[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115495783B - Method and system for solving configuration type data service exposure - Google Patents

Method and system for solving configuration type data service exposure Download PDF

Info

Publication number
CN115495783B
CN115495783B CN202211140494.4A CN202211140494A CN115495783B CN 115495783 B CN115495783 B CN 115495783B CN 202211140494 A CN202211140494 A CN 202211140494A CN 115495783 B CN115495783 B CN 115495783B
Authority
CN
China
Prior art keywords
data
terminal
downstream system
downstream
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211140494.4A
Other languages
Chinese (zh)
Other versions
CN115495783A (en
Inventor
金震
张京日
徐伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SunwayWorld Science and Technology Co Ltd
Original Assignee
Beijing SunwayWorld Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SunwayWorld Science and Technology Co Ltd filed Critical Beijing SunwayWorld Science and Technology Co Ltd
Priority to CN202211140494.4A priority Critical patent/CN115495783B/en
Publication of CN115495783A publication Critical patent/CN115495783A/en
Application granted granted Critical
Publication of CN115495783B publication Critical patent/CN115495783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a configurable data service exposure solving method and a system, wherein the method comprises the following steps: receiving a data calling request sent by a downstream system, analyzing the data calling request to determine key fields of data to be called of each downstream system, calling related data from a data management terminal based on the key fields and publishing the data to a docking platform to generate resource subscription tasks of each downstream system, subscribing and approving the downstream system based on the resource subscription tasks, and after approval, carrying out data calling service on each downstream system according to authentication information of each downstream system, wherein the resource subscription tasks are generated for each downstream system to enable the downstream system to obtain own expected service uniquely, so that exposure of data on the platform is avoided, and data privacy and safety are improved.

Description

Method and system for solving configuration type data service exposure
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and a system for exposing a configured data service.
Background
Data interaction is an unavoidable behavior among multiple systems, and when a data service is exposed to other systems, both the security and the applicability of the data need to be considered. At present, because developers of the systems in an enterprise and between internal and external systems in the enterprise are different, or the systems operate on heterogeneous platforms, when the different systems are in butt joint, a set of commonly accepted data transmission rules are defined among the systems, a sender develops a specific data processing program to send data to a receiver in the form of a structured message, after the other party processes the data, the data is returned to the other party in the form of the structured message, and the limitation of data transmission between client systems by the method can enable the data of each system to be received and utilized by other systems, so that the complementary working efficiency among the systems is improved, but the method has the following problems: because the receiver system of the customized data transfer rule is not limited, the system of the same type as the receiver system can also use the data transfer rule to obtain the transferred data, so that the data is exposed on the platform, and the security and privacy of the data are seriously affected.
Disclosure of Invention
In view of the above-mentioned problems, the present invention provides a method and a system for exposing data services, which are configured to solve the problems that the receiver system of the customized data transmission rule mentioned in the background art is not limited, so that the system of the same type as the receiver system can also use the data transmission rule to obtain the transmitted data, so that the data is exposed on the platform, and the security and privacy of the data are seriously affected.
A configurable data service exposure solution comprising the steps of:
receiving a data calling request sent by a downstream system;
analyzing the data calling request to determine key fields of data to be called of each downstream system;
invoking related data from the data management terminal based on the key field and publishing the related data to the docking platform so as to generate a resource subscription task of each downstream system;
and subscribing and approving the authority of each downstream system based on the resource subscription task, and performing data retrieval service for each downstream system according to the authentication information of each downstream system after the approval is passed.
Preferably, the receiving the data call request sent by the downstream system includes:
determining a terminal identifier of each downstream system corresponding to a first terminal, and acquiring identity token information of each first terminal based on the terminal identifier;
carrying out identity qualification verification on each first terminal according to the identity token information of the first terminal, and screening out second terminals qualified in verification according to verification results;
acquiring associated configuration data of each second terminal in the data management terminal, and screening a third terminal with data access authority from a plurality of second terminals based on the associated configuration data;
and detecting the first session request of each third terminal and analyzing whether the first session request contains a data calling instruction, and if so, confirming the first session request as the data calling request sent by the target downstream system corresponding to the third terminal.
Preferably, before parsing the data call request to determine key fields of data to be called for by each downstream system, the method further includes:
determining applicable condition programs of the data of each type according to the functional characteristics and the service and the operation parameters of the data of the type in the data management terminal;
detecting configuration parameters of each third terminal, and determining system operation parameters of a target downstream system corresponding to each third terminal according to the configuration parameters of each third terminal;
evaluating the compatibility degree of the current applicable condition program of the target to-be-called data of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal;
and confirming whether the compatibility is greater than or equal to a preset threshold, if so, not needing to carry out subsequent operation, otherwise, sending a prompt that the data to be called is not applicable to a target third terminal of which the compatibility is smaller than the preset threshold.
Preferably, the parsing the data call request to determine key fields of data to be called of each downstream system includes:
analyzing the data calling request to obtain a plurality of keywords, and constructing a keyword dynamic association matrix corresponding to the data calling request according to the association of every two keywords;
invoking a plurality of common association data of a plurality of keywords in the data management terminal;
determining the association weight of each first keyword and other second keywords based on the keyword dynamic association matrix, and determining data to be called in a plurality of pieces of common association data according to the association weight;
and determining that the data to be called corresponds to a preset request return field, and determining the preset request return field as a key field of the data to be called.
Preferably, the step of retrieving relevant data from the data management terminal based on the key field and publishing the relevant data to the docking platform to generate a resource subscription task of each downstream system includes:
determining the attribution service according to the key field;
establishing network connection between the data management terminal and the docking platform, respectively uploading attribution services corresponding to data calling requests sent by each downstream system to the docking platform, and constructing task bars corresponding to each related data;
importing a data calling request sent by each downstream system into a task bar corresponding to related data;
and acquiring a platform work account number of each downstream system, and associating the platform work account number of each downstream system with a task bar of the downstream system to generate a resource subscription task of the downstream system.
Preferably, the subscribing and authority approval are performed on each downstream system based on the resource subscription task, and after approval, data retrieval service is performed on each downstream system according to authentication information of each downstream system, including:
detecting the subscription condition of each downstream system for the corresponding resource subscription task;
determining the subscription state of each downstream system for the corresponding resource subscription task according to the subscription condition;
determining a subscribed first downstream system and an unsubscribed second downstream system according to the subscription state;
and carrying out authority approval on the first downstream systems, acquiring authentication information of each first downstream system after approval is passed, and carrying out data retrieval service for the first downstream systems according to the authentication information.
Preferably, the acquiring the association configuration data of each second terminal in the data management terminal, and screening the third terminal with the data access authority from the plurality of second terminals based on the association configuration data includes:
acquiring terminal parameters of each second terminal;
acquiring associated configuration data of each second terminal in the data management terminal according to terminal parameters of the second terminal;
acquiring authorization characteristic information of each second terminal according to the associated configuration data of the second terminal;
and determining a plurality of authority characteristics of each second terminal based on the authorization characteristic information of the second terminal, and screening out a third terminal with data retrieval related authority characteristics in the authority characteristics.
Preferably, the evaluating the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal includes:
determining the running environment parameters of the current applicable condition program of the target data to be called of each third terminal;
determining a jumping environment factor according to the running environment parameters of the current applicable condition program of the target to-be-called data of each third terminal;
constructing an interference scene of the current applicable condition program according to the change interval of each jumping environment factor and the running influence of the jumping environment factor on the current applicable condition program;
constructing an interference model of a current applicable condition program based on scene parameters of the interference scene;
determining random response data of system operation parameters of a target downstream system corresponding to each third terminal under an interference model of a current applicable condition program of the third terminal;
and determining the compatibility degree of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the distribution condition of the random response data.
Preferably, the determining, according to the distribution condition of the random response data, compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal includes:
determining the response variation amplitude of each system operation parameter of each third terminal according to the distribution condition of the random response data;
selecting target item system operation parameters with response variation amplitude larger than or equal to preset amplitude;
confirming the operation coverage rate of the operation parameters of the target item system for the target downstream system corresponding to each third terminal;
and determining the compatibility degree of the current applicable condition program of the target to-be-called data of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the operation coverage rate of the target item system operation parameters to the target downstream system corresponding to each third terminal.
A configurable data service exposure resolution system, the system comprising:
the receiving module is used for receiving a data calling request sent by a downstream system;
the analysis module is used for analyzing the data calling request to determine key fields of data to be called of each downstream system;
the generation module is used for calling related data from the data management terminal based on the key field and publishing the related data to the docking platform so as to generate a resource subscription task of each downstream system;
and the approval module is used for carrying out subscription and authority approval on each downstream system based on the resource subscription task, and carrying out data retrieval service on each downstream system according to the authentication information of each downstream system after approval.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and drawings.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention.
FIG. 1 is a flow chart of a configurable data service exposure solution provided by the present invention;
FIG. 2 is another workflow diagram of a configurable data service exposure solution provided by the present invention;
FIG. 3 is a further workflow diagram of a configurable data service exposure solution provided by the present invention;
FIG. 4 is a diagram illustrating an exemplary embodiment of a configurable data service exposure solution provided by the present invention;
fig. 5 is a schematic structural diagram of a configurable data service exposure solution system according to the present invention.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Data interaction is an unavoidable behavior among multiple systems, and when a data service is exposed to other systems, both the security and the applicability of the data need to be considered. At present, because developers of the systems in an enterprise and between internal and external systems in the enterprise are different, or the systems operate on heterogeneous platforms, when the different systems are in butt joint, a set of commonly accepted data transmission rules are defined among the systems, a sender develops a specific data processing program to send data to a receiver in the form of a structured message, after the other party processes the data, the data is returned to the other party in the form of the structured message, and the limitation of data transmission between client systems by the method can enable the data of each system to be received and utilized by other systems, so that the complementary working efficiency among the systems is improved, but the method has the following problems: because the receiver system of the customized data transfer rule is not limited, the system of the same type as the receiver system can also use the data transfer rule to obtain the transferred data, so that the data is exposed on the platform, and the security and privacy of the data are seriously affected. In order to solve the above-mentioned problems, the present embodiment discloses a configurable data service exposure solution.
A configurable data service exposure solution, as shown in fig. 1, comprising the steps of:
step S101, receiving a data calling request sent by a downstream system;
step S102, analyzing the data calling request to determine key fields of data to be called of each downstream system;
step S103, relevant data are called from the data management terminal based on the key fields and are published on the docking platform so as to generate a resource subscription task of each downstream system;
and step S104, carrying out subscription and authority approval on each downstream system based on the resource subscription task, and carrying out data retrieval service on each downstream system according to the authentication information of each downstream system after approval.
The working principle of the technical scheme is as follows: receiving a data calling request sent by a downstream system, analyzing the data calling request to determine key fields of data to be called of each downstream system, calling related data from a data management terminal based on the key fields, publishing the data to a docking platform to generate a resource subscription task of each downstream system, subscribing and approving the downstream system based on the resource subscription task, and carrying out data calling service on each downstream system according to authentication information of each downstream system after approval.
The beneficial effects of the technical scheme are as follows: the key field of the data to be called of each downstream system is determined, the safety of the data to be called can be effectively ensured, meanwhile, the expected service of each downstream system can be accurately determined, the practicability is improved, meanwhile, the safety of the data is also improved, further, the resource subscription task can be generated for each downstream system, the resource subscription task can be used for obtaining the expected service of the system, the exposure condition of the data on a platform is avoided, the data privacy and safety are improved, further, the identity authority safety of each downstream system and the subscription condition of the called data can be effectively verified through subscription and authority approval of the downstream system, the practicability and the stability are further improved, and the problems that the system of a receiver of a customized data transmission rule in the prior art is not limited, the data transmission rule can be used for obtaining the transferred data with the system of the receiver system, the data is exposed on the platform, and the safety and the privacy of the data are seriously influenced are solved.
In this embodiment, after generating the resource subscription task of each downstream system, the method further includes:
determining the processing resource demand of each resource subscription task for a corresponding downstream system according to the task parameters of the resource subscription task;
detecting a first running process of each downstream system and a first running process of each first running process;
estimating the first resource occupation amount of each first running process according to the first running process of the first running process;
calculating a lead index of the system resource utilization state of each downstream system according to the parameters:
Figure BDA0003853361890000081
wherein mu i A leading index, p, expressed as the system resource utilization status of the ith downstream system i Expressed as a total index of the system resource utilization state of the ith downstream system, ni is expressed as the number of first running processes of the ith downstream system, j is expressed as the jth first running process, f 1 () Expressed as a preset system resource utilization state occupation index calculation function, F 1j Expressed as the resource occupancy, θ, of the jth first running process j Resource service rate, F, expressed as the jth first running process 2i Expressed as the total system resources of the ith downstream system, G i A service response frequency denoted as i-th downstream system;
determining the tightening state of the system resources of each downstream system according to the leading index of the utilization state of the system resources of the downstream system;
determining whether the downstream system meets the processing requirement of the corresponding resource subscription task based on the tightening state of the system resource of each downstream system and the processing resource requirement of the resource subscription task corresponding to the downstream system, if so, not carrying out subsequent operation, otherwise, carrying out resource optimization on the current downstream system which does not meet the processing requirement, wherein the method specifically comprises the following steps:
acquiring a balance operation index of each second operation process of each current downstream system;
calculating the maximum resource release amount of each current downstream system according to the balance operation index of each second operation process of each current downstream system and the second resource occupation amount of the second operation process:
Figure BDA0003853361890000091
wherein D is m max Expressed as the maximum resource release of the mth current downstream system, bm expressed as the number of second running processes of the mth current downstream system, k expressed as the kth second running process, I k A second resource occupation amount denoted as kth second running process, f 2 () Represented as an adaptive resource release function, p k1 Current running index, p, expressed as kth second running process k2 Balance operation index, beta, expressed as kth second operation progress m A performance index expressed as the mth current downstream system;
and releasing system resources of each current downstream system according to the maximum resource release amount of the current downstream system until the current downstream system meets the processing requirements of the resource subscription tasks corresponding to the current downstream system.
The beneficial effects of the technical scheme are as follows: by calculating the leading index of the system resource utilization state of each downstream system, whether the system resource utilization of the downstream system is tight or not can be rapidly estimated, and further whether the downstream system has the capability of processing the corresponding resource subscription task or not can be rapidly estimated so as to perform subsequent self-adaptive processing, so that the practicability and the stability are improved.
In one embodiment, as shown in fig. 2, the receiving the data call request sent by the downstream system includes:
step S201, determining a terminal identifier of each downstream system corresponding to a first terminal, and acquiring identity token information of each first terminal based on the terminal identifier;
step S202, carrying out identity qualification verification on each first terminal according to the identity token information of the first terminal, and screening out second terminals qualified in verification according to verification results;
step S203, obtaining the associated configuration data of each second terminal in the data management terminal, and screening a third terminal with data access authority from a plurality of second terminals based on the associated configuration data;
step S204, detecting the first session request of each third terminal and analyzing whether the first session request contains a data calling instruction, if yes, confirming the first session request as the data calling request sent by the target downstream system corresponding to the third terminal.
The beneficial effects of the technical scheme are as follows: the third terminal which meets the data calling conditions can accurately acquire the data calling request sent by the downstream system by screening the terminal in the mode of identity verification and authority verification, so that the number of dialog processing is reduced, and the data calling request acquisition efficiency and accuracy are improved.
In one embodiment, before parsing the data call request to determine key fields of data to be called for by each downstream system, the method further comprises:
determining applicable condition programs of the data of each type according to the functional characteristics and the service and the operation parameters of the data of the type in the data management terminal;
detecting configuration parameters of each third terminal, and determining system operation parameters of a target downstream system corresponding to each third terminal according to the configuration parameters of each third terminal;
evaluating the compatibility degree of the current applicable condition program of the target to-be-called data of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal;
and confirming whether the compatibility is greater than or equal to a preset threshold, if so, not needing to carry out subsequent operation, otherwise, sending a prompt that the data to be called is not applicable to a target third terminal of which the compatibility is smaller than the preset threshold.
The beneficial effects of the technical scheme are as follows: the effective utilization rate of the downstream system to the data to be called can be effectively evaluated by evaluating the compatibility of the data to be called of each downstream system and the downstream system, so that the data calling personnel can timely adjust and withdraw the data to be called, and the practicability is further improved.
In one embodiment, as shown in fig. 3, the parsing the data call request to determine key fields of the data to be called of each downstream system includes:
step S301, analyzing the data calling request to obtain a plurality of keywords, and constructing a keyword dynamic association matrix corresponding to the data calling request according to the association of every two keywords;
step S302, a plurality of common association data of a plurality of keywords are called in the data management terminal;
step S303, determining the association weight of each first keyword and other second keywords based on the keyword dynamic association matrix, and determining data to be extracted from a plurality of common association data according to the association weight;
step S304, determining that the data to be called corresponds to a preset request return field, and confirming the preset request return field as a key field of the data to be called.
The beneficial effects of the technical scheme are as follows: the data to be called can be rapidly screened from the database according to the association weight relation of each keyword by constructing the keyword dynamic association matrix corresponding to the data call request, so that the data screening efficiency is improved, the occurrence of inaccurate data screening conditions caused by data screening aiming at a single keyword is avoided, and the stability and the practicability are further improved.
In one embodiment, the step of retrieving relevant data from the data management terminal based on the key field and publishing the relevant data to the docking platform to generate a resource subscription task of each downstream system includes:
determining the attribution service according to the key field;
establishing network connection between the data management terminal and the docking platform, respectively uploading attribution services corresponding to data calling requests sent by each downstream system to the docking platform, and constructing task bars corresponding to each related data;
importing a data calling request sent by each downstream system into a task bar corresponding to related data;
and acquiring a platform work account number of each downstream system, and associating the platform work account number of each downstream system with a task bar of the downstream system to generate a resource subscription task of the downstream system.
The beneficial effects of the technical scheme are as follows: the task bar is constructed, so that expected service of each downstream system can be stably stored, dedicated resource subscription tasks can be customized for platform accounts of each downstream system, task screening of each downstream system is not needed, and the working efficiency and the practicability are improved.
In one embodiment, the subscribing and authority approval are performed on each downstream system based on the resource subscription task, and after approval, data retrieval service is performed on each downstream system according to authentication information of each downstream system, including:
detecting the subscription condition of each downstream system for the corresponding resource subscription task;
determining the subscription state of each downstream system for the corresponding resource subscription task according to the subscription condition;
determining a subscribed first downstream system and an unsubscribed second downstream system according to the subscription state;
and carrying out authority approval on the first downstream systems, acquiring authentication information of each first downstream system after approval is passed, and carrying out data retrieval service for the first downstream systems according to the authentication information.
The beneficial effects of the technical scheme are as follows: the expected service of the downstream system can be stably transmitted to each downstream system, so that the stability is further improved, and the safety and privacy of the data can be further ensured by examining and approving the downstream system.
In one embodiment, the acquiring the association configuration data of each second terminal in the data management terminal, and screening the third terminal with the data access authority from the plurality of second terminals based on the association configuration data includes:
acquiring terminal parameters of each second terminal;
acquiring associated configuration data of each second terminal in the data management terminal according to terminal parameters of the second terminal;
acquiring authorization characteristic information of each second terminal according to the associated configuration data of the second terminal;
and determining a plurality of authority characteristics of each second terminal based on the authorization characteristic information of the second terminal, and screening out a third terminal with data retrieval related authority characteristics in the authority characteristics.
The beneficial effects of the technical scheme are as follows: the authorization right information of each second terminal can be comprehensively known by acquiring the authorization characteristic information of each second terminal in the data management terminal, so that whether the data access right exists or not can be rapidly determined, and the screening efficiency and the screening precision are improved.
In one embodiment, the evaluating the compatibility of the current applicable condition program of the target to-be-fetched data of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal includes:
determining the running environment parameters of the current applicable condition program of the target data to be called of each third terminal;
determining a jumping environment factor according to the running environment parameters of the current applicable condition program of the target to-be-called data of each third terminal;
constructing an interference scene of the current applicable condition program according to the change interval of each jumping environment factor and the running influence of the jumping environment factor on the current applicable condition program;
constructing an interference model of a current applicable condition program based on scene parameters of the interference scene;
determining random response data of system operation parameters of a target downstream system corresponding to each third terminal under an interference model of a current applicable condition program of the third terminal;
and determining the compatibility degree of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the distribution condition of the random response data.
The beneficial effects of the technical scheme are as follows: by constructing the interference model of the current applicable condition program of each third terminal to evaluate the response condition of the system operation parameters and further evaluate the compatibility, the compatibility between the system and the program can be rapidly determined by taking the interference factor of each condition program as an evaluation condition, and compared with the condition that the compatibility factor of the condition program is taken as the evaluation condition, the compatibility between the system and the program is evaluated more rapidly and accurately, and the practicability is further improved.
In one embodiment, the determining, according to the distribution condition of the random response data, compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameter of the target downstream system corresponding to the third terminal includes:
determining the response variation amplitude of each system operation parameter of each third terminal according to the distribution condition of the random response data;
selecting target item system operation parameters with response variation amplitude larger than or equal to preset amplitude;
confirming the operation coverage rate of the operation parameters of the target item system for the target downstream system corresponding to each third terminal;
and determining the compatibility degree of the current applicable condition program of the target to-be-called data of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the operation coverage rate of the target item system operation parameters to the target downstream system corresponding to each third terminal.
The beneficial effects of the technical scheme are as follows: the compatibility between the system and the program is evaluated by screening out the target item system operation parameters with large response variation amplitude and further determining the operation coverage rate, whether the system matches the program and the operation of the carrying program can be reasonably evaluated according to the operation occupation proportion of the target item system operation parameters in the system, and the rationality and objectivity of the evaluation result are improved.
In one embodiment, as shown in FIG. 4, includes:
the management side defines the return field and the authority verification information of the data service in a commodity creation mode, and provides the data service for the downstream system to subscribe after being released. After the downstream system subscribes and approves, corresponding data are acquired through calling the data service.
Through the technical scheme, the data needed to be used by the downstream system is reasonably and safely released into service commodities by means of field management and control, authority verification and flow limitation, and after the downstream system subscribes, the service can be called by an approver, so that the safety and applicability problems of data exposure are effectively solved.
The embodiment also discloses a configurable data service exposure solution system, as shown in fig. 5, which includes:
a receiving module 501, configured to receive a data call request sent by a downstream system;
the parsing module 502 is configured to parse the data call request to determine key fields of data to be called of each downstream system;
a generating module 503, configured to invoke relevant data from the data management terminal based on the key field and issue the relevant data to the docking platform to generate a resource subscription task of each downstream system;
and the approval module 504 is configured to perform subscription and authority approval on each downstream system based on the resource subscription task, and perform data retrieval service on each downstream system according to the authentication information of each downstream system after approval.
The working principle and the beneficial effects of the above technical solution are described in the method claims, and are not repeated here.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (9)

1. A configurable data service exposure solution comprising the steps of:
receiving a data calling request sent by a downstream system;
analyzing the data calling request to determine key fields of data to be called of each downstream system;
invoking related data from the data management terminal based on the key field and publishing the related data to the docking platform so as to generate a resource subscription task of each downstream system;
subscribing and approving the authority of each downstream system based on the resource subscription task, and performing data retrieval service for each downstream system according to the authentication information of each downstream system after the approval;
the subscribing and authority approval are carried out on each downstream system based on the resource subscribing task, and after approval, data calling service is carried out on each downstream system according to authentication information of each downstream system, and the method comprises the following steps:
detecting the subscription condition of each downstream system for the corresponding resource subscription task;
determining the subscription state of each downstream system for the corresponding resource subscription task according to the subscription condition;
determining a subscribed first downstream system and an unsubscribed second downstream system according to the subscription state;
and carrying out authority approval on the first downstream systems, acquiring authentication information of each first downstream system after approval is passed, and carrying out data retrieval service for the first downstream systems according to the authentication information.
2. The configurable data service exposure solution of claim 1, wherein said receiving a data call request from a downstream system comprises:
determining a terminal identifier of each downstream system corresponding to a first terminal, and acquiring identity token information of each first terminal based on the terminal identifier;
carrying out identity qualification verification on each first terminal according to the identity token information of the first terminal, and screening out second terminals qualified in verification according to verification results;
acquiring associated configuration data of each second terminal in the data management terminal, and screening a third terminal with data access authority from a plurality of second terminals based on the associated configuration data;
and detecting the first session request of each third terminal and analyzing whether the first session request contains a data calling instruction, and if so, confirming the first session request as the data calling request sent by the target downstream system corresponding to the third terminal.
3. The configurable data service exposure solution of claim 2, wherein prior to parsing the data call request to determine key fields of data to be called for by each downstream system, the method further comprises:
determining applicable condition programs of the data of each type according to the functional characteristics and the service and the operation parameters of the data of the type in the data management terminal;
detecting configuration parameters of each third terminal, and determining system operation parameters of a target downstream system corresponding to each third terminal according to the configuration parameters of each third terminal;
evaluating the compatibility degree of the current applicable condition program of the target to-be-called data of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal;
and confirming whether the compatibility is greater than or equal to a preset threshold, if so, not needing to carry out subsequent operation, otherwise, sending a prompt that the data to be called is not applicable to a target third terminal of which the compatibility is smaller than the preset threshold.
4. The configurable data service exposure solution of claim 1, wherein said parsing the data call request to determine key fields of data to be called for each downstream system comprises:
analyzing the data calling request to obtain a plurality of keywords, and constructing a keyword dynamic association matrix corresponding to the data calling request according to the association of every two keywords;
invoking a plurality of common association data of a plurality of keywords in the data management terminal;
determining the association weight of each first keyword and other second keywords based on the keyword dynamic association matrix, and determining data to be called in a plurality of pieces of common association data according to the association weight;
and determining that the data to be called corresponds to a preset request return field, and determining the preset request return field as a key field of the data to be called.
5. The configurable data service exposure solution of claim 1, wherein invoking relevant data from the data management terminal based on the key field for publication onto the docking platform to generate a resource subscription task for each downstream system comprises:
determining the attribution service according to the key field;
establishing network connection between the data management terminal and the docking platform, respectively uploading attribution services corresponding to data calling requests sent by each downstream system to the docking platform, and constructing task bars corresponding to each related data;
importing a data calling request sent by each downstream system into a task bar corresponding to related data;
and acquiring a platform work account number of each downstream system, and associating the platform work account number of each downstream system with a task bar of the downstream system to generate a resource subscription task of the downstream system.
6. The method for exposing a configurable data service according to claim 2, wherein the acquiring the associated configuration data of each second terminal in the data management terminal, and screening the third terminal with the data access authority from the plurality of second terminals based on the associated configuration data, comprises:
acquiring terminal parameters of each second terminal;
acquiring associated configuration data of each second terminal in the data management terminal according to terminal parameters of the second terminal;
acquiring authorization characteristic information of each second terminal according to the associated configuration data of the second terminal;
and determining a plurality of authority characteristics of each second terminal based on the authorization characteristic information of the second terminal, and screening out a third terminal with data retrieval related authority characteristics in the authority characteristics.
7. A configurable data service exposure solution according to claim 3, wherein the evaluating the compatibility of the current applicable condition program of the target data to be invoked of each third terminal with the system operation parameters of the target downstream system corresponding to the third terminal includes:
determining the running environment parameters of the current applicable condition program of the target data to be called of each third terminal;
determining a jumping environment factor according to the running environment parameters of the current applicable condition program of the target to-be-called data of each third terminal;
constructing an interference scene of the current applicable condition program according to the change interval of each jumping environment factor and the running influence of the jumping environment factor on the current applicable condition program;
constructing an interference model of a current applicable condition program based on scene parameters of the interference scene;
determining random response data of system operation parameters of a target downstream system corresponding to each third terminal under an interference model of a current applicable condition program of the third terminal;
and determining the compatibility degree of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the distribution condition of the random response data.
8. The method for exposing a data service according to claim 7, wherein determining the compatibility of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the distribution condition of the random response data comprises:
determining the response variation amplitude of each system operation parameter of each third terminal according to the distribution condition of the random response data;
selecting target item system operation parameters with response variation amplitude larger than or equal to preset amplitude;
confirming the operation coverage rate of the operation parameters of the target item system for the target downstream system corresponding to each third terminal;
and determining the compatibility degree of the current applicable condition program of the target data to be called of each third terminal and the system operation parameters of the target downstream system corresponding to the third terminal according to the operation coverage rate of the target item system operation parameters to the target downstream system corresponding to each third terminal.
9. A configurable data service exposure resolution system, the system comprising:
the receiving module is used for receiving a data calling request sent by a downstream system;
the analysis module is used for analyzing the data calling request to determine key fields of data to be called of each downstream system;
the generation module is used for calling related data from the data management terminal based on the key field and publishing the related data to the docking platform so as to generate a resource subscription task of each downstream system;
the approval module is used for carrying out subscription and authority approval on each downstream system based on the resource subscription task, and carrying out data retrieval service on each downstream system according to the authentication information of each downstream system after approval;
the method for carrying out subscription and authority approval on each downstream system based on the resource subscription task comprises the following steps of:
detecting the subscription condition of each downstream system for the corresponding resource subscription task;
determining the subscription state of each downstream system for the corresponding resource subscription task according to the subscription condition;
determining a subscribed first downstream system and an unsubscribed second downstream system according to the subscription state;
and carrying out authority approval on the first downstream systems, acquiring authentication information of each first downstream system after approval is passed, and carrying out data retrieval service for the first downstream systems according to the authentication information.
CN202211140494.4A 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure Active CN115495783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211140494.4A CN115495783B (en) 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211140494.4A CN115495783B (en) 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure

Publications (2)

Publication Number Publication Date
CN115495783A CN115495783A (en) 2022-12-20
CN115495783B true CN115495783B (en) 2023-05-23

Family

ID=84469679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211140494.4A Active CN115495783B (en) 2022-09-20 2022-09-20 Method and system for solving configuration type data service exposure

Country Status (1)

Country Link
CN (1) CN115495783B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107430712A (en) * 2014-12-19 2017-12-01 艾诺茨Ip公司 Resource management system is can access with the network that can be allocated management of
CN112148679A (en) * 2020-09-21 2020-12-29 江苏锐创软件技术有限公司 Data interaction method, system, device and storage medium based on multiple data platforms

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1276321C (en) * 1995-02-13 2006-09-20 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
CN105677774B (en) * 2015-12-30 2019-11-22 百度在线网络技术(北京)有限公司 A kind of data event method for pushing and device
US10080048B2 (en) * 2016-08-26 2018-09-18 Adobe Systems Incorporated Subscription service for authorizing access to media content
CN109271807A (en) * 2018-08-20 2019-01-25 深圳萨摩耶互联网金融服务有限公司 The data safety processing method and system of database
JP7170550B2 (en) * 2019-01-28 2022-11-14 キヤノン株式会社 Management device and its control method
US20200311294A1 (en) * 2019-03-25 2020-10-01 China Electronics Technology Group Corporation Information Science Academy System and Method for Inter-sharing Data Among Data Users, Computing Device and Computer-Readable Storage Medium
CN110336872B (en) * 2019-06-28 2022-03-18 上海指旺信息科技有限公司 Method, device and system for acquiring third-party data
US11646900B2 (en) * 2020-03-18 2023-05-09 International Business Machines Corporation Subscription service for networks
CN111488598B (en) * 2020-04-09 2023-04-07 腾讯科技(深圳)有限公司 Access control method, device, computer equipment and storage medium
US11361106B2 (en) * 2020-09-01 2022-06-14 Microsoft Technology Licensing, Llc Chaining, triggering, and enforcing entitlements
CN112632581A (en) * 2020-12-28 2021-04-09 深圳壹账通智能科技有限公司 User data processing method and device, computer equipment and storage medium
CN113111339B (en) * 2021-05-13 2023-12-19 数字广东网络建设有限公司 Access control method, device, equipment and medium for application service
CN113596082A (en) * 2021-06-21 2021-11-02 青岛海尔科技有限公司 Method and system for determining equipment data and electronic device
CN113434766B (en) * 2021-06-30 2024-03-22 青岛海尔科技有限公司 Subscription information pushing method and device, storage medium and electronic device
CN114218538A (en) * 2021-11-19 2022-03-22 中国建设银行股份有限公司 Authority control method and device, computer equipment and storage medium
CN115086347B (en) * 2022-05-20 2024-03-08 北京中科江南信息技术股份有限公司 Data synchronization method, device, electronic equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107430712A (en) * 2014-12-19 2017-12-01 艾诺茨Ip公司 Resource management system is can access with the network that can be allocated management of
CN112148679A (en) * 2020-09-21 2020-12-29 江苏锐创软件技术有限公司 Data interaction method, system, device and storage medium based on multiple data platforms

Also Published As

Publication number Publication date
CN115495783A (en) 2022-12-20

Similar Documents

Publication Publication Date Title
CN108848037A (en) Service request processing method, device, computer equipment and storage medium
CN109729068B (en) Security vulnerability auditing system based on block chain technology
CN106155812A (en) Method, device, system and the electronic equipment of a kind of resource management to fictitious host computer
CN110909013B (en) Service list generation method, device, equipment and computer readable storage medium
CN110930254A (en) Data processing method, device, terminal and medium based on block chain
CN112235428B (en) Call request processing method and device, computer equipment and storage medium
CN108366176A (en) A kind of charging method of terminal applies, apparatus and system
CN113992408A (en) Multi-system unified login information processing method and system
CN114567505B (en) Abnormal session big data processing method and server applied to digital office
CN113891259B (en) Short message distribution method, device, equipment and computer readable storage medium
CN115495783B (en) Method and system for solving configuration type data service exposure
CN112270436B (en) Resource release effect evaluation method, device and system
CN114281784A (en) Transaction log playback method, device, equipment and medium for distributed core system
CN113067802A (en) User identification method, device, equipment and computer readable storage medium
CN109727040B (en) Data publishing method, data calling method, device and storage medium
CN116303057A (en) Automatic verification method and device
CN113240266A (en) Risk management method and device
CN111311102A (en) Resource ratio adjusting method, device, equipment and computer readable storage medium
CN111488625A (en) Data processing method and device
CN114996106B (en) Test method of business system, electronic equipment and storage medium
CN106888187B (en) Service processing method and device
CN117874311B (en) Blacklist management method, blacklist management device, electronic equipment and storage medium
CN114222002B (en) Service request processing method and device, storage medium and electronic equipment
CN117579322A (en) Data processing method based on block chain and related equipment
CN115883269A (en) Flow control management method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant