CN110113384A - Network request processing method, device, computer equipment and storage medium - Google Patents

Network request processing method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110113384A
CN110113384A CN201910298650.1A CN201910298650A CN110113384A CN 110113384 A CN110113384 A CN 110113384A CN 201910298650 A CN201910298650 A CN 201910298650A CN 110113384 A CN110113384 A CN 110113384A
Authority
CN
China
Prior art keywords
parameter
mapping
network request
mapped
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910298650.1A
Other languages
Chinese (zh)
Inventor
许剑勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910298650.1A priority Critical patent/CN110113384A/en
Publication of CN110113384A publication Critical patent/CN110113384A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/62Establishing a time schedule for servicing the requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application involves a kind of network request processing method, device, computer equipment and storage mediums.The method is related to Business Process Optimizing technology, comprising: receives the network request message that terminal is sent;According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping feedback message is to terminal.Network request message treatment effeciency can be improved using this method.

Description

Network request processing method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, set more particularly to a kind of network request processing method, device, computer Standby and storage medium.
Background technique
With the development of computer technology, the various application programs in mobile terminal are more and more various, are widely used.? When application program requests respective service to server, need to send network request message, according to the needs of various application programs, net Network request message will include a variety of different parameters, such as operating system, software version, device type, channel type, network protocol The common parameters such as version.Numerous common parameters causes network request message tediously long, reduces valid data load proportion, causes The treatment effeciency of network request message is lower.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of network request message treatment effeciency of can be improved Network request processing method, device, computer equipment and storage medium.
A kind of network request processing method, which comprises
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti- Message is presented to terminal.
In one of the embodiments, according to preset parameter mapping ruler, determination is to be mapped from network request message Argument sequence includes:
Preset parameter mapping ruler is inquired, parameter mapping ruler includes parameter type rule and parameter marshalling rule;
According to parameter type rule, parameter to be mapped is extracted from network request message;
Parameter to be mapped is ranked up according to parameter marshalling rule, obtains argument sequence to be mapped.
In one of the embodiments, according to the network request type of network request message, having for parameter cryptographic Hash is determined Effect the time include:
Determine the network request type of network request message;
Inquire preset parameter mapping time table;
The network request type corresponding mapping duration is inquired from parameter mapping time table, and will map the duration Effective time as parameter cryptographic Hash.
In one of the embodiments, before inquiring preset parameter mapping ruler, further includes:
The query history network request packet from operation system, web-based history request data include that each web-based history request disappears Breath;
Common request parameter is extracted from each web-based history request message, and records the request frequency of each common request parameter It is secondary;
According to preset mapping parameters number and the request frequency, common request parameter to be mapped is determined;
Parameter type rule is obtained according to common request parameter to be mapped.
In one of the embodiments, before inquiring preset parameter mapping time table, further includes:
Each web-based history request message is classified according to corresponding request type, all types of web-based histories is obtained and asks Seek message;
It determines the request time of all types of web-based history request messages, and request frequency is obtained according to request time;
All types of web-based history request messages corresponding history effective time is determined according to request frequency;
All types of web-based history request messages and history effective time are stored into parameter mapping time table.
Mapping is being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time in one of the embodiments, After feedback message, further includes:
Inquire preset parameter mapping table;
Argument sequence to be mapped, parameter cryptographic Hash and effective time are stored into parameter mapping table, and recorded when coming into force Between;
The Mappings time is obtained according to current time and entry-into-force time;
When the Mappings time be greater than effective time when, by argument sequence to be mapped, parameter cryptographic Hash and effective time from It is deleted in parameter mapping table.
In one of the embodiments, after receiving the network request message that terminal is sent, further includes:
Determine the long short type of network request message;
When network request message is short type request, the extracting parameter cryptographic Hash from network request message;
Argument sequence to be mapped is obtained from parameter mapping table according to parameter cryptographic Hash, and updates the entry-into-force time;
Argument sequence to be mapped is returned to terminal.
A kind of network request processing unit, described device include:
Network request receiving module, for receiving the network request message of terminal transmission;
Mapping parameters block, for being determined wait reflect from network request message according to preset parameter mapping ruler Penetrate argument sequence;
Processing module is mapped, mapping processing is carried out for treating mapping parameters sequence by preset hash function, obtains Parameter cryptographic Hash;
Effective time determining module determines parameter cryptographic Hash for the network request type according to network request message Effective time;
Feedback message module is mapped, is mapped for being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time Feedback message, and return mapping feedback message is to terminal.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti- Message is presented to terminal.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti- Message is presented to terminal.
Above-mentioned network request processing method, device, computer equipment and storage medium are mapped according to preset parameter and are advised Then, argument sequence to be mapped is determined from the network request message that terminal is sent, then by preset hash function by ginseng to be mapped Number Sequence carries out mapping and handles to obtain parameter cryptographic Hash, determines parameter cryptographic Hash according to the network request type of network request message Effective time, mapping feedback message is finally generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and is returned Feedback message is mapped to terminal.In the treatment process of network request message, the ginseng to be mapped that will be determined in network request message Number Sequence carries out mapping by preset hash function and is processed into parameter cryptographic Hash, becomes parameter numerous in network request message It is short, the load proportion of network request message valid data is improved, so as to improve the treatment effeciency of network request message.
Detailed description of the invention
Fig. 1 is the application scenario diagram of network request processing method in one embodiment;
Fig. 2 is the flow diagram of network request processing method in one embodiment;
Fig. 3 is the flow diagram that parameter mapping time table is constructed in one embodiment;
Fig. 4 is the flow diagram of network request processing method in another embodiment;
Fig. 5 is the structural block diagram of network request processing unit in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Network request processing method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, eventually End equipment 102 is communicated with server 104 by network by network.Terminal device 102 sends network to server 104 and asks Message is sought, server 104 is determined from the network request message that terminal device 102 is sent according to preset parameter mapping ruler Argument sequence to be mapped, then argument sequence to be mapped is subjected to mapping by preset hash function and handles to obtain parameter cryptographic Hash, The effective time of parameter cryptographic Hash is determined according to the network request type of network request message, finally according to parameter sequence to be mapped Column, parameter cryptographic Hash and effective time generate mapping feedback message, and return mapping feedback message is to terminal device 102.Wherein, Terminal device 102 can be, but not limited to be various personal computers, laptop, smart phone, tablet computer and portable Wearable device, server 104 can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of network request processing method, it is applied to Fig. 1 in this way In server 104 for be illustrated, comprising the following steps:
Step S201: the network request message that terminal is sent is received.
Wherein, network request message can send the request message for requesting respective service for terminal to server 104, It may include various required parameters.In APP network request message, AppId, App version number, DeviceId may include (equipment id), mobile phone brand, mobile phone model, mobile phone os release number (mobile phone operating system number), channel number, network protocol version Number, Userid (user No. Id), some are also possible to add many mobile phone safe information such as cell-phone number, IMEI (International Mobile Equipment Identity, international mobile equipment identification number), Bluetooth address, WiFi MAC Address, whether escape from prison, whether the information such as simulator, and network request requires to take so more common parameters every time, with Ensure that service server is capable of providing targetedly business service.
In one embodiment, common request parameter publicParams includes " appCode=in network request message The words such as xxx&deviceId=xxx&osVersion=xxx&appId=xxx&appClientid=xxx &tddId=xxx " Section.Original length can be replaced longer by key its mapping by establishing publicParams:key PublicParams, so as to improve network request message valid data load proportion.
Step S203: according to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message.
Parameter mapping ruler is used to determine that needing to carry out mapping handles to obtain the various of short parameter from network request message Parameter can specifically include parameter type rule and parameter marshalling rule, and parameter type rule is used to determine mapping parameters range, Parameter marshalling rule obtains the argument sequence to be mapped of unified format for being ranked up to each mapping parameters.Parameter to be mapped Sequence obtains after being sorted according to the parameter mapped in network request message according to certain sequence.For example, can be according to Initial sequence is ranked up, to ensure that parameter type is identical in heterogeneous networks request message, and when the sequence difference of each parameter Available identical argument sequence to be mapped.
In the present embodiment, preset parameter mapping ruler can be inquired, parameter mapping ruler is set according to actual needs It sets, as the common parameter according to required for service server demand is configured.According to the parameter mapping ruler from network request Argument sequence to be mapped is determined in message.
Step S205: mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter Hash Value.
After obtaining argument sequence to be mapped, mapping parameters sequence is treated according to preset mapping algorithm and carries out mapping processing, Obtain the corresponding short parameter of mapping.In the present embodiment, mapping algorithm is hash function, can be by the message compression of random length To the eap-message digest of a certain regular length.Common hash function includes MD4, MD5 and SHA1.By hash function to obtaining Argument sequence to be mapped carries out mapping processing, the short parameter of the mapping after obtaining compresses in length, i.e. parameter cryptographic Hash.For example, will be to Mapping parameters sequence is as value, after carrying out mapping processing by hash function, obtains corresponding parameter cryptographic Hash key.It is depositing After the mapping relations for storing up key-value, corresponding value can be determined by parameter cryptographic Hash key, further determine that correspondence Argument sequence to be mapped, mapped between the longer argument sequence to be mapped of length and shorter parameter cryptographic Hash to construct Relationship.
In specific implementation, server 104 can store key-value by safeguarding the hash table of a key-value Mapping relations.Specifically, the common parameter composition one of mapping processing will be carried out in the network request message of terminal transmission The long character string of json format, i.e., argument sequence value to be mapped, such as appid: " 123 ", osType: " 1 ", clientId: " 131313314444 " ... }, according to preset hash function to the long string operations after, obtain the shorter key of length, will Key-value is stored into the hash table.
Step S207: according to the network request type of network request message, the effective time of parameter cryptographic Hash is determined.
After obtaining the corresponding parameter cryptographic Hash of argument sequence to be mapped, need to be arranged corresponding effective time, with to depositing The key-value mapping relations of storage carry out dynamic update, it is ensured that the validity of key-value guarantees the search efficiency of key.Tool Body, it can determine the network request type of network request message, having for parameter cryptographic Hash is determined according to the network request type Imitate the time.Different effective time can be set in the network request message of heterogeneous networks request type.For example, for request frequency The high network request type of rate, the effective time of the corresponding parameter cryptographic Hash of network request message can be set it is longer, to keep away Exempt from frequent progress mapping processing, it is ensured that the treatment effeciency of network request message.
Step S209: mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and is returned Mapping feedback message is returned to terminal.
After the effective time for determining parameter cryptographic Hash, mapping feedback is generated in conjunction with argument sequence to be mapped and parameter cryptographic Hash Message, and return mapping feedback message is to terminal.It specifically, can be according to the mapping of argument sequence to be mapped and parameter cryptographic Hash The effective time of relationship and parameter cryptographic Hash sequentially generates mapping feedback message and is back to terminal.It is anti-that terminal receives mapping After presenting message, parameter cryptographic Hash can directly be replaced to each mapping parameters in argument sequence to be mapped, to make network request Common parameter length in message shortens, and the valid data load proportion of network request message is improved, to improve network The treatment effeciency of request message.
In above-mentioned network request processing method, according to preset parameter mapping ruler, the network request sent from terminal disappears Argument sequence to be mapped is determined in breath, then argument sequence to be mapped is subjected to mapping by preset hash function and handles to obtain parameter Cryptographic Hash determines the effective time of parameter cryptographic Hash according to the network request type of network request message, finally according to be mapped Argument sequence, parameter cryptographic Hash and effective time generate mapping feedback message, and return mapping feedback message is to terminal.In network In the treatment process of request message, by the argument sequence to be mapped determined in network request message by preset hash function into Row mapping is processed into parameter cryptographic Hash, so that parameter numerous in network request message is shortened, it is effective to improve network request message The load proportion of data, so as to improve the treatment effeciency of network request message.
In one embodiment, according to preset parameter mapping ruler, parameter to be mapped is determined from network request message Sequence includes: the preset parameter mapping ruler of inquiry, and parameter mapping ruler includes parameter type rule and parameter marshalling rule;It presses According to parameter type rule, parameter to be mapped is extracted from network request message;By parameter to be mapped according to parameter marshalling rule into Row sequence, obtains argument sequence to be mapped.
Parameter mapping ruler is configured according to actual needs, such as the common parameter according to required for service server demand It is configured, is used to determine that needing to carry out mapping handles to obtain the various parameters of short parameter from network request message.This reality It applies in example, parameter mapping ruler includes parameter type rule and parameter marshalling rule.Wherein, parameter type rule is reflected for determination Parameter area is penetrated, parameter marshalling rule obtains the argument sequence to be mapped of unified format for being ranked up to each mapping parameters.
Specifically, when determining argument sequence to be mapped, preset parameter mapping ruler is inquired, according to parameter mapping ruler In parameter type rule parameter to be mapped is extracted from network request message, parameter type rule can be by network request message In common parameter be set as carrying out the parameter to be mapped of mapping processing.After obtaining parameter to be mapped, maps and advise according to parameter Parameter to be mapped is ranked up by the parameter marshalling rule in then, the argument sequence to be mapped after obtaining parameter marshalling to be mapped. In the network request message sent every time in view of terminal, the sequencing of each parameter is different, if directly carrying out mapping processing, meeting The problem of different parameter cryptographic Hash can be generated when subsequent compression being caused to map.Therefore, by each parameter to be mapped according to preset Parameter marshalling rule is ranked up, and is such as ranked up in alphabetical order, and the argument sequence to be mapped of fixed sequence is obtained, thus Mapping can be compressed and obtain identical parameter cryptographic Hash.
In one embodiment, according to the network request type of network request message, determine parameter cryptographic Hash it is effective when Between comprise determining that the network request type of network request message;Inquire preset parameter mapping time table;From parameter mapping time Inquired in table network request type corresponding mapping duration, and using map the duration as parameter cryptographic Hash it is effective when Between.
After obtaining the corresponding parameter cryptographic Hash of argument sequence to be mapped, need to be arranged corresponding effective time, with to depositing The key-value mapping relations of storage carry out dynamic update, it is ensured that the validity of key-value guarantees the search efficiency of key.This In embodiment, when determining the effective time of parameter cryptographic Hash, the network request type of network request message is determined.Heterogeneous networks The network request message of request type can be set different effective time, the low network request message of request frequency, can be with Shorter parameter cryptographic Hash effective time is set, to be updated in time to the key-value mapping relations of storage, improves key Search efficiency, to improve the treatment effeciency of network request message.After the network request type for determining network request message, look into Preset parameter mapping time table is ask, which records the network request message pair for there are various network request types The mapping duration answered, the mapping duration can carry out analysis setting according to web-based history request data.It is reflected from parameter It penetrates in timetable and inquires the network request type corresponding mapping duration, and using the mapping duration as parameter cryptographic Hash Effective time.After inquiry obtains the network request type corresponding mapping duration, it can directly be set to parameter cryptographic Hash Effective time.
In one embodiment, before inquiring preset parameter mapping ruler, further includes: inquire and go through from operation system History network request packet, web-based history request data include each web-based history request message;From each web-based history request message Common request parameter is extracted, and records the request frequency of each common request parameter;According to preset mapping parameters number and request The frequency determines common request parameter to be mapped;Parameter type rule is obtained according to common request parameter to be mapped.
In the present embodiment, parameter type rule carries out true according to the request frequency of parameter each in web-based history request data It is fixed.Specifically, the query history network request packet from operation system, web-based history request data include each web-based history request Message.In specific application, time span screening conditions can be set, i.e. the interior web-based history of selection certain time range is asked Seek the web-based history request data in data, such as 6 months.Common request parameter is extracted from each web-based history request message, And record the request frequency of each common request parameter.In the present embodiment, according to determining pair of the request frequency from common request parameter The parameter to be mapped answered, wherein the request frequency is each common request in each web-based history request message that the terminal obtained is sent The frequency that parameter occurs.
Preset mapping parameters number is inquired, mapping parameters number is set according to actual needs, such as can be institute There is common request parameter or for fixed number.Common request ginseng to be mapped is determined according to the mapping parameters number and the request frequency Number.Specifically, each common request parameter can be ranked up according to the request frequency by up to few sequence, and joined according to mapping It keeps count of and determines the common request parameter of corresponding number from the common request parameter after sequence, as parameter to be mapped.It obtains After common request parameter to be mapped, parameter type rule is obtained according to the common request parameter to be mapped, i.e., waits reflecting by this The parameter area for carrying out mapping processing that the common request parameter penetrated is determined as parameter type rule.To network request Message carry out mapping processing when, therefrom determine parameter to be mapped according to common request parameter to be mapped, and further generate to Mapping parameters sequence is to carry out subsequent mapping processing.
It in one embodiment, further include building ginseng as shown in figure 3, before inquiring preset parameter mapping time table It the step of number mapping time table, specifically includes:
Step S301: each web-based history request message is classified according to corresponding request type, is obtained all types of Web-based history request message.
In the present embodiment, each network request type corresponding mapping duration is according to history net in parameter mapping time table Network request data is set.Specifically, after query history network request packet in operation system, each web-based history is requested Message is classified according to corresponding request type, obtains all types of web-based history request messages.Heterogeneous networks request type Network request message be correspondingly arranged on different effective time, by each web-based history request message according to corresponding request type Classify, so that corresponding effective time is arranged for the web-based history request message of each request type.
Step S303: it determines the request time of all types of web-based history request messages, and is asked according to request time Seek frequency.
Request time is the corresponding moment value of web-based history request message that server 104 receives terminal transmission, according to The request of all types of web-based history request messages can be calculated in the request time of all types of web-based history request messages Frequency.Specifically, it can be averaged the interval time poor time in counting period to request time between each web-based history request message Value, and request frequency is obtained according to the interval time average value.Request frequency reflects all types of web-based history request messages Request frequent degree, interval time average value is lower, and request frequency is higher, i.e. the web-based history request message of the type is asked Ask more frequent.
Step S305: all types of web-based history request messages corresponding history effective time is determined according to request frequency.
After obtaining the request frequency of all types of web-based history request messages, all types of go through is determined according to the request frequency History network request message corresponding history effective time.Specifically, history effective time can be set as being more than or equal to request frequency The inverse of rate, to avoid needing frequent progress parameter mapping to handle.
Step S307: all types of web-based history request messages and history effective time are stored to parameter mapping time table In.
After obtaining history effective time, by the mapping relations of history effective time and all types of web-based history request messages It is stored, can specifically be stored into parameter mapping time table.In the effective time of subsequent determining parameter cryptographic Hash, It can be according to the network request type of network request message, when inquiry obtains corresponding effective from the parameter mapping time table Between.The effective time is set according to web-based history request data in operation system, can be accurately reflected each network request and be disappeared The actual demand of breath avoids carrying out frequent parameter mapping processing, it is ensured that the treatment effeciency of network request message.
In one embodiment, mapping feedback is being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time After message, further includes: inquire preset parameter mapping table;Argument sequence to be mapped, parameter cryptographic Hash and effective time are deposited Storage records the entry-into-force time into parameter mapping table;The Mappings time is obtained according to current time and entry-into-force time;Work as mapping When action time is greater than effective time, argument sequence to be mapped, parameter cryptographic Hash and effective time are deleted from parameter mapping table It removes.
In the present embodiment, generate map feedback message after, by construct parameter mapping table treat mapping parameters sequence and Mapping carries out validity maintenance between parameter cryptographic Hash.Specifically, after generating mapping feedback message, by parameter sequence to be mapped Column, parameter cryptographic Hash and effective time store into preset parameter mapping table, and record the entry-into-force time, entry-into-force time reflection Argument sequence to be mapped and parameter cryptographic Hash come into force action time, also as the initial time that effective time determines, i.e. root The mapping relations between mapping parameters sequence and parameter cryptographic Hash are treated according to the entry-into-force time and effective time to be safeguarded.Specifically Ground obtains the Mappings time according to current time and entry-into-force time, and the Mappings time is argument sequence to be mapped and ginseng Number cryptographic Hash enter into force duration of effect.The Mappings time is compared with effective time, when Mappings Between be greater than effective time when, show that effective time is already expired, the mapping relations of the argument sequence to be mapped and parameter cryptographic Hash have been lost Effect, then delete argument sequence to be mapped, parameter cryptographic Hash and effective time from parameter mapping table.
In one embodiment, after receiving the network request message that terminal is sent, further includes: determine that network request disappears The long short type of breath;When network request message is short type request, the extracting parameter cryptographic Hash from network request message;Root Argument sequence to be mapped is obtained from parameter mapping table according to parameter cryptographic Hash, and updates the entry-into-force time;Return to argument sequence to be mapped To terminal.
After terminal receives mapping feedback message, parameter cryptographic Hash can directly be replaced each in argument sequence to be mapped Mapping parameters, and corresponding business service is requested by short network request message.Specifically, it is asked in the network for receiving terminal transmission After seeking message, need to judge the long short type of network request message, to determine whether the network request message has carried out parameter Mapping.When network request message is long type request, show that the network request message is handled without parameter mapping, this When, into the step of according to preset parameter mapping ruler, argument sequence to be mapped is determined from the network request message, with Parameter mapping processing is carried out to the network request message.
When network request message is short type request, show that the network request message has been subjected to parameter mapping processing, The extracting parameter cryptographic Hash from network request message at this time, and ginseng to be mapped is obtained from parameter mapping table according to the parameter cryptographic Hash Number Sequence.While obtaining argument sequence to be mapped, the entry-into-force time is updated, to update argument sequence to be mapped and parameter Hash Value comes into force action time, resets the expired judgement of effective time, so that it is guaranteed that argument sequence to be mapped and parameter cryptographic Hash The validity of mapping relations.Obtained argument sequence to be mapped is back to terminal again, terminal receives argument sequence to be mapped Afterwards, can by its alternative parameter cryptographic Hash, thus reduction obtain include complete common request parameter network request message, so as to Service server provides corresponding business service according to the network request message.
In one embodiment, as shown in figure 4, providing a kind of network request processing method, comprising:
Step S401: the network request message that terminal is sent is received.
Network request message can send the request message for requesting respective service for terminal to server 104, can To include various required parameters.
Step S402: inquiring preset parameter mapping ruler, and parameter mapping ruler includes parameter type rule and parameter row Sequence rule;
Step S403: according to parameter type rule, parameter to be mapped is extracted from network request message;
Step S404: parameter to be mapped is ranked up according to parameter marshalling rule, obtains argument sequence to be mapped;
Step S405: mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter Hash Value.
Parameter mapping ruler is configured according to actual needs, such as the common parameter according to required for service server demand It is configured, is used to determine that needing to carry out mapping handles to obtain the various parameters of short parameter from network request message.This reality It applies in example, parameter mapping ruler includes parameter type rule and parameter marshalling rule.Wherein, parameter type rule is reflected for determination Parameter area is penetrated, parameter marshalling rule obtains the argument sequence to be mapped of unified format for being ranked up to each mapping parameters. After obtaining argument sequence to be mapped, mapping parameters sequence is treated according to preset mapping algorithm and carries out mapping processing, is corresponded to The short parameter of mapping.In the present embodiment, mapping algorithm is hash function, specially MD5 algorithm.
Step S406: the network request type of network request message is determined;
Step S407: preset parameter mapping time table is inquired;
Step S408: the network request type corresponding mapping duration is inquired from parameter mapping time table, and will be reflected Penetrate effective time of the duration as parameter cryptographic Hash.
In the present embodiment, when determining the effective time of parameter cryptographic Hash, the network request class of network request message is determined Different effective time can be set in type, the network request message of heterogeneous networks request type.
Step S409: mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and is returned Mapping feedback message is returned to terminal.
After the effective time for determining parameter cryptographic Hash, mapping feedback is generated in conjunction with argument sequence to be mapped and parameter cryptographic Hash Message, and return mapping feedback message is to terminal.It specifically, can be according to the mapping of argument sequence to be mapped and parameter cryptographic Hash The effective time of relationship and parameter cryptographic Hash sequentially generates mapping feedback message and is back to terminal.It is anti-that terminal receives mapping After presenting message, parameter cryptographic Hash can directly be replaced to each mapping parameters in argument sequence to be mapped, to make network request Common parameter length in message shortens, and the valid data load proportion of network request message is improved, to improve network The treatment effeciency of request message.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of network request processing unit, comprising: network request receives Module 501, mapping parameters block 503, mapping processing module 505, effective time determining module 507 and mapping feedback message Module 509, in which:
Network request receives mould 501, for receiving the network request message of terminal transmission;
Mapping parameters block 503, for according to preset parameter mapping ruler, determined from network request message to Mapping parameters sequence;
Processing module 505 is mapped, mapping processing is carried out for treating mapping parameters sequence by preset hash function, obtains To parameter cryptographic Hash;
Effective time determining module 507 determines parameter cryptographic Hash for the network request type according to network request message Effective time;
Feedback message module 509 is mapped, is reflected for being generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time Penetrate feedback message, and return mapping feedback message is to terminal.
In one embodiment, mapping parameters block 503 includes mapping ruler unit, parameter determination unit and parameter Sequencing unit, in which: mapping ruler unit, for inquiring preset parameter mapping ruler, parameter mapping ruler includes parameter class Type rule and parameter marshalling rule;Parameter determination unit, for according to parameter type rule, from network request message extract to Mapping parameters;Parameter marshalling unit obtains parameter to be mapped for parameter to be mapped to be ranked up according to parameter marshalling rule Sequence.
In one embodiment, effective time determining module 507 includes request type unit, mapping event table unit and has Imitate time determination unit, in which: request type unit, for determining the network request type of network request message;Mapping event Table unit, for inquiring preset parameter mapping time table;Effective time determination unit, for being looked into from parameter mapping time table It askes the network request type corresponding mapping duration, and using the mapping duration as the effective time of parameter cryptographic Hash.
It in one embodiment, further include historical requests data module, common parameter module, mapping parameters module and parameter Typing rule module, in which: historical requests data module, for query history network request packet, history from operation system Network request packet includes each web-based history request message;Common parameter module, for being mentioned from each web-based history request message Common request parameter is taken, and records the request frequency of each common request parameter;Mapping parameters module, for according to preset mapping Number of parameters and the request frequency, determine common request parameter to be mapped;Parameter type rule module, for according to be mapped Common request parameter obtains parameter type rule.
It in one embodiment, further include requests classification module, request frequency module, history effective time module and mapping Table module, in which: requests classification module, for each web-based history request message to be classified according to corresponding request type, Obtain all types of web-based history request messages;Request frequency module, for determining all types of web-based history request messages Request time, and request frequency is obtained according to request time;History effective time module, it is all kinds of for being determined according to request frequency The web-based history request message of type corresponding history effective time;Mapping table module, for requesting all types of web-based histories Message and history effective time store into parameter mapping time table.
In one embodiment, further include parameter mapping table module, mapping memory module, action time determining module and reflect Penetrate removing module, in which: parameter mapping table module, for inquiring preset parameter mapping table;Mapping memory module, for will be to Mapping parameters sequence, parameter cryptographic Hash and effective time store into parameter mapping table, and record the entry-into-force time;Action time is true Cover half block, for obtaining the Mappings time according to current time and entry-into-force time;Removing module is mapped, for working as Mappings When time is greater than effective time, argument sequence to be mapped, parameter cryptographic Hash and effective time are deleted from parameter mapping table.
It in one embodiment, further include that determination type module, cryptographic Hash extraction module, argument sequence obtain module and anti- Present module, in which: determination type module, for determining the long short type of network request message;Cryptographic Hash extraction module, for working as When network request message is short type request, the extracting parameter cryptographic Hash from network request message;Argument sequence obtains module, For obtaining argument sequence to be mapped from parameter mapping table according to parameter cryptographic Hash, and update the entry-into-force time;Feedback module is used for Argument sequence to be mapped is returned to terminal.
Specific about network request processing unit limits the limit that may refer to above for network request processing method Fixed, details are not described herein.Modules in above-mentioned network request processing unit can fully or partially through software, hardware and its Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment includes processor, memory and the network interface connected by system bus. Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non-easy The property lost storage medium, built-in storage.The non-volatile memory medium is stored with operating system and computer program.The built-in storage Operation for operating system and computer program in non-volatile memory medium provides environment.The network of the computer equipment connects Mouth with external terminal by network connection for being communicated.To realize that a kind of network is asked when the computer program is executed by processor Seek processing method.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor perform the steps of when executing computer program
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti- Message is presented to terminal.
In one embodiment, inquiry preset parameter is also performed the steps of when processor executes computer program to reflect Rule is penetrated, parameter mapping ruler includes parameter type rule and parameter marshalling rule;According to parameter type rule, from network request Parameter to be mapped is extracted in message;Parameter to be mapped is ranked up according to parameter marshalling rule, obtains argument sequence to be mapped.
In one embodiment, determining network request message is also performed the steps of when processor executes computer program Network request type;Inquire preset parameter mapping time table;Network request type pair is inquired from parameter mapping time table The mapping duration answered, and using the mapping duration as the effective time of parameter cryptographic Hash.
In one embodiment, it also performs the steps of when processor executes computer program and is inquired from operation system Web-based history request data, web-based history request data include each web-based history request message;From each web-based history request message Middle extraction common request parameter, and record the request frequency of each common request parameter;According to preset mapping parameters number and ask The frequency is sought, determines common request parameter to be mapped;Parameter type rule is obtained according to common request parameter to be mapped.
In one embodiment, it is also performed the steps of when processor executes computer program and requests each web-based history Message is classified according to corresponding request type, obtains all types of web-based history request messages;Determine all types of history The request time of network request message, and request frequency is obtained according to request time;All types of go through is determined according to request frequency History network request message corresponding history effective time;All types of web-based history request messages and history effective time are stored Into parameter mapping time table.
In one embodiment, inquiry preset parameter is also performed the steps of when processor executes computer program to reflect Firing table;Argument sequence to be mapped, parameter cryptographic Hash and effective time are stored into parameter mapping table, and record the entry-into-force time; The Mappings time is obtained according to current time and entry-into-force time;It, will be to be mapped when the Mappings time being greater than effective time Argument sequence, parameter cryptographic Hash and effective time delete from parameter mapping table.
In one embodiment, determining network request message is also performed the steps of when processor executes computer program Long short type;When network request message is short type request, the extracting parameter cryptographic Hash from network request message;According to Parameter cryptographic Hash obtains argument sequence to be mapped from parameter mapping table, and updates the entry-into-force time;Return to argument sequence to be mapped extremely Terminal.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from network request message;
Mapping parameters sequence is treated by preset hash function and carries out mapping processing, obtains parameter cryptographic Hash;
According to the network request type of network request message, the effective time of parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence to be mapped, parameter cryptographic Hash and effective time, and return mapping is anti- Message is presented to terminal.
In one embodiment, inquiry preset parameter is also performed the steps of when computer program is executed by processor Mapping ruler, parameter mapping ruler include parameter type rule and parameter marshalling rule;According to parameter type rule, asked from network It asks and extracts parameter to be mapped in message;Parameter to be mapped is ranked up according to parameter marshalling rule, obtains parameter sequence to be mapped Column.
In one embodiment, determining network request is also performed the steps of when computer program is executed by processor to disappear The network request type of breath;Inquire preset parameter mapping time table;Network request type is inquired from parameter mapping time table The corresponding mapping duration, and using the mapping duration as the effective time of parameter cryptographic Hash.
In one embodiment, it also performs the steps of when computer program is executed by processor and is looked into from operation system Web-based history request data is ask, web-based history request data includes each web-based history request message;Disappear from the request of each web-based history Common request parameter is extracted in breath, and records the request frequency of each common request parameter;According to preset mapping parameters number and The frequency is requested, determines common request parameter to be mapped;Parameter type rule is obtained according to common request parameter to be mapped.
In one embodiment, it is also performed the steps of when computer program is executed by processor and asks each web-based history It asks message to classify according to corresponding request type, obtains all types of web-based history request messages;Determine all types of go through The request time of history network request message, and request frequency is obtained according to request time;It is determined according to request frequency all types of Web-based history request message corresponding history effective time;All types of web-based history request messages and history effective time are deposited Storage is into parameter mapping time table.
In one embodiment, inquiry preset parameter is also performed the steps of when computer program is executed by processor Mapping table;Argument sequence to be mapped, parameter cryptographic Hash and effective time are stored into parameter mapping table, and recorded when coming into force Between;The Mappings time is obtained according to current time and entry-into-force time;It, will be wait reflect when the Mappings time being greater than effective time Argument sequence, parameter cryptographic Hash and effective time is penetrated to delete from parameter mapping table.
In one embodiment, determining network request is also performed the steps of when computer program is executed by processor to disappear The long short type of breath;When network request message is short type request, the extracting parameter cryptographic Hash from network request message;Root Argument sequence to be mapped is obtained from parameter mapping table according to parameter cryptographic Hash, and updates the entry-into-force time;Return to argument sequence to be mapped To terminal.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of network request processing method, which comprises
Receive the network request message that terminal is sent;
According to preset parameter mapping ruler, argument sequence to be mapped is determined from the network request message;
Mapping processing is carried out to the argument sequence to be mapped by preset hash function, obtains parameter cryptographic Hash;
According to the network request type of the network request message, the effective time of the parameter cryptographic Hash is determined;
Mapping feedback message is generated according to argument sequence, the parameter cryptographic Hash and the effective time to be mapped, and is returned The mapping feedback message is returned to the terminal.
2. the method according to claim 1, wherein described according to preset parameter mapping ruler, from the net Determine that argument sequence to be mapped includes: in network request message
Preset parameter mapping ruler is inquired, the parameter mapping ruler includes parameter type rule and parameter marshalling rule;
According to the parameter type rule, parameter to be mapped is extracted from the network request message;
The parameter to be mapped is ranked up according to the parameter marshalling rule, obtains argument sequence to be mapped.
3. according to the method described in claim 2, it is characterized in that, the network request class according to the network request message Type determines that the effective time of the parameter cryptographic Hash includes:
Determine the network request type of the network request message;
Inquire preset parameter mapping time table;
It is inquired from the parameter mapping time table network request type corresponding mapping duration, and by the mapping Effective time of the duration as the parameter cryptographic Hash.
4. according to the method described in claim 3, it is characterized in that, being gone back before the preset parameter mapping ruler of inquiry Include:
The query history network request packet from operation system, the web-based history request data include that each web-based history request disappears Breath;
Common request parameter is extracted from each web-based history request message, and records the request frequency of each common request parameter It is secondary;
According to preset mapping parameters number and the request frequency, common request parameter to be mapped is determined;
The parameter type rule is obtained according to the common request parameter to be mapped.
5. according to the method described in claim 4, it is characterized in that, before the preset parameter mapping time table of the inquiry, Further include:
Each web-based history request message is classified according to corresponding request type, obtains all types of history nets Network request message;
It determines the request time of all types of web-based history request messages, and request frequency is obtained according to the request time Rate;
The all types of web-based history request message corresponding history effective time is determined according to the request frequency;
The all types of web-based history request messages and the history effective time are stored to the parameter mapping time table In.
6. according to claim 1 to method described in 5 any one, which is characterized in that described according to the parameter to be mapped Sequence, the parameter cryptographic Hash and the effective time generate after mapping feedback message, further includes:
Inquire preset parameter mapping table;
Argument sequence, the parameter cryptographic Hash and the effective time to be mapped are stored into the parameter mapping table, And record the entry-into-force time;
The Mappings time is obtained according to current time and the entry-into-force time;
When the Mappings time being greater than the effective time, by the argument sequence to be mapped, the parameter cryptographic Hash It is deleted from the parameter mapping table with the effective time.
7. according to the method described in claim 6, it is characterized in that, being gone back after receiving the network request message that terminal is sent Include:
Determine the long short type of the network request message;
When the network request message is short type request, the parameter Hash is extracted from the network request message Value;
When obtaining the argument sequence to be mapped from the parameter mapping table according to the parameter cryptographic Hash, and coming into force described in update Between;
The argument sequence to be mapped is returned to the terminal.
8. a kind of network request processing unit, which is characterized in that described device includes:
Network request receiving module, for receiving the network request message of terminal transmission;
Mapping parameters block, for being determined wait reflect from the network request message according to preset parameter mapping ruler Penetrate argument sequence;
Mapping processing module is obtained for carrying out mapping processing to the argument sequence to be mapped by preset hash function Parameter cryptographic Hash;
Effective time determining module determines the parameter Hash for the network request type according to the network request message The effective time of value;
Feedback message module is mapped, for according to argument sequence, the parameter cryptographic Hash and the effective time to be mapped Mapping feedback message is generated, and returns to the mapping feedback message to the terminal.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201910298650.1A 2019-04-15 2019-04-15 Network request processing method, device, computer equipment and storage medium Pending CN110113384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910298650.1A CN110113384A (en) 2019-04-15 2019-04-15 Network request processing method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910298650.1A CN110113384A (en) 2019-04-15 2019-04-15 Network request processing method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110113384A true CN110113384A (en) 2019-08-09

Family

ID=67483931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910298650.1A Pending CN110113384A (en) 2019-04-15 2019-04-15 Network request processing method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110113384A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113390A (en) * 2019-04-17 2019-08-09 深圳壹账通智能科技有限公司 Network request processing method, device, computer equipment and storage medium
CN114844947A (en) * 2022-04-29 2022-08-02 北京达佳互联信息技术有限公司 Request processing method and device, electronic equipment and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140156809A1 (en) * 2012-02-17 2014-06-05 Tencent Technology (Shenzhen) Company Limited Data downloading method, terminal, server, and system
CN106933854A (en) * 2015-12-30 2017-07-07 阿里巴巴集团控股有限公司 Short linking processing method, device and server
CN107181771A (en) * 2016-03-09 2017-09-19 北京优朋普乐科技有限公司 The generation method of Quick Response Code and the response method of two-dimensional code scanning event
CN109313660A (en) * 2018-08-17 2019-02-05 福建联迪商用设备有限公司 A kind of method and terminal generating short network address

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140156809A1 (en) * 2012-02-17 2014-06-05 Tencent Technology (Shenzhen) Company Limited Data downloading method, terminal, server, and system
CN106933854A (en) * 2015-12-30 2017-07-07 阿里巴巴集团控股有限公司 Short linking processing method, device and server
CN107181771A (en) * 2016-03-09 2017-09-19 北京优朋普乐科技有限公司 The generation method of Quick Response Code and the response method of two-dimensional code scanning event
CN109313660A (en) * 2018-08-17 2019-02-05 福建联迪商用设备有限公司 A kind of method and terminal generating short network address

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113390A (en) * 2019-04-17 2019-08-09 深圳壹账通智能科技有限公司 Network request processing method, device, computer equipment and storage medium
CN114844947A (en) * 2022-04-29 2022-08-02 北京达佳互联信息技术有限公司 Request processing method and device, electronic equipment and computer readable medium
CN114844947B (en) * 2022-04-29 2024-03-26 北京达佳互联信息技术有限公司 Request processing method and device, electronic equipment and computer readable medium

Similar Documents

Publication Publication Date Title
CN108509523B (en) Method and device for structured processing of block chain data and readable storage medium
CN110069572A (en) HIVE method for scheduling task, device, equipment and storage medium based on big data platform
CN110677317B (en) Test method, test device, test equipment and storage medium
CN107689976B (en) File transmission method and device
CN109816331A (en) Audit task processing method, device, computer equipment and storage medium
CN110996339B (en) eSIM resource management platform and management method
CN104601696A (en) Service processing method and service invoking frame, device and architecture
CN114416121A (en) Firmware burning method and device, burning equipment and firmware burning system
CN112511384B (en) Flow data processing method and device, computer equipment and storage medium
CN107168765A (en) A kind of method and system of remote compilation software
CN109816563A (en) Electronic contract template circulation method, apparatus, computer equipment and storage medium
CN110717647A (en) Decision flow construction method and device, computer equipment and storage medium
CN112632375B (en) Session information processing method, server and storage medium
CN108512948B (en) Address book updating method and device, computer equipment and storage medium
CN110113384A (en) Network request processing method, device, computer equipment and storage medium
CN114356521A (en) Task scheduling method and device, electronic equipment and storage medium
CN110633306A (en) Service data processing method and device, computer equipment and storage medium
CN113377668A (en) Automatic testing method and device for service interface and computer equipment
CN109446762A (en) Cloud platform access method, device, computer equipment and storage medium
WO2023050676A1 (en) Object processing method and electronic device
CN109218131B (en) Network monitoring method and device, computer equipment and storage medium
CN110648052B (en) Wind control decision method and device, computer equipment and storage medium
CN114039796B (en) Network attack determination method and device, computer equipment and storage medium
CN110113390A (en) Network request processing method, device, computer equipment and storage medium
CN109725931A (en) A kind of jenkins construction method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190809

WD01 Invention patent application deemed withdrawn after publication