WO2023011274A1 - 一种通讯协议转换方法、设备、系统及网关设备 - Google Patents

一种通讯协议转换方法、设备、系统及网关设备 Download PDF

Info

Publication number
WO2023011274A1
WO2023011274A1 PCT/CN2022/108151 CN2022108151W WO2023011274A1 WO 2023011274 A1 WO2023011274 A1 WO 2023011274A1 CN 2022108151 W CN2022108151 W CN 2022108151W WO 2023011274 A1 WO2023011274 A1 WO 2023011274A1
Authority
WO
WIPO (PCT)
Prior art keywords
request message
configuration
party system
configuration rule
network request
Prior art date
Application number
PCT/CN2022/108151
Other languages
English (en)
French (fr)
Inventor
许祺
Original Assignee
京东方科技集团股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东方科技集团股份有限公司 filed Critical 京东方科技集团股份有限公司
Priority to EP22851988.0A priority Critical patent/EP4340333A4/en
Priority to US18/576,634 priority patent/US20240214472A1/en
Publication of WO2023011274A1 publication Critical patent/WO2023011274A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1033Signalling gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present disclosure relates to the technical field of cloud services, and in particular to a communication protocol conversion method, device, system and gateway device.
  • the traditional solution is to separately develop an adapter service for protocol conversion for each third-party system, that is, it is necessary to write different codes for all third-party systems, which is inefficient.
  • the present disclosure provides a communication protocol conversion method, device, system and gateway device, which are used to provide a general communication protocol conversion method and solve the problem of low efficiency caused by traditional customized development adapter services.
  • an embodiment of the present disclosure provides a communication protocol conversion method, the method includes:
  • the network request message representing a message for establishing a communication connection with a third-party system
  • configuration rule set includes configuration rules of communication protocols of different third-party systems
  • the communication protocol conversion method provided by the embodiment of the present disclosure is a general and dynamically configurable communication protocol conversion system, and can be deployed on a gateway device.
  • the communication protocol conversion method and the functions of the gateway itself do not affect each other.
  • the implementation principle of this method is to use a predetermined configuration rule set to select a configuration rule corresponding to the received network request message from the configuration rule set, perform corresponding communication protocol conversion on the network request message, and convert the converted network request message to The message is forwarded to the third-party system, so as to realize the communication between the communication device and the third-party system.
  • This method solves the problem of inefficiency caused by the traditional custom-developed adapter service. And because the change of the configuration rule does not involve the modification of the code, even if the configuration rule is changed, the gateway device does not need to be restarted, and the communication connection between the communication device and the third-party system will not be interrupted.
  • it also includes:
  • the network request message is directly sent to the non-third-party system.
  • This embodiment can also perform common forwarding functions to meet the requirements of various systems.
  • it also includes:
  • Receiving a network request message sent by the communication device determining that the network request message is a network request message for establishing a communication connection with a third-party system, or determining that the network request message is a network request message for establishing a communication connection with a non-third-party system Network request message.
  • the method provided in this embodiment can determine whether the network request message is from a third-party system or a non-third-party system, so that the network request message of the third-party system is converted to the third-party system after protocol conversion, and the network request message of the non-third-party system is sent to the third-party system.
  • the network request message is directly sent to non-third-party systems to achieve versatility and improve integration.
  • the determining the configuration rule corresponding to the network request message from the configuration rule set includes:
  • the configuration rule corresponding to the routing information is determined from the configuration rule set.
  • the configuration rules corresponding to the routing information in the network request message can be determined through the routing information obtained after decoding the network request message, and the corresponding relationship between the routing information and the configuration rules in the configuration rule set. Since each The routes of the three-party systems are different, so the configuration rules of the third-party system can be determined through the routing information, which is simpler and more efficient.
  • the configuration rule is in one-to-one correspondence with the routing information; or, the multiple pieces of routing information correspond to the same configuration rule.
  • the routing information and configuration rules in this embodiment can be a one-to-one relationship, or a many-to-one relationship, which can be determined according to actual needs. Under the many-to-one relationship, since multiple third-party systems are allocated Different port numbers, so as to ensure that each third-party system can achieve load balancing when a large number of terminals access each third-party system at the same time.
  • the determining the configuration rule corresponding to the routing information from the configuration rule set according to the routing information carried in the network request message includes:
  • a configuration rule corresponding to the third-party system is determined from the configuration rule set.
  • the third-party system can be determined according to the routing information, especially when there are a large number of third-party systems, the gateway device can obtain the third-party system more easily through the routing information, and then determine the configuration rules of the third-party system.
  • Configuration rules can be determined conveniently and simply without professional knowledge, improving user experience and improving operation and maintenance efficiency.
  • the performing communication protocol conversion on the network request message according to the configuration rule includes:
  • the protocol conversion rules in the configuration rules are instantiated to obtain the process of performing protocol conversion
  • the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the instantiation of the protocol conversion rule in the configuration rule includes:
  • the configuration rule includes the software development kit file of the third-party system
  • use the class loader to load the software development kit file of the third-party system to obtain the process of executing the software development kit file, wherein the software There is a one-to-one correspondence between the development kit file and the third-party system.
  • the network request message performs communication protocol conversion through the protocol conversion process, including:
  • the network request message is digitally signed and encrypted by a process executing the software development kit file.
  • This embodiment can also load external sdk files.
  • the method in this embodiment can still be used to encrypt and sign network request messages by loading external sdk files. .
  • the sending the network request message after the communication protocol conversion to a corresponding third-party system includes:
  • the network request message converted from the communication protocol is sent to a third-party system corresponding to the routing information.
  • the network request message after the communication protocol conversion to the corresponding third-party system after sending the network request message after the communication protocol conversion to the corresponding third-party system, it further includes:
  • the performing communication protocol conversion on the network response message according to the configuration rule includes:
  • the communication protocol conversion is performed on the network response message.
  • the sending the network response message after the communication protocol conversion to the communication device includes:
  • the network response message converted from the communication protocol is sent to the communication device located at the source address.
  • the method further includes:
  • connection request message used to maintain the session connection is periodically sent to the third-party system, and the access token returned by the third-party system can be received periodically, so that the session connection is maintained through the received access token, and the gateway device and the third-party system are connected.
  • the session between the three-party systems is permanently maintained without interruption.
  • the period after the period sends the connection request message for maintaining the session connection to the third-party system, it further includes:
  • the method for determining the validity of the access token provided in this embodiment can improve user experience, intuitively and quickly display the token validity result to the user, and facilitate the user to quickly respond to the situation when the token becomes invalid.
  • the user is prompted through a display interface that the access token of the third-party system is invalid.
  • This embodiment can also periodically determine the validity of the access token, and if it is determined that the access token is invalid, the user can also be prompted through a display interface to improve the efficiency of user operation and maintenance.
  • the access token is invalid, reacquire a valid access token of the third-party system, and use the valid access token to update the access token of the third-party system in the configuration rule.
  • a valid access token of the third-party system can be acquired again, so as to keep the session permanently uninterrupted.
  • the re-obtaining the valid access token of the third-party system includes:
  • it also includes:
  • At least one instruction of deleting, modifying, and adding configuration rules from the user is received through the display interface.
  • This embodiment can also provide a display interface to facilitate the user to operate the configuration rules and improve the user's operation and maintenance experience.
  • it also includes:
  • the set of configuration rules is updated at a preset period.
  • the configuration rules can also be updated to ensure that the current configuration rules stored in the gateway device are all the latest configuration rules.
  • Make the update mechanism of the configuration rule set, reduce the labor cost, and the update cycle can be adjusted, and can be adjusted according to the external situation to meet the needs of users. For example, effective and appropriate adjustments can be made for high-concurrency situations (such as Double Eleven and other situations where there are large-scale external communication requests).
  • the updating the configuration rule set includes:
  • the update process is notified to update the configuration rule set;
  • the updating the configuration rule set includes:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • a communication protocol conversion system provided by an embodiment of the present disclosure includes: a communication device, a gateway device, and multiple third-party systems, wherein:
  • the communication device is configured to send a network request message for establishing a communication connection with the third-party system
  • the gateway device is configured to receive the network request message, determine a configuration rule corresponding to the network request message from the configuration rule set, perform communication protocol conversion on the network request message according to the configuration rule, and convert the communication
  • the protocol-converted network request message is sent to a corresponding third-party system, wherein the set of configuration rules includes configuration rules of communication protocols of different third-party systems.
  • a gateway device provided by an embodiment of the present disclosure includes a processor and a memory, the memory is used to store a program executable by the processor, and the processor is used to read the program in the memory and Perform the following steps:
  • configuration rule set includes configuration rules of communication protocols of different third-party systems
  • the processor is further configured to execute:
  • the network request message is directly sent to the non-third-party system.
  • the processor is further configured to execute:
  • Receiving a network request message sent by the communication device determining that the network request message is a network request message for establishing a communication connection with a third-party system, or determining that the network request message is a network request message for establishing a communication connection with a non-third-party system Network request message.
  • the processor is configured to execute:
  • the routing information carried in the network request message determine the configuration rule corresponding to the routing information from the configuration rule set.
  • the configuration rule is in one-to-one correspondence with the routing information; or, the multiple pieces of routing information correspond to the same configuration rule.
  • the processor is configured to execute:
  • a configuration rule corresponding to the third-party system is determined from the configuration rule set.
  • the processor is configured to execute:
  • the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the processor is configured to execute:
  • the configuration rule includes the software development kit file of the third-party system
  • use the class loader to load the software development kit file of the third-party system to obtain the process of executing the software development kit file, wherein the software There is a one-to-one correspondence between the development kit file and the third-party system.
  • the processor is configured to execute:
  • the network request message is digitally signed and encrypted by a process executing the software development kit file.
  • the processor is configured to execute:
  • the network request message converted from the communication protocol is sent to a third-party system corresponding to the routing information.
  • the processor is further configured to execute:
  • the processor is configured to execute:
  • the communication protocol conversion is performed on the network response message.
  • the processor is configured to execute:
  • the network response message converted from the communication protocol is sent to the communication device located at the source address.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the processor is further configured to:
  • the user is prompted through a display interface that the access token of the third-party system is invalid.
  • the processor is further configured to:
  • the access token is invalid, reacquire a valid access token of the third-party system, and use the valid access token to update the access token of the third-party system in the configuration rule.
  • the processor is configured to execute:
  • the processor is further configured to execute:
  • At least one instruction of deleting, modifying, and adding configuration rules from the user is received through the display interface.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the set of configuration rules is updated at a preset period.
  • the processor is configured to execute:
  • the update process is notified to update the configuration rule set;
  • the processor is configured to execute:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • an embodiment of the present disclosure further provides a communication protocol conversion device, the device includes a processor and a memory, the memory is used to store a program executable by the processor, and the processor is used to read the memory program in and perform the following steps:
  • configuration rule set includes configuration rules of communication protocols of different third-party systems
  • the processor is further configured to execute:
  • the network request message is directly sent to the non-third-party system.
  • the processor is further configured to execute:
  • Receiving a network request message sent by the communication device determining that the network request message is a network request message for establishing a communication connection with a third-party system, or determining that the network request message is a network request message for establishing a communication connection with a non-third-party system Network request message.
  • the processor is configured to execute:
  • the configuration rule corresponding to the routing information is determined from the configuration rule set.
  • the configuration rule is in one-to-one correspondence with the routing information; or, the multiple pieces of routing information correspond to the same configuration rule.
  • the processor is configured to execute:
  • a configuration rule corresponding to the third-party system is determined from the configuration rule set.
  • the processor is configured to execute:
  • the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the processor is configured to execute:
  • the configuration rule includes the software development kit file of the third-party system
  • use the class loader to load the software development kit file of the third-party system to obtain the process of executing the software development kit file, wherein the software There is a one-to-one correspondence between the development kit file and the third-party system.
  • the processor is configured to execute:
  • the network request message is digitally signed and encrypted by a process executing the software development kit file.
  • the processor is further configured to execute:
  • the loaded sdk file is stored in the configuration rule set, wherein the sdk file is in one-to-one correspondence with the third-party system.
  • the processor is configured to execute:
  • the network request message converted from the communication protocol is sent to a third-party system corresponding to the routing information.
  • the processor is further configured to execute:
  • the processor is configured to execute:
  • the communication protocol conversion is performed on the network response message.
  • the processor is configured to execute:
  • the network response message converted from the communication protocol is sent to the communication device located at the source address.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the processor is further configured to:
  • the user is prompted through a display interface that the access token of the third-party system is invalid.
  • the processor is further configured to:
  • the access token is invalid, reacquire the valid access token of the third-party system, and use the valid access token to update the access token of the third-party system in the configuration rule.
  • the processor is configured to execute:
  • the processor is further configured to execute:
  • At least one instruction of deleting, modifying, and adding configuration rules from the user is received through the display interface.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the set of configuration rules is updated at a preset period.
  • the processor is configured to execute:
  • the update process is notified to update the configuration rule set;
  • the processor is configured to execute:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • the embodiment of the present disclosure also provides a general-purpose communication protocol conversion device, including:
  • a receiving message unit configured to receive at least one network request message sent by the communication device for establishing a communication connection with a third-party system
  • a determining rule unit configured to determine a configuration rule corresponding to the network request message from a configuration rule set, wherein the configuration rule set includes configuration rules of communication protocols of different third-party systems;
  • a protocol converting unit configured to convert the communication protocol of the network request message according to the configuration rule
  • a message sending unit configured to send the network request message converted from the communication protocol to a corresponding third-party system.
  • the receiving message unit is also used for:
  • the network request message is directly sent to the non-third-party system.
  • the receiving message unit is also used for:
  • Receiving a network request message sent by the communication device determining that the network request message is a network request message for establishing a communication connection with a third-party system, or determining that the network request message is a network request message for establishing a communication connection with a non-third-party system Network request message.
  • the configuration rule is in one-to-one correspondence with the routing information; or, the multiple pieces of routing information correspond to the same configuration rule.
  • the determining rule unit is specifically configured to:
  • the configuration rule corresponding to the routing information is determined from the configuration rule set.
  • the determining rule unit is specifically configured to:
  • a configuration rule corresponding to the third-party system is determined from the configuration rule set.
  • the protocol conversion unit is specifically configured to:
  • the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the protocol conversion unit is specifically further configured to:
  • the configuration rule includes the software development kit file of the third-party system
  • use the class loader to load the software development kit file of the third-party system to obtain the process of executing the software development kit file, wherein the software There is a one-to-one correspondence between the development kit file and the third-party system.
  • the protocol conversion unit is specifically further configured to:
  • the network request message is digitally signed and encrypted by a process executing the software development kit file.
  • the loading unit is also specifically used for:
  • the loaded sdk file is stored in the configuration rule set, wherein the sdk file is in one-to-one correspondence with the third-party system.
  • the message sending unit is specifically configured to:
  • the network request message converted from the communication protocol is sent to a third-party system corresponding to the routing information.
  • the message sending unit is further configured to:
  • the message sending unit is specifically further configured to:
  • the communication protocol conversion is performed on the network response message.
  • the message sending unit is specifically further configured to:
  • the network response message converted from the communication protocol is sent to the communication device located at the source address.
  • the session connection unit after receiving the network request message sent by the communication device for establishing a communication connection with the third-party system, the session connection unit is also specifically configured to:
  • the session connection unit is specifically further configured to:
  • the display unit further includes:
  • the user is prompted through a display interface that the access token of the third-party system is invalid.
  • the session connection unit is further configured to:
  • the access token is invalid, reacquire a valid access token of the third-party system, and use the valid access token to update the access token of the third-party system in the configuration rule.
  • the session connection unit is specifically configured to:
  • the receiving instruction unit is also specifically configured to:
  • At least one instruction of deleting, modifying, and adding configuration rules from the user is received through the display interface.
  • the receiving instruction unit is specifically further configured to:
  • the update unit is also specifically configured to:
  • the set of configuration rules is updated at a preset period.
  • the updating unit is specifically configured to:
  • the update process is notified to update the configuration rule set;
  • the updating unit is specifically configured to:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • the embodiments of the present disclosure further provide a computer storage medium, on which a computer program is stored, and the program is used to implement the steps of the method described in the first aspect when executed by a processor.
  • FIG. 1 is a schematic diagram of a network structure for implementing protocol conversion through an adapter service provided by an embodiment of the present disclosure
  • FIG. 2A is a schematic diagram of the network architecture of the first communication protocol conversion provided by the embodiment of the present disclosure
  • FIG. 2B is a schematic diagram of the network architecture of the second communication protocol conversion provided by the embodiment of the present disclosure.
  • FIG. 2C is a schematic diagram of the network architecture of the third communication protocol conversion provided by the embodiment of the present disclosure.
  • FIG. 2D is a schematic structural diagram of a gateway device provided by an embodiment of the present disclosure.
  • FIG. 2E is a schematic diagram of the internal structure of a gateway device provided by an embodiment of the present disclosure.
  • FIG. 3A is an implementation flow chart of a communication protocol conversion method provided by an embodiment of the present disclosure
  • FIG. 3B is a schematic diagram of specific fields contained in routing information provided by an embodiment of the present disclosure.
  • FIG. 3C is an interface diagram provided by an embodiment of the present disclosure.
  • FIG. 3D is an interface diagram of a pull-down menu provided by an embodiment of the present disclosure.
  • FIG. 3E is an interface diagram for configuring adaptation rules provided by an embodiment of the present disclosure.
  • FIG. 4A is a schematic diagram of a data packet structure of a network request message provided by an embodiment of the present disclosure
  • FIG. 4B is a schematic diagram of a protocol structure of a network request message provided by an embodiment of the present disclosure.
  • FIG. 5 is a schematic diagram of a display interface of routing information and corresponding configuration rules provided by an embodiment of the present disclosure
  • FIG. 6 is an implementation flowchart of a communication protocol conversion method provided by an embodiment of the present disclosure.
  • FIG. 7 is a detailed implementation flowchart of a communication protocol conversion method provided by an embodiment of the present disclosure.
  • FIG. 8 is a schematic diagram of a structural relationship between a memory and a class loader provided by an embodiment of the present disclosure
  • FIG. 9 is an implementation flowchart of using an externally loaded sdk file provided by an embodiment of the present disclosure.
  • FIG. 10A is a schematic diagram of the internal implementation structure of a gateway device for multi-system communication protocol conversion provided by an embodiment of the present disclosure
  • FIG. 10B is a schematic diagram of a first configuration rule update provided by an embodiment of the present disclosure.
  • FIG. 10C is a schematic diagram of a second configuration rule update provided by an embodiment of the present disclosure.
  • FIG. 11A is a schematic diagram of a route editing interface provided by an embodiment of the present disclosure.
  • FIG. 11B is a schematic diagram of an overall editing interface of a token provided by an embodiment of the present disclosure.
  • FIG. 11C is a schematic diagram of a Token-editing interface provided by an embodiment of the present disclosure.
  • FIG. 12 is an implementation flowchart for implementing a session hold function provided by an embodiment of the present disclosure
  • FIG. 13A is a comparative relationship diagram before and after the first protocol conversion provided by the embodiment of the present disclosure.
  • FIG. 13B is a comparison diagram before and after the second protocol conversion provided by the embodiment of the present disclosure.
  • FIG. 14 is a schematic diagram of a communication protocol conversion system provided by an embodiment of the present disclosure.
  • FIG. 15 is a schematic diagram of an interaction process of communication protocol conversion provided by an embodiment of the present disclosure.
  • FIG. 16 is a schematic diagram of a specific internal structure of a gateway device provided by an embodiment of the present disclosure.
  • FIG. 17 is a schematic diagram of an example of a communication protocol conversion system provided by an embodiment of the present disclosure.
  • FIG. 18 is a schematic diagram of a gateway device provided by an embodiment of the present disclosure.
  • FIG. 19 is a schematic diagram of a communication protocol conversion device provided by an embodiment of the present disclosure.
  • FIG. 20 is a schematic diagram of a communication protocol conversion device provided by an embodiment of the present disclosure.
  • JVM Java Virtual Machine
  • the term "Java Virtual Machine (JVM)" in the embodiments of the present disclosure refers to a specification of a computer device, which is an abstract computer, and realizes corresponding functions by simulating various computer functions on a real computer. Function.
  • JVM Java Virtual Machine
  • the Java language uses the Java virtual machine to shield the information related to the specific platform, so that the Java language compiler only needs to be generated to run on the Java virtual machine.
  • the object code (bytecode) can run without modification on a variety of platforms.
  • software development kit in the embodiments of the present disclosure refers to a collection of development tools for building application software, such as specific software packages, software frameworks, hardware platforms, and operating systems;
  • digital signature in the embodiments of the present disclosure refers to an unforgeable digital string generated by the information sender.
  • the digital string is also an effective proof of the authenticity of the information sent by the information sender. It is a digital signature in the field of public key encryption. technology to identify methods of digital information.
  • Session in the embodiments of the present disclosure is called “session control" in computers.
  • the Session object stores attributes and configuration information required for a specific user session. When the user jumps between the Web pages of the application, the variables stored in the Session object will not be lost, but exist in the user's entire session.
  • Remote Dictionary Server in the embodiments of the present disclosure refers to an open-source log-type and Key-Value database that is written in ANSI C language, supports the network, and can be memory-based or persistent, and provides Application Programming Interface (API) in multiple languages.
  • API Application Programming Interface
  • dynamic class loading in the embodiments of the present disclosure refers to reading a class file of a class (a file after compiling java code) into the memory and creating an object for it, and the loading of the class is completed through a class loader.
  • the protocol conversion is realized through a separately developed protocol conversion adapter service.
  • the adaptation service is between the gateway and multiple third-party systems. Since all protocol conversion codes are Running in the same adaptation service, if new code is added to the adaptation service when a third-party system is newly connected, it is necessary to repackage, compile and redeploy the adapter module, which will inevitably lead to multiple users and the first Communication between three-party systems is interrupted.
  • the embodiment of the present disclosure provides a general, dynamically configurable communication protocol conversion method, through the configuration rules for different third-party systems, configure corresponding communication protocols for different third-party systems, if a new In the case of a three-party system, it is only necessary to add a new configuration rule to the configuration rule set.
  • the configuration rule When the configuration rule is implemented, no new code is added, but a new process is added to run the newly added configuration rule, thus There is no need to repackage, compile and deploy, which solves the problem of inefficiency caused by traditional custom-developed adapter services.
  • the core idea of the disclosed design is to use the configuration rules of the communication protocols of different third-party systems contained in the configuration rule set to select the configuration rule corresponding to the received network request message, convert the network request message to the communication protocol, and then send it to A third-party system, to establish a communication connection between the terminal and the third-party system. Since the configuration rules of different third-party systems are pre-stored in this embodiment, the corresponding configuration rules can be used to perform communication protocol conversion for different network request messages received, and a general protocol conversion method is provided. If the third-party system corresponds to If the configuration rules are added, deleted or modified, since the code is not added, deleted or modified, there is no need to recompile and deploy, which solves the problem of inefficiency caused by traditional custom development adapter services.
  • a communication protocol conversion method provided in this embodiment can be applied to a gateway device or other server devices. If applied to a gateway device, the network architecture of the communication protocol conversion provided in this embodiment is shown in FIG. 2A. Including at least one terminal 200a, gateway device 201a, and multiple third-party systems 202a, or, the network architecture for communication protocol conversion provided by this embodiment is shown in Figure 2B, including at least one server 200b, gateway device 201b, and multiple third-party systems System 202b.
  • the communication protocol conversion method mentioned in this embodiment is deployed on the gateway device and integrated with the functions of the gateway device itself.
  • the configuration rules can be added to the configuration rule set stored in the gateway device, that is, adding
  • the configuration rule of the newly added third-party system after instantiating the configuration rule, uses the process obtained by instantiating the configuration rule to perform communication protocol conversion on the network request message sent by the user terminal, which can ensure that the new third-party system is added
  • the third-party system will not affect the normal operation of the original third-party system.
  • the principle of deleting or modifying the configuration rules is the same as that of adding configuration rules, which will not be repeated here. In actual implementation, you can also combine your own business system with a third-party system.
  • the network architecture is shown in Figure 2C, where the communication device is used as the terminal as an example, and the communication protocol conversion method provided in this embodiment is deployed on the gateway device. , enabling multiple terminals to communicate with their own business systems and third-party systems.
  • the gateway device in this embodiment includes a routing component 200 and a configuration policy component 201, wherein the routing component 200 is configured as an original function of the gateway device itself, and is used to realize its own business system ( That is, non-third-party systems) provide communication services such as forwarding, or work in cooperation with the configuration policy component 201 to provide services for third-party systems.
  • the configuration policy component 201 is configured to perform protocol conversion on the network request message sent to the third-party system according to the stored configuration rules.
  • the routing component 200 and the configuration policy component 201 in this embodiment do not interfere with each other when serving non-third-party systems, and the configuration policy component 201 needs to use the codec module 200a in the routing component 200 to perform protocol conversion.
  • the received network request message is decoded, the transmitted network request message is encoded, and the protocol-converted network request message is forwarded to a corresponding third-party system through the routing module 200b in the routing component 200 .
  • the gateway in this embodiment can be used for unified deployment for third-party systems and non-third-party systems, and the gateway receives the information sent by the communication device.
  • this judging mode can conveniently and concisely coordinate the routing component and the configuration policy component to make them operate efficiently, effectively connect communication devices to different objects (third-party or non-third-party), and reduce labor costs.
  • the gateway device in this embodiment may further include a confirmation module configured to perform processing of judging whether to configure the policy component after the routing component judges the network request message. For example, after the communication device configures the configuration rules through the interactive interface for the first time, and subsequently establishes a communication connection with the third-party system through the gateway device, the routing component does not need to judge the received network request message again, but through the confirmation module Directly judge whether it is necessary to process the configuration policy component, reduce the amount of data processed by the routing component in the gateway device, save the resources of the routing component in the gateway device, and ensure the efficient operation of the gateway device, especially in the case of high concurrency.
  • a confirmation module configured to perform processing of judging whether to configure the policy component after the routing component judges the network request message. For example, after the communication device configures the configuration rules through the interactive interface for the first time, and subsequently establishes a communication connection with the third-party system through the gateway device, the routing component does not need to judge the received network request message again, but through the confirmation module Directly judge whether
  • the configuration policy component 201 determines the configuration rule corresponding to the network request message from the configuration rule set; according to the configuration rule Perform communication protocol conversion on the network request message, and then use the routing component 200 to send the network request message after the communication protocol conversion to the corresponding third-party system; if the network request message is used to establish a communication connection with a non-third-party system network request message, the routing component 200 is used to directly send the network request message to the non-third-party system.
  • the routing component 200 of the gateway device in this embodiment includes a codec module 200e and a routing module 200f
  • the configuration policy component 201 of the gateway device includes a session maintenance module 201e and a protocol conversion module 201f.
  • the codec module 200e is used for decoding all received network request messages and encoding sent network request messages.
  • the routing module 200f is configured to forward different network request messages according to corresponding configuration rules, and to determine whether the routing information carried in the current network request message contains configuration rules, and if so, to confirm that the network request message needs to be configured. After protocol conversion, send it to a third-party system, otherwise send the network request message directly to a non-third-party system (your own business system).
  • the session maintaining module 201e is configured to maintain the session with the third-party system.
  • the protocol conversion module 201f is configured to convert the received network request message into a network request message meeting the requirements of the third-party system according to the corresponding configuration rules.
  • the internal storage module 201g is used for storing configuration rules, sdk files of third-party systems and other data.
  • the implementation process of the communication protocol conversion method provided by this embodiment is as follows:
  • Step 300 receiving at least one network request message for establishing a communication connection with a third-party system sent by the communication device;
  • the communication device in this embodiment includes but not limited to a terminal and a server.
  • the third-party system in this embodiment includes but is not limited to terminals and servers.
  • the terminal establishes communication connections with multiple third-party systems, or the server establishes communication connections with multiple third-party systems (servers).
  • the communication connection between the purchased servers may be specifically determined according to actual requirements, which is not limited in this embodiment.
  • the server of enterprise A is configured as a gateway device according to the communication protocol conversion method provided in this embodiment, and the protocol conversion is performed on the communication messages between the communication device and the third-party system.
  • a network request message sent by the communication device is received, and the network request message carries a message for establishing a communication connection with the third-party system; or, multiple network request messages sent by the communication device are received, and each network request message contains Carries the message of establishing a communication connection with a third-party system, in which the network request message is in one-to-one correspondence with the third-party system, that is, the communication device sends a communication connection establishment message to a different third-party system according to sending different network request messages. ask.
  • the network request message in this embodiment is actually a data packet, and the schematic diagram of the data packet structure is shown in Figure 4A.
  • the essence of the communication protocol conversion in this embodiment is through the Application layer protocol, which converts the application layer protocol used by the application layer data of the data packet sent by the communication device to the third-party system, and forwards the application layer data after the protocol conversion to the third-party system, so as to realize the communication between the communication device and the third-party system communication between.
  • the third-party system has its own specific application layer protocol, which is different from the ordinary application layer protocol, it is necessary to convert the application layer protocol corresponding to the application layer data in the data packet of the communication device into the one that needs to establish communication The application layer protocol of the connected third-party system.
  • the protocol structure used by the network request message is as shown in Figure 4B, wherein the application layer protocol corresponds to the application layer data in the data packet, the TCP/IP protocol corresponds to the TCP header and the IP header in the data packet, and the link layer Corresponds to the Ethernet header in the packet.
  • the data packet and the corresponding protocol structure in this embodiment are only examples, and this embodiment does not limit too much to the specific structure of the network request message.
  • the network request message in this embodiment includes: at least one of routing information, source address information, and message content.
  • Step 301 Determine configuration rules corresponding to the network request message from a configuration rule set, wherein the configuration rule set includes configuration rules of communication protocols of different third-party systems;
  • the configuration rule set in this embodiment is determined in advance according to the corresponding configuration rules of multiple third-party systems, and after the configuration rules of all third-party systems are generated into a configuration rule set, the configuration rule set is processed. storage.
  • the configuration rule set is stored in the internal storage module of the gateway, including but not limited to memory or hard disk storage.
  • the hard disk storage stores the configuration rule set, including multiple configuration rules, and the memory is responsible for implementing each Configuration rules are instantiated, and "routing information" and "gateway logs" can also be stored in the internal storage module.
  • the hard disk storage adopts the PostgreSQL database to realize the storage function, and the memory adopts the redis database to realize the storage function.
  • instantiation processing is performed using the stored configuration rule set, thereby realizing communication protocol conversion.
  • the configuration rules in this embodiment include routing rules; encoding and decoding rules; at least one of protocol conversion rules; routing rules, encoding and decoding rules, protocol conversion rules in the configuration rules, and third-party systems. corresponding.
  • the mapping relationship among the identification of the third-party system, routing rules, coding and decoding rules, and protocol conversion rules can be established.
  • routing rules are used to represent at least one of routing format rules and name rules, for example, different routing rules indicate different routing formats or different gateway domain names.
  • the encoding and decoding rules are used to represent the way of encoding and decoding messages, and different encoding and decoding rules can encode and decode different messages.
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • the token configuration rule is used to characterize the rules of the token used by the third-party system, such as the address of the token, the domain name of the token, the key of the token, the format of the token, and the addition or modification of the request header of the token, so that Add or modify the request body of the card, the regular expression of the token, the expiration time of the token and other rules.
  • the token configuration rules can be used to characterize the rules of the token used by the third-party system, such as the address of the token, the domain name of the token, the key of the token, the format of the token, and the addition or modification of the request header of the token, so that Add or modify the request body of the card, the regular expression of the token, the expiration time of the token and other rules.
  • Digital signature configuration rules are used to characterize the digital signature rules used by third-party systems. Since most of the third-party systems currently have their own digital signature rules, the digital signature rules between the third-party systems cannot be used universally, and this embodiment can add/modify the network request message with each other by configuring the digital signature configuration rules. Digital signature rules corresponding to third-party systems to achieve universality.
  • Message configuration rules are used to represent configuration rules corresponding to request messages and response messages, such as addition or modification of request headers, addition or modification of request bodies, addition or modification of request parameters, addition or modification of response headers, addition or modification of response bodies Modification, addition or modification of response parameters.
  • the message Format and access tokens are configured for universality.
  • the configuration rule for using the software development kit sdk file means that if the third-party system does not disclose its own data encryption or digital signature algorithm and requires external access users to use the provided sdk for data encryption and digital signature, then in the configuration rule
  • the sdk file of the third-party system can be saved, and the sdk file can be used to encrypt and digitally sign the message.
  • the sdk file is a part of the configuration rules, which can be directly loaded and used, but the specific data encryption and digital signature algorithms cannot be viewed.
  • this embodiment can use the configuration rule to directly add the sdk file to the configuration rule set to realize Load the function used.
  • the configuration rule set provided in this embodiment is used to sort out different rules effectively, so that the system improves user experience, and enables users without deep professional knowledge to perform configuration in a concise and friendly manner. Furthermore, when determining the dimensions of the configuration rules, selecting corresponding options from different rules (1-4) can effectively save time and further improve user experience.
  • the configuration rule corresponding to the network request message is determined in the following manner:
  • the routing information carried in the network request message determine the configuration rule corresponding to the routing information from the configuration rule set.
  • routing information is analyzed, and the routing rules corresponding to the routing information are determined, that is, the complete address in the routing (including http address information) is analyzed according to the routing rules, and the third-party system corresponding to the routing information is obtained.
  • the third-party system corresponding to the routing information is obtained. It is easy to understand that in the actual process of building multiple third-party systems, different third-party systems usually set different routing rules, and different routing rules correspond to different routing information, so that terminals can be simultaneously established with different configuration systems.
  • the communication connection ensures that the established communication links are independent of each other.
  • the correspondence between routing information and configuration rules includes but is not limited to any of the following methods:
  • the configuration rules correspond to the routing information one by one
  • the specific fields contained in the routing information include but are not limited to: route name, route description, path, complete address, service ID, home application ID, configuration rule ID, and whether to retry.
  • the matching configuration rules are filtered out from each configuration rule through the "configuration rule ID" field contained in multiple routing information.
  • routing information 1 and routing information 2 both contain the same configuration rule ID1, which means that routing information 1 and routing information 2 both correspond to the same configuration rule.
  • this embodiment also provides an interface diagram for displaying each field in the routing information, and the user can intuitively view each configuration rule in different routing information, and perform configuration rules Edit, delete, or more operations; among them, more operations can be displayed through a drop-down menu, as shown in Figure 3D, when the user clicks on more operations, the drop-down menu displays "configure adaptation rules", As shown in Figure 3E, after the user clicks "Configure Adaptation Rules" in the drop-down menu, a pop-up window will pop up on the display interface. In the pop-up window, the user can select the adaptation rules.
  • the configuration rules in the example.
  • the interface provided by this embodiment can enable the user to confirm configuration rules conveniently and quickly, and realize the policy selection required by the user.
  • the setting of the drop-down box is an optional one, which is consistent with "the same routing information can only correspond to one configuration rule", which can effectively avoid the user's mistaken selection and improve the user's experience.
  • the configuration adaptation rules will be stored, for example, in the confirmation module of the gateway device.
  • the routing component There is no need to judge the received network request message again, but by confirming the configuration adaptation rules stored in the module, it is directly judged whether it is necessary to process the configuration policy component, which reduces the amount of data processed by the routing component in the gateway device and saves time in the gateway device.
  • the resources of routing components ensure the efficient operation of gateway devices.
  • the same routing information can only correspond to one configuration rule, and the same configuration rule can correspond to one or more routing information. If multiple routing information corresponds to the same configuration rule, the configuration rules of multiple third-party systems corresponding to the multiple routing information are the same, then the interaction data between multiple third-party systems and terminals can be reused, through Configure different port numbers for different third-party systems, so as to solve the problem of system crashes caused by a large number of terminals interacting with multiple third-party systems at the same time, so that multiple third-party systems can achieve load balancing in this scenario.
  • the two configuration rules provided in this embodiment correspond to the routing information, which can be selected according to actual needs, and this embodiment does not make too many limitations on this.
  • the corresponding relationship between routing information and configuration rules may be stored in the configuration rule set, or the corresponding relationship between routing information, third-party system identifiers, and configuration rules may be used to determine from the configuration rule set through the following steps Configuration rules corresponding to the routing information:
  • Step 301a according to the routing information carried in the network request message, determine the third-party system corresponding to the routing information;
  • the routing information can be parsed according to the routing rules in the configuration rule set, for example, according to the path in the routing information, an adapted routing rule can be determined and analyzed. If the parsing is successful, it means that the routing information matches the routing rule , otherwise it does not match, then use the route information obtained through parsing to determine the third-party system corresponding to the route information.
  • the third-party system can be determined according to the routing information, especially when there are a large number of third-party systems, the gateway device can obtain the third-party system more easily through the routing information, and then determine the configuration rules of the third-party system. For users, Configuration rules can be determined conveniently and simply without professional knowledge, improving user experience.
  • the rule configuration interface can also be displayed, as shown in Figure 5, the routing information of each third-party system and the corresponding configuration rules are displayed through the display interface, where
  • the displayed routing information includes, but is not limited to: at least one of routing name, routing description, path, complete address, service ID, and home application.
  • the displayed configuration rules include but are not limited to: at least one of configuration rules, ignore prefixes, whether to retry, and operations (including editing, deleting, and more operations).
  • Step 301b Determine the configuration rule corresponding to the third-party system from the configuration rule set.
  • the corresponding third-party system is determined according to the routing information, and after the corresponding configuration rules are determined according to the third-party system, the network request sent by the terminal is The message is decoded again, and the communication protocol conversion is performed on the decoded network request message again.
  • Step 302 performing communication protocol conversion on the network request message according to the configuration rule
  • the method before performing communication protocol conversion on the network request message according to the configuration rule, the method further includes: determining that the configuration rule takes effect.
  • the configuration rules of the third-party system after adding the configuration rules of the third-party system to the configuration rule set, it is also possible to determine whether the configuration rules are in effect by receiving an effective instruction indicated by the user, so as to use the effective configuration rules to communicate the network request message Protocol conversion. That is, if the configuration rule takes effect, the communication protocol conversion is performed on the network request message according to the configuration rule; otherwise, the communication protocol conversion is not performed.
  • communication protocol conversion is performed through the following steps:
  • Step 302a instantiate the protocol conversion rules in the configuration rules to obtain the process of performing protocol conversion
  • the instantiation process is used to represent the process of creating one or more executable processes according to specified codes. Since the code needs to be instantiated before it can be executed, in this embodiment, after the protocol conversion rule is instantiated, a process of executing the protocol conversion by using the protocol conversion rule can be obtained.
  • step 302b the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the network request message undergoes communication protocol conversion for the network request message through one or more processes of protocol conversion.
  • the configuration rule includes a software development kit sdk file of a third-party system
  • a class loader is used to load the software development kit file of the third-party system, and the execution of the software development kit file is obtained.
  • the network request message is digitally signed and encrypted through the process of executing the software development kit file; wherein the software development kit file is in one-to-one correspondence with the third-party system.
  • the sdk file is composed of a series of class files.
  • Loading means that the class files compiled from the sdk file are read into the memory of the gateway device, and an object is created for it.
  • the class loading is completed by the class loader.
  • the loader can be provided by the JVM or create its own class loader by inheriting the ClassLoader base class. By using different class loaders, the binary data of the class can be loaded from different sources.
  • the configuration rules of all third-party systems are pre-determined, including the sdk files required by the third-party systems, and a set of configuration rules is generated from all configuration rules and sdk files and stored in the internal storage module.
  • All the configuration rules and sdk files in the configuration rule set can be instantiated first.
  • the gateway device After the gateway device receives the request message, it can determine the corresponding configuration rule according to the routing information in the request message, and use the corresponding configuration rule After instantiation, the process of performing protocol conversion is obtained to perform communication protocol conversion.
  • protocol conversion rules in this embodiment include any one or more of the following:
  • the address for obtaining the token the domain name for obtaining the token
  • the http method for obtaining the token the addition or modification of the request body for obtaining the token
  • the addition or modification of the request header for obtaining the token and the obtaining command
  • the regular expression of the token, token expiration time, token key, token format, token validity check uri, token expiration string can be added after the url and in the request header.
  • digital signature algorithm digital signature range (body or body&headers can be selected), digital signature key, and data encryption algorithm.
  • request header addition or modification request header removal, request body addition or modification, request parameter addition or modification, adding session, removing session, response header addition or modification, response header removal, Add or modify response body, remove response body, redirect address, forward address, modify response code.
  • Message header configuration rules specifically including at least one of adding a request header, modifying a request header, removing a specified request header, removing a specified response header, and modifying a response header.
  • Hypertext Transfer Protocol HTTP status code configuration rules specifically include at least one of modifying HTTP request method, modifying HTTP status code, circuit breaker (can be understood as blacklist, interception function), ignoring prefix, and removing session.
  • Step 303 sending the network request message after the communication protocol conversion to the corresponding third-party system.
  • the network request message after the communication protocol conversion is encoded, and the encoded The network request message is sent to the third-party system.
  • the network request message after the communication protocol conversion is sent to a third-party system corresponding to the routing information.
  • this embodiment realizes that for different third-party systems, when the terminal needs to establish connections with multiple different third-party systems, the above steps in this embodiment can be used to quickly take effect, which solves the problem of a large number of Internet of Things cloud platforms The problem of low efficiency in integrating multiple third-party systems.
  • this embodiment may also receive at least one network request message sent by the communication device for establishing a communication connection with a non-third-party system.
  • the connected network request message in the specific implementation, after receiving the network request message sent by the communication device, it is first judged whether the network request message is sent to a third-party system or a non-third-party system. Specifically, it can be based on the route in the network request message It is determined whether the configuration rules are included in the information.
  • the gateway device can judge whether protocol conversion needs to be performed according to the routing information, thereby achieving universality.
  • this embodiment also provides a method for performing protocol conversion on receiving a network response message sent by a third-party system, as shown in FIG. 6 , and the specific implementation steps of the method are as follows:
  • Step 600 Receive the network response message sent by the third-party system, and determine the configuration rules of the third-party system from the configuration rule set;
  • the third-party system can be determined according to the received network response message, and the configuration rules of the third-party system need only be determined from the configuration rule set.
  • Step 601 performing communication protocol conversion on the network response message according to the configuration rules
  • communication protocol conversion is performed through the following steps:
  • Step 601a instantiate the protocol conversion rules in the configuration rules to obtain the process of executing the protocol conversion
  • the instantiation process is used to represent the process of creating one or more executable processes according to the specified code. Since the code needs to be instantiated before it can be executed, in this embodiment, after the protocol conversion rule is instantiated, a process of executing the protocol conversion by using the protocol conversion rule can be obtained.
  • Step 601b Perform communication protocol conversion on the network response message through the protocol conversion process. Wherein, the network response message undergoes communication protocol conversion for the network response message through one or more processes of protocol conversion.
  • Step 602 Send the network response message converted from the communication protocol to the communication device.
  • the network response message is sent to the communication device by:
  • the network response message converted from the communication protocol is sent to the communication device located at the source address.
  • the network request message sent by the terminal to the third-party system may be forwarded to the third-party system after communication protocol conversion, and the network response message sent by the third-party system to the terminal may be forwarded to the terminal after communication protocol conversion.
  • the embodiment of the present disclosure also provides a detailed communication protocol conversion method, and the specific implementation process of the method is as follows:
  • Step 700 receiving at least one network request message sent by the terminal for establishing a communication connection with a third-party system
  • Step 701 According to the routing information carried in the network request message, determine the third-party system corresponding to the routing information, and determine the configuration rule corresponding to the third-party system from the configuration rule set;
  • Step 702 instantiate the protocol conversion rules in the configuration rules of the third-party system to obtain the process of executing the protocol conversion; the network request message is converted into the communication protocol through the protocol conversion process;
  • Step 703. According to the routing information carried in the network request message, send the network request message converted from the communication protocol to a third-party system corresponding to the routing information;
  • Step 704 Receive the network response message sent by the third-party system, and determine the configuration rules of the third-party system from the configuration rule set;
  • Step 705 Perform protocol conversion on the network response message according to the protocol conversion process obtained by instantiation of the protocol conversion rules in the configuration rules of the third-party system;
  • Step 706 Send the network response message after the communication protocol conversion to the terminal at the source address according to the source address of the network request message.
  • the embodiments of the present disclosure also provide the function of supporting uploading sdk, which ensures that the third-party system that uses its own data encryption and signature algorithm can still configure rules for the third-party system, and can directly use the uploaded
  • the external sdk file encrypts and signs the network request message, which is applicable to various third-party systems and has stronger versatility.
  • this embodiment provides a schematic diagram of a structural relationship between memory and a class loader.
  • Loading refers to reading the class file of the class (the file after the java code is compiled) into the memory (the memory of the gateway device in this embodiment), that is, reading the class file compiled from the sdk file into the memory, and creating a Objects and classes are loaded by class loaders.
  • Class loaders can be provided by the JVM or create their own class loaders by inheriting the ClassLoader base class. By using different class loaders, the binary data of classes can be loaded from different sources.
  • the class file compiled from the sdk file is read into the memory, and an object is created for it.
  • the sdk file is in one-to-one correspondence with the third-party system.
  • it will first judge whether there is an sdk file in the configuration rule corresponding to the network request message sent by the terminal, and if it exists, use the sdk file to digitally sign and encrypt the network request message.
  • Step 900 obtaining the sdk file of the uploaded java type
  • Step 901 use the class loader to load the sdk file and store it in the configuration rule set;
  • Step 902 receiving the network request message sent by the terminal, and determining the configuration rule corresponding to the network request message from the configuration rule set;
  • Step 903 determine that the sdk file is included in the configuration rule
  • Step 904 use the signature algorithm in the sdk to digitally sign the data specified in the network request message, and add the digitally signed data to the specified request header of the network request message;
  • Step 905 using the data encryption algorithm in the sdk to encrypt the data in the network request message;
  • Step 906 Send the encrypted network request message to the third-party system.
  • this embodiment provides a schematic diagram of the internal implementation structure of a gateway device for system communication protocol conversion.
  • the gateway device is used to establish communication connections between multiple terminals and multiple third-party systems.
  • the internal storage module in the gateway device stores a configuration rule set, and each configuration rule in the configuration rule set is instantiated to obtain a corresponding protocol conversion process, and each process is in one-to-one correspondence with the third-party system
  • process A corresponds to third-party system A
  • process B corresponds to third-party system B
  • process C corresponds to third-party system C
  • process D corresponds to third-party system D. If a new third-party system is added, only a new configuration rule needs to be added to the configuration rule set, and a new process for protocol conversion is generated, and the gateway device does not need to be restarted.
  • At least one instruction of deleting, modifying, and adding configuration rules from the user may also be received through the display interface.
  • the user can click buttons such as "delete”, “edit” and “add” on the display interface to delete, edit, and add configuration rules on the display interface.
  • the token address the address for obtaining the token
  • obtain the token http method Get the http method of the token
  • get the token regularity get the regular expression of the token format
  • token expiration time token expiration time
  • token key key
  • receiving at least one instruction of the user performing a touch operation or a voice control operation on the configuration rule on the display interface triggers the execution of the operation corresponding to the instruction on the configuration rule; or, receiving the user’s instruction on the display interface Performing at least one instruction among touch operation and voice control operation on the configuration rule in the pop-up window of the configuration rule triggers the execution of the operation corresponding to the instruction on the configuration rule.
  • the configuration rule set may also be updated in any of the following ways:
  • This embodiment provides at least two ways to update, one is to update the configuration rule set after receiving the user's instruction, and the other is to update the configuration rule set at regular intervals, wherein the user triggers the configuration rule set through the display interface
  • the database synchronization command can be triggered by clicking save after editing by the user, can also be triggered by a single button, or can be triggered by clicking confirm after deleting a configuration rule, which is not limited too much in this embodiment.
  • "database synchronization time” can be set on the display interface, so as to automatically update the database according to the preset database synchronization time, so as to update the gateway system in time, maintain the communication between the terminal and the third-party system, and avoid emergencies such as downtime A problem occurs that causes communication to be interrupted.
  • the method of updating the configuration rule set according to the preset cycle in this embodiment can make the update mechanism of the configuration rule set, reduce labor costs, and the update cycle can be adjusted, and targeted adjustments can be made according to external conditions to meet user needs .
  • effective and appropriate adjustments can be made for high-concurrency situations (such as Double Eleven and other situations where there are large-scale external communication requests).
  • this embodiment provides any of the following methods for updating configuration rules:
  • Method 1 If the change of the configuration rules in the configuration rule set is monitored by the monitoring process, then the update process is notified to update the configuration rule set;
  • the update process of this method is shown in Figure 10B.
  • the protocol conversion module monitors the change of the configuration rules in the configuration rule set stored in the internal storage module of the gateway device through polling, and updates the Configure the rule set to update.
  • Method 2 Store the configuration rule set in a message queue and monitor the content of the message queue. If a change in configuration rules in the configuration rule set is detected, update the content of the message queue accordingly.
  • the update process of this method is shown in Figure 10C.
  • the change of the configuration rules in the configuration rule set stored in the message queue is monitored, and the configuration rules in the message queue are updated accordingly, and the protocol is notified.
  • the conversion module updates the configuration rules stored in the internal storage module.
  • the above modes 1)-2) and methods 1)-2) can be implemented in combination, and there is no excessive limitation on this.
  • the above update method can dynamically realize human-computer interaction, which is more conducive to fast, efficient and interface-friendly monitoring.
  • For the system there is no need for downtime, thus maintaining the efficient operation of the system; for the executor In other words, there is no need for in-depth configuration knowledge and no need to go to the background to execute complex codes, thus improving the user experience.
  • this embodiment also provides a method for updating configuration rules, which specifically includes any one or more of the following:
  • the newly added configuration rules are added to the configuration rule set, wherein the newly added configuration rules correspond to the third-party systems one by one.
  • the configuration rules that need to be deleted in the configuration rule set are deleted.
  • the modified configuration rules are in one-to-one correspondence with the third-party systems.
  • the gateway since the gateway does not need to be restarted, it can ensure that the communication connection with multiple third-party systems is not interrupted, and solves the inefficiency and online
  • the environment restarts the gap period of the service, and integrates with the gateway, which effectively saves server resources.
  • this embodiment can also periodically send connection requests in the following manner, specifically as follows:
  • the probing interface is provided by a third-party system, and the token (access token) is called as a parameter in the probing interface.
  • the method for determining the validity of the access token provided in this embodiment can improve user experience, intuitively and quickly display the token validity result to the user, and facilitate the user to quickly respond to the situation when the token becomes invalid.
  • the user after determining the validity of the access token, if the access token is invalid, the user is prompted through a display interface that the access token of the third-party system is invalid, and the way of prompting the user includes but is not limited to: At least one of information and prompt information.
  • This embodiment can also periodically determine the validity of the access token, and if it is determined that the access token is invalid, the user can also be prompted through a display interface to improve the efficiency of user operation and maintenance.
  • This embodiment also provides a function of maintaining a connection with a third-party system and checking the validity of the access token token, as shown in FIG. 12 , and the specific implementation method is as follows:
  • Step 1200 after receiving the network request message sent by the terminal, determine the access token information in the configuration rule corresponding to the network request message;
  • the access token information in this embodiment includes but is not limited to: at least one of the request address of the access token and the request parameters of the access token.
  • Step 1201. Periodically send a connection request message for maintaining a session connection to the third-party system according to the access token information
  • connection request message is used to obtain the access token of the third-party system.
  • Step 1202 Receive the access token sent by the third-party system, access the probing interface of the third-party system according to a preset period, and determine the validity of the access token;
  • this embodiment can also store information such as sessions and cookies of the third-party system, and update them before invalidation, so as to maintain the session connection with the third-party system.
  • Step 1203 If the access token is invalid, reacquire the valid access token of the third-party system, and use the valid access token to perform renew.
  • a valid access token is retrieved by:
  • the access token information in the configuration rule corresponding to the network request message resend the connection request message for maintaining the session connection to the third-party system; receive the valid access token sent by the third-party system.
  • this embodiment provides the first comparison diagram before and after protocol conversion, where the two items systemtype and token have not been added to the Request Header before the protocol conversion, and the configuration The specific rule is to add the systemtype and token required by the third-party system to the Request Header.
  • the gateway device determines the corresponding configuration rules according to the routing information 1624415503178, and adds the following content to the Request Header of the original request message:
  • the second comparison diagram provided by this embodiment before and after protocol conversion uses the sdk file provided by the third-party system to encrypt data.
  • the gateway device determines the corresponding configuration rules according to the routing information 1624415503178, obtains the sdk from the configuration rules, calls the sdk to encrypt the data of the Request Body, and forwards it to the third-party system, that is, to 10.251.186.44:8070.
  • this embodiment also provides a specific conversion content of communication protocol conversion, as follows:
  • the communication protocol conversion method provided in this embodiment can be applied to gateway devices, thereby reducing the number of servers and deployment workload, and improving the utilization rate of gateway devices; based on the configuration rule set, the communication connection to different third-party systems is realized, and if there is To add a third-party system, the configuration rules of the new third-party system need to be added to the configuration rule set, and there is no need to restart the gateway device, thereby improving development efficiency, reducing the difficulty of operation and maintenance, and solving the problem of service paralysis during restarting the gateway device; And the communication protocol conversion method improved in this embodiment can also support the import of external sdk files to digitally sign and encrypt the request message sent by the terminal, thus solving the current problem of only introducing external sdk files through code in advance, especially for The construction of large-scale third-party systems can effectively improve development efficiency.
  • this embodiment also provides a communication protocol conversion system for establishing communication connections between a communication device and multiple third-party systems.
  • the system includes at least one communication device 1400, a gateway device 1401. A plurality of third-party systems 1402, wherein:
  • the communication device 1400 is configured to send a network request message for establishing a communication connection with the third-party system 1402;
  • the gateway device 1401 is configured to receive the network request message, determine a configuration rule corresponding to the network request message from the configuration rule set, perform communication protocol conversion on the network request message according to the configuration rule, and convert the The network request message converted from the communication protocol is sent to the corresponding third-party system 1402, wherein the set of configuration rules includes configuration rules of communication protocols of different third-party systems.
  • the interaction process of the communication protocol conversion in the embodiment of the present disclosure is as follows:
  • Step 1500 the terminal sends a network request message to the gateway device
  • Step 1501 the gateway device determines the configuration rule corresponding to the network request message from the configuration rule set;
  • the configuration rule set includes configuration rules of communication protocols of different third-party systems.
  • the gateway device determines the third-party system corresponding to the routing information according to the routing information carried in the network request message, and determines the configuration rule corresponding to the third-party system from the configuration rule set.
  • Step 1502 the gateway device performs communication protocol conversion on the network request message according to the configuration rule
  • the gateway device instantiates the protocol conversion rules in the configuration rules to obtain a protocol conversion process; the network request message undergoes communication protocol conversion through the protocol conversion process.
  • Step 1503 the gateway device sends the network request message after the communication protocol conversion to the corresponding third-party system.
  • the gateway device sends the network request message after the communication protocol conversion to the third-party system corresponding to the routing information according to the routing information carried in the network request message.
  • Step 1504 the gateway device receives the network response message sent by the third-party system
  • Step 1505 the gateway device determines the configuration rules of the third-party system from the configuration rule set, and performs communication protocol conversion on the network response message according to the configuration rules;
  • the gateway device instantiates the protocol conversion rule in the configuration rules to obtain a protocol conversion process; through the protocol conversion process, the communication protocol conversion is performed on the network response message.
  • the configuration rule includes a software development kit file of a third-party system
  • a class loader is used to load the software development kit file of the third-party system to obtain a process for executing the software development kit file
  • the network request message is digitally signed and encrypted by a process executing said SDK file.
  • the software development kit file is in one-to-one correspondence with the third-party system.
  • Step 1506 the gateway device sends the network response message after the communication protocol conversion to the terminal.
  • the gateway device sends the network response message converted from the communication protocol to the terminal located at the source address according to the source address of the network request message.
  • the gateway device after receiving the network request message sent by the terminal for establishing a communication connection with the third-party system, the gateway device is also used to determine the access token information in the configuration rule corresponding to the network request message; according to the The access token information is used to periodically send a connection request message for maintaining the session connection to the third-party system.
  • the gateway device after periodically sending the connection request message to the third-party system to maintain the session connection, the gateway device is also used to receive the access token sent by the third-party system, and access the third-party system in a preset period.
  • the system's probing interface determines the validity of the access token.
  • the gateway device if it is determined that the access token is invalid, the gateway device prompts the user through a display interface that the access token of the third-party system is invalid.
  • the gateway device determines the validity of the access token, it is also used to update the access token: specifically, if the access token is invalid, reacquire the valid access token of the third-party system card, using the effective access token to update the access token of the third-party system in the configuration rule.
  • the gateway device resends the connection request message for maintaining the session connection to the third-party system according to the access token information in the configuration rule corresponding to the network request message; receives the connection request message sent by the third-party system; A valid access token for .
  • the gateway device is further configured to use a class loader to load the software development kit sdk file of the third-party system; store the loaded sdk file into the configuration rule set, wherein the sdk file There is a one-to-one correspondence with the third-party system.
  • the gateway device uses the sdk file to digitally sign and encrypt the network request message.
  • the gateway device may also receive at least one instruction from the user to delete, modify, and add configuration rules through a display interface.
  • the gateway device may also receive a database synchronization instruction triggered by the user through the display interface, and update the configuration rule set; or, update the configuration rule set at a preset period.
  • the gateway device may also update the configuration rule set in the following manner:
  • the update process is notified to update the configuration rule set;
  • the gateway device may also update the set of configuration rules, including:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • the specific internal structure diagram of the gateway device includes a codec module 1600, a routing module 1601, a protocol conversion module 1602, an internal storage module 1603, and a session maintenance module 1604; where:
  • the codec module 1600 is used for decoding all received network request messages and encoding sent network request messages. Wherein, the principles of encoding and decoding processing of the network response message and the network request message are the same.
  • the codec processing logic of the codec module and the general codec principle can be the same, and the message can be codec again according to the codec algorithm required by the third-party system, that is, if the gateway device receives After the request message arrives at the terminal, it firstly performs general decoding on the request message to obtain routing information, and then decodes the request message again according to the codec rules required by the third-party system in the configuration rules corresponding to the routing information, and performs the corresponding protocol After conversion, firstly encode the request message according to the codec rules required by the third-party system, and then encode the request message again according to the general codec principle and forward it to the third-party system.
  • the routing module 1601 is configured to forward different network request messages according to corresponding configuration rules. Wherein, the forwarding principles of the network response message and the network request message are the same.
  • the protocol conversion module 1602 is configured to convert the received network request message into a network request message meeting the requirements of the third-party system according to the corresponding configuration rules. Wherein, the principle of the protocol conversion mode of the network response message and the network request message is the same.
  • the protocol conversion module is used to receive at least one network request message sent by the communication device, and the network request message represents a message for establishing a communication connection with a third-party system;
  • the configuration rules corresponding to the message wherein the configuration rule set includes configuration rules of communication protocols of different third-party systems; perform communication protocol conversion on the network request message according to the configuration rules; convert the network after the communication protocol conversion The request message is sent to the corresponding third-party system.
  • the internal storage module 1603 is used to store configuration rules, sdk files of third-party systems and other data.
  • the session keeping module 1604 is used to maintain the session with the third-party system, store token, session, cookies and other information of the third-party system, and update it before it becomes invalid.
  • an example of a communication protocol conversion system includes a terminal 1700 , a gateway device 1701 , and a third-party system 1702 .
  • the network request message sent by the terminal 1700 is first encoded and decoded by the encoding and decoding module in the gateway device 1701 to obtain routing information.
  • the routing information passes through the routing module and determines the corresponding configuration rules from the internal storage module. Based on the configuration rules, the protocol The conversion module converts the protocol of the network request message, and during the entire protocol conversion process, the session connection between the gateway device and multiple third-party systems is always maintained through the session maintenance module.
  • the communication connection between each terminal and the third-party system needs to be converted through the gateway device.
  • the core of the communication protocol conversion is to use the different third-party systems included in the configuration rule set
  • the protocol conversion is performed on the configuration rules, thus achieving universality, and since the protocol conversion only needs to be performed through the configuration rule set, even if there are new, modified or deleted configuration rules, only the configuration rule set needs to be updated without restarting the gateway equipment to avoid the outage of various third-party systems.
  • this embodiment can also support uploading a custom sdk file, which can solve the scenario where a third-party system does not disclose data encryption or digital signature algorithms. Due to its small size, the methods in the embodiments of the present disclosure can be deployed on gateway devices, saving hardware resources, and will not affect the performance of the gateway device itself.
  • an embodiment of the present disclosure also provides a gateway device. Since the device is the device in the method in the embodiment of the present disclosure, and the problem-solving principle of the device is similar to the method, the device’s For the implementation, please refer to the implementation of the method, and repeated descriptions will not be repeated.
  • the device includes a processor 1800 and a memory 1801, the memory 1801 is used to store a program executable by the processor 1800, and the processor 1800 is used to read the program in the memory 1801 and Perform the following steps:
  • configuration rule set includes configuration rules of communication protocols of different third-party systems
  • the processor is further configured to execute:
  • the network request message is directly sent to the non-third-party system.
  • the processor is further configured to execute:
  • Receiving a network request message sent by the communication device determining that the network request message is a network request message for establishing a communication connection with a third-party system, or determining that the network request message is a network request message for establishing a communication connection with a non-third-party system Network request message.
  • the processor is configured to execute:
  • the configuration rule corresponding to the routing information is determined from the configuration rule set.
  • the configuration rule is in one-to-one correspondence with the routing information; or, the multiple pieces of routing information correspond to the same configuration rule.
  • the processor is configured to execute:
  • a configuration rule corresponding to the third-party system is determined from the configuration rule set.
  • the processor is configured to execute:
  • the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the processor is configured to execute:
  • the configuration rule includes the software development kit file of the third-party system
  • use the class loader to load the software development kit file of the third-party system to obtain the process of executing the software development kit file, wherein the software There is a one-to-one correspondence between the development kit file and the third-party system.
  • the processor is configured to execute:
  • the network request message is digitally signed and encrypted by a process executing the software development kit file.
  • the processor is further configured to execute:
  • the loaded sdk file is stored in the configuration rule set, wherein the sdk file is in one-to-one correspondence with the third-party system.
  • the processor is configured to execute:
  • the sdk file is included in the configuration rule, digitally sign and encrypt the network request message by using the sdk file.
  • the processor is configured to execute:
  • the network request message converted from the communication protocol is sent to a third-party system corresponding to the routing information.
  • the processor is further configured to execute:
  • the processor is configured to execute:
  • the communication protocol conversion is performed on the network response message.
  • the processor is configured to execute:
  • the network response message converted from the communication protocol is sent to the communication device located at the source address.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the processor is further configured to:
  • the user is prompted through a display interface that the access token of the third-party system is invalid.
  • the processor is further configured to:
  • the access token is invalid, reacquire a valid access token of the third-party system, and use the valid access token to update the access token of the third-party system in the configuration rule.
  • the processor is configured to execute:
  • the processor is further configured to execute:
  • At least one instruction of deleting, modifying, and adding configuration rules from the user is received through the display interface.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the set of configuration rules is updated at a preset period.
  • the processor is configured to execute:
  • the update process is notified to update the configuration rule set;
  • the processor is configured to execute:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • the embodiment of the present disclosure also provides a communication protocol conversion device, since the device is the device in the method in the embodiment of the present disclosure, and the principle of solving the problem of the device is similar to the method, so the For the implementation of the equipment, refer to the implementation of the method, and repeated descriptions will not be repeated.
  • the device includes a processor 1900 and a memory 1901, the memory 1901 is used to store a program executable by the processor 1900, and the processor 1900 is used to read the program in the memory 1901 and Perform the following steps:
  • configuration rule set includes configuration rules of communication protocols of different third-party systems
  • the processor is further configured to execute:
  • the network request message is directly sent to the non-third-party system.
  • the processor is further configured to execute:
  • Receiving a network request message sent by the communication device determining that the network request message is a network request message for establishing a communication connection with a third-party system, or determining that the network request message is a network request message for establishing a communication connection with a non-third-party system Network request message.
  • the configuration rule is in one-to-one correspondence with the routing information; or, the multiple pieces of routing information correspond to the same configuration rule.
  • the processor is configured to execute:
  • the configuration rule corresponding to the routing information is determined from the configuration rule set.
  • the processor is configured to execute:
  • a configuration rule corresponding to the third-party system is determined from the configuration rule set.
  • the processor is configured to execute:
  • the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the processor is configured to execute:
  • the configuration rule includes the software development kit file of the third-party system
  • use the class loader to load the software development kit file of the third-party system to obtain the process of executing the software development kit file, wherein the software There is a one-to-one correspondence between the development kit file and the third-party system.
  • the processor is configured to execute:
  • the network request message is digitally signed and encrypted by a process executing the software development kit file.
  • the processor is further configured to execute:
  • the loaded sdk file is stored in the configuration rule set, wherein the sdk file is in one-to-one correspondence with the third-party system.
  • the processor is configured to execute:
  • the sdk file is included in the configuration rule, digitally sign and encrypt the network request message by using the sdk file.
  • the processor is configured to execute:
  • the network request message converted from the communication protocol is sent to a third-party system corresponding to the routing information.
  • the processor is further configured to execute:
  • the processor is configured to execute:
  • the communication protocol conversion is performed on the network response message.
  • the processor is configured to execute:
  • the network response message converted from the communication protocol is sent to the communication device located at the source address.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the processor is further configured to:
  • the user is prompted through a display interface that the access token of the third-party system is invalid.
  • the processor is further configured to:
  • the access token is invalid, reacquire a valid access token of the third-party system, and use the valid access token to update the access token of the third-party system in the configuration rule.
  • the processor is configured to execute:
  • the processor is further configured to execute:
  • At least one instruction of deleting, modifying, and adding configuration rules from the user is received through the display interface.
  • the processor is further configured to execute:
  • the processor is further configured to execute:
  • the set of configuration rules is updated at a preset period.
  • the processor is configured to execute:
  • the update process is notified to update the configuration rule set;
  • the processor is further configured to execute:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • the embodiment of the present disclosure also provides a communication protocol conversion device. Since the device is the device in the method in the embodiment of the present disclosure, and the problem-solving principle of the device is similar to the method, so the For the implementation of the device, reference may be made to the implementation of the method, and repeated descriptions will not be repeated.
  • the device includes:
  • a message receiving unit 2000 configured to receive at least one network request message sent by the communication device for establishing a communication connection with a third-party system
  • a determination rule unit 2001 configured to determine a configuration rule corresponding to the network request message from a configuration rule set, wherein the configuration rule set includes configuration rules of communication protocols of different third-party systems;
  • a protocol conversion unit 2002 configured to convert the communication protocol of the network request message according to the configuration rule
  • the message sending unit 2003 is configured to send the network request message after the communication protocol conversion to a corresponding third-party system.
  • the receiving message unit 2000 is also configured to:
  • the network request message is directly sent to the non-third-party system.
  • the receiving message unit 2000 is also configured to:
  • Receiving a network request message sent by the communication device determining that the network request message is a network request message for establishing a communication connection with a third-party system, or determining that the network request message is a network request message for establishing a communication connection with a non-third-party system Network request message.
  • the configuration rule is in one-to-one correspondence with the routing information; or, the multiple pieces of routing information correspond to the same configuration rule.
  • the determining rule unit is specifically configured to:
  • the configuration rule corresponding to the routing information is determined from the configuration rule set.
  • the determining rule unit is specifically configured to:
  • a configuration rule corresponding to the third-party system is determined from the configuration rule set.
  • the protocol conversion unit is specifically configured to:
  • the network request message undergoes communication protocol conversion through the protocol conversion process.
  • the protocol conversion unit is specifically further configured to:
  • the configuration rule includes the software development kit file of the third-party system
  • use the class loader to load the software development kit file of the third-party system to obtain the process of executing the software development kit file, wherein the software There is a one-to-one correspondence between the development kit file and the third-party system.
  • the protocol conversion unit is specifically further configured to:
  • the network request message is digitally signed and encrypted by a process executing the software development kit file.
  • the loading unit is also specifically used for:
  • the loaded sdk file is stored in the configuration rule set, wherein the sdk file is in one-to-one correspondence with the third-party system.
  • the protocol conversion unit is specifically configured to:
  • the sdk file is included in the configuration rule, digitally sign and encrypt the network request message by using the sdk file.
  • the message sending unit is specifically configured to:
  • the network request message converted from the communication protocol is sent to a third-party system corresponding to the routing information.
  • the message sending unit is further configured to:
  • the message sending unit is specifically further configured to:
  • the communication protocol conversion is performed on the network response message.
  • the message sending unit is specifically further configured to:
  • the network response message converted from the communication protocol is sent to the terminal located at the source address.
  • the session connection unit is further included:
  • the session connection unit is specifically further configured to:
  • the display unit further includes:
  • the user is prompted through a display interface that the access token of the third-party system is invalid.
  • the session connection unit is further configured to:
  • the access token is invalid, reacquire a valid access token of the third-party system, and use the valid access token to update the access token of the third-party system in the configuration rule.
  • the session connection unit is specifically configured to:
  • the receiving instruction unit is also specifically configured to:
  • At least one instruction of deleting, modifying and adding configuration rules from the user is received through the display interface.
  • the receiving instruction unit is specifically further configured to:
  • the update unit is also specifically configured to:
  • the set of configuration rules is updated at a preset period.
  • the updating unit is specifically configured to:
  • the update process is notified to update the configuration rule set;
  • the updating unit is specifically configured to:
  • the configuration rule set is updated according to the modified configuration rules.
  • the configuration rules include at least one of routing rules; encoding and decoding rules; protocol conversion rules;
  • the protocol conversion rules include: at least one of token configuration rules, digital signature configuration rules, message configuration rules, and configuration rules using software development kit files.
  • an embodiment of the present disclosure also provides a computer storage medium on which a computer program is stored, and when the program is executed by a processor, the following steps are implemented:
  • the network request message representing a message for establishing a communication connection with a third-party system
  • configuration rule set includes configuration rules of communication protocols of different third-party systems
  • the embodiments of the present disclosure may be provided as methods, systems, or computer program products. Accordingly, the present disclosure can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions
  • the device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Communication Control (AREA)

Abstract

本公开公开了一种通讯协议转换方法、设备、系统及网关设备,用于提供一种通用的通讯协议转换方法,解决了传统定制开发适配器服务导致的效率低下的问题。该方法包括:接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;根据所述配置规则对所述网络请求消息进行通信协议转换;将所述通信协议转换后的网络请求消息发送给对应的第三方系统。

Description

一种通讯协议转换方法、设备、系统及网关设备
相关申请的交叉引用
本公开要求在2021年08月04日提交中国专利局、申请号为202110893155.2、申请名称为“一种通讯协议转换方法、设备、系统及网关设备”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。
技术领域
本公开涉及云服务技术领域,特别涉及一种通讯协议转换方法、设备、系统及网关设备。
背景技术
随着云服务的发展,各个物联网或互联网厂商都针对自身产品开发了云服务系统,在实际生产过程中,往往需要用到多家第三方的产品、系统和服务来组建自身的解决方案,例如建立智慧云城市,需要用到多个不同厂商的产品进行搭建,包括监控系统、管理系统等,由于不同厂商的产品有着不同的通讯协议,不同的鉴权方式,相互独立的数据库,因此如何将不同厂商的云服务系统组合在一个物联网云平台上,从而建立各个厂商产品之间的通信,是目前亟需解决的技术问题。
传统的解决方法是针对每个第三方系统,单独开发一个用来做协议转换的适配器服务,即需要为所有的第三方系统编写不同的代码,效率低下。
发明内容
本公开提供一种通讯协议转换方法、设备、系统及网关设备,用于提供一种通用的通讯协议转换方法,解决了传统定制开发适配器服务导致的效率低下的问题。
第一方面,本公开实施例提供的一种通讯协议转换方法,该方法包括:
接收通信设备发送的至少一个网络请求消息,所述网络请求消息表征用于与第三方系统建立通信连接的消息;
从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
根据所述配置规则对所述网络请求消息进行通信协议转换;
将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
本公开实施例提供的通讯协议转换方法,是一种通用的可动态配置的通讯协议转换系统,并且可部署在网关设备,该通讯协议转换方法和网关自身的功能互不影响。该方法的实施原理是利用预先确定的配置规则集合,从配置规则集合中选择与接收的网络请求消息对应的配置规则,对该网络请求消息执行对应的通信协议转换,并将转换后的网络请求消息转发给第三方系统,从而实现通信设备和第三方系统之间的通信,该方式解决了传统定制开发适配器服务导致的效率低下的问题。并且由于配置规则的改变并不涉及对代码的修改,因此即使配置规则发生了改变,网关设备也不需要进行重启,不会导致中断通信设备和第三方系统之间的通信连接。
作为一种可选的实施方式,还包括:
接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
将所述网络请求消息直接发送给所述非第三方系统。
本实施例还可以进行通常的转发功能,满足各种系统的需求。
作为一种可选的实施方式,还包括:
接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
本实施例提供的方法,能够判断该网络请求消息是第三方系统的还是非第三方系统的,从而将第三方系统的网络请求消息进行协议转换后发送给第三方系统,将非第三方系统的网络请求消息直接发送给非第三方系统,实现 通用性,提高可集成性。
作为一种可选的实施方式,所述从配置规则集合中确定与所述网络请求消息对应的配置规则,包括:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则。
本实施例可以通过对网络请求消息进行解码后得到的路由信息,以及配置规则集合中路由信息和配置规则的对应关系,确定与该网络请求消息中的路由信息对应的配置规则,由于每个第三方系统的路由是不同的,因此能够通过路由信息确定第三方系统的配置规则,更加简单高效。
作为一种可选的实施方式,所述配置规则与所述路由信息一一对应;或,所述多个路由信息对应相同的配置规则。
本实施例中的路由信息和配置规则可以是一对一的关系,也可以是多对一的关系,具体可根据实际需求确定,多对一的关系下,由于为多个第三方系统分配了不同的端口号,从而保证在大量终端同时访问各个第三方系统时,能够保证各个第三方系统实现负载均衡。
作为一种可选的实施方式,所述根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则,包括:
根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统;
从所述配置规则集合中确定与所述第三方系统对应的配置规则。
本实施例可以根据路由信息来确定第三方系统,尤其针对存在大量第三方系统时,网关设备能够更加简便地通过路由信息获取第三方系统,进而确定第三方系统的配置规则,对于用户而言,不需要专业知识也可以方便简单地确定配置规则,提高用户的使用体验,提高运维效率。
作为一种可选的实施方式,所述根据所述配置规则对所述网络请求消息进行通信协议转换,包括:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转 换的进程;
所述网络请求消息通过所述协议转换的进程进行通信协议转换。
本实施例中由于协议转换规则进行实例化处理后得到的是执行协议转换的进程,那么在配置规则进行改变的情况下,会改变对应的进程,但不会改变原始代码,因此即使第三方系统的配置规则发生了改变,也不需要重启网关设备。
作为一种可选的实施方式,所述将所述配置规则中的协议转换规则,进行实例化处理,包括:
若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述网络请求消息通过所述协议转换的进程进行通信协议转换,包括:
所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
本实施例还可以加载外部的sdk文件,对于不公开自身数据加密和签名算法的第三方系统,仍可以使用本实施例中的方法,利用加载外部的sdk文件对网络请求消息进行数据加密和签名。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统,包括:
根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,还包括:
接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
根据所述配置规则对所述网络响应消息进行通信协议转换;
将所述通信协议转换后的网络响应消息发送给所述通信设备。
作为一种可选的实施方式,所述根据所述配置规则对所述网络响应消息进行通信协议转换,包括:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
作为一种可选的实施方式,所述将所述通信协议转换后的网络响应消息发送给所述通信设备,包括:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
作为一种可选的实施方式,接收通信设备发送的用于与第三方系统建立通信连接的网络请求消息之后,还包括:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
本实施例通过周期向所述第三方系统发送用于保持会话连接的连接请求消息,能周期接收第三方系统返回的访问令牌,从而通过接收的访问令牌保持会话连接,实现网关设备和第三方系统之间永久保持会话不中断。
作为一种可选的实施方式,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,还包括:
接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
本实施例提供的确定访问令牌的有效性的方法,能够提升用户体验,直观快速地展示给用户令牌有效性结果,方便用户针对令牌失效时的情形快速做出应对。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,还包 括:
若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
本实施例还可以周期性确定访问令牌的有效性,如果确定访问令牌失效,还可以通过显示界面提示用户,提高用户运维的效率。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,还包括:
若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
本实施例还可以在确定访问令牌失效后,重新获取第三方系统的有效的访问令牌,以保持会话永久不中断。
作为一种可选的实施方式,所述重新获取所述第三方系统的有效的访问令牌,包括:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
接收所述第三方系统发送的有效的访问令牌。
作为一种可选的实施方式,还包括:
通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
本实施例还可以提供一种显示界面,以方便用户对配置规则进行操作,提高用户的运维体验。
作为一种可选的实施方式,还包括:
接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
作为一种可选的实施方式,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,还包括:
接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
按预设周期对所述配置规则集合进行更新。
本实施例还可以对配置规则进行更新,以保证目前网关设备中存储的配置规则都是最新的配置规则。使配置规则集合的更新机制化,降低人工成本,并且更新周期可调节,能够依据外部情况进行有针对的调整,以满足用户需求。例如,针对高并发量的情况(双十一等外部有大规模通信请求的情况),可以进行行之有效的适当调节。
作为一种可选的实施方式,所述对所述配置规则集合进行更新,包括:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
作为一种可选的实施方式,所述对所述配置规则集合进行更新,包括:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
作为一种可选的实施方式,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
第二方面,本公开实施例提供的一种通讯协议转换的系统,包括:通信设备、网关设备、多个第三方系统,其中:
所述通信设备用于发送与所述第三方系统建立通信连接的网络请求消息;
所述网关设备用于接收所述网络请求消息,从配置规则集合中确定与所述网络请求消息对应的配置规则,根据所述配置规则对所述网络请求消息进行通信协议转换,将所述通信协议转换后的网络请求消息发送给对应的第三方系统,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则。
第三方面,本公开实施例提供的一种网关设备,包括处理器和存储器,所述存储器用于存储所述处理器可执行的程序,所述处理器用于读取所述存储器中的程序并执行如下步骤:
接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
根据所述配置规则对所述网络请求消息进行通信协议转换;
将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
将所述网络请求消息直接发送给所述非第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定 与所述路由信息对应的配置规则。
作为一种可选的实施方式,所述配置规则与所述路由信息一一对应;或,所述多个路由信息对应相同的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统;
从所述配置规则集合中确定与所述第三方系统对应的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
所述网络请求消息通过所述协议转换的进程进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述处理器被配置为执行:
所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,所述处理器还被配置为执行:
接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
根据所述配置规则对所述网络响应消息进行通信协议转换;
将所述通信协议转换后的网络响应消息发送给所述通信设备。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
作为一种可选的实施方式,接收通信设备发送的用于与第三方系统建立通信连接的网络请求消息之后,所述处理器还被配置为执行:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
作为一种可选的实施方式,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,所述处理器还被配置为执行:
接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
作为一种可选的实施方式,所述处理器被配置为执行:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
接收所述第三方系统发送的有效的访问令牌。
作为一种可选的实施方式,所述处理器还被配置为执行:
通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
作为一种可选的实施方式,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,所述处理器还被配置为执行:
接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
按预设周期对所述配置规则集合进行更新。
作为一种可选的实施方式,所述处理器被配置为执行:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
作为一种可选的实施方式,所述处理器被配置为执行:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
作为一种可选的实施方式,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
第四方面,本公开实施例还提供一种通讯协议转换设备,该设备包括处理器和存储器,所述存储器用于存储所述处理器可执行的程序,所述处理器用于读取所述存储器中的程序并执行如下步骤:
接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
根据所述配置规则对所述网络请求消息进行通信协议转换;
将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
将所述网络请求消息直接发送给所述非第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则。
作为一种可选的实施方式,所述配置规则与所述路由信息一一对应;或, 所述多个路由信息对应相同的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统;
从所述配置规则集合中确定与所述第三方系统对应的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
所述网络请求消息通过所述协议转换的进程进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述处理器被配置为执行:
所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
作为一种可选的实施方式,所述处理器还被配置为执行:
利用类加载器加载所述第三方系统的软件开发工具包sdk文件;
将所述加载后的sdk文件存储到所述配置规则集合中,其中所述sdk文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,所述处理器还被配置为执行:
接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定 所述第三方系统的配置规则;
根据所述配置规则对所述网络响应消息进行通信协议转换;
将所述通信协议转换后的网络响应消息发送给所述通信设备。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
作为一种可选的实施方式,接收通信设备发送的用于与第三方系统建立通信连接的网络请求消息之后,所述处理器还被配置为执行:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
作为一种可选的实施方式,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,所述处理器还被配置为执行:
接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行 更新。
作为一种可选的实施方式,所述处理器被配置为执行:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
接收所述第三方系统发送的有效的访问令牌。
作为一种可选的实施方式,所述处理器还被配置为执行:
通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
作为一种可选的实施方式,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,所述处理器还被配置为执行:
接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
按预设周期对所述配置规则集合进行更新。
作为一种可选的实施方式,所述处理器被配置为执行:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
作为一种可选的实施方式,所述处理器被配置为执行:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
作为一种可选的实施方式,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
第五方面,本公开实施例还提供一种通用的通讯协议转换装置,包括:
接收消息单元,用于接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
确定规则单元,用于从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
协议转换单元,用于根据所述配置规则对所述网络请求消息进行通信协议转换;
消息发送单元,用于将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
作为一种可选的实施方式,所述接收消息单元还用于:
接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
将所述网络请求消息直接发送给所述非第三方系统。
作为一种可选的实施方式,所述接收消息单元还用于:
接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
作为一种可选的实施方式,所述配置规则与所述路由信息一一对应;或, 所述多个路由信息对应相同的配置规则。
作为一种可选的实施方式,所述确定规则单元具体用于:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则。
作为一种可选的实施方式,所述确定规则单元具体用于:
根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统;
从所述配置规则集合中确定与所述第三方系统对应的配置规则。
作为一种可选的实施方式,所述协议转换单元具体用于:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
所述网络请求消息通过所述协议转换的进程进行通信协议转换。
作为一种可选的实施方式,所述协议转换单元具体还用于:
若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述协议转换单元具体还用于:
所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
作为一种可选的实施方式,还包括加载单元具体用于:
利用类加载器加载所述第三方系统的软件开发工具包sdk文件;
将所述加载后的sdk文件存储到所述配置规则集合中,其中所述sdk文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述消息发送单元具体用于:
根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,所述消息发送单元具体还用于:
接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
根据所述配置规则对所述网络响应消息进行通信协议转换;
将所述通信协议转换后的网络响应消息发送给所述通信设备。
作为一种可选的实施方式,所述消息发送单元具体还用于:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
作为一种可选的实施方式,所述消息发送单元具体还用于:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
作为一种可选的实施方式,接收通信设备发送的用于与第三方系统建立通信连接的网络请求消息之后,还包括会话连接单元具体用于:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
作为一种可选的实施方式,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,所述会话连接单元具体还用于:
接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,还包括显示单元具体用于:
若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述 会话连接单元具体还用于:
若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
作为一种可选的实施方式,所述会话连接单元具体用于:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
接收所述第三方系统发送的有效的访问令牌。
作为一种可选的实施方式,还包括接收指令单元具体用于:
通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
作为一种可选的实施方式,所述接收指令单元具体还用于:
接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
作为一种可选的实施方式,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,还包括更新单元具体用于:
接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
按预设周期对所述配置规则集合进行更新。
作为一种可选的实施方式,所述更新单元具体用于:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
作为一种可选的实施方式,所述更新单元具体用于:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
作为一种可选的实施方式,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
第六方面,本公开实施例还提供计算机存储介质,其上存储有计算机程序,该程序被处理器执行时用于实现上述第一方面所述方法的步骤。
本公开的这些方面或其他方面在以下的实施例的描述中会更加简明易懂。
附图说明
为了更清楚地说明本公开实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本公开实施例提供的一种通过适配器服务实现协议转换的网络结构示意图;
图2A为本公开实施例提供的第一种通讯协议转换的网络架构示意图;
图2B为本公开实施例提供的第二种通讯协议转换的网络架构示意图;
图2C为本公开实施例提供的第三种通讯协议转换的网络架构示意图;
图2D为本公开实施例提供的一种网关设备结构示意图;
图2E为本公开实施例提供的一种网关设备内部结构示意图;
图3A为本公开实施例提供的一种通讯协议转换方法实施流程图;
图3B为本公开实施例提供的一种路由信息中包含的具体字段示意图;
图3C为本公开实施例提供的一种界面图;
图3D为本公开实施例提供的一种下拉菜单的界面图;
图3E为本公开实施例提供的一种配置适配规则的界面图;
图4A为本公开实施例提供的一种网络请求消息的数据包结构示意图;
图4B为本公开实施例提供的一种网络请求消息的协议结构示意图;
图5为本公开实施例提供的一种路由信息以及对应的配置规则的显示界面示意图;
图6为本公开实施例提供的一种通信协议转换方法实施流程图;
图7为本公开实施例提供的一种详细的通信协议转换方法实施流程图;
图8为本公开实施例提供的一种内存和类加载器的结构关系示意图;
图9为本公开实施例提供的一种使用外部加载sdk文件的实施流程图;
图10A为本公开实施例提供的一种多系统通讯协议转换的网关设备内部实施结构示意图;
图10B为本公开实施例提供的第一种配置规则更新的示意图;
图10C为本公开实施例提供的第二种配置规则更新的示意图;
图11A为本公开实施例提供的一种路由的编辑界面示意图;
图11B为本公开实施例提供的一种令牌Token的编辑总界面示意图;
图11C为本公开实施例提供的一种令牌Token-编辑界面的示意图;
图12为本公开实施例提供的一种实现会话保持功能的实施流程图;
图13A本公开实施例提供的第一种进行协议转换前后的对比关系图;
图13B本公开实施例提供的第二种进行协议转换前后的对比关系图;
图14为本公开实施例提供的一种通信协议转换系统示意图;
图15为本公开实施例提供的一种通信协议转换的交互流程示意图;
图16为本公开实施例提供的一种网关设备内部具体结构示意图;
图17为本公开实施例提供的一种通信协议转换系统的示例示意图;
图18为本公开实施例提供的一种网关设备示意图;
图19为本公开实施例提供的一种通信协议转换设备示意图;
图20为本公开实施例提供的一种通信协议转换装置示意图。
具体实施方式
为了使本公开的目的、技术方案和优点更加清楚,下面将结合附图对本公开作进一步地详细描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本公开保护的范围。
本公开实施例中术语“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
本公开实施例中术语“Java虚拟机(Java Virtual Machine,JVM)”,表示一种计算机设备的规范,是一种抽象化的计算机,通过在真实计算机上仿真模拟各种计算机功能来实现相应的功能。其中,引入Java虚拟机后,Java语言在不同平台上运行时不需要重新编译,Java语言使用Java虚拟机屏蔽了与具体平台相关的信息,使得Java语言编译程序只需生成在Java虚拟机上运行的目标代码(字节码),就可以在多种平台上不加修改地运行。
本公开实施例中术语“软件开发工具包(software development kit,sdk)”,表示为特定的软件包、软件框架、硬件平台、操作系统等建立应用软件时的开发工具的集合;
本公开实施例中术语“数字签名”,表示信息发送者产生的无法伪造的一段数字串,该数字串同时也是对信息发送者发送信息真实性的有效证明,是一种使用公钥加密领域的技术来鉴别数字信息的方法。
本公开实施例中术语“Session”,在计算机中称为“会话控制”。Session对象存储特定用户会话所需的属性及配置信息。当用户在应用程序的Web页 之间跳转时,存储在Session对象中的变量将不会丢失,而是存在于用户整个会话中。
本公开实施例中术语“远程字典服务(Remote Dictionary Server,Redis)”,表示一个开源的使用ANSI C语言编写、支持网络、可基于内存也可持久化的日志型、Key-Value数据库,并提供多种语言的应用程序接口(Application Programming Interface,API)。
本公开实施例中术语“动态类加载”,表示将类的class文件(java代码编译后的文件)读入到内存,并为其创建一个对象,类的加载通过类加载器完成。
本公开实施例描述的应用场景是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着新应用场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。其中,在本公开的描述中,除非另有说明,“多个”的含义是两个或两个以上。
随着云服务的发展,各个物联网或互联网厂商都针对自身产品开发了云服务系统,在实际生产过程中,往往需要用到多家第三方的产品、系统和服务来组建自身的解决方案,但是不同厂商的产品有着不同的通讯协议,不同的鉴权方式,相互独立的数据库,如果针对每个第三方系统,单独开发一个用来做协议转换的适配器服务,效率较低。如果所有适配器模块的代码均运行在一个适配器服务中,那么在新接入或者停用某个第三方服务时,需要对该适配器模块重新打包编译和重新部署,在重启过程中,自身服务和所有的第三方服务通讯均会中断。如果部署多个适配器服务以形成集群来达到高可用的效果,又会造成硬件资源的浪费。如图1所示,目前针对多个第三方系统,通过单独开发的协议转换的适配器服务实现协议的转换,该适配服务处于网关和多个第三方系统之间,由于所有协议转换的代码均运行在同一个适配服务中,如果新接入第三方系统时,在该适配服务中添加了新的代码,因此需要对该适配器模块重新打包编译和重新部署,必然导致多个用户与第三 方系统之间的通讯中断。为了解决该技术问题,本公开实施例提供一种通用的、可动态配置的通讯协议转换方法,通过针对不同第三方系统的配置规则,为不同第三方系统配置对应的通信协议,如果新增加第三方系统时,只需在配置规则集合中添加新的配置规则,在实现该配置规则的运行时,由于并未添加新的代码,而是通过添加新的进程来运行新添加的配置规则,从而不需要重新打包编译和部署,解决了传统定制开发适配器服务导致的效率低下的问题。
本公开设计的核心思想是利用配置规则集合中包含的不同的第三方系统的通信协议的配置规则,选择与接收的网络请求消息对应的配置规则,对该网络请求消息进行通信协议转换后发送给第三方系统,以建立终端和该第三方系统之间的通信连接。由于本实施例中预先存储了不同第三方系统的配置规则,可以利用对应的配置规则对接收到的不同的网络请求消息进行通信协议转换,提供一种通用的协议转换方式,如果第三方系统对应的配置规则发生了新增、删除或修改,由于并没有对代码进行新增、删除或修改,因此无需重新进行编译和部署,解决了传统定制开发适配器服务导致效率低下的问题。
在一些示例中,本实施例提供的一种通讯协议转换方法可应用于网关设备或其他服务器设备,若应用于网关设备,则本实施例提供的通讯协议转换的网络架构如图2A所示,包括至少一个终端200a、网关设备201a、多个第三方系统202a,或者,本实施例提供的通讯协议转换的网络架构如图2B所示,包括至少一个服务器200b、网关设备201b、多个第三方系统202b。其中本实施例提的通讯协议转换方法部署在网关设备,与网关设备本身功能进行集成,当新增第三方系统时,可以在网关设备中存储的配置规则集合中对配置规则进行添加,即添加该新增第三方系统的配置规则,通过对该配置规则进行实例化处理后,使用该配置规则实例化得到的进程对用户终端发送的网络请求消息进行通信协议转换,能够保证在添加新的第三方系统之后不影响原有的第三方系统正常运行,其中对配置规则进行删除或修改的原理与对配置规则 进行新增的原理相同,此处不再赘述。在实际实施中,还可以将自身的业务系统和第三方系统结合实施,网络架构如图2C所示,其中以通信设备为终端为例,将本实施例提供的通讯协议转换方法部署在网关设备,实现多个终端与自身的业务系统以及第三方系统进行通信。
在一些示例中,如图2D所示,本实施例中的网关设备包括路由组件200和配置策略组件201,其中路由组件200配置为网关设备本身原有的功能,用于实现为自身业务系统(即非第三方系统)提供转发等通信服务,或与配置策略组件201协同工作,以针对第三方系统提供服务。配置策略组件201配置为根据存储的配置规则对发送给第三方系统的网络请求消息进行协议转换。本实施例中的路由组件200和配置策略组件201,在针对非第三方系统服务时是互不干扰的,并且,配置策略组件201进行协议转换之前需要使用路由组件200中的编解码模块200a对接收的网络请求消息进行解码,对发送的网络请求消息进行编码,并通过路由组件200中的路由模块200b对协议转换后的网络请求消息转发给相应的第三方系统。
由于本实施例中的路由组件200和配置策略组件201是互不干扰且相互配合的,因此可以通过本实施例中的网关针对第三方系统和非第三方系统进行统一部署,网关接收通信设备发送的网络请求消息后,先通过路由组件200判断该网络请求消息是用于与第三方系统建立通信连接的,还是用于与非第三方系统建立通信连接的;具体判断的方式是,通过网络请求消息中携带的路由信息,判断该路由信息中是否包含了配置规则,如果包含则确认该网络请求消息是发送给第三方系统的,需要使用协议转换模块进行协议转换后发送给第三方系统,如果确定该路由信息中未包含配置规则,则确认该网络请求消息是发送给非第三方系统的,不需要进行协议转换,可以直接将网络请求消息转发给非第三方系统。因此,该判断模式可以方便简洁地协调路由组件和配置策略组件,使其高效运转、有效连通通信设备至不同对象(第三方或非第三方)、降低人工成本。
在一些示例中,本实施例中的网关设备还可以包括确认模块,被配置为 执行在路由组件判断网络请求消息后,判断是否需要进行配置策略组件的处理。例如,通信设备初次通过交互界面的方式对配置规则进行配置后,后续再通过网关设备建立与第三方系统的通信连接时,路由组件无需再次对接收的网络请求消息进行判断,而是通过确认模块直接判断是否需要进行配置策略组件的处理,降低网关设备中路由组件处理的数据量,节省网关设备中路由组件的资源,尤其针对高并发情况下,保证网关设备的高效运行。
若确定该网络请求消息为用于与第三方系统建立通信连接的网络请求消息,则利用配置策略组件201,从配置规则集合中确定与所述网络请求消息对应的配置规则;根据所述配置规则对所述网络请求消息进行通信协议转换,然后利用路由组件200将通信协议转换后的网络请求消息发送给对应的第三方系统;若该网络请求消息为用于与非第三方系统建立通信连接的网络请求消息,则利用路由组件200将所述网络请求消息直接发送给所述非第三方系统。
在一些示例中,如图2E所示,本实施例中的网关设备的路由组件200包括编解码模块200e,路由模块200f,网关设备的配置策略组件201包括会话保持模块201e,协议转换模块201f,内部存储模块201g。
其中,编解码模块200e,用于对所有收到的网络请求消息的解码和发出的网络请求消息的编码。
路由模块200f,用于将不同的网络请求消息根据对应的配置规则进行转发,还用于判断当前的网络请求消息中携带的路由信息中是否包含配置规则,如果包含则确认该网络请求消息需要进行协议转换后发送给第三方系统,否则将该网络请求消息直接发送给非第三方系统(自身的业务系统)。
会话保持模块201e,用于维持与第三方系统的会话。
协议转换模块201f,用于用于对收到的网络请求消息根据对应的配置规则转换为符合第三方系统要求的网络请求消息。
内部存储模块201g,用于存储配置规则、第三方系统的sdk文件等数据。
如图3A所示,本实施例提供的通讯协议转换方法的实施流程如下:
步骤300、接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
在一些示例中,本实施例中的通信设备包括但不限于终端、服务器。本实施例中的第三方系统包括但不限于终端、服务器。实施中,可以是终端与多个第三方系统建立通信连接,也可以是服务器与多个第三方系统(服务器)建立通信连接,在实际应用中,可以理解为建立自身企业的服务器和从第三方购买的服务器之间的通信连接,具体可根据实际需求确定,本实施例对此不作过多限定。在具体应用场景中,将企业A的服务器按本实施例提供的通讯协议转换方法配置为网关设备,将通信设备和第三方系统之间的通信消息进行协议转换。
在一些示例中,接收通信设备发送的一个网络请求消息,该网络请求消息中携带与第三方系统建立通信连接的消息;或,接收通信设备发送的多个网络请求消息,每个网络请求消息中携带与第三方系统建立通信连接的消息,其中网络请求消息与第三方系统之间的是一一对应的,即通信设备根据发送不同的网络请求消息,向不同的第三方系统发送建立通信连接的请求。
需要说明的是,本实施例中的网络请求消息实际上为数据包,该数据包结构的示意图如图4A所示,本实施例中的通讯协议转换的本质是通过与该第三方系统对应的应用层协议,将通信设备向第三方系统发送的数据包的应用层数据使用的应用层协议进行协议转换,将协议转换后的应用层数据转发给第三方系统,从而实现通信设备和第三方系统之间的通信。一般而言,由于第三方系统都具备自身特定的应用层协议,并区别于普通的应用层协议,因此需要将通信设备的数据包中的应用层数据对应的应用层协议,转换为需要建立通信连接的第三方系统的应用层协议。
其中,网络请求消息使用的协议结构如图4B所示,其中应用层协议与数据包中的应用层数据对应,TCP/IP协议与数据包中的TCP头部、IP头部对应,链路层与数据包中的以太网头部对应。需要说明的是,本实施例中的数据包和对应的协议结构仅为一种示例,本实施例对该网络请求消息的具体结构不 作过多限定。在一些示例中,本实施例中的网络请求消息包括:路由信息、源地址信息、消息内容中的至少一种。
步骤301、从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
需要说明的是,本实施例中的配置规则集合是预先根据多个第三方系统分别对应的配置规则确定的,并将所有第三方系统的配置规则生成配置规则集合后,将该配置规则集合进行存储。在一些示例中,将配置规则集合存储于网关的内部存储模块中,包括但不限于内存或硬盘存储,可选的,硬盘存储存有配置规则集合,包括多个配置规则,内存负责实现将各个配置规则进行实例化处理,其中还可以将“路由信息”、“网关日志”等存储于内部存储模块中。可选的,本实施例中硬盘存储采用PostgreSQL数据库实现存储功能,内存采用redis数据库实现存储功能。本实施例通过上述方式预先存储配置规则集合之后,利用存储的配置规则集合进行实例化处理,从而实现通信协议转换。
在一些示例中,本实施例中的配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;配置规则中的路由规则、编码解码规则、协议转换规则以及第三方系统之间是一一对应的。实施中,可以建立第三方系统的标识、路由规则、编码解码规则以及协议转换规则之间的映射关系。
其中,路由规则用于表征路由的格式规则、名称规则中的至少一种,例如,不同的路由规则说明路由格式不同或网关域名不同。
编码解码规则用于表征对消息的编码和解码的方式,不同的编码解码规则能够对不同的消息进行编码和解码。
协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
其中,令牌配置规则用于表征第三方系统使用的令牌的规则,例如令牌的地址、令牌的域名、令牌的键、令牌的格式、令牌的请求头添加或修改,令牌的请求体添加或修改,令牌的正则表达式、令牌的失效时间等规则。实 施中,通过修改令牌配置规则能够保证对所有第三方系统进行有效访问,由于目前所有云平台的访问令牌都是有时效限制的,需要在访问令牌失效之前重新请求新的访问令牌,本实施例通过实时获取访问令牌的有效性,并通过在令牌失效后重新获取、更新令牌的方式,保证和第三方系统始终建立会话连接。
数字签名配置规则用于表征第三方系统使用的数字签名规则。由于目前各个第三方系统大多具有各自使用的数字签名规则,各个第三方系统之间的数字签名规则不能通用,而本实施例通过配置数字签名配置规则,可以将网络请求消息中添加/修改与各个第三方系统对应的数字签名规则,从而实现通用性。
消息配置规则用于表征请求消息和响应消息对应的配置规则,例如请求头的添加或修改、请求体的添加或修改、请求参数的添加或修改,响应头的添加或修改、响应体的添加或修改、响应参数的添加或修改。实施中,由于各个第三方系统对网络请求消息中数据的传输格式存在明确且不同的要求,并且需要添加各自第三方系统的访问令牌,因此,通过消息配置规则和令牌配置规则,对消息格式和访问令牌进行配置,从而实现通用性。
使用软件开发工具包sdk文件的配置规则,是指如果第三方系统不公开自身的数据加密或数字签名算法,要求外部访问用户使用其提供的sdk来进行数据加密和数字签名,则在配置规则中可以保存该第三方系统的sdk文件,使用sdk文件对消息进行数据加密和数字签名。其中,sdk文件是配置规则的一部分,可以直接加载使用但不能查看具体的数据加密和数字签名算法。实施中,当某些第三方系统要求使用其提供的sdk文件来对传输的数据进行数据加密和数字签名时,本实施例可以利用该配置规则,直接将该sdk文件添加到配置规则集合,实现加载使用的功能。
在一些示例中,本实施例中的具体协议转换规则如下表1所示。
表1配置规则集合表
Figure PCTCN2022108151-appb-000001
本实施例提供的配置规则集合用于对不同规则进行有效梳理,使得系统提升用户的体验,使不具备较深专业知识的用户也能简洁友好地执行配置。进一步地,在确定配置规则的维度时,从不同规则(1-4)中分别选择对应的选项,能够有效地节省时间,进一步提升用户体验。
另外,通过不同维度的规则添加或修改,可以避免不需要的信息外泄给请求方或接收方。如,第三方对于“token剩余次数”在仅需平台了解参考的情况下(网关获悉),通常不宜反馈给通信设备(通信设备不获悉)。
在一些示例中,通过如下方式确定与所述网络请求消息对应的配置规则:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定 与所述路由信息对应的配置规则。
实施中,路由信息、路由规则以及第三方系统之间是一一对应的。通过对请求消息进行解码后,解析路由信息,根据确定该路由信息对应的路由规则,即根据路由规则解析路由中的完整地址(包括http地址信息),得到与该路由信息对应的第三方系统。容易理解的是,在实际多个第三方系统搭建的过程中,不同的第三方系统通常设置不同的路由规则,不同的路由规则对应不同的路由信息,以使终端能够同时和不同的配置系统建立通信连接,保证建立的不同通信链路之间是相互独立的。
在一些示例中,路由信息和配置规则的对应关系包括但不限于如下任一方式:
方式3-1、配置规则与所述路由信息一一对应;
方式3-2、所述多个路由信息对应相同的配置规则。
在一些示例中,如图3B所示,路由信息中包含的具体字段包括但不限于:路由名称、路由说明、路径、完整地址、服务ID、归属应用ID、配置规则ID、是否重试。其中通过多个路由信息中包含的“配置规则ID”字段,从各个配置规则中筛选出匹配的配置规则。例如路由信息1和路由信息2中都包含相同的配置规则ID1,则说明路由信息1和路由信息2都对应相同的配置规则。
在一些示例中,如图3C所示,本实施例还提供一种界面图,用于显示路由信息中的各个字段,用户可以直观的查看不同路由信息中的各个配置规则,并且对配置规则进行编辑、删除、或更多的操作;其中,更多的操作可以通过下拉菜单的方式进行显示,如图3D所示,当用户点击更多操作后,下拉菜单中显示“配置适配规则”,如图3E所示,用户点击下拉菜单中的“配置适配规则”之后,在显示界面弹出弹窗,在弹窗中用户可以对适配规则进行选择,其中,适配规则用于表示本实施例中的配置规则。本实施例提供的界面,能够方便快捷地使用户确认配置规则,实现用户所需的策略选择。进一步地,下拉框的设置,为择一选择,与“同一个路由信息只能对应一个配置规则”相契合,能够有效避免用户的误选,提高用户的使用体验。
实施中,用户初次通过显示界面配置适配规则之后,会将该配置适配规则进行存储,例如存储在网关设备的确认模块,当后续通过网关设备建立与第三方系统的通信连接时,路由组件无需再次对接收的网络请求消息进行判断,而是通过确认模块中存储的配置适配规则,直接判断是否需要进行配置策略组件的处理,降低网关设备中路由组件处理的数据量,节省网关设备中路由组件的资源,尤其针对高并发情况下,保证网关设备的高效运行。
可以理解的是,同一个路由信息只能对应一个配置规则,而同一个配置规则可以对应一个或多个路由信息。如果多个路由信息对应相同的配置规则时,与该多个路由信息对应的多个第三方系统的配置规则是相同的,那么多个第三方系统与终端的交互数据是可以复用的,通过为不同的第三方系统配置不同的端口号,从而解决大量终端同时与多个第三方系统进行信息交互时导致系统崩溃的问题,使得该场景下多个第三方系统能够实现负载均衡。本实施例提供的两种配置规则和路由信息对应的方式,可根据实际需求进行选择,本实施例对此不作过多限定。
实施中,可以在配置规则集合中存储有路由信息和配置规则的对应关系,也可以利用路由信息、第三方系统标识、配置规则之间的对应关系,通过如下步骤从所述配置规则集合中确定与所述路由信息对应的配置规则:
步骤301a、根据所述网络请求消息中携带的述路由信息,确定与所述路由信息对应的第三方系统;
实施中,可以根据配置规则集合中的路由规则解析所述路由信息,例如根据该路由信息中的路径确定适配的路由规则并进行解析,如果解析成功说明该路由信息和该路由规则是匹配的,否则不匹配,则利用解析得到的路由信息,确定与所述路由信息对应的第三方系统。本实施例可以根据路由信息来确定第三方系统,尤其针对存在大量第三方系统时,网关设备能够更加简便地通过路由信息获取第三方系统,进而确定第三方系统的配置规则,对于用户而言,不需要专业知识也可以方便简单地确定配置规则,提高用户的使用体验。
为了便于用户更好的对系统进行运维,在一些示例中,还可以将规则配置界面进行显示,如图5所示,通过显示界面显示各个第三方系统的路由信息以及对应的配置规则,其中显示的路由信息包括但不限于:路由名称、路由说明、路径、完整地址、服务ID、归属应用中的至少一种。显示的配置规则包括但不限于:配置规则、忽略前缀、是否重试、操作(包括编辑、删除、更多操作)中的至少一种。
步骤301b、从所述配置规则集合中确定与所述第三方系统对应的配置规则。
在一些示例中,根据路由信息确定对应的第三方系统,根据第三方系统确定对应的配置规则之后,利用配置规则中的编解码规则(区别于常用的编解码规则),对终端发送的网络请求消息再次进行解码,对再次解码后的网络请求消息进行通信协议转换。
步骤302、根据所述配置规则对所述网络请求消息进行通信协议转换;
在一些示例中,根据所述配置规则对所述网络请求消息进行通信协议转换之前,还包括:确定所述配置规则生效。
实施中,将第三方系统的配置规则添加到配置规则集合中之后,还可以通过是否收到用户指示的生效指令,确定配置规则是否生效,从而利用生效的配置规则对所述网络请求消息进行通信协议转换。即若所述配置规则生效,则根据所述配置规则对所述网络请求消息进行通信协议转换;否则不执行通信协议转换。
在一些示例中,通过如下步骤进行通信协议转换:
步骤302a、将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
需要说明的是,实例化处理用于表征根据指定的代码创建一个或多个可以执行的进程的过程。由于代码需要经过实例化后才可以被执行,因此本实施例对协议转换规则进行实例化处理后,可以得到利用该协议转换规则执行协议转换的进程。
步骤302b、所述网络请求消息通过所述协议转换的进程进行通信协议转换。具体实施时,网络请求消息通过协议转换的一个或多个进程,对网络请求消息进行通信协议转换。
在一些示例中,若所述配置规则包括第三方系统的软件开发工具包sdk文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密;其中所述软件开发工具包文件与所述第三方系统是一一对应的。
具体实施中,sdk文件是由一系列class文件构成的,加载是指sdk文件编译得到的class文件读入到网关设备的内存,并为之创建一个对象,类的加载由类加载器完成,类加载器可通过JVM提供或通过继承ClassLoader基类来创建自己的类加载器,通过使用不同的类加载器,可以从不同来源加载类的二进制数据。
在实施中,预先确定了所有第三方系统的配置规则,包括第三方系统要求的sdk文件,将所有的配置规则和sdk文件生成一个配置规则集合存储在内部存储模块中,在进行协议转换时,可以先将配置规则集合中所有的配置规则和sdk文件都进行实例化处理,当网关设备接收到请求消息之后,可根据请求消息中的路由信息确定对应的配置规则,使用与该配置规则对应的实例化后得到执行协议转换的进程进行通信协议转换。
在一些示例中,本实施例中的协议转换规则包括如下任一或任多种:
1)令牌配置规则;
具体包括如下任一或任多:获取令牌的地址、获取令牌的域名、获取令牌的http方法、获取令牌的请求体添加或修改、获取令牌的请求头添加或修改、获取令牌的正则表达式、令牌失效时间、令牌的键、令牌的格式、令牌有效检查uri、令牌失效字符串、可以选择加在url后和请求头中。
2)数字签名配置规则;
具体包括如下任一或任多:数字签名算法、数字签名范围(可以选择body 或body&headers)、数字签名的键、数据加密算法。
3)消息配置规则;
具体包括如下任一或任多:请求头添加或修改、请求头移除、请求体添加或修改、请求参数添加或修改、添加session、移除session、响应头添加或修改、响应头移除、响应体添加或修改、响应体移除、重定向地址、转发地址、修改响应码。如下所示:
3-1)统一资源标志符URI配置规则;具体包括更改请求URI。
3-2)消息头配置规则;具体包括增加请求头、修改请求头、移出指定的请求头、移出指定的响应头、修改响应头中至少一种。
3-3)消息参数配置规则;具体包括增加请求参数、修改请求参数、修改响应参数中的至少一种。
3-4)消息加密规则;具体包括对请求数据进行加密。
3-5)消息签名配置规则;具体包括对请求消息进行数字签名。
3-6)超文本传输协议HTTP状态码配置规则;具体包括修改HTTP请求方法、修改HTTP状态码、断路器(可理解为黑名单、拦截功能)、忽略前缀、移出session中的至少一种。
3-7)消息重定向规则;
3-8)转发规则。
4)使用软件开发工具包sdk文件的配置规则;
使用sdk文件的数据加密算法和数据签名算法对请求消息进行数据加密和数据签名。
步骤303、将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
实施中,将通信协议转换后的网络请求消息发送给对应的第三方系统之前,根据配置规则中该第三方系统对应的编码解码规则,对通信协议转换后的网络请求消息进行编码,将编码后的网络请求消息发送给第三方系统。
在一些示例中,根据所述网络请求消息中携带的路由信息,将所述通信 协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
本实施例通过上述步骤实现了针对不同的第三方系统,终端需要和多个不同的第三方系统建立连接时,能够采用本实施例中的上述步骤快速生效,解决了大体量的物联网云平台集成多种第三方系统效率低的问题。
在一些示例中,本实施例在接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息的同时,还可以接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;具体实施中,接收通信设备发送的网络请求消息后,先判断该网络请求消息是发送给第三方系统的,还是非第三方系统的,具体可以根据网络请求消息中的路由信息中是否包含配置规则来确定,如果包含则当确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,即确定该网络请求消息是发送给第三方系统的,需要进行协议转换,否则确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息,将该网络请求消息直接发送给非第三方系统。本实施例能够实现网关设备根据路由信息来判断是否需要进行协议转换,实现了通用性。
在一些示例中,本实施例还提供一种对接收第三方系统发送的网络响应消息进行协议转换的方法,如图6所示,该方法的具体实施步骤如下所示:
步骤600、接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
容易理解的是,由于网络响应消息是接收第三方系统发送的,因此根据接收的网络响应消息就能够确定第三方系统,只需从配置规则集合中确定该第三方系统的配置规则即可。
步骤601、根据所述配置规则对所述网络响应消息进行通信协议转换;
在一些示例中,通过如下步骤进行通信协议转换:
步骤601a、将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
需要说明的是,实例化处理用于表征根据指定的代码创建一个或多个可 以执行的进程的过程。由于代码需要经过实例化后才可以被执行,因此本实施例对协议转换规则进行实例化处理后,可以得到利用该协议转换规则执行协议转换的进程。
步骤601b、通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。其中,网络响应消息通过协议转换的一个或多个进程,对网络响应消息进行通信协议转换。
步骤602、将所述通信协议转换后的网络响应消息发送给所述通信设备。
在一些示例中,通过如下方式将网络响应消息发送给通信设备:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
本实施例可以对终端发送给第三方系统的网络请求消息进行通信协议转换后转发给第三方系统,还可以对第三方系统发送给终端的网络响应消息进行通信协议转换后转发给终端。
在一些示例中,如图7所示,本公开实施例还提供一种详细的通信协议转换方法,该方法的具体实施流程如下所示:
步骤700、接收终端发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
步骤701、根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统,从所述配置规则集合中确定与所述第三方系统对应的配置规则;
步骤702、将第三方系统的配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;所述网络请求消息通过所述协议转换的进程进行通信协议转换;
步骤703、根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统;
步骤704、接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
步骤705、根据第三方系统的配置规则中的协议转换规则进行实例化处理得到的执行协议转换的进程,对所述网络响应消息进行通信协议转换;
步骤706、根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的终端。
在一些示例中,本公开实施例还提供支持上传sdk的功能,该功能保证了对于使用自身数据加密和签名算法的第三方系统,仍可以对该第三方系统进行规则配置,并且可以直接利用加载外部的sdk文件对网络请求消息进行数据加密和签名,适用于各种第三方系统,具体更强的通用性。通过上传外部sdk来自定义数据加密或数字签名算法。需要说明的是,针对某些对安全性要求较高的第三方系统(第三方系统),不会公开自身的数据加密或数字签名算法,要求外部访问者使用该第三方系统提供的sdk来进行数字签名和数据加密。而本公开实施例通过使用java动态类加载技术,支持通过上传sdk,指定sdk中的加密方法来适配这类第三方系统。其中,如图8所示,本实施例提供一种内存和类加载器的结构关系示意图。加载指的是将类的class文件(java代码编译后的文件)读入到内存(本实施例中网关设备的内存),即将sdk文件编译得到的class文件读入到内存,并为之创建一个对象,类的加载由类加载器完成,类加载器可通过JVM提供或通过继承ClassLoader基类来创建自己的类加载器,通过使用不同的类加载器,可以从不同来源加载类的二进制数据。
本实施例具体加载sdk文件的方法实施流程如下所示:
1)利用类加载器加载所述第三方系统的软件开发工具包sdk文件;
实施中,将sdk文件编译得到的class文件读入到内存,并为之创建一个对象。
2)将所述加载后的sdk文件存储到所述配置规则集合中;
其中所述sdk文件与所述第三方系统是一一对应的。在使用sdk文件时,会先判断与终端发送的网络请求消息对应的配置规则中是否存在sdk文件,若存在则利用该sdk文件对该网络请求消息进行数字签名和加密。
如图9所示,本实施例提供的一种使用外部加载sdk文件的实施流程如下:
步骤900、获取上传的java类型的sdk文件;
步骤901、使用类加载器加载该sdk文件并存储到配置规则集合;
步骤902、接收终端发送的网络请求消息,从配置规则集合中确定与所述网络请求消息对应的配置规则;
步骤903、确定所述配置规则中包含sdk文件;
步骤904、使用sdk中的签名算法,对该网络请求消息中指定的数据进行数字签名,将数字签名后的数据添加到该网络请求消息指定的请求头中;
步骤905、使用sdk中的数据加密算法对该网络请求消息中的数据进行加密;
步骤906、将加密后的网络请求消息发送给第三方系统。
在一些示例中,如图10A所示,本实施例提供的一种系统通讯协议转换的网关设备内部实施结构示意图,网关设备用于在多个终端和多个第三方系统之间建立通信连接,其中,网关设备中的内部存储模块存储有配置规则集合,配置规则集合中的每个配置规则进行实例化处理后,得到对应的一个协议转换的进程,每个进程与第三方系统是一一对应的,例如进程A对应第三方系统A,进程B对应第三方系统B,进程C对应第三方系统C,进程D对应第三方系统D。如果添加新的第三方系统,则只需在配置规则集合中添加新的配置规则,并生成新的进行协议转换的进程,网关设备不需要重启。
在一些示例中,为了方便用户更好的进行维护,还可以通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。如图11A、图11B所示,用户可以在显示界面点击“删除”、“编辑”、“添加”等按键,从而在显示界面对配置规则进行删除、编辑、添加。还可以通过显示界面对配置规则进行修改,例如点击“编辑”按键,显示令牌Token-编辑界面,如图11C所示,可以对获取token地址(获取令牌的地址)、获取token http方法(获取令牌的http方法)、获取token请求体(获取令牌的请求体添加或修改)、获取token请求头(获取令牌的请求头添加或修改)、获取token正则(获取令牌的正则表达式)、token失效时间(令牌失效时间)、token的键key(令牌的键)、 token的格式(令牌的格式)、类型(可以选择加在url后和请求头中)等进行修改。
在一些示例中,接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
在一些示例中,通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,还可以通过如下任一方式对配置规则集合进行更新:
方式1)接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;
方式2)按预设周期对所述配置规则集合进行更新。
本实施例提供至少两种更新的方式,一种是在接收到用户的指令后进行配置规则集合的更新,另一种是定时对配置规则集合进行更新,其中,用户通过所述显示界面触发的数据库同步指令可以是用户编辑后点击保存触发的指令,也可以是单独按键触发的指令,还可以是删除配置规则后点击确认触发的指令,本实施例对此不作过多限定。例如可以在显示界面设置“数据库同步时间”,从而自动按照预设的数据库同步时间进行数据库的更新,以便于及时更新网关系统,维护终端和第三方系统之间的通信,避免宕机等突发状况发生导致通信中断的问题。本实施例按预设周期对配置规则集合进行更新的方法,能够使配置规则集合的更新机制化,降低人工成本,并且更新周期可调节,能够依据外部情况进行有针对的调整,以满足用户需求。例如,针对高并发量的情况(双十一等外部有大规模通信请求的情况),可以进行行之有效的适当调节。
在一些示例中,本实施例提供如下任一更新配置规则的方法:
方法1)若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;
该方式更新过程如图10B所示,通过Web端修改配置规则集合后,协议转换模块通过轮询的方式,监听到网关设备中的内部存储模块中存储的配置规则集合中配置规则的改变,对配置规则集合进行更新。
方法2)将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
该方式更新过程如图10C所示,通过Web端修改配置规则集合后,监听到消息队列中存放的配置规则集合中配置规则的改变,对消息队列中的配置规则进行对应的更新,并通知协议转换模块对内部存储模块中存储的配置规则进行更新。
本实施例中上述方式1)-2)和方法1)-2)可以结合实施,对此不作过多限定。需要说明的是,上述更新方式,能够动态地实现人机交互,更有利于快速高效地、界面友好地实现监控,对系统而言,无需宕机,从而保持了系统高效运转;对执行者而言,无需高深的配置知识、无需去后台执行复杂的代码,从而提升了用户体验。
当多执行者(平台使用者,如图10A的web端为多个)使用平台进行配置时,某一执行者的操作可以通过图10B或图10C的方式借助web端向其他执行者提供更新内容(包括但不限于:操作者ID等身份信息,操作者操作更新时间,可供备注的人机交互窗口可起到日志作用),以便于其他使用者快速知悉当前共同的系统经过了何种配置更新、进而做出决策。尤其在高并发时间节点,能够通过本平台的方案起到快速的更新信息互通、提高用户体验,从而有效应对突发情况。
在一些示例中,本实施例还提供一种更新配置规则的方法,具体包括如下任一或任多种:
1)若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;
实施中,将新增的配置规则添加到所述配置规则集合中,其中新增的配 置规则与第三方系统是一一对应的。
2)若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;
实施中,将配置规则集合中需要删除的配置规则进行删除。
3)若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
实施中,修改后的配置规则与第三方系统是一一对应的。
本实施例在修改、删除或添加配置规则的过程中,由于不需要网关重启,能够保证和多个第三方系统之间的通信连接不中断,解决了传统定制开发适配器服务的效率低下与线上环境重启服务的空档期问题,并且和网关融合,有效节省了服务器资源。
在一些示例中,为了实现会话保持功能,本实施例还可以通过如下方式周期发送连接请求,具体如下:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。其中,探活接口由第三方系统提供,而token(访问令牌)作为参数在探活接口中调用。本实施例提供的确定访问令牌的有效性的方法,能够提升用户体验,直观快速地展示给用户令牌有效性结果,方便用户针对令牌失效时的情形快速做出应对。
在一些示例中,确定所述访问令牌的有效性之后,若访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效,提示用户的方式包括但不限于:通过告警信息、提示信息中的至少一种。本实施例还可以周期性确定访问令牌的有效性,如果确定访问令牌失效,还可以通过显示界面提示用户,提高用户运维的效率。
本实施例还提供一种与第三方系统保持连接并检查访问令牌token有效性的功能,如图12所示,具体实施方式如下:
步骤1200、接收终端发送的网络请求消息后,确定与网络请求消息对应的配置规则中的访问令牌信息;
实施中,本实施例中的访问令牌信息包括但不限于:访问令牌的请求地址、访问令牌的请求参数中的至少一种。
步骤1201、根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息;
容易理解的是,该连接请求消息用于获取第三方系统的访问令牌。
步骤1202、接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性;
可选的,接收所述第三方系统发送的访问令牌之后,将该访问令牌进行存储,如将配置系统发送的访问令牌存储到缓存数据库集群redis。在一些示例中,本实施例还可以将第三方系统的会话session、cookies等信息进行存储,并在失效前进行更新,以保持与第三方系统的会话连接。
步骤1203、若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
在一些示例中,通过如下方式重新获取有效的访问令牌:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;接收所述第三方系统发送的有效的访问令牌。
在一些示例中,如图13A所示,本实施例提供的第一种进行协议转换前后的对比关系图,其中协议转换前中的请求头Request Header中还没有添加systemtype和token这两项,配置规则具体是在Request Header添加第三方系统要求的systemtype和token,实施中,网关设备根据路由信息1624415503178确定对应的配置规则,在原请求消息的请求头Request Header添加了如下内容:
“systemtype:1
token:0a05b60c-476d-43c4-b1bb-e671e7435118”;
并将添加后的请求消息转发给第三方系统,即转发给Request Url为10.251.186.44:8070的第三方系统。
在一些示例中,如图13B所示,本实施例提供的第二种进行协议转换前后的对比关系图,利用第三方系统提供的sdk文件进行数据加密。其中网关设备根据路由信息1624415503178确定对应的配置规则,从配置规则中获取sdk,调用该sdk对请求体Request Body进行了数据加密,并转发给第三方系统,即转发给10.251.186.44:8070。
在一些示例中,本实施例还提供一种通讯协议转换的具体转换内容,如下所示:
Figure PCTCN2022108151-appb-000002
Figure PCTCN2022108151-appb-000003
Figure PCTCN2022108151-appb-000004
本实施例提供的通信协议转换方法,可应用于网关设备,从而减少服务器的数量和部署工作量,提高网关设备的利用率;基于配置规则集合实现对不同第三方系统的通信连接,并且如果存在新增第三方系统,需要将新增第三方系统的配置规则添加到配置规则集合中,不需要重启网关设备,从而提高开发效率,降低运维难度,解决了重启网关设备期间服务瘫痪的问题;并且本实施例提高的通信协议转换的方法,还可以支持导入外部sdk文件对终端发送的请求消息进行数字签名和加密,从而解决了目前只能通过预先通过代 码引入外部sdk文件的问题,尤其针对大体量的第三方系统的搭建,能够有效提高开发效率。
在一些示例中,如图14所示,本实施例还提供了一种通信协议转换系统,用于将通信设备和多个第三方系统建立通信连接,该系统包括至少一个通信设备1400、网关设备1401、多个第三方系统1402,其中:
所述通信设备1400用于发送与所述第三方系统1402建立通信连接的网络请求消息;
所述网关设备1401用于接收所述网络请求消息,从配置规则集合中确定与所述网络请求消息对应的配置规则,根据所述配置规则对所述网络请求消息进行通信协议转换,将所述通信协议转换后的网络请求消息发送给对应的第三方系统1402,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则。
如图15所述,以一个终端、一个第三方系统为例,本公开实施例中的通信协议转换的交互流程如下所示:
步骤1500、终端向网关设备发送网络请求消息;
步骤1501、网关设备从配置规则集合中确定与所述网络请求消息对应的配置规则;
其中,配置规则集合包括不同的第三方系统的通信协议的配置规则。
实施中,网关设备根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统,从所述配置规则集合中确定与所述第三方系统对应的配置规则。
步骤1502、网关设备根据所述配置规则对所述网络请求消息进行通信协议转换;
在一些示例中,网关设备将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;所述网络请求消息通过所述协议转换的进程进行通信协议转换。
步骤1503、网关设备将通信协议转换后的网络请求消息发送给对应的第三方系统。
在一些示例中,网关设备根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
步骤1504、网关设备接收所述第三方系统发送的网络响应消息;
步骤1505、网关设备从所述配置规则集合中确定所述第三方系统的配置规则,根据所述配置规则对所述网络响应消息进行通信协议转换;
在一些示例中,网关设备将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
在一些示例中,若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。其中所述软件开发工具包文件与所述第三方系统是一一对应的。
步骤1506、网关设备将通信协议转换后的网络响应消息发送给所述终端。
在一些示例中,网关设备根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的终端。
在一些示例中,网关设备接收终端发送的用于与第三方系统建立通信连接的网络请求消息之后,还用于确定与所述网络请求消息对应的配置规则中的访问令牌信息;根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
在一些示例中,网关设备周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,还用于接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
在一些示例中,若确定所述访问令牌失效,则网关设备通过显示界面提 示用户所述第三方系统的访问令牌无效。
在一些示例中,网关设备确定所述访问令牌的有效性之后,还用于更新访问令牌:具体的,若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
在一些示例中,网关设备根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;接收所述第三方系统发送的有效的访问令牌。
在一些示例中,网关设备还用于利用类加载器加载所述第三方系统的软件开发工具包sdk文件;将所述加载后的sdk文件存储到所述配置规则集合中,其中所述sdk文件与所述第三方系统是一一对应的。
在一些示例中,若所述配置规则中包含sdk文件,则网关设备利用所述sdk文件对所述网络请求消息进行数字签名和加密。
在一些示例中,网关设备还可以通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
在一些示例中,网关设备还可以接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,按预设周期对所述配置规则集合进行更新。
在一些示例中,网关设备还可以通过如下方式对所述配置规则集合进行更新:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
在一些示例中,网关设备还可以对配置规则集合进行更新,具体包括:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规 则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
在一些示例中,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
如图16所示,本实施提供的网关设备内部具体结构示意图,包括编解码模块1600、路由模块1601、协议转换模块1602、内部存储模块1603、会话保持模块1604;其中:
编解码模块1600,用于对所有收到的网络请求消息的解码和发出的网络请求消息的编码。其中,网络响应消息和网络请求消息的编解码处理的原理是相同的。
实施中,编解码模块进行编解码处理的逻辑和一般的编解码原理是可以是相同的,还可以按照第三方系统要求的编解码算法对消息再次进行编解码,也就是说,如果网关设备接收到终端的请求消息后,首先对请求消息进行一般的解码,得到路由信息,再根据路由信息对应的配置规则中的第三方系统要求的编解码规则对请求消息再次进行解码,并进行对应的协议转换后,先按照第三方系统要求的编解码规则对请求消息进行编码,再按照一般的编解码原理对请求消息再次进行编码后转发给第三方系统。
路由模块1601,用于将不同的网络请求消息根据对应的配置规则进行转发。其中,网络响应消息和网络请求消息的转发原理是相同的。
协议转换模块1602,用于对收到的网络请求消息根据对应的配置规则转换为符合第三方系统要求的网络请求消息。其中,网络响应消息和网络请求消息的协议转换方式的原理是相同的。
在一些示例中,协议转换模块用于接收通信设备发送的至少一个网络请求消息,所述网络请求消息表征用于与第三方系统建立通信连接的消息;从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;根据所述配置规则对所述网络请求消息进行通信协议转换;将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
内部存储模块1603,用于存储配置规则、第三方系统的sdk文件等数据。
会话保持模块1604,用于维持与第三方系统的会话,将第三方系统的token,session、cookies等信息存储起来,并在其失效前对其进行更新。
如图17所示,本实施例提供的一种通信协议转换系统的示例,包括终端1700、网关设备1701、第三方系统1702。其中,终端1700发送的网络请求消息首先经过网关设备1701中的编解码模块进行编解码处理得到路由信息,路由信息经过路由模块,从内部存储模块中确定对应的配置规则,基于该配置规则利用协议转换模块进行网络请求消息的协议转换,并且在整个协议转换的过程中,网关设备和多个第三方系统之间通过会话保持模块始终保持会话连接。
本实施例中的通信协议转换系统中的每个终端与第三方系统建立的通信连接都需要通过网关设备进行通信协议转换,通信协议转换的核心在于利用配置规则集合中包含的不同的第三方系统的配置规则进行协议转换,从而实现了通用性,并且由于只需要通过配置规则集合进行协议转换,即使存在新增、修改或删除的配置规则,只需将对配置规则集合进行更新,无需重启网关设备,避免各个第三方系统处于停运状态。另外,本实施例还可以支持上传自定义的sdk文件,能够解决第三方系统不公开数据加密或数字签名算法的场景。本公开实施例的方法由于体量小,能够部署在网关设备,节省硬件资源,并且不会对网关设备自身的性能产生影响。
基于相同的发明构思,本公开实施例还提供了一种网关设备,由于该设 备即是本公开实施例中的方法中的设备,并且该设备解决问题的原理与该方法相似,因此该设备的实施可以参见方法的实施,重复之处不再赘述。
如图18所示,该设备包括处理器1800和存储器1801,所述存储器1801用于存储所述处理器1800可执行的程序,所述处理器1800用于读取所述存储器1801中的程序并执行如下步骤:
接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
根据所述配置规则对所述网络请求消息进行通信协议转换;
将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
将所述网络请求消息直接发送给所述非第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则。
作为一种可选的实施方式,所述配置规则与所述路由信息一一对应;或,所述多个路由信息对应相同的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统;
从所述配置规则集合中确定与所述第三方系统对应的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
所述网络请求消息通过所述协议转换的进程进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述处理器被配置为执行:
所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
作为一种可选的实施方式,所述处理器还被配置为执行:
利用类加载器加载所述第三方系统的软件开发工具包sdk文件;
将所述加载后的sdk文件存储到所述配置规则集合中,其中所述sdk文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述处理器被配置为执行:
若所述配置规则中包含sdk文件,则利用所述sdk文件对所述网络请求消息进行数字签名和加密。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,所述处理器还被配置为执行:
接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
根据所述配置规则对所述网络响应消息进行通信协议转换;
将所述通信协议转换后的网络响应消息发送给所述通信设备。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
作为一种可选的实施方式,接收通信设备发送的用于与第三方系统建立通信连接的网络请求消息之后,所述处理器还被配置为执行:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
作为一种可选的实施方式,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,所述处理器还被配置为执行:
接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
作为一种可选的实施方式,所述处理器被配置为执行:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
接收所述第三方系统发送的有效的访问令牌。
作为一种可选的实施方式,所述处理器还被配置为执行:
通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
作为一种可选的实施方式,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,所述处理器还被配置为执行:
接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
按预设周期对所述配置规则集合进行更新。
作为一种可选的实施方式,所述处理器被配置为执行:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
作为一种可选的实施方式,所述处理器被配置为执行:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的 配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
作为一种可选的实施方式,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
基于相同的发明构思,本公开实施例还提供了一种通信协议转换设备,由于该设备即是本公开实施例中的方法中的设备,并且该设备解决问题的原理与该方法相似,因此该设备的实施可以参见方法的实施,重复之处不再赘述。
如图19所示,该设备包括处理器1900和存储器1901,所述存储器1901用于存储所述处理器1900可执行的程序,所述处理器1900用于读取所述存储器1901中的程序并执行如下步骤:
接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
根据所述配置规则对所述网络请求消息进行通信协议转换;
将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
将所述网络请求消息直接发送给所述非第三方系统。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第 三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
作为一种可选的实施方式,所述配置规则与所述路由信息一一对应;或,所述多个路由信息对应相同的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统;
从所述配置规则集合中确定与所述第三方系统对应的配置规则。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
所述网络请求消息通过所述协议转换的进程进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述处理器被配置为执行:
所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
作为一种可选的实施方式,所述处理器还被配置为执行:
利用类加载器加载所述第三方系统的软件开发工具包sdk文件;
将所述加载后的sdk文件存储到所述配置规则集合中,其中所述sdk文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述处理器被配置为执行:
若所述配置规则中包含sdk文件,则利用所述sdk文件对所述网络请求消息进行数字签名和加密。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,所述处理器还被配置为执行:
接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
根据所述配置规则对所述网络响应消息进行通信协议转换;
将所述通信协议转换后的网络响应消息发送给所述通信设备。
作为一种可选的实施方式,所述处理器被配置为执行:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
作为一种可选的实施方式,所述处理器被配置为执行:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
作为一种可选的实施方式,接收通信设备发送的用于与第三方系统建立通信连接的网络请求消息之后,所述处理器还被配置为执行:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
作为一种可选的实施方式,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,所述处理器还被配置为执行:
接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统 的探活接口,确定所述访问令牌的有效性。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述处理器还被配置为执行:
若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
作为一种可选的实施方式,所述处理器被配置为执行:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
接收所述第三方系统发送的有效的访问令牌。
作为一种可选的实施方式,所述处理器还被配置为执行:
通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
作为一种可选的实施方式,所述处理器还被配置为执行:
接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
作为一种可选的实施方式,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,所述处理器还被配置为执行:
接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
按预设周期对所述配置规则集合进行更新。
作为一种可选的实施方式,所述处理器被配置为执行:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
作为一种可选的实施方式,所述处理器还被配置为执行:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
作为一种可选的实施方式,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
基于相同的发明构思,本公开实施例还提供了一种通信协议转换装置,由于该装置即是本公开实施例中的方法中的装置,并且该装置解决问题的原理与该方法相似,因此该装置的实施可以参见方法的实施,重复之处不再赘述。
如图20所示,该装置包括:
接收消息单元2000,用于接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
确定规则单元2001,用于从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的 配置规则;
协议转换单元2002,用于根据所述配置规则对所述网络请求消息进行通信协议转换;
消息发送单元2003,用于将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
作为一种可选的实施方式,所述接收消息单元2000还用于:
接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
将所述网络请求消息直接发送给所述非第三方系统。
作为一种可选的实施方式,所述接收消息单元2000还用于:
接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
作为一种可选的实施方式,所述配置规则与所述路由信息一一对应;或,所述多个路由信息对应相同的配置规则。
作为一种可选的实施方式,所述确定规则单元具体用于:
根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则。
作为一种可选的实施方式,所述确定规则单元具体用于:
根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的第三方系统;
从所述配置规则集合中确定与所述第三方系统对应的配置规则。
作为一种可选的实施方式,所述协议转换单元具体用于:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
所述网络请求消息通过所述协议转换的进程进行通信协议转换。
作为一种可选的实施方式,所述协议转换单元具体还用于:
若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述协议转换单元具体还用于:
所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
作为一种可选的实施方式,还包括加载单元具体用于:
利用类加载器加载所述第三方系统的软件开发工具包sdk文件;
将所述加载后的sdk文件存储到所述配置规则集合中,其中所述sdk文件与所述第三方系统是一一对应的。
作为一种可选的实施方式,所述协议转换单元具体用于:
若所述配置规则中包含sdk文件,则利用所述sdk文件对所述网络请求消息进行数字签名和加密。
作为一种可选的实施方式,所述消息发送单元具体用于:
根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
作为一种可选的实施方式,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,所述消息发送单元具体还用于:
接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
根据所述配置规则对所述网络响应消息进行通信协议转换;
将所述通信协议转换后的网络响应消息发送给所述终端。
作为一种可选的实施方式,所述消息发送单元具体还用于:
将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
作为一种可选的实施方式,所述消息发送单元具体还用于:
根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的终端。
作为一种可选的实施方式,接收终端发送的用于与第三方系统建立通信连接的网络请求消息之后,还包括会话连接单元具体用于:
确定与所述网络请求消息对应的配置规则中的访问令牌信息;
根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
作为一种可选的实施方式,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,所述会话连接单元具体还用于:
接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,还包括显示单元具体用于:
若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
作为一种可选的实施方式,所述确定所述访问令牌的有效性之后,所述会话连接单元具体还用于:
若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
作为一种可选的实施方式,所述会话连接单元具体用于:
根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
接收所述第三方系统发送的有效的访问令牌。
作为一种可选的实施方式,还包括接收指令单元具体用于:
通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种 指令。
作为一种可选的实施方式,所述接收指令单元具体还用于:
接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
作为一种可选的实施方式,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,还包括更新单元具体用于:
接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
按预设周期对所述配置规则集合进行更新。
作为一种可选的实施方式,所述更新单元具体用于:
若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
作为一种可选的实施方式,所述更新单元具体用于:
若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
作为一种可选的实施方式,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息 配置规则、使用软件开发工具包文件的配置规则中的至少一种。
基于相同的发明构思,本公开实施例还提供了一种计算机存储介质,其上存储有计算机程序,该程序被处理器执行时实现如下步骤:
接收通信设备发送的至少一个网络请求消息,所述网络请求消息表征用于与第三方系统建立通信连接的消息;
从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
根据所述配置规则对所述网络请求消息进行通信协议转换;
将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
本领域内的技术人员应明白,本公开的实施例可提供为方法、系统、或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本公开是参照根据本公开实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管已描述了本公开的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本公开范围的所有变更和修改。
显然,本领域的技术人员可以对本公开实施例进行各种改动和变型而不脱离本公开实施例的精神和范围。这样,倘若本公开实施例的这些修改和变型属于本公开权利要求及其等同技术的范围之内,则本公开也意图包含这些改动和变型在内。

Claims (28)

  1. 一种通讯协议转换方法,其中,该方法包括:
    接收通信设备发送的至少一个用于与第三方系统建立通信连接的网络请求消息;
    从配置规则集合中确定与所述网络请求消息对应的配置规则,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则;
    根据所述配置规则对所述网络请求消息进行通信协议转换;
    将所述通信协议转换后的网络请求消息发送给对应的第三方系统。
  2. 根据权利要求1所述的方法,其中,还包括:
    接收通信设备发送的至少一个用于与非第三方系统建立通信连接的网络请求消息;
    将所述网络请求消息直接发送给所述非第三方系统。
  3. 根据权利要求1或2所述的方法,其中,还包括:
    接收通信设备发送的网络请求消息,确定所述网络请求消息为用于与第三方系统建立通信连接的网络请求消息,或者,确定所述网络请求消息为用于与非第三方系统建立通信连接的网络请求消息。
  4. 根据权利要求1所述的方法,其中,所述从配置规则集合中确定与所述网络请求消息对应的配置规则,包括:
    根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则。
  5. 根据权利要求4所述的方法,其中,所述配置规则与所述路由信息一一对应;或,所述多个路由信息对应相同的配置规则。
  6. 根据权利要求5所述的方法,其中,所述根据所述网络请求消息中携带的路由信息,从所述配置规则集合中确定与所述路由信息对应的配置规则,包括:
    根据所述网络请求消息中携带的路由信息,确定与所述路由信息对应的 第三方系统;
    从所述配置规则集合中确定与所述第三方系统对应的配置规则。
  7. 根据权利要求1所述的方法,其中,所述根据所述配置规则对所述网络请求消息进行通信协议转换,包括:
    将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
    所述网络请求消息通过所述协议转换的进程进行通信协议转换。
  8. 根据权利要求7所述的方法,其中,所述将所述配置规则中的协议转换规则,进行实例化处理,包括:
    若所述配置规则包括第三方系统的软件开发工具包文件,则利用类加载器加载所述第三方系统的软件开发工具包文件,得到执行所述软件开发工具包文件的进程,其中所述软件开发工具包文件与所述第三方系统是一一对应的。
  9. 根据权利要求8所述的方法,其中,所述网络请求消息通过所述协议转换的进程进行通信协议转换,包括:
    所述网络请求消息通过执行所述软件开发工具包文件的进程进行数字签名和加密。
  10. 根据权利要求1所述的方法,其中,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统,包括:
    根据所述网络请求消息中携带的路由信息,将所述通信协议转换后的网络请求消息发送给与所述路由信息对应的第三方系统。
  11. 根据权利要求1所述的方法,其中,所述将所述通信协议转换后的网络请求消息发送给对应的第三方系统之后,还包括:
    接收所述第三方系统发送的网络响应消息,从所述配置规则集合中确定所述第三方系统的配置规则;
    根据所述配置规则对所述网络响应消息进行通信协议转换;
    将所述通信协议转换后的网络响应消息发送给所述通信设备。
  12. 根据权利要求11所述的方法,其中,所述根据所述配置规则对所述网络响应消息进行通信协议转换,包括:
    将所述配置规则中的协议转换规则,进行实例化处理,得到执行协议转换的进程;
    通过所述协议转换的进程,对所述网络响应消息进行通信协议转换。
  13. 根据权利要求11所述的方法,其中,所述将所述通信协议转换后的网络响应消息发送给所述通信设备,包括:
    根据所述网络请求消息的源地址,将所述通信协议转换后的网络响应消息发送给位于所述源地址的通信设备。
  14. 根据权利要求1所述的方法,其中,接收终端发送的用于与第三方系统建立通信连接的网络请求消息之后,还包括:
    确定与所述网络请求消息对应的配置规则中的访问令牌信息;
    根据所述访问令牌信息,周期向所述第三方系统发送用于保持会话连接的连接请求消息。
  15. 根据权利要求14所述的方法,其中,所述周期向所述第三方系统发送用于保持会话连接的连接请求消息之后,还包括:
    接收所述第三方系统发送的访问令牌,按预设周期访问所述第三方系统的探活接口,确定所述访问令牌的有效性。
  16. 根据权利要求15所述的方法,其中,所述确定所述访问令牌的有效性之后,还包括:
    若确定所述访问令牌失效,则通过显示界面提示用户所述第三方系统的访问令牌无效。
  17. 根据权利要求15所述的方法,其中,所述确定所述访问令牌的有效性之后,还包括:
    若所述访问令牌失效,则重新获取所述第三方系统的有效的访问令牌,利用所述有效的访问令牌对所述配置规则中所述第三方系统的访问令牌进行更新。
  18. 根据权利要求17所述的方法,其中,所述重新获取所述第三方系统的有效的访问令牌,包括:
    根据与所述网络请求消息对应的配置规则中的访问令牌信息,重新向所述第三方系统发送用于保持会话连接的连接请求消息;
    接收所述第三方系统发送的有效的访问令牌。
  19. 根据权利要求1所述的方法,其中,还包括:
    通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令。
  20. 根据权利要求19所述的方法,其中,还包括:
    接收用户在显示界面对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作;或,
    接收用户在显示界面的弹窗中对配置规则进行触控操作、语音控制操作中的至少一种指令,触发对所述配置规则执行与所述指令对应的操作。
  21. 根据权利要求19所述的方法,其中,所述通过显示界面接收用户对配置规则进行删除、修改、添加中的至少一种指令之后,还包括:
    接收用户通过所述显示界面触发的数据库同步指令,对所述配置规则集合进行更新;或,
    按预设周期对所述配置规则集合进行更新。
  22. 根据权利要求21所述的方法,其中,所述对所述配置规则集合进行更新,包括:
    若通过监听进程监听到所述配置规则集合中配置规则的改变,则通知更新进程对所述配置规则集合进行更新;或,
    将所述配置规则集合存放到消息队列中并监听所述消息队列的内容,若监听到所述配置规则集合中配置规则的改变,则对所述消息队列的内容进行对应的更新。
  23. 根据权利要求20所述的方法,其中,所述对所述配置规则集合进行更新,包括:
    若确定存在新增的配置规则,则根据所述新增的配置规则对所述配置规则集合进行更新;或,
    若确定对所述配置规则集合中的配置规则进行删除,则根据所述删除的配置规则对所述配置规则集合进行更新;或,
    若确定对所述配置规则集合中的配置规则进行修改,则根据所述修改的配置规则对所述配置规则集合进行更新。
  24. 根据权利要求1~2、4~23任一所述的方法,其中,所述配置规则包括路由规则;编码解码规则;协议转换规则中的至少一种;
    其中所述协议转换规则包括:令牌配置规则、数字签名配置规则、消息配置规则、使用软件开发工具包文件的配置规则中的至少一种。
  25. 一种通信协议转换系统,其中,包括至少一个通信设备、网关设备、多个第三方系统,其中:
    所述通信设备用于发送与所述第三方系统建立通信连接的网络请求消息;
    所述网关设备用于接收所述网络请求消息,从配置规则集合中确定与所述网络请求消息对应的配置规则,根据所述配置规则对所述网络请求消息进行通信协议转换,将所述通信协议转换后的网络请求消息发送给对应的第三方系统,其中所述配置规则集合包括不同的第三方系统的通信协议的配置规则。
  26. 一种网关设备,其中,该网关设备包括处理器和存储器,所述存储器用于存储所述处理器可执行的程序,所述处理器用于读取所述存储器中的程序并执行权利要求1~24任一所述方法的步骤。
  27. 一种通信协议转换设备,其中,该设备包括处理器和存储器,所述存储器用于存储所述处理器可执行的程序,所述处理器用于读取所述存储器中的程序并执行权利要求1~24任一所述方法的步骤。
  28. 一种计算机存储介质,其上存储有计算机程序,其中,该程序被处理器执行时实现如权利要求1~24任一所述方法的步骤。
PCT/CN2022/108151 2021-08-04 2022-07-27 一种通讯协议转换方法、设备、系统及网关设备 WO2023011274A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP22851988.0A EP4340333A4 (en) 2021-08-04 2022-07-27 COMMUNICATION PROTOCOL CONVERSION METHOD AND APPARATUS, SYSTEM AND GATEWAY DEVICE
US18/576,634 US20240214472A1 (en) 2021-08-04 2022-07-27 Communication protocol conversion method, and device, system, and gateway device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110893155.2A CN113556359B (zh) 2021-08-04 2021-08-04 一种通讯协议转换方法、设备、系统及网关设备
CN202110893155.2 2021-08-04

Publications (1)

Publication Number Publication Date
WO2023011274A1 true WO2023011274A1 (zh) 2023-02-09

Family

ID=78134126

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/108151 WO2023011274A1 (zh) 2021-08-04 2022-07-27 一种通讯协议转换方法、设备、系统及网关设备

Country Status (4)

Country Link
US (1) US20240214472A1 (zh)
EP (1) EP4340333A4 (zh)
CN (1) CN113556359B (zh)
WO (1) WO2023011274A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115834726A (zh) * 2023-02-20 2023-03-21 广州汇通国信科技有限公司 协议转换方法、数据传输方法、装置、网关及存储介质
CN116860353A (zh) * 2023-06-30 2023-10-10 北京百度网讯科技有限公司 数据处理方法、装置、电子设备以及存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172929B (zh) * 2021-10-28 2024-06-04 深圳市信锐网科技术有限公司 通信方法、装置以及网关
CN115442913A (zh) * 2022-08-15 2022-12-06 浙江猫精人工智能科技有限公司 协议接入方法、通信方法、开发设备、网关及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141601A (zh) * 2015-08-17 2015-12-09 北京佰才邦技术有限公司 物联网协议转换功能的配置方法和装置
CN105516185A (zh) * 2015-12-30 2016-04-20 广东顺德中山大学卡内基梅隆大学国际联合研究院 一种多协议网关设备
CN106899461A (zh) * 2015-12-18 2017-06-27 美的集团股份有限公司 家庭网关和用于其的数据通信方法、智能家居系统
US20210021695A1 (en) * 2019-07-19 2021-01-21 Virtual Peaker, Inc. System and method for remote execution of real time control (rtc) hardware

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10264089B2 (en) * 2014-12-31 2019-04-16 Verizon Patent And Licensing Inc. Rule configuration framework for communication protocols
CN111193695B (zh) * 2019-07-26 2021-07-06 腾讯科技(深圳)有限公司 一种第三方账号登录的加密方法、装置及存储介质
CN110971614A (zh) * 2019-12-17 2020-04-07 软通动力信息技术(集团)有限公司 物联网适配方法、系统、计算机设备及存储介质
CN112511416A (zh) * 2020-11-23 2021-03-16 四川长虹电器股份有限公司 基于规则式的数据通信协议转换系统、解码及编码方法
CN113206836A (zh) * 2021-04-12 2021-08-03 河海大学 一种工业互联网中api网关实现协议转换的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141601A (zh) * 2015-08-17 2015-12-09 北京佰才邦技术有限公司 物联网协议转换功能的配置方法和装置
CN106899461A (zh) * 2015-12-18 2017-06-27 美的集团股份有限公司 家庭网关和用于其的数据通信方法、智能家居系统
CN105516185A (zh) * 2015-12-30 2016-04-20 广东顺德中山大学卡内基梅隆大学国际联合研究院 一种多协议网关设备
US20210021695A1 (en) * 2019-07-19 2021-01-21 Virtual Peaker, Inc. System and method for remote execution of real time control (rtc) hardware

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4340333A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115834726A (zh) * 2023-02-20 2023-03-21 广州汇通国信科技有限公司 协议转换方法、数据传输方法、装置、网关及存储介质
CN115834726B (zh) * 2023-02-20 2023-07-21 广州汇通国信科技有限公司 协议转换方法、数据传输方法、装置、网关及存储介质
CN116860353A (zh) * 2023-06-30 2023-10-10 北京百度网讯科技有限公司 数据处理方法、装置、电子设备以及存储介质

Also Published As

Publication number Publication date
EP4340333A1 (en) 2024-03-20
CN113556359A (zh) 2021-10-26
CN113556359B (zh) 2023-06-23
EP4340333A4 (en) 2024-05-01
US20240214472A1 (en) 2024-06-27

Similar Documents

Publication Publication Date Title
WO2023011274A1 (zh) 一种通讯协议转换方法、设备、系统及网关设备
US10623476B2 (en) Endpoint management system providing an application programming interface proxy service
US11936724B2 (en) Configuring service mesh networking resources for dynamically discovered peers or network functions
US10693952B2 (en) Technologies for low latency messaging
CN110311983B (zh) 服务请求的处理方法、装置、系统、电子设备及存储介质
CN111290865A (zh) 一种服务调用方法、装置、电子设备和存储介质
WO2021073202A1 (zh) 智能合约处理方法、计算机设备及存储介质
CN111309374A (zh) 一种微服务系统和微服务系统中的服务调用方法
US11323546B2 (en) Executing remote commands
CN111045833B (zh) 接口调用的方法和装置
CN108376078A (zh) 设备的升级方法、装置以及家电设备
CN111984561B (zh) 一种bmc的ipmi命令处理方法、系统、设备以及介质
CN110795741B (zh) 对数据进行安全性处理的方法和装置
CN111064626A (zh) 配置更新方法、装置、服务器及可读存储介质
CN111782254A (zh) 用于升级对象的方法、装置、设备以及存储介质
CN113254050A (zh) 一种微前端系统
CN100505711C (zh) 管理组件应用程序的通信的系统和方法
CN113595927A (zh) 一种旁路模式下镜像流量的处理方法和装置
CN114338682B (zh) 流量身份标识传递方法、装置、电子设备及存储介质
WO2024103943A1 (zh) 一种业务处理方法、装置、存储介质及设备
CN112953719B (zh) 一种令牌认证方法和装置
JP2005228183A (ja) プログラム実行方法、および、プログラム実行のための計算機システム
CN115080274A (zh) 业务处理方法、装置和系统、以及接口映射系统
CN114363408A (zh) 信息推送方法、装置、计算机可读介质及计算机设备
CN113742617A (zh) 一种缓存更新的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22851988

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022851988

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022851988

Country of ref document: EP

Effective date: 20231215

WWE Wipo information: entry into national phase

Ref document number: 18576634

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE