WO2017097123A1 - 访问请求转换的方法和装置 - Google Patents
访问请求转换的方法和装置 Download PDFInfo
- Publication number
- WO2017097123A1 WO2017097123A1 PCT/CN2016/107408 CN2016107408W WO2017097123A1 WO 2017097123 A1 WO2017097123 A1 WO 2017097123A1 CN 2016107408 W CN2016107408 W CN 2016107408W WO 2017097123 A1 WO2017097123 A1 WO 2017097123A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access request
- service type
- target service
- url
- parameter information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0226—Mapping or translating multiple network management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5019—Ensuring fulfilment of SLA
- H04L41/5025—Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Definitions
- the present invention relates to data development, and more particularly to a method and apparatus for access request conversion.
- Nginx Module In order to reduce the coupling between modules, some protocol intermediate conversion devices, such as Nginx Module and ServiceMix, are currently applied in the big data platform.
- Nginx Module As shown in FIG. 1, when a request is received, the received request is mapped to the local data table by looking up the configuration file to trigger an instruction stored in the local data table, indicating the handle.
- the module and the plurality of filter modules complete their respective work, thereby returning a response, wherein the handler module is responsible for processing the request and completing the generation of the response content; the filter module processes the response content.
- ServiceMix although more protocols can be supported, protocol extensions can be performed as needed.
- Embodiments of the present invention provide a method and apparatus for access request conversion, to solve the dependency between systems, and improve the management mechanism function of each module of the system.
- the present invention provides a method for access request conversion, the method comprising:
- an embodiment of the present invention provides a device, where the device includes:
- a receiving module configured to receive an access request sent by the client, where the access request includes a uniform resource locator URL and parameter information;
- a determining module configured to determine, according to the URL and the parameter information, a target service type of the access request
- a conversion module configured to convert the access request according to the target service type
- a sending module configured to send, according to the target service type, an access request converted according to the target service type to a server end corresponding to the target service type, for the server end, and returning result information according to the target service type converted access request .
- a method and apparatus for access request conversion determines a target service type of an access request according to the received access request, parses the access request into a data structure corresponding to the target service type, and provides the corresponding data structure
- the server side implements the function of the multi-network unified request interface in the big data platform environment, decouples the dependencies between the systems, and improves the system's management mechanism function for each module.
- FIG. 1 is a schematic structural diagram of a Nginx Lua system in the prior art
- FIG. 2 is a flowchart of an access request conversion method according to an embodiment of the present application.
- FIG. 3 is a schematic structural diagram of a device according to an embodiment of the present disclosure.
- FIG. 5 is a schematic structural diagram of a device according to another embodiment of the present application.
- the method and device for access request conversion provided by the embodiment of the present application are applicable to a big data platform scenario.
- the device for access request conversion receives an access request of a protocol sent by a client, for example, an access request of the http/https protocol.
- RPC Remote Procedure Call Protocol
- the client refers to a program that provides a local service to the client, and may also be referred to as a client or a client.
- the client is generally installed in an ordinary manner. Customer service machine. Clients can interact with other clients through different protocols, such as socket, http/https, and RPC. The request message generated when the access request interacts between the client and the server through the protocol request response mode.
- the server side in a broad sense, is a server, which is a computer system in the network that can provide services to other devices. The server needs to respond according to the received access request and process it. The server has the ability to undertake access to the service and guarantee the quality of service.
- the server can be divided into a database server, an application server, and a web server.
- FIG. 2 is a flowchart of an access request conversion method according to an embodiment of the present application.
- the executive body of the method can be a device with processing capabilities: a system or device, such as a protocol intermediate conversion device. As shown in FIG. 2, the method specifically includes:
- Step 210 Receive an access request sent by a client, where the access request includes a uniform resource locator URL and parameter information.
- the access request is a request message sent by the client through a certain protocol, for example, an http request, and the request message may include a Uniform Resource Locator (URL), parameter information, and a message body.
- the URL is a simple representation of the location and access method of the resources that can be obtained from the Internet, and is the address of the standard resources on the Internet. Every file on the Internet has a unique URL.
- the URL information includes the location information of the resource and the way the client handles it.
- the parameter information may include a parameter GET for obtaining a resource corresponding to the URL identifier, a parameter POST to which new data is appended after the resource identified by the URL, a response message header HEAD for accessing the resource identified by the URL, and an access request related to the security information. Relevant parameters such as authentication parameters.
- the access request is parsed, and corresponding information such as a URL, a parameter information, and a message body is obtained from the access request.
- the method may include the following steps:
- the pre-defined processing includes authenticating the access request; when the authentication passes, determining the target service type of the access request according to the URL and the parameter information.
- the predefined processing processing on the access request may include pre-defined data modification, identity verification of the access request, and the like.
- this step can be implemented by registering in the device, and the developer customizes the development of the Filter component, as shown in FIG.
- the authenticating the access request may include: matching the authentication parameter information in the access request with the token information of the token center; and when the identity verification parameter information matches the token information, , access request authentication passed.
- the Filter component sends the access request to the Token Center, so that the token center performs calculation according to the information in the access request, obtains the token information, and uses the token information and the authentication parameter in the access request. The information is matched. When the two match, the authentication of the access request passes to indicate that the access request passes the legal verification, and vice versa.
- step 220 is performed.
- Step 220 Determine, according to the URL and the parameter information, a target service type of the access request.
- the target service type is a protocol type that can be supported by the server, such as the HSF, the Mock, and the Protobuffer protocol type.
- the other protocol types may be extended. There are no restrictions on this.
- the target service type of the access request is determined according to the URL and the parameter information, and specifically includes:
- the target service type of the access request is determined according to the parameter information.
- the device may determine whether the URL path has a corresponding service by using a table lookup manner. For example, in Table 1, the path may be searched according to the path of the URL to find a corresponding path. For example, the URL path in the access request is path 1. Determine if path 1 exists by looking up the table. When the URL path in the access request exists in the table, it is determined that the service corresponding to the URL path exists, and vice versa.
- Table 1 the path may be searched according to the path of the URL to find a corresponding path.
- the URL path in the access request is path 1. Determine if path 1 exists by looking up the table. When the URL path in the access request exists in the table, it is determined that the service corresponding to the URL path exists, and vice versa.
- Table 1 is only for the detailed description of the technical solution of the present application, and the content in Table 1 does not constitute a limitation of the embodiment of the present application, and there is no limitation in the embodiment of the present application. .
- the target service type of the access request conversion is determined according to the parameter information.
- the target service type can be determined by looking up the table. As shown in Table 1, the corresponding target service type is queried according to the path 1 that is determined to exist.
- the determination of the target service may be completed by an engine routing component as shown in FIG. 3, and the engine routing component may be a program developed by a developer for determining a target service type function according to a URL and parameter information in an access request, including a partition ( Sharding component and failover component.
- the partition component is used for fault tolerance and load balancing policies configured on the server side (HSF_Provider1, HSF_Provider2, PBService_1 and PBService_2) of the access request, and access requests are performed according to the determined target service type.
- Distribution which sends access requests to engine components of the corresponding target service type, such as HSF, Mock, and Protobuffer.
- fault tolerance means that when the data and files in the device are damaged or lost, the device can automatically restore the damaged or lost files and data to the state before the accident occurred to ensure the normal operation of the device.
- Load balancing means that the access request is distributed to the server side corresponding to the multiple engine components for processing, for example, the server end such as HSF_Provider1, HSF_Provider2, PBService_1, and PBService_2, thereby realizing the processing task of jointly completing the access request.
- the fault-tolerant component has the function of recording the configuration of the server tube, so that the routing engine distributes the access request to the engine component of the response target service type by querying the configuration of the server in the fault-tolerant component to implement load balancing. That is, before sending the access request according to the target service type to the server corresponding to the target service type, the method further includes: querying the server end corresponding to the target service type recorded in the fault-tolerant component according to the target service type, so that The access request information is distributed to the responding server according to the target service type according to the configuration of the server side to implement load balancing.
- the device determines whether the service corresponding to the URL path exists according to the URL, or determines the target service type of the access request according to the parameter information, if there is no service corresponding to the URL path or the target service type, the device The terminal returns a message error indicating the cause of the error so that the user using the client is aware of the cause of the error.
- Step 230 Convert the access request according to the target service type.
- the engine component when the engine component receives the access request, the data structure of the received access request is converted according to the target service type, and converted into a protocol type that the server can support, for example, as shown in FIG. 3, the access request may pass through the engine.
- the component HSF, Mock or Protobuffer is converted and converted to HSF_Provider1, HSF_Provider2, Mock server, PBService_1 and PBService_2.
- PBService is short for Protobuffer Service.
- Step 240 Send an access request converted according to the target service type to a server end corresponding to the target service type, and use the server to return result information according to the target service type converted access request.
- the engine component converts the access request into an access request of the corresponding target service type
- the converted access request is separately sent to the corresponding server, so that the corresponding server responds according to the response request and returns.
- Result information is resource information of the client access request, and may be information such as text, image, video, and the like.
- the method may further include: receiving result information; processing the result information; and sending the processed result information to the client, where the client performs corresponding operations according to the processed result information.
- the engine component receives the result information sent by the server and sends it to the engine routing component.
- the engine routing component structs the received data of the result information sent by the different engine components into a unified data structure and returns it to the Handler component as described in Figure 3, which is developed by the developer and has returned result information.
- the processing is a program that is a data structure function that the client can receive. For example, compression, log recording, data modification, desensitization, etc. can be performed on the result information of the access request.
- the log record may record the time information used by the access request to return the result information sent from the client to the access request to the client.
- Desensitization is to transform the sensitive information in the result information through the desensitization rule to realize the reliability protection of sensitive private data.
- a plurality of Handler components may be set according to requirements, and in the process of processing the result information, the result information may be sequentially transmitted to the next Handler component, thereby realizing flexible and transparent change of the result information data.
- the result is 2, and the Handler component processes the returned result 2 according to a predefined processing manner, for example, compression, for the client to receive the information and perform corresponding processing according to the information.
- a predefined processing manner for example, compression
- the Handler component can send the return result 3 and the additional result error information to the client according to a predefined processing manner.
- the access request conversion method provided by the embodiment of the present application determines the access according to the received access request.
- the target service type of the request, the access request is parsed into the corresponding data structure of the target service type, and provided to the corresponding server side, realizing the function of the multi-network unified request interface in the big data platform environment, decoupling between the systems
- the dependency improves the system's management mechanism for each module.
- the Filter component and the Handler component in FIG. 3 may be loaded according to the plug-in manner, and the developer may develop data modification, identity authentication, and statistics based on the access request, that is, the http request, according to requirements. , compression and other functions.
- the user provides basic information and can be registered in the Filter component and Handler component links.
- the system dynamically loads components with predefined functions.
- the device converts the access request into a general intermediate data structure, and can be docked for different communication protocols supported by the server, and automatically converts the common data structure to the fixed structure through the developed engine components. Developers are free to develop systems that support specific protocols. Compared with the development of Nginx Lua, the embodiment of the present application does not need to implement multiple data structures in the Filter component and the Handler component, saves the development cycle, and does not need to be deep in the data structure of the system as the Nginx Lua development. Understand, save development costs.
- the client may provide an access request of the http/https, socket, and RPC (for example, the HSF and the Protobuffer) protocol
- the server may support the HSF, the Mock, and the Protobuffer protocol.
- the client and the server can also support other protocols. In the embodiment of the present application, no limitation is imposed on this.
- the method may first determine whether a service corresponding to the URL path exists according to the URL, so as to speed up the client.
- the terminal quickly obtains the resource information required for the access request.
- the access request is subjected to corresponding pre-processing and identity verification.
- identity verification of the access request passes, the device performs a target service type for determining the access request according to the parameter information.
- step 220 in FIG. 2 The specific steps can be implemented by step 220 in FIG. 2, and are not described herein again for brevity.
- the device determines whether there is a service corresponding to the URL path according to the URL, or determines a target service type of the access request according to the parameter information, if there is no service corresponding to the URL path or the target service Type, the information error is returned to the client, indicating the cause of the error, so that the user who uses the client is aware of the cause of the error.
- FIG. 5 is a schematic structural diagram of a device provided by the present application. As shown in FIG. 5, the device includes:
- the receiving module 510 is configured to receive an access request sent by the client, where the access request includes the same resource locator URL and parameter information;
- a determining module 520 configured to determine, according to the URL and the parameter information, a target service type of the access request
- the conversion module 530 is configured to convert the access request according to the target service type
- the sending module 540 is configured to send, according to the target service type, the access request converted to the server end corresponding to the target service type, for the server, and return the result information according to the target service type converted access request.
- the determining module 520 is further configured to perform predefined processing on the access request, where the predefined processing includes authenticating the access request; when the authentication is passed, according to the URL and the parameter information, Determine the target service type for the access request.
- the determining module 520 is specifically configured to: match the identity verification parameter information in the access request with the token information of the token center; and match the identity verification parameter information with the token information.
- the access request is authenticated.
- the determining module is specifically configured to determine, according to the URL, whether a service corresponding to the URL path exists; and when there is a service corresponding to the URL path, determine a target service type of the access request according to the parameter information.
- the determining module 520 is configured to determine, according to the URL, whether a service corresponding to the URL path exists, and when the access request authentication is passed, determining a destination service type of the access request according to the parameter information.
- the receiving module 510 is further configured to receive result information
- the processing module is further configured to process the result information
- the sending module 540 is further configured to send the processed result information to the client, for the client to perform a corresponding operation according to the processed result.
- the processing includes any one or more of data modification, compression, and desensitization.
- the apparatus further includes a query module, configured to query, according to the target service type, a server end corresponding to the target service type recorded in the fault tolerance component.
- a query module configured to query, according to the target service type, a server end corresponding to the target service type recorded in the fault tolerance component.
- the apparatus provided by the embodiment of the present application determines the target service type of the access request according to the received access request, parses the access request into a data structure corresponding to the target service type, and provides the data structure to the corresponding server, and implements the big data.
- the function of the multi-network unified request interface in the platform environment decouples the dependencies between the systems, The system's management mechanism for each module is high.
- the steps of a method or algorithm described in connection with the embodiments disclosed herein can be implemented in hardware, a software module executed by a processor, or a combination of both.
- the software module can be placed in random access memory (RAM), memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or technical field. Any other form of storage medium known.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
URL | 目标服务类型 |
路径1 | HSF |
路径2 | Mock |
路径3 | Protobuffer |
Claims (16)
- 一种访问请求转换的方法,其特征在于,所述方法包括:接收客户端发送的访问请求,所述访问请求包括统一资源定位符URL和参数信息;根据所述URL和所述参数信息,确定所述访问请求的目标服务类型;根据所述目标服务类型转换所述访问请求;向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求,以便所述服务器端根据所述目标服务类型转换后的访问请求返回结果信息。
- 根据权利要求1所述的方法,其特征在于,在所述接收客户端发送的访问请求之后,所述方法还包括:对所述访问请求进行预定义处理,所述预定义处理包括对所述访问请求进行身份验证;当身份验证通过时,根据所述URL和所述参数信息,确定所述访问请求的目标服务类型。
- 根据权利要求2所述的方法,其特征在于,所述对所述访问请求进行身份验证包括:将所述访问请求中的身份验证参数信息与令牌中心的令牌信息进行匹配;当所述身份验证参数信息与所述令牌信息相匹配时,所述访问请求身份验证通过。
- 根据权利要求1至3任一项所述的方法,其特征在于,所述根据所述URL和所述参数信息,确定所述访问请求的目标服务类型,包括:根据所述URL确定是否存在URL路径对应的服务;当存在所述URL路径对应的服务时,根据所述参数信息确定所述访问请求的目标服务类型。
- 根据权利要求2所述的方法,其特征在于,在对所述访问请求进行预处理之前,所述方法包括:根据所述URL确定是否存在URL路径对应的服务,以用于所述访问请求身份验证通过时,根据所述参数信息确定所述访问请求的目的服务类型。
- 根据权利要求1至5任一项所述的方法,其特征在于,所述方法还包括:接收所述结果信息;对所述结果信息进行加工处理;向所述客户端发送加工处理后的结果信息,以用于所述客户端根据所述加工后的结 果信息进行相应的操作。
- 根据权利要求6所述的方法,其特征在于,所述加工处理包括数据修改、压缩、脱敏中的任一种或者多种。
- 根据权利要求1所述的方法,其特征在于,在所述向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求之前,所述方法还包括:根据所述目标服务类型,查询容错组件中记录的所述目标服务类型对应的服务器端。
- 一种装置,其特征在于,所述装置包括:接收模块,用于接收客户端发送的访问请求,所述访问请求包括统一资源定位符URL和参数信息;确定模块,用于根据所述URL和所述参数信息,确定所述访问请求的目标服务类型;转换模块,用于根据所述目标服务类型转换所述访问请求;发送模块,用于向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求,以用于所述服务器端,根据所述目标服务类型转换后的访问请求返回结果信息。
- 根据权利要求9所述的装置,其特征在于,所述确定模块还用于,对所述访问请求进行预定义处理,所述预定义处理包括对所述访问请求进行身份验证;当身份验证通过时,根据所述URL和所述参数信息,确定所述访问请求的目标服务类型。
- 根据权利要求10所述的装置,其特征在于,所述确定模块具体用于,将所述访问请求中的身份验证参数信息与令牌中心的令牌信息进行匹配;当所述身份验证参数信息与所述令牌信息相匹配时,所述访问请求身份验证通过。
- 根据权利要求9至11任一项所述的装置,其特征在于,所述确定模块具体用于,根据所述URL确定是否存在URL路径对应的服务;当存在所述URL路径对应的服务时,根据所述参数信息确定所述访问请求的目标服务类型。
- 根据权利要求10所述的装置,其特征在于,所述确定模块用于,根据所述URL 确定是否存在URL路径对应的服务,以用于所述访问请求身份验证通过时,根据所述参数信息确定所述访问请求的目的服务类型。
- 根据权利要求9至13任一项所述的装置,其特征在于,所述接收模块还用于,接收所述结果信息;所述处理模块还用于,对所述结果信息进行加工处理;所述发送模块还用于,向所述客户端发送加工处理后的结果信息,以用于所述客户端根据所述加工处理后的结果进行相应的操作。
- 根据权利要求14所述的装置,其特征在于,所述加工处理包括数据修改、压缩、脱敏中的任一种或者多种。
- 根据权利要求9所述的装置,其特征在于,所述装置还包括查询模块,用于根据所述目标服务类型,查询容错组件中记录的所述目标服务类型对应的服务器端。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16872315.3A EP3389219B1 (en) | 2015-12-08 | 2016-11-28 | Access request conversion method and device |
JP2018524479A JP6912469B2 (ja) | 2015-12-08 | 2016-11-28 | アクセス要求変換方法および装置 |
US16/003,046 US11647009B2 (en) | 2015-12-08 | 2018-06-07 | Access request conversion method and apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510896122.8 | 2015-12-08 | ||
CN201510896122.8A CN106856434B (zh) | 2015-12-08 | 2015-12-08 | 访问请求转换的方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/003,046 Continuation US11647009B2 (en) | 2015-12-08 | 2018-06-07 | Access request conversion method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017097123A1 true WO2017097123A1 (zh) | 2017-06-15 |
Family
ID=59012694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/107408 WO2017097123A1 (zh) | 2015-12-08 | 2016-11-28 | 访问请求转换的方法和装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US11647009B2 (zh) |
EP (1) | EP3389219B1 (zh) |
JP (1) | JP6912469B2 (zh) |
CN (1) | CN106856434B (zh) |
WO (1) | WO2017097123A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110795646A (zh) * | 2019-09-30 | 2020-02-14 | 北京奇艺世纪科技有限公司 | 请求处理方法、装置、电子设备和计算机可读存储介质 |
CN111931030A (zh) * | 2020-07-30 | 2020-11-13 | 中粮招商局(深圳)粮食电子交易中心有限公司 | 基于异构系统的请求适配方法、装置、设备及存储介质 |
CN114448857A (zh) * | 2022-01-29 | 2022-05-06 | 北京字节跳动网络技术有限公司 | Mock服务处理方法、装置、存储介质和系统 |
US11647009B2 (en) | 2015-12-08 | 2023-05-09 | Alibaba Group Holding Limited | Access request conversion method and apparatus |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107102882A (zh) * | 2017-06-21 | 2017-08-29 | 北京奇艺世纪科技有限公司 | iOS系统的业务处理方法及装置 |
CN107360261B (zh) * | 2017-09-07 | 2020-07-10 | 北京奇艺世纪科技有限公司 | 一种http请求处理方法、装置及电子设备 |
CN107835178B (zh) * | 2017-11-13 | 2020-10-30 | 北京奇艺世纪科技有限公司 | 一种多协议服务通信方法、装置以及电子设备 |
CN110163382A (zh) * | 2018-02-12 | 2019-08-23 | 北京京东尚科信息技术有限公司 | 信息生成方法和装置 |
US10671462B2 (en) * | 2018-07-24 | 2020-06-02 | Cisco Technology, Inc. | System and method for message management across a network |
CN109101351A (zh) * | 2018-08-29 | 2018-12-28 | 郑州云海信息技术有限公司 | 一种解析基板管理控制器web返回值的方法、装置及设备 |
CN109150893B (zh) * | 2018-09-12 | 2021-10-26 | 山东中创软件工程股份有限公司 | 一种服务请求转发方法及相关装置 |
CN109639636B (zh) * | 2018-11-06 | 2021-04-02 | 创新先进技术有限公司 | 业务数据转发、业务数据处理方法、装置及电子设备 |
CN109445968A (zh) * | 2018-11-09 | 2019-03-08 | 金瓜子科技发展(北京)有限公司 | 不同协议的服务请求处理方法、装置、设备及存储介质 |
CN109743222A (zh) * | 2018-12-25 | 2019-05-10 | 瑞庭网络技术(上海)有限公司 | 一种数据测试方法及相关设备 |
CN110351350B (zh) * | 2019-06-28 | 2022-09-06 | 北京你财富计算机科技有限公司 | 基于多服务器对接的客户端请求处理方法、系统和电子设备 |
CN110311983B (zh) * | 2019-07-09 | 2021-04-06 | 北京字节跳动网络技术有限公司 | 服务请求的处理方法、装置、系统、电子设备及存储介质 |
CN110611725B (zh) * | 2019-09-16 | 2022-06-03 | 腾讯科技(深圳)有限公司 | 节点访问方法、装置、计算机设备和存储介质 |
CN112153152A (zh) * | 2020-09-28 | 2020-12-29 | 深圳壹账通智能科技有限公司 | 算法服务接口的管理方法及系统 |
CN112632945B (zh) * | 2020-12-17 | 2022-11-08 | 上海哔哩哔哩科技有限公司 | 一种报表构建方法及装置 |
CN112579933B (zh) * | 2020-12-24 | 2023-12-08 | 中国农业银行股份有限公司 | 一种信息处理方法及装置 |
CN114765552B (zh) * | 2021-01-04 | 2023-11-07 | 航天信息股份有限公司 | 数据处理方法、中台系统、存储介质和电子设备 |
CN112906025B (zh) * | 2021-03-03 | 2022-01-07 | 江苏保旺达软件技术有限公司 | 数据库管控方法、装置、设备及存储介质 |
CN113784354B (zh) * | 2021-09-17 | 2024-04-09 | 城云科技(中国)有限公司 | 基于网关的请求转换方法和装置 |
CN114116067B (zh) * | 2021-12-02 | 2024-02-27 | 多点生活(武汉)科技有限公司 | 内外系统的信息配置方法、装置、电子设备和可读存储介质 |
CN114185799A (zh) * | 2021-12-15 | 2022-03-15 | 中国建设银行股份有限公司 | 创建虚拟对象的数据处理方法和装置 |
CN114615336A (zh) * | 2022-04-06 | 2022-06-10 | 北京字节跳动网络技术有限公司 | 一种请求调度方法、装置、计算机设备和存储介质 |
CN114968617B (zh) * | 2022-04-28 | 2023-09-01 | 杭州未名信科科技有限公司 | Api转换系统及其访问请求处理方法、电子设备及介质 |
WO2024033882A1 (en) * | 2022-08-10 | 2024-02-15 | Shabodi Corp. | Near real time request handling in flexible api router |
CN117573762B (zh) * | 2024-01-15 | 2024-04-16 | 杭州数云信息技术有限公司 | 数据连接平台的数据处理方法及装置、存储介质、服务器 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003073700A2 (en) * | 2002-02-21 | 2003-09-04 | Hewlett-Packard Company | A system and method for providing personal connectivity between a computing device and a computer network |
CN101674236A (zh) * | 2008-09-09 | 2010-03-17 | 株式会社日立制作所 | 通信系统 |
CN102056333A (zh) * | 2009-11-05 | 2011-05-11 | 中国移动通信集团河南有限公司 | Wap网关及其业务处理方法和wap代理服务器 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
PL326670A1 (en) * | 1995-11-14 | 1998-10-12 | Ibm | Information processing system enabling a versatile worldwide www network scanning program to get access to servers of many different protocols |
US6792605B1 (en) | 1999-06-10 | 2004-09-14 | Bow Street Software, Inc. | Method and apparatus for providing web based services using an XML Runtime model to store state session data |
US7873734B1 (en) * | 2001-05-17 | 2011-01-18 | Computer Associates Think, Inc. | Management of multiple user sessions and user requests for multiple electronic devices |
CN100432998C (zh) * | 2003-08-07 | 2008-11-12 | 蒂蒙系统公司 | 包括使用多种操作协议的协议接口设备的通信系统及相关方法 |
CN1867906B (zh) * | 2003-08-11 | 2010-06-16 | 蒂蒙系统公司 | 提供多层可扩展协议接口的通信系统及相关方法 |
JP4365401B2 (ja) * | 2006-12-14 | 2009-11-18 | 富士通株式会社 | 通信制御プログラム、通信制御方法および通信制御装置 |
JP5188284B2 (ja) | 2008-06-17 | 2013-04-24 | 三菱電機株式会社 | サービス接続システム及びサービス接続方法 |
CN101616136B (zh) * | 2008-06-26 | 2013-05-01 | 阿里巴巴集团控股有限公司 | 一种提供互联网服务的方法及服务集成平台系统 |
JP2010009520A (ja) * | 2008-06-30 | 2010-01-14 | Canon Inc | フロー処理装置及びメッセージ変換方法 |
EP2259551A1 (en) * | 2009-06-05 | 2010-12-08 | Software AG | Gateway server system comprising a gateway server for making SOAP/XML-based web services accessible to RPC clients |
EP2524321A4 (en) * | 2010-01-15 | 2013-09-11 | Endurance Int Group Inc | HOSTING SERVICE FOR UNMITTED WEBDOMAINS BASED ON A GENERAL SERVICE ARCHITECTURE |
CN102262560B (zh) * | 2010-05-27 | 2016-12-28 | 阿里巴巴集团控股有限公司 | 一种远程服务的调用方法、装置及系统 |
CN101924758B (zh) * | 2010-07-28 | 2015-01-28 | 中兴通讯股份有限公司 | 一种媒体服务器及其提供服务的方法 |
CN102547553B (zh) * | 2010-12-30 | 2014-10-08 | 中国移动通信集团公司 | 一种基于wap进行业务访问的方法、系统及装置 |
CN103001931A (zh) * | 2011-09-08 | 2013-03-27 | 北京智慧风云科技有限公司 | 不同网络间终端互联的通信系统 |
CN103383687B (zh) * | 2012-05-02 | 2017-03-01 | 阿里巴巴集团控股有限公司 | 一种页面处理方法和装置 |
CN102694701B (zh) * | 2012-06-13 | 2015-12-02 | 青岛海信传媒网络技术有限公司 | 基于消息的测试方法及系统 |
US9736034B2 (en) * | 2012-09-19 | 2017-08-15 | Oracle International Corporation | System and method for small batching processing of usage requests |
CN103716308B (zh) | 2013-12-17 | 2017-04-12 | 北京京东尚科信息技术有限公司 | 一种多协议平台通信方法及多协议平台 |
US9632991B2 (en) * | 2014-09-15 | 2017-04-25 | Oracle International Corporation | High performant and high fidelity previews for CSS preprocessing frameworks |
US10362059B2 (en) * | 2014-09-24 | 2019-07-23 | Oracle International Corporation | Proxy servers within computer subnetworks |
CN106856434B (zh) | 2015-12-08 | 2020-06-30 | 阿里巴巴集团控股有限公司 | 访问请求转换的方法和装置 |
-
2015
- 2015-12-08 CN CN201510896122.8A patent/CN106856434B/zh active Active
-
2016
- 2016-11-28 WO PCT/CN2016/107408 patent/WO2017097123A1/zh active Application Filing
- 2016-11-28 EP EP16872315.3A patent/EP3389219B1/en active Active
- 2016-11-28 JP JP2018524479A patent/JP6912469B2/ja active Active
-
2018
- 2018-06-07 US US16/003,046 patent/US11647009B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003073700A2 (en) * | 2002-02-21 | 2003-09-04 | Hewlett-Packard Company | A system and method for providing personal connectivity between a computing device and a computer network |
CN101674236A (zh) * | 2008-09-09 | 2010-03-17 | 株式会社日立制作所 | 通信系统 |
CN102056333A (zh) * | 2009-11-05 | 2011-05-11 | 中国移动通信集团河南有限公司 | Wap网关及其业务处理方法和wap代理服务器 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3389219A4 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11647009B2 (en) | 2015-12-08 | 2023-05-09 | Alibaba Group Holding Limited | Access request conversion method and apparatus |
CN110795646A (zh) * | 2019-09-30 | 2020-02-14 | 北京奇艺世纪科技有限公司 | 请求处理方法、装置、电子设备和计算机可读存储介质 |
CN111931030A (zh) * | 2020-07-30 | 2020-11-13 | 中粮招商局(深圳)粮食电子交易中心有限公司 | 基于异构系统的请求适配方法、装置、设备及存储介质 |
CN114448857A (zh) * | 2022-01-29 | 2022-05-06 | 北京字节跳动网络技术有限公司 | Mock服务处理方法、装置、存储介质和系统 |
Also Published As
Publication number | Publication date |
---|---|
US11647009B2 (en) | 2023-05-09 |
US20180288187A1 (en) | 2018-10-04 |
CN106856434B (zh) | 2020-06-30 |
EP3389219A4 (en) | 2018-10-17 |
JP6912469B2 (ja) | 2021-08-04 |
JP2018536935A (ja) | 2018-12-13 |
CN106856434A (zh) | 2017-06-16 |
EP3389219B1 (en) | 2020-05-20 |
EP3389219A1 (en) | 2018-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017097123A1 (zh) | 访问请求转换的方法和装置 | |
CN109067914B (zh) | Web服务的代理方法、装置、设备及存储介质 | |
US9003478B2 (en) | Enforcement of conditional policy attachments | |
US8903884B2 (en) | Multi-tenant services gateway | |
US8838792B2 (en) | Identity provider instance discovery | |
US10194001B1 (en) | Automatic discovery of API information | |
US8869258B2 (en) | Facilitating token request troubleshooting | |
US9507927B2 (en) | Dynamic identity switching | |
CN111953770B (zh) | 一种路由转发方法、装置、路由设备及可读存储介质 | |
US20120240184A1 (en) | System and method for on the fly protocol conversion in obtaining policy enforcement information | |
US10567492B1 (en) | Methods for load balancing in a federated identity environment and devices thereof | |
CN114902612A (zh) | 基于边缘网络的帐户保护服务 | |
CN112769863B (zh) | 一种业务请求报文数据的处理方法、装置、电子设备及可读存储介质 | |
CN114785590A (zh) | 登录方法、装置、设备、存储介质 | |
CN115378645A (zh) | 一种基于电力营销管理系统统一认证的验证方法及系统 | |
US8996607B1 (en) | Identity-based casting of network addresses | |
TW201828093A (zh) | 訪問請求轉換的方法和裝置 | |
US20160006821A1 (en) | Correlation Identity Generation Method For Cloud Environment | |
US11663058B1 (en) | Preemptive filtering of events of an event bus with a deterministic filter | |
WO2022271523A1 (en) | Systems and methods for autonomous program detection | |
US11546405B2 (en) | Methods for exposing mainframe data as a web service and devices thereof | |
CN112422429B (zh) | 数据请求处理方法和装置、存储介质和电子设备 | |
CN114827246B (zh) | 网关流量控制方法、装置、电子设备及存储介质 | |
CN116506282A (zh) | 一种实现openstack nat会话日志的方法及系统 | |
CN117499181A (zh) | 数据回调方法、装置、设备及计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16872315 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2018524479 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2016872315 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2016872315 Country of ref document: EP Effective date: 20180709 |