CN115495783A - Configured data service exposure solution method and system - Google Patents

Configured data service exposure solution method and system Download PDF

Info

Publication number
CN115495783A
CN115495783A CN202211140494.4A CN202211140494A CN115495783A CN 115495783 A CN115495783 A CN 115495783A CN 202211140494 A CN202211140494 A CN 202211140494A CN 115495783 A CN115495783 A CN 115495783A
Authority
CN
China
Prior art keywords
data
terminal
downstream system
downstream
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211140494.4A
Other languages
Chinese (zh)
Other versions
CN115495783B (en
Inventor
金震
张京日
徐伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SunwayWorld Science and Technology Co Ltd
Original Assignee
Beijing SunwayWorld Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SunwayWorld Science and Technology Co Ltd filed Critical Beijing SunwayWorld Science and Technology Co Ltd
Priority to CN202211140494.4A priority Critical patent/CN115495783B/en
Publication of CN115495783A publication Critical patent/CN115495783A/en
Application granted granted Critical
Publication of CN115495783B publication Critical patent/CN115495783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a configurable data service exposure solution method and a system, wherein the method comprises the following steps: the method comprises the steps of receiving a data calling request sent by downstream systems, analyzing the data calling request to determine a key field of data to be called of each downstream system, calling related data from a data management terminal based on the key field and issuing the related data to a docking platform to generate a resource subscription task of each downstream system, subscribing and permission approving each downstream system based on the resource subscription task, carrying out data calling service for each downstream system according to authentication information of the downstream system after approval is passed, and generating the resource subscription task for each downstream system to enable the downstream system to obtain own expected service uniquely, so that the data exposure on the platform is avoided, and the data privacy and safety are improved.

Description

Configured data service exposure solution method and system
Technical Field
The invention relates to the technical field of data processing, in particular to a configuration type data service exposure solution method and system.
Background
Data interaction is an inevitable behavior among multiple sets of systems, and when data services are exposed to other systems, the data security and the data applicability need to be considered. At present, because the developers of the systems in an enterprise and the systems in the enterprise and between the internal and external systems are different or the systems are operated on heterogeneous platforms, when different systems are connected, a commonly adopted method is that a set of commonly approved data transmission rules are defined among the systems, a sender develops a specific data processing program to send data to a receiver specific data processing program in the form of structured messages, and the data are returned to the other party in the form of structured messages after the other party finishes processing, and the method can ensure that the data of each system can be received and utilized by other systems due to the limitation of data transmission among client systems, thereby improving the complementary work efficiency among the systems, but the method has the following problems: since the receiver system of the customized data delivery rule is not limited, the same type of system as the receiver system can obtain the delivered data by using the data delivery rule, so that the data is exposed on the platform, and the security and privacy of the data are seriously affected.
Disclosure of Invention
In view of the above-mentioned problems, the present invention provides a configured data service exposure solution and system to solve the problem mentioned in the background art that since the receiver system of the customized data delivery rule is not limited, the same type of system as the receiver system can also use the data delivery rule to obtain the delivered data, so that the data is exposed on the platform, which seriously affects the security and privacy of the data.
A configurable data service exposure solution, comprising the steps of:
receiving a data calling request sent by a downstream system;
analyzing the data calling request to determine key fields of the data to be called of each downstream system;
relevant data are called from the data management terminal based on the key fields and are published on a docking platform to generate a resource subscription task of each downstream system;
and subscribing and authority examining and approving each downstream system based on the resource subscribing task, and performing data calling service for each downstream system according to the authentication information of the downstream system after the examination and approval are passed.
Preferably, the receiving a data retrieval request sent by a downstream system includes:
determining a terminal identifier of each downstream system corresponding to a first terminal, and acquiring identity token information of each first terminal based on the terminal identifier;
performing identity qualification verification on each first terminal according to the identity token information of the first terminal, and screening qualified second terminals according to verification results;
acquiring associated configuration data of each second terminal in the data management terminal, and screening out a third terminal with data retrieval authority from the plurality of second terminals based on the associated configuration data;
and detecting the first session request of each third terminal and analyzing whether the first session request contains a data calling instruction, and if so, confirming the first session request as the data calling request sent by a target downstream system corresponding to the third terminal.
Preferably, before parsing the data retrieval request to determine the key fields of the data to be retrieved of each downstream system, the method further includes:
determining an applicable condition program of each type of data according to the functional characteristics, the service and the operation parameters of each type of data in the data management terminal;
detecting the configuration parameters of each third terminal, and determining the system operation parameters of a target downstream system corresponding to each third terminal according to the configuration parameters of each third terminal;
evaluating the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal;
and confirming whether the compatibility is greater than or equal to a preset threshold value, if so, not needing to carry out subsequent operation, and otherwise, sending a prompt that the data to be called are not suitable to a target third terminal with the compatibility smaller than the preset threshold value.
Preferably, the parsing the data retrieval request to determine the key field of the data to be retrieved of each downstream system includes:
analyzing the data calling request to obtain a plurality of keywords, and constructing a keyword dynamic association matrix corresponding to the data calling request according to the association of every two keywords;
calling a plurality of common associated data of a plurality of keywords in the data management terminal;
determining the association weight of each first keyword and other second keywords based on the keyword dynamic association matrix, and determining data to be called in a plurality of common association data according to the association weight;
and determining a preset request return field corresponding to the data to be called, and determining the preset request return field as a key field of the data to be called.
Preferably, the task of invoking relevant data from the data management terminal based on the key field and publishing the relevant data onto the docking platform to generate the resource subscription task of each downstream system includes:
determining the home service according to the key field;
establishing network connection between the data management terminal and the docking platform, uploading home services corresponding to data calling requests sent by each downstream system to the docking platform respectively, and constructing a task bar corresponding to each relevant data;
importing the data calling request sent by each downstream system into a task bar corresponding to the related data;
and acquiring the platform work account number of each downstream system, and associating the platform work account number of each downstream system with the task bar of the downstream system to generate the resource subscription task of the downstream system.
Preferably, the subscribing and permission approval of each downstream system based on the resource subscription task, and after approval, data retrieval service is performed for each downstream system according to the authentication information of each downstream system, including:
detecting the subscription condition of each downstream system to the corresponding resource subscription task;
determining the subscription state of each downstream system for the resource subscription task corresponding to the downstream system according to the subscription condition;
determining a subscribed first downstream system and an unsubscribed second downstream system according to the subscription state;
and carrying out authority examination and approval on the first downstream systems, acquiring the authentication information of each first downstream system after the examination and approval is passed, and carrying out data calling service for the first downstream systems according to the authentication information.
Preferably, the acquiring the associated configuration data of each second terminal in the data management terminal, and screening out a third terminal having a data retrieval right in the plurality of second terminals based on the associated configuration data includes:
acquiring a terminal parameter of each second terminal;
acquiring associated configuration data of each second terminal in the data management terminal according to the terminal parameters of the second terminal;
acquiring authorization characteristic information of each second terminal according to the associated configuration data of the second terminal;
and determining a plurality of authority characteristics of each second terminal based on the authorization characteristic information of the second terminal, and screening out a third terminal with data calling related authority characteristics in the plurality of authority characteristics.
Preferably, the evaluating the compatibility between the current applicable condition program of the target data to be called of each third terminal and the system operating parameter of the target downstream system corresponding to the third terminal includes:
determining the operating environment parameters of the current applicable condition program of the target data to be called of each third terminal;
determining a jumpable environment factor according to the operating environment parameters of the current applicable condition program of the target data to be called of each third terminal;
constructing an interference scene of the current applicable condition program according to the change interval of each bounceable environment factor and the operation influence degree of the bounceable environment factor on the current applicable condition program;
constructing an interference model of a current applicable condition program based on the scene parameters of the interference scene;
determining random response data of system operation parameters of a target downstream system corresponding to each third terminal under an interference model of a current applicable condition program of the third terminal;
and determining the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the distribution condition of the random response data.
Preferably, the determining, according to the distribution of the random response data, the compatibility between the current applicable condition program of the target data to be called of each third terminal and the system operating parameter of the target downstream system corresponding to the third terminal includes:
determining the response variation amplitude of each system operation parameter of each third terminal according to the distribution condition of the random response data;
selecting target item system operation parameters with response variation amplitude larger than or equal to preset amplitude;
confirming the operation coverage rate of the target item system operation parameters on a target downstream system corresponding to each third terminal;
and determining the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the operation coverage rate of the target item system operation parameters to the target downstream system corresponding to each third terminal.
A configurable data service exposure resolution system, the system comprising:
the receiving module is used for receiving a data calling request sent by a downstream system;
the analysis module is used for analyzing the data calling request to determine key fields of the data to be called of each downstream system;
the generating module is used for calling related data from the data management terminal based on the key fields and publishing the related data to the docking platform so as to generate a resource subscription task of each downstream system;
and the approval module is used for subscribing and approving the authority of each downstream system based on the resource subscription task, and performing data retrieval service for each downstream system according to the authentication information of the downstream system after approval is passed.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
FIG. 1 is a flowchart illustrating a configurable data service exposure solution provided by the present invention;
FIG. 2 is another workflow diagram of a configurable data service exposure solution provided by the present invention;
FIG. 3 is a flowchart illustrating a configurable data service exposure solution provided by the present invention;
FIG. 4 is a screenshot of an embodiment of a configurable data service exposure solution provided by the present invention;
fig. 5 is a schematic structural diagram of a configurable data service exposure solution system provided in the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Data interaction is an inevitable behavior among multiple sets of systems, and when data services are exposed to other systems, the data security and the data applicability need to be considered. At present, because the developers of the systems in an enterprise and the systems inside and outside the enterprise are different or the systems operate on heterogeneous platforms, when different systems are connected, a commonly adopted method is that a set of commonly approved data transmission rules are defined among the systems, a sender develops a specific data processing program to send data to a receiver specific data processing program in the form of structured messages, and the receiver returns the data to the other party in the form of the structured messages after the data is processed by the other party, and the method can ensure that the data of each system can be received and utilized by other systems due to the limitation of data transmission among client systems, thereby improving the complementary work efficiency among the systems, but the method has the following problems: since the receiver system of the customized data delivery rule is not limited, the same type of system as the receiver system can also use the data delivery rule to obtain the delivered data, so that the data is exposed on the platform, and the security and privacy of the data are seriously affected. In order to solve the above problem, the present embodiment discloses a configurable data service exposure solution.
A configurable data service exposure solution, as shown in fig. 1, includes the following steps:
step S101, receiving a data calling request sent by a downstream system;
step S102, analyzing the data calling request to determine the key field of the data to be called of each downstream system;
step S103, related data are called from the data management terminal based on the key fields and are published on a docking platform to generate resource subscription tasks of each downstream system;
and S104, subscribing and permission approving each downstream system based on the resource subscription task, and performing data calling service for each downstream system according to the authentication information of the downstream system after approval is passed.
The working principle of the technical scheme is as follows: receiving a data retrieval request sent by downstream systems, analyzing the data retrieval request to determine a key field of data to be retrieved of each downstream system, retrieving related data from a data management terminal based on the key field and issuing the related data to a docking platform to generate a resource subscription task of each downstream system, subscribing and permission approving each downstream system based on the resource subscription task, and performing data retrieval service for each downstream system according to authentication information of the downstream system after approval.
The beneficial effects of the above technical scheme are: the method has the advantages that the safety of the data to be called of each downstream system can be effectively guaranteed by determining the key field of the data to be called of each downstream system, the expected service of each downstream system can be accurately determined, the practicability is improved, the safety of the data is improved, furthermore, the resource subscription task is generated for each downstream system, the expected service can be uniquely obtained, the condition that the data are exposed on a platform is avoided, the privacy and the safety of the data are improved, furthermore, the identity authority safety of each downstream system and whether the system has the subscription condition of the data to be called can be effectively verified by subscribing and authority approving the downstream systems, the practicability and the stability are further improved, and the problems that in the prior art, due to the fact that a receiver system of the customized data transmission rule is not limited, the system of the same type as the receiver system can also use the data transmission rule to obtain the transmitted data, the data are exposed on the platform, and the safety and the privacy of the data are seriously influenced are solved.
In this embodiment, after generating the resource subscription task of each downstream system, the method further includes:
determining the processing resource demand of each resource subscription task for the corresponding downstream system according to the task parameter of the resource subscription task;
detecting a first running process of each downstream system and a first running process of each first running process;
estimating first resource occupation of each first running process according to the first running process of the first running process;
calculating a leading index of the system resource utilization state of each downstream system according to the parameters:
Figure BDA0003853361890000081
wherein, mu i A leading indicator, p, expressed as the system resource utilization status of the ith downstream system i Expressed as the total index of the system resource utilization state of the ith downstream system, ni is expressed as the number of first running processes of the ith downstream system, j is expressed as the jth first running process, f 1 () Expressed as a predetermined system resource utilization state occupancy index calculation function, F 1j Expressed as resource occupation, theta, of the jth first running process j Resource service rate, F, expressed as the jth first running process 2i Expressed as the total amount of system resources, G, of the ith downstream system i Expressed as the service response frequency of the ith downstream system;
determining the binding state of the system resources of each downstream system according to the leading index of the system resource utilization state of the downstream system;
determining whether the downstream system meets the processing requirement of the resource subscription task corresponding to the downstream system or not based on the tense state of the system resource of each downstream system and the processing resource demand of the resource subscription task corresponding to the downstream system, if so, not performing subsequent operation, otherwise, performing resource optimization on the current downstream system which does not meet the processing requirement, specifically:
acquiring a balance operation index of each second operation process of each current downstream system;
calculating the maximum resource release amount of each current downstream system according to the balance operation index of each second operation process of each current downstream system and the second resource occupation amount of the second operation process:
Figure BDA0003853361890000091
wherein D is m max Expressed as the maximum resource release amount of the mth current downstream system, bm is expressed as the number of second running processes of the mth current downstream system, k is expressed as the kth second running process, I k Second resource occupation, f, expressed as the kth second running process 2 () Expressed as an adaptive resource release function, p k1 Expressed as the current running index, p, of the kth second running process k2 Expressed as the equilibrium operating index, beta, of the kth second operating course m Expressed as the performance index of the mth current downstream system;
and releasing the system resources of the current downstream system according to the maximum resource release amount of each current downstream system until the current downstream system meets the processing requirement of the resource subscription task corresponding to the current downstream system.
The beneficial effects of the above technical scheme are: whether the system resource utilization of the downstream system is tense or not can be quickly evaluated by calculating the leading index of the system resource utilization state of each downstream system, whether the downstream system has the capability of processing the corresponding resource subscription task or not can be quickly evaluated so as to carry out follow-up self-adaptive processing, the practicability and the stability are improved, furthermore, the maximum resource release amount of each current downstream system is calculated so as to carry out resource release on the current downstream system, so that each current downstream system can be ensured to have enough resources to process the resource subscription task of the current downstream system, and the stability and the practicability are further improved.
In one embodiment, as shown in fig. 2, the receiving a data retrieval request from a downstream system includes:
step S201, determining a terminal identification of each downstream system corresponding to a first terminal, and acquiring identity token information of each first terminal based on the terminal identification;
step S202, performing identity qualification verification on each first terminal according to the identity token information of the first terminal, and screening qualified second terminals according to verification results;
step S203, acquiring associated configuration data of each second terminal in the data management terminal, and screening out a third terminal with data calling permission from the plurality of second terminals based on the associated configuration data;
step S204, detecting the first session request of each third terminal and analyzing whether the first session request includes the data invoking instruction, if yes, confirming the first session request as the data invoking request sent by the target downstream system corresponding to the third terminal.
The beneficial effects of the above technical scheme are: the third terminal which is in accordance with the data calling condition is screened out by the terminal in the modes of identity verification and authority verification, so that the data calling request sent by a downstream system can be accurately obtained, the processing number of the dialog boxes is reduced, and the efficiency and the precision of obtaining the data calling request are improved.
In one embodiment, before parsing the data retrieval request to determine key fields of data to be retrieved for each downstream system, the method further comprises:
determining an applicable condition program of each type of data according to the functional characteristics, the service and the operation parameters of each type of data in the data management terminal;
detecting the configuration parameters of each third terminal, and determining the system operation parameters of a target downstream system corresponding to each third terminal according to the configuration parameters of each third terminal;
evaluating the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal;
and confirming whether the compatibility is greater than or equal to a preset threshold value, if so, not needing to carry out subsequent operation, and otherwise, sending a prompt that the data to be called are not suitable to a target third terminal with the compatibility smaller than the preset threshold value.
The beneficial effects of the above technical scheme are: the effective utilization rate of the data to be called of the downstream system can be effectively evaluated by evaluating the compatibility of the data to be called of each downstream system and the downstream system, so that the data calling personnel can adjust and withdraw the data to be called in time, and the practicability is further improved.
In one embodiment, as shown in fig. 3, the parsing the data invoking request to determine the key fields of the data to be invoked of each downstream system includes:
step S301, analyzing the data calling request to obtain a plurality of keywords, and constructing a keyword dynamic association matrix corresponding to the data calling request according to the association of every two keywords;
step S302, a plurality of common associated data of a plurality of keywords are called in the data management terminal;
step S303, determining the association weight of each first keyword and other second keywords based on the keyword dynamic association matrix, and determining data to be called in a plurality of common association data according to the association weight;
step S304, determining a preset request return field corresponding to the data to be called, and determining the preset request return field as a key field of the data to be called.
The beneficial effects of the above technical scheme are: the data to be called can be quickly screened from the database according to the association weight relationship of each keyword by constructing the keyword dynamic association matrix corresponding to the data calling request, the data screening efficiency is improved, the condition that the screened data is inaccurate due to the fact that the data screening is not needed to be carried out on a single keyword is avoided, and the stability and the practicability are further improved.
In one embodiment, the invoking, based on the key field, related data from the data management terminal to publish on the docking platform to generate a resource subscription task for each downstream system includes:
determining the home service according to the key field;
establishing network connection between the data management terminal and the docking platform, uploading home services corresponding to data calling requests sent by each downstream system to the docking platform respectively, and constructing a task bar corresponding to each relevant data;
importing the data calling request sent by each downstream system into a task bar corresponding to the related data;
and acquiring the platform work account number of each downstream system, and associating the platform work account number of each downstream system with the task bar of the downstream system to generate the resource subscription task of the downstream system.
The beneficial effects of the above technical scheme are: by constructing the task bar, the expected service of each downstream system can be stably stored, and meanwhile, the exclusive resource subscription task can be customized for the platform account of each downstream system, so that task screening of each downstream system is not needed, the working efficiency is improved, and the practicability is further improved.
In one embodiment, the subscribing and permission approval of each downstream system based on the resource subscription task, and after the approval, performing data retrieval service for each downstream system according to the authentication information of each downstream system includes:
detecting the subscription condition of each downstream system to the corresponding resource subscription task;
determining the subscription state of each downstream system for the resource subscription task corresponding to the downstream system according to the subscription condition;
determining a subscribed first downstream system and an unsubscribed second downstream system according to the subscription state;
and carrying out authority examination and approval on the first downstream systems, acquiring the authentication information of each first downstream system after the examination and approval is passed, and carrying out data calling service for the first downstream systems according to the authentication information.
The beneficial effects of the above technical scheme are: the expected service of the downstream system can be stably transmitted to each downstream system, the stability is further improved, and the safety and the privacy of data can be further ensured by examining and approving the downstream systems.
In one embodiment, the acquiring associated configuration data of each second terminal in the data management terminal, and screening out a third terminal having a data retrieval right from the plurality of second terminals based on the associated configuration data includes:
acquiring a terminal parameter of each second terminal;
acquiring associated configuration data of each second terminal in the data management terminal according to the terminal parameters of the second terminal;
acquiring authorization characteristic information of each second terminal according to the associated configuration data of the second terminal;
and determining a plurality of authority characteristics of each second terminal based on the authorization characteristic information of the second terminal, and screening out a third terminal with data calling related authority characteristics in the plurality of authority characteristics.
The beneficial effects of the above technical scheme are: the authorization authority information of each second terminal can be comprehensively known by acquiring the authorization characteristic information of each second terminal in the data management terminal, so that whether the second terminal has the data calling authority or not can be quickly determined, and the screening efficiency and the screening precision are improved.
In an embodiment, the evaluating the compatibility between the currently applicable condition program of the target data to be called of each third terminal and the system operating parameters of the target downstream system corresponding to the third terminal includes:
determining the operating environment parameters of the current applicable condition program of the target data to be called of each third terminal;
determining a jumpable environment factor according to the operating environment parameters of the current applicable condition program of the target data to be called of each third terminal;
constructing an interference scene of the current applicable condition program according to the change interval of each bounceable environment factor and the operation influence degree of the bounceable environment factor on the current applicable condition program;
constructing an interference model of a current applicable condition program based on the scene parameters of the interference scene;
determining random response data of system operation parameters of a target downstream system corresponding to each third terminal under an interference model of a current applicable condition program of the third terminal;
and determining the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the distribution condition of the random response data.
The beneficial effects of the above technical scheme are: the compatibility between the system and the program can be quickly determined by taking the interference factor of each condition program as an evaluation condition through constructing the interference model of the current applicable condition program of each third terminal to evaluate the response condition of the system operation parameter so as to evaluate the compatibility, and compared with the condition program in which the compatibility factor of the condition program is taken as an evaluation condition, the evaluation is quicker and more accurate, and the practicability is further improved.
In an embodiment, the determining, according to the distribution of the random response data, the compatibility between the current applicable condition program of the target data to be called of each third terminal and the system operating parameter of the target downstream system corresponding to the third terminal includes:
determining the response variation amplitude of each system operation parameter of each third terminal according to the distribution condition of the random response data;
selecting target item system operation parameters with response variation amplitude larger than or equal to preset amplitude;
confirming the operation coverage rate of the target item system operation parameters on a target downstream system corresponding to each third terminal;
and determining the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the operation coverage rate of the target item system operation parameters to the target downstream system corresponding to each third terminal.
The beneficial effects of the above technical scheme are: the compatibility between the system and the program can be evaluated by screening the target item system operation parameters with large response change amplitude and further determining the operation coverage rate of the target item system operation parameters, whether the system is matched with the program or not and the operation of the carrying program can be reasonably evaluated according to the operation occupation proportion of the target item system operation parameters in the system, and the rationality and the objectivity of the evaluation result are improved.
In one embodiment, as shown in fig. 4, includes:
the management side defines the return field and the authority verification information of the data service in a commodity creating mode, and the return field and the authority verification information are provided for a downstream system to subscribe after being released. And after subscribing and approving the downstream system, acquiring corresponding data by calling the data service.
Through the technical scheme, data required to be used by a downstream system are reasonably and safely released into service commodities through means of field management and control, authority verification and flow limitation, and after the downstream system subscribes, services can be called through an approval party, so that the problems of safety and applicability of data exposure are effectively solved.
The embodiment also discloses a configurable data service exposure solution system, as shown in fig. 5, the system includes:
a receiving module 501, configured to receive a data retrieval request sent by a downstream system;
an analysis module 502, configured to analyze the data retrieval request to determine a key field of the data to be retrieved for each downstream system;
a generating module 503, configured to invoke, based on the key field, relevant data from the data management terminal and publish the relevant data on the docking platform to generate a resource subscription task for each downstream system;
and the approval module 504 is configured to subscribe and approve the authority of each downstream system based on the resource subscription task, and perform data retrieval service for each downstream system according to the authentication information of the downstream system after approval is passed.
The working principle and the advantageous effects of the above technical solution have been explained in the method claims, and are not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice in the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A configurable data service exposure solution, comprising the steps of:
receiving a data calling request sent by a downstream system;
analyzing the data calling request to determine the key field of the data to be called of each downstream system;
relevant data are called from the data management terminal based on the key fields and published to a docking platform so as to generate a resource subscription task of each downstream system;
and subscribing and authority examining and approving each downstream system based on the resource subscribing task, and performing data calling service for each downstream system according to the authentication information of the downstream system after the examination and approval is passed.
2. The configurable data service exposure solution of claim 1, wherein the receiving of the data retrieval request from the downstream system comprises:
determining a terminal identifier of each downstream system corresponding to the first terminal, and acquiring identity token information of each first terminal based on the terminal identifier;
performing identity qualification verification on each first terminal according to the identity token information of the first terminal, and screening qualified second terminals according to verification results;
acquiring the associated configuration data of each second terminal in the data management terminal, and screening out a third terminal with data retrieval authority from the plurality of second terminals based on the associated configuration data;
and detecting the first session request of each third terminal and analyzing whether the first session request contains a data calling instruction, and if so, confirming the first session request as the data calling request sent by a target downstream system corresponding to the third terminal.
3. The configurable data service exposure solution of claim 2, wherein prior to parsing the data invocation request to determine key fields of data to be invoked for each downstream system, the method further comprises:
determining an applicable condition program of each type of data according to the functional characteristics, the service and the operation parameters of each type of data in the data management terminal;
detecting the configuration parameters of each third terminal, and determining the system operation parameters of a target downstream system corresponding to each third terminal according to the configuration parameters of each third terminal;
evaluating the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal;
and determining whether the compatibility is greater than or equal to a preset threshold, if so, not needing subsequent operation, and otherwise, sending a prompt that the data to be called are not suitable to the target third terminal with the compatibility less than the preset threshold.
4. The configurable data service exposure solution according to claim 1, wherein the parsing the data retrieval request to determine key fields of data to be retrieved for each downstream system comprises:
analyzing the data calling request to obtain a plurality of keywords, and constructing a keyword dynamic association matrix corresponding to the data calling request according to the association of every two keywords;
calling a plurality of common associated data of a plurality of keywords in the data management terminal;
determining the association weight of each first keyword and other second keywords based on the keyword dynamic association matrix, and determining data to be called in a plurality of common association data according to the association weight;
and determining a preset request return field corresponding to the data to be called, and determining the preset request return field as a key field of the data to be called.
5. The configurable data service exposure solution according to claim 1, wherein the task of invoking relevant data from a data management terminal to publish to a docking platform based on the key field to generate resource subscription for each downstream system comprises:
determining the home service according to the key field;
establishing network connection between the data management terminal and the docking platform, uploading home services corresponding to data retrieval requests sent by each downstream system to the docking platform respectively, and constructing a task bar corresponding to each relevant data;
importing the data calling request sent by each downstream system into a task bar corresponding to the related data;
and acquiring the platform work account number of each downstream system, and associating the platform work account number of each downstream system with the task bar of the downstream system to generate the resource subscription task of the downstream system.
6. The configurable data service exposure solution method according to claim 1, wherein the subscribing and permission approving are performed on each downstream system based on the resource subscription task, and after the approving is passed, a data retrieval service is performed on each downstream system according to authentication information of the downstream system, including:
detecting the subscription condition of each downstream system for the corresponding resource subscription task;
determining the subscription state of each downstream system for the resource subscription task corresponding to the downstream system according to the subscription condition;
determining a subscribed first downstream system and an unsubscribed second downstream system according to the subscription state;
and carrying out authority examination and approval on the first downstream systems, acquiring the authentication information of each first downstream system after the examination and approval is passed, and carrying out data calling service for the first downstream systems according to the authentication information.
7. The configurable data service exposure solution according to claim 2, wherein the obtaining of the associated configuration data of each second terminal in the data management terminal, and the screening out a third terminal having a data invoking right from the plurality of second terminals based on the associated configuration data comprises:
acquiring a terminal parameter of each second terminal;
acquiring associated configuration data of each second terminal in the data management terminal according to the terminal parameters of the second terminal;
acquiring authorization characteristic information of each second terminal according to the associated configuration data of the second terminal;
and determining a plurality of authority characteristics of each second terminal based on the authorization characteristic information of the second terminal, and screening out a third terminal with data calling related authority characteristics in the plurality of authority characteristics.
8. The configurable data service exposure solution according to claim 4, wherein the evaluating the compatibility between the currently applicable conditional procedure of the target data to be called of each third terminal and the system operating parameters of the target downstream system corresponding to the third terminal comprises:
determining the operating environment parameters of the current applicable condition program of the target data to be called of each third terminal;
determining a bounceable environment factor according to the operating environment parameters of the current applicable condition program of the target data to be called of each third terminal;
constructing an interference scene of the current applicable condition program according to the change interval of each jitterable environment factor and the operation influence degree of the change interval on the current applicable condition program;
constructing an interference model of a current applicable condition program based on the scene parameters of the interference scene;
determining random response data of system operation parameters of a target downstream system corresponding to each third terminal under an interference model of a current applicable condition program of the third terminal;
and determining the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the distribution condition of the random response data.
9. The configurable data service exposure solution method according to claim 8, wherein the determining, according to the distribution of the random response data, a degree of compatibility between a currently applicable conditional processing of the target data to be called of each third terminal and a system operating parameter of a target downstream system corresponding to the third terminal includes:
determining the response variation amplitude of each system operation parameter of each third terminal according to the distribution condition of the random response data;
selecting target item system operation parameters with response variation amplitude larger than or equal to preset amplitude;
confirming the operation coverage rate of the target item system operation parameters on a target downstream system corresponding to each third terminal;
and determining the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the operation coverage rate of the target item system operation parameters to the target downstream system corresponding to each third terminal.
10. A configurable data service exposure resolution system, the system comprising:
the receiving module is used for receiving a data calling request sent by a downstream system;
the analysis module is used for analyzing the data calling request to determine the key field of the data to be called of each downstream system;
the generating module is used for calling related data from the data management terminal based on the key fields and publishing the related data to the docking platform so as to generate a resource subscription task of each downstream system;
and the approval module is used for subscribing and approving the authority of each downstream system based on the resource subscription task, and performing data calling service for each downstream system according to the authentication information of the downstream system after approval is passed.
CN202211140494.4A 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure Active CN115495783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211140494.4A CN115495783B (en) 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211140494.4A CN115495783B (en) 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure

Publications (2)

Publication Number Publication Date
CN115495783A true CN115495783A (en) 2022-12-20
CN115495783B CN115495783B (en) 2023-05-23

Family

ID=84469679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211140494.4A Active CN115495783B (en) 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure

Country Status (1)

Country Link
CN (1) CN115495783B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359350A (en) * 1995-02-13 2009-02-04 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
CN105677774A (en) * 2015-12-30 2016-06-15 百度在线网络技术(北京)有限公司 Data event pushing method and device
CN107430712A (en) * 2014-12-19 2017-12-01 艾诺茨Ip公司 Resource management system is can access with the network that can be allocated management of
US20180063564A1 (en) * 2016-08-26 2018-03-01 Adobe Systems Incorporated Subscription service for authorizing access to media content
CN109271807A (en) * 2018-08-20 2019-01-25 深圳萨摩耶互联网金融服务有限公司 The data safety processing method and system of database
CN110336872A (en) * 2019-06-28 2019-10-15 上海指旺信息科技有限公司 The method, apparatus and system of third party's data acquisition
US20200244657A1 (en) * 2019-01-28 2020-07-30 Canon Kabushiki Kaisha Management apparatus and control method for same
CN111488598A (en) * 2020-04-09 2020-08-04 腾讯科技(深圳)有限公司 Access control method, device, computer equipment and storage medium
US20200311294A1 (en) * 2019-03-25 2020-10-01 China Electronics Technology Group Corporation Information Science Academy System and Method for Inter-sharing Data Among Data Users, Computing Device and Computer-Readable Storage Medium
CN112148679A (en) * 2020-09-21 2020-12-29 江苏锐创软件技术有限公司 Data interaction method, system, device and storage medium based on multiple data platforms
CN113111339A (en) * 2021-05-13 2021-07-13 数字广东网络建设有限公司 Access control method, device, equipment and medium for application service
US20210297271A1 (en) * 2020-03-18 2021-09-23 International Business Machines Corporation Subscription service for networks
CN113434766A (en) * 2021-06-30 2021-09-24 青岛海尔科技有限公司 Subscription information pushing method and device, storage medium and electronic device
CN113596082A (en) * 2021-06-21 2021-11-02 青岛海尔科技有限公司 Method and system for determining equipment data and electronic device
US20220067200A1 (en) * 2020-09-01 2022-03-03 Microsoft Technology Licensing, Llc Chaining, triggering, and enforcing entitlements
CN114218538A (en) * 2021-11-19 2022-03-22 中国建设银行股份有限公司 Authority control method and device, computer equipment and storage medium
WO2022142629A1 (en) * 2020-12-28 2022-07-07 深圳壹账通智能科技有限公司 User data processing method and apparatus, computer device, and storage medium
CN115086347A (en) * 2022-05-20 2022-09-20 北京中科江南信息技术股份有限公司 Data synchronization method and device, electronic equipment and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359350A (en) * 1995-02-13 2009-02-04 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
CN107430712A (en) * 2014-12-19 2017-12-01 艾诺茨Ip公司 Resource management system is can access with the network that can be allocated management of
CN105677774A (en) * 2015-12-30 2016-06-15 百度在线网络技术(北京)有限公司 Data event pushing method and device
US20180063564A1 (en) * 2016-08-26 2018-03-01 Adobe Systems Incorporated Subscription service for authorizing access to media content
CN109271807A (en) * 2018-08-20 2019-01-25 深圳萨摩耶互联网金融服务有限公司 The data safety processing method and system of database
US20200244657A1 (en) * 2019-01-28 2020-07-30 Canon Kabushiki Kaisha Management apparatus and control method for same
US20200311294A1 (en) * 2019-03-25 2020-10-01 China Electronics Technology Group Corporation Information Science Academy System and Method for Inter-sharing Data Among Data Users, Computing Device and Computer-Readable Storage Medium
CN110336872A (en) * 2019-06-28 2019-10-15 上海指旺信息科技有限公司 The method, apparatus and system of third party's data acquisition
US20210297271A1 (en) * 2020-03-18 2021-09-23 International Business Machines Corporation Subscription service for networks
CN111488598A (en) * 2020-04-09 2020-08-04 腾讯科技(深圳)有限公司 Access control method, device, computer equipment and storage medium
US20220067200A1 (en) * 2020-09-01 2022-03-03 Microsoft Technology Licensing, Llc Chaining, triggering, and enforcing entitlements
CN112148679A (en) * 2020-09-21 2020-12-29 江苏锐创软件技术有限公司 Data interaction method, system, device and storage medium based on multiple data platforms
WO2022142629A1 (en) * 2020-12-28 2022-07-07 深圳壹账通智能科技有限公司 User data processing method and apparatus, computer device, and storage medium
CN113111339A (en) * 2021-05-13 2021-07-13 数字广东网络建设有限公司 Access control method, device, equipment and medium for application service
CN113596082A (en) * 2021-06-21 2021-11-02 青岛海尔科技有限公司 Method and system for determining equipment data and electronic device
CN113434766A (en) * 2021-06-30 2021-09-24 青岛海尔科技有限公司 Subscription information pushing method and device, storage medium and electronic device
CN114218538A (en) * 2021-11-19 2022-03-22 中国建设银行股份有限公司 Authority control method and device, computer equipment and storage medium
CN115086347A (en) * 2022-05-20 2022-09-20 北京中科江南信息技术股份有限公司 Data synchronization method and device, electronic equipment and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
NATHALIE BARACALDO 等: "Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage" *
田晶: "基于微服务的数据交换与共享平台的研究与实现" *
郭春芳: "不确定性分析视角下大数据信息服务定价研究" *
黄锦辉: "福建烟草数据中心主数据管理系统的设计与实现" *

Also Published As

Publication number Publication date
CN115495783B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
US10609087B2 (en) Systems and methods for generation and selection of access rules
CN111694644A (en) Message processing method and device based on robot operating system and computer equipment
CN112446786A (en) Abnormal transaction processing method and device, electronic equipment and readable storage medium
CN113595926B (en) API data transmission method, device, equipment and medium based on data middlebox
CN112235428B (en) Call request processing method and device, computer equipment and storage medium
CN115495783B (en) Method and system for solving configuration type data service exposure
CN109727040B (en) Data publishing method, data calling method, device and storage medium
CN109274533B (en) Web service fault positioning device and method based on rule engine
CN111681094A (en) Method and device for monitoring resource strategy abnormity and electronic equipment
CN116308749A (en) Interface fusing processing method and device, computer equipment and storage medium
US20190050791A1 (en) Methods and Apparatus for Automatically Generating and Managing Test Customer Accounts
CN112039893B (en) Private transaction processing method and device, electronic equipment and readable storage medium
CN116562951A (en) User report information generation method and device, readable storage medium and electronic equipment
CN116266328A (en) Account data checking method and device and electronic equipment
CN113901153A (en) Data processing method and related equipment
CN111311102A (en) Resource ratio adjusting method, device, equipment and computer readable storage medium
CN112202581A (en) Group joining method and device and electronic equipment
CN111611066A (en) Task execution method, task execution server, and storage medium
CN113742664B (en) Monitoring and auditing method, equipment and system
CN117041356B (en) Index distribution method, index calculation method, apparatus, electronic device and system
CN113590426B (en) Cross-trust-domain service monitoring method and system based on blockchain
CN117768155A (en) Access request processing method and device, storage medium and electronic equipment
CN112199665A (en) Control method for IT resource use
CN117579322A (en) Data processing method based on block chain and related equipment
CN112907278A (en) Rights object allocation control method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant