CN109241767A - Security control system and method for unstructured data resources - Google Patents

Security control system and method for unstructured data resources Download PDF

Info

Publication number
CN109241767A
CN109241767A CN201810871783.9A CN201810871783A CN109241767A CN 109241767 A CN109241767 A CN 109241767A CN 201810871783 A CN201810871783 A CN 201810871783A CN 109241767 A CN109241767 A CN 109241767A
Authority
CN
China
Prior art keywords
api
server
request
client
api gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810871783.9A
Other languages
Chinese (zh)
Inventor
孔繁博
邢勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Software Group Co Ltd
Original Assignee
Inspur Software Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Software Group Co Ltd filed Critical Inspur Software Group Co Ltd
Priority to CN201810871783.9A priority Critical patent/CN109241767A/en
Publication of CN109241767A publication Critical patent/CN109241767A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a security control system and a security control method for unstructured data resources, and belongs to the technical field of computer software. The safety control system for the unstructured data resources comprises a client, an API gateway and a plurality of service side APIs, wherein the API gateway comprises a plurality of monitoring ports, an access authorization module, a log recording module, a proxy forwarding module, a service current limiting module and an analysis monitoring module, the client is communicated with the API gateway, and the API gateway is communicated with the plurality of service side APIs. The security control system for the unstructured data resources can enable developers to concentrate on the development of specific logics without considering the problem of interaction between the client and the server, and has good popularization and application values.

Description

The safety control system and method for a kind of pair of unstructured data resource
Technical field
The present invention relates to computer software technical fields, specifically provide the security control of a kind of pair of unstructured data resource System and method.
Background technique
Client and server API(Application Programming Interface, that is, application program service connects Mouthful) interaction when, for server end API, API developer is other than developing necessary service logic, it is also necessary to consider To various work such as access mandate, access log record, request forwarding, analysis and monitoring, development difficulty is increased.For client For end, each API excessively disperses, none unified entrance increases the difficulty of client call.In traditional monomer In, these functions are typically all to embed in the application, as an assembly operating.But under micro services architecture mode, Variety classes and independently operated application might have it is tens of or even hundreds of, continue to use this mode will cause it is very high Management and publication cost.So just needing above to take out a unified traffic ingress in these applications, these functions are completed It realizes.
On the other hand, server-side API granularity is usually different from the demand grain size of client.Server-side generally provides fine granularity API, it means that client needs interacted with multiple services.The data resource that different client needs often is also Distinguishing, some clients need rough information, and some clients need more detailed data resource.Different For different clients, permission is also different data resource.Over time, the division for servicing end interface is difficult Accomplish it is unalterable, so server-side API is needed to client hidden.
Summary of the invention
Technical assignment of the invention is that in view of the above problems, providing one kind can make developer concentrate on energy In the exploitation of specific logic, without consider in problem that client is interacted with server-side to unstructured data resource Safety control system.
The further technical assignment of the present invention is to provide the method for controlling security of a kind of pair of unstructured data resource.
To achieve the above object, the present invention provides the following technical scheme that
The safety control system of a kind of pair of unstructured data resource, including client, API gateway and several server-side API, API gateway includes several listening ports and access mandate module, logger module, agent transmitting module, service current limliting module With analysis monitoring module, client is communicated with API gateway, and API gateway is communicated with several server-side API.
Preferably, the listening port includes 8000 ports, 8001 ports, 8443 ports and 8444 ports, wherein 8000 ports forward the request to server-side API for monitoring the request from client;8001 ports are used for administrator couple Component is configured;8443 ports are that component monitors the request from client;8444 monitor the port of request for administrator.
8000 ports are that component is used to monitor the HTTP request from client, and this request is forwarded to server-side API and the main port used.
8443 ports are the ports for the request that component monitors HTTP.The port has the behavior similar with 8000 ports, but It is the request of its monitoring HTTPS, forwarding behavior can't be generated.This port can be disabled by configuration file.
8001 ports are used for the port that administrator configures component.
The port of HTTPS request is monitored for administrator in 8444 ports.
Component provides the management server end API of a RESTful form on 8001 ports, is used for admin instance Or the configuration of cluster.Server-side API is added by administrator.It is forwarded and is requested by component: issuing following CURL request to verify Whether component will request correctly to be forwarded to server-side API.Under default situations, component is that agency is handled on 8000 ports Request, a successfully response, it is meant that (http://localhost:8000) request has been forwarded to me by component In the address that configures in the first step, and response is forwarded.
Preferably, the access mandate module of the API gateway is for providing access mandate, logger module is for mentioning For log recording, agent transmitting module is for providing agency's forwarding, and service current limliting module is for providing service current limliting, analysis monitoring Module is for analyzing monitoring.
API gateway encapsulates built-in system framework, and an API is provided separately for each client.There are also other for API gateway Responsibility, such as load balancing, caching, the modification of request and management, the processing of steady-error coefficient.
Preferably, the API gateway uses synchronization mechanism, such as HTTP.
The method of controlling security of a kind of pair of unstructured data resource, when API gateway operation, each to server-side API Request first hit by API gateway, for API gateway by the request agency to server-side API to client, API gateway is each right The entrance of the request of server-side API.
Between request and return, API gateway, which will execute, has been carried out installation and configured any plug-in unit, is awarded Power.
Because being possible to low-response when a client call service end API or service being unavailable, API gateway must not Gone down due to waiting server-side API by indefinite obstruction, such as in the scene of product details, if recommendation service is not rung It answers, remaining product detail information should be returned to client by API gateway, because these things are still useful to user , recommendation at this moment is empty or is replaced by other contents, such as the product of TOP10.But if product information Service does not respond, and API gateway should return an error to client.
If server-side API is unavailable, it is exactly so-called time-out that allocating time, which is more than the threshold value of some setting, it is real Breaker mode is showed, at this moment it can prevent unnecessary waiting of the client to the service being not responding to.If one service Error rate is more than specified threshold value, then can trigger breaker, then all requests all can be immediately in a time interval Failure.Return function after request failure, returns to error code.
Preferably, the API gateway calls the IP address and port numbers of each server-side API, and API gateway uses clothes Business discovery mechanism: ServerSide Discovery and/or ClientSide Discovery.
The position (IP address and port numbers) for each server-side API that API gateway calls needs in traditional application The position of server-side API is configured rigidly, but just very simple in present application based on cloud.Infrastructure services, such as Message-oriented middleware is usually all a static position, can be specified by the environmental variance of operating system.However, determining The position of one application service be not it is so simple, application service is to dynamically distribute position, and the example of a service Set is also what dynamic changed, this is because some automatically scalable appearance and upgradings.Therefore, API gateway will be serviced as others Client is the same, needs the service discovery mechanisms using system: ServerSide Discovery or ClientSide Discovery.System uses the discovery of client-side, and API gateway allows for inquiring service register center, it is institute There is the database purchase of server-side API and corresponding position.
When agency's forwarding, the HTTP request (being defaulted as 8000) on the proxy port of its configuration is monitored, and identify and asking The configuration plug-in (not executed if not) for being which server-side API, then operating on server-side API asked, and will The HTTP request of client is forwarded to the API service of oneself.Component is a transparent agency, it can forward a request to client End request, the various titles in addition to adding such as Connection etc.
Preferably, client carries out authentication when calling server-side API, specially adds and authenticate to server-side API Component selects a client object, and the authentication credential of specified verifying plug-in unit scheme is provided for client.
As long as there is request to enter component, the authentication credential (depending on auth type) that it is provided will be all checked, if The request can not be verified or authentication failed, then requests to be locked, and does not execute the operation forwarded to server-side API.
The mode of simplest understanding and configuration client is to be mapped it one by one in user, i.e. a client Represent a user (or application).But for component, all it doesn't matter for these.The core principles of client are that you can be It adds plug-in unit, thus he customized request behavior.
Anonymous access: specified server-side API can be configured to only allow (to pass through plug-in unit by the access of authentication To realize) or only allow anonymous access.That is, a specified server-side API, does not allow to carry out certain clients Authentication, and anonymous access is carried out for other client.
Preferably, when API gateway handles the request to server-side API service will be routed to the request of server-side API Hold API.
The mode that API gateway handles some requests is that they are simply routed to suitable server-side API.
Preferably, multiple server-side API are called, by response results when API gateway handles the request to server-side API It condenses together.
The mode that API gateway handles certain requests is to call multiple server-side API, then gathers their response results It is combined.
Preferably, API gateway is performed in parallel request when API gateway handles the request to server-side API.
For certain requests, such as the request of product details, its server-side API be all it is independent of each other, in order to reduce Response time, API gateway should be performed in parallel these independent requests.Then, sometimes between some requests when each other according to Bad.API gateway is before routing requests to server-side API, it may be necessary to authentication service be called to carry out checking request.Class As, when obtaining the product list of customer need, API gateway must retrieve the product summary info of customer need first, so The details of each product could be retrieved afterwards.
Compared with prior art, the method for controlling security of the invention to unstructured data resource has following prominent The utility model has the advantages that described can customize different power to the method for controlling security of unstructured data resource for different clients Limit provides monitoring function for the access of server-side API and availability etc..Different services can be opened for different clients API is held, provides optimal access interface to each client.API gateway allows client in a request to multiple services Pulling data.Reduce request/round-trip quantity, promotes user experience.The security access mechanism can provide high-performance, High Availabitity Trusteeship service, so that the developer serviced be helped easily externally to provide service, and do not have to consider security control, flow control, The problems such as log recording, is unified in gateway layer for safety certification, and flow control, log recording, request forwarding etc. is realized, with good Good application value.
Detailed description of the invention
Fig. 1 is the topological diagram of the safety control system of the present invention to unstructured data resource.
Specific embodiment
Below in conjunction with drawings and examples, to the safety control system of the invention to unstructured data resource and side Method is described in further detail.
Embodiment
As shown in Figure 1, the safety control system of the invention to unstructured data resource, including client, API gateway With several server-side API.Client is communicated with API gateway, and API gateway is communicated with several server-side API.Wherein, API net It closes and uses synchronization mechanism, such as HTTP.
API gateway includes listening port and access mandate module, logger module, agent transmitting module, service current limliting Module and analysis monitoring module.Listening port includes 8000 ports, 8001 ports, 8443 ports and 8444 ports.8000 ports It is that component is used to monitor the HTTP request from client, and this request is forwarded to server-side API and main is used Port.8443 ports are the ports for the request that component monitors HTTP.The port has the behavior similar with 8000 ports, still It only monitors the request of HTTPS, can't generate forwarding behavior.This port can be disabled by configuration file.8001 ports The port that component is configured for administrator.The port of HTTPS request is monitored for administrator in 8444 ports.Component exists The management server end API of a RESTful form, the configuration for admin instance or cluster are provided on 8001 ports.It is logical It crosses administrator and adds server-side API.It is forwarded and is requested by component: issuing whether following CURL request will be requested just with checking assembly True has been forwarded to server-side API.Under default situations, component is processing proxy requests, a success on 8000 ports Response, it is meant that (http://localhost:8000) request has been forwarded to us and configured in the first step by component Address in, and response is forwarded.
The access mandate module of API gateway is for providing access mandate, and logger module is for providing log recording, generation Forwarding module is managed for providing agency's forwarding, service current limliting module is for providing service current limliting, and analysis monitoring module is for analyzing Monitoring.
API gateway encapsulates built-in system framework, and an API is provided separately for each client.There are also other for API gateway Responsibility, such as load balancing, caching, the modification of request and management, the processing of steady-error coefficient.
Method of controlling security to unstructured data resource of the invention requests process are as follows: when API gateway operation, Each the request of server-side API is first hit by API gateway, API gateway by the request agency to server-side API to client, Between request and return, API gateway, which will execute, has been carried out installation and configured any plug-in unit, is authorized.API net Pass is the entrance of the request of each couple of server-side API.
Response type model in this method are as follows: the mode that API gateway handles some requests is simply to be routed to them properly Server-side API;The mode for handling other requests is to call multiple server-side API, is then aggregated in their response results Together.For certain requests, such as the request of product details, its server-side API be all it is independent of each other, when in order to reduce response Between, API gateway should be performed in parallel these independent requests.However, being sometimes depending therefrom between some requests. API gateway is before routing requests to server-side API, it may be necessary to authentication service be called to carry out checking request.Similarly, When obtaining the product list of customer need, API gateway must retrieve the product summary info of customer need first, then could Retrieve the details of each product.
API gateway monitors the request of four ports, and default situations are:
8000: this port is that component is used to monitor the HTTP request from client, and this request is forwarded to server-side API.This is also the main port used.
8443: this port is the port for the request that component monitors HTTP.The port has the behavior similar with 8000 ports, But it only monitors the request of HTTPS, can't generate forwarding behavior.This port can be disabled by configuration file.
8001: the port that component is configured for administrator.
8444: the port of HTTPS request is monitored for administrator.
Component provides the management server end API of a RESTful form on 8001 ports, is used for admin instance Or the configuration of cluster.Server-side API is added by administrator.It is forwarded and is requested by component: issuing following CURL request to verify Whether component will request correctly to be forwarded to server-side API.Under default situations, component is that agency is handled on 8000 ports Request, one successfully corresponding, it is meant that (http://localhost:8000) request has been forwarded to me by component In the address that configures in the first step, and response is forwarded.
Service discovery process: the position (IP address and port numbers) for each server-side API that API gateway calls, in tradition Application in, need to configure the position of server-side API rigidly, but just very simple in application based on cloud now.Basis Facilities services, such as message-oriented middleware are usually all a static positions, can be referred to by the environmental variance of operating system It is fixed.However, determine the position of an application service be not it is so simple, application service is to dynamically distribute position, and one The example collection of a service is also what dynamic changed, this is because some automatically scalable appearance and upgradings.Therefore, API gateway is wanted As other service clients, need the service discovery mechanisms using system: ServerSide Discovery or ClientSide Discovery.System uses the discovery of client-side, and API gateway allows for inquiring service registration Center, it is the database purchase of all server-side API and corresponding position.
It acts on behalf of repeating process: monitoring the HTTP request (being defaulted as 8000) on the proxy port of its configuration, and identify The configuration plug-in (not executed if not) for being which server-side API, then operating on server-side API of request, and The HTTP request of client is forwarded to the API service of oneself.Component is a transparent agency, it can forward a request to visitor The request of family end, the various titles in addition to adding such as Connection etc.
Authenticate permission process:
Common authentication: under normal circumstances, calling server-side API to require client has authentication, and does not allow recognizing for mistake Card or the request without certification pass through.This demand may be implemented in Authorization Plug-in Component.Process flow is as follows:
1, to server-side API or global addition certified component;
2, a client object is selected;
3, the authentication credential of specified verifying plug-in unit scheme is provided for client;
4, now, as long as there is request to enter component, the authentication credential (depending on auth type) that it is provided will be all checked, such as The fruit request can not be verified or authentication failed, then requests to be locked, and does not execute the operation forwarded to server-side API.
The mode of simplest understanding and configuration client is to be mapped it one by one in user, i.e. a client Represent a user (or application).But for component, all it doesn't matter for these.The core principles of client are that you can be It adds plug-in unit, thus he customized request behavior.
Anonymous access: specified server-side API can be configured to only allow (to pass through plug-in unit by the access of authentication To realize) or only allow anonymous access.That is, a specified server-side API, does not allow to carry out certain clients Authentication, and anonymous access is carried out for other client.
Failure handling process:
Because being possible to low-response when a client call service end API or service is unavailable, API gateway must not be due to It waits server-side API and is gone down by indefinite obstruction, such as in the scene of product details, if recommendation service does not respond, Remaining product detail information should be returned to client by API gateway because these things be still to user it is useful, this When recommendation be empty or replaced by other contents, such as the product of TOP10.But if product information services not Response, API gateway should return an error to client.
If server-side API is unavailable, it is exactly so-called time-out that allocating time, which is more than the threshold value of some setting, it is real Breaker mode is showed, at this moment it can prevent unnecessary waiting of the client to the service being not responding to.If one service Error rate is more than specified threshold value, then can trigger breaker, then all requests all can be immediately in a time interval Failure.Return function after request failure, returns to error code.
API gateway provides a mature, expansible, high performance Web server, and additionally provides the portion of being easy to Administration, configuration and the reverse proxy programmed, can manage the caching of authorization, access control, the load balancing of request, response, and mention The health examination and monitoring using itself are supplied.
API gateway provides access limitation (permission), flow control (access times), analysis monitoring, log recording, requests to turn Functions such as (external services) are sent out, developer can be allowed energy to be concentrated in the exploitation of specific logic, without considering client In the problem interacted with server-side.Unified interface between different services is provided, avoids different server-side API on calling style Difference.Reduce externally exposure service.When wherein a certain server-side API is changed, need to only be carried out by the security mechanism Adaptation, without being adjusted to called side.
Embodiment described above, the only present invention more preferably specific embodiment, those skilled in the art is at this The usual variations and alternatives carried out within the scope of inventive technique scheme should be all included within the scope of the present invention.

Claims (10)

1. the safety control system of a kind of pair of unstructured data resource, it is characterised in that: if including client, API gateway and Dry server-side API, API gateway include several listening ports and access mandate module, logger module, agent transmitting module, Current limliting module and analysis monitoring module are serviced, client is communicated with API gateway, and API gateway is communicated with several server-side API Letter.
2. the safety control system according to claim 1 to unstructured data resource, it is characterised in that: the monitoring Port includes 8000 ports, 8001 ports, 8443 ports and 8444 ports, wherein 8000 ports come from client for monitoring Request, and forward the request to server-side API;8001 ports configure component for administrator;8443 ports are group Part monitors the request from client;8444 monitor the port of request for administrator.
3. the safety control system according to claim 1 or 2 to unstructured data resource, it is characterised in that: described The access mandate module of API gateway is for providing access mandate, and logger module is for providing log recording, agency's forwarding mould Block is for providing agency's forwarding, and service current limliting module is for providing service current limliting, and analysis monitoring module is for analyzing monitoring.
4. the safety control system according to claim 3 to unstructured data resource, it is characterised in that: the API Gateway uses synchronization mechanism.
5. the method for controlling security of a kind of pair of unstructured data resource, it is characterised in that: each right when API gateway operation The request of server-side API is first hit by API gateway, and API gateway is by the request agency to server-side API to client, API gateway It is the entrance of the request of each couple of server-side API.
6. the method for controlling security according to claim 5 to unstructured data resource, it is characterised in that: the API Gateway calls the IP address and port numbers of each server-side API, and API gateway uses service discovery mechanisms: ServerSide Discovery and/or ClientSide Discovery.
7. the method for controlling security according to claim 5 or 6 to unstructured data resource, it is characterised in that: call Client carries out authentication when server-side API, specially adds certified component to server-side API, selects a client pair As providing the authentication credential of specified verifying plug-in unit scheme for client.
8. the method for controlling security according to claim 7 to unstructured data resource, it is characterised in that: API gateway When handling the request to server-side API, server-side API will be routed to the request of server-side API.
9. the method for controlling security according to claim 7 to unstructured data resource, it is characterised in that: API gateway When handling the request to server-side API, multiple server-side API are called, response results are condensed together.
10. the method for controlling security according to claim 7 to unstructured data resource, it is characterised in that: API gateway When handling the request to server-side API, API gateway is performed in parallel request.
CN201810871783.9A 2018-08-02 2018-08-02 Security control system and method for unstructured data resources Pending CN109241767A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810871783.9A CN109241767A (en) 2018-08-02 2018-08-02 Security control system and method for unstructured data resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810871783.9A CN109241767A (en) 2018-08-02 2018-08-02 Security control system and method for unstructured data resources

Publications (1)

Publication Number Publication Date
CN109241767A true CN109241767A (en) 2019-01-18

Family

ID=65072805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810871783.9A Pending CN109241767A (en) 2018-08-02 2018-08-02 Security control system and method for unstructured data resources

Country Status (1)

Country Link
CN (1) CN109241767A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981748A (en) * 2019-03-05 2019-07-05 广州车行易科技股份有限公司 A kind of positive supply method realized based on Kong gateway
CN109995754A (en) * 2019-02-20 2019-07-09 石化盈科信息技术有限责任公司 The method and computer readable storage medium of application access server end API
CN110191063A (en) * 2019-06-13 2019-08-30 北京百度网讯科技有限公司 Processing method, device, equipment and the storage medium of service request
CN111314130A (en) * 2020-02-13 2020-06-19 浪潮软件股份有限公司 Service management and control device and method
CN112199220A (en) * 2020-12-01 2021-01-08 蚂蚁智信(杭州)信息技术有限公司 API gateway-based data calling method and API gateway
CN113114765A (en) * 2021-04-13 2021-07-13 成都九洲电子信息系统股份有限公司 Interface calling system based on reverse proxy
CN113765982A (en) * 2020-12-17 2021-12-07 北京沃东天骏信息技术有限公司 Request response method, device, system, server and storage medium
CN115174502A (en) * 2022-06-30 2022-10-11 广东亿迅科技有限公司 Flow control method, device, equipment and medium of API gateway
CN115396493A (en) * 2022-08-17 2022-11-25 融慧金科金融服务外包(北京)有限公司 Management system and method for distributed dynamic control API (application program interface) overtime response

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662357A (en) * 2008-08-29 2010-03-03 公安部第三研究所 Method for accessing secure gateway client
US20150188900A1 (en) * 2013-12-31 2015-07-02 Digital River, Inc. Session managment in a multi-tenant, multi-data center environment system and method
CN105577780A (en) * 2015-12-21 2016-05-11 武汉理工大学 College teaching cloud platform based on micro services
CN105827446A (en) * 2016-03-31 2016-08-03 深圳市金溢科技股份有限公司 Intelligent traffic API gateway and intelligent traffic service system
CN108200139A (en) * 2017-12-27 2018-06-22 浙江力石科技股份有限公司 A kind of service integration platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662357A (en) * 2008-08-29 2010-03-03 公安部第三研究所 Method for accessing secure gateway client
US20150188900A1 (en) * 2013-12-31 2015-07-02 Digital River, Inc. Session managment in a multi-tenant, multi-data center environment system and method
CN105577780A (en) * 2015-12-21 2016-05-11 武汉理工大学 College teaching cloud platform based on micro services
CN105827446A (en) * 2016-03-31 2016-08-03 深圳市金溢科技股份有限公司 Intelligent traffic API gateway and intelligent traffic service system
CN108200139A (en) * 2017-12-27 2018-06-22 浙江力石科技股份有限公司 A kind of service integration platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵毅 等: "恒丰银行分布式核心系统-API网关技术原型落地实践", 《中国金融电脑》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995754A (en) * 2019-02-20 2019-07-09 石化盈科信息技术有限责任公司 The method and computer readable storage medium of application access server end API
CN109995754B (en) * 2019-02-20 2021-06-22 石化盈科信息技术有限责任公司 Method for application to access server side API and computer readable storage medium
CN109981748A (en) * 2019-03-05 2019-07-05 广州车行易科技股份有限公司 A kind of positive supply method realized based on Kong gateway
CN109981748B (en) * 2019-03-05 2021-11-30 广州车行易科技股份有限公司 Forward proxy method realized based on Kong gateway
CN110191063A (en) * 2019-06-13 2019-08-30 北京百度网讯科技有限公司 Processing method, device, equipment and the storage medium of service request
CN111314130A (en) * 2020-02-13 2020-06-19 浪潮软件股份有限公司 Service management and control device and method
CN111314130B (en) * 2020-02-13 2022-09-13 浪潮软件股份有限公司 Service management and control device and method
CN112199220A (en) * 2020-12-01 2021-01-08 蚂蚁智信(杭州)信息技术有限公司 API gateway-based data calling method and API gateway
CN113765982A (en) * 2020-12-17 2021-12-07 北京沃东天骏信息技术有限公司 Request response method, device, system, server and storage medium
CN113114765A (en) * 2021-04-13 2021-07-13 成都九洲电子信息系统股份有限公司 Interface calling system based on reverse proxy
CN115174502A (en) * 2022-06-30 2022-10-11 广东亿迅科技有限公司 Flow control method, device, equipment and medium of API gateway
CN115396493A (en) * 2022-08-17 2022-11-25 融慧金科金融服务外包(北京)有限公司 Management system and method for distributed dynamic control API (application program interface) overtime response

Similar Documents

Publication Publication Date Title
CN109241767A (en) Security control system and method for unstructured data resources
US8266327B2 (en) Identity brokering in a network element
US7606267B2 (en) Reducing the sizes of application layer messages in a network element
EP1839176B1 (en) Data traffic load balancing based on application layer messages
US8312148B2 (en) Performing message payload processing functions in a network element on behalf of an application
US7509431B2 (en) Performing message and transformation adapter functions in a network element on behalf of an application
US11184459B2 (en) Method and system for a network presence platform with intelligent routing
US7827256B2 (en) Applying quality of service to application messages in network elements
US7664879B2 (en) Caching content and state data at a network element
US8082304B2 (en) Guaranteed delivery of application layer messages by a network element
US20060168334A1 (en) Application layer message-based server failover management by a network element
US9817658B2 (en) Elastic application framework for deploying software
US20060146879A1 (en) Interpreting an application message at a network element using sampling and heuristics
US20240089343A1 (en) Service layer-based methods to enable efficient analytics of iot data
US20040225656A1 (en) Web services method and system
US7733884B1 (en) Systems and methods for exposing functionality with strict access controls
CN118283043A (en) Resource delivery method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication