CN115334162A - Safe communication method and system for power service management based on user request - Google Patents

Safe communication method and system for power service management based on user request Download PDF

Info

Publication number
CN115334162A
CN115334162A CN202210886723.0A CN202210886723A CN115334162A CN 115334162 A CN115334162 A CN 115334162A CN 202210886723 A CN202210886723 A CN 202210886723A CN 115334162 A CN115334162 A CN 115334162A
Authority
CN
China
Prior art keywords
request
target
user
communication
service management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210886723.0A
Other languages
Chinese (zh)
Other versions
CN115334162B (en
Inventor
陈焱
蒋丛柏
王俊
高丛珊
贾志
徐成
王潇
陶慧君
郭曦曦
程婧
顾舒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoneng Jiangsu Energy Sales Co ltd
CHN Energy Jiangsu Power Co Ltd
Original Assignee
Guoneng Jiangsu Energy Sales Co ltd
CHN Energy Jiangsu Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoneng Jiangsu Energy Sales Co ltd, CHN Energy Jiangsu Power Co Ltd filed Critical Guoneng Jiangsu Energy Sales Co ltd
Priority to CN202210886723.0A priority Critical patent/CN115334162B/en
Publication of CN115334162A publication Critical patent/CN115334162A/en
Application granted granted Critical
Publication of CN115334162B publication Critical patent/CN115334162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Abstract

A safe communication method and a system for power service management based on user requests are characterized in that the method comprises the following steps: step 1, receiving a user request from an electric power service management system, and judging the target and the type of the user request; step 2, classifying the user requests based on the targets and the types of the user requests, and classifying the user requests into a plurality of same target requests and a plurality of same type requests respectively; step 3, presetting the legitimacy requirement of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legitimacy requirement or not; and 4, if the legitimacy requirement is met, calling corresponding service from the power service management system according to the request, and if the legitimacy requirement is not met, caching or interrupting the user request. The method is simple, quick in response and accurate in fault judgment and expectation, and can greatly improve the safety of the power service management system.

Description

Safe communication method and system for power service management based on user request
Technical Field
The present invention relates to the field of power communication, and in particular, to a secure communication method and system for power service management based on a user request.
Background
At present, the power service management system has been widely applied to various power services. Generally, an electric power Service management system is based on a design concept of an SOA (Service-Oriented Architecture), adopts a Service-Oriented Service building design, adopts a multi-layer technical Architecture, can cover each Service of electric power Service management, has good expansibility and configurability, can adapt to changes of a Service processing flow and processing logic through flexible configuration, and meets the requirements of the existing Service and expansion. The electric power service management system can cover power supply units at various levels such as provinces, cities, counties, power supply stations and the like, is highly centralized in structure, standard in business specification and through in information integration, and can realize transverse integration and information sharing of business through various business processing and management requirements such as management monitoring, business processing, analysis decision and the like, so that various businesses such as unified management of electricity purchasing and selling information, real-time electricity purchasing transaction of users, business cooperative processing and monitoring, electronic payment, self-service, partner management, business report management, market analysis and prediction and the like are realized.
In order to implement multiple services, a server or a server cluster composed of multiple servers in the power service management system is usually deployed with multiple different power services, and the multiple power services implement information interaction with multiple clients distributed at different positions of the cloud through communication interfaces of the servers. However, due to various aspects of networks, devices, and the like of the power service management system, a plurality of power services cannot always be in a state of 100% availability. When a problem occurs in a single service in the system and causes network delay in service invocation, the problem of one service may cause accumulation of tasks at the system level, thereby causing the server to crash and the failure to be propagated to the whole system.
Therefore, a more secure method of secure communication based on power service management requested by a user is needed.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide a secure communication method and system for power service management based on a user request. The invention can classify the user requests from a plurality of clients to a plurality of different target services, and select corresponding legality requirements to analyze the batch of user requests based on the classification result, thereby realizing the safe communication aiming at the user requests.
The invention adopts the following technical scheme.
In a first aspect, the present invention relates to a secure communication method for power service management based on a user request, wherein the method comprises the following steps: step 1, receiving a user request from an electric power service management system, and judging the target and the type of the user request; step 2, classifying the user requests based on the targets and the types of the user requests, and classifying the user requests into a plurality of same target requests and a plurality of same type requests respectively; step 3, presetting the legitimacy requirement of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legitimacy requirement or not; and 4, if the legitimacy requirement is met, calling corresponding service from the power service management system according to the request, and if the legitimacy requirement is not met, caching or interrupting the user request.
Preferably, the same target request is a request from different users for the same target service; the same type of request is a request for the same communication task.
Preferably, a first communication threshold resource is set for the same target request, and when the first communication threshold resource is completely occupied by the same target request, the call of the same target request to the current target service is intercepted; and generating detection on the working state of the current target service, and stopping intercepting the call of the same target request to the current target service when the current target service is detected to be restored to the normal working state.
Preferably, the first communication threshold resource is a call speed threshold value of the current target service.
Preferably, when the interception of the call of the same target request to the current target service is started, timing is carried out, and the interception of part of the same target request is cancelled after a preset time.
Preferably, a second communication threshold resource is set for the same type of request, and when the second communication threshold resource is completely occupied by the same type of request, the execution of the current communication task by the same type of request is interrupted.
Preferably, the second communication threshold resource is the sum of all core threads and temporary threads in the current communication task.
Preferably, a third communication threshold resource is set for the same type of request, and when the same type of request is identified to completely occupy the third communication threshold resource, the call of the same type of request to the current target service is intercepted.
Preferably, the third communication threshold resource is a threshold of a data request concurrency number in the current communication task.
Preferably, caching or interrupting the user request comprises: intercepting the same target request or the same type of request and returning the request; or intercepting the same target request or the same type of request and not returning the request; and caching the same target request or the same type of request into a corresponding thread pool.
The invention relates to a safe communication system for power service management based on user requests, wherein the system comprises a plurality of target services which are arranged in a centralized way and a plurality of users which are arranged in a distributed way, and the plurality of users realize communication with the plurality of target services based on the user requests; the system is used for realizing the safe communication method of the power service management system based on the user request in the first aspect of the invention.
Compared with the prior art, the safe communication method and the safe communication system for power service management based on the user requests have the advantages that the user requests from the plurality of clients to the plurality of different target services are classified, and the corresponding legality requirements are selected based on the classification results to analyze the batch of user requests, so that the safe communication aiming at the user requests is realized. The method is simple, quick in response and accurate in fault judgment and expectation, and can greatly improve the safety of the power service management system.
The beneficial effects of the invention also include:
1. the invention classifies the user request according to the target of the request and the type of the request, and provides a corresponding legitimacy requirement for each different group. By the method, the invention can accurately identify the reasons of the abnormity or the fault of the power service management system and adopt corresponding safety maintenance measures based on the corresponding reasons, thereby minimizing the fault problem of the power service management system and simultaneously maintaining the accurate sending, receiving and analyzing of part of user requests without faults.
2. The invention sets the service calling speed threshold aiming at the user request of the same target service, thereby preventing the system fault problem caused by the target service fault. The method of the invention can not only intercept the user request in time, but also realize the continuous transmission of the user request after the fault recovery based on reasonable design, and the safety performance of the equipment in the recovery process is ensured because the transmission recovery process is gradually transited from partial recovery to full recovery, and the transmission of other types of user requests is not influenced.
3. Based on different communication thresholds, the method and the device realize the simultaneous monitoring of the data concurrency quantity, the communication thread quantity and the service calling speed of the requests of the same type. Therefore, the safety guarantee when the requests of the same type are abnormal is realized by monitoring the number of communication threads and the service calling speed, and the possible abnormality of the requests of the same type is predicted by monitoring the concurrent number of data, so that the possibility of system failure is reduced in advance.
4. The invention provides a plurality of different fault processing methods, and aims at processing partial faults in a mode of intercepting and returning requests; intercepting is adopted for partial faults, requests are not returned, and an autonomous processing mode for problems is provided for a client; in addition, the temporarily intercepted requests can be cached in the thread pool, and although the cache is increased, effective requests can be temporarily stored, and service abnormity cannot be caused due to the occurrence of faults. According to different types of target services or different service requirements and cost, different types of fault handling methods can be flexibly selected, so that the total efficiency is optimal.
Drawings
Fig. 1 is a schematic diagram illustrating a method for arranging a target service in an electric power service management system in a secure communication method for electric power service management based on a user request according to the present invention;
FIG. 2 is a schematic diagram illustrating normal operation of the power service management system in the secure communication method for power service management based on user request according to the present invention;
FIG. 3 is a schematic diagram illustrating an abnormal operation of the power service management system in the secure communication method for power service management based on a user request according to the present invention;
FIG. 4 is a schematic diagram illustrating a failure of the power service management system in the secure communication method for power service management based on a user request according to the present invention;
fig. 5 is a flowchart illustrating steps of a secure communication method for power service management based on a user request according to the present invention.
Detailed Description
The present application is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present application is not limited thereby.
Fig. 1 is a schematic diagram illustrating a method for arranging a target service in an electric power service management system according to a secure communication method for electric power service management based on a user request. As shown in fig. 1, the power service management system of the present invention includes various power target services 1 to n, and in order to reduce development cost, the power services of the present invention can be implemented by using a micro-service architecture. In the architecture, management of various micro services can be realized based on modules such as a built configuration center, a service registration and discovery center and the like. Meanwhile, the availability of the service cluster can be ensured by adopting a common inter-service communication mode, a common service load balancing mode and the like in the prior art.
Specifically, the power service management system can establish a data model of power business, support the aggregation of power utilization data, and realize the cooperative management and control between the power generation and power sale processes in the power utilization process by means of digitalization, intellectualization and cloud computing, so that the fine management level of the power utilization is improved, and the fine management level comprises the auxiliary power quotation decision and the like in the power utilization process.
The functions that can be executed by various power target services provided in the power service management system in the present invention specifically include, but are not limited to: the method comprises the following steps of electric power transaction decision, electric power plan management, electric power benchmarking management, a marketing information base, customer behavior management, transaction management, contract settlement management, electric power transaction auxiliary decision, user electric quantity management, system interface, service integration and the like. Specifically, the user types in the system mainly include three types, namely, a power grid user, a power selling user and an intermediate commercial user. The power grid users can display the internal and external network function modules within the authority range of the power grid users by providing corresponding power grid services, the electricity selling users usually provide the function modules of the internal network part, and the intermediaries provide the function modules of the external network part.
However, in the power service management system constructed in this manner, there is still a certain problem that is unavoidable. Fig. 2 is a schematic diagram illustrating a normal operation of the power service management system in the secure communication method for power service management based on a user request according to the present invention. As shown in fig. 2, a plurality of clients accomplish a communication task between the clients and a target service by sending user requests from the plurality of clients to a plurality of target services 1 to n in the power service management system. When all user requests can be successfully sent and successfully received by a plurality of target services, the user requests do not wait for too long time in the request queue, and the problem of interface blockage caused by repeated generation of unsuccessful user requests is avoided.
Fig. 3 is a schematic diagram illustrating an abnormal operation of the power service management system in the secure communication method for power service management based on a user request according to the present invention. As shown in fig. 3, the solid line part of the figure indicates the case when the user request is successfully sent to the target service, and the dotted line part of the figure indicates the case when the user request is not successfully sent to the target service for various potential reasons. At the moment when the fault is sent, only the current user requests to send the fault. However, over time, if the problem of the fault is not resolved in a timely manner, the problem may block subsequent user requests.
Fig. 4 is a schematic diagram illustrating a failure of the power service management system in the secure communication method for power service management based on a user request according to the present invention. As shown in fig. 4, when the failure problem is not solved, the user request is backed up for multiple times and continuously sent to the target service, and the system thread is occupied by the current request, so that the communication resources between other user requests and other target services are preempted, and a failure occurs therewith.
In particular, when one transmission failure occurs in many dependent services, all subsequent user requests are blocked. With high traffic access, a single backend service error can cause the resources on all servers to become saturated in as little as a few seconds. For example, when a fault request returns to timeout, the number of threads may increase sharply, and if a user request cannot be released in time, network congestion may be caused.
The occurrence of this phenomenon can cause an accidental failure to occur, which results in a system-level cascading failure, with the failure occurring across the entire server or even across a cluster of servers.
In order to prevent the above problems, the present invention provides a secure communication method and system for power service management based on a user request. Fig. 5 is a flowchart illustrating steps of a secure communication method for power service management based on a user request according to the present invention. As shown in fig. 5, a first aspect of the present invention relates to a secure communication method for power service management based on a user request, the method includes steps 1 to 4.
Step 1, receiving a user request from an electric power service management system, and judging the target and the type of the user request.
It can be understood that when different target services in the power service management system are configured on the cluster server, different target services will implement communication connection with clients where different users are located based on the same service interface and logical link. In particular, communication between the client and the target service is activated and a connection is established based on a user request. The connection between a plurality of different clients and the same target service, and the connection between the same client and a plurality of different target services are realized by adopting the user requests with the same structure and the same communication protocol. The application container may configure a unified interface for receiving user requests for a plurality of different target services. The application container will distribute the received user request to the corresponding target service.
For each user request, the invention can extract the target and type of the request from the data structure of the user request. Through the extracted target and type information, the method can classify the user requests in the current target queue and the data in a history period of time.
And 2, classifying the user requests based on the targets and the types of the user requests, and classifying the user requests into a plurality of same target requests and a plurality of same type requests respectively.
After classifying the user requests according to the method in step 1 of the present invention, a plurality of same target requests and a plurality of same type requests can be obtained. As the name implies, multiple requests of the same destination are classified based on the destination of the user request, and multiple requests of the same type are classified based on the type of the user request.
Preferably, the same target request is a request from different users for the same target service; the same type of request is a request for the same communication task.
The target is a sending target requested by a current user, and is a certain target application in the power service management system. And the types can be distinguished according to the nature of the user request. For example, one type when the user request is a login service, and another type when the user request is a download data request.
In the invention, in order to adopt different methods to prevent or overcome system abnormity caused by user requests, a method for classifying the user requests based on different targets and different types is adopted. According to actual needs, other different manners can be adopted to classify the user requests.
And 3, presetting the legality requirement of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legality requirement.
In the invention, the legality requirement of the power service management system can be preset according to actual requirements. The legitimacy requirement may be set for the same target request or the same type of request in general. By the setting method, the overall system fault can be judged for the same target service or the same communication task, the source of the problem of the system fault caused by tracing is facilitated, and the system fault is solved.
The validity requirement in the present invention specifically includes the first communication threshold resource, the second communication threshold resource, and the third communication threshold resource described later. The details thereof will be described later. According to the similar method in the invention, the specific content of the legality requirement can be conveniently increased or adjusted based on the specific requirements, such as the type of the target service, the judgment requirement of the system on the fault, the upgrading maintenance requirement of the system and the like.
And 4, if the validity requirement is met, calling corresponding service from the power service management system according to the request, and if the validity requirement is not met, caching or interrupting the user request.
Specifically, according to various preset legitimacy requirements, whether the user request does not cause a fault can be judged, and if the legitimacy requirements are met, the user requests in the system can be sequentially processed by each target service according to a normal working flow of the system. If the request does not meet the requirement of validity, the subsequent user requests in the same category are divided according to the related cache or interruption of the system.
Preferably, a first communication threshold resource is set for the same target request, and when the first communication threshold resource is completely occupied by the same target request, the call of the same target request to the current target service is intercepted; and generating detection on the working state of the current target service, and stopping intercepting the call of the same target request to the current target service when the current target service is detected to be restored to the normal working state.
It can be understood that, after the user requests are divided according to different targets, all user requests for the same target, that is, all user requests for the same target service from multiple different clients, may be monitored, and when it is found that the user requests exceed the setting of the first communication threshold resource, it is determined that subsequent user requests are intercepted.
Preferably, the first communication threshold resource is a call speed threshold value of the current target service. In the invention, for all user requests to be sent to the same target service, when the target service fails, the calling speed of the user request for calling the target service is very slow or overtime occurs, at the moment, the user requests of the type are blocked greatly, and simultaneously, because a client cannot call the target service, a new user request can be generated to repeatedly request for calling the current target service, so that the calling of other services in a normal state in a user request port is further blocked, the system fails, and the failure range is rapidly expanded from the failure of a single service to the failure of the whole system.
In order to solve the problem, when the calling speed of one target service is identified to exceed a threshold value, the same target request corresponding to the one target service is intercepted. Because the same target request is intercepted, the phenomenon that a large number of user requests waiting for response are queued can not occur, and the subsequent target requests can be directly returned without calling the target service, so that the resources can be quickly released.
Meanwhile, after the interception operation is executed on the same target request, the working state of the target service, for example, the state of whether the target service can quickly respond to the user request is monitored and judged, and when the target service is found to be good, namely, the quick response can be executed on the user request, the previous interception operation can be stopped, so that the calling of the same target request to the current target service is recovered.
It is understood that, when the interception operation or the call recovery operation is performed, in order to better record various failures that have occurred in the target service, the corresponding operation may be logged in the server at the same time. Meanwhile, when the system is possible to have a potential fault due to the fact that the user requests to have an abnormality, an alarm can be set.
In order to realize the interception of the same target request in the invention, a method of a lock-free circular queue technology can be adopted to temporarily store the user request. For example, for the same target request, 10 buckets may be set as a storage container, one Bucket is executed in each second time period, and each Bucket records whether the user request stored in the Bucket succeeds in obtaining a response of the target service, or records different states such as that the target service response fails, that the target service response is overtime, that the target service rejects the user request, and the like. When the target service responds successfully, it is recorded as correct, and when other states occur, it is recorded as an error state.
In one embodiment of the invention, the call speed threshold for the current target service may be set to have an error rate of over 50% and more than 20 user requests occur within 10 seconds. When this occurs, an operation of intercepting the user request is performed.
Preferably, when the interception of the call of the same target request to the current target service is started, timing is carried out, and the interception of part of the same target request is cancelled after a preset time.
In an embodiment of the present invention, after performing the interception, based on a preset time period, for example, 5s or 10s, allowing part of the intercepted user requests to pass, at this time, judging the state of the returned part of the requests again, if the returned states of the part of the requests are all correct, judging that the current target service has recovered to the normal state, at this time, all the intercepts of the current same target request may be cancelled, and the current same target request may be recovered to the state of not being intercepted.
Preferably, a second communication threshold resource is set for the same type of request, and when it is identified that the same type of request completely occupies the second communication threshold resource, the execution of the current communication task by the same type of request is interrupted.
Preferably, the second communication threshold resource is the sum of all the core threads and the temporary threads in the current communication task.
Generally, after dividing user requests according to types, a server will divide the requests of the same type into a certain amount of thread resources. Of this number of thread resources, a core thread and a temporary thread may be included. In order to prevent the thread resources allocated for this type from running out, the second communication threshold resource may be set to be the sum of all core threads and temporary threads.
By the method, a plurality of different requests of the same type can be divided to obtain different thread resources, so that the requests of different types are prevented from being influenced mutually. When one type of request thread resource is exhausted, the subsequent user request of the type can be directly returned without calling the subsequent resource.
The method has the advantage that the method has wide use scenes. For example, when the target services are arranged in a decentralized manner; or when an important single service is deployed in a single server and other services are deployed in additional servers; or when a plurality of target services are deployed in a multi-center mode, the method can be adopted to realize the target services.
In an embodiment of the present invention, an atomic counter may be used to record how many threads are currently in the process of running, and when the maximum number of threads is exceeded, the type of user request is discarded. If not, it is imperative to perform a count operation request, specifically, when a user request is found, the counter is +1, and when the target service returns a user request, the counter is-1. This approach can tightly control the thread and return immediately.
In the invention, the current user request can be stored in a thread pool mode, the task return processing overtime time is set, and the accumulated request is temporarily stored in the queue of the thread pool.
Preferably, a third communication threshold resource is set for the same type of request, and when the same type of request is identified to completely occupy the third communication threshold resource, the call of the same type of request to the current target service is intercepted.
Preferably, the third communication threshold resource is a threshold of a data request concurrency number in the current communication task.
In particular, the present invention can throttle requests of the same type according to the number of concurrencies of data requests in the current communication task. And when the flow requested by the user is higher than the set threshold, directly returning the request and not calling subsequent resources. By limiting the flow requested by the user, the server can be prevented from being failed due to overlarge flow.
Preferably, caching or aborting the user request comprises: intercepting the same target request or the same type of request, and returning the request; or intercepting the same target request or the same type of request and not returning the request; and caching the same target request or the same type of request into a corresponding thread pool.
Specifically, there are three processing methods after a system exception is found. Including interception or caching, and whether to return the request.
Although the caching method in the present invention needs to use the thread pool, although this method in the present invention may cause each communication task to need to be allocated a certain number of threads, thereby causing resource waste, it is advantageous that when there is a sudden traffic in the system, such as a traffic flood, the data can be stored in the thread pool and queued for processing.
The interception mode in the invention can not be applicable to the thread pool, thus saving resources, but also needing to be discarded at the cost of the user request. Of course, the present invention may also choose to return the user request to the client, or directly discard it, thereby providing the client with the possibility of autonomously processing the timeout request.
In a second aspect, the invention relates to a secure communication system for power service management based on a user request. The system comprises a plurality of target services arranged in a centralized mode and a plurality of users arranged in a distributed mode, wherein the users are communicated with the target services based on user requests; the system is used for realizing the safe communication method of the power service management system based on the user request in the first aspect of the invention.
Compared with the prior art, the safe communication method and system for power service management based on the user requests have the advantages that the user requests from the plurality of clients for the plurality of different target services are classified, and the corresponding legality requirements are selected based on the classification results to analyze the batch of user requests, so that the safe communication for the user requests is realized. The method is simple, quick in response and accurate in fault judgment and expectation, and can greatly improve the safety of the power service management system.
The present applicant has described and illustrated embodiments of the present invention in detail with reference to the accompanying drawings, but it should be understood by those skilled in the art that the above embodiments are merely preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not for limiting the scope of the present invention, and on the contrary, any improvement or modification made based on the spirit of the present invention should fall within the scope of the present invention.

Claims (11)

1. A method of secure communication for power service management based on a user request, the method comprising the steps of:
step 1, receiving a user request from an electric power service management system, and judging the target and the type of the user request;
step 2, classifying the user requests based on the targets and the types of the user requests, and classifying the user requests into a plurality of same target requests and a plurality of same type requests respectively;
step 3, presetting the legality requirement of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legality requirement;
and 4, if the legality requirement is met, calling corresponding service from the electric power service management system according to the request, and if the legality requirement is not met, caching or interrupting the user request.
2. A method of secure communication for power service management based on user requests as claimed in claim 1, characterized in that:
the same target request is a request from different users aiming at the same target service;
the same type of request is a request aiming at the same communication task.
3. A method of secure communication for power service management based on user requests as claimed in claim 2, characterized in that:
setting a first communication threshold resource for the same target request, and intercepting the call of the same target request to the current target service when recognizing that the same target request completely occupies the first communication threshold resource;
and generating detection on the working state of the current target service, and stopping intercepting the call of the same target request to the current target service when the current target service is detected to be restored to the normal working state.
4. A method of secure communication of power service management based on user requests according to claim 3, characterized in that:
the first communication threshold resource is a calling speed threshold value of the current target service.
5. A method of secure communication for power service management based on user requests according to claim 3, characterized in that:
and timing when the call of the same target request to the current target service is intercepted, and canceling the interception of part of the same target request after preset time.
6. A method of secure communication of power service management based on user requests as claimed in claim 2, characterized in that:
and setting a second communication threshold resource for the same type of request, and interrupting the execution of the same type of request on the current communication task when the second communication threshold resource is completely occupied by the same type of request.
7. The method of claim 6, wherein the method comprises:
and the second communication threshold resource is the sum of all the core threads and the temporary threads in the current communication task.
8. A method of secure communication for power service management based on user requests as claimed in claim 2, characterized in that:
and setting a third communication threshold resource for the same type of request, and intercepting the call of the same type of request to the current target service when recognizing that the same type of request completely occupies the third communication threshold resource.
9. The secure communication method for power service management based on user request as claimed in claim 7, wherein:
the third communication threshold resource is a data request concurrency quantity threshold in the current communication task.
10. The secure communication method of the power service management system based on the user request as claimed in claim 1, wherein:
the caching or interrupting the user request comprises:
intercepting the same target request or the same type of request, and returning the request; alternatively, the first and second electrodes may be,
intercepting the same target request or the same type of request and not returning the request;
and caching the same target request or the same type of request into a corresponding thread pool.
11. A secure communication system for power service management based on a user request, characterized by:
the system comprises a plurality of target services arranged in a centralized mode, a plurality of users arranged in a distributed mode, and a plurality of communication modules, wherein the plurality of users communicate with the plurality of target services based on user requests;
the system is used for implementing a secure communication method of the power service management system based on the user request as described in claims 1-10.
CN202210886723.0A 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request Active CN115334162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210886723.0A CN115334162B (en) 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210886723.0A CN115334162B (en) 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request

Publications (2)

Publication Number Publication Date
CN115334162A true CN115334162A (en) 2022-11-11
CN115334162B CN115334162B (en) 2023-12-05

Family

ID=83918725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210886723.0A Active CN115334162B (en) 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request

Country Status (1)

Country Link
CN (1) CN115334162B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040143670A1 (en) * 2002-07-02 2004-07-22 Pratik Roychowdhury System, method and computer program product to avoid server overload by controlling HTTP denial of service (DOS) attacks
US20050198200A1 (en) * 2004-03-05 2005-09-08 Nortel Networks Limited Method and apparatus for facilitating fulfillment of web-service requests on a communication network
EP1612674A2 (en) * 2004-06-29 2006-01-04 Nederlandse Organisatie voor Toegepast-Natuuurwetenschappelijk Onderzoek TNO Method and system for admission control
US20090316600A1 (en) * 2008-06-23 2009-12-24 Kazuma Yumoto Telecommunications system and server apparatus
WO2019052526A1 (en) * 2017-09-14 2019-03-21 北京金山云网络技术有限公司 Api invoking system, method and apparatus, electronic device and storage medium
US20210150482A1 (en) * 2019-11-18 2021-05-20 Salesforce.Com, Inc. Construction of global internet message threads
CN113220482A (en) * 2021-04-30 2021-08-06 北京达佳互联信息技术有限公司 Call request processing method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040143670A1 (en) * 2002-07-02 2004-07-22 Pratik Roychowdhury System, method and computer program product to avoid server overload by controlling HTTP denial of service (DOS) attacks
US20050198200A1 (en) * 2004-03-05 2005-09-08 Nortel Networks Limited Method and apparatus for facilitating fulfillment of web-service requests on a communication network
EP1612674A2 (en) * 2004-06-29 2006-01-04 Nederlandse Organisatie voor Toegepast-Natuuurwetenschappelijk Onderzoek TNO Method and system for admission control
US20090316600A1 (en) * 2008-06-23 2009-12-24 Kazuma Yumoto Telecommunications system and server apparatus
WO2019052526A1 (en) * 2017-09-14 2019-03-21 北京金山云网络技术有限公司 Api invoking system, method and apparatus, electronic device and storage medium
US20210150482A1 (en) * 2019-11-18 2021-05-20 Salesforce.Com, Inc. Construction of global internet message threads
CN113220482A (en) * 2021-04-30 2021-08-06 北京达佳互联信息技术有限公司 Call request processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115334162B (en) 2023-12-05

Similar Documents

Publication Publication Date Title
WO2020253347A1 (en) Container cluster management method, device and system
CN109714192B (en) Monitoring method and system for monitoring cloud platform
EP3072260B1 (en) Methods, systems, and computer readable media for a network function virtualization information concentrator
CN108712464A (en) A kind of implementation method towards cluster micro services High Availabitity
US7099879B2 (en) Real-time monitoring of service performance through the use of relational database calculation clusters
US7743142B2 (en) Verifying resource functionality before use by a grid job submitted to a grid environment
CA2503987C (en) System and method for performance management in a multi-tier computing environment
US9450700B1 (en) Efficient network fleet monitoring
CN111092786B (en) Network equipment safety authentication service reliability enhancing system
US8516295B2 (en) System and method of collecting and reporting exceptions associated with information technology services
CN103873279A (en) Server management method and server management device
CN106612199A (en) Network monitoring data collection and analysis system and method
CN110134518A (en) A kind of method and system improving big data cluster multinode high application availability
CN110727508A (en) Task scheduling system and scheduling method
CN108632086A (en) A kind of concurrent job operation troubles localization method
CN115334162B (en) Secure communication method and system for power service management based on user request
CN113595776B (en) Monitoring data processing method and system
Friedman et al. Load Balancing Schemes for High-Throughput Distributed Fault-Tolerant Servers
US11016807B2 (en) Intermediary system for data streams
CN114371931A (en) Service cluster resource allocation method and device and computer equipment
CN117478600B (en) Flow control method and system for serving high concurrency multi-center business center
Tao et al. kFHCO: Optimal VM consolidation via k-Factor horizontal checkpoint oversubscription
CN113051079B (en) Computer overload protection device
CN111147278A (en) Device for executing computer instruction
CN116232740A (en) Industrial control safety early warning information pushing system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant