CN110113384A - Network request processing method, device, computer equipment and storage medium - Google Patents
Network request processing method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110113384A CN110113384A CN201910298650.1A CN201910298650A CN110113384A CN 110113384 A CN110113384 A CN 110113384A CN 201910298650 A CN201910298650 A CN 201910298650A CN 110113384 A CN110113384 A CN 110113384A
- Authority
- CN
- China
- Prior art keywords
- parameter
- mapping
- network request
- mapped
- request message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/62—Establishing a time schedule for servicing the requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/63—Routing a service request depending on the request content or context
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application involves a kind of network request processing method, device, computer equipment and storage mediums.The method is related to Business Process Optimizing technology, comprising: receives the network request message that terminal is sent;According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping feedback message is to terminal.Network request message treatment effeciency can be improved using this method.
Description
Technical field
This application involves field of computer technology, set more particularly to a kind of network request processing method, device, computer
Standby and storage medium.
Background technique
With the development of computer technology, the various application programs in mobile terminal are more and more various, are widely used.?
When application program requests respective service to server, need to send network request message, according to the needs of various application programs, net
Network request message will include a variety of different parameters, such as operating system, software version, device type, channel type, network protocol
The common parameters such as version.Numerous common parameters causes network request message tediously long, reduces valid data load proportion, causes
The treatment effeciency of network request message is lower.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of network request message treatment effeciency of can be improved
Network request processing method, device, computer equipment and storage medium.
A kind of network request processing method, which comprises
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti-
Message is presented to terminal.
In one of the embodiments, according to preset parameter mapping ruler, determination is to be mapped from network request message
Argument sequence includes:
Preset parameter mapping ruler is inquired, parameter mapping ruler includes parameter type rule and parameter marshalling rule;
According to parameter type rule, parameter to be mapped is extracted from network request message;
Parameter to be mapped is ranked up according to parameter marshalling rule, obtains argument sequence to be mapped.
In one of the embodiments, according to the network request type of network request message, having for parameter cryptographic Hash is determined
Effect the time include:
Determine the network request type of network request message;
Inquire preset parameter mapping time table;
The network request type corresponding mapping duration is inquired from parameter mapping time table, and will map the duration
Effective time as parameter cryptographic Hash.
In one of the embodiments, before inquiring preset parameter mapping ruler, further includes:
The query history network request packet from operation system, web-based history request data include that each web-based history request disappears
Breath;
Common request parameter is extracted from each web-based history request message, and records the request frequency of each common request parameter
It is secondary;
According to preset mapping parameters number and the request frequency, common request parameter to be mapped is determined;
Parameter type rule is obtained according to common request parameter to be mapped.
In one of the embodiments, before inquiring preset parameter mapping time table, further includes:
Each web-based history request message is classified according to corresponding request type, all types of web-based histories is obtained and asks
Seek message;
It determines the request time of all types of web-based history request messages, and request frequency is obtained according to request time;
All types of web-based history request messages corresponding history effective time is determined according to request frequency;
All types of web-based history request messages and history effective time are stored into parameter mapping time table.
Mapping is being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time in one of the embodiments,
After feedback message, further includes:
Inquire preset parameter mapping table;
Argument sequence to be mapped, parameter cryptographic Hash and effective time are stored into parameter mapping table, and recorded when coming into force
Between;
The Mappings time is obtained according to current time and entry-into-force time;
When the Mappings time be greater than effective time when, by argument sequence to be mapped, parameter cryptographic Hash and effective time from
It is deleted in parameter mapping table.
In one of the embodiments, after receiving the network request message that terminal is sent, further includes:
Determine the long short type of network request message;
When network request message is short type request, the extracting parameter cryptographic Hash from network request message;
Argument sequence to be mapped is obtained from parameter mapping table according to parameter cryptographic Hash, and updates the entry-into-force time;
Argument sequence to be mapped is returned to terminal.
A kind of network request processing unit, described device include:
Network request receiving module, for receiving the network request message of terminal transmission;
Mapping parameters block, for being determined wait reflect from network request message according to preset parameter mapping ruler
Penetrate argument sequence;
Processing module is mapped, mapping processing is carried out for treating mapping parameters sequence by preset hash function, obtains
Parameter cryptographic Hash;
Effective time determining module determines parameter cryptographic Hash for the network request type according to network request message
Effective time;
Feedback message module is mapped, is mapped for being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time
Feedback message, and return mapping feedback message is to terminal.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device performs the steps of when executing the computer program
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti-
Message is presented to terminal.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
It is performed the steps of when row
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti-
Message is presented to terminal.
Above-mentioned network request processing method, device, computer equipment and storage medium are mapped according to preset parameter and are advised
Then, argument sequence to be mapped is determined from the network request message that terminal is sent, then by preset hash function by ginseng to be mapped
Number Sequence carries out mapping and handles to obtain parameter cryptographic Hash, determines parameter cryptographic Hash according to the network request type of network request message
Effective time, mapping feedback message is finally generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and is returned
Feedback message is mapped to terminal.In the treatment process of network request message, the ginseng to be mapped that will be determined in network request message
Number Sequence carries out mapping by preset hash function and is processed into parameter cryptographic Hash, becomes parameter numerous in network request message
It is short, the load proportion of network request message valid data is improved, so as to improve the treatment effeciency of network request message.
Detailed description of the invention
Fig. 1 is the application scenario diagram of network request processing method in one embodiment;
Fig. 2 is the flow diagram of network request processing method in one embodiment;
Fig. 3 is the flow diagram that parameter mapping time table is constructed in one embodiment;
Fig. 4 is the flow diagram of network request processing method in another embodiment;
Fig. 5 is the structural block diagram of network request processing unit in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Network request processing method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, eventually
End equipment 102 is communicated with server 104 by network by network.Terminal device 102 sends network to server 104 and asks
Message is sought, server 104 is determined from the network request message that terminal device 102 is sent according to preset parameter mapping ruler
Argument sequence to be mapped, then argument sequence to be mapped is subjected to mapping by preset hash function and handles to obtain parameter cryptographic Hash,
The effective time of parameter cryptographic Hash is determined according to the network request type of network request message, finally according to parameter sequence to be mapped
Column, parameter cryptographic Hash and effective time generate mapping feedback message, and return mapping feedback message is to terminal device 102.Wherein,
Terminal device 102 can be, but not limited to be various personal computers, laptop, smart phone, tablet computer and portable
Wearable device, server 104 can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of network request processing method, it is applied to Fig. 1 in this way
In server 104 for be illustrated, comprising the following steps:
Step S201: the network request message that terminal is sent is received.
Wherein, network request message can send the request message for requesting respective service for terminal to server 104,
It may include various required parameters.In APP network request message, AppId, App version number, DeviceId may include
(equipment id), mobile phone brand, mobile phone model, mobile phone os release number (mobile phone operating system number), channel number, network protocol version
Number, Userid (user No. Id), some are also possible to add many mobile phone safe information such as cell-phone number, IMEI
(International Mobile Equipment Identity, international mobile equipment identification number), Bluetooth address, WiFi
MAC Address, whether escape from prison, whether the information such as simulator, and network request requires to take so more common parameters every time, with
Ensure that service server is capable of providing targetedly business service.
In one embodiment, common request parameter publicParams includes " appCode=in network request message
The words such as xxx&deviceId=xxx&osVersion=xxx&appId=xxx&appClientid=xxx &tddId=xxx "
Section.Original length can be replaced longer by key its mapping by establishing publicParams:key
PublicParams, so as to improve network request message valid data load proportion.
Step S203: according to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message.
Parameter mapping ruler is used to determine that needing to carry out mapping handles to obtain the various of short parameter from network request message
Parameter can specifically include parameter type rule and parameter marshalling rule, and parameter type rule is used to determine mapping parameters range,
Parameter marshalling rule obtains the argument sequence to be mapped of unified format for being ranked up to each mapping parameters.Parameter to be mapped
Sequence obtains after being sorted according to the parameter mapped in network request message according to certain sequence.For example, can be according to
Initial sequence is ranked up, to ensure that parameter type is identical in heterogeneous networks request message, and when the sequence difference of each parameter
Available identical argument sequence to be mapped.
In the present embodiment, preset parameter mapping ruler can be inquired, parameter mapping ruler is set according to actual needs
It sets, as the common parameter according to required for service server demand is configured.According to the parameter mapping ruler from network request
Argument sequence to be mapped is determined in message.
Step S205: mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter Hash
Value.
After obtaining argument sequence to be mapped, mapping parameters sequence is treated according to preset mapping algorithm and carries out mapping processing,
Obtain the corresponding short parameter of mapping.In the present embodiment, mapping algorithm is hash function, can be by the message compression of random length
To the eap-message digest of a certain regular length.Common hash function includes MD4, MD5 and SHA1.By hash function to obtaining
Argument sequence to be mapped carries out mapping processing, the short parameter of the mapping after obtaining compresses in length, i.e. parameter cryptographic Hash.For example, will be to
Mapping parameters sequence is as value, after carrying out mapping processing by hash function, obtains corresponding parameter cryptographic Hash key.It is depositing
After the mapping relations for storing up key-value, corresponding value can be determined by parameter cryptographic Hash key, further determine that correspondence
Argument sequence to be mapped, mapped between the longer argument sequence to be mapped of length and shorter parameter cryptographic Hash to construct
Relationship.
In specific implementation, server 104 can store key-value by safeguarding the hash table of a key-value
Mapping relations.Specifically, the common parameter composition one of mapping processing will be carried out in the network request message of terminal transmission
The long character string of json format, i.e., argument sequence value to be mapped, such as appid: " 123 ", osType: " 1 ", clientId:
" 131313314444 " ... }, according to preset hash function to the long string operations after, obtain the shorter key of length, will
Key-value is stored into the hash table.
Step S207: according to the network request type of network request message, the effective time of parameter cryptographic Hash is determined.
After obtaining the corresponding parameter cryptographic Hash of argument sequence to be mapped, need to be arranged corresponding effective time, with to depositing
The key-value mapping relations of storage carry out dynamic update, it is ensured that the validity of key-value guarantees the search efficiency of key.Tool
Body, it can determine the network request type of network request message, having for parameter cryptographic Hash is determined according to the network request type
Imitate the time.Different effective time can be set in the network request message of heterogeneous networks request type.For example, for request frequency
The high network request type of rate, the effective time of the corresponding parameter cryptographic Hash of network request message can be set it is longer, to keep away
Exempt from frequent progress mapping processing, it is ensured that the treatment effeciency of network request message.
Step S209: mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and is returned
Mapping feedback message is returned to terminal.
After the effective time for determining parameter cryptographic Hash, mapping feedback is generated in conjunction with argument sequence to be mapped and parameter cryptographic Hash
Message, and return mapping feedback message is to terminal.It specifically, can be according to the mapping of argument sequence to be mapped and parameter cryptographic Hash
The effective time of relationship and parameter cryptographic Hash sequentially generates mapping feedback message and is back to terminal.It is anti-that terminal receives mapping
After presenting message, parameter cryptographic Hash can directly be replaced to each mapping parameters in argument sequence to be mapped, to make network request
Common parameter length in message shortens, and the valid data load proportion of network request message is improved, to improve network
The treatment effeciency of request message.
In above-mentioned network request processing method, according to preset parameter mapping ruler, the network request sent from terminal disappears
Argument sequence to be mapped is determined in breath, then argument sequence to be mapped is subjected to mapping by preset hash function and handles to obtain parameter
Cryptographic Hash determines the effective time of parameter cryptographic Hash according to the network request type of network request message, finally according to be mapped
Argument sequence, parameter cryptographic Hash and effective time generate mapping feedback message, and return mapping feedback message is to terminal.In network
In the treatment process of request message, by the argument sequence to be mapped determined in network request message by preset hash function into
Row mapping is processed into parameter cryptographic Hash, so that parameter numerous in network request message is shortened, it is effective to improve network request message
The load proportion of data, so as to improve the treatment effeciency of network request message.
In one embodiment, according to preset parameter mapping ruler, parameter to be mapped is determined from network request message
Sequence includes: the preset parameter mapping ruler of inquiry, and parameter mapping ruler includes parameter type rule and parameter marshalling rule;It presses
According to parameter type rule, parameter to be mapped is extracted from network request message;By parameter to be mapped according to parameter marshalling rule into
Row sequence, obtains argument sequence to be mapped.
Parameter mapping ruler is configured according to actual needs, such as the common parameter according to required for service server demand
It is configured, is used to determine that needing to carry out mapping handles to obtain the various parameters of short parameter from network request message.This reality
It applies in example, parameter mapping ruler includes parameter type rule and parameter marshalling rule.Wherein, parameter type rule is reflected for determination
Parameter area is penetrated, parameter marshalling rule obtains the argument sequence to be mapped of unified format for being ranked up to each mapping parameters.
Specifically, when determining argument sequence to be mapped, preset parameter mapping ruler is inquired, according to parameter mapping ruler
In parameter type rule parameter to be mapped is extracted from network request message, parameter type rule can be by network request message
In common parameter be set as carrying out the parameter to be mapped of mapping processing.After obtaining parameter to be mapped, maps and advise according to parameter
Parameter to be mapped is ranked up by the parameter marshalling rule in then, the argument sequence to be mapped after obtaining parameter marshalling to be mapped.
In the network request message sent every time in view of terminal, the sequencing of each parameter is different, if directly carrying out mapping processing, meeting
The problem of different parameter cryptographic Hash can be generated when subsequent compression being caused to map.Therefore, by each parameter to be mapped according to preset
Parameter marshalling rule is ranked up, and is such as ranked up in alphabetical order, and the argument sequence to be mapped of fixed sequence is obtained, thus
Mapping can be compressed and obtain identical parameter cryptographic Hash.
In one embodiment, according to the network request type of network request message, determine parameter cryptographic Hash it is effective when
Between comprise determining that the network request type of network request message;Inquire preset parameter mapping time table;From parameter mapping time
Inquired in table network request type corresponding mapping duration, and using map the duration as parameter cryptographic Hash it is effective when
Between.
After obtaining the corresponding parameter cryptographic Hash of argument sequence to be mapped, need to be arranged corresponding effective time, with to depositing
The key-value mapping relations of storage carry out dynamic update, it is ensured that the validity of key-value guarantees the search efficiency of key.This
In embodiment, when determining the effective time of parameter cryptographic Hash, the network request type of network request message is determined.Heterogeneous networks
The network request message of request type can be set different effective time, the low network request message of request frequency, can be with
Shorter parameter cryptographic Hash effective time is set, to be updated in time to the key-value mapping relations of storage, improves key
Search efficiency, to improve the treatment effeciency of network request message.After the network request type for determining network request message, look into
Preset parameter mapping time table is ask, which records the network request message pair for there are various network request types
The mapping duration answered, the mapping duration can carry out analysis setting according to web-based history request data.It is reflected from parameter
It penetrates in timetable and inquires the network request type corresponding mapping duration, and using the mapping duration as parameter cryptographic Hash
Effective time.After inquiry obtains the network request type corresponding mapping duration, it can directly be set to parameter cryptographic Hash
Effective time.
In one embodiment, before inquiring preset parameter mapping ruler, further includes: inquire and go through from operation system
History network request packet, web-based history request data include each web-based history request message;From each web-based history request message
Common request parameter is extracted, and records the request frequency of each common request parameter;According to preset mapping parameters number and request
The frequency determines common request parameter to be mapped;Parameter type rule is obtained according to common request parameter to be mapped.
In the present embodiment, parameter type rule carries out true according to the request frequency of parameter each in web-based history request data
It is fixed.Specifically, the query history network request packet from operation system, web-based history request data include each web-based history request
Message.In specific application, time span screening conditions can be set, i.e. the interior web-based history of selection certain time range is asked
Seek the web-based history request data in data, such as 6 months.Common request parameter is extracted from each web-based history request message,
And record the request frequency of each common request parameter.In the present embodiment, according to determining pair of the request frequency from common request parameter
The parameter to be mapped answered, wherein the request frequency is each common request in each web-based history request message that the terminal obtained is sent
The frequency that parameter occurs.
Preset mapping parameters number is inquired, mapping parameters number is set according to actual needs, such as can be institute
There is common request parameter or for fixed number.Common request ginseng to be mapped is determined according to the mapping parameters number and the request frequency
Number.Specifically, each common request parameter can be ranked up according to the request frequency by up to few sequence, and joined according to mapping
It keeps count of and determines the common request parameter of corresponding number from the common request parameter after sequence, as parameter to be mapped.It obtains
After common request parameter to be mapped, parameter type rule is obtained according to the common request parameter to be mapped, i.e., waits reflecting by this
The parameter area for carrying out mapping processing that the common request parameter penetrated is determined as parameter type rule.To network request
Message carry out mapping processing when, therefrom determine parameter to be mapped according to common request parameter to be mapped, and further generate to
Mapping parameters sequence is to carry out subsequent mapping processing.
It in one embodiment, further include building ginseng as shown in figure 3, before inquiring preset parameter mapping time table
It the step of number mapping time table, specifically includes:
Step S301: each web-based history request message is classified according to corresponding request type, is obtained all types of
Web-based history request message.
In the present embodiment, each network request type corresponding mapping duration is according to history net in parameter mapping time table
Network request data is set.Specifically, after query history network request packet in operation system, each web-based history is requested
Message is classified according to corresponding request type, obtains all types of web-based history request messages.Heterogeneous networks request type
Network request message be correspondingly arranged on different effective time, by each web-based history request message according to corresponding request type
Classify, so that corresponding effective time is arranged for the web-based history request message of each request type.
Step S303: it determines the request time of all types of web-based history request messages, and is asked according to request time
Seek frequency.
Request time is the corresponding moment value of web-based history request message that server 104 receives terminal transmission, according to
The request of all types of web-based history request messages can be calculated in the request time of all types of web-based history request messages
Frequency.Specifically, it can be averaged the interval time poor time in counting period to request time between each web-based history request message
Value, and request frequency is obtained according to the interval time average value.Request frequency reflects all types of web-based history request messages
Request frequent degree, interval time average value is lower, and request frequency is higher, i.e. the web-based history request message of the type is asked
Ask more frequent.
Step S305: all types of web-based history request messages corresponding history effective time is determined according to request frequency.
After obtaining the request frequency of all types of web-based history request messages, all types of go through is determined according to the request frequency
History network request message corresponding history effective time.Specifically, history effective time can be set as being more than or equal to request frequency
The inverse of rate, to avoid needing frequent progress parameter mapping to handle.
Step S307: all types of web-based history request messages and history effective time are stored to parameter mapping time table
In.
After obtaining history effective time, by the mapping relations of history effective time and all types of web-based history request messages
It is stored, can specifically be stored into parameter mapping time table.In the effective time of subsequent determining parameter cryptographic Hash,
It can be according to the network request type of network request message, when inquiry obtains corresponding effective from the parameter mapping time table
Between.The effective time is set according to web-based history request data in operation system, can be accurately reflected each network request and be disappeared
The actual demand of breath avoids carrying out frequent parameter mapping processing, it is ensured that the treatment effeciency of network request message.
In one embodiment, mapping feedback is being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time
After message, further includes: inquire preset parameter mapping table;Argument sequence to be mapped, parameter cryptographic Hash and effective time are deposited
Storage records the entry-into-force time into parameter mapping table;The Mappings time is obtained according to current time and entry-into-force time;Work as mapping
When action time is greater than effective time, argument sequence to be mapped, parameter cryptographic Hash and effective time are deleted from parameter mapping table
It removes.
In the present embodiment, generate map feedback message after, by construct parameter mapping table treat mapping parameters sequence and
Mapping carries out validity maintenance between parameter cryptographic Hash.Specifically, after generating mapping feedback message, by parameter sequence to be mapped
Column, parameter cryptographic Hash and effective time store into preset parameter mapping table, and record the entry-into-force time, entry-into-force time reflection
Argument sequence to be mapped and parameter cryptographic Hash come into force action time, also as the initial time that effective time determines, i.e. root
The mapping relations between mapping parameters sequence and parameter cryptographic Hash are treated according to the entry-into-force time and effective time to be safeguarded.Specifically
Ground obtains the Mappings time according to current time and entry-into-force time, and the Mappings time is argument sequence to be mapped and ginseng
Number cryptographic Hash enter into force duration of effect.The Mappings time is compared with effective time, when Mappings
Between be greater than effective time when, show that effective time is already expired, the mapping relations of the argument sequence to be mapped and parameter cryptographic Hash have been lost
Effect, then delete argument sequence to be mapped, parameter cryptographic Hash and effective time from parameter mapping table.
In one embodiment, after receiving the network request message that terminal is sent, further includes: determine that network request disappears
The long short type of breath;When network request message is short type request, the extracting parameter cryptographic Hash from network request message;Root
Argument sequence to be mapped is obtained from parameter mapping table according to parameter cryptographic Hash, and updates the entry-into-force time;Return to argument sequence to be mapped
To terminal.
After terminal receives mapping feedback message, parameter cryptographic Hash can directly be replaced each in argument sequence to be mapped
Mapping parameters, and corresponding business service is requested by short network request message.Specifically, it is asked in the network for receiving terminal transmission
After seeking message, need to judge the long short type of network request message, to determine whether the network request message has carried out parameter
Mapping.When network request message is long type request, show that the network request message is handled without parameter mapping, this
When, into the step of according to preset parameter mapping ruler, argument sequence to be mapped is determined from the network request message, with
Parameter mapping processing is carried out to the network request message.
When network request message is short type request, show that the network request message has been subjected to parameter mapping processing,
The extracting parameter cryptographic Hash from network request message at this time, and ginseng to be mapped is obtained from parameter mapping table according to the parameter cryptographic Hash
Number Sequence.While obtaining argument sequence to be mapped, the entry-into-force time is updated, to update argument sequence to be mapped and parameter Hash
Value comes into force action time, resets the expired judgement of effective time, so that it is guaranteed that argument sequence to be mapped and parameter cryptographic Hash
The validity of mapping relations.Obtained argument sequence to be mapped is back to terminal again, terminal receives argument sequence to be mapped
Afterwards, can by its alternative parameter cryptographic Hash, thus reduction obtain include complete common request parameter network request message, so as to
Service server provides corresponding business service according to the network request message.
In one embodiment, as shown in figure 4, providing a kind of network request processing method, comprising:
Step S401: the network request message that terminal is sent is received.
Network request message can send the request message for requesting respective service for terminal to server 104, can
To include various required parameters.
Step S402: inquiring preset parameter mapping ruler, and parameter mapping ruler includes parameter type rule and parameter row
Sequence rule;
Step S403: according to parameter type rule, parameter to be mapped is extracted from network request message;
Step S404: parameter to be mapped is ranked up according to parameter marshalling rule, obtains argument sequence to be mapped;
Step S405: mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter Hash
Value.
Parameter mapping ruler is configured according to actual needs, such as the common parameter according to required for service server demand
It is configured, is used to determine that needing to carry out mapping handles to obtain the various parameters of short parameter from network request message.This reality
It applies in example, parameter mapping ruler includes parameter type rule and parameter marshalling rule.Wherein, parameter type rule is reflected for determination
Parameter area is penetrated, parameter marshalling rule obtains the argument sequence to be mapped of unified format for being ranked up to each mapping parameters.
After obtaining argument sequence to be mapped, mapping parameters sequence is treated according to preset mapping algorithm and carries out mapping processing, is corresponded to
The short parameter of mapping.In the present embodiment, mapping algorithm is hash function, specially MD5 algorithm.
Step S406: the network request type of network request message is determined;
Step S407: preset parameter mapping time table is inquired;
Step S408: the network request type corresponding mapping duration is inquired from parameter mapping time table, and will be reflected
Penetrate effective time of the duration as parameter cryptographic Hash.
In the present embodiment, when determining the effective time of parameter cryptographic Hash, the network request class of network request message is determined
Different effective time can be set in type, the network request message of heterogeneous networks request type.
Step S409: mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and is returned
Mapping feedback message is returned to terminal.
After the effective time for determining parameter cryptographic Hash, mapping feedback is generated in conjunction with argument sequence to be mapped and parameter cryptographic Hash
Message, and return mapping feedback message is to terminal.It specifically, can be according to the mapping of argument sequence to be mapped and parameter cryptographic Hash
The effective time of relationship and parameter cryptographic Hash sequentially generates mapping feedback message and is back to terminal.It is anti-that terminal receives mapping
After presenting message, parameter cryptographic Hash can directly be replaced to each mapping parameters in argument sequence to be mapped, to make network request
Common parameter length in message shortens, and the valid data load proportion of network request message is improved, to improve network
The treatment effeciency of request message.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in figure 5, providing a kind of network request processing unit, comprising: network request receives
Module 501, mapping parameters block 503, mapping processing module 505, effective time determining module 507 and mapping feedback message
Module 509, in which:
Network request receives mould 501, for receiving the network request message of terminal transmission;
Mapping parameters block 503, for according to preset parameter mapping ruler, determined from network request message to
Mapping parameters sequence;
Processing module 505 is mapped, mapping processing is carried out for treating mapping parameters sequence by preset hash function, obtains
To parameter cryptographic Hash;
Effective time determining module 507 determines parameter cryptographic Hash for the network request type according to network request message
Effective time;
Feedback message module 509 is mapped, is reflected for being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time
Penetrate feedback message, and return mapping feedback message is to terminal.
In one embodiment, mapping parameters block 503 includes mapping ruler unit, parameter determination unit and parameter
Sequencing unit, in which: mapping ruler unit, for inquiring preset parameter mapping ruler, parameter mapping ruler includes parameter class
Type rule and parameter marshalling rule;Parameter determination unit, for according to parameter type rule, from network request message extract to
Mapping parameters;Parameter marshalling unit obtains parameter to be mapped for parameter to be mapped to be ranked up according to parameter marshalling rule
Sequence.
In one embodiment, effective time determining module 507 includes request type unit, mapping event table unit and has
Imitate time determination unit, in which: request type unit, for determining the network request type of network request message;Mapping event
Table unit, for inquiring preset parameter mapping time table;Effective time determination unit, for being looked into from parameter mapping time table
It askes the network request type corresponding mapping duration, and using the mapping duration as the effective time of parameter cryptographic Hash.
It in one embodiment, further include historical requests data module, common parameter module, mapping parameters module and parameter
Typing rule module, in which: historical requests data module, for query history network request packet, history from operation system
Network request packet includes each web-based history request message;Common parameter module, for being mentioned from each web-based history request message
Common request parameter is taken, and records the request frequency of each common request parameter;Mapping parameters module, for according to preset mapping
Number of parameters and the request frequency, determine common request parameter to be mapped;Parameter type rule module, for according to be mapped
Common request parameter obtains parameter type rule.
It in one embodiment, further include requests classification module, request frequency module, history effective time module and mapping
Table module, in which: requests classification module, for each web-based history request message to be classified according to corresponding request type,
Obtain all types of web-based history request messages;Request frequency module, for determining all types of web-based history request messages
Request time, and request frequency is obtained according to request time;History effective time module, it is all kinds of for being determined according to request frequency
The web-based history request message of type corresponding history effective time;Mapping table module, for requesting all types of web-based histories
Message and history effective time store into parameter mapping time table.
In one embodiment, further include parameter mapping table module, mapping memory module, action time determining module and reflect
Penetrate removing module, in which: parameter mapping table module, for inquiring preset parameter mapping table;Mapping memory module, for will be to
Mapping parameters sequence, parameter cryptographic Hash and effective time store into parameter mapping table, and record the entry-into-force time;Action time is true
Cover half block, for obtaining the Mappings time according to current time and entry-into-force time;Removing module is mapped, for working as Mappings
When time is greater than effective time, argument sequence to be mapped, parameter cryptographic Hash and effective time are deleted from parameter mapping table.
It in one embodiment, further include that determination type module, cryptographic Hash extraction module, argument sequence obtain module and anti-
Present module, in which: determination type module, for determining the long short type of network request message;Cryptographic Hash extraction module, for working as
When network request message is short type request, the extracting parameter cryptographic Hash from network request message;Argument sequence obtains module,
For obtaining argument sequence to be mapped from parameter mapping table according to parameter cryptographic Hash, and update the entry-into-force time;Feedback module is used for
Argument sequence to be mapped is returned to terminal.
Specific about network request processing unit limits the limit that may refer to above for network request processing method
Fixed, details are not described herein.Modules in above-mentioned network request processing unit can fully or partially through software, hardware and its
Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with
It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 6.The computer equipment includes processor, memory and the network interface connected by system bus.
Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non-easy
The property lost storage medium, built-in storage.The non-volatile memory medium is stored with operating system and computer program.The built-in storage
Operation for operating system and computer program in non-volatile memory medium provides environment.The network of the computer equipment connects
Mouth with external terminal by network connection for being communicated.To realize that a kind of network is asked when the computer program is executed by processor
Seek processing method.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor perform the steps of when executing computer program
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti-
Message is presented to terminal.
In one embodiment, inquiry preset parameter is also performed the steps of when processor executes computer program to reflect
Rule is penetrated, parameter mapping ruler includes parameter type rule and parameter marshalling rule;According to parameter type rule, from network request
Parameter to be mapped is extracted in message;Parameter to be mapped is ranked up according to parameter marshalling rule, obtains argument sequence to be mapped.
In one embodiment, determining network request message is also performed the steps of when processor executes computer program
Network request type;Inquire preset parameter mapping time table;Network request type pair is inquired from parameter mapping time table
The mapping duration answered, and using the mapping duration as the effective time of parameter cryptographic Hash.
In one embodiment, it also performs the steps of when processor executes computer program and is inquired from operation system
Web-based history request data, web-based history request data include each web-based history request message;From each web-based history request message
Middle extraction common request parameter, and record the request frequency of each common request parameter;According to preset mapping parameters number and ask
The frequency is sought, determines common request parameter to be mapped;Parameter type rule is obtained according to common request parameter to be mapped.
In one embodiment, it is also performed the steps of when processor executes computer program and requests each web-based history
Message is classified according to corresponding request type, obtains all types of web-based history request messages;Determine all types of history
The request time of network request message, and request frequency is obtained according to request time;All types of go through is determined according to request frequency
History network request message corresponding history effective time;All types of web-based history request messages and history effective time are stored
Into parameter mapping time table.
In one embodiment, inquiry preset parameter is also performed the steps of when processor executes computer program to reflect
Firing table;Argument sequence to be mapped, parameter cryptographic Hash and effective time are stored into parameter mapping table, and record the entry-into-force time;
The Mappings time is obtained according to current time and entry-into-force time;It, will be to be mapped when the Mappings time being greater than effective time
Argument sequence, parameter cryptographic Hash and effective time delete from parameter mapping table.
In one embodiment, determining network request message is also performed the steps of when processor executes computer program
Long short type;When network request message is short type request, the extracting parameter cryptographic Hash from network request message;According to
Parameter cryptographic Hash obtains argument sequence to be mapped from parameter mapping table, and updates the entry-into-force time;Return to argument sequence to be mapped extremely
Terminal.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti-
Message is presented to terminal.
In one embodiment, inquiry preset parameter is also performed the steps of when computer program is executed by processor
Mapping ruler, parameter mapping ruler include parameter type rule and parameter marshalling rule;According to parameter type rule, asked from network
It asks and extracts parameter to be mapped in message;Parameter to be mapped is ranked up according to parameter marshalling rule, obtains parameter sequence to be mapped
Column.
In one embodiment, determining network request is also performed the steps of when computer program is executed by processor to disappear
The network request type of breath;Inquire preset parameter mapping time table;Network request type is inquired from parameter mapping time table
The corresponding mapping duration, and using the mapping duration as the effective time of parameter cryptographic Hash.
In one embodiment, it also performs the steps of when computer program is executed by processor and is looked into from operation system
Web-based history request data is ask, web-based history request data includes each web-based history request message;Disappear from the request of each web-based history
Common request parameter is extracted in breath, and records the request frequency of each common request parameter;According to preset mapping parameters number and
The frequency is requested, determines common request parameter to be mapped;Parameter type rule is obtained according to common request parameter to be mapped.
In one embodiment, it is also performed the steps of when computer program is executed by processor and asks each web-based history
It asks message to classify according to corresponding request type, obtains all types of web-based history request messages;Determine all types of go through
The request time of history network request message, and request frequency is obtained according to request time;It is determined according to request frequency all types of
Web-based history request message corresponding history effective time;All types of web-based history request messages and history effective time are deposited
Storage is into parameter mapping time table.
In one embodiment, inquiry preset parameter is also performed the steps of when computer program is executed by processor
Mapping table;Argument sequence to be mapped, parameter cryptographic Hash and effective time are stored into parameter mapping table, and recorded when coming into force
Between;The Mappings time is obtained according to current time and entry-into-force time;It, will be wait reflect when the Mappings time being greater than effective time
Argument sequence, parameter cryptographic Hash and effective time is penetrated to delete from parameter mapping table.
In one embodiment, determining network request is also performed the steps of when computer program is executed by processor to disappear
The long short type of breath;When network request message is short type request, the extracting parameter cryptographic Hash from network request message;Root
Argument sequence to be mapped is obtained from parameter mapping table according to parameter cryptographic Hash, and updates the entry-into-force time;Return to argument sequence to be mapped
To terminal.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of network request processing method, which comprises
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from the network request message;
Mapping processing is carried out to the argument sequence to be mapped by preset hash function, obtains parameter cryptographic Hash;
According to the network request type of the network request message, the effective time of the parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence, the parameter cryptographic Hash and the effective time to be mapped, and is returned
The mapping feedback message is returned to the terminal.
2. the method according to claim 1, wherein described according to preset parameter mapping ruler, from the net
Determine that argument sequence to be mapped includes: in network request message
Preset parameter mapping ruler is inquired, the parameter mapping ruler includes parameter type rule and parameter marshalling rule;
According to the parameter type rule, parameter to be mapped is extracted from the network request message;
The parameter to be mapped is ranked up according to the parameter marshalling rule, obtains argument sequence to be mapped.
3. according to the method described in claim 2, it is characterized in that, the network request class according to the network request message
Type determines that the effective time of the parameter cryptographic Hash includes:
Determine the network request type of the network request message;
Inquire preset parameter mapping time table;
It is inquired from the parameter mapping time table network request type corresponding mapping duration, and by the mapping
Effective time of the duration as the parameter cryptographic Hash.
4. according to the method described in claim 3, it is characterized in that, being gone back before the preset parameter mapping ruler of inquiry
Include:
The query history network request packet from operation system, the web-based history request data include that each web-based history request disappears
Breath;
Common request parameter is extracted from each web-based history request message, and records the request frequency of each common request parameter
It is secondary;
According to preset mapping parameters number and the request frequency, common request parameter to be mapped is determined;
The parameter type rule is obtained according to the common request parameter to be mapped.
5. according to the method described in claim 4, it is characterized in that, before the preset parameter mapping time table of the inquiry,
Further include:
Each web-based history request message is classified according to corresponding request type, obtains all types of history nets
Network request message;
It determines the request time of all types of web-based history request messages, and request frequency is obtained according to the request time
Rate;
The all types of web-based history request message corresponding history effective time is determined according to the request frequency;
The all types of web-based history request messages and the history effective time are stored to the parameter mapping time table
In.
6. according to claim 1 to method described in 5 any one, which is characterized in that described according to the parameter to be mapped
Sequence, the parameter cryptographic Hash and the effective time generate after mapping feedback message, further includes:
Inquire preset parameter mapping table;
Argument sequence, the parameter cryptographic Hash and the effective time to be mapped are stored into the parameter mapping table,
And record the entry-into-force time;
The Mappings time is obtained according to current time and the entry-into-force time;
When the Mappings time being greater than the effective time, by the argument sequence to be mapped, the parameter cryptographic Hash
It is deleted from the parameter mapping table with the effective time.
7. according to the method described in claim 6, it is characterized in that, being gone back after receiving the network request message that terminal is sent
Include:
Determine the long short type of the network request message;
When the network request message is short type request, the parameter Hash is extracted from the network request message
Value;
When obtaining the argument sequence to be mapped from the parameter mapping table according to the parameter cryptographic Hash, and coming into force described in update
Between;
The argument sequence to be mapped is returned to the terminal.
8. a kind of network request processing unit, which is characterized in that described device includes:
Network request receiving module, for receiving the network request message of terminal transmission;
Mapping parameters block, for being determined wait reflect from the network request message according to preset parameter mapping ruler
Penetrate argument sequence;
Mapping processing module is obtained for carrying out mapping processing to the argument sequence to be mapped by preset hash function
Parameter cryptographic Hash;
Effective time determining module determines the parameter Hash for the network request type according to the network request message
The effective time of value;
Feedback message module is mapped, for according to argument sequence, the parameter cryptographic Hash and the effective time to be mapped
Mapping feedback message is generated, and returns to the mapping feedback message to the terminal.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910298650.1A CN110113384A (en) | 2019-04-15 | 2019-04-15 | Network request processing method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910298650.1A CN110113384A (en) | 2019-04-15 | 2019-04-15 | Network request processing method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110113384A true CN110113384A (en) | 2019-08-09 |
Family
ID=67483931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910298650.1A Pending CN110113384A (en) | 2019-04-15 | 2019-04-15 | Network request processing method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113384A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113390A (en) * | 2019-04-17 | 2019-08-09 | 深圳壹账通智能科技有限公司 | Network request processing method, device, computer equipment and storage medium |
CN114844947A (en) * | 2022-04-29 | 2022-08-02 | 北京达佳互联信息技术有限公司 | Request processing method and device, electronic equipment and computer readable medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140156809A1 (en) * | 2012-02-17 | 2014-06-05 | Tencent Technology (Shenzhen) Company Limited | Data downloading method, terminal, server, and system |
CN106933854A (en) * | 2015-12-30 | 2017-07-07 | 阿里巴巴集团控股有限公司 | Short linking processing method, device and server |
CN107181771A (en) * | 2016-03-09 | 2017-09-19 | 北京优朋普乐科技有限公司 | The generation method of Quick Response Code and the response method of two-dimensional code scanning event |
CN109313660A (en) * | 2018-08-17 | 2019-02-05 | 福建联迪商用设备有限公司 | A kind of method and terminal generating short network address |
-
2019
- 2019-04-15 CN CN201910298650.1A patent/CN110113384A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140156809A1 (en) * | 2012-02-17 | 2014-06-05 | Tencent Technology (Shenzhen) Company Limited | Data downloading method, terminal, server, and system |
CN106933854A (en) * | 2015-12-30 | 2017-07-07 | 阿里巴巴集团控股有限公司 | Short linking processing method, device and server |
CN107181771A (en) * | 2016-03-09 | 2017-09-19 | 北京优朋普乐科技有限公司 | The generation method of Quick Response Code and the response method of two-dimensional code scanning event |
CN109313660A (en) * | 2018-08-17 | 2019-02-05 | 福建联迪商用设备有限公司 | A kind of method and terminal generating short network address |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113390A (en) * | 2019-04-17 | 2019-08-09 | 深圳壹账通智能科技有限公司 | Network request processing method, device, computer equipment and storage medium |
CN114844947A (en) * | 2022-04-29 | 2022-08-02 | 北京达佳互联信息技术有限公司 | Request processing method and device, electronic equipment and computer readable medium |
CN114844947B (en) * | 2022-04-29 | 2024-03-26 | 北京达佳互联信息技术有限公司 | Request processing method and device, electronic equipment and computer readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108509523B (en) | Method and device for structured processing of block chain data and readable storage medium | |
CN110069572A (en) | HIVE method for scheduling task, device, equipment and storage medium based on big data platform | |
CN110677317B (en) | Test method, test device, test equipment and storage medium | |
CN107689976B (en) | File transmission method and device | |
CN109816331A (en) | Audit task processing method, device, computer equipment and storage medium | |
CN110996339B (en) | eSIM resource management platform and management method | |
CN104601696A (en) | Service processing method and service invoking frame, device and architecture | |
CN114416121A (en) | Firmware burning method and device, burning equipment and firmware burning system | |
CN112511384B (en) | Flow data processing method and device, computer equipment and storage medium | |
CN107168765A (en) | A kind of method and system of remote compilation software | |
CN109816563A (en) | Electronic contract template circulation method, apparatus, computer equipment and storage medium | |
CN110717647A (en) | Decision flow construction method and device, computer equipment and storage medium | |
CN112632375B (en) | Session information processing method, server and storage medium | |
CN108512948B (en) | Address book updating method and device, computer equipment and storage medium | |
CN110113384A (en) | Network request processing method, device, computer equipment and storage medium | |
CN114356521A (en) | Task scheduling method and device, electronic equipment and storage medium | |
CN110633306A (en) | Service data processing method and device, computer equipment and storage medium | |
CN113377668A (en) | Automatic testing method and device for service interface and computer equipment | |
CN109446762A (en) | Cloud platform access method, device, computer equipment and storage medium | |
WO2023050676A1 (en) | Object processing method and electronic device | |
CN109218131B (en) | Network monitoring method and device, computer equipment and storage medium | |
CN110648052B (en) | Wind control decision method and device, computer equipment and storage medium | |
CN114039796B (en) | Network attack determination method and device, computer equipment and storage medium | |
CN110113390A (en) | Network request processing method, device, computer equipment and storage medium | |
CN109725931A (en) | A kind of jenkins construction method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190809 |
|
WD01 | Invention patent application deemed withdrawn after publication |