CN115334162B - Secure communication method and system for power service management based on user request - Google Patents

Secure communication method and system for power service management based on user request Download PDF

Info

Publication number
CN115334162B
CN115334162B CN202210886723.0A CN202210886723A CN115334162B CN 115334162 B CN115334162 B CN 115334162B CN 202210886723 A CN202210886723 A CN 202210886723A CN 115334162 B CN115334162 B CN 115334162B
Authority
CN
China
Prior art keywords
request
target
same
communication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210886723.0A
Other languages
Chinese (zh)
Other versions
CN115334162A (en
Inventor
陈焱
蒋丛柏
王俊
高丛珊
贾志
徐成
王潇
陶慧君
郭曦曦
程婧
顾舒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoneng Jiangsu Energy Sales Co ltd
CHN Energy Jiangsu Power Co Ltd
Original Assignee
Guoneng Jiangsu Energy Sales Co ltd
CHN Energy Jiangsu Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoneng Jiangsu Energy Sales Co ltd, CHN Energy Jiangsu Power Co Ltd filed Critical Guoneng Jiangsu Energy Sales Co ltd
Priority to CN202210886723.0A priority Critical patent/CN115334162B/en
Publication of CN115334162A publication Critical patent/CN115334162A/en
Application granted granted Critical
Publication of CN115334162B publication Critical patent/CN115334162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Abstract

A secure communication method and system for power service management based on user request, the method comprising the steps of: step 1, receiving a user request from an electric power service management system, and judging the target and the type of the user request; step 2, classifying the user request based on the target and the type of the user request, and classifying the user request into a plurality of same target requests and a plurality of same type requests respectively; step 3, presetting legal requirements of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legal requirements; and step 4, if the legal requirements are met, corresponding service is called from the power service management system according to the request, and if the legal requirements are not met, the user request is cached or interrupted. The method is simple, quick in response, accurate in fault judgment and prediction, and capable of greatly improving the safety of the power service management system.

Description

Secure communication method and system for power service management based on user request
Technical Field
The application relates to the field of power communication, in particular to a safety communication method and system for power service management based on a user request.
Background
Currently, power service management systems have been widely used in various types of power services. Generally, the electric power Service management system is based on the design concept of an SOA (Service-Oriented Architecture ), adopts Service-oriented business construction design, adopts a multi-layer technical architecture, can cover each business of electric power Service management, has good expansibility and configurability, can adapt to the change of business processing flow and processing logic through flexible configuration, and meets the requirements of the existing business requirements and expansion. The electric power service management system can cover power supply units of various levels such as network provinces, local cities, counties, power supply stations and the like, has highly concentrated structure, standard service specification and complete information integration, and can realize transverse integration and information sharing of services through various service processing and management requirements such as management monitoring, service processing, analysis decision and the like, thereby realizing multiple services such as unified management of electricity purchasing and selling information, real-time electricity purchasing and trading of users, service collaborative processing and monitoring, electronic payment, self-service, partner management, service report management, market analysis and prediction and the like.
In order to realize multiple services, a plurality of different power services are usually deployed on a server cluster formed by one server or a plurality of servers of the power service management system, and the plurality of power services realize information interaction with a plurality of clients distributed at different positions of a cloud through communication interfaces of the servers. However, due to various aspects of the network, equipment, etc. of the power service management system, a plurality of power services cannot always be in a 100% available state. When a single service in the system has a problem and causes a network delay in service call, a problem of one service may cause tasks at the system level to accumulate, thereby causing server paralysis, and the fault is extended into the whole system.
Thus, there is a need for a more secure method of communication for power service management based on user requests.
Disclosure of Invention
In order to solve the defects existing in the prior art, the application aims to provide a safe communication method and a system for power service management based on a user request. The application can classify the user requests from a plurality of clients to a plurality of different target services, and select corresponding legal requirements to analyze the batch of user requests based on the classification result, thereby realizing the safety communication aiming at the user requests.
The application adopts the following technical scheme.
The first aspect of the application relates to a secure communication method for power service management based on a user request, wherein the method comprises the following steps: step 1, receiving a user request from an electric power service management system, and judging the target and the type of the user request; step 2, classifying the user request based on the target and the type of the user request, and classifying the user request into a plurality of same target requests and a plurality of same type requests respectively; step 3, presetting legal requirements of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legal requirements; and step 4, if the legal requirements are met, corresponding service is called from the power service management system according to the request, and if the legal requirements are not met, the user request is cached or interrupted.
Preferably, the same target request is a request from a different user for the same target service; the same type of request is a request for the same communication task.
Preferably, a first communication threshold resource is set for the same target request, and when the same target request is identified to fully occupy the first communication threshold resource, the call of the same target request to the current target service is intercepted; and generating detection of the working state of the current target service, and stopping intercepting the call of the same target request to the current target service after detecting that the current target service is restored to the normal working state.
Preferably, the first communication threshold resource is a call speed threshold value of the current target service.
Preferably, the timing is performed when starting to intercept the call of the same target request to the current target service, and the interception of a part of the same target request is canceled after a preset time.
Preferably, a second communication threshold resource is set for the same type of request, and when the same type of request is identified to fully occupy the second communication threshold resource, the execution of the same type of request on the current communication task is interrupted.
Preferably, the second communication threshold resource is the sum of all core threads and temporary threads in the current communication task.
Preferably, a third communication threshold resource is set for the same type of request, and when the same type of request is identified to fully occupy the third communication threshold resource, the call of the same type of request to the current target service is intercepted.
Preferably, the third communication threshold resource is a concurrent number threshold of data requests in the current communication task.
Preferably, caching or interrupting the user request includes: intercepting the same target request or the same type of request, and returning the request; or intercepting the same target request or the same type of request, and not returning the request; the same target request or the same type of request is cached in the corresponding thread pool.
The second aspect of the application relates to a secure communication system for power service management based on user requests, wherein the system comprises a plurality of target services arranged in a centralized manner and a plurality of users arranged in a distributed manner, and the plurality of users realize communication with the plurality of target services based on the user requests; the system is for implementing a secure communication method of a power service management system based on a user request as described in the first aspect of the present application.
Compared with the prior art, the method and the system for the safe communication of the power service management based on the user request have the advantages that the user requests from a plurality of clients to a plurality of different target services are classified, and the corresponding legal requirements are selected based on the classification result to analyze the batched user requests, so that the safe communication of the user requests is realized. The method is simple, quick in response, accurate in fault judgment and prediction, and capable of greatly improving the safety of the power service management system.
The beneficial effects of the application also include:
1. the application classifies the user requests according to the request targets and request types and provides a corresponding legal requirement for each different group. By the method, the reasons for abnormality or failure of the power service management system can be accurately identified, and corresponding safety maintenance measures are adopted based on the corresponding reasons, so that the failure problem of the power service management system is minimized, and meanwhile, the accurate sending, receiving and analyzing of the part of user requests which do not fail are maintained.
2. The application sets the service calling speed threshold aiming at the user request of the same target service, thereby preventing the system fault problem caused by the target service fault. The method of the application not only can intercept the user request in time, but also can realize the continuous transmission of the user request after fault recovery based on reasonable design, and the safety performance of the equipment in the recovery process is ensured and the transmission of other types of user requests is not affected because the process of recovering the transmission is gradually transited from partial recovery to full recovery.
3. Based on different communication thresholds, the method and the device realize simultaneous monitoring of the data concurrency quantity, the communication thread quantity and the service calling speed of the same type of requests. Therefore, the safety guarantee for the abnormal requests of the same type is realized by monitoring the number of communication threads and the service call speed, and the possible abnormal requests of the same type are predicted by monitoring the concurrent number of data, so that the possibility of system faults is reduced in advance.
4. The application provides a plurality of different fault processing methods, aiming at partial faults, adopting a mode of intercepting and returning requests to process; intercepting part of faults, not returning a request, and providing an autonomous processing mode for the problems for the client; in addition, the temporarily intercepted request can be cached in the thread pool, and the effective request can be temporarily stored without service abnormality caused by the occurrence of faults although the cache is added as a cost. According to different types of target services or different service requirements and cost, different types of fault processing methods can be flexibly selected, so that the total efficiency is optimal.
Drawings
FIG. 1 is a schematic diagram of a method for arranging a target service in a power service management system in a secure communication method for power service management based on a user request according to the present application;
FIG. 2 is a schematic diagram of a normal operation of a power service management system in a secure communication method of power service management based on a user request according to the present application;
FIG. 3 is a schematic diagram showing an abnormal operation of a power service management system in a secure communication method for power service management based on a user request according to the present application;
FIG. 4 is a schematic diagram showing a failure of an electric power service management system in a secure communication method for electric power service management based on a user request according to the present application;
fig. 5 is a flowchart illustrating a step of a secure communication method for power service management based on a user request according to the present application.
Detailed Description
The application is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and are not intended to limit the scope of the present application.
Fig. 1 is a schematic diagram of a method for arranging a target service in a power service management system in a secure communication method for power service management based on a user request according to the present application. As shown in fig. 1, the power service management system of the present application includes various power target services 1 to n, and in order to reduce development cost, the power service of the present application can be implemented by adopting a micro-service architecture. In the architecture, the management of various micro services can be realized based on the built modules such as a configuration center, a service registration and discovery center and the like. Meanwhile, the availability of the service cluster can be ensured by adopting an inter-service communication mode, a service load balancing mode and the like which are commonly used in the prior art.
Specifically, the power service management system can establish a data model of power service, takes the aggregation of power consumption data as a support, and takes digital, intelligent and cloud computing as means to realize the cooperative management and control between the power generation and the power selling processes in the power utilization process, thereby improving the fine management level of the power utilization, including assisting the power quotation decision in the power utilization process and the like.
The functions that can be executed by various kinds of power target services provided in the power service management system in the present application specifically include, but are not limited to: power trade decisions, power planning management, power benchmarking management, marketing information base, customer behavior management, transaction management, contract settlement management, power trade auxiliary decisions, user power management, system interfaces, business integration and the like. Specifically, the user types in the system mainly comprise three types of power grid users, electricity selling users and intermediate users. The power grid user can display the internal and external network function modules within the authority range by providing corresponding power grid services, and the electricity selling user usually provides the function module of the internal network part, and the intermediate provider provides the function module of the external network part.
However, in the power service management system constructed in this way, there is still a certain problem that is unavoidable. Fig. 2 is a schematic diagram of normal operation of a power service management system in a secure communication method of power service management based on a user request according to the present application. As shown in fig. 2, a plurality of clients complete a communication task between the clients and a target service by transmitting user requests from the plurality of clients to the plurality of target services 1 to n in the power service management system. When all user requests can be successfully sent and successfully received by a plurality of target services, the user requests cannot wait for too long in a request queue, and unsuccessful user requests cannot be repeatedly generated, so that the problem of interface blockage is solved.
Fig. 3 is a schematic diagram illustrating an abnormal operation of a power service management system in a secure communication method for power service management based on a user request according to the present application. As shown in fig. 3, the solid line portion of the figure marks the case when a user request is successfully sent to a target service, and the broken line portion of the figure marks the case when a user request is not successfully sent to a target service for a variety of potential reasons. At the moment of fault transmission, only the current user requests to transmit the fault. However, over time, if the failure problem is not resolved in time, the problem may block subsequent user requests.
Fig. 4 is a schematic diagram illustrating a failure of a power service management system in a secure communication method for power service management based on a user request according to the present application. As shown in fig. 4, when the failure problem is not solved over time, the user request is backed up multiple times and continuously sent to the target service, and the system thread is occupied by the current request, so that the communication resources between other user requests and other target services are preempted, and accordingly the failure occurs.
Specifically, when one transmission failure occurs in many dependent services, all subsequent user requests are blocked. With high-traffic access, a single backend service may be mistaken resulting in the resources on all servers becoming saturated in a matter of a few seconds. For example, when a failure request returns to timeout, the number of threads may increase dramatically, and if a user request cannot be released in time, network congestion may result.
This phenomenon can cause an accidental failure to occur, resulting in a cascading failure at the system level, with the entire server and even the server cluster failing.
In order to prevent the occurrence of the above problems, the present application provides a secure communication method and system for power service management based on a user request. Fig. 5 is a flowchart illustrating a step of a secure communication method for power service management based on a user request according to the present application. As shown in fig. 5, the first aspect of the present application relates to a secure communication method for power service management based on a user request, and the method includes steps 1 to 4.
And step 1, receiving a user request from the power service management system, and judging the target and the type of the user request.
It will be appreciated that when each of the different target services in the power service management system is configured on the cluster server, the plurality of different target services will implement a communication connection with clients where the plurality of different users are located based on the same service interface, logical link. In particular, communication between the client and the target service is activated and a connection is established based on a user request. The connection between a plurality of different clients and the same target service and the connection between the same client and a plurality of different target services are realized by adopting the user requests with the same structure and the same communication protocol. The application container may configure a unified interface for receiving user requests for a plurality of different target services. The application container will distribute the received user request to the corresponding target service.
The application can extract the target and type of the request from the data structure of the user request for each user request. Through the extracted target and type information, the application can realize the classification of the user request in the current target queue and the data within a period of history.
Step 2, classifying the user request based on the target and the type of the user request, and classifying the user request into a plurality of same target requests and a plurality of same type requests respectively.
After classifying the user requests according to the method in step 1 of the present application, a plurality of identical target requests and a plurality of identical type requests may be obtained. As the name suggests, multiple identical target requests are classified based on the target of the user request, while multiple identical type requests are classified based on the type of user request.
Preferably, the same target request is a request from a different user for the same target service; the same type of request is a request for the same communication task.
The target is the sending target of the current user request, and refers to a certain target application in the power service management system. And the types can be distinguished according to the nature of the user request. For example, one type is when a user request is a login service, and another type is when a user request is a request to download data.
In the application, in order to adopt different methods to prevent or overcome system abnormality caused by user requests, a method for classifying the user requests based on different targets and different types is adopted. The user requests may also be classified in different ways according to actual needs.
And step 3, presetting the legal requirements of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legal requirements.
In the application, the legal requirement of the power service management system can be preset according to actual needs. The validity requirement may be generally set for the same target request or the same type of request. By the setting method, the overall system faults can be judged aiming at the same target service or the same communication task, so that the problem sources causing the system faults can be traced, and the system faults can be solved.
The validity requirements in the present application specifically include a first communication threshold resource, a second communication threshold resource, and a third communication threshold resource, which are described later. The details thereof will be described in detail later. According to the similar method in the application, the specific content of the legal requirements can be conveniently increased or adjusted based on specific requirements, such as the type of target service, the judging requirement of the system for faults, the upgrading maintenance requirement of the system and the like.
And step 4, if the legal requirements are met, corresponding service is called from the power service management system according to the request, and if the legal requirements are not met, the user request is cached or interrupted.
Specifically, according to various preset legal requirements, whether the user request cannot cause faults or not can be judged, and if the legal requirements are met, each target service can sequentially process the user request in the system according to the normal working flow of the system. If the legal requirements are not met, dividing the subsequent user requests under the same category according to the related cache or interruption of the system.
Preferably, a first communication threshold resource is set for the same target request, and when the same target request is identified to fully occupy the first communication threshold resource, the call of the same target request to the current target service is intercepted; and generating detection of the working state of the current target service, and stopping intercepting the call of the same target request to the current target service after detecting that the current target service is restored to the normal working state.
It will be appreciated that when user requests are divided according to different objectives, all user requests for the same objective may be monitored, i.e. all user requests from a plurality of different clients for the same objective service, and when it is found that these user requests exceed the setting of the first communication threshold resource, it is determined that subsequent user requests are intercepted.
Preferably, the first communication threshold resource is a call speed threshold value of the current target service. In the application, when the target service fails, the call speed of the user request for calling the target service is very slow or overtime occurs, and at the same time, the user request is blocked in a large amount, and a new user request can be generated to repeatedly call the current target service because the client cannot call the target service, thereby further blocking the call of other normal service in the user request port, further leading the system to fail, and the range of the failure is rapidly enlarged from the failure of a single service to the failure of the whole system.
In order to solve the problem, in the application, when the calling speed of a certain target service is recognized to exceed a threshold value, the same target request corresponding to the certain target service is intercepted. Because the same target requests are intercepted, the queuing phenomenon of a large number of user requests waiting for response is avoided, and therefore subsequent target requests can be directly returned without calling target services, and resources can be quickly released.
Meanwhile, after the interception operation is executed on the same target request, the working state of the target service can be monitored and judged at the same time, for example, whether the target service can respond to the state of the user request quickly or not, and when the target service is found to be good, namely, the user request can be responded quickly, the previous interception operation can be stopped, so that the call of the same target request to the current target service is restored.
It will be appreciated that when performing an intercept operation or a resume call operation, in order to better record various types of failures that have occurred in the target service, the corresponding operations may be recorded in the server in the form of a log at the same time. Meanwhile, when the user requests are abnormal so that potential faults of the system can occur, an alarm can be set.
In order to realize the interception of the same target request in the application, the user request can be temporarily stored by adopting a method of a lock-free circular queue technology. For example, for the same target request, 10 pockets may be set as storage containers, and each pocket is executed within a time period of each second, where each pocket records whether the stored user request successfully obtains the response of the target service, or whether the response of the target service fails, the response of the target service is overtime, and the target service refuses the different states such as the user request. The target service is recorded as correct when it responds successfully, and is recorded as an error state when other states occur.
In one embodiment of the application, the call speed threshold for the current target service may be set to an error rate of over 50% and over 20 user requests occur within 10 seconds. When this occurs, an operation of intercepting the user request is performed.
Preferably, the timing is performed when starting to intercept the call of the same target request to the current target service, and the interception of a part of the same target request is canceled after a preset time.
In an embodiment of the present application, after interception is performed, based on a preset period of time, for example, 5s or 10s, the part of the intercepted user request passes, at this time, the returned state of the part of the request is determined again, if the returned state of the part of the request is correct, it is determined that the current target service has recovered to the normal state, at this time, all interception of the current same target request may be canceled, and the current target service may be recovered to the non-intercepted state.
Preferably, a second communication threshold resource is set for the same type of request, and when the same type of request is identified to fully occupy the second communication threshold resource, the execution of the same type of request on the current communication task is interrupted.
Preferably, the second communication threshold resource is the sum of all core threads and temporary threads in the current communication task.
Typically, after user requests are divided by type, a server will divide a certain amount of thread resources for the same type of request. Among the number of thread resources, a core thread and a temporary thread may be included. To prevent the thread resources to which this type is allocated from being exhausted, a second communication threshold resource may be set to the sum of all core threads and temporary threads.
In this way, in the present application, multiple different requests of the same type may be partitioned to obtain different thread resources, thereby preventing each of the different types of requests from being affected by each other. When one of the types of request thread resources is exhausted, a subsequent user request of that type may be returned directly without invoking the subsequent resource.
The advantage of using this method according to the application is that the method is very versatile. For example, when the target services are arranged in a decentralized manner; or when an important single service is deployed in one single server and other services are deployed in another server; or when multiple target services are deployed in a multi-center manner, the method in the application can be adopted.
In one embodiment of the present application, an atomic counter may be used to record how many threads are currently running, and when the maximum number of threads is exceeded, the user request of that type is discarded. If not, it is necessary to perform the counting operation request, specifically, counter +1 when a user request is found, and counter-1 when the target service returns a user request. This way, the thread can be tightly controlled and returned immediately.
Of course, in the present application, the current user request may be stored in a thread pool, and the task return processing timeout time may be set, so that the accumulated request may be temporarily stored in the queue of the thread pool.
Preferably, a third communication threshold resource is set for the same type of request, and when the same type of request is identified to fully occupy the third communication threshold resource, the call of the same type of request to the current target service is intercepted.
Preferably, the third communication threshold resource is a concurrent number threshold of data requests in the current communication task.
In particular, the present application may be used to limit the flow of requests of the same type based on the number of concurrent data requests in the current communication task. When the flow of the user request is higher than the set threshold, the request is directly returned, and the subsequent resources are not called. By limiting the user request traffic, the server can be prevented from malfunctioning due to excessive traffic.
Preferably, caching or interrupting the user request includes: intercepting the same target request or the same type of request, and returning the request; or intercepting the same target request or the same type of request, and not returning the request; the same target request or the same type of request is cached in the corresponding thread pool.
Specifically, there are three processing methods after the system abnormality is found. Including interception or caching, and including whether to return the request.
The cache mode in the application needs to be used in the thread pool, and although the mode in the application probably leads each communication task to be allocated with a certain number of threads, thereby causing resource waste, the application has the advantage that when burst traffic, such as traffic flood, occurs in the system, data can be stored in the thread pool for queuing processing.
The interception mode in the application is not applicable to the thread pool, saves resources, but also needs to be at the cost of discarding the user request. Of course, the user request can be returned to the client or directly discarded, so that the possibility of autonomously processing the timeout request is provided for the client.
The second aspect of the present application relates to a secure communication system for power service management based on a user request. The system comprises a plurality of target services which are arranged in a centralized way, a plurality of users which are arranged in a distributed way, and a plurality of users which realize communication with the plurality of target services based on user requests; the system is for implementing a secure communication method of a power service management system based on a user request as described in the first aspect of the present application.
Compared with the prior art, the method and the system for the safe communication of the power service management based on the user request have the advantages that the user requests from a plurality of clients to a plurality of different target services are classified, and the corresponding legal requirements are selected based on the classification result to analyze the batched user requests, so that the safe communication of the user requests is realized. The method is simple, quick in response, accurate in fault judgment and prediction, and capable of greatly improving the safety of the power service management system.
While the applicant has described and illustrated the embodiments of the present application in detail with reference to the drawings, it should be understood by those skilled in the art that the above embodiments are only preferred embodiments of the present application, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present application, and not to limit the scope of the present application, but any improvements or modifications based on the spirit of the present application should fall within the scope of the present application.

Claims (5)

1. A secure communication method for power service management based on a user request, the method comprising the steps of:
step 1, when receiving a user request from a power service management system through a plurality of different target services, judging the target and the type of the user request, wherein the plurality of different clients and the same target service and the same client and the plurality of different target services are all connected by adopting the user request with the same structure and the same communication protocol;
step 2, classifying the user requests in a current target queue and within a history period based on the targets and types of the user requests, and classifying the user requests into a plurality of identical target requests and a plurality of identical type requests respectively;
step 3, presetting legal requirements of the power service management system, and judging whether the communication process of the same target request or the same type of request meets the legal requirements;
the legality requirement comprises a first communication threshold resource, a second communication threshold resource and a third communication threshold resource; the legal requirements are increased or adjusted based on the type of the target service, the judging requirement of the system for faults and the upgrading maintenance requirement of the system;
setting a first communication threshold resource for the same target request, and intercepting the call of the same target request to the current target service when the first communication threshold resource is completely occupied by the same target request; generating detection of the working state of the current target service, and stopping intercepting the call of the same target request to the current target service after detecting that the current target service is restored to the normal working state; the first communication threshold resource is a calling speed threshold value of the current target service;
setting a second communication threshold resource for the same type of request, and interrupting the execution of the same type of request on a current communication task when the same type of request is identified to fully occupy the second communication threshold resource; the second communication threshold resource is the sum of all core threads and temporary threads in the current communication task;
setting a third communication threshold resource for the same type request, and intercepting the call of the same type request to the current target service when the same type request is identified to fully occupy the third communication threshold resource; the third communication threshold resource is a data request concurrency quantity threshold in the current communication task; and step 4, if the legal requirements are met, calling corresponding services from the power service management system according to the request, and if the legal requirements are not met, caching or interrupting the user request.
2. A secure communication method of power service management based on a user request as claimed in claim 1, wherein:
the same target request is a request from different users aiming at the same target service;
the same type of request is a request for the same communication task.
3. A secure communication method of power service management based on a user request as claimed in claim 1, wherein:
and timing when starting to intercept the call of the same target request to the current target service, and canceling the interception of part of the same target request after the preset time.
4. A method of secure communication of a consumer request based power service management system as recited in claim 1, wherein:
the caching or interrupting the user request includes:
intercepting the same target request or the same type of request, and returning the request; or,
intercepting the same target request or the same type of request, and not returning the request;
and caching the same target request or the same type of request into a corresponding thread pool.
5. A secure communication system for power service management based on a user request, characterized by:
the system comprises a plurality of target services arranged in a centralized way, a plurality of users arranged in a distributed way, and communication between the plurality of users and the plurality of target services is realized based on user requests;
the system is used for realizing a secure communication method of a power service management system based on a user request as claimed in claims 1-4.
CN202210886723.0A 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request Active CN115334162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210886723.0A CN115334162B (en) 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210886723.0A CN115334162B (en) 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request

Publications (2)

Publication Number Publication Date
CN115334162A CN115334162A (en) 2022-11-11
CN115334162B true CN115334162B (en) 2023-12-05

Family

ID=83918725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210886723.0A Active CN115334162B (en) 2022-07-26 2022-07-26 Secure communication method and system for power service management based on user request

Country Status (1)

Country Link
CN (1) CN115334162B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1612674A2 (en) * 2004-06-29 2006-01-04 Nederlandse Organisatie voor Toegepast-Natuuurwetenschappelijk Onderzoek TNO Method and system for admission control
WO2019052526A1 (en) * 2017-09-14 2019-03-21 北京金山云网络技术有限公司 Api invoking system, method and apparatus, electronic device and storage medium
CN113220482A (en) * 2021-04-30 2021-08-06 北京达佳互联信息技术有限公司 Call request processing method and device, electronic equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040143670A1 (en) * 2002-07-02 2004-07-22 Pratik Roychowdhury System, method and computer program product to avoid server overload by controlling HTTP denial of service (DOS) attacks
US8484348B2 (en) * 2004-03-05 2013-07-09 Rockstar Consortium Us Lp Method and apparatus for facilitating fulfillment of web-service requests on a communication network
JP5111256B2 (en) * 2008-06-23 2013-01-09 株式会社日立製作所 Communication system and server device
US11057331B2 (en) * 2019-11-18 2021-07-06 Salesforce.Com, Inc. Construction of global internet message threads

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1612674A2 (en) * 2004-06-29 2006-01-04 Nederlandse Organisatie voor Toegepast-Natuuurwetenschappelijk Onderzoek TNO Method and system for admission control
WO2019052526A1 (en) * 2017-09-14 2019-03-21 北京金山云网络技术有限公司 Api invoking system, method and apparatus, electronic device and storage medium
CN113220482A (en) * 2021-04-30 2021-08-06 北京达佳互联信息技术有限公司 Call request processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115334162A (en) 2022-11-11

Similar Documents

Publication Publication Date Title
US10048996B1 (en) Predicting infrastructure failures in a data center for hosted service mitigation actions
EP3072260B1 (en) Methods, systems, and computer readable media for a network function virtualization information concentrator
US7099879B2 (en) Real-time monitoring of service performance through the use of relational database calculation clusters
CN103873279B (en) Server management method and server management device
WO2023142054A1 (en) Container microservice-oriented performance monitoring and alarm method and alarm system
CN111209110B (en) Task scheduling management method, system and storage medium for realizing load balancing
CN106612199A (en) Network monitoring data collection and analysis system and method
US20110239050A1 (en) System and Method of Collecting and Reporting Exceptions Associated with Information Technology Services
CN114125055A (en) Multi-protocol automatic adaptation cloud native gateway system control method, system, equipment and application
CN102984184A (en) A method and a device for service load balancing for a distributed system
CN111600807A (en) Flow control method and system based on API gateway equipment
CN108632086A (en) A kind of concurrent job operation troubles localization method
CN114153635A (en) Message processing method, device, storage medium and computer equipment
CN115334162B (en) Secure communication method and system for power service management based on user request
CN115883330B (en) Alarm event processing method, system, equipment and storage medium
CN112653597A (en) Service grid-based service fusing mechanism adjusting method and system
CN116760655A (en) POP point method for providing CPE optimal access in SD-WAN application
CN105991305B (en) A kind of method and device identifying link exception
CN110097381A (en) A kind of complaint automatic identification early warning system and method applied to airport service
CN113595776B (en) Monitoring data processing method and system
US11016807B2 (en) Intermediary system for data streams
CN110138634B (en) Key data monitoring method and terminal
JPH07319836A (en) Fault monitoring system
JPH09106381A (en) Communication server load distribution processing system
CN117478600B (en) Flow control method and system for serving high concurrency multi-center business center

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant