CN113364818A - Data processing method and device and electronic equipment - Google Patents

Data processing method and device and electronic equipment Download PDF

Info

Publication number
CN113364818A
CN113364818A CN202010140967.5A CN202010140967A CN113364818A CN 113364818 A CN113364818 A CN 113364818A CN 202010140967 A CN202010140967 A CN 202010140967A CN 113364818 A CN113364818 A CN 113364818A
Authority
CN
China
Prior art keywords
identification information
target
request
client
proxy server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010140967.5A
Other languages
Chinese (zh)
Other versions
CN113364818B (en
Inventor
陈飞
李毅
周天凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sogou Technology Development Co Ltd
Original Assignee
Beijing Sogou Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sogou Technology Development Co Ltd filed Critical Beijing Sogou Technology Development Co Ltd
Priority to CN202010140967.5A priority Critical patent/CN113364818B/en
Publication of CN113364818A publication Critical patent/CN113364818A/en
Application granted granted Critical
Publication of CN113364818B publication Critical patent/CN113364818B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/288Distributed intermediate devices, i.e. intermediate devices for interaction with other intermediate devices on the same level

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the application provides a data processing method, a data processing device and electronic equipment, wherein the method comprises the following steps: a request forwarding system receives an identification information acquisition request sent by a client before accessing a target site; selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client; receiving a plurality of access requests sent by a client, wherein the access requests have relevance and carry target identification information; for each access request received, performing the steps of: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request; returning the response message to the client; thereby ensuring normal interaction between the client using the proxy service and the target site.

Description

Data processing method and device and electronic equipment
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data processing method and apparatus, and an electronic device.
Background
Currently, the client accesses the target server in various ways, one is that the client directly accesses the target server, and the other is that the client accesses the target server through an HTTP (HyperText Transfer Protocol) proxy service. The target server is accessed through the HTTP proxy service, so that the browsing speed can be increased, the attacked direction can be reduced, the network access limitation can be solved, and the like; making access to a target server via an HTTP proxy service popular with many users.
Generally, the HTTP proxy service is divided into two layers: the first layer is a cluster formed by a plurality of proxy servers, and the proxy servers provide HTTP proxy services independently; the second layer is a reverse proxy server, which provides a uniform proxy interface for the client. The client side directly sends the HTTP request to a reverse proxy server, and the reverse proxy server forwards the request to each proxy server node of the proxy cluster according to a forwarding strategy; each proxy server node accesses the target server to obtain corresponding data and returns the data to the reverse proxy server, and the reverse proxy server returns the data returned by the proxy server node to the client.
The forwarding strategy of the reverse proxy server is mainly to distribute the received request to different proxy nodes; therefore, a plurality of requests with relevance initiated in the same session process are likely to be dispersed to different proxy nodes; i.e. for the target site, the requests during the same session come from different IP (Internet Protocol) sources. In a real-world scenario, many target sites often detect the source of a request for safety, anti-cheating, login, and other considerations. If multiple requests of the same session come from different IPs, abnormal fusing of the target site is triggered, so that the client using the proxy service cannot normally interact with the target site.
Disclosure of Invention
The embodiment of the application provides a data processing method, which can avoid triggering abnormal fusing of a target site and ensure normal interaction between a client using proxy service and the target site.
Correspondingly, the embodiment of the application also provides a data processing device and electronic equipment, which are used for ensuring the realization and application of the method.
In order to solve the above problem, an embodiment of the present application discloses a data processing method, which specifically includes: the method is applied to a data processing platform, and the data processing platform comprises: client, request forwarding system, proxy server cluster and server cluster, the method includes: the request forwarding system receives an identification information acquisition request sent by a client, wherein the identification information acquisition request is sent by the client before the client accesses a target site; selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client; receiving a plurality of access requests sent by a client, wherein the access requests have relevance and carry the target identification information and are used for accessing the target site; for each received access request sent by the client, executing the following steps: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request; and returning the response message to the client.
Optionally, after returning the target identification information to the client, the method further includes: when a preset detection period comes, detecting whether an access request carrying target identification information is received in the preset detection period; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
Optionally, the method further comprises: judging whether the request forwarding system has target identification information in the access request or not; if the target identification information in the access request exists in the request forwarding system, executing the step of forwarding the access request to a target proxy server corresponding to the target identification information in the access request; and if the target identification information in the access request does not exist in the request forwarding system, returning a request failure message to the client.
Optionally, the method further comprises: and if the number of the received access requests carrying the target identification information is greater than a threshold value within a preset time period after the target identification information is returned to the client, deleting the target identification information from the request forwarding system.
Optionally, the method further comprises: receiving an identification information release request sent by the client, wherein the identification information release request is sent after the client finishes accessing a target site; deleting the target identification information from within the request forwarding system.
The embodiment of the present application further discloses a data processing apparatus, which is applied to a data processing platform, where the data processing platform includes: the data processing device is deployed in the request forwarding system and comprises: the system comprises an acquisition request receiving module, a processing module and a sending module, wherein the acquisition request receiving module is used for receiving an identification information acquisition request sent by a client, and the identification information acquisition request is sent by the client before the client accesses a target site; the identification distribution module is used for selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client; an access request receiving module, configured to receive multiple access requests sent by a client, where the multiple access requests have relevance and carry the target identification information, and are used to access the target site; the request processing module is used for executing the following steps aiming at each received access request sent by the client: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request; and returning the response message to the client.
Optionally, the apparatus further comprises: the first identifier deleting module is used for detecting whether an access request carrying the target identifier information is received in a preset detection period when the preset detection period comes after the target identifier information is returned to the client; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
Optionally, the apparatus further comprises: the judging module is used for judging whether the target identification information in the access request exists in the request forwarding system or not; the request processing module is configured to, if the target identification information in the access request exists in the request forwarding system, execute the step of forwarding the access request to a target proxy server corresponding to the target identification information in the access request; and the message returning module is used for returning a request failure message to the client if the target identification information in the access request does not exist in the request forwarding system.
Optionally, the apparatus further comprises: and the second identifier deleting module is used for deleting the target identifier information from the request forwarding system if the number of the received access requests carrying the target identifier information is greater than a threshold value in a preset time period after the target identifier information is returned to the client.
Optionally, the apparatus further comprises: a third identifier deleting module, configured to receive an identifier information release request sent by the client, where the identifier information release request is sent after the client finishes accessing the target site; deleting the target identification information from within the request forwarding system.
The embodiment of the application also discloses a readable storage medium, and when the instructions in the storage medium are executed by a processor of the electronic device, the electronic device can execute the data processing method according to any one of the embodiments of the application.
An electronic device is also disclosed in an embodiment of the present application, comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: receiving an identification information acquisition request sent by a client, wherein the identification information acquisition request is sent by the client before accessing a target site; selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client; receiving a plurality of access requests sent by a client, wherein the access requests have relevance and carry the target identification information and are used for accessing the target site; for each received access request sent by the client, executing the following steps: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request; and returning the response message to the client.
Optionally, after returning the target identification information to the client, the method further includes an instruction for: when a preset detection period comes, detecting whether an access request carrying target identification information is received in the preset detection period; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
Optionally, further comprising instructions for: judging whether the request forwarding system has target identification information in the access request or not; if the target identification information in the access request exists in the request forwarding system, executing the step of forwarding the access request to a target proxy server corresponding to the target identification information in the access request; and if the target identification information in the access request does not exist in the request forwarding system, returning a request failure message to the client.
Optionally, further comprising instructions for: and if the number of the received access requests carrying the target identification information is greater than a threshold value within a preset time period after the target identification information is returned to the client, deleting the target identification information from the request forwarding system.
Optionally, further comprising instructions for: receiving an identification information release request sent by the client, wherein the identification information release request is sent after the client finishes accessing a target site; deleting the target identification information from within the request forwarding system.
The embodiment of the application has the following advantages:
in the embodiment of the application, a client sends identification information request information to a request forwarding system before accessing a target site; after receiving an identification information acquisition request sent by a client, a request forwarding system can select a target proxy server from the proxy server cluster, allocate and store corresponding target identification information for the target proxy server, and return the target identification information to the client; after receiving the target identification information, the client can carry the target identification information in each access request and send the target identification information to the request forwarding system when accessing a plurality of associated access requests sent by a target site; when receiving each access request, the request forwarding system can determine a corresponding target proxy server according to target mark information carried by the access request, and forward the target access request to the target proxy server, and then the target proxy server obtains a response message corresponding to the access request from a server of a target site corresponding to the access request and sends the response message to the request forwarding system; the request forwarding system receives a response message returned by the target proxy server aiming at the target access request and returns the response message to the client; and then a plurality of requests with relevance can be distributed to the same proxy server, so that abnormal fusing of a target site triggered by the fact that the requests with relevance are scattered to different proxy servers is avoided, and normal interaction between a client using proxy service and the target site is guaranteed.
Drawings
FIG. 1a is a schematic diagram of a data interaction relationship of a data processing platform according to an embodiment of the present application;
FIG. 1b is a flow chart of the steps of an embodiment of a data processing method of the present application;
FIG. 2 is a flow chart of the steps of an alternative embodiment of a data processing method of the present application;
FIG. 3 is a block diagram of an embodiment of a data processing apparatus of the present application;
FIG. 4 is a block diagram of an alternate embodiment of a data processing apparatus of the present application;
FIG. 5 illustrates a block diagram of an electronic device for data processing in accordance with an exemplary embodiment;
fig. 6 is a schematic structural diagram of an electronic device for data processing according to another exemplary embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
The data processing method provided by the embodiment of the application is applied to a data processing platform, and the data processing platform may include: the system comprises a client, a request forwarding system, a proxy server cluster and a server cluster; the request forwarding system can execute the data processing method to realize pressure control on each server in the server cluster. Referring to fig. 1a, a schematic diagram of a data interaction relationship of a data processing platform according to an embodiment of the present application is shown.
The proxy server cluster can be composed of N proxy servers, and each proxy server provides HTTP proxy service independently. Each proxy server corresponds to an HTTP proxy address and a port, and occupies a public network egress IP (Internet Protocol) address. N is a positive integer, which may be specifically set as required, and this is not limited in this application.
The request forwarding system corresponds to an access address and a port, and receives a request of a client through the access address and the port. The pressure system is configured with access parameters (such as HTTP proxy addresses, ports, regional information corresponding to public network outlet IP addresses, and the like) of each proxy server in the proxy server cluster, and subsequently forwards the request of the client to the corresponding proxy server through the access parameters of each proxy server.
The server cluster can be composed of M servers, and one or more sites can be deployed on each server; wherein M is a positive integer, which may be specifically set as required, and this is not limited in this application.
Referring to fig. 1b, a flowchart illustrating steps of an embodiment of a data processing method according to the present application is shown, and specifically, the method may include the following steps:
102, the request forwarding system receives an identification information acquisition request sent by a client, where the identification information acquisition request is sent by the client before the client accesses a target site.
In the embodiment of the application, when a user needs to use the proxy service to access the server, the proxy service can be configured in the client in advance. Wherein, the access address and port of the request forwarding system can be configured; of course, other information, such as user requirement information, may also be configured, and this is not limited in this embodiment of the application.
In the embodiment of the application, the client can generate an identification information acquisition request before accessing the target site; and then sending the identification information acquisition request to a request forwarding system through a pre-configured access address and a port of the request forwarding system. Correspondingly, the request forwarding system may receive an identification information obtaining request sent by a client, and then process the identification information obtaining request, which may refer to step 104.
And 104, selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client.
In the embodiment of the application, after the request forwarding system receives the identification information acquisition request of the client, one proxy server can be selected from the proxy server cluster as a target proxy server; and providing proxy service for the access request sent by the client for accessing the target site by adopting the target proxy server in the subsequent process. And the target proxy server may be assigned with a corresponding piece of identification information (which may be referred to as target identification information, hereinafter). In one aspect, an association between the target identification information and the target proxy server may be established, and the established association and the target identification information may be stored in the request forwarding system. On the other hand, the target identification information may be returned to the client. The identification information has global uniqueness and can be used for uniquely identifying one proxy server.
And 106, receiving a plurality of access requests sent by a client, wherein the access requests are used for accessing the target site, have relevance and carry the target identification information.
After a user inputs a domain name or IP of a certain site and executes searching operation, a client sends an access request to the site; and after receiving the webpage file returned by the site, analyzing and rendering. The webpage files comprise CSS (Cascading Style Sheets), JS (JavaScript, which is a lightweight, interpreted or just-in-time compiled programming language with function priority) and the like; in the process of analyzing the CSS and the JS, the client may also need to send an access request to the site to obtain information required for analysis, such as page resources and the like; until the webpage corresponding to the site is opened. Wherein, the multiple access requests sent by the client to the site are related; it can also be said that the multiple access requests belong to the same session. That is, during the process of accessing the target site, the client may send multiple associated access requests to the target site (i.e., the multiple associated access requests access the same target site).
In order to enable the multiple requests with relevance to be distributed to the same proxy server, when a client generates each access request, the client can carry target identification information in each access request; and then sending the access request carrying the target identification information to a request forwarding system, and sending the access request to a target site by the request forwarding system. The client side can simultaneously send a plurality of access requests carrying the target identification information to the request forwarding system, and can also sequentially send a plurality of access requests carrying the target identification information to the request forwarding system; the method can be determined according to actual conditions, and the method is not limited by the embodiment of the application.
Step 108, for each received access request sent by the client, executing the following steps:
the request forwarding system may perform the following steps 108-2 to 108-6 after receiving each access request:
and step 108-2, forwarding the access request to a target proxy server corresponding to the target identification information in the access request.
In the embodiment of the application, after receiving an access request sent by a client, a request forwarding system can analyze the access request to obtain target identification information. Then, searching a target proxy server corresponding to the target identification information according to the established association relation; and then establishing connection with the target proxy server, and forwarding the access request to the target proxy server.
And 108-4, receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is acquired by the target proxy server from a server of a target site corresponding to the access request.
Step 108-6, returning the response message to the client.
After receiving the access request, the target proxy server can also analyze the access request to determine a target site corresponding to the access request; the access request is then forwarded to the server at the target site. After the server of the target site corresponding to the access request receives the access request, a response message corresponding to the access request can be generated; and then returns the response message to the target proxy server. After receiving the response message, the target proxy server may return the response message to the request forwarding system; the request forwarding system then returns the response message to the client.
In summary, in the embodiment of the present application, before accessing a target site, a client sends identification information request information to a request forwarding system; after receiving an identification information acquisition request sent by a client, a request forwarding system can select a target proxy server from the proxy server cluster, allocate and store corresponding target identification information for the target proxy server, and return the target identification information to the client; after receiving the target identification information, the client can carry the target identification information in each access request and send the target identification information to the request forwarding system when accessing a plurality of associated access requests sent by the target site; when receiving each access request, a request forwarding system determines a corresponding target proxy server according to target mark information carried by the access request, forwards the target access request to the target proxy server, and then the target proxy server acquires a response message corresponding to the access request from a server of a target site corresponding to the access request and sends the response message to the request forwarding system; the request forwarding system receives a response message returned by the target proxy server aiming at the target access request and returns the response message to the client; and then a plurality of requests with relevance can be distributed to the same proxy server, so that abnormal fusing of a target site triggered by the fact that the requests with relevance are scattered to different proxy servers is avoided, and normal interaction between a client using proxy service and the target site is guaranteed.
Referring to fig. 2, a flowchart illustrating steps of an alternative embodiment of the data processing method of the present application is shown, which may specifically include the following steps:
step 202, the request forwarding system receives an identification information obtaining request sent by a client, where the identification information obtaining request is sent by the client before the client accesses a target site.
In an example of the embodiment of the present application, the identification information obtaining request may be actively sent by a client. For example, when a user opens a certain webpage in a client, the client first sends an identification information acquisition request to a request forwarding system; after the target identification information is obtained, an access request carrying the target identification information is generated and sent to the request forwarding system, so that corresponding response information is obtained, and the webpage is opened.
In an example of the embodiment of the present application, the identification information obtaining request may be sent by a client triggered by a user actively. For example, before a user opens a certain web page using a client, the user may perform an identification information acquisition operation for instructing the client to acquire identification information; after receiving the identification information acquisition operation of the user, the client may send an identification information acquisition request to the request forwarding system.
Step 204, selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client.
In an embodiment of the present application, a manner of selecting a target proxy server from the proxy server cluster may be: and randomly selecting one proxy server from the available proxy servers of the proxy server cluster as a target proxy server. The available proxy server may refer to a proxy server whose number of established connections is less than its connection limit number.
In this embodiment of the present application, another way to select a target proxy server from the proxy server cluster may be: and selecting one proxy server meeting the user requirement information configured in advance by the client as a target proxy server from the available proxy servers of the proxy server cluster. For example, if the user requirement information is that the network export region of the proxy server is "beijing", the proxy server with the network export region of "beijing" is selected as the target proxy server from the available proxy servers of the proxy server cluster.
In this embodiment of the present application, another way to select a target proxy server from the proxy server cluster may be: and selecting the proxy server with the minimum number of established connections from the available proxy servers of the proxy server cluster as a target proxy server so as to realize load balance of each proxy server.
Of course, other ways of selecting a target proxy server from the proxy server cluster may also be included, which is not limited in the embodiment of the present application.
In one example of the present application, when a target proxy server is determined, corresponding target identification information may be generated for the target proxy server; the target identification information may be generated, for example, in a timestamp + random number (which may be generated by a random function).
In an example of the present application, a plurality of identification information may be generated in advance, and for example, the identification information may be generated by generating a random number using a random function. After the target proxy server is determined, one of the identification information may be selected from a plurality of identification information generated in advance as the target identification information of the target proxy server.
And step 206, receiving a plurality of access requests sent by a client, wherein the access requests are used for accessing the target site, have relevance and carry the target identification information.
Step 208, for each received access request sent by the client, executing the following steps:
and step 208-2, judging whether the target identification information in the access request exists in the request forwarding system.
In practical application, after the client acquires the target identification information, the client may not use the target identification information; that is, when the access request is generated, the target identification information is not carried in the access request. Therefore, in order to avoid the memory occupied by the target identification information stored in the request forwarding system and to avoid the increase of the calculation amount for generating new target identification information by the stored target identification information (because the new target identification information needs to be generated again when the new target identification information is the same as the stored target identification information); after returning the target identification information to the client, a timer may be started.
After timing is started, when a preset detection period comes, whether an access request carrying the target identification information is received or not is detected in the preset detection period; if an access request carrying the target identification information is not received in the preset detection period, judging whether an established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
And if an access request carrying the target identification information is not received in the preset detection period and no established connection using the target identification information exists in the request forwarding system, timing can be stopped, namely, detection is not required to be performed when the next preset detection period comes.
And if an access request carrying the target identification information is not received in the preset detection period, and an established connection using the target identification information exists in the request forwarding system; or, if the access request carrying the target identification information is received in the preset detection period, the next preset detection period can be waited for, and whether the access request carrying the target identification information is received in the next preset detection period is detected. The preset detection period may be set as required, which is not limited in the embodiment of the present application.
In an example of the present application, after receiving each access request, an access time corresponding to the access request may be recorded, and further, when a preset detection period comes according to the access time of each access request, whether an access request carrying target identification information is received within the preset detection period may be detected.
In the embodiment of the application, after the timing is started, on the other hand, it can be judged whether the number of received access requests carrying the target identification information is greater than a threshold value within a preset time period after the target identification information is returned to the client; and if the number of the received access requests carrying the target identification information is larger than a threshold value, deleting the target identification information from the request forwarding system. The preset time period and the threshold value may be set as required, which is not limited in the embodiment of the present application.
The operation may cause target identification information in some access requests not to exist in the request forwarding system; therefore, after each access request is received, whether the target identification information in the access request exists in the request forwarding system can be judged. If the target identification information in the access request exists in the request forwarding system, step 208-4 may be executed; if the target identification information in the access request does not exist in the request forwarding system, step 208-10 may be performed.
And step 208-4, forwarding the access request to a target proxy server corresponding to the target identification information in the access request.
And 208-6, receiving a response message returned by the target proxy server for the access request, wherein the response message is acquired by the target proxy server from a server of a target site corresponding to the access request.
Step 208-8, returning the response message to the client.
In this embodiment of the application, if the target identification information in the access request exists in the request forwarding system, the request forwarding system may establish a connection, such as a TCP (Transmission Control Protocol) connection, between the target proxy servers according to the access address and the port of the target proxy server. The access request is then sent to the target proxy server.
After receiving the access request, the target proxy server can also analyze the access request to determine a target site corresponding to the access request; the access request is then forwarded to the server at the target site. After the server of the target site corresponding to the access request receives the access request, a response message corresponding to the access request can be generated; and then returns the response message to the target proxy server. After receiving the response message, the target proxy server may return the response message to the request forwarding system; the request forwarding system then returns the response message to the client.
And step 208-10, returning a request failure message to the client.
In this embodiment of the present application, if the target identification information in the access request does not exist in the request forwarding system, a request failure message may be returned to the client.
In another embodiment of the present application, the client may send an identification information release request after finishing accessing the target site; the request forwarding system releases the target identification information so as to reduce the memory occupied by the target identification information in the request forwarding system and reduce the calculation amount of the request forwarding system for generating new target identification information. Correspondingly, the request forwarding system may receive an identification information release request sent by the client, where the identification information release request is sent after the client finishes accessing the target site; deleting the target identification information from within the request forwarding system.
In summary, in the embodiment of the present invention, when a preset detection period comes, whether an access request carrying target identification information is received in the preset detection period is detected; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system. And further, the target identification information is prevented from occupying the memory of the request forwarding system, and the stored target identification information is prevented from increasing the calculation amount for generating new target identification information.
Secondly, in the embodiment of the application, the client can send an identification information release request after finishing accessing the target site, and the request forwarding system receives the identification information release request sent by the client; deleting the target identification information from within the request forwarding system; the target identification information is further prevented from occupying the memory of the request forwarding system, and the stored target identification information is prevented from increasing the calculation amount for generating new target identification information.
Thirdly, in the embodiment of the application, if the number of the received access requests carrying the target identification information is greater than a threshold value within a preset time period after the target identification information is returned to the client, deleting the target identification information from the request forwarding system; and further, the target identification information is prevented from occupying the memory of the request forwarding system, and the stored target identification information is prevented from increasing the calculation amount for generating new target identification information.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
The embodiment of the present application further discloses a data processing apparatus, which is applied to a data processing platform, where the data processing platform includes: the data processing device is deployed in the request forwarding system.
Referring to fig. 3, a block diagram of an embodiment of a data processing apparatus according to the present application is shown, where the data processing apparatus may specifically include the following modules:
an obtaining request receiving module 302, configured to receive an identification information obtaining request sent by a client, where the identification information obtaining request is sent by the client before the client accesses a target site;
an identifier allocating module 304, configured to select a target proxy server from the proxy server cluster, allocate and store corresponding target identifier information for the target proxy server, and return the target identifier information to the client;
an access request receiving module 306, configured to receive multiple access requests sent by a client, where the multiple access requests have relevance and carry the target identification information, and are used to access the target site;
a request processing module 308, configured to perform the following steps for each received access request sent by the client: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request; and returning the response message to the client.
Referring to fig. 4, a block diagram of an alternative embodiment of a data processing apparatus of the present application is shown.
In an optional embodiment of the present application, the apparatus further includes:
a first identifier deleting module 310, configured to detect, after the target identifier information is returned to the client, whether an access request carrying the target identifier information is received within a preset detection period when the preset detection period comes; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
In an optional embodiment of the present application, the apparatus further comprises:
a determining module 312, configured to determine whether target identification information in the access request exists in the request forwarding system;
the request processing module 308 is configured to, if the target identifier information in the access request exists in the request forwarding system, execute the step of forwarding the access request to a target proxy server corresponding to the target identifier information in the access request;
a message returning module 314, configured to return a request failure message to the client if the target identification information in the access request does not exist in the request forwarding system.
In an optional embodiment of the present application, the apparatus further comprises:
a second identifier deleting module 316, configured to delete the target identifier information from the request forwarding system if the number of the received access requests carrying the target identifier information is greater than a threshold value within a preset time period after the target identifier information is returned to the client.
In an optional embodiment of the present application, the apparatus further comprises:
a third identifier deleting module 318, configured to receive an identifier information release request sent by the client, where the identifier information release request is sent after the client finishes accessing the target site; deleting the target identification information from within the request forwarding system.
In summary, in the embodiment of the present application, before accessing a target site, a client sends identification information request information to a request forwarding system; after receiving an identification information acquisition request sent by a client, a request forwarding system can select a target proxy server from the proxy server cluster, allocate and store corresponding target identification information for the target proxy server, and return the target identification information to the client; after receiving the target identification information, the client can carry the target identification information in each access request and send the target identification information to the request forwarding system when accessing a plurality of associated access requests sent by a target site; when receiving each access request, the request forwarding system can determine a corresponding target proxy server according to target mark information carried by the access request, and forward the target access request to the target proxy server, and then the target proxy server obtains a response message corresponding to the access request from a server of a target site corresponding to the access request and sends the response message to the request forwarding system; the request forwarding system receives a response message returned by the target proxy server aiming at the target access request and returns the response message to the client; and then a plurality of requests with relevance can be distributed to the same proxy server, so that abnormal fusing of a target site triggered by the fact that the requests with relevance are scattered to different proxy servers is avoided, and normal interaction between a client using proxy service and the target site is guaranteed.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 5 is a block diagram illustrating a structure of an electronic device 500 for data processing according to an example embodiment. For example, the electronic device 500 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 5, electronic device 500 may include one or more of the following components: a processing component 502, a memory 504, a power component 506, a multimedia component 508, an audio component 510, an input/output (I/O) interface 512, a sensor component 514, and a communication component 516.
The processing component 502 generally controls overall operation of the electronic device 500, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing elements 502 may include one or more processors 520 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 502 can include one or more modules that facilitate interaction between the processing component 502 and other components. For example, the processing component 502 can include a multimedia module to facilitate interaction between the multimedia component 508 and the processing component 502.
The memory 504 is configured to store various types of data to support operation at the device 500. Examples of such data include instructions for any application or method operating on the electronic device 500, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 504 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power component 506 provides power to the various components of the electronic device 500. Power components 506 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for electronic device 500.
The multimedia component 508 includes a screen that provides an output interface between the electronic device 500 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 508 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 500 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 510 is configured to output and/or input audio signals. For example, the audio component 510 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 500 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 504 or transmitted via the communication component 516. In some embodiments, audio component 510 further includes a speaker for outputting audio signals.
The I/O interface 512 provides an interface between the processing component 502 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 514 includes one or more sensors for providing various aspects of status assessment for the electronic device 500. For example, the sensor assembly 514 may detect an open/closed state of the device 500, the relative positioning of components, such as a display and keypad of the electronic device 500, the sensor assembly 514 may detect a change in the position of the electronic device 500 or a component of the electronic device 500, the presence or absence of user contact with the electronic device 500, orientation or acceleration/deceleration of the electronic device 500, and a change in the temperature of the electronic device 500. The sensor assembly 514 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 514 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 514 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 516 is configured to facilitate wired or wireless communication between the electronic device 500 and other devices. The electronic device 500 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication section 514 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 514 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 500 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 504 comprising instructions, executable by the processor 520 of the electronic device 500 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform a data processing method, the method comprising: the method is applied to a data processing platform, and the data processing platform comprises: client, request forwarding system, proxy server cluster and server cluster, the method includes: the request forwarding system receives an identification information acquisition request sent by a client, wherein the identification information acquisition request is sent by the client before the client accesses a target site; selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client; receiving a plurality of access requests sent by a client, wherein the access requests have relevance and carry the target identification information and are used for accessing the target site; for each received access request sent by the client, executing the following steps: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request; and returning the response message to the client.
Optionally, after returning the target identification information to the client, the method further includes: when a preset detection period comes, detecting whether an access request carrying target identification information is received in the preset detection period; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
Optionally, the method further comprises: judging whether the request forwarding system has target identification information in the access request or not; if the target identification information in the access request exists in the request forwarding system, executing the step of forwarding the access request to a target proxy server corresponding to the target identification information in the access request; and if the target identification information in the access request does not exist in the request forwarding system, returning a request failure message to the client.
Optionally, the method further comprises: and if the number of the received access requests carrying the target identification information is greater than a threshold value within a preset time period after the target identification information is returned to the client, deleting the target identification information from the request forwarding system.
Optionally, the method further comprises: receiving an identification information release request sent by the client, wherein the identification information release request is sent after the client finishes accessing a target site; deleting the target identification information from within the request forwarding system.
Fig. 6 is a schematic structural diagram of an electronic device 600 for data processing according to another exemplary embodiment of the present application. The electronic device 600 may be a server, which may vary greatly due to configuration or performance, and may include one or more Central Processing Units (CPUs) 622 (e.g., one or more processors) and memory 632, one or more storage media 630 (e.g., one or more mass storage devices) storing applications 642 or data 644. Memory 632 and storage medium 630 may be, among other things, transient or persistent storage. The program stored in the storage medium 630 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 622 may be configured to communicate with the storage medium 630 to execute a series of instruction operations in the storage medium 630 on the server.
The server may also include one or more power supplies 626, one or more wired or wireless network interfaces 650, one or more input-output interfaces 658, one or more keyboards 656, and/or one or more operating systems 641, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
An electronic device comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors the one or more programs including instructions for: receiving an identification information acquisition request sent by a client, wherein the identification information acquisition request is sent by the client before accessing a target site; selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client; receiving a plurality of access requests sent by a client, wherein the access requests have relevance and carry the target identification information and are used for accessing the target site; for each received access request sent by the client, executing the following steps: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request; and returning the response message to the client.
Optionally, after returning the target identification information to the client, the method further includes an instruction for: when a preset detection period comes, detecting whether an access request carrying target identification information is received in the preset detection period; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
Optionally, further comprising instructions for: judging whether the request forwarding system has target identification information in the access request or not; if the target identification information in the access request exists in the request forwarding system, executing the step of forwarding the access request to a target proxy server corresponding to the target identification information in the access request; and if the target identification information in the access request does not exist in the request forwarding system, returning a request failure message to the client.
Optionally, further comprising instructions for: and if the number of the received access requests carrying the target identification information is greater than a threshold value within a preset time period after the target identification information is returned to the client, deleting the target identification information from the request forwarding system.
Optionally, further comprising instructions for: receiving an identification information release request sent by the client, wherein the identification information release request is sent after the client finishes accessing a target site; deleting the target identification information from within the request forwarding system.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The data processing method, the data processing apparatus and the electronic device provided by the present application are introduced in detail, and specific examples are applied herein to illustrate the principles and embodiments of the present application, and the descriptions of the above embodiments are only used to help understand the method and the core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A data processing method is applied to a data processing platform, and the data processing platform comprises: client, request forwarding system, proxy server cluster and server cluster, the method includes:
the request forwarding system receives an identification information acquisition request sent by a client, wherein the identification information acquisition request is sent by the client before the client accesses a target site;
selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client;
receiving a plurality of access requests sent by a client, wherein the access requests have relevance and carry the target identification information and are used for accessing the target site;
for each received access request sent by the client, executing the following steps:
forwarding the access request to a target proxy server corresponding to the target identification information in the access request;
receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request;
and returning the response message to the client.
2. The method of claim 1, wherein after returning the target identification information to the client, the method further comprises:
when a preset detection period comes, detecting whether an access request carrying target identification information is received in the preset detection period;
if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system;
and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
3. The method of claim 2, further comprising:
judging whether the request forwarding system has target identification information in the access request or not;
if the target identification information in the access request exists in the request forwarding system, executing the step of forwarding the access request to a target proxy server corresponding to the target identification information in the access request;
and if the target identification information in the access request does not exist in the request forwarding system, returning a request failure message to the client.
4. The method of claim 1, further comprising:
and if the number of the received access requests carrying the target identification information is greater than a threshold value within a preset time period after the target identification information is returned to the client, deleting the target identification information from the request forwarding system.
5. The method of claim 1, further comprising:
receiving an identification information release request sent by the client, wherein the identification information release request is sent after the client finishes accessing a target site;
deleting the target identification information from within the request forwarding system.
6. A data processing apparatus, for use in a data processing platform, the data processing platform comprising: the data processing device is deployed in the request forwarding system and comprises:
the system comprises an acquisition request receiving module, a processing module and a sending module, wherein the acquisition request receiving module is used for receiving an identification information acquisition request sent by a client, and the identification information acquisition request is sent by the client before the client accesses a target site;
the identification distribution module is used for selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client;
an access request receiving module, configured to receive multiple access requests sent by a client, where the multiple access requests have relevance and carry the target identification information, and are used to access the target site;
the request processing module is used for executing the following steps aiming at each received access request sent by the client: forwarding the access request to a target proxy server corresponding to the target identification information in the access request; receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request; and returning the response message to the client.
7. The apparatus of claim 6, further comprising:
the first identifier deleting module is used for detecting whether an access request carrying the target identifier information is received in a preset detection period when the preset detection period comes after the target identifier information is returned to the client; if the access request is not received in the preset detection period, judging whether the established connection using the target identification information exists in the request forwarding system; and if the established connection using the target identification information does not exist in the request forwarding system, deleting the target identification information from the request forwarding system.
8. The apparatus of claim 7, further comprising:
the judging module is used for judging whether the target identification information in the access request exists in the request forwarding system or not;
the request processing module is configured to, if the target identification information in the access request exists in the request forwarding system, execute the step of forwarding the access request to a target proxy server corresponding to the target identification information in the access request;
and the message returning module is used for returning a request failure message to the client if the target identification information in the access request does not exist in the request forwarding system.
9. An electronic device comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors the one or more programs including instructions for:
receiving an identification information acquisition request sent by a client, wherein the identification information acquisition request is sent by the client before accessing a target site;
selecting a target proxy server from the proxy server cluster, distributing and storing corresponding target identification information for the target proxy server, and returning the target identification information to the client;
receiving a plurality of access requests sent by a client, wherein the access requests have relevance and carry the target identification information and are used for accessing the target site;
for each received access request sent by the client, executing the following steps:
forwarding the access request to a target proxy server corresponding to the target identification information in the access request;
receiving a response message returned by the target proxy server aiming at the access request, wherein the response message is obtained by the target proxy server from a server of a target site corresponding to the access request;
and returning the response message to the client.
10. A readable storage medium, characterized in that instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the data processing method according to any of method claims 1-5.
CN202010140967.5A 2020-03-03 2020-03-03 Data processing method and device and electronic equipment Active CN113364818B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010140967.5A CN113364818B (en) 2020-03-03 2020-03-03 Data processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010140967.5A CN113364818B (en) 2020-03-03 2020-03-03 Data processing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113364818A true CN113364818A (en) 2021-09-07
CN113364818B CN113364818B (en) 2022-08-30

Family

ID=77523183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010140967.5A Active CN113364818B (en) 2020-03-03 2020-03-03 Data processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113364818B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113612861A (en) * 2021-10-08 2021-11-05 深圳鼎信通达股份有限公司 Remote access method, system and computer readable storage medium
CN114189385A (en) * 2021-12-14 2022-03-15 杭州安恒信息技术股份有限公司 Flow distribution method, device, equipment and computer readable storage medium
CN114338769A (en) * 2021-12-22 2022-04-12 浙江中控技术股份有限公司 Access request processing method and device
CN114448857A (en) * 2022-01-29 2022-05-06 北京字节跳动网络技术有限公司 Method, device, storage medium and system for processing Mock service
CN114500653A (en) * 2022-01-27 2022-05-13 阿里巴巴(中国)有限公司 Data access system, method and computing equipment
CN114827233A (en) * 2022-04-27 2022-07-29 平安普惠企业管理有限公司 Interactive connection method and device based on double-living cluster, computer equipment and medium
CN114827274A (en) * 2022-04-15 2022-07-29 支付宝(杭州)信息技术有限公司 Request processing method and device
CN114979262A (en) * 2022-04-25 2022-08-30 阿里云计算有限公司 Access method and system
CN114979099A (en) * 2022-04-14 2022-08-30 天津车之家软件有限公司 Target service access method, module and system
CN115334150A (en) * 2022-08-15 2022-11-11 北京分贝通科技有限公司 Data forwarding method, device, system, electronic equipment and medium
WO2024032094A1 (en) * 2022-08-12 2024-02-15 深圳市星卡软件技术开发有限公司 Instant messaging system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624920A (en) * 2012-03-31 2012-08-01 奇智软件(北京)有限公司 Method and device for performing access through proxy server
CN106921699A (en) * 2015-12-25 2017-07-04 北京奇虎科技有限公司 A kind of Network Access Method, device and system
CN107231402A (en) * 2016-08-31 2017-10-03 北京新媒传信科技有限公司 HTTP request processing method, apparatus and system
US20170295131A1 (en) * 2016-04-12 2017-10-12 Dell Software Inc. Resource identification through dynamic domain name system (dns) labels
CN109327542A (en) * 2018-11-19 2019-02-12 网易(杭州)网络有限公司 Game service access response method, request retransmission method, connection method, device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624920A (en) * 2012-03-31 2012-08-01 奇智软件(北京)有限公司 Method and device for performing access through proxy server
CN105100260A (en) * 2012-03-31 2015-11-25 北京奇虎科技有限公司 Method and device for carrying out access through proxy server
CN106921699A (en) * 2015-12-25 2017-07-04 北京奇虎科技有限公司 A kind of Network Access Method, device and system
US20170295131A1 (en) * 2016-04-12 2017-10-12 Dell Software Inc. Resource identification through dynamic domain name system (dns) labels
CN107231402A (en) * 2016-08-31 2017-10-03 北京新媒传信科技有限公司 HTTP request processing method, apparatus and system
CN109327542A (en) * 2018-11-19 2019-02-12 网易(杭州)网络有限公司 Game service access response method, request retransmission method, connection method, device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113612861B (en) * 2021-10-08 2022-01-11 深圳鼎信通达股份有限公司 Remote access method, system and computer readable storage medium
CN113612861A (en) * 2021-10-08 2021-11-05 深圳鼎信通达股份有限公司 Remote access method, system and computer readable storage medium
CN114189385A (en) * 2021-12-14 2022-03-15 杭州安恒信息技术股份有限公司 Flow distribution method, device, equipment and computer readable storage medium
CN114338769A (en) * 2021-12-22 2022-04-12 浙江中控技术股份有限公司 Access request processing method and device
CN114338769B (en) * 2021-12-22 2024-04-12 浙江中控技术股份有限公司 Access request processing method and device
CN114500653A (en) * 2022-01-27 2022-05-13 阿里巴巴(中国)有限公司 Data access system, method and computing equipment
CN114448857A (en) * 2022-01-29 2022-05-06 北京字节跳动网络技术有限公司 Method, device, storage medium and system for processing Mock service
CN114979099B (en) * 2022-04-14 2024-02-23 天津车之家软件有限公司 Target service access method, module and system
CN114979099A (en) * 2022-04-14 2022-08-30 天津车之家软件有限公司 Target service access method, module and system
CN114827274A (en) * 2022-04-15 2022-07-29 支付宝(杭州)信息技术有限公司 Request processing method and device
CN114979262A (en) * 2022-04-25 2022-08-30 阿里云计算有限公司 Access method and system
CN114979262B (en) * 2022-04-25 2024-04-19 阿里云计算有限公司 Access method and system
CN114827233B (en) * 2022-04-27 2023-11-24 光禹莱特数字科技(上海)有限公司 Interactive connection method and device based on dual-activity cluster, computer equipment and medium
CN114827233A (en) * 2022-04-27 2022-07-29 平安普惠企业管理有限公司 Interactive connection method and device based on double-living cluster, computer equipment and medium
WO2024032094A1 (en) * 2022-08-12 2024-02-15 深圳市星卡软件技术开发有限公司 Instant messaging system and method
CN115334150B (en) * 2022-08-15 2024-01-19 北京分贝通科技有限公司 Data forwarding method, device, system, electronic equipment and medium
CN115334150A (en) * 2022-08-15 2022-11-11 北京分贝通科技有限公司 Data forwarding method, device, system, electronic equipment and medium

Also Published As

Publication number Publication date
CN113364818B (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN113364818B (en) Data processing method and device and electronic equipment
RU2605610C2 (en) Method and device for connection with the network
JP6101861B2 (en) Group creation method, group withdrawal method, apparatus, program, and recording medium
JP6228676B2 (en) Connection state prompting method and apparatus
CN105912693B (en) Network request processing method, network data acquisition method, network request processing device and network data acquisition device, and server
RU2642841C2 (en) Method and device of network connection
US20180034772A1 (en) Method and apparatus for bluetooth-based identity recognition
CN108833585B (en) Information interaction method and device and storage medium
WO2014194798A1 (en) Application sharing method and apparatus
WO2019000376A1 (en) Method and device for achieving network edge calculation
CN108390944B (en) Information interaction method and device
CN107094094B (en) Application networking method and device and terminal
CN108600529B (en) Information interaction method and device and computer readable storage medium
RU2658191C2 (en) Website hijack detection method and device
CN109525652B (en) Information sharing method, device, equipment and storage medium
WO2019218366A1 (en) Preamble and scheduling request transmitting method and device
RU2632396C2 (en) Method and device to control router plug-in module
CN108737588B (en) Domain name resolution method and device
CN110928425A (en) Information monitoring method and device
CN111526129B (en) Information reporting method and device
CN106211160B (en) Network access method and device
CN107070816B (en) Application identification method and device and mobile terminal
US20170316039A1 (en) Information acquisition method, device and system
CN111274590B (en) Request processing method and device, electronic equipment and storage medium
CN113347222B (en) Data processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant