CN117041343B - Request processing method, apparatus, electronic device and computer readable medium - Google Patents

Request processing method, apparatus, electronic device and computer readable medium Download PDF

Info

Publication number
CN117041343B
CN117041343B CN202310820781.8A CN202310820781A CN117041343B CN 117041343 B CN117041343 B CN 117041343B CN 202310820781 A CN202310820781 A CN 202310820781A CN 117041343 B CN117041343 B CN 117041343B
Authority
CN
China
Prior art keywords
data
access
information
storage medium
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310820781.8A
Other languages
Chinese (zh)
Other versions
CN117041343A (en
Inventor
徐起
单既桢
王晓萍
崔硕
步飞
韩艺嘉
郭冉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongguancun Smart City Co Ltd
Original Assignee
Zhongguancun Smart City Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongguancun Smart City Co Ltd filed Critical Zhongguancun Smart City Co Ltd
Priority to CN202310820781.8A priority Critical patent/CN117041343B/en
Publication of CN117041343A publication Critical patent/CN117041343A/en
Application granted granted Critical
Publication of CN117041343B publication Critical patent/CN117041343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Abstract

Embodiments of the present disclosure disclose a request processing method, apparatus, electronic device, and computer readable medium. One embodiment of the method comprises the following steps: responding to the received target access request, and carrying out request analysis on the target access request; determining access data information of a client corresponding to the terminal identification information in a target time period; determining data loading information corresponding to the access data information according to the data access authority, the data access frequency and the cache loading address identification included in the access data information; generating a virtual access object according to the authentication identification information and the user identification information in response to determining that the authentication identification information characterizes authentication passing; and performing data access on the data corresponding to the access data information according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object. This embodiment reduces the response time of the access request and the overhead of access request control for the user.

Description

Request processing method, apparatus, electronic device and computer readable medium
Technical Field
Embodiments of the present disclosure relate to the field of computer technology, and in particular, to a method, an apparatus, an electronic device, and a computer readable medium for processing a request.
Background
With the development of internet related technologies, people have increasingly demanded the use of the internet, and two common architectures for the internet, namely a browser/server architecture or a client/server architecture, need to process an access request through a server. At present, when an access request is processed, when a server receives the access request, data requested by the access request is transmitted to a browser or a client through data exchange between a memory and data transmission.
However, the inventors found that when the above manner is adopted, there are often the following technical problems:
firstly, because the data requested by different access requests are different, when the number of the access requests in unit time is increased, frequent data inquiry is often required to be performed in the external memory according to the different access requests, so that the response time of the access requests is increased;
secondly, the data access division mode with the granularity of the user leads to higher cost of access request control for the user;
Thirdly, the caching cost of different caching media is different, and the data caching mode is directly carried out, so that efficient utilization of the caching media is difficult to achieve.
The above information disclosed in this background section is only for enhancement of understanding of the background of the inventive concept and, therefore, may contain information that does not form the prior art that is already known to those of ordinary skill in the art in this country.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a request processing method, apparatus, electronic device, and computer readable medium to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a request processing method, the method comprising: in response to receiving a target access request, carrying out request analysis on the target access request to obtain access user identity information, wherein the access user identity information comprises: terminal identification information, authentication identification information and user identification information; determining access data information of a client corresponding to the terminal identification information in a target time period to obtain an access data information set, wherein the access data information in the access data information set comprises: data storage address, data access authority, data access frequency and cache loading address identification; for each piece of access data information in the access data information set, determining data loading information corresponding to the access data information according to the data access authority, the data access frequency and the cache loading address identifier included in the access data information, wherein the data loading information comprises: the storage medium type and the data cache address are the address after data caching corresponding to the data storage address; responding to the fact that the authentication identification information characterizes authentication to pass, and generating a virtual access object according to the authentication identification information and the user identification information to obtain virtual access object information; and performing data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
In a second aspect, some embodiments of the present disclosure provide a request processing apparatus, the apparatus comprising: the request analysis unit is configured to respond to the received target access request, and perform request analysis on the target access request to obtain access user identity information, wherein the access user identity information comprises: terminal identification information, authentication identification information and user identification information; a first determining unit, configured to determine access data information of a client corresponding to the terminal identification information in a target time period, to obtain an access data information set, where the access data information in the access data information set includes: data storage address, data access authority, data access frequency and cache loading address identification; a second determining unit configured to determine, for each piece of access data information in the access data information set, data loading information corresponding to the piece of access data information according to a data access right, a data access frequency, and a cache loading address identifier included in the piece of access data information, where the data loading information includes: the storage medium type and the data cache address are the address after data caching corresponding to the data storage address; a generation unit configured to generate a virtual access object according to the authentication identification information and the user identification information in response to determining that the authentication identification information characterizes authentication passing, and obtain virtual access object information; and the data access unit is configured to perform data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
In a third aspect, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors causes the one or more processors to implement the method described in any of the implementations of the first aspect above.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect above.
The above embodiments of the present disclosure have the following advantageous effects: by the request processing method of some embodiments of the present disclosure, the response time of the access request, and the overhead of access request control for the user are reduced. Specifically, the reason for the longer response time of the access request and the larger overhead of access request control for the user is that: firstly, because the data requested by different access requests are different, when the number of the access requests in unit time is increased, frequent data inquiry is often required to be performed in the external memory according to the different access requests, so that the response time of the access requests is increased; second, the user-granularity data access division results in a large overhead for access request control for the user. Based on this, the request processing method of some embodiments of the present disclosure first, in response to receiving a target access request, performs request parsing on the target access request to obtain access user identity information, where the access user identity information includes: terminal identification information, authentication identification information and user identification information. Then, determining access data information of the client corresponding to the terminal identification information in a target time period to obtain an access data information set, wherein the access data information in the access data information set comprises: data storage address, data access rights, data access frequency and cache loading address identification. Thereby obtaining historical data accessed by the client corresponding to the terminal identification information. Secondly, for each piece of access data information in the access data information set, determining data loading information corresponding to the access data information according to the data access authority, the data access frequency and the cache loading address identifier included in the access data information, wherein the data loading information comprises: the storage medium type and the data cache address are the data cache addresses corresponding to the data storage addresses. In practice, since the probability of being accessed and the importance of the data corresponding to different access data information are different, it is necessary to determine the data cache address and the type of the cache medium in the cache of the data corresponding to different access data information. Further, in response to determining that the authentication identification information characterizes authentication passing, generating a virtual access object according to the authentication identification information and the user identification information, and obtaining virtual access object information. In order to secure the data of the accessed data, a corresponding authentication is required. Meanwhile, by generating the virtual access object, the abstraction of users with the same type or the same access authority is realized. Compared with the data access dividing mode with the granularity of the user, the overhead of access request control can be reduced. And finally, performing data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information. In this way, the response time of the access request is reduced, as well as the overhead of access request control for the user.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow chart of some embodiments of a request processing method according to the present disclosure;
FIG. 2 is a schematic diagram of the architecture of some embodiments of a request processing apparatus according to the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Referring to fig. 1, a flow 100 of some embodiments of a request processing method according to the present disclosure is shown. The request processing method comprises the following steps:
Step 101, in response to receiving the target access request, performing request analysis on the target access request to obtain access user identity information.
In some embodiments, in response to receiving the target access request, an executing body (e.g., computing device) of the request processing method may perform request resolution on the target access request to obtain access user identity information. Wherein the target access request may be an access request sent by a browser or client. The access user identity information may characterize identity information corresponding to the user and terminal that sent the target access request. The accessing the user identity information includes: terminal identification information, authentication identification information and user identification information. Wherein the terminal identification information characterizes an identification of a terminal that sent the target access request. In practice, the terminal identification information may be a MAC address. The authentication identification information characterizes whether the terminal corresponding to the terminal identification information passes the terminal authentication. The user identity information characterizes the user identity of the target access request. In practice, the user identification information may be a user number. In practice, the executing body may perform request decapsulation on the target access request to obtain the access user identity information.
The computing device may be hardware or software. When the computing device is hardware, the computing device may be implemented as a distributed cluster formed by a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the computing device is embodied as software, it may be installed in the hardware devices listed above. It may be implemented as a plurality of software or software modules, for example, for providing distributed services, or as a single software or software module. The present invention is not particularly limited herein. It should be appreciated that the number of computing devices may have any number, as desired for implementation.
In some optional implementations of some embodiments, the executing body may perform request parsing on the target access request to obtain access user identity information, and may include the following steps:
and firstly, carrying out request decryption on the target access request to obtain a decrypted access request.
In practice, the target access request may be a request encrypted by a cryptographic algorithm.
And secondly, carrying out message decapsulation on the decrypted access request to obtain a decapsulated message.
Wherein, the decapsulated message includes: a data storage block and a data verification block. The data storage block includes: and accessing the user identity information to be verified. The data verification block includes: and (5) checking the code. In practice, the check code may be a numerical code for checking whether the identity information of the access user to be checked is complete. Specifically, the executing body may decapsulate the decrypted access request according to a request format of the decrypted access request, to obtain the decapsulated message.
And thirdly, performing cyclic redundancy check on the identity information of the access user to be checked to generate a target check code.
In practice, the executing entity may perform cyclic redundancy check on the access user identity information to be checked through a CRC (Cyclic Redundancy Check ) algorithm to generate a target check code.
And step four, determining the access user identity information to be verified as the access user identity information in response to determining that the target check code is consistent with the check code.
Step 102, determining access data information of the client corresponding to the terminal identification information in a target time period to obtain an access data information set.
In some embodiments, the executing body may determine access data information of the client corresponding to the terminal identification information in the target period of time, to obtain the access data information set. Wherein the access data information in the access data information set includes: data storage address, data access rights, data access frequency and cache loading address identification. The data storage address is a storage address of the data corresponding to the access data information in the external memory. The data access rights characterize the lowest access rights of the data corresponding to the access data information. In practice, the data access rights may be characterized by a hierarchy. The data access frequency represents the number of times data corresponding to the data access information is accessed in a target time period. The cache loading address identifier characterizes whether the data corresponding to the data access information is currently loaded into the cache. The target period of time may be a preset period of time. In practice, the executing body may perform database retrieval with the terminal identification information as a query field and the target time period as a time constraint, to obtain the access data information set.
Step 103, for each piece of access data information in the access data information set, determining data loading information corresponding to the access data information according to the data access authority, the data access frequency and the cache loading address identification included in the access data information.
In some embodiments, for each access data information in the access data information set, the executing body may determine data loading information corresponding to the access data information according to a data access right, a data access frequency and a cache loading address identifier included in the access data information. Wherein the data loading information includes: the storage medium type and the data cache address are the data cache addresses corresponding to the data storage addresses. The storage medium type characterizes the type of the buffer medium used for buffering the data corresponding to the access data information. Wherein the storage medium types include: a first storage medium type and a second storage medium type. Wherein the first storage medium type may be a memory storage medium type. The second storage medium type may be a cache storage medium type. In practice, the executing body can determine the data loading information corresponding to the access data information through a pre-constructed random forest according to the data access authority, the data access frequency and the cache loading address identifier included in the access data information.
In some optional implementations of some embodiments, the determining, by the execution body, data loading information corresponding to the access data information according to the data access right, the data access frequency, and the cache loading address identifier included in the access data information may include the following steps:
first, determining a data access frequency sum of data access frequencies included in each access data information in the access data information set.
As an example, each access data information may include a data access frequency of [100, 200, 300], and the resulting data access frequency sum may be "600".
And a second step of determining a ratio of the data access frequency included in the access data information to the sum of the data access frequencies as a data access frequency ratio.
As an example, the above-described access data information may include a data access frequency of "200". The sum of the data access frequencies may be "600". The data access frequency ratio may be "0.33".
And thirdly, performing authority mapping on the data access authority to obtain the importance of the access data.
As an example, the data access rights may be "level a" and the corresponding access data importance may be "0.9".
And step four, carrying out weighted summation on the data access frequency proportion and the access data importance degree to obtain a weighted summation result.
As an example, the data access frequency ratio may be "0.33", and the corresponding weight may be "0.5". The importance of the access data may be "0.9", and the corresponding weight may be "0.5". The weighted sum result may be "0.415"
And fifth, in response to determining that the weighted sum result is located in the first interval and the cache loading address identifier included in the access data information indicates that the data corresponding to the access data information is not cached, executing the following first processing steps:
a first sub-step of determining the first storage medium type as the storage medium type included in the data loading information corresponding to the access data information.
Wherein the first storage medium type may be a memory storage medium type. The first interval may be [0,0.5].
And a second sub-step of determining a first target storage block according to the real-time storage strategy information corresponding to the first storage medium type.
The real-time storage strategy information is dynamically adjusted according to the storage space size of the storage medium corresponding to the first storage medium type. The first target storage block characterizes a data buffer area in a storage medium corresponding to the first storage medium type, which is used for buffering data corresponding to the access data information. The real-time storage policy information characterizes the caching policy. The caching policy may include: a discrete caching policy and a non-discrete caching policy. Wherein the discrete cache policy characterizes the storage of data in a discontinuous storage area in the memory storage medium. The non-discrete caching policy characterizes the storage of data in contiguous areas of the memory storage medium.
And a third sub-step of storing data corresponding to the access data information stored in a data storage address corresponding location included in the access data information in the first target storage block.
And a fourth sub-step of determining the first address of the first target storage block as a data cache address included in the data loading information corresponding to the access data information.
In some optional implementations of some embodiments, the executing body determines, according to the data access right, the data access frequency, and the cache loading address identifier included in the access data information, data loading information corresponding to the access data information, and may further include the following steps:
in response to determining that the weighted sum result is located in the second interval and the cache loading address identifier included in the access data information indicates that the data corresponding to the access data information is not cached, executing the following second processing steps:
a first sub-step of determining the second storage medium type as the storage medium type included in the data loading information corresponding to the access data information.
Wherein the second interval may be (0.5, 1) the second storage medium type may be a cache storage medium type.
And a second sub-step of determining the real-time available storage block corresponding to the second storage medium type as a second target storage block.
The second target storage block characterizes a data cache area in a storage medium corresponding to the second storage medium type, wherein the data cache area is used for caching data corresponding to the access data information.
And a third sub-step of storing the data corresponding to the access data information in the second target memory block in full in response to determining that the size of the memory space of the real-time available memory block is equal to or larger than the data size of the data corresponding to the access data information, and determining the first address of the second target memory block as the data cache address included in the data loading information corresponding to the access data information.
And a fourth sub-step of, in response to determining that the storage space of the real-time available storage block is smaller than the data size of the data corresponding to the access data information, incrementally storing the data corresponding to the access data information into the second target storage block, and determining the head address of the second target storage block and the data storage address included in the access data information as the data cache address included in the data loading information corresponding to the access data information.
In the content of "in some optional implementations of some embodiments" in step 103, as an invention point of the present disclosure, the third technical problem mentioned in the background art, that is, "the cache cost of different cache media is different, and the data caching manner is directly performed, so that it is difficult to achieve efficient use of the cache media. Based on this, the present disclosure considers that the storage medium corresponding to the first storage medium type and the storage medium corresponding to the second storage medium type have a higher data read/write speed than the storage medium corresponding to the external storage, but the hardware cost of the storage medium corresponding to the first storage medium type is greater than the hardware cost of the external storage, and the hardware cost of the storage medium corresponding to the second storage medium type is greater than the hardware cost of the storage medium corresponding to the first storage medium type. Thus, two ways of determining data loading information are designed for two different types of storage media. Firstly, quantifying the importance degree of access data of the data corresponding to the access data information through the data access authority and the data access frequency, and determining the type of the storage medium which is required to store the data corresponding to the data access information according to the importance degree of the data access. Secondly, considering that the storage space of the storage medium corresponding to the first storage medium type is large, data corresponding to the more important access data information is stored into the storage medium corresponding to the first storage medium type. Meanwhile, considering the problem that the storage space is possibly random in the storage medium corresponding to the first storage medium type, the method and the device determine the storage strategy for accessing the data corresponding to the data information according to the dynamically adjusted real-time storage strategy information. Then, considering that the storage medium corresponding to the first storage medium type has extremely high read/write speed, more important data corresponding to the access data information is stored in the storage medium corresponding to the second storage medium type. However, since the storage space of the storage medium corresponding to the first storage medium type is small, the situation that data overflows is most likely to occur, and therefore, the present disclosure adopts a partial loading manner, that is, the first address of the second target storage block and the data storage address included in the access data information are determined as the data cache address included in the data loading information corresponding to the access data information. By the method, the two cache resources are utilized efficiently.
And 104, responding to the fact that the authentication identification information characterizes the authentication to pass, and generating a virtual access object according to the authentication identification information and the user identity identification information to obtain virtual access object information.
In some embodiments, the executing entity may generate the virtual access object according to the authentication identification information and the user identification information in response to determining that the authentication identification information characterizes authentication passing, and obtain the virtual access object information. The virtual access object may be an instantiation object for an abstract access object.
In some optional implementations of some embodiments, the executing entity generates a virtual access object according to the authentication identification information and the user identification information, to obtain virtual access object information, and may include the following steps:
first, an initial virtual access object is created.
In practice, the execution body may instantiate a virtual access object class. The virtual access object class may be a pre-built class in object-oriented programming.
And secondly, performing access behavior authorization on the initial virtual access object according to the user identity information so as to generate the virtual access object information.
Wherein, the virtual access object information may include: virtual access object number and accessible data list. The accessible data list characterizes accessible data corresponding to the user identification information. In practice, the executing body may perform access behavior authorization on the initial virtual access object according to the data access right corresponding to the user identity information, so as to generate the virtual access object information.
Step 105, performing data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
In some embodiments, the executing body may perform data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
In some optional implementations of some embodiments, the executing body performs, according to a storage medium type and a data cache address included in the data loading information corresponding to the access data information, data access on the data corresponding to the access data information in the access data information set through the virtual access object corresponding to the virtual access object information, and may include the following steps:
First, determining target data loading information.
The target data loading information is data loading information corresponding to the data to be accessed by the virtual access object.
And a second step of performing data access on data corresponding to a data cache address included in the target data loading information in a storage medium corresponding to the storage medium type included in the target data loading information through the virtual access object.
In practice, the execution body may send the data corresponding to the target data loading information accessed by the virtual access object to the client corresponding to the terminal identification information.
Optionally, the method further comprises:
and releasing the data which is stored in the storage medium corresponding to the first storage medium type and the storage medium corresponding to the second storage medium type and corresponds to the access data information in the access data information set in response to determining that the virtual access object is logged off.
In practice, the execution body may perform data erasure on the data corresponding to the storage access data information, the storage medium corresponding to the first storage medium type, and the storage medium corresponding to the second storage medium type.
The above embodiments of the present disclosure have the following advantageous effects: by the request processing method of some embodiments of the present disclosure, the response time of the access request, and the overhead of access request control for the user are reduced. Specifically, the reason for the longer response time of the access request and the larger overhead of access request control for the user is that: firstly, because the data requested by different access requests are different, when the number of the access requests in unit time is increased, frequent data inquiry is often required to be performed in the external memory according to the different access requests, so that the response time of the access requests is increased; second, the user-granularity data access division results in a large overhead for access request control for the user. Based on this, the request processing method of some embodiments of the present disclosure first, in response to receiving a target access request, performs request parsing on the target access request to obtain access user identity information, where the access user identity information includes: terminal identification information, authentication identification information and user identification information. Then, determining access data information of the client corresponding to the terminal identification information in a target time period to obtain an access data information set, wherein the access data information in the access data information set comprises: data storage address, data access rights, data access frequency and cache loading address identification. Thereby obtaining historical data accessed by the client corresponding to the terminal identification information. Secondly, for each piece of access data information in the access data information set, determining data loading information corresponding to the access data information according to the data access authority, the data access frequency and the cache loading address identifier included in the access data information, wherein the data loading information comprises: the storage medium type and the data cache address are the data cache addresses corresponding to the data storage addresses. In practice, since the probability of being accessed and the importance of the data corresponding to different access data information are different, it is necessary to determine the data cache address and the type of the cache medium in the cache of the data corresponding to different access data information. Further, in response to determining that the authentication identification information characterizes authentication passing, generating a virtual access object according to the authentication identification information and the user identification information, and obtaining virtual access object information. In order to secure the data of the accessed data, a corresponding authentication is required. Meanwhile, by generating the virtual access object, the abstraction of users with the same type or the same access authority is realized. Compared with the data access dividing mode with the granularity of the user, the overhead of access request control can be reduced. And finally, performing data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information. In this way, the response time of the access request is reduced, as well as the overhead of access request control for the user.
With further reference to fig. 2, as an implementation of the method shown in the above figures, the present disclosure provides some embodiments of a request processing apparatus, which correspond to those method embodiments shown in fig. 1, and which are particularly applicable in various electronic devices.
As shown in fig. 2, the request processing apparatus 200 of some embodiments includes: a request parsing unit 201, a first determining unit 202, a second determining unit 203, a generating unit 204 and a data accessing unit 205. The request parsing unit 201 is configured to parse the target access request in response to receiving the target access request, so as to obtain access user identity information, where the access user identity information includes: terminal identification information, authentication identification information and user identification information; a first determining unit 202, configured to determine access data information of a client corresponding to the terminal identification information in a target time period, to obtain an access data information set, where the access data information in the access data information set includes: data storage address, data access authority, data access frequency and cache loading address identification; a second determining unit 203, configured to determine, for each piece of access data information in the access data information set, data loading information corresponding to the piece of access data information according to a data access right, a data access frequency, and a cache loading address identifier included in the piece of access data information, where the data loading information includes: the storage medium type and the data cache address are the address after data caching corresponding to the data storage address; a generating unit 204 configured to generate a virtual access object according to the authentication identification information and the user identification information in response to determining that the authentication identification information characterizes authentication passing, and obtain virtual access object information; the data access unit 205 is configured to perform data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
It will be appreciated that the elements described in the request processing device 200 correspond to the various steps in the method described with reference to fig. 1. Thus, the operations, features and advantages described above with respect to the method are equally applicable to the request processing device 200 and the units contained therein, and are not described here again.
Referring now to fig. 3, a schematic diagram of an electronic device (e.g., computing device) 300 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device shown in fig. 3 is merely an example and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 3, the electronic device 300 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various suitable actions and processes in accordance with programs stored in a read-only memory 302 or programs loaded from a storage 308 into a random access memory 303. In the random access memory 303, various programs and data necessary for the operation of the electronic device 300 are also stored. The processing means 301, the read only memory 302 and the random access memory 303 are connected to each other by a bus 304. An input/output interface 305 is also connected to the bus 304.
In general, the following devices may be connected to the I/O interface 305: input devices 306 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 307 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 308 including, for example, magnetic tape, hard disk, etc.; and communication means 309. The communication means 309 may allow the electronic device 300 to communicate with other devices wirelessly or by wire to exchange data. While fig. 3 shows an electronic device 300 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead. Each block shown in fig. 3 may represent one device or a plurality of devices as needed.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via communications device 309, or from storage device 308, or from read only memory 302. The above-described functions defined in the methods of some embodiments of the present disclosure are performed when the computer program is executed by the processing means 301.
It should be noted that, the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (Hyper Text Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: in response to receiving a target access request, carrying out request analysis on the target access request to obtain access user identity information, wherein the access user identity information comprises: terminal identification information, authentication identification information and user identification information; determining access data information of a client corresponding to the terminal identification information in a target time period to obtain an access data information set, wherein the access data information in the access data information set comprises: data storage address, data access authority, data access frequency and cache loading address identification; for each piece of access data information in the access data information set, determining data loading information corresponding to the access data information according to the data access authority, the data access frequency and the cache loading address identifier included in the access data information, wherein the data loading information comprises: the storage medium type and the data cache address are the address after data caching corresponding to the data storage address; responding to the fact that the authentication identification information characterizes authentication to pass, and generating a virtual access object according to the authentication identification information and the user identification information to obtain virtual access object information; and performing data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The described units may also be provided in a processor, for example, described as: a processor includes a request parsing unit, a first determining unit, a second determining unit, a generating unit, and a data accessing unit. The names of the units are not limited to the unit itself in some cases, for example, the data access unit may be described as "a unit that performs data access to data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (10)

1. A request processing method, comprising:
responding to a received target access request, and carrying out request analysis on the target access request to obtain access user identity information, wherein the access user identity information comprises: terminal identification information, authentication identification information and user identification information;
determining access data information of a client corresponding to the terminal identification information in a target time period to obtain an access data information set, wherein the access data information in the access data information set comprises: data storage address, data access authority, data access frequency and cache loading address identification;
For each piece of access data information in the access data information set, determining data loading information corresponding to the access data information according to data access permission, data access frequency and cache loading address identification included in the access data information, wherein the data loading information comprises: the storage medium type and the data cache address are the address after data caching corresponding to the data storage address;
responding to the fact that the authentication identification information characterizes authentication to pass, and generating a virtual access object according to the authentication identification information and the user identification information to obtain virtual access object information;
and performing data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
2. The method of claim 1, wherein the performing request parsing on the target access request to obtain access user identity information comprises:
request decryption is carried out on the target access request, and a decrypted access request is obtained;
And carrying out message decapsulation on the decrypted access request to obtain a decapsulated message, wherein the decapsulated message comprises: a data storage block and a data verification block, the data storage block comprising: the user identity information is accessed to be verified, and the data verification block comprises: checking the code;
performing cyclic redundancy check on the identity information of the access user to be checked to generate a target check code;
and in response to determining that the target check code is consistent with the check code, determining the access user identity information to be checked as the access user identity information.
3. The method of claim 2, wherein the determining the data loading information corresponding to the access data information according to the data access right, the data access frequency and the cache loading address identifier included in the access data information includes:
determining a data access frequency sum of data access frequencies included in each access data information in the access data information set;
determining the ratio of the data access frequency included in the access data information to the sum of the data access frequencies as the ratio of the data access frequencies;
performing authority mapping on the data access authority to obtain the importance of the access data;
Weighting and summing the data access frequency proportion and the access data importance degree to obtain a weighted summation result;
in response to determining that the weighted sum result is located in a first interval and the access data information includes a cache load address identifier that characterizes that data corresponding to the access data information is not cached, performing the following first processing step:
determining the first storage medium type as the storage medium type included in the data loading information corresponding to the access data information;
determining a first target storage block according to real-time storage strategy information corresponding to the first storage medium type, wherein the real-time storage strategy information is dynamically adjusted according to the storage space size of the storage medium corresponding to the first storage medium type, and the first target storage block represents a data cache area for caching data corresponding to the access data information in the storage medium corresponding to the first storage medium type;
storing data corresponding to the access data information and stored in a data storage address corresponding position included in the access data information into the first target storage block;
and determining the first address of the first target storage block as a data cache address included in the data loading information corresponding to the access data information.
4. The method of claim 3, wherein the determining the data loading information corresponding to the access data information according to the data access right, the data access frequency and the cache loading address identifier included in the access data information further includes:
in response to determining that the weighted sum result is located in the second interval and the cache loading address identifier included in the access data information indicates that the data corresponding to the access data information is not cached, performing the following second processing step:
determining a second storage medium type as a storage medium type included in the data loading information corresponding to the access data information;
determining a real-time available storage block corresponding to the second storage medium type as a second target storage block, wherein the second target storage block represents a data cache area for caching data corresponding to the access data information in a storage medium corresponding to the second storage medium type;
in response to determining that the storage space size of the real-time available storage block is larger than or equal to the data size of the data corresponding to the access data information, storing the data corresponding to the access data information in full into the second target storage block, and determining the first address of the second target storage block as a data cache address included in the data loading information corresponding to the access data information;
And in response to determining that the storage space of the real-time available storage block is smaller than the data size of the data corresponding to the access data information, incrementally storing the data corresponding to the access data information into the second target storage block, and determining the head address of the second target storage block and the data storage address included in the access data information as the data cache address included in the data loading information corresponding to the access data information.
5. The method of claim 4, wherein the generating a virtual access object according to the authentication identification information and the user identification information to obtain virtual access object information includes:
creating an initial virtual access object;
and performing access behavior authorization on the initial virtual access object according to the user identity information so as to generate the virtual access object information.
6. The method according to claim 5, wherein the performing, by the virtual access object corresponding to the virtual access object information, the data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information includes:
Determining target data loading information, wherein the target data loading information is data loading information corresponding to data to be accessed by the virtual access object;
and performing data access on data corresponding to a data cache address included in the target data loading information in a storage medium corresponding to the storage medium type included in the target data loading information through the virtual access object.
7. The method of claim 6, wherein the method further comprises:
and responding to the virtual access object logout, and releasing the data which is stored in the storage medium corresponding to the first storage medium type and the storage medium corresponding to the second storage medium type and corresponds to the access data information in the access data information set.
8. A request processing apparatus comprising:
the request analysis unit is configured to respond to receiving a target access request, and conduct request analysis on the target access request to obtain access user identity information, wherein the access user identity information comprises: terminal identification information, authentication identification information and user identification information;
the first determining unit is configured to determine access data information of the client corresponding to the terminal identification information in a target time period to obtain an access data information set, wherein the access data information in the access data information set comprises: data storage address, data access authority, data access frequency and cache loading address identification;
The second determining unit is configured to determine, for each piece of access data information in the access data information set, data loading information corresponding to the piece of access data information according to data access rights, data access frequencies and cache loading address identifiers included in the piece of access data information, where the data loading information includes: the storage medium type and the data cache address are the address after data caching corresponding to the data storage address;
the generating unit is configured to generate a virtual access object according to the authentication identification information and the user identity identification information in response to determining that the authentication identification information characterizes authentication to pass, and obtain virtual access object information;
the data access unit is configured to perform data access on the data corresponding to the access data information in the access data information set according to the storage medium type and the data cache address included in the data loading information corresponding to the access data information through the virtual access object corresponding to the virtual access object information.
9. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
When executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1 to 7.
10. A computer readable medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the method of any of claims 1 to 7.
CN202310820781.8A 2023-07-05 2023-07-05 Request processing method, apparatus, electronic device and computer readable medium Active CN117041343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310820781.8A CN117041343B (en) 2023-07-05 2023-07-05 Request processing method, apparatus, electronic device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310820781.8A CN117041343B (en) 2023-07-05 2023-07-05 Request processing method, apparatus, electronic device and computer readable medium

Publications (2)

Publication Number Publication Date
CN117041343A CN117041343A (en) 2023-11-10
CN117041343B true CN117041343B (en) 2024-02-23

Family

ID=88628785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310820781.8A Active CN117041343B (en) 2023-07-05 2023-07-05 Request processing method, apparatus, electronic device and computer readable medium

Country Status (1)

Country Link
CN (1) CN117041343B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019200664A (en) * 2018-05-17 2019-11-21 日本電気株式会社 Data transfer device and data transfer method
CN113239397A (en) * 2021-05-11 2021-08-10 鸬鹚科技(深圳)有限公司 Information access method, device, computer equipment and medium
CN114640485A (en) * 2020-12-01 2022-06-17 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data
CN114968845A (en) * 2022-05-29 2022-08-30 苏州浪潮智能科技有限公司 Cache processing method, system, equipment and storage medium
CN115933975A (en) * 2022-11-28 2023-04-07 阿里云计算有限公司 Data processing method, computing device and computer system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7451278B2 (en) * 2003-02-13 2008-11-11 Silicon Graphics, Inc. Global pointers for scalable parallel applications
US7958150B2 (en) * 2004-04-30 2011-06-07 International Business Machines Corporation Method for implementing fine-grained access control using access restrictions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019200664A (en) * 2018-05-17 2019-11-21 日本電気株式会社 Data transfer device and data transfer method
CN114640485A (en) * 2020-12-01 2022-06-17 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data
CN113239397A (en) * 2021-05-11 2021-08-10 鸬鹚科技(深圳)有限公司 Information access method, device, computer equipment and medium
CN114968845A (en) * 2022-05-29 2022-08-30 苏州浪潮智能科技有限公司 Cache processing method, system, equipment and storage medium
CN115933975A (en) * 2022-11-28 2023-04-07 阿里云计算有限公司 Data processing method, computing device and computer system

Also Published As

Publication number Publication date
CN117041343A (en) 2023-11-10

Similar Documents

Publication Publication Date Title
US11520912B2 (en) Methods, media, apparatuses and computing devices of user data authorization based on blockchain
US20180309819A1 (en) Endpoint management system providing an application programming interface proxy service
US10171455B2 (en) Protection of application passwords using a secure proxy
US8880634B2 (en) Cache sharing among branch proxy servers via a master proxy server at a data center
US9197611B2 (en) Topic protection policy for publish-subscribe messaging system
US20130179489A1 (en) Accelerating web services applications through caching
US11909845B2 (en) Methods and systems for managing applications of a multi-access edge computing environment
CN112818371A (en) Resource access control method, system, device, equipment and medium
US20240095389A1 (en) Information processing method and apparatus, terminal, and storage medium
CN113760536A (en) Data caching method and device, electronic equipment and computer readable medium
CN113497723B (en) Log processing method, log gateway and log processing system
CN109729189B (en) Method and device for configuring domain name
CN113626795A (en) Verification method and device of distributed system architecture, electronic equipment and storage medium
US9288189B2 (en) Retrieving both sensitive and non-sensitive content in a secure manner
US10645177B2 (en) Cookie based session timeout detection and management
CN111310145B (en) User right verification method and device and electronic equipment
US11449352B2 (en) Systems and methods for converting record formats
CN117041343B (en) Request processing method, apparatus, electronic device and computer readable medium
CN114640533B (en) Method and device for transmitting message, storage medium and electronic equipment
CN113824675B (en) Method and device for managing login state
CN112163176A (en) Data storage method and device, electronic equipment and computer readable medium
CN113765972A (en) Data request response method, device, system, server and storage medium
CN112511565B (en) Request response method and device, computer readable storage medium and electronic equipment
CN113641966B (en) Application integration method, system, equipment and medium
US20180330075A1 (en) Timer and content security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant