WO2017097123A1 - 访问请求转换的方法和装置 - Google Patents

访问请求转换的方法和装置 Download PDF

Info

Publication number
WO2017097123A1
WO2017097123A1 PCT/CN2016/107408 CN2016107408W WO2017097123A1 WO 2017097123 A1 WO2017097123 A1 WO 2017097123A1 CN 2016107408 W CN2016107408 W CN 2016107408W WO 2017097123 A1 WO2017097123 A1 WO 2017097123A1
Authority
WO
WIPO (PCT)
Prior art keywords
access request
service type
target service
url
parameter information
Prior art date
Application number
PCT/CN2016/107408
Other languages
English (en)
French (fr)
Inventor
刘鑫
何召卫
陈廷梁
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Priority to EP16872315.3A priority Critical patent/EP3389219B1/en
Priority to JP2018524479A priority patent/JP6912469B2/ja
Publication of WO2017097123A1 publication Critical patent/WO2017097123A1/zh
Priority to US16/003,046 priority patent/US11647009B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0226Mapping or translating multiple network management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5019Ensuring fulfilment of SLA
    • H04L41/5025Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Definitions

  • the present invention relates to data development, and more particularly to a method and apparatus for access request conversion.
  • Nginx Module In order to reduce the coupling between modules, some protocol intermediate conversion devices, such as Nginx Module and ServiceMix, are currently applied in the big data platform.
  • Nginx Module As shown in FIG. 1, when a request is received, the received request is mapped to the local data table by looking up the configuration file to trigger an instruction stored in the local data table, indicating the handle.
  • the module and the plurality of filter modules complete their respective work, thereby returning a response, wherein the handler module is responsible for processing the request and completing the generation of the response content; the filter module processes the response content.
  • ServiceMix although more protocols can be supported, protocol extensions can be performed as needed.
  • Embodiments of the present invention provide a method and apparatus for access request conversion, to solve the dependency between systems, and improve the management mechanism function of each module of the system.
  • the present invention provides a method for access request conversion, the method comprising:
  • an embodiment of the present invention provides a device, where the device includes:
  • a receiving module configured to receive an access request sent by the client, where the access request includes a uniform resource locator URL and parameter information;
  • a determining module configured to determine, according to the URL and the parameter information, a target service type of the access request
  • a conversion module configured to convert the access request according to the target service type
  • a sending module configured to send, according to the target service type, an access request converted according to the target service type to a server end corresponding to the target service type, for the server end, and returning result information according to the target service type converted access request .
  • a method and apparatus for access request conversion determines a target service type of an access request according to the received access request, parses the access request into a data structure corresponding to the target service type, and provides the corresponding data structure
  • the server side implements the function of the multi-network unified request interface in the big data platform environment, decouples the dependencies between the systems, and improves the system's management mechanism function for each module.
  • FIG. 1 is a schematic structural diagram of a Nginx Lua system in the prior art
  • FIG. 2 is a flowchart of an access request conversion method according to an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a device according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic structural diagram of a device according to another embodiment of the present application.
  • the method and device for access request conversion provided by the embodiment of the present application are applicable to a big data platform scenario.
  • the device for access request conversion receives an access request of a protocol sent by a client, for example, an access request of the http/https protocol.
  • RPC Remote Procedure Call Protocol
  • the client refers to a program that provides a local service to the client, and may also be referred to as a client or a client.
  • the client is generally installed in an ordinary manner. Customer service machine. Clients can interact with other clients through different protocols, such as socket, http/https, and RPC. The request message generated when the access request interacts between the client and the server through the protocol request response mode.
  • the server side in a broad sense, is a server, which is a computer system in the network that can provide services to other devices. The server needs to respond according to the received access request and process it. The server has the ability to undertake access to the service and guarantee the quality of service.
  • the server can be divided into a database server, an application server, and a web server.
  • FIG. 2 is a flowchart of an access request conversion method according to an embodiment of the present application.
  • the executive body of the method can be a device with processing capabilities: a system or device, such as a protocol intermediate conversion device. As shown in FIG. 2, the method specifically includes:
  • Step 210 Receive an access request sent by a client, where the access request includes a uniform resource locator URL and parameter information.
  • the access request is a request message sent by the client through a certain protocol, for example, an http request, and the request message may include a Uniform Resource Locator (URL), parameter information, and a message body.
  • the URL is a simple representation of the location and access method of the resources that can be obtained from the Internet, and is the address of the standard resources on the Internet. Every file on the Internet has a unique URL.
  • the URL information includes the location information of the resource and the way the client handles it.
  • the parameter information may include a parameter GET for obtaining a resource corresponding to the URL identifier, a parameter POST to which new data is appended after the resource identified by the URL, a response message header HEAD for accessing the resource identified by the URL, and an access request related to the security information. Relevant parameters such as authentication parameters.
  • the access request is parsed, and corresponding information such as a URL, a parameter information, and a message body is obtained from the access request.
  • the method may include the following steps:
  • the pre-defined processing includes authenticating the access request; when the authentication passes, determining the target service type of the access request according to the URL and the parameter information.
  • the predefined processing processing on the access request may include pre-defined data modification, identity verification of the access request, and the like.
  • this step can be implemented by registering in the device, and the developer customizes the development of the Filter component, as shown in FIG.
  • the authenticating the access request may include: matching the authentication parameter information in the access request with the token information of the token center; and when the identity verification parameter information matches the token information, , access request authentication passed.
  • the Filter component sends the access request to the Token Center, so that the token center performs calculation according to the information in the access request, obtains the token information, and uses the token information and the authentication parameter in the access request. The information is matched. When the two match, the authentication of the access request passes to indicate that the access request passes the legal verification, and vice versa.
  • step 220 is performed.
  • Step 220 Determine, according to the URL and the parameter information, a target service type of the access request.
  • the target service type is a protocol type that can be supported by the server, such as the HSF, the Mock, and the Protobuffer protocol type.
  • the other protocol types may be extended. There are no restrictions on this.
  • the target service type of the access request is determined according to the URL and the parameter information, and specifically includes:
  • the target service type of the access request is determined according to the parameter information.
  • the device may determine whether the URL path has a corresponding service by using a table lookup manner. For example, in Table 1, the path may be searched according to the path of the URL to find a corresponding path. For example, the URL path in the access request is path 1. Determine if path 1 exists by looking up the table. When the URL path in the access request exists in the table, it is determined that the service corresponding to the URL path exists, and vice versa.
  • Table 1 the path may be searched according to the path of the URL to find a corresponding path.
  • the URL path in the access request is path 1. Determine if path 1 exists by looking up the table. When the URL path in the access request exists in the table, it is determined that the service corresponding to the URL path exists, and vice versa.
  • Table 1 is only for the detailed description of the technical solution of the present application, and the content in Table 1 does not constitute a limitation of the embodiment of the present application, and there is no limitation in the embodiment of the present application. .
  • the target service type of the access request conversion is determined according to the parameter information.
  • the target service type can be determined by looking up the table. As shown in Table 1, the corresponding target service type is queried according to the path 1 that is determined to exist.
  • the determination of the target service may be completed by an engine routing component as shown in FIG. 3, and the engine routing component may be a program developed by a developer for determining a target service type function according to a URL and parameter information in an access request, including a partition ( Sharding component and failover component.
  • the partition component is used for fault tolerance and load balancing policies configured on the server side (HSF_Provider1, HSF_Provider2, PBService_1 and PBService_2) of the access request, and access requests are performed according to the determined target service type.
  • Distribution which sends access requests to engine components of the corresponding target service type, such as HSF, Mock, and Protobuffer.
  • fault tolerance means that when the data and files in the device are damaged or lost, the device can automatically restore the damaged or lost files and data to the state before the accident occurred to ensure the normal operation of the device.
  • Load balancing means that the access request is distributed to the server side corresponding to the multiple engine components for processing, for example, the server end such as HSF_Provider1, HSF_Provider2, PBService_1, and PBService_2, thereby realizing the processing task of jointly completing the access request.
  • the fault-tolerant component has the function of recording the configuration of the server tube, so that the routing engine distributes the access request to the engine component of the response target service type by querying the configuration of the server in the fault-tolerant component to implement load balancing. That is, before sending the access request according to the target service type to the server corresponding to the target service type, the method further includes: querying the server end corresponding to the target service type recorded in the fault-tolerant component according to the target service type, so that The access request information is distributed to the responding server according to the target service type according to the configuration of the server side to implement load balancing.
  • the device determines whether the service corresponding to the URL path exists according to the URL, or determines the target service type of the access request according to the parameter information, if there is no service corresponding to the URL path or the target service type, the device The terminal returns a message error indicating the cause of the error so that the user using the client is aware of the cause of the error.
  • Step 230 Convert the access request according to the target service type.
  • the engine component when the engine component receives the access request, the data structure of the received access request is converted according to the target service type, and converted into a protocol type that the server can support, for example, as shown in FIG. 3, the access request may pass through the engine.
  • the component HSF, Mock or Protobuffer is converted and converted to HSF_Provider1, HSF_Provider2, Mock server, PBService_1 and PBService_2.
  • PBService is short for Protobuffer Service.
  • Step 240 Send an access request converted according to the target service type to a server end corresponding to the target service type, and use the server to return result information according to the target service type converted access request.
  • the engine component converts the access request into an access request of the corresponding target service type
  • the converted access request is separately sent to the corresponding server, so that the corresponding server responds according to the response request and returns.
  • Result information is resource information of the client access request, and may be information such as text, image, video, and the like.
  • the method may further include: receiving result information; processing the result information; and sending the processed result information to the client, where the client performs corresponding operations according to the processed result information.
  • the engine component receives the result information sent by the server and sends it to the engine routing component.
  • the engine routing component structs the received data of the result information sent by the different engine components into a unified data structure and returns it to the Handler component as described in Figure 3, which is developed by the developer and has returned result information.
  • the processing is a program that is a data structure function that the client can receive. For example, compression, log recording, data modification, desensitization, etc. can be performed on the result information of the access request.
  • the log record may record the time information used by the access request to return the result information sent from the client to the access request to the client.
  • Desensitization is to transform the sensitive information in the result information through the desensitization rule to realize the reliability protection of sensitive private data.
  • a plurality of Handler components may be set according to requirements, and in the process of processing the result information, the result information may be sequentially transmitted to the next Handler component, thereby realizing flexible and transparent change of the result information data.
  • the result is 2, and the Handler component processes the returned result 2 according to a predefined processing manner, for example, compression, for the client to receive the information and perform corresponding processing according to the information.
  • a predefined processing manner for example, compression
  • the Handler component can send the return result 3 and the additional result error information to the client according to a predefined processing manner.
  • the access request conversion method provided by the embodiment of the present application determines the access according to the received access request.
  • the target service type of the request, the access request is parsed into the corresponding data structure of the target service type, and provided to the corresponding server side, realizing the function of the multi-network unified request interface in the big data platform environment, decoupling between the systems
  • the dependency improves the system's management mechanism for each module.
  • the Filter component and the Handler component in FIG. 3 may be loaded according to the plug-in manner, and the developer may develop data modification, identity authentication, and statistics based on the access request, that is, the http request, according to requirements. , compression and other functions.
  • the user provides basic information and can be registered in the Filter component and Handler component links.
  • the system dynamically loads components with predefined functions.
  • the device converts the access request into a general intermediate data structure, and can be docked for different communication protocols supported by the server, and automatically converts the common data structure to the fixed structure through the developed engine components. Developers are free to develop systems that support specific protocols. Compared with the development of Nginx Lua, the embodiment of the present application does not need to implement multiple data structures in the Filter component and the Handler component, saves the development cycle, and does not need to be deep in the data structure of the system as the Nginx Lua development. Understand, save development costs.
  • the client may provide an access request of the http/https, socket, and RPC (for example, the HSF and the Protobuffer) protocol
  • the server may support the HSF, the Mock, and the Protobuffer protocol.
  • the client and the server can also support other protocols. In the embodiment of the present application, no limitation is imposed on this.
  • the method may first determine whether a service corresponding to the URL path exists according to the URL, so as to speed up the client.
  • the terminal quickly obtains the resource information required for the access request.
  • the access request is subjected to corresponding pre-processing and identity verification.
  • identity verification of the access request passes, the device performs a target service type for determining the access request according to the parameter information.
  • step 220 in FIG. 2 The specific steps can be implemented by step 220 in FIG. 2, and are not described herein again for brevity.
  • the device determines whether there is a service corresponding to the URL path according to the URL, or determines a target service type of the access request according to the parameter information, if there is no service corresponding to the URL path or the target service Type, the information error is returned to the client, indicating the cause of the error, so that the user who uses the client is aware of the cause of the error.
  • FIG. 5 is a schematic structural diagram of a device provided by the present application. As shown in FIG. 5, the device includes:
  • the receiving module 510 is configured to receive an access request sent by the client, where the access request includes the same resource locator URL and parameter information;
  • a determining module 520 configured to determine, according to the URL and the parameter information, a target service type of the access request
  • the conversion module 530 is configured to convert the access request according to the target service type
  • the sending module 540 is configured to send, according to the target service type, the access request converted to the server end corresponding to the target service type, for the server, and return the result information according to the target service type converted access request.
  • the determining module 520 is further configured to perform predefined processing on the access request, where the predefined processing includes authenticating the access request; when the authentication is passed, according to the URL and the parameter information, Determine the target service type for the access request.
  • the determining module 520 is specifically configured to: match the identity verification parameter information in the access request with the token information of the token center; and match the identity verification parameter information with the token information.
  • the access request is authenticated.
  • the determining module is specifically configured to determine, according to the URL, whether a service corresponding to the URL path exists; and when there is a service corresponding to the URL path, determine a target service type of the access request according to the parameter information.
  • the determining module 520 is configured to determine, according to the URL, whether a service corresponding to the URL path exists, and when the access request authentication is passed, determining a destination service type of the access request according to the parameter information.
  • the receiving module 510 is further configured to receive result information
  • the processing module is further configured to process the result information
  • the sending module 540 is further configured to send the processed result information to the client, for the client to perform a corresponding operation according to the processed result.
  • the processing includes any one or more of data modification, compression, and desensitization.
  • the apparatus further includes a query module, configured to query, according to the target service type, a server end corresponding to the target service type recorded in the fault tolerance component.
  • a query module configured to query, according to the target service type, a server end corresponding to the target service type recorded in the fault tolerance component.
  • the apparatus provided by the embodiment of the present application determines the target service type of the access request according to the received access request, parses the access request into a data structure corresponding to the target service type, and provides the data structure to the corresponding server, and implements the big data.
  • the function of the multi-network unified request interface in the platform environment decouples the dependencies between the systems, The system's management mechanism for each module is high.
  • the steps of a method or algorithm described in connection with the embodiments disclosed herein can be implemented in hardware, a software module executed by a processor, or a combination of both.
  • the software module can be placed in random access memory (RAM), memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or technical field. Any other form of storage medium known.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

本申请涉及一种访问请求转换的方法和装置,该方法包括:接收客户端发送的访问请求,访问请求包括同一资源定位符URL和参数信息;根据URL和参数信息,确定访问请求的目标服务类型;根据目标服务类型转换访问请求;向目标服务类型对应的服务器端发送根据目标服务类型转换后的访问请求,以用于服务器端,根据目标服务类型转换后的访问请求返回结果信息。采用本申请提供的访问请求转换的方法,通过根据接收的访问请求,确定访问请求的目标服务类型,将访问请求解析为目标服务类型相对应的数据结构,并提供给相应的服务器端,实现了大数据平台环境下的多网络统一请求接口的功能,解耦了系统之间的依赖性,提高了系统对各模块的管理机制功能。

Description

访问请求转换的方法和装置
本申请要求2015年12月08日递交的申请号为201510896122.8、发明名称为“访问请求转换的方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及数据开发,尤其涉及一种访问请求转换的方法和装置。
背景技术
在大数据平台系统中,需要多个模块来实现各自的功能,而这个模块需要不同的开发人员设计开发,由于功能和性能的需求,开发人员设计的模块接口的形式也有多种类型,例如:远程过程调用协议(Remote Procedure Call Protocol,RPC),自定义二进制协议等,开发人员需要根据每种协议的交互方式进行开发,造成模块之间有很高的耦合性。
为了降低模块之间的耦合性,目前,大数据平台中应用一些协议中间转换装置,例如:Nginx Module和ServiceMix。在Nginx Module体系中,如图1所示,当接收到请求(Request)时,通过查找配置文件将接收的请求映射到局域数据表中,以触发局域数据表中存储的指令,指示handle模块和多个filter模块完成各自的工作,从而返回响应(Response),其中handler模块负责处理请求,完成响应内容的生成;filter模块对响应内容进行处理。在ServiceMix系统中,虽然可以支持较多的协议,也可以根据需求进行协议扩展。
但是,在Nginx Module系统和ServiceMix系统中,系统之间的依赖性比较大,且对系统中各模块的集群管理机制功能较弱,例如:负载的均衡、容错等。
发明内容
本发明实施例提供一种访问请求转换的方法和装置,以解决系统之间的依赖性,提高系统对各模块的管理机制功能。
第一方面,本发明提供了一种访问请求转换的方法,该方法包括:
接收客户端发送的访问请求,所述访问请求包括统一资源定位符URL和参数信息;
根据所述URL和所述参数信息,确定所述访问请求的目标服务类型;
根据所述目标服务类型转换所述访问请求;
向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请 求,以用于所述服务器端,根据所述目标服务类型转换后的访问请求返回结果信息。
第二方面,本发明实施例提供了一种装置,该装置包括:
接收模块,用于接收客户端发送的访问请求,所述访问请求包括统一资源定位符URL和参数信息;
确定模块,用于根据所述URL和所述参数信息,确定所述访问请求的目标服务类型;
转换模块,用于根据所述目标服务类型转换所述访问请求;
发送模块,用于向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求,以用于所述服务器端,根据所述目标服务类型转换后的访问请求返回结果信息。
基于本发明实施例提供的一种访问请求转换的方法和装置,通过根据接收的访问请求,确定访问请求的目标服务类型,将访问请求解析为目标服务类型相对应的数据结构,并提供给相应的服务器端,实现了大数据平台环境下的多网络统一请求接口的功能,解耦了系统之间的依赖性,提高了系统对各模块的管理机制功能。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对本发明实施例中所需要使用的附图作简单地介绍,显而易见地,下面所描述的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为现有技术中Nginx Lua系统的结构示意图;
图2为本申请实施例提供的一种访问请求转换方法的流程图;
图3为本申请实施例提供的一种装置结构示意图;
图4为本申请另一实施例提供的访问请求转换方法的流程图;
图5为本申请另一实施例提供的一种装置结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明的一部分实施例,而不是全部实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其 他实施例,都应属于本发明保护的范围。
本申请实施例提供的一种访问请求转换的方法和装置,适用于大数据平台场景下,访问请求转换的装置通过接收客户端发送的一种协议的访问请求,例如http/https协议的访问请求,可以去访问支持多种协议的服务器端,例如:支持远程过程调用协议(Remote Procedure Call Protocol,RPC),自定义二进制协议等,以完成客户端对目的资源的需求。
需要说明的是,在本申请实施例中,客户端是指与服务器端相对应,为客户提供本地服务的程序,也可以称作客户端(Client)或者用户端,客户端一般安装在普通的客服机上。客户端可以通过不同的协议,例如:socket、http/https、RPC等协议与其他客户端进行交互。访问请求为客户端与服务器端之间通过协议请求应答模式进行交互时,产生的请求消息。服务器端,从广义上来讲是服务器,是网络中能对其他设备提供服务的计算机系统。服务器端需要根据接收到的访问请求做出响应,并进行处理,服务器端具备承担访问服务并保证服务质量的能力。根据服务类型的不同,服务器端可以分为数据库服务器端,应用程序服务器端,Web服务器端等。
为便于说明,结合图2对本申请实施例的技术方案进行详细的说明。应理解,这仅是用以说明本申请实施例的技术方案的一个例子,并不对本申请实施例构成任何的限定。
图2为本申请实施例提供的一种访问请求转换方法的流程图。该方法的执行主体可以为具有处理能力的设备:系统或者装置,例如协议中间转换装置。如图2所示,该方法具体包括:
步骤210,接收客户端发送的访问请求,所述访问请求包括统一资源定位符URL和参数信息。
该访问请求为客户端通过某种协议发送的请求消息,例如,http请求,在该请求消息中可以包括统一资源定位符(UniformResourceLocator,URL),参数信息和消息体。其中,URL是对可以从互联网上得到的资源的位置和访问方法的一种简洁的表示,是互联网上标准资源的地址。互联网上的每一个文件都有一个唯一的URL,URL的信息包括资源的位置信息和客户端的处理方式。参数信息可以包括获取对应URL标识的资源的参数GET,在URL标识的资源后附加新数据的参数POST,访问请求获取由URL所标识的资源的响应消息报头HEAD,以及与安全信息相关的访问请求的身份验证参数等相关参数。
可选地,当接收到访问请求之后,对该访问请求进行解析,从该访问请求中获取URL,参数信息和消息体等相应的信息。
在获取到访问请求中的相应信息之后,该方法可以包括以下步骤:
对访问请求进行预定义处理,该预定义处理包括对访问请求进行身份验证;当身份验证通过时,根据URL和参数信息,确定访问请求的目标服务类型。
具体的,对访问请求进行预定义加工处理,可以包括预定义的数据修改,对访问请求的身份验证等处理。例如该步骤可以通过注册在该装置中,开发者自定义开发Filter组件来实现,如图3所示。
在本申请实施例中,对访问请求进行身份验证可以包括:将访问请求中的身份验证参数信息与令牌中心的令牌信息进行匹配;当身份验证参数信息与所述令牌信息相匹配时,访问请求身份验证通过。
具体的,Filter组件将访问请求发送给令牌(Token)中心,以便于令牌中心根据访问请求中的信息进行计算,得到令牌信息,并将该令牌信息与访问请求中的身份验证参数信息进行匹配,当两者相匹配时,则该访问请求的身份验证通过,以表示该访问请求通过合法验证,反之,则未通过验证。
当访问请求的身份验证未通过时,向终端返回向客户端返回信息错误,以向用户表示该访问请求的身份验证未通过,便于加快客户端信息的获取。当访问请求的身份验证通过时,执行步骤220。
步骤220,根据所述URL和所述参数信息,确定所述访问请求的目标服务类型。
具体的,在申请实施例中,目标服务类型为服务器端可以支持的协议类型,如HSF、Mock和Protobuffer协议类型,在本申请实施例中还可以扩展其他的协议类型,在本申请实施例中对此不作任何限制。
在本申请实施例中,根据URL和参数信息,确定访问请求的目标服务类型,具体包括:
根据URL确定是否存在URL路径对应的服务;
当存在URL路径对应的服务时,根据参数信息确定访问请求的目标服务类型。
具体的,装置可以通过查表的方式确定URL路径是否有对应的服务,例如表1,可以根据URL的路径查找表中是否有相应的路径存在,比如,访问请求中的URL路径为路径1,通过查表确定是否存在路径1。当访问请求中的URL路径存在与表中时,确定该URL路径对应的服务存在,反之,在不存在。
表1
URL 目标服务类型
路径1 HSF
路径2 Mock
路径3 Protobuffer
应理解,在本申请实施例中,表1只是为了详细的描述本申请的技术方案,表1中的内容并不构成本申请实施例的限制,在本申请实施例中对此也不作任何限制。
当根据URL确定URL路径存在对应的服务时,根据参数信息确定访问请求转换的目标服务类型。例如可以通过查表的方式确定目标服务类型,如表1所示,根据确定存在的路径1查询相对应的目标服务类型为HSF。具体可以通过如图3所示的引擎路由组件完成该目标服务的确定,该引擎路由组件可以为开发人员开发的具有根据访问请求中的URL和参数信息确定目标服务类型功能的程序,包括分区(sharding)组件和容错(failover)组件,分区组件用于对访问请求的服务器端(HSF_Provider1,HSF_Provider2,PBService_1和PBService_2)配置的容错、负载均衡(Load Balance)策略,根据确定的目标服务类型进行访问请求的分发,将访问请求发送给相应目标服务类型的引擎组件,例如HSF、Mock和Protobuffer。其中,容错是指当装置中的数据、文件损坏或者丢失时,装置能够自动将损坏或者丢失的文件、数据恢复到发生事故以前的状态,以保证装置能够正常运行。负载均衡是说将访问请求分发给多个引擎组件对应的服务器端进行处理,例如HSF_Provider1,HSF_Provider2,PBService_1和PBService_2等服务器端,从而实现共同完成访问请求的处理任务。
在本申请实施例中,容错组件有记录服务器管配置的功能,以便于路由引擎通过查询容错组件中的服务器端的配置情况,将访问请求分发给响应目标服务类型的引擎组件上,实现负载均衡。也就是说,在向目标服务类型对应的服务器端发送根据目标服务类型转换后的访问请求之前,该方法还包括:根据目标服务类型,查询容错组件中记录的目标服务类型对应的服务器端,以便于根据服务器端的配置情况将访问请求信息根据目标服务类型分发到响应的服务器端,以实现负载均衡。
在本申请实施例中,当装置根据URL确定是否存在URL路径对应的服务,或者根据参数信息确定访问请求的目标服务类型过程中,如果不存在URL路径对应的服务或者目标服务类型,则向客户端返回信息错误,表明出错的原因,以使使用该客户端的用户清楚出错的原因。
步骤230,根据所述目标服务类型转换所述访问请求。
具体的,当引擎组件接收到访问请求时,根据目标服务类型,将接收到的访问请求的数据结构进行转换,转换为服务器端可以支持的协议类型,例如图3所示,访问请求可以通过引擎组件HSF、Mock或Protobuffer进行转换,转换为HSF_Provider1、HSF_Provider2,Mock服务器端,PBService_1和PBService_2可以支持的协议类型。其中,PBService为Protobuffer Service的简写。
步骤240,向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求,以用于所述服务器端,根据所述目标服务类型转换后的访问请求返回结果信息。
具体的,当引擎组件将访问请求转换为相应目标服务类型的访问请求时,将转换后的访问请求分别发送给相应的服务器端,以便于相应的服务器端根据响应的访问请求作出响应,并返回结果信息。该结果信息为客户端访问请求的资源信息,可以是文字、图像、视频等信息。
在本申请实施例中,该方法还可以包括:接收结果信息;对结果信息进行加工处理;向客户端发送加工处理后的结果信息,以用于客户端根据加工后的结果信息进行相应的操作。
具体的,引擎组件接收服务端发送的结果信息,并发送给引擎路由组件。引擎路由组件将接收到的不同引擎组件发送的结果信息的数据结构化为统一的数据结构,并返回给如图3所述的Handler组件,该组件为开发人员开发的,具有将返回的结果信息加工处理为客户端可以接收的数据结构功能的程序,例如,可以针对访问请求的结果信息进行压缩、log记录、数据修改,脱敏等。其中,log记录可以记录访问请求从客户端发出至该访问请求的结果信息返回客户端所用的时间信息。脱敏为将结果信息中的敏感信息通过脱敏规则进行数据变形,实现敏感隐私数据的可靠性保护。在本申请实施例中,可以根据需求设置多个Handler组件,在对结果信息进行加工处理的过程中,可以依次将结果信息传输给下一个Handler组件,实现灵活、透明的改变结果信息的数据。
在本申请实施例中,例如,访问请求为1+1=?,返回结果为2,Handler组件根据预定义的处理方式对返回的结果2进行处理,例如,压缩,以用于客户端接收到信息后,根据信息进行相应的处理。当返回结果为其他数字,例如3,则Handler组件根据预定义的处理方式可以将返回结果3与附加的结果错误信息发送给客户端。
基于本申请实施例提供的访问请求转换方法,通过根据接收的访问请求,确定访问 请求的目标服务类型,将访问请求解析为目标服务类型相对应的数据结构,并提供给相应的服务器端,实现了大数据平台环境下的多网络统一请求接口的功能,解耦了系统之间的依赖性,提高了系统对各模块的管理机制功能。
应理解,在本申请实施例中,图3中的Filter组件和Handler组件可以依插件的方式进行加载,开发者可以根据需求,开发基于该访问请求,即http请求的数据修改、身份认证,统计,压缩等功能。用户提供基本的信息,就可以注册到Filter组件和Handler组件链路中,当启动该装置时,系统会动态加载具有预定义功能的组件。
在本申请实施例中,装置会把访问请求转换成通用的中间数据结构,可以针对不同的服务器端支持的通信协议进行对接,通过开发的各个引擎组件自动实现通用数据结构到固定结构的转换,可以让开发者自由开发支持特定协议的体系。相对Nginx Lua的开发而言,本申请实施例不需要在Filter组件和Handler组件中实现多种数据结构,节省了开发周期,并且也不需要同Nginx Lua开发一样,对系统的数据结构进行深入的了解,节省了开发成本。
需要说明的是,在本申请实施例中,客户端可以提供http/https,socket,RPC(例如HSF和Protobuffer)协议的访问请求,服务器端可以支持HSF、Mock和Protobuffer协议,在本申请实施例中客户端和服务器端还可以支持其他的协议,在本申请实施例中,对此不作任何限制。
还需要说明的是,本申请实施例可以通过Jave语言来实现。
可选地,在本申请另一实施例中,如图4所示,该方法可以在装置获取到访问请求中的相应信息之后,先执行根据URL确定是否存在URL路径对应的服务,以加快客户端快速获取访问请求所需的资源信息。
当确定URL路径对应的服务存在时,对访问请求进行相应的预处理和身份验证,在访问请求的身份验证通过时,装置执行根据参数信息确定访问请求的目标服务类型。
具体步骤可以通过图2中的步骤220来实现,为了简洁,在此不再赘述。
需要说明的是,在本申请实施例中,当装置根据URL确定是否存在URL路径对应的服务,或者根据参数信息确定访问请求的目标服务类型过程中,如果不存在URL路径对应的服务或者目标服务类型,则向客户端返回信息错误,表明出错的原因,以使使用该客户端的用户清楚出错的原因。
上文中结合图2至图4,详细描述了根据本申请实施例访问请求转换的方法,下 面将结合图5,详细描述根据本申请实施例提供的装置。
图5为本申请提供的一种装置的结构示意图,如图5所示,该装置包括:
接收模块510、确定模块520、转换模块530和发送模块540。接收模块510,用于接收客户端发送的访问请求,访问请求包括同一资源定位符URL和参数信息;
确定模块520,用于根据URL和所述参数信息,确定访问请求的目标服务类型;
转换模块530,用于根据目标服务类型转换访问请求;
发送模块540,用于向目标服务类型对应的服务器端发送根据目标服务类型转换后的访问请求,以用于服务器端,根据目标服务类型转换后的访问请求返回结果信息。
可选地,作为本申请另一实施例,确定模块520还用于,对访问请求进行预定义处理,预定义处理包括对访问请求进行身份验证;当身份验证通过时,根据URL和参数信息,确定访问请求的目标服务类型。
可选地,作为本申请另一实施例,确定模块520具体用于,将访问请求中的身份验证参数信息与令牌中心的令牌信息进行匹配;当身份验证参数信息与令牌信息相匹配时,访问请求身份验证通过。
可选地,作为本申请另一实施例,确定模块具体用于,根据URL确定是否存在URL路径对应的服务;当存在URL路径对应的服务时,根据参数信息确定访问请求的目标服务类型。
可选地,作为本申请另一实施例,确定模块520用于,根据URL确定是否存在URL路径对应的服务,以用于访问请求身份验证通过时,根据参数信息确定访问请求的目的服务类型。
可选地,作为本申请另一实施例,接收模块510还用于,接收结果信息;
处理模块还用于,对所述结果信息进行加工处理;
发送模块540还用于,向客户端发送加工处理后的结果信息,以用于客户端根据加工处理后的结果进行相应的操作。
其中,加工处理包括数据修改、压缩、脱敏中的任一种或者多种。
可选地,作为本申请另一实施例,该装置还包括查询模块,用于根据目标服务类型,查询容错组件中记录的目标服务类型对应的服务器端。
基于本申请实施例提供的装置,通过根据接收的访问请求,确定访问请求的目标服务类型,将访问请求解析为目标服务类型相对应的数据结构,并提供给相应的服务器端,实现了大数据平台环境下的多网络统一请求接口的功能,解耦了系统之间的依赖性,提 高了系统对各模块的管理机制功能。
需要说明的是,在本申请实施例中,根据图5提供的装置中的各个模块的上述和其它操作和/或功能可以通过图3中的装置的各个模块来实现,可以分别实现图2和图4中的各个方法的相应流程,为了简洁,在此不再赘述。
专业人员应该还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
结合本文中所公开的实施例描述的方法或算法的步骤可以用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (16)

  1. 一种访问请求转换的方法,其特征在于,所述方法包括:
    接收客户端发送的访问请求,所述访问请求包括统一资源定位符URL和参数信息;
    根据所述URL和所述参数信息,确定所述访问请求的目标服务类型;
    根据所述目标服务类型转换所述访问请求;
    向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求,以便所述服务器端根据所述目标服务类型转换后的访问请求返回结果信息。
  2. 根据权利要求1所述的方法,其特征在于,在所述接收客户端发送的访问请求之后,所述方法还包括:
    对所述访问请求进行预定义处理,所述预定义处理包括对所述访问请求进行身份验证;
    当身份验证通过时,根据所述URL和所述参数信息,确定所述访问请求的目标服务类型。
  3. 根据权利要求2所述的方法,其特征在于,所述对所述访问请求进行身份验证包括:
    将所述访问请求中的身份验证参数信息与令牌中心的令牌信息进行匹配;
    当所述身份验证参数信息与所述令牌信息相匹配时,所述访问请求身份验证通过。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述根据所述URL和所述参数信息,确定所述访问请求的目标服务类型,包括:
    根据所述URL确定是否存在URL路径对应的服务;
    当存在所述URL路径对应的服务时,根据所述参数信息确定所述访问请求的目标服务类型。
  5. 根据权利要求2所述的方法,其特征在于,在对所述访问请求进行预处理之前,所述方法包括:
    根据所述URL确定是否存在URL路径对应的服务,以用于所述访问请求身份验证通过时,根据所述参数信息确定所述访问请求的目的服务类型。
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述方法还包括:
    接收所述结果信息;
    对所述结果信息进行加工处理;
    向所述客户端发送加工处理后的结果信息,以用于所述客户端根据所述加工后的结 果信息进行相应的操作。
  7. 根据权利要求6所述的方法,其特征在于,所述加工处理包括数据修改、压缩、脱敏中的任一种或者多种。
  8. 根据权利要求1所述的方法,其特征在于,在所述向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求之前,所述方法还包括:
    根据所述目标服务类型,查询容错组件中记录的所述目标服务类型对应的服务器端。
  9. 一种装置,其特征在于,所述装置包括:
    接收模块,用于接收客户端发送的访问请求,所述访问请求包括统一资源定位符URL和参数信息;
    确定模块,用于根据所述URL和所述参数信息,确定所述访问请求的目标服务类型;
    转换模块,用于根据所述目标服务类型转换所述访问请求;
    发送模块,用于向所述目标服务类型对应的服务器端发送根据所述目标服务类型转换后的访问请求,以用于所述服务器端,根据所述目标服务类型转换后的访问请求返回结果信息。
  10. 根据权利要求9所述的装置,其特征在于,所述确定模块还用于,
    对所述访问请求进行预定义处理,所述预定义处理包括对所述访问请求进行身份验证;
    当身份验证通过时,根据所述URL和所述参数信息,确定所述访问请求的目标服务类型。
  11. 根据权利要求10所述的装置,其特征在于,所述确定模块具体用于,
    将所述访问请求中的身份验证参数信息与令牌中心的令牌信息进行匹配;
    当所述身份验证参数信息与所述令牌信息相匹配时,所述访问请求身份验证通过。
  12. 根据权利要求9至11任一项所述的装置,其特征在于,所述确定模块具体用于,
    根据所述URL确定是否存在URL路径对应的服务;
    当存在所述URL路径对应的服务时,根据所述参数信息确定所述访问请求的目标服务类型。
  13. 根据权利要求10所述的装置,其特征在于,所述确定模块用于,根据所述URL 确定是否存在URL路径对应的服务,以用于所述访问请求身份验证通过时,根据所述参数信息确定所述访问请求的目的服务类型。
  14. 根据权利要求9至13任一项所述的装置,其特征在于,
    所述接收模块还用于,接收所述结果信息;
    所述处理模块还用于,对所述结果信息进行加工处理;
    所述发送模块还用于,向所述客户端发送加工处理后的结果信息,以用于所述客户端根据所述加工处理后的结果进行相应的操作。
  15. 根据权利要求14所述的装置,其特征在于,所述加工处理包括数据修改、压缩、脱敏中的任一种或者多种。
  16. 根据权利要求9所述的装置,其特征在于,所述装置还包括查询模块,用于根据所述目标服务类型,查询容错组件中记录的所述目标服务类型对应的服务器端。
PCT/CN2016/107408 2015-12-08 2016-11-28 访问请求转换的方法和装置 WO2017097123A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP16872315.3A EP3389219B1 (en) 2015-12-08 2016-11-28 Access request conversion method and device
JP2018524479A JP6912469B2 (ja) 2015-12-08 2016-11-28 アクセス要求変換方法および装置
US16/003,046 US11647009B2 (en) 2015-12-08 2018-06-07 Access request conversion method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510896122.8A CN106856434B (zh) 2015-12-08 2015-12-08 访问请求转换的方法和装置
CN201510896122.8 2015-12-08

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/003,046 Continuation US11647009B2 (en) 2015-12-08 2018-06-07 Access request conversion method and apparatus

Publications (1)

Publication Number Publication Date
WO2017097123A1 true WO2017097123A1 (zh) 2017-06-15

Family

ID=59012694

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/107408 WO2017097123A1 (zh) 2015-12-08 2016-11-28 访问请求转换的方法和装置

Country Status (5)

Country Link
US (1) US11647009B2 (zh)
EP (1) EP3389219B1 (zh)
JP (1) JP6912469B2 (zh)
CN (1) CN106856434B (zh)
WO (1) WO2017097123A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110795646A (zh) * 2019-09-30 2020-02-14 北京奇艺世纪科技有限公司 请求处理方法、装置、电子设备和计算机可读存储介质
CN111931030A (zh) * 2020-07-30 2020-11-13 中粮招商局(深圳)粮食电子交易中心有限公司 基于异构系统的请求适配方法、装置、设备及存储介质
CN114448857A (zh) * 2022-01-29 2022-05-06 北京字节跳动网络技术有限公司 Mock服务处理方法、装置、存储介质和系统
US11647009B2 (en) 2015-12-08 2023-05-09 Alibaba Group Holding Limited Access request conversion method and apparatus

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107102882A (zh) * 2017-06-21 2017-08-29 北京奇艺世纪科技有限公司 iOS系统的业务处理方法及装置
CN107360261B (zh) * 2017-09-07 2020-07-10 北京奇艺世纪科技有限公司 一种http请求处理方法、装置及电子设备
CN107835178B (zh) * 2017-11-13 2020-10-30 北京奇艺世纪科技有限公司 一种多协议服务通信方法、装置以及电子设备
CN110163382A (zh) * 2018-02-12 2019-08-23 北京京东尚科信息技术有限公司 信息生成方法和装置
US10671462B2 (en) * 2018-07-24 2020-06-02 Cisco Technology, Inc. System and method for message management across a network
CN109101351A (zh) * 2018-08-29 2018-12-28 郑州云海信息技术有限公司 一种解析基板管理控制器web返回值的方法、装置及设备
CN109150893B (zh) * 2018-09-12 2021-10-26 山东中创软件工程股份有限公司 一种服务请求转发方法及相关装置
CN109639636B (zh) * 2018-11-06 2021-04-02 创新先进技术有限公司 业务数据转发、业务数据处理方法、装置及电子设备
CN109445968A (zh) * 2018-11-09 2019-03-08 金瓜子科技发展(北京)有限公司 不同协议的服务请求处理方法、装置、设备及存储介质
CN109743222A (zh) * 2018-12-25 2019-05-10 瑞庭网络技术(上海)有限公司 一种数据测试方法及相关设备
CN110351350B (zh) * 2019-06-28 2022-09-06 北京你财富计算机科技有限公司 基于多服务器对接的客户端请求处理方法、系统和电子设备
CN110311983B (zh) * 2019-07-09 2021-04-06 北京字节跳动网络技术有限公司 服务请求的处理方法、装置、系统、电子设备及存储介质
CN110611725B (zh) * 2019-09-16 2022-06-03 腾讯科技(深圳)有限公司 节点访问方法、装置、计算机设备和存储介质
CN112153152A (zh) * 2020-09-28 2020-12-29 深圳壹账通智能科技有限公司 算法服务接口的管理方法及系统
CN112632945B (zh) * 2020-12-17 2022-11-08 上海哔哩哔哩科技有限公司 一种报表构建方法及装置
CN112579933B (zh) * 2020-12-24 2023-12-08 中国农业银行股份有限公司 一种信息处理方法及装置
CN114765552B (zh) * 2021-01-04 2023-11-07 航天信息股份有限公司 数据处理方法、中台系统、存储介质和电子设备
CN112906025B (zh) * 2021-03-03 2022-01-07 江苏保旺达软件技术有限公司 数据库管控方法、装置、设备及存储介质
CN113784354B (zh) * 2021-09-17 2024-04-09 城云科技(中国)有限公司 基于网关的请求转换方法和装置
CN114116067B (zh) * 2021-12-02 2024-02-27 多点生活(武汉)科技有限公司 内外系统的信息配置方法、装置、电子设备和可读存储介质
CN114615336A (zh) * 2022-04-06 2022-06-10 北京字节跳动网络技术有限公司 一种请求调度方法、装置、计算机设备和存储介质
CN114968617B (zh) * 2022-04-28 2023-09-01 杭州未名信科科技有限公司 Api转换系统及其访问请求处理方法、电子设备及介质
WO2024033877A1 (en) * 2022-08-10 2024-02-15 Shabodi Corp. Near real time request handling in flexible api router
CN117573762B (zh) * 2024-01-15 2024-04-16 杭州数云信息技术有限公司 数据连接平台的数据处理方法及装置、存储介质、服务器

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003073700A2 (en) * 2002-02-21 2003-09-04 Hewlett-Packard Company A system and method for providing personal connectivity between a computing device and a computer network
CN101674236A (zh) * 2008-09-09 2010-03-17 株式会社日立制作所 通信系统
CN102056333A (zh) * 2009-11-05 2011-05-11 中国移动通信集团河南有限公司 Wap网关及其业务处理方法和wap代理服务器

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69623035T2 (de) * 1995-11-14 2003-03-06 Ibm Mehrprotokollkommunikation zwischen einem allgemeinen netzbrowser und mehreren zugangsnetzanbietern
US6792605B1 (en) 1999-06-10 2004-09-14 Bow Street Software, Inc. Method and apparatus for providing web based services using an XML Runtime model to store state session data
US7873734B1 (en) * 2001-05-17 2011-01-18 Computer Associates Think, Inc. Management of multiple user sessions and user requests for multiple electronic devices
CN100432998C (zh) * 2003-08-07 2008-11-12 蒂蒙系统公司 包括使用多种操作协议的协议接口设备的通信系统及相关方法
CN1867906B (zh) * 2003-08-11 2010-06-16 蒂蒙系统公司 提供多层可扩展协议接口的通信系统及相关方法
JP4365401B2 (ja) * 2006-12-14 2009-11-18 富士通株式会社 通信制御プログラム、通信制御方法および通信制御装置
JP5188284B2 (ja) 2008-06-17 2013-04-24 三菱電機株式会社 サービス接続システム及びサービス接続方法
CN101616136B (zh) * 2008-06-26 2013-05-01 阿里巴巴集团控股有限公司 一种提供互联网服务的方法及服务集成平台系统
JP2010009520A (ja) * 2008-06-30 2010-01-14 Canon Inc フロー処理装置及びメッセージ変換方法
EP2259551A1 (en) * 2009-06-05 2010-12-08 Software AG Gateway server system comprising a gateway server for making SOAP/XML-based web services accessible to RPC clients
US20110178890A1 (en) * 2010-01-15 2011-07-21 Endurance International Group, Inc. Common services web hosting architecture with multiple branding
CN102262560B (zh) * 2010-05-27 2016-12-28 阿里巴巴集团控股有限公司 一种远程服务的调用方法、装置及系统
CN101924758B (zh) * 2010-07-28 2015-01-28 中兴通讯股份有限公司 一种媒体服务器及其提供服务的方法
CN102547553B (zh) * 2010-12-30 2014-10-08 中国移动通信集团公司 一种基于wap进行业务访问的方法、系统及装置
CN103001931A (zh) * 2011-09-08 2013-03-27 北京智慧风云科技有限公司 不同网络间终端互联的通信系统
CN103383687B (zh) * 2012-05-02 2017-03-01 阿里巴巴集团控股有限公司 一种页面处理方法和装置
CN102694701B (zh) * 2012-06-13 2015-12-02 青岛海信传媒网络技术有限公司 基于消息的测试方法及系统
US9736034B2 (en) * 2012-09-19 2017-08-15 Oracle International Corporation System and method for small batching processing of usage requests
CN103716308B (zh) 2013-12-17 2017-04-12 北京京东尚科信息技术有限公司 一种多协议平台通信方法及多协议平台
US9632991B2 (en) * 2014-09-15 2017-04-25 Oracle International Corporation High performant and high fidelity previews for CSS preprocessing frameworks
US10362059B2 (en) * 2014-09-24 2019-07-23 Oracle International Corporation Proxy servers within computer subnetworks
CN106856434B (zh) 2015-12-08 2020-06-30 阿里巴巴集团控股有限公司 访问请求转换的方法和装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003073700A2 (en) * 2002-02-21 2003-09-04 Hewlett-Packard Company A system and method for providing personal connectivity between a computing device and a computer network
CN101674236A (zh) * 2008-09-09 2010-03-17 株式会社日立制作所 通信系统
CN102056333A (zh) * 2009-11-05 2011-05-11 中国移动通信集团河南有限公司 Wap网关及其业务处理方法和wap代理服务器

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3389219A4 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11647009B2 (en) 2015-12-08 2023-05-09 Alibaba Group Holding Limited Access request conversion method and apparatus
CN110795646A (zh) * 2019-09-30 2020-02-14 北京奇艺世纪科技有限公司 请求处理方法、装置、电子设备和计算机可读存储介质
CN111931030A (zh) * 2020-07-30 2020-11-13 中粮招商局(深圳)粮食电子交易中心有限公司 基于异构系统的请求适配方法、装置、设备及存储介质
CN114448857A (zh) * 2022-01-29 2022-05-06 北京字节跳动网络技术有限公司 Mock服务处理方法、装置、存储介质和系统

Also Published As

Publication number Publication date
CN106856434A (zh) 2017-06-16
EP3389219A4 (en) 2018-10-17
US20180288187A1 (en) 2018-10-04
EP3389219B1 (en) 2020-05-20
JP6912469B2 (ja) 2021-08-04
JP2018536935A (ja) 2018-12-13
EP3389219A1 (en) 2018-10-17
US11647009B2 (en) 2023-05-09
CN106856434B (zh) 2020-06-30

Similar Documents

Publication Publication Date Title
WO2017097123A1 (zh) 访问请求转换的方法和装置
CN109067914B (zh) Web服务的代理方法、装置、设备及存储介质
US9003478B2 (en) Enforcement of conditional policy attachments
US8903884B2 (en) Multi-tenant services gateway
US8838792B2 (en) Identity provider instance discovery
US8869258B2 (en) Facilitating token request troubleshooting
US9507927B2 (en) Dynamic identity switching
US10567492B1 (en) Methods for load balancing in a federated identity environment and devices thereof
CN111953770B (zh) 一种路由转发方法、装置、路由设备及可读存储介质
CN114902612A (zh) 基于边缘网络的帐户保护服务
CN114785590A (zh) 登录方法、装置、设备、存储介质
US20120246215A1 (en) Identying users of remote sessions
US8996607B1 (en) Identity-based casting of network addresses
TW201828093A (zh) 訪問請求轉換的方法和裝置
CN112769863B (zh) 一种业务请求报文数据的处理方法、装置、电子设备及可读存储介质
US20160006821A1 (en) Correlation Identity Generation Method For Cloud Environment
CN115378645A (zh) 一种基于电力营销管理系统统一认证的验证方法及系统
US11546405B2 (en) Methods for exposing mainframe data as a web service and devices thereof
CN113282897A (zh) 一种多系统的账号共用方法、装置、设备及介质
CN112422429B (zh) 数据请求处理方法和装置、存储介质和电子设备
US11663058B1 (en) Preemptive filtering of events of an event bus with a deterministic filter
CN116506282A (zh) 一种实现openstack nat会话日志的方法及系统
WO2022271523A1 (en) Systems and methods for autonomous program detection
CN117499181A (zh) 数据回调方法、装置、设备及计算机可读存储介质
CN117614628A (zh) 一种基于istio的jwt认证授权方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16872315

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2018524479

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2016872315

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2016872315

Country of ref document: EP

Effective date: 20180709