CN112565277B - Data transmission method, system and electronic equipment - Google Patents

Data transmission method, system and electronic equipment Download PDF

Info

Publication number
CN112565277B
CN112565277B CN202011436331.1A CN202011436331A CN112565277B CN 112565277 B CN112565277 B CN 112565277B CN 202011436331 A CN202011436331 A CN 202011436331A CN 112565277 B CN112565277 B CN 112565277B
Authority
CN
China
Prior art keywords
database
request
service
service request
http request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011436331.1A
Other languages
Chinese (zh)
Other versions
CN112565277A (en
Inventor
江昊
邹迪
吴小虎
曹伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowang Xiongan Finance Technology Group Co ltd
State Grid Corp of China SGCC
State Grid E Commerce Co Ltd
Original Assignee
Guowang Xiongan Finance Technology Group Co ltd
State Grid Corp of China SGCC
State Grid E Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guowang Xiongan Finance Technology Group Co ltd, State Grid Corp of China SGCC, State Grid E Commerce Co Ltd filed Critical Guowang Xiongan Finance Technology Group Co ltd
Priority to CN202011436331.1A priority Critical patent/CN112565277B/en
Publication of CN112565277A publication Critical patent/CN112565277A/en
Application granted granted Critical
Publication of CN112565277B publication Critical patent/CN112565277B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services

Abstract

The embodiment of the invention provides a data transmission method, a data transmission system and electronic equipment, and relates to the technical field of communication. The method comprises the following steps: the penetration device receives database connection information transmitted by the external network server and establishes connection with a database; the penetration device initializes the storage process to the database; the method comprises the steps that a penetrating device receives a service request sent by an external network server and sends the service request to a database through a strong isolation device, the database calls a storage process after receiving the service request, the storage process sends a request message to an internal network server in an http request mode, and when the database does not support an http request, an http request plug-in is installed in the database in advance. According to the invention, the extranet server can use the database to send the http request only by calling the penetration device, so that real-time communication with intranet service is realized, the purpose of unpacking and using is achieved, user experience and stability are improved, the request message is responded in real time, the database pressure is reduced, and the interrupt risk is reduced.

Description

Data transmission method, system and electronic equipment
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission method, a data transmission system, and an electronic device.
Background
At present, in order to ensure the safety of an internal network, a strong isolation device must be used for realizing the communication of the internal network and the external network, and the strong isolation device must rely on a database. A commonly used intranet and extranet communication flow generally includes that an extranet message producer transmits a message to an extranet named namesrv service, an extranet broker service acquires the message from the extranet namesrv service and stores the message in an intranet database, and an intranet broker service acquires the message from intranet data and transmits the message to an intranet message consumer through the intranet namesrv service.
The existing intranet and intranet communication processes utilize message queues, the browser service polls to acquire data in an intranet database, the pressure on the database is increased, the real-time performance can only be close to real time, but not real time, the data flow in a plurality of assemblies, once one link has a problem, the whole process is interrupted, and the problem troubleshooting difficulty is increased.
Disclosure of Invention
The invention provides a data transmission method, a data transmission system and electronic equipment, and solves the problems that in the prior art, an internal network and an external network cannot communicate in real time, the pressure of a database is high, and the communication is easy to interrupt.
In a first aspect of the present invention, a data transmission method is provided, including:
the penetration device receives database connection information transmitted by the external network server and establishes connection with the database;
after the penetrating device is connected with the database, initializing a storage process to the database, and enabling the storage process of the database to process a service request in a hypertext transfer protocol (http) request mode;
the method comprises the steps that a penetrating device receives a service request sent by an external network server, the service request is sent to a database through a strong isolation device, the database calls a storage process after receiving the service request, the storage process sends a request message of the service request to an internal network server through an http request mode, and when the database does not support the http request mode, an http request plug-in is installed in the database in advance.
Preferably, the method further comprises:
and the penetrating device receives the service data returned by the database and returns the service data to the extranet server, wherein the service data is sent to the penetrating device through the strong isolation device after the database receives the service data returned by the intranet server.
Preferably, the step of the penetration device receiving the service data returned by the database and returning the service data to the extranet server includes:
and the penetration device splices the parameters of the service data by using a preset symbol and then sends the spliced parameters to the external network server.
Preferably, after the penetrating device is connected to the database, the step of initializing a storage process to the database includes:
and the penetration device sends a preset stored process script to the database, detects whether the database is preloaded with the stored process, and enables the database to read and execute the stored process script if the stored process script is not preloaded.
Preferably, the step of receiving, by the pass through device, a service request sent by an external network server, and sending the service request to the database through a strong isolation device includes:
and after receiving the service request sent by the external network server, the penetration device encapsulates the service request and sends the encapsulated service request to the database through the strong isolation device.
Preferably, after receiving the service request, the database invokes the storage process, and after the storage process sends a request message of the service request to the intranet server in an http request manner, the method further includes:
and the database monitors whether the http request process is abnormal or not, and feeds back a monitoring result to the extranet server through the penetrating device.
Preferably, the step of monitoring whether an exception exists in the http request process by the database includes:
the database monitors whether the intranet server returns service data within preset time, and if not, the abnormal http request process is determined; and/or
And the database monitors whether an error script exists in the http request process, and if so, the abnormal condition exists in the http request process.
Preferably, the database is an Oracle database or a Mysql database.
In a second aspect of the present invention, there is also provided a data transmission system, including:
the system comprises a penetrating device, a database, a strong isolation device and a storage device, wherein the penetrating device is used for receiving database connection information transmitted by an external network server and establishing connection with the database, initializing a storage process to the database after the penetrating device establishes connection with the database, so that the storage process of the database processes a service request in a hypertext transfer protocol (http) request mode, and the penetrating device is also used for receiving the service request transmitted by the external network server and transmitting the service request to the database through the strong isolation device;
and the database is used for calling the storage process after receiving the service request, the storage process sends a request message of the service request to the intranet server in an http request mode, and when the database does not support the http request mode, an http request plug-in is pre-installed in the database.
In a third aspect of the present invention, there is also provided an electronic device, including: a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a communication bus;
a memory for storing a computer program;
a processor for implementing the steps of the data transmission method as described in any one of the above when executing the program stored in the memory.
In a fourth aspect implemented by the present invention, there is also provided a computer-readable storage medium on which a computer program is stored, characterized in that the program, when executed by a processor, implements the data transmission method as described in any one of the above.
Aiming at the prior art, the invention has the following advantages:
in the embodiment of the invention, a penetration device receives database connection information transmitted by an external network server and establishes connection with a database; after the penetrating device is connected with the database, initializing a storage process to the database, and processing a service request in an http request mode in the storage process of the database; the method comprises the steps that a penetrating device receives a service request sent by an external network server, the service request is sent to a database through a strong isolation device, the database calls a storage process after receiving the service request, the storage process sends a request message to an internal network server through an http request mode, and when the database does not support the http request mode, an http request plug-in is installed in the database in advance. Therefore, the extranet server can use the database to send the http request only by calling the penetrating device, real-time communication with intranet service is achieved, compiling and logic in a storage process are not needed to be concerned, the purpose of unpacking and using is achieved, user experience and stability are improved, the database is endowed with the capacity of sending the http request when the database does not support the http request, an extranet producer sends the http request to an intranet consumer in real time, real-time response is achieved for request messages, database pressure is relieved, nodes passing through data transmission are reduced, and risk of communication interruption is reduced.
The above description is only an overview of the technical solutions of the present invention, and the present invention can be implemented in accordance with the content of the description so as to make the technical means of the present invention more clearly understood, and the above and other objects, features, and advantages of the present invention will be more clearly understood.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly described below.
Fig. 1 is a schematic flow chart of a data transmission method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of data flow in the data transmission method according to the embodiment of the present invention;
fig. 3 is a schematic diagram of another data flow in the data transmission method according to the embodiment of the present invention;
fig. 4 is a schematic block diagram of a data transmission system according to an embodiment of the present invention;
fig. 5 is a schematic block diagram of an electronic device provided in an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
Fig. 1 is a schematic flow chart of a data transmission method according to an embodiment of the present invention, and referring to fig. 1, the data transmission method includes:
step 101: the penetration device receives the database connection information transmitted by the external network server and establishes connection with the database.
Here, the pass through device reads the database connection information transmitted by the extranet service and establishes a connection with the database.
The penetrating device can adopt jdbc to establish database connection (Mybatis also can be used), initialize a connection pool, configure a user name and a password, configure a drive, and set connection timeout time and other information.
Step 102: after the penetrating device is connected with the database, a storage process is initialized to the database, so that a service request is processed in a hypertext transfer protocol (http) request mode in the storage process of the database.
The penetrating device initializes a storage process to the database, so that the database storage process processes service requests in an http request mode, the extranet server can use the database to send http requests only by calling the penetrating device, real-time communication with intranet services is achieved, compiling and logic of the storage process are not concerned, the purpose of unpacking and using is achieved, and user experience and stability are improved.
The initializing the storage process may include, for example, but is not limited to, setting a script path, setting a processing manner of an error statement, setting a processing method of only a predetermined format file (e.g., a file ending with sql), and the like.
Preferably, the step 102 includes:
and the penetration device sends a preset stored process script to the database, detects whether the database is preloaded with the stored process, and enables the database to read and execute the stored process script if the stored process script is not preloaded.
At the moment, a preset storage process script is arranged in the penetration device, whether the database is preloaded with the storage process used by data penetration is detected, if the database is not loaded, the storage process script is read and executed, a user does not need to care about writing and logic of the storage process, and the penetration device can be used after unpacking.
Step 103: the method comprises the steps that a penetrating device receives a service request sent by an external network server, the service request is sent to a database through a strong isolation device, the database calls a storage process after receiving the service request, the storage process sends a request message of the service request to an internal network server through an http request mode, and when the database does not support the http request mode, an http request plug-in is installed in the database in advance.
The penetration device receives a service request of the extranet server, the service request is sent to the database through the strong isolation device, the database calls a storage process, and an http request is sent to the intranet server, so that real-time communication between the extranet and the intranet is realized, the pressure of the database is reduced, nodes through which data are transmitted are reduced, and the risk of communication interruption is reduced.
When the database has the capacity of http request, the penetration device directly writes a storage process, and the storage process is referred to as a request target address requrl and a request message reqbody; the output parameters are a return message respenv and a return status code status. The storage process is specifically realized as follows:
firstly, printing a request message according to a service request so as to conveniently troubleshoot problems; then, setting a target address of the request according to the service request, and keeping the connection state with the target address; setting parameters such as http request codes, character sets, message lengths and the like; then sending an http request; and when receiving the service data returned by the intranet service, assigning the http return data to give a reference: resenv and statuscode.
When the database does not have the http request capacity, an http request plug-in is installed firstly, the http request capacity is given to the database, a corresponding http request method is created, and then the device is penetrated and the storage process is written.
According to the data transmission method, the outer net server can use the database to send the http request only by calling the penetrating device, real-time communication with the inner net service is achieved, compiling and logic of a storage process are not concerned, the purpose of unpacking and using is achieved, user experience and stability are improved, the database is endowed with the capacity of sending the http request when the database does not support the http request, an outer net producer can send the http request to an inner net consumer in real time, real-time response is achieved on request messages, pressure of the database is relieved, nodes passing through data transmission are reduced, and risk of communication interruption is reduced.
Preferably, the method further comprises:
step 104: and the penetrating device receives the service data returned by the database and returns the service data to the extranet server, wherein the service data is sent to the penetrating device through the strong isolation device after the database receives the service data returned by the intranet server.
The database receives the service data returned by the intranet server, returns the service data to the penetrating device, and then the penetrating device feeds the service data back to the extranet server, so that an extranet producer can send an http request to an intranet consumer in real time and return the request, a message closed loop is achieved, and the problem that intranet and extranet communication cannot be exceeded is solved.
Preferably, in step 103, the step of receiving, by the penetration device, the service request sent by the extranet server, and sending the service request to the database through the strong isolation device includes:
step 1031: and after receiving the service request sent by the external network server, the penetration device encapsulates the service request and sends the encapsulated service request to the database through the strong isolation device.
At this moment, after receiving the service request of the extranet service, the penetration device firstly encapsulates the service request data and then sends the encapsulated service request to the database, so that the object transmission can be supported through the encapsulation effect of the penetration device, and the user experience and the stability are improved.
As shown in fig. 2, the data flow of the embodiment of the present invention is: the external network server assembles the service request to the penetration device; the penetration device encapsulates the service request and sends the encapsulated service request to the database through the strong isolation device; the database sends an http request to the intranet server according to the service request; the intranet server returns the service data requested by the http to the database; the database returns a message to the penetration device through the strong isolation device; and finally, the penetration device returns a message to the external network server, compared with the prior art, the data flow direction passing nodes are reduced, the interrupt risk is reduced, and the message closed loop is achieved.
Preferably, the database is an Oracle database or a Mysql database.
The embodiment of the invention simultaneously supports two databases of Oracle and Mysql, and the method applicable to the embodiment of the invention can be compatible with other databases, which is not limited herein.
Taking an Oracle database as an example, the database has the capacity of http request, the penetration device directly writes a storage process, the storage process of the database sends the service request of the external network to the intranet server in an http request mode, and the storage process is referred to as a request target address requrl and a request message reqbody; the output parameters are a return message respnv and a return status code status, and are specifically realized as follows:
firstly, printing a request message according to a service request so as to conveniently troubleshoot problems; then, setting a request target address according to the service request, and keeping a connection state with the request target address; setting http request codes, character sets and message lengths; then sending an http request; and assigning the service data returned by the http to give a reference: resenv and statuscode.
For the Mysql database, because the Mysql database does not have the http request capability, an http request plug-in, specifically a Mysql-udf-http plug-in, is installed first, the http request capability is given to the Mysql database, a corresponding http request method is created, and the storage process is written by the penetrating device.
Preferably, in step 104, the step of the penetration device receiving the service data returned by the database and returning the service data to the extranet server includes:
and the penetration device splices the parameters of the service data by using a preset symbol and then sends the spliced parameters to the external network server.
The predetermined symbol may be "&" or the like, but is not limited thereto.
At the moment, parameters of the service data are spliced by using a preset symbol through the penetration device and then sent to the external network server, so that the problem that the http request message format sent by the Mysql database is incompatible with the external network service can be solved.
For example, since the http request sent by Mysql database does not support json format messages, the parameters may be spliced with "&" as follows: userId =1&username =2&userphone =3, transitioning to javaBean back to the foreign network service invoker.
Preferably, after the database in step 103 receives the service request, the storage process is called, and after the storage process sends the request packet of the service request to the intranet server in an http request manner, the method further includes:
step 105: and the database monitors whether the http request process is abnormal or not, and feeds back a monitoring result to the extranet server through the penetrating device.
At this time, in the http request process, the embodiment of the present invention can also capture the exception and feed back the exception result to the extranet server, thereby improving the user experience.
Preferably, the step of monitoring whether an exception exists in the http request process by the database includes:
the database monitors whether the intranet server returns service data within preset time, and if not, the http request process is determined to be abnormal; and/or
And the database monitors whether an error script exists in the http request process, and if so, the abnormal condition exists in the http request process.
At the moment, when the intranet server does not feed back results for a long time or error scripts occur, abnormal conditions can be timely found and timely solved.
An example of the present invention is described below.
Taking an Enterprise Resource Planning (ERP) system coding interface of a query provider as an example, when an Enterprise upgrades a national network provider, a platform needs to remove an ERP system of each province to query ERP system coding information of the provider, and the requirement of the business on real-time performance is high, and the business needs to be returned in real time.
As shown in fig. 3, with the method according to the embodiment of the present invention, first, when a user clicks and upgrades a national network provider through a client, an extranet server generates a service request for querying ERP system coding information of the provider, and assembles the service request to a penetrating device; the penetration device encapsulates the service request and sends the service request to the database through the strong isolation device; the database calls a storage process according to the service request and sends an http request to the intranet server; when the database has the http request capability, the penetration device directly writes a storage process, so that the storage process of the database processes a service request in an http request mode, and when the database does not have the http request capability, an http request plug-in is installed in the database, and the penetration device writes the storage process; the intranet server receives the http request and calls ERP service through the web service webservice; the ERP server responds data to the intranet server in real time; the intranet server sends the returned service data to the database, and the database returns a message to the penetration device through the strong isolation device; the penetration device returns information to the external network server, realizes page response of the client through the external network server, and displays returned service data, thereby realizing real-time response to the request information.
According to the data transmission method, the outer net server can use the database to send the http request only by calling the penetrating device, real-time communication with the inner net service is achieved, compiling and logic of a storage process are not concerned, the purpose of unpacking and using is achieved, user experience and stability are improved, the database is endowed with the capacity of sending the http request when the database does not support the http request, an outer net producer can send the http request to an inner net consumer in real time, real-time response is achieved on request messages, pressure of the database is relieved, nodes passing through data transmission are reduced, and risk of communication interruption is reduced.
As shown in fig. 4, an embodiment of the present invention further provides a data transmission system 400, including:
the system comprises a penetrating device 401, a server and a server, wherein the penetrating device is used for receiving database connection information transmitted by an external network server and establishing connection with a database, initializing a storage process to the database after establishing connection with the database, enabling the storage process of the database to process a service request in a hypertext transfer protocol http request mode, receiving the service request transmitted by the external network server and transmitting the service request to the database through a strong isolation device;
and the database 402 is used for calling the storage process after receiving the service request, the storage process sends a request message of the service request to an intranet server in an http request mode, and when the database does not support the http request mode, an http request plug-in is pre-installed in the database.
According to the data transmission system provided by the embodiment of the invention, the extranet server can use the database to send the http request only by calling the penetration device, so that real-time communication with intranet service is realized, the compiling and logic of a storage process are not required to be concerned, the purpose of unpacking and using is achieved, the user experience and the stability are improved, the database is endowed with the capability of sending the http request when the database does not support the http request, an extranet producer can send the http request to an intranet consumer in real time, the real-time response is realized on a request message, the pressure of the database is reduced, nodes passing through data transmission are reduced, and the risk of communication interruption is reduced.
Preferably, the penetration means 401 is also adapted to:
and receiving the service data returned by the database, and returning the service data to the extranet server, wherein the service data is sent to the penetration device by a strong isolation device after the database receives the service data returned by the intranet server.
Preferably, said perforating device 401 is used in particular for:
and splicing the parameters of the service data by using a preset symbol, and then sending the parameters to the external network server.
Preferably, the penetration means 401 are particularly adapted to:
and sending a preset stored process script to the database, detecting whether the database is preloaded with the stored process, and if not, enabling the database to read the stored process script and execute the stored process script.
Preferably, said perforating device 401 is used in particular for:
and after receiving a service request sent by an external network server, packaging the service request, and sending the packaged service request to the database through a strong isolation device.
Preferably, the database 402 is further configured to:
and monitoring whether an http request process is abnormal or not, and feeding back a monitoring result to the extranet server through the penetration device.
Preferably, the database 402 is specifically configured to:
monitoring whether the intranet server returns service data within preset time, and if not, determining that an http request process is abnormal; and/or
And monitoring whether an error script exists in the http request process, and if so, determining that an exception exists in the http request process.
Preferably, the database is an Oracle database or a Mysql database.
According to the data transmission system provided by the embodiment of the invention, the extranet server can use the database to send the http request only by calling the penetration device, so that real-time communication with intranet service is realized, the compiling and logic of a storage process are not required to be concerned, the purpose of unpacking and using is achieved, the user experience and the stability are improved, the database is endowed with the capability of sending the http request when the database does not support the http request, an extranet producer can send the http request to an intranet consumer in real time, the real-time response is realized on a request message, the pressure of the database is reduced, nodes passing through data transmission are reduced, and the risk of communication interruption is reduced.
For the above system embodiment, since it is basically similar to the method embodiment, reference may be made to the partial description of the method embodiment for relevant points.
The embodiment of the invention also provides the electronic equipment which can be a server. As shown in fig. 5, the system comprises a processor 501, a communication interface 502, a memory 503 and a communication bus 504, wherein the processor 501, the communication interface 502 and the memory 503 are communicated with each other through the communication bus 504.
The memory 503 stores a computer program.
When the processor 501 is configured to execute the program stored in the memory 503, the following steps are implemented:
the penetration device receives database connection information transmitted by the external network server and establishes connection with the database;
after the penetrating device is connected with the database, initializing a storage process to the database, and enabling the storage process of the database to process a service request in a hypertext transfer protocol (http) request mode;
the method comprises the steps that a penetrating device receives a service request sent by an external network server, the service request is sent to a database through a strong isolation device, the database calls a storage process after receiving the service request, the storage process sends a request message of the service request to an internal network server through an http request mode, and when the database does not support the http request mode, an http request plug-in is installed in the database in advance.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this is not intended to represent only one bus or type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
In yet another embodiment provided by the present invention, a computer-readable storage medium is further provided, which stores instructions that, when executed on a computer, cause the computer to execute the data transmission method described in the above embodiment.
In yet another embodiment provided by the present invention, a computer program product containing instructions is also provided, which when run on a computer causes the computer to execute the data transmission method described in the above embodiment.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to be performed in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (9)

1. A method of data transmission, comprising:
the penetration device receives database connection information transmitted by the external network server and establishes connection with a database;
after the penetrating device is connected with the database, initializing a storage process to the database, and enabling the storage process of the database to process a service request in a hypertext transfer protocol (http) request mode;
the method comprises the steps that a penetrating device receives a service request sent by an extranet server, the service request is sent to a database through a strong isolation device, the database calls a storage process after receiving the service request, the storage process sends a request message of the service request to an intranet server through an http request mode, and when the database does not support the http request mode, an http request plug-in is installed in the database in advance;
wherein initializing a storage process to the database after the penetrating device establishes a connection with the database comprises:
and the penetration device sends a preset stored process script to the database, detects whether the database is preloaded with the stored process, and enables the database to read and execute the stored process script if the database is not preloaded.
2. The data transmission method of claim 1, further comprising:
and the penetrating device receives the service data returned by the database and returns the service data to the extranet server, wherein the service data is sent to the penetrating device through a strong isolation device after the database receives the service data returned by the intranet server.
3. The data transmission method according to claim 2, wherein the step of the penetration device receiving the service data returned from the database and returning the service data to the extranet server comprises:
and the penetration device splices the parameters of the service data by using a preset symbol and then sends the spliced parameters to the external network server.
4. The data transmission method according to claim 1, wherein the step of the penetration device receiving a service request sent by an extranet server and sending the service request to the database through a strong isolation device comprises:
and after receiving the service request sent by the external network server, the penetration device encapsulates the service request and sends the encapsulated service request to the database through the strong isolation device.
5. The data transmission method according to claim 1, wherein the database calls the storage process after receiving the service request, and after the storage process sends a request message of the service request to the intranet server in an http request manner, the method further comprises:
and the database monitors whether the http request process is abnormal or not, and feeds back a monitoring result to the extranet server through the penetrating device.
6. The data transmission method according to claim 5, wherein the step of the database monitoring whether the http request process has an exception comprises:
the database monitors whether the intranet server returns service data within preset time, and if not, the http request process is determined to be abnormal; and/or
And the database monitors whether an error script exists in the http request process, and if so, the abnormal condition exists in the http request process.
7. The data transmission method according to any one of claims 1 to 6, wherein the database is an Oracle database or a Mysql database.
8. A data transmission system, comprising:
the system comprises a penetrating device, a database, a strong isolation device and a storage device, wherein the penetrating device is used for receiving database connection information transmitted by an external network server and establishing connection with the database, initializing a storage process to the database after the penetrating device establishes connection with the database, so that the storage process of the database processes a service request in a hypertext transfer protocol (http) request mode, and the penetrating device is also used for receiving the service request transmitted by the external network server and transmitting the service request to the database through the strong isolation device;
the system comprises a database and an intranet server, wherein the database is used for calling a storage process after receiving a service request, the storage process sends a request message of the service request to the intranet server in an http request mode, and when the database does not support the http request mode, an http request plug-in is pre-installed in the database;
wherein initializing a storage process to the database after the penetrating device establishes a connection with the database comprises:
and the penetration device sends a preset stored process script to the database, detects whether the database is preloaded with the stored process, and enables the database to read and execute the stored process script if the stored process script is not preloaded.
9. An electronic device, comprising: a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a communication bus;
a memory for storing a computer program;
a processor for implementing the steps of the data transmission method according to any one of claims 1 to 7 when executing the program stored in the memory.
CN202011436331.1A 2020-12-07 2020-12-07 Data transmission method, system and electronic equipment Active CN112565277B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011436331.1A CN112565277B (en) 2020-12-07 2020-12-07 Data transmission method, system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011436331.1A CN112565277B (en) 2020-12-07 2020-12-07 Data transmission method, system and electronic equipment

Publications (2)

Publication Number Publication Date
CN112565277A CN112565277A (en) 2021-03-26
CN112565277B true CN112565277B (en) 2023-04-07

Family

ID=75060309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011436331.1A Active CN112565277B (en) 2020-12-07 2020-12-07 Data transmission method, system and electronic equipment

Country Status (1)

Country Link
CN (1) CN112565277B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079156A (en) * 2021-03-31 2021-07-06 国网浙江省电力有限公司信息通信分公司 Intranet and extranet information interaction system
CN113242244B (en) * 2021-05-12 2022-11-15 北京百度网讯科技有限公司 Data transmission method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587135A (en) * 2018-12-04 2019-04-05 国网辽宁省电力有限公司大连供电公司 Service interaction plateform system based on tertiary-structure network
CN110636096A (en) * 2018-06-25 2019-12-31 中国科学院沈阳自动化研究所 Power internal and external network information interaction interface service system based on database storage process
CN111786956A (en) * 2020-06-05 2020-10-16 四川省东宇信息技术有限责任公司 System and method for safely accessing intranet network based on message middleware communication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10038682B2 (en) * 2015-10-12 2018-07-31 American Express Travel Related Services Company, Inc. System and method for communicating between distributed applications and databases

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636096A (en) * 2018-06-25 2019-12-31 中国科学院沈阳自动化研究所 Power internal and external network information interaction interface service system based on database storage process
CN109587135A (en) * 2018-12-04 2019-04-05 国网辽宁省电力有限公司大连供电公司 Service interaction plateform system based on tertiary-structure network
CN111786956A (en) * 2020-06-05 2020-10-16 四川省东宇信息技术有限责任公司 System and method for safely accessing intranet network based on message middleware communication

Also Published As

Publication number Publication date
CN112565277A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
US11025512B2 (en) Automated service-oriented performance management
CN108270855B (en) Method for accessing Internet of things platform to equipment
US10963370B2 (en) Default mock implementations at a server
CN112565277B (en) Data transmission method, system and electronic equipment
CN109635019B (en) Request processing method, device, equipment and storage medium
CN107181779B (en) Method, device and system for processing access request
CN108134708B (en) Method and device for monitoring third-party interface
WO2022016847A1 (en) Automatic test method and device applied to cloud platform
CN113612686A (en) Traffic scheduling method and device and electronic equipment
CN112463729A (en) Data file storage method and device, electronic equipment and medium
CN113360301A (en) Message transmission system and method
CN107040613B (en) Message transmission method and system
CN111930531A (en) Data processing method, data production method, data consumption method, data production device, data consumption device and data consumption medium
CN106571975B (en) Fault tolerance method and device for communication data
CN112015383A (en) Login method and device
CN110881224A (en) Network long connection method, device, equipment and storage medium
CN112187869A (en) Remote debugging system and method of IOT device, electronic device and storage medium
CN106713014B (en) Monitored host in monitoring system, monitoring system and monitoring method
CN113726855B (en) Service aggregation method, device, electronic equipment and computer-readable storage medium
CN115037653A (en) Service flow monitoring method and device, electronic equipment and storage medium
CN114675989A (en) Data verification method and device, electronic equipment and storage medium
EP3502925B1 (en) Computer system and method for extracting dynamic content from websites
CN115913912A (en) Message interception and service link diagram generation method and device
CN113590354A (en) Block chain-based information push method, apparatus, device, medium, and program product
CN110716841A (en) Monitoring data collection method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant