls the IP address and port numbers of each server-side API, and API gateway uses clothes
Business discovery mechanism: ServerSide Discovery and/or ClientSide Discovery.
The position (IP address and port numbers) for each server-side API that API gateway calls needs in traditional application
The position of server-side API is configured rigidly, but just very simple in present application based on cloud.Infrastructure services, such as
Message-oriented middleware is usually all a static position, can be specified by the environmental variance of operating system.However, determining
The position of one application service be not it is so simple, application service is to dynamically distribute position, and the example of a service
Set is also what dynamic changed, this is because some automatically scalable appearance and upgradings.Therefore, API gateway will be serviced as others
Client is the same, needs the service discovery mechanisms using system: ServerSide Discovery or ClientSide
Discovery.System uses the discovery of client-side, and API gateway allows for inquiring service register center, it is institute
There is the database purchase of server-side API and corresponding position.
When agency's forwarding, the HTTP request (being defaulted as 8000) on the proxy port of its configuration is monitored, and identify and asking
The configuration plug-in (not executed if not) for being which server-side API, then operating on server-side API asked, and will
The HTTP request of client is forwarded to the API service of oneself.Component is a transparent agency, it can forward a request to client
End request, the various titles in addition to adding such as Connection etc.
Preferably, client carries out authentication when calling server-side API, specially adds and authenticate to server-side API
Component selects a client object, and the authentication credential of specified verifying plug-in unit scheme is provided for client.
As long as there is request to enter component, the authentication credential (depending on auth type) that it is provided will be all checked, if
The request can not be verified or authentication failed, then requests to be locked, and does not execute the operation forwarded to server-side API.
The mode of simplest understanding and configuration client is to be mapped it one by one in user, i.e. a client
Represent a user (or application).But for component, all it doesn't matter for these.The core principles of client are that you can be
It adds plug-in unit, thus he customized request behavior.
Anonymous access: specified server-side API can be configured to only allow (to pass through plug-in unit by the access of authentication
To realize) or only allow anonymous access.That is, a specified server-side API, does not allow to carry out certain clients
Authentication, and anonymous access is carried out for other client.
Preferably, when API gateway handles the request to server-side API service will be routed to the request of server-side API
Hold API.
The mode that API gateway handles some requests is that they are simply routed to suitable server-side API.
Preferably, multiple server-side API are called, by response results when API gateway handles the request to server-side API
It condenses together.
The mode that API gateway handles certain requests is to call multiple server-side API, then gathers their response results
It is combined.
Preferably, API gateway is performed in parallel request when API gateway handles the request to server-side API.
For certain requests, such as the request of product details, its server-side API be all it is independent of each other, in order to reduce
Response time, API gateway should be performed in parallel these independent requests.Then, sometimes between some requests when each other according to
Bad.API gateway is before routing requests to server-side API, it may be necessary to authentication service be called to carry out checking request.Class
As, when obtaining the product list of customer need, API gateway must retrieve the product summary info of customer need first, so
The details of each product could be retrieved afterwards.
Compared with prior art, the method for controlling security of the invention to unstructured data resource has following prominent
The utility model has the advantages that described can customize different power to the method for controlling security of unstructured data resource for different clients
Limit provides monitoring function for the access of server-side API and availability etc..Different services can be opened for different clients
API is held, provides optimal access interface to each client.API gateway allows client in a request to multiple services
Pulling data.Reduce request/round-trip quantity, promotes user experience.The security access mechanism can provide high-performance, High Availabitity
Trusteeship service, so that the developer serviced be helped easily externally to provide service, and do not have to consider security control, flow control,
The problems such as log recording, is unified in gateway layer for safety certification, and flow control, log recording, request forwarding etc. is realized, with good
Good application value.
Detailed description of the invention
Fig. 1 is the topological diagram of the safety control system of the present invention to unstructured data resource.
Specific embodiment
Below in conjunction with drawings and examples, to the safety control system of the invention to unstructured data resource and side
Method is described in further detail.
Embodiment
As shown in Figure 1, the safety control system of the invention to unstructured data resource, including client, API gateway
With several server-side API.Client is communicated with API gateway, and API gateway is communicated with several server-side API.Wherein, API net
It closes and uses synchronization mechanism, such as HTTP.
API gateway includes listening port and access mandate module, logger module, agent transmitting module, service current limliting
Module and analysis monitoring module.Listening port includes 8000 ports, 8001 ports, 8443 ports and 8444 ports.8000 ports
It is that component is used to monitor the HTTP request from client, and this request is forwarded to server-side API and main is used
Port.8443 ports are the ports for the request that component monitors HTTP.The port has the behavior similar with 8000 ports, still
It only monitors the request of HTTPS, can't generate forwarding behavior.This port can be disabled by configuration file.8001 ports
The port that component is configured for administrator.The port of HTTPS request is monitored for administrator in 8444 ports.Component exists
The management server end API of a RESTful form, the configuration for admin instance or cluster are provided on 8001 ports.It is logical
It crosses administrator and adds server-side API.It is forwarded and is requested by component: issuing whether following CURL request will be requested just with checking assembly
True has been forwarded to server-side API.Under default situations, component is processing proxy requests, a success on 8000 ports
Response, it is meant that (http://localhost:8000) request has been forwarded to us and configured in the first step by component
Address in, and response is forwarded.
The access mandate module of API gateway is for providing access mandate, and logger module is for providing log recording, generation
Forwarding module is managed for providing agency's forwarding, service current limliting module is for providing service current limliting, and analysis monitoring module is for analyzing
Monitoring.
API gateway encapsulates built-in system framework, and an API is provided separately for each client.There are also other for API gateway
Responsibility, such as load balancing, caching, the modification of request and management, the processing of steady-error coefficient.
Method of controlling security to unstructured data resource of the invention requests process are as follows: when API gateway operation,
Each the request of server-side API is first hit by API gateway, API gateway by the request agency to server-side API to client,
Between request and return, API gateway, which will execute, has been carried out installation and configured any plug-in unit, is authorized.API net
Pass is the entrance of the request of each couple of server-side API.
Response type model in this method are as follows: the mode that API gateway handles some requests is simply to be routed to them properly
Server-side API;The mode for handling other requests is to call multiple server-side API, is then aggregated in their response results
Together.For certain requests, such as the request of product details, its server-side API be all it is independent of each other, when in order to reduce response
Between, API gateway should be performed in parallel these independent requests.However, being sometimes depending therefrom between some requests.
API gateway is before routing requests to server-side API, it may be necessary to authentication service be called to carry out checking request.Similarly,
When obtaining the product list of customer need, API gateway must retrieve the product summary info of customer need first, then could
Retrieve the details of each product.
API gateway monitors the request of four ports, and default situations are:
8000: this port is that component is used to monitor the HTTP request from client, and this request is forwarded to server-side
API.This is also the main port used.
8443: this port is the port for the request that component monitors HTTP.The port has the behavior similar with 8000 ports,
But it only monitors the request of HTTPS, can't generate forwarding behavior.This port can be disabled by configuration file.
8001: the port that component is configured for administrator.
8444: the port of HTTPS request is monitored for administrator.
Component provides the management server end API of a RESTful form on 8001 ports, is used for admin instance
Or the configuration of cluster.Server-side API is added by administrator.It is forwarded and is requested by component: issuing following CURL request to verify
Whether component will request correctly to be forwarded to server-side API.Under default situations, component is that agency is handled on 8000 ports
Request, one successfully corresponding, it is meant that (http://localhost:8000) request has been forwarded to me by component
In the address that configures in the first step, and response is forwarded.
Service discovery process: the position (IP address and port numbers) for each server-side API that API gateway calls, in tradition
Application in, need to configure the position of server-side API rigidly, but just very simple in application based on cloud now.Basis
Facilities services, such as message-oriented middleware are usually all a static positions, can be referred to by the environmental variance of operating system
It is fixed.However, determine the position of an application service be not it is so simple, application service is to dynamically distribute position, and one
The example collection of a service is also what dynamic changed, this is because some automatically scalable appearance and upgradings.Therefore, API gateway is wanted
As other service clients, need the service discovery mechanisms using system: ServerSide Discovery or
ClientSide Discovery.System uses the discovery of client-side, and API gateway allows for inquiring service registration
Center, it is the database purchase of all server-side API and corresponding position.
It acts on behalf of repeating process: monitoring the HTTP request (being defaulted as 8000) on the proxy port of its configuration, and identify
The configuration plug-in (not executed if not) for being which server-side API, then operating on server-side API of request, and
The HTTP request of client is forwarded to the API service of oneself.Component is a transparent agency, it can forward a request to visitor
The request of family end, the various titles in addition to adding such as Connection etc.
Authenticate permission process:
Common authentication: under normal circumstances, calling server-side API to require client has authentication, and does not allow recognizing for mistake
Card or the request without certification pass through.This demand may be implemented in Authorization Plug-in Component.Process flow is as follows:
1, to server-side API or global addition certified component;
2, a client object is selected;
3, the authentication credential of specified verifying plug-in unit scheme is provided for client;
4, now, as long as there is request to enter component, the authentication credential (depending on auth type) that it is provided will be all checked, such as
The fruit request can not be verified or authentication failed, then requests to be locked, and does not execute the operation forwarded to server-side API.
The mode of simplest understanding and configuration client is to be mapped it one by one in user, i.e. a client
Represent a user (or application).But for component, all it doesn't matter for these.The core principles of client are that you can be
It adds plug-in unit, thus he customized request behavior.
Anonymous access: specified server-side API can be configured to only allow (to pass through plug-in unit by the access of authentication
To realize) or only allow anonymous access.That is, a specified server-side API, does not allow to carry out certain clients
Authentication, and anonymous access is carried out for other client.
Failure handling process:
Because being possible to low-response when a client call service end API or service is unavailable, API gateway must not be due to
It waits server-side API and is gone down by indefinite obstruction, such as in the scene of product details, if recommendation service does not respond,
Remaining product detail information should be returned to client by API gateway because these things be still to user it is useful, this
When recommendation be empty or replaced by other contents, such as the product of TOP10.But if product information services not
Response, API gateway should return an error to client.
If server-side API is unavailable, it is exactly so-called time-out that allocating time, which is more than the threshold value of some setting, it is real
Breaker mode is showed, at this moment it can prevent unnecessary waiting of the client to the service being not responding to.If one service
Error rate is more than specified threshold value, then can trigger breaker, then all requests all can be immediately in a time interval
Failure.Return function after request failure, returns to error code.
API gateway provides a mature, expansible, high performance Web server, and additionally provides the portion of being easy to
Administration, configuration and the reverse proxy programmed, can manage the caching of authorization, access control, the load balancing of request, response, and mention
The health examination and monitoring using itself are supplied.
API gateway provides access limitation (permission), flow control (access times), analysis monitoring, log recording, requests to turn
Functions such as (external services) are sent out, developer can be allowed energy to be concentrated in the exploitation of specific logic, without considering client
In the problem interacted with server-side.Unified interface between different services is provided, avoids different server-side API on calling style
Difference.Reduce externally exposure service.When wherein a certain server-side API is changed, need to only be carried out by the security mechanism
Adaptation, without being adjusted to called side.
Embodiment described above, the only present invention more preferably specific embodiment, those skilled in the art is at this
The usual variations and alternatives carried out within the scope of inventive technique scheme should be all included within the scope of the present invention.
Claims (10)
1. the safety control system of a kind of pair of unstructured data resource, it is characterised in that: if including client, API gateway and
Dry server-side API, API gateway include several listening ports and access mandate module, logger module, agent transmitting module,
Current limliting module and analysis monitoring module are serviced, client is communicated with API gateway, and API gateway is communicated with several server-side API
Letter.
2. the safety control system according to claim 1 to unstructured data resource, it is characterised in that: the monitoring
Port includes 8000 ports, 8001 ports, 8443 ports and 8444 ports, wherein 8000 ports come from client for monitoring
Request, and forward the request to server-side API;8001 ports configure component for administrator;8443 ports are group
Part monitors the request from client;8444 monitor the port of request for administrator.
3. the safety control system according to claim 1 or 2 to unstructured data resource, it is characterised in that: described
The access mandate module of API gateway is for providing access mandate, and logger module is for providing log recording, agency's forwarding mould
Block is for providing agency's forwarding, and service current limliting module is for providing service current limliting, and analysis monitoring module is for analyzing monitoring.
4. the safety control system according to claim 3 to unstructured data resource, it is characterised in that: the API
Gateway uses synchronization mechanism.
5. the method for controlling security of a kind of pair of unstructured data resource, it is characterised in that: each right when API gateway operation
The request of server-side API is first hit by API gateway, and API gateway is by the request agency to server-side API to client, API gateway
It is the entrance of the request of each couple of server-side API.
6. the method for controlling security according to claim 5 to unstructured data resource, it is characterised in that: the API
Gateway calls the IP address and port numbers of each server-side API, and API gateway uses service discovery mechanisms: ServerSide
Discovery and/or ClientSide Discovery.
7. the method for controlling security according to claim 5 or 6 to unstructured data resource, it is characterised in that: call
Client carries out authentication when server-side API, specially adds certified component to server-side API, selects a client pair
As providing the authentication credential of specified verifying plug-in unit scheme for client.
8. the method for controlling security according to claim 7 to unstructured data resource, it is characterised in that: API gateway
When handling the request to server-side API, server-side API will be routed to the request of server-side API.
9. the method for controlling security according to claim 7 to unstructured data resource, it is characterised in that: API gateway
When handling the request to server-side API, multiple server-side API are called, response results are condensed together.
10. the method for controlling security according to claim 7 to unstructured data resource, it is characterised in that: API gateway
When handling the request to server-side API, API gateway is performed in parallel request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810871783.9A CN109241767A (en) | 2018-08-02 | 2018-08-02 | Security control system and method for unstructured data resources |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810871783.9A CN109241767A (en) | 2018-08-02 | 2018-08-02 | Security control system and method for unstructured data resources |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109241767A true CN109241767A (en) | 2019-01-18 |
Family
ID=65072805
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810871783.9A Pending CN109241767A (en) | 2018-08-02 | 2018-08-02 | Security control system and method for unstructured data resources |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109241767A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981748A (en) * | 2019-03-05 | 2019-07-05 | 广州车行易科技股份有限公司 | A kind of positive supply method realized based on Kong gateway |
CN109995754A (en) * | 2019-02-20 | 2019-07-09 | 石化盈科信息技术有限责任公司 | The method and computer readable storage medium of application access server end API |
CN110191063A (en) * | 2019-06-13 | 2019-08-30 | 北京百度网讯科技有限公司 | Processing method, device, equipment and the storage medium of service request |
CN111314130A (en) * | 2020-02-13 | 2020-06-19 | 浪潮软件股份有限公司 | Service management and control device and method |
CN112199220A (en) * | 2020-12-01 | 2021-01-08 | 蚂蚁智信(杭州)信息技术有限公司 | API gateway-based data calling method and API gateway |
CN113114765A (en) * | 2021-04-13 | 2021-07-13 | 成都九洲电子信息系统股份有限公司 | Interface calling system based on reverse proxy |
CN113765982A (en) * | 2020-12-17 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Request response method, device, system, server and storage medium |
CN115174502A (en) * | 2022-06-30 | 2022-10-11 | 广东亿迅科技有限公司 | Flow control method, device, equipment and medium of API gateway |
CN115396493A (en) * | 2022-08-17 | 2022-11-25 | 融慧金科金融服务外包(北京)有限公司 | Management system and method for distributed dynamic control API (application program interface) overtime response |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662357A (en) * | 2008-08-29 | 2010-03-03 | 公安部第三研究所 | Method for accessing secure gateway client |
US20150188900A1 (en) * | 2013-12-31 | 2015-07-02 | Digital River, Inc. | Session managment in a multi-tenant, multi-data center environment system and method |
CN105577780A (en) * | 2015-12-21 | 2016-05-11 | 武汉理工大学 | College teaching cloud platform based on micro services |
CN105827446A (en) * | 2016-03-31 | 2016-08-03 | 深圳市金溢科技股份有限公司 | Intelligent traffic API gateway and intelligent traffic service system |
CN108200139A (en) * | 2017-12-27 | 2018-06-22 | 浙江力石科技股份有限公司 | A kind of service integration platform |
-
2018
- 2018-08-02 CN CN201810871783.9A patent/CN109241767A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662357A (en) * | 2008-08-29 | 2010-03-03 | 公安部第三研究所 | Method for accessing secure gateway client |
US20150188900A1 (en) * | 2013-12-31 | 2015-07-02 | Digital River, Inc. | Session managment in a multi-tenant, multi-data center environment system and method |
CN105577780A (en) * | 2015-12-21 | 2016-05-11 | 武汉理工大学 | College teaching cloud platform based on micro services |
CN105827446A (en) * | 2016-03-31 | 2016-08-03 | 深圳市金溢科技股份有限公司 | Intelligent traffic API gateway and intelligent traffic service system |
CN108200139A (en) * | 2017-12-27 | 2018-06-22 | 浙江力石科技股份有限公司 | A kind of service integration platform |
Non-Patent Citations (1)
Title |
---|
赵毅 等: "恒丰银行分布式核心系统-API网关技术原型落地实践", 《中国金融电脑》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995754A (en) * | 2019-02-20 | 2019-07-09 | 石化盈科信息技术有限责任公司 | The method and computer readable storage medium of application access server end API |
CN109995754B (en) * | 2019-02-20 | 2021-06-22 | 石化盈科信息技术有限责任公司 | Method for application to access server side API and computer readable storage medium |
CN109981748A (en) * | 2019-03-05 | 2019-07-05 | 广州车行易科技股份有限公司 | A kind of positive supply method realized based on Kong gateway |
CN109981748B (en) * | 2019-03-05 | 2021-11-30 | 广州车行易科技股份有限公司 | Forward proxy method realized based on Kong gateway |
CN110191063A (en) * | 2019-06-13 | 2019-08-30 | 北京百度网讯科技有限公司 | Processing method, device, equipment and the storage medium of service request |
CN111314130A (en) * | 2020-02-13 | 2020-06-19 | 浪潮软件股份有限公司 | Service management and control device and method |
CN111314130B (en) * | 2020-02-13 | 2022-09-13 | 浪潮软件股份有限公司 | Service management and control device and method |
CN112199220A (en) * | 2020-12-01 | 2021-01-08 | 蚂蚁智信(杭州)信息技术有限公司 | API gateway-based data calling method and API gateway |
CN113765982A (en) * | 2020-12-17 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Request response method, device, system, server and storage medium |
CN113114765A (en) * | 2021-04-13 | 2021-07-13 | 成都九洲电子信息系统股份有限公司 | Interface calling system based on reverse proxy |
CN115174502A (en) * | 2022-06-30 | 2022-10-11 | 广东亿迅科技有限公司 | Flow control method, device, equipment and medium of API gateway |
CN115396493A (en) * | 2022-08-17 | 2022-11-25 | 融慧金科金融服务外包(北京)有限公司 | Management system and method for distributed dynamic control API (application program interface) overtime response |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109241767A (en) | Security control system and method for unstructured data resources | |
US8266327B2 (en) | Identity brokering in a network element | |
US7606267B2 (en) | Reducing the sizes of application layer messages in a network element | |
EP1839176B1 (en) | Data traffic load balancing based on application layer messages | |
US8312148B2 (en) | Performing message payload processing functions in a network element on behalf of an application | |
US7509431B2 (en) | Performing message and transformation adapter functions in a network element on behalf of an application | |
US11184459B2 (en) | Method and system for a network presence platform with intelligent routing | |
US7827256B2 (en) | Applying quality of service to application messages in network elements | |
US7664879B2 (en) | Caching content and state data at a network element | |
US8082304B2 (en) | Guaranteed delivery of application layer messages by a network element | |
US20060168334A1 (en) | Application layer message-based server failover management by a network element | |
US9817658B2 (en) | Elastic application framework for deploying software | |
US20060146879A1 (en) | Interpreting an application message at a network element using sampling and heuristics | |
US20240089343A1 (en) | Service layer-based methods to enable efficient analytics of iot data | |
US20040225656A1 (en) | Web services method and system | |
US7733884B1 (en) | Systems and methods for exposing functionality with strict access controls | |
CN118283043A (en) | Resource delivery method and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |