CN109802957A - Interface butt joint method, device, computer equipment and storage medium - Google Patents
Interface butt joint method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109802957A CN109802957A CN201910003487.1A CN201910003487A CN109802957A CN 109802957 A CN109802957 A CN 109802957A CN 201910003487 A CN201910003487 A CN 201910003487A CN 109802957 A CN109802957 A CN 109802957A
- Authority
- CN
- China
- Prior art keywords
- preset format
- request
- access
- code value
- field name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 210000001503 joint Anatomy 0.000 title claims abstract description 23
- 238000012545 processing Methods 0.000 claims abstract description 39
- 238000010606 normalization Methods 0.000 claims abstract description 27
- 238000004590 computer program Methods 0.000 claims description 29
- 238000003032 molecular docking Methods 0.000 claims description 13
- 230000002688 persistence Effects 0.000 claims description 13
- 230000009466 transformation Effects 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 238000013507 mapping Methods 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 2
- 230000013011 mating Effects 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013481 data capture Methods 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of interface butt joint methods, device, computer equipment and storage medium, the access request sent by receiving access side, request message in the access request received is formatted, obtain the request object of preset format, by in the access request received field name and code value carry out data normalization processing, obtain the field name of preset format and the code value of preset format, unified reference format is converted into so as to the access data to different channels or different service types, and then pass through the request object to preset format, the field name of preset format and the code value of preset format carry out data check, only when data check result is to meet the requirements, the request object of preset format is mapped in corresponding domain object, so that when needing to be docked from the interface of different channels or different service types , by being converted to the access request of uniform format to access request, access request is being linked into corresponding domain object.
Description
Technical field
This application involves Internet technical field, more particularly to a kind of interface butt joint method, device, computer equipment and
Storage medium.
Background technique
With the continuous development of internet, in financial sector, same asset side can correspond to different fund sides, same fund side
Also different asset sides can be connect.In docking operation, it may appear that following several problems: 1, different channel docking modes are different, have
It is SOCKET request, has plenty of HTTP request.2, the channel message having needs encryption and decryption some not need.Even if 3, different channels
It is all requested using HTTP/JSON, message format and field name also will appear difference.4, same channel, different business scene
Will appear the difference of request message: such as vehicle loan needs vehicle-related information field, and loan of renting a house needs leasing company, house numbers
Etc. information.Therefore, since business is not quite similar between different cooperation channels, interface field title meeting different from, business must word
Section also can be different, and when exploitation needs to define an interface individually for each cooperation channel, and interface re-defines, waste of resource.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide interface butt joint method, the dress that one kind can economize on resources
It sets, computer equipment and storage medium.
A kind of interface butt joint method, which comprises
Receive the access request that access side sends;
Request message in the access request received is formatted, the request pair of preset format is obtained
As;
By in the access request received field name and code value carry out data normalization processing, obtain preset format
Field name and preset format code value;
The request object, the field name of the preset format and the code value of the preset format of the preset format are carried out
Data check obtains data check result;
When data check result is to meet the requirements, the request object of the preset format is mapped to corresponding field pair
As in.
The field name in the access request that will be received and code value carry out data in one of the embodiments,
Standardization, obtain preset format field name and preset format code value the step of include:
Obtain the field name and code value in the access request;
By the field name and the code value according to the corresponding transformation rule of channel type and interface type of access request
Data normalization processing is carried out, the field name of preset format and the code value of preset format are obtained.
It is described by the request object of the preset format, the field name of the preset format in one of the embodiments,
And the preset format code value carry out data check, obtain data check result the step of, comprising:
Request object, the field name of the preset format and the code value of the preset format of the preset format are based on
Data dictionary in database is verified,
When the request object, the field name of the preset format and the code value and number of the preset format of the preset format
It is to meet the requirements to data check result when corresponding to according to the data in dictionary.
In one of the embodiments, when the request object of the preset format, the field name of the preset format and institute
State the code value of preset format and the data in data dictionary not to it is corresponding when check results be undesirable;
When data check result is undesirable, refuse the access request.
In one of the embodiments, it is described reception access side send access request the step of after, it is described to connect
Before the step of request message in the access request received formats, further includes: when the received access
When the request message of request is the request message of encryption, the request message of the encryption is decrypted, obtains request message.
In one of the embodiments, the method also includes:
It, will be corresponding with access checkering when the request message of the received access request is the request message of encryption
Returning an object value is encrypted according to the encryption rule of access side, obtains encrypted returning an object value, by encrypted returning an object value
It is sent to access side.
In one of the embodiments, described when data check result is to meet the requirements, by the preset format
Request object is mapped to after the step in corresponding domain object, further includes:
By the preset format request object, the preset format field name and the preset format code value according to
Corresponding domain object saves after carrying out data persistence to database.
A kind of interface docking facilities, described device include:
Access request receiving module, for receiving the access request of access side's transmission;
Format converting module is obtained for formatting the request message in the access request received
The request object of preset format;
Data processing module, for by the access request received field name and code value carry out data normalization
Processing, obtains the field name of preset format and the code value of preset format;
Data check module, for request object, the field name of the preset format and described to the preset format
The code value of preset format carries out data check, obtains data check result;
When data check result is to meet the requirements, the request object of the preset format is mapped to corresponding field pair
As in.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of method is realized when row.
Above-mentioned interface butt joint method, device, computer equipment and storage medium are asked by receiving the access that access side sends
It asks, the request message in the access request received is formatted, obtain the request object of preset format, will receive
Access request in field name and code value carry out data normalization processing, obtain the field name and preset format of preset format
Code value is converted into unified reference format so as to the access data to different channels or different service types, and then passes through
Data check is carried out to the request object, the field name of preset format and the code value of preset format of preset format, only works as data
Check results be when meeting the requirements, the request object of preset format is mapped in corresponding domain object so that when need with
When the interface of different channels or different service types is docked, asked by the access for being converted to uniform format to access request
It asks, access request is being linked into corresponding domain object.This method in each domain object without establishing different docking
Interface is docked from the interface of different channels or different service types, to economize on resources, mitigates the workload of developer,
And it is convenient for interface management.
Detailed description of the invention
Fig. 1 is the application scenario diagram of interface butt joint method in one embodiment;
Fig. 2 is the flow diagram of interface butt joint method in one embodiment;
Fig. 3 is the structural block diagram of interface docking facilities in one embodiment;
Fig. 4 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Interface butt joint method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, access side
Server 102 carries out information exchange by network by network and interface processing server 104.Interface processing server 104 connects
Receive the access request that access side's server 102 is sent;Interface processing server 104 is by the request report in the access request received
Text formats, and obtains the request object of preset format, by the access request received field name and code value carry out
Data normalization processing, obtains the field name of preset format and the code value of preset format, to the request object of preset format, default
The field name of format and the code value of preset format carry out data check, obtain data check result;When data check result is symbol
When conjunction requires, the request object of preset format is mapped in corresponding domain object.Wherein, access side's server 102, interface
Processing server 104 can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of interface butt joint method, it is applied in Fig. 1 in this way
It is illustrated for interface processing server 104, including step S220 to step S:
Step S220 receives the access request that access side sends.
Wherein, access side can refer to fund side, and corresponding access side's server can refer to fund side's server.Access side
The access request of transmission can be the access request of different channel accesses, and such as: SOCKET is requested (it can be appreciated that TCP/IP connects
Enter, SOCKET request is exactly so-called long connection, theoretically client and server end once set up connection will not active
It breaks, but since various environmental factors may be that connection disconnects, such as: server end or client host shut down, network
It is transmitted for a long time without data between failure, or both, network firewall may will disconnect the connection and be provided with releasing network
Source).(it can be appreciated that HTTP is accessed, HTTP request is exactly so-called short connection, i.e. client to HTTP request
Primary request is sent, connection can be broken after server end response) etc..It is also possible to same channel different business scene access
Access request.
Step S240 formats the request message in the access request received, obtains asking for preset format
Seek object.
Wherein, since the access for needing to receive the access request and same channel different business scene of different channel accesses is asked
It asks, the request message format in the access request received is variant, needs to be converted to the request message of different-format unification
The request message of format, obtains the request object of preset format, and the request object of preset format can be current according to asset side
The Format Type used determines the request object of preset format, is also possible to according to the suitable Format Type of asset side current system
Determine the request object of preset format, such as: the received message format of current system is using JSON, the then request of preset format
Object is also JSON format.Format conversion be access side send the request message of extended formatting is converted into JSON format
Request message.In addition, when needing to access side's returned packet, then message report according to used by access side for needing to feed back
Literary format is converted, obtain correspond to access checkering feedback message be sent to access side, such as: current system using
The message of JSON format is converted to the message that access side corresponds to format when feeding back message to access side by the message of JSON format.
Step S260, by the access request received field name and code value carry out data normalization processing, obtain pre-
If the field name of format and the code value of preset format.
Wherein, it is default to refer to that field name and code value in the access request that will be received are converted to for data normalization processing
The field name and code value of format, the field name of preset format can be format used by the field name of asset side current system,
The code value of preset format can be format used by the code value of asset side current system, such as: the field name of access request are as follows:
Amt obtains the field name of preset format: applyAmount after carrying out data normalization processing.
Step S280 counts the code value of the request object, the field name of preset format and preset format of preset format
According to verification, data check result is obtained.
Wherein, it when receiving access request, needs to verify the access data in the access request, verification is not
It is to meet access to require, it is therefore desirable to which the data of access request are verified.To the access data (access in access request
Data include: request message, field name and code value etc.) be converted to the request object of preset format, the field name of preset format
And after the code value of preset format, data check is carried out.
The request object of preset format is mapped to corresponding by step S300 when data check result is to meet the requirements
In domain object.
Wherein, when data check result is to meet the requirements, by the mapping of the request object of preset format (mapping refer to by
Intranet (LAN) IP address of one host is mapped to public network (WAN) IP address, when user's access provides mapping port host
Some port when, request is transferred to and provides the host of this special services inside local area network by server;Utilize port
Mapping function can also be by the different port in multiple port mappings to Intranet different machines of an outer net IP address machine) it arrives
In corresponding domain object, the request object of preset format is mapped to the interface of docking;The request object of preset format maps
It is referred into corresponding domain object: being exactly by a port of the IP address (the request object of preset format) of outer net host
It is mapped to a machine (corresponding domain object) in Intranet, corresponding service is provided, when user accesses this port of the IP
When, server will request on the machine being mapped to inside corresponding local area network automatically, and such as: the request object M of preset format belongs to Shen
Please information object, then the request object M of preset format is mapped in application information object, when user is asked by preset format
When object M being asked to access, application information object is directly accessed.
Above-mentioned interface butt joint method, the access request sent by receiving access side, will be in the access request that received
Request message formats, and obtains the request object of preset format, by the field name and code in the access request received
Value carries out data normalization processing, the field name of preset format and the code value of preset format is obtained, so as to different channels
Or the access data of different service types are converted into unified reference format, and then pass through request object to preset format, pre-
It, will only when data check result is to meet the requirements if the field name of format and the code value of preset format carry out data check
The request object of preset format is mapped in corresponding domain object, so that when needing and different channels or different service types
When interface is docked, by being converted to the access request of uniform format to access request, access request is being linked into correspondence
Domain object in.This method is not necessarily to establish different mating interface and different channels or different business class in each domain object
The interface of type is docked, to economize on resources, mitigates the workload of developer, and be convenient for interface management.
In one embodiment, by the access request received field name and code value carry out data normalization processing,
Obtain preset format field name and preset format code value the step of include:
The field name and code value in access request are obtained, field name and code value according to the channel type of access request and are connect
The corresponding transformation rule of mouth type carries out data normalization processing, obtains the field name of preset format and the code value of preset format.
Wherein, the request data in access request is parsed, obtains the field name and code value in access request;Access
The channel type of request refers to the access request of different access side, interface type refer to the interface such as http agreement,
SOCKET request interface etc..Transformation rule be defined according to each different channel types and different interface type it is corresponding each
Transformation rule, transformation rule are as shown in table 1:
1 transformation rule of table
According to the transformation rule of table 1, specific data normalization is handled such as: the entitled amt of request/response field, according to visit
The channel type yzt and interface type applyCredit for asking request, determine transformation rule be applyAmount*100, according to turn
Rule is changed, after the entitled amt of request/response field is carried out data normalization processing, the entitled applyAmount of criteria field.
In one embodiment, by request object, the field name of preset format and the code value of preset format of preset format
The step of carrying out data check, obtaining data check result, comprising:
By the code value of the request object of preset format, the field name of preset format and preset format based on the number in database
It is verified according to dictionary, when request object, the field name of preset format and the code value of preset format and data word of preset format
Data in allusion quotation are to meet the requirements to data check result when corresponding to.
Wherein, data dictionary refers to the mesh of a kind of database of record that user is accessible and application metadata
Record is that the data item to data, data structure, data flow, data storage, processing logic, external entity etc. are defined and retouch
It states, is the information aggregate for describing data, is to the set of the definition of all data elements used in system, the purpose is to logarithms
It is described in detail according to each element in flow chart, the use of data dictionary is simple modeling project.By preset format
Data in request object, the field name of preset format and the code value and data dictionary of preset format are analyzed, and access is examined
Whether the code value of the request object, the field name of preset format and preset format of the preset format of request meets in data dictionary
It is required that access request could be mapped to corresponding interface by meeting the requirements.Access normally is not inconsistent by data check refusal
Request and malicious access improve safety.
In one embodiment, when request object, the field name of preset format and the code value of preset format of preset format
With the data in data dictionary not to it is corresponding when check results be it is undesirable;When data check result is undesirable,
Refuse the access request.
Wherein, by request object, the field name of preset format and the code value of preset format and data dictionary of preset format
In data analyzed, examine the preset format of access request request object, preset format field name and preset format
Code value whether meet the requirement in data dictionary, it is undesirable then to determine that access request is incorrect, be abnormal access
Access request, therefore access request.Access request and malicious access normally are not inconsistent by data check refusal, improve safety
Property.
In one embodiment, after the step of receiving the access request that access side sends, the access received is asked
Before the step of request message asked formats, further includes: when the request message of received access request is encryption
Request message when, the request message of encryption is decrypted, obtain request message.
Wherein, the request message of encryption can be access side's server before initiating access request, with asset side service
The public key of device exchange algorithm, that is, access side's server give asset side server oneself public key, and asset side server receives
After the public key request of access side's server, the public key for returning to asset side server gives access side's server, realizes the exchange of the two,
Access side's server, by access request by other side's public key encryption, passes through the access request of encryption when initiating access request
The Socket message object of standard is transmitted, and decryption can be to be decrypted by the private key of itself;It is also possible to other request reports
The request message that literary mode encrypts.Can be determined whether according to access request type for access request, such as: HTTP request with
SOCKET request can be that HTTP request or SOCKET are requested by judge the request of current accessed, when being that SOCKET is requested
When, then it is the request message of encryption, is the request message of unencryption when being HTTP request.Realization can be to the access of encryption
The access of request.
In one embodiment, interface butt joint method is further comprised the steps of: when the request message of received access request is to add
When close request message, returning an object value corresponding with access checkering is encrypted according to the encryption rule of access side, is obtained
Encrypted returning an object value is sent to access side by encrypted returning an object value.
Wherein, access side's server is before initiating access request, the public key with asset side server exchange algorithm, also
Being access side's server gives asset side server oneself public key, and asset side server receives the public key request of access side's server
Afterwards, the public key for returning to asset side server gives access side's server, realizes the exchange of the two, returns when needing to feed back access side
When object, by returning an object value by other side's public key encryption, the access request of encryption is passed by the Socket message object of standard
It passs, encrypted returning an object value is sent to access side.The conversion that can solve the access request of encryption realizes that a variety of access are asked
The conversion asked.Realization can be to the access of the access request of encryption.
In one embodiment, when data check result is to meet the requirements, the request object of preset format is mapped
To after the step in corresponding domain object, further includes: by the request object of preset format, the field name of preset format and pre-
If the code value of format saves after carrying out data persistence to database according to corresponding domain object.
Wherein, data persistence refers to that (certain objects are saved in magnetic in memory at storage model by data model translation
In disk), exactly saving data persistence will not lose, the mode of data persistence such as: utilize attribute list file
(being equivalent to a toy data base), some smaller data of persistence, xml format, persistence array and dictionary object lead to
It crosses certain format to be saved in local file some object in memory, so as to the object that reads back from this document again later.
Specifically: attribute list file is utilized, by request object, the field name of preset format and the code value of preset format of preset format
Persistence is saved in domain object corresponding in memory in local file by preset format.So as to later again from this article
Read back the object in part.
In one embodiment, a kind of interface butt joint method is specifically access side with each fund side, and asset side receives
Access request, wherein each fund side has plenty of SOCKET request, has plenty of HTTP request, for:
The access request for receiving fund side judges the type of the access request, is according to the determination of the type of access request
No needs are decrypted, and if the type of access request is SOCKET request, is decrypted, obtains request message, such as access request
Type be HTTP request, request message is converted to the request message of JSON format by acquisition request message, obtains preset format
Request object, by the access request received field name and code value be converted to the field name of asset side current system and adopted
Format used by the code value of format and asset side current system obtains the field name of preset format and the code of preset format
Value passes through the data in data dictionary to the code value of the request message of JSON format, the field name of preset format and preset format
Data check is carried out, judges whether to meet the requirements, meet the requirements, the request object of preset format is mapped to corresponding field pair
As in, using attribute list file, the code value of the request object, the field name of preset format and preset format of preset format is held
Longization is saved in domain object corresponding in memory in local file by preset format.It is undesirable, refuse the visit
Ask request.
It should be understood that although each step in the flow chart of Fig. 2 is successively shown according to the instruction of arrow, this
A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2
Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps
It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out,
But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
In one embodiment, as shown in figure 3, providing a kind of interface docking facilities, comprising: access request receiving module
310, format converting module 320, data processing module 330 and data correction verification module 340, in which:
Access request receiving module 310, for receiving the access request of access side's transmission;Format converting module 320, is used for
Request message in the access request received is formatted, the request object of preset format is obtained;Data processing mould
Block 330, for by the access request received field name and code value carry out data normalization processing, obtain preset format
The code value of field name and preset format;Data check module 340, the word for request object, preset format to preset format
Section name and preset format code value carry out data check, obtain data check as a result, when data check result be meet the requirements when,
The request object of preset format is mapped in corresponding domain object.
In one embodiment, data processing module 330 includes: data capture unit, for obtaining in access request
Field name and code value;Data processing unit, for the channel type and interface type by field name and code value according to access request
Corresponding transformation rule carries out data normalization processing, obtains the field name of preset format and the code value of preset format.
In one embodiment, data check module 340 includes: data check unit, for by the request of preset format
The code value of object, the field name of preset format and preset format is verified based on the data dictionary in database, judging unit,
For when the data pair in the request object, the field name of preset format and the code value and data dictionary of preset format of preset format
At once, data check result is to meet the requirements.
In one embodiment, judging unit is also used to: when preset format request object, preset format field name and
The code value of preset format and the data in data dictionary not to it is corresponding when check results be it is undesirable, when data check result
When being undesirable, denied access request.
In one embodiment, interface docking facilities further include: encryption/decryption module, for asking when received access request
Ask message be encryption request message when, the request message of encryption is decrypted, obtain request message.
In one embodiment, encryption/decryption module is also used to: when the request message of received access request is asking for encryption
When seeking message, returning an object value corresponding with access checkering is encrypted according to the encryption rule of access side, after being encrypted
Returning an object value, encrypted returning an object value is sent to access side.
In one embodiment, interface docking facilities further include: data persistence module, for by the preset format
It requests the code value of object, the field name of the preset format and the preset format according to corresponding domain object, carries out data
It saves after persistence to database.
Above-mentioned interface docking facilities, the access request that access request receiving module 310 is sent by receiving access side, format
Conversion module 320 formats the request message in the access request received, obtains the request object of preset format,
Data processing module 330 by the access request received field name and code value carry out data normalization processing, preset
The field name of format and the code value of preset format are converted into so as to the access data to different channels or different service types
Unified reference format, so by data check module 340 to preset format request object, preset format field name and
The code value of preset format carries out data check, only when data check result is to meet the requirements, by the request pair of preset format
As being mapped in corresponding domain object, so that when needing to be docked from the interface of different channels or different service types,
By being converted to the access request of uniform format to access request, access request is being linked into corresponding domain object.It should
Method is not necessarily to establish different mating interface and the interface of different channels or different service types in each domain object and carries out pair
It connects, to economize on resources, mitigates the workload of developer, and be convenient for interface management.
Specific about interface docking facilities limits the restriction that may refer to above for interface butt joint method, herein not
It repeats again.Modules in above-mentioned interface docking facilities can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 4.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment dictionary data for storing data.The network interface of the computer equipment is used to pass through with external terminal
Network connection communication.To realize a kind of interface butt joint method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 4, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor perform the steps of when executing computer program
Receive the access request that access side sends;Request message in the access request received is formatted,
Obtain the request object of preset format;By in the access request received field name and code value carry out data normalization processing,
Obtain the field name of preset format and the code value of preset format;To preset format request object, preset format field name and
The code value of preset format carries out data check, obtains data check result;When data check result is to meet the requirements, will preset
The request object of format is mapped in corresponding domain object.
In one embodiment, the access that will be received also is performed the steps of when processor executes computer program to ask
Field name and code value in asking carry out data normalization processing, obtain the step of the field name of preset format and the code value of preset format
It suddenly include: the field name and code value obtained in access request;Field name and code value according to the channel type of access request and are connect
The corresponding transformation rule of mouth type carries out data normalization processing, obtains the field name of preset format and the code value of preset format.
In one embodiment, it also performs the steps of when processor executes computer program by the request of preset format
The step of code value of object, the field name of preset format and preset format carries out data check, obtains data check result, packet
It includes: by the code value of the request object of preset format, the field name of preset format and preset format based on the data word in database
Allusion quotation is verified, when in request object, the field name of preset format and the code value and data dictionary of preset format of preset format
Data to it is corresponding when data check result be to meet the requirements.
In one embodiment, the request when preset format is also performed the steps of when processor executes computer program
The code value of object, the field name of preset format and the preset format and the data in data dictionary not to it is corresponding when check results
To be undesirable, when data check result is undesirable, denied access request.
In one embodiment, it is also performed the steps of when processor executes computer program and is receiving access side's transmission
Access request the step of after, before the step of request message in the access request received is formatted, also
It include: to be decrypted, obtain to the request message of encryption when the request message of received access request is the request message of encryption
Call request message.
In one embodiment, it also performs the steps of when processor executes computer program when received access request
Request message when being the request message of encryption, by the encryption rule with the corresponding returning an object value of access checkering according to access side
It is encrypted, obtains encrypted returning an object value, encrypted returning an object value is sent to access side.
In one embodiment, it is also performed the steps of when processor executes computer program when data check result
When to meet the requirements, after the step that the request object of preset format is mapped in corresponding domain object, further includes: will be pre-
If the field name of the request object of format, preset format and the code value of preset format carry out data according to corresponding domain object
It saves after persistence to database.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Receive the access request that access side sends;Request message in the access request received is formatted,
Obtain the request object of preset format;By in the access request received field name and code value carry out data normalization processing,
Obtain the field name of preset format and the code value of preset format;To preset format request object, preset format field name and
The code value of preset format carries out data check, obtains data check result;When data check result is to meet the requirements, will preset
The request object of format is mapped in corresponding domain object.
In one embodiment, the access that will be received also is performed the steps of when computer program is executed by processor
Field name in request and code value carry out data normalization processing, obtain the field name of preset format and the code value of preset format
Step includes: the field name and code value obtained in access request;By field name and code value according to the channel type of access request and
The corresponding transformation rule of interface type carries out data normalization processing, obtains the field name of preset format and the code of preset format
Value.
In one embodiment, asking preset format is also performed the steps of when computer program is executed by processor
The step of asking the code value of object, the field name of preset format and preset format to carry out data check, obtain data check result, packet
It includes: by the code value of the request object of preset format, the field name of preset format and preset format based on the data word in database
Allusion quotation is verified, when in request object, the field name of preset format and the code value and data dictionary of preset format of preset format
Data to it is corresponding when data check result be to meet the requirements.
In one embodiment, asking when preset format is also performed the steps of when computer program is executed by processor
Ask the code value of object, the field name of preset format and the preset format and the data in data dictionary not to it is corresponding when verification tie
Fruit be it is undesirable, when data check result be it is undesirable when, denied access request.
In one embodiment, it is also performed the steps of when computer program is executed by processor and is receiving access side's hair
After the step of access request sent, before the step of request message in the access request received is formatted,
Further include: when the request message of received access request is the request message of encryption, the request message of encryption is decrypted,
Obtain request message.
In one embodiment, it is also performed the steps of when computer program is executed by processor when received access is asked
When the request message asked is the request message of encryption, returning an object value corresponding with access checkering is advised according to the encryption of access side
It is then encrypted, obtains encrypted returning an object value, encrypted returning an object value is sent to access side.
In one embodiment, it is also performed the steps of when computer program is executed by processor when data check knot
Fruit is when meeting the requirements, after the step that the request object of preset format is mapped in corresponding domain object, further includes: will
The code value of the request object of preset format, the field name of preset format and preset format is counted according to corresponding domain object
It saves according to after persistence to database.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of interface butt joint method, which comprises
Receive the access request that access side sends;
Request message in the access request received is formatted, the request object of preset format is obtained;
By in the access request received field name and code value carry out data normalization processing, obtain the word of preset format
The code value of section name and preset format;
Data are carried out to the request object, the field name of the preset format and the code value of the preset format of the preset format
Verification obtains data check result;
When data check result is to meet the requirements, the request object of the preset format is mapped to corresponding domain object
In.
2. interface butt joint method according to claim 1, which is characterized in that in the access request that will be received
Field name and code value carry out data normalization processing, obtain preset format field name and preset format code value the step of packet
It includes:
Obtain the field name and code value in the access request;
The field name and the code value are carried out according to the corresponding transformation rule of channel type and interface type of access request
Data normalization processing, obtains the field name of preset format and the code value of preset format.
3. interface butt joint method according to claim 1, which is characterized in that the request pair by the preset format
As the code value of the, field name of the preset format and the preset format carries out data check, the step of data check result is obtained
Suddenly, comprising:
The request object, the field name of the preset format and the code value of the preset format of the preset format are based on data
Data dictionary in library is verified,
When the request object, the field name of the preset format and the code value and data word of the preset format of the preset format
Data in allusion quotation are to meet the requirements to data check result when corresponding to.
4. interface butt joint method according to claim 3, which is characterized in that request object, institute when the preset format
Code value and the data in data dictionary of the field name and the preset format of stating preset format not to it is corresponding when check results be not
It meets the requirements;
When data check result is undesirable, refuse the access request.
5. interface butt joint method according to claim 1, which is characterized in that asked in the access that the reception access side sends
After the step of asking, before the step of request message in the access request that will be received formats, also
Include: when the request message of the received access request is the request message of encryption, to the request message of the encryption into
Row decryption, obtains request message.
6. interface butt joint method according to claim 5, which is characterized in that the method also includes:
It, will return corresponding with access checkering when the request message of the received access request is the request message of encryption
Object is encrypted according to the encryption rule of access side, obtains encrypted returning an object value, and encrypted returning an object value is sent
To access side.
7. interface butt joint method described in -6 according to claim 1, which is characterized in that described when data check result is to meet
It is required that when, after the step that the request object of the preset format is mapped in corresponding domain object, further includes:
By the code value of the request object of the preset format, the field name of the preset format and the preset format according to correspondence
Domain object, save after carrying out data persistence to database.
8. a kind of interface docking facilities, which is characterized in that described device includes:
Access request receiving module, for receiving the access request of access side's transmission;
Format converting module is preset for formatting the request message in the access request received
The request object of format;
Data processing module, for carrying out field name in the access request received and code value at data normalization
Reason, obtains the field name of preset format and the code value of preset format;
Data check module, for the field name of request object, the preset format to the preset format and described default
The code value of format carries out data check, obtains data check result;
When data check result is to meet the requirements, the request object of the preset format is mapped to corresponding domain object
In.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910003487.1A CN109802957B (en) | 2019-01-03 | 2019-01-03 | Interface docking method and device, computer equipment and storage medium |
PCT/CN2019/123228 WO2020140679A1 (en) | 2019-01-03 | 2019-12-05 | Interface docking method and apparatus, computer device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910003487.1A CN109802957B (en) | 2019-01-03 | 2019-01-03 | Interface docking method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109802957A true CN109802957A (en) | 2019-05-24 |
CN109802957B CN109802957B (en) | 2022-05-31 |
Family
ID=66558425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910003487.1A Active CN109802957B (en) | 2019-01-03 | 2019-01-03 | Interface docking method and device, computer equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109802957B (en) |
WO (1) | WO2020140679A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110636071A (en) * | 2019-09-26 | 2019-12-31 | 光大兴陇信托有限责任公司 | Interface docking method |
CN110806945A (en) * | 2019-11-05 | 2020-02-18 | 浪潮云信息技术有限公司 | Interface docking method, device and computer readable medium |
CN111104191A (en) * | 2019-12-17 | 2020-05-05 | 深圳前海环融联易信息科技服务有限公司 | Interface docking method and device, computer equipment and storage medium |
CN111338819A (en) * | 2020-02-24 | 2020-06-26 | 政采云有限公司 | Method, system, equipment and readable storage medium for processing business object |
WO2020140679A1 (en) * | 2019-01-03 | 2020-07-09 | 深圳壹账通智能科技有限公司 | Interface docking method and apparatus, computer device and storage medium |
CN111680086A (en) * | 2020-05-25 | 2020-09-18 | 泰康保险集团股份有限公司 | Data processing method and system, computer device and computer readable storage medium |
CN111737527A (en) * | 2020-06-29 | 2020-10-02 | 中国南方电网有限责任公司 | Data processing method and device for heterogeneous terminal, electronic equipment and storage medium |
CN111835710A (en) * | 2020-05-29 | 2020-10-27 | 中国平安财产保险股份有限公司 | Method and device for checking request body, computer equipment and storage medium |
CN112053208A (en) * | 2020-09-04 | 2020-12-08 | 苏宁云计算有限公司 | Order access method, system, computer equipment and storage medium |
CN112416597A (en) * | 2020-12-01 | 2021-02-26 | 太平金融科技服务(上海)有限公司 | System calling method and device, computer equipment and storage medium |
CN112860463A (en) * | 2021-03-22 | 2021-05-28 | 平安商业保理有限公司 | Service request forwarding method and device, computer equipment and readable storage medium |
CN113760749A (en) * | 2021-08-06 | 2021-12-07 | 招银云创信息技术有限公司 | Test message generation method and device, computer equipment and storage medium |
CN114500690A (en) * | 2022-02-15 | 2022-05-13 | 平安科技(深圳)有限公司 | Interface data processing method and device, electronic equipment and storage medium |
CN115102829A (en) * | 2022-08-25 | 2022-09-23 | 平安银行股份有限公司 | Request message processing method and device |
CN115361446A (en) * | 2022-08-17 | 2022-11-18 | 吉林亿联银行股份有限公司 | Transaction message processing method and device, storage medium and electronic equipment |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111953540B (en) * | 2020-08-04 | 2022-12-13 | 中国建设银行股份有限公司 | Message generation method and device, electronic equipment and storage medium |
CN112511591B (en) * | 2020-10-30 | 2024-04-05 | 福建亿能达信息技术股份有限公司 | Method, device, equipment and medium for realizing hospital interface data interaction |
CN112702173B (en) * | 2020-12-23 | 2023-11-10 | 上海芯钛信息科技有限公司 | Method for realizing high-speed password operation of vehicle-mounted communication gateway based on batch operation mechanism |
CN112783581A (en) * | 2021-01-21 | 2021-05-11 | 上海哔哩哔哩科技有限公司 | Data processing method and device |
CN113360556B (en) * | 2021-05-25 | 2023-08-08 | 北京京东振世信息技术有限公司 | Data processing method, device, equipment and storage medium |
CN113837584B (en) * | 2021-09-17 | 2024-04-12 | 平安养老保险股份有限公司 | Service processing system and abnormal data processing method based on service processing system |
CN114070886A (en) * | 2021-11-17 | 2022-02-18 | 深圳壹账通智能科技有限公司 | Message conversion method, device, equipment and medium |
CN114710237B (en) * | 2022-03-25 | 2024-01-26 | 湖南鼎一致远科技发展有限公司 | Data processing method and device of communication interface, electronic equipment and storage medium |
CN115118792A (en) * | 2022-06-27 | 2022-09-27 | 中国银行股份有限公司 | Message interface format conversion method, device and system |
CN115292624B (en) * | 2022-10-08 | 2023-08-04 | 成都同步新创科技股份有限公司 | General message processing method and device based on HTTP protocol |
CN115866087B (en) * | 2022-11-29 | 2023-11-17 | 广发银行股份有限公司 | Message mapping and message conversion method, device and transmission system |
CN116781256B (en) * | 2023-06-02 | 2024-07-09 | 深圳大道云科技有限公司 | Compatible interaction method, device, equipment and storage medium of mechanism data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050240600A1 (en) * | 2004-04-21 | 2005-10-27 | Hill David A | Methods, systems, and storage mediums for integrating service request generation systems with a service order control system |
CN101083582A (en) * | 2007-06-22 | 2007-12-05 | 华中科技大学 | Heterogeneous medical information integrated system based on HL7 agent server |
CN101471928A (en) * | 2007-12-28 | 2009-07-01 | 中国移动通信集团公司 | Access device, system and method for electronic channel |
CN102722540A (en) * | 2012-05-23 | 2012-10-10 | 中兴通讯股份有限公司 | Method and device for processing data in real-time memory database system |
CN103428184A (en) * | 2012-05-24 | 2013-12-04 | 中国银联股份有限公司 | Method and system for converting communication messages |
CN104618182A (en) * | 2015-01-21 | 2015-05-13 | 中国移动通信集团广东有限公司 | Simulation testing system supporting a plurality of mobile service protocols |
CN104915383A (en) * | 2015-05-19 | 2015-09-16 | 中国电子科技集团公司第二十八研究所 | General method for automatic object adapting in database access |
CN105472044A (en) * | 2016-01-26 | 2016-04-06 | 云南电网有限责任公司电力科学研究院 | DL/T645 and GOOSE mapping method based on XML |
CN109086444A (en) * | 2018-08-17 | 2018-12-25 | 吉林亿联银行股份有限公司 | A kind of data normalization method, apparatus and electronic equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2010245310A1 (en) * | 2009-05-04 | 2011-11-03 | Aptara, Inc. | Method and system for verifying a citation |
CN103139251A (en) * | 2011-11-29 | 2013-06-05 | 神州数码信息系统有限公司 | Method of city-level data sharing exchange platform technology |
CN106685982A (en) * | 2017-01-13 | 2017-05-17 | 中国工商银行股份有限公司 | External message processing method and system |
CN109802957B (en) * | 2019-01-03 | 2022-05-31 | 深圳壹账通智能科技有限公司 | Interface docking method and device, computer equipment and storage medium |
-
2019
- 2019-01-03 CN CN201910003487.1A patent/CN109802957B/en active Active
- 2019-12-05 WO PCT/CN2019/123228 patent/WO2020140679A1/en active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050240600A1 (en) * | 2004-04-21 | 2005-10-27 | Hill David A | Methods, systems, and storage mediums for integrating service request generation systems with a service order control system |
CN101083582A (en) * | 2007-06-22 | 2007-12-05 | 华中科技大学 | Heterogeneous medical information integrated system based on HL7 agent server |
CN101471928A (en) * | 2007-12-28 | 2009-07-01 | 中国移动通信集团公司 | Access device, system and method for electronic channel |
CN102722540A (en) * | 2012-05-23 | 2012-10-10 | 中兴通讯股份有限公司 | Method and device for processing data in real-time memory database system |
CN103428184A (en) * | 2012-05-24 | 2013-12-04 | 中国银联股份有限公司 | Method and system for converting communication messages |
CN104618182A (en) * | 2015-01-21 | 2015-05-13 | 中国移动通信集团广东有限公司 | Simulation testing system supporting a plurality of mobile service protocols |
CN104915383A (en) * | 2015-05-19 | 2015-09-16 | 中国电子科技集团公司第二十八研究所 | General method for automatic object adapting in database access |
CN105472044A (en) * | 2016-01-26 | 2016-04-06 | 云南电网有限责任公司电力科学研究院 | DL/T645 and GOOSE mapping method based on XML |
CN109086444A (en) * | 2018-08-17 | 2018-12-25 | 吉林亿联银行股份有限公司 | A kind of data normalization method, apparatus and electronic equipment |
Non-Patent Citations (1)
Title |
---|
李东睿: "基于XML与Web Service的电子政务数据交换模型的设计与实现", 《中国优秀硕士学位论文全文数据库(电子期刊)》 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020140679A1 (en) * | 2019-01-03 | 2020-07-09 | 深圳壹账通智能科技有限公司 | Interface docking method and apparatus, computer device and storage medium |
CN110636071A (en) * | 2019-09-26 | 2019-12-31 | 光大兴陇信托有限责任公司 | Interface docking method |
CN110636071B (en) * | 2019-09-26 | 2020-07-07 | 光大兴陇信托有限责任公司 | Interface docking method |
CN110806945A (en) * | 2019-11-05 | 2020-02-18 | 浪潮云信息技术有限公司 | Interface docking method, device and computer readable medium |
CN110806945B (en) * | 2019-11-05 | 2022-03-22 | 浪潮云信息技术股份公司 | Interface docking method, device and computer readable medium |
CN111104191A (en) * | 2019-12-17 | 2020-05-05 | 深圳前海环融联易信息科技服务有限公司 | Interface docking method and device, computer equipment and storage medium |
CN111104191B (en) * | 2019-12-17 | 2024-04-02 | 深圳前海环融联易信息科技服务有限公司 | Interface docking method, device, computer equipment and storage medium |
CN111338819A (en) * | 2020-02-24 | 2020-06-26 | 政采云有限公司 | Method, system, equipment and readable storage medium for processing business object |
CN111680086A (en) * | 2020-05-25 | 2020-09-18 | 泰康保险集团股份有限公司 | Data processing method and system, computer device and computer readable storage medium |
CN111835710A (en) * | 2020-05-29 | 2020-10-27 | 中国平安财产保险股份有限公司 | Method and device for checking request body, computer equipment and storage medium |
CN111835710B (en) * | 2020-05-29 | 2023-08-15 | 中国平安财产保险股份有限公司 | Method, device, computer equipment and storage medium for verifying request body |
CN111737527A (en) * | 2020-06-29 | 2020-10-02 | 中国南方电网有限责任公司 | Data processing method and device for heterogeneous terminal, electronic equipment and storage medium |
CN112053208A (en) * | 2020-09-04 | 2020-12-08 | 苏宁云计算有限公司 | Order access method, system, computer equipment and storage medium |
CN112416597A (en) * | 2020-12-01 | 2021-02-26 | 太平金融科技服务(上海)有限公司 | System calling method and device, computer equipment and storage medium |
CN112860463A (en) * | 2021-03-22 | 2021-05-28 | 平安商业保理有限公司 | Service request forwarding method and device, computer equipment and readable storage medium |
CN113760749A (en) * | 2021-08-06 | 2021-12-07 | 招银云创信息技术有限公司 | Test message generation method and device, computer equipment and storage medium |
CN114500690A (en) * | 2022-02-15 | 2022-05-13 | 平安科技(深圳)有限公司 | Interface data processing method and device, electronic equipment and storage medium |
CN114500690B (en) * | 2022-02-15 | 2023-08-18 | 平安科技(深圳)有限公司 | Interface data processing method and device, electronic equipment and storage medium |
CN115361446A (en) * | 2022-08-17 | 2022-11-18 | 吉林亿联银行股份有限公司 | Transaction message processing method and device, storage medium and electronic equipment |
CN115102829A (en) * | 2022-08-25 | 2022-09-23 | 平安银行股份有限公司 | Request message processing method and device |
CN115102829B (en) * | 2022-08-25 | 2022-11-29 | 平安银行股份有限公司 | Request message processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109802957B (en) | 2022-05-31 |
WO2020140679A1 (en) | 2020-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109802957A (en) | Interface butt joint method, device, computer equipment and storage medium | |
WO2021169112A1 (en) | Shared permission-based service data procesing method, apparatus and device, and medium | |
CN113364735B (en) | Data cross-link access control method, system, equipment and terminal under multi-link scene | |
US10476911B2 (en) | Data access policies | |
US11296881B2 (en) | Using IP heuristics to protect access tokens from theft and replay | |
CN104106241A (en) | System and Method to Generate Secure Name Records | |
CN111985000B (en) | Model service output method, device, equipment and storage medium | |
EP3889870A1 (en) | Background architecture method and system for aggregation payment, computer device, and storage medium | |
CN112015769A (en) | Data processing method and device, computer equipment and storage medium | |
CN109447780A (en) | Information push method, device, computer equipment and storage medium | |
CN112131205A (en) | Database blocking method and device | |
CN110442654A (en) | Promise breaking information query method, device, computer equipment and storage medium | |
CN114189553B (en) | Flow playback method, system and computing device | |
CN102968861B (en) | Tax copying method | |
CN107734046A (en) | Method, service end, client and the system of remote operation database | |
CN102299945A (en) | Gateway configuration page registration method, system thereof and portal certificate server | |
US20230325833A1 (en) | Blockchain-based data processing method and apparatus, device, storage medium, and program product | |
CN110390008A (en) | Report method for pushing, device, computer equipment and storage medium | |
CN111211902A (en) | Digital signature method and device based on enterprise browser | |
CN114095213B (en) | Network access control policy management system | |
CN115396221A (en) | Authorization processing method, device and system, electronic equipment and storage medium | |
CN116567008A (en) | Business privacy data transmission method and device, computer equipment and storage medium | |
CN113592495A (en) | Block chain-based evidence storing method, device and system | |
US9811669B1 (en) | Method and apparatus for privacy audit support via provenance-aware systems | |
CN113987035A (en) | Block chain external data access method, device, system, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |