Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It is noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of the present application and in the foregoing figures, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server comprising a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
It will be appreciated that in the specific embodiments of the present application, related data such as user information is involved, and when the above embodiments of the present application are applied to specific products or technologies, user permissions or consents need to be obtained, and the collection, use and processing of related data need to comply with related laws and regulations and standards of related countries and regions.
First, the following explanation is made on the related nouns involved in the embodiment of the present application:
Cloud technology (Cloudtechnology): the hosting technology is used for integrating hardware, software, network and other series resources in a wide area network or a local area network to realize calculation, storage, processing and sharing of data.
Cloud server: the method is a simple, efficient, safe and reliable computing service with elastically scalable processing capacity.
Cloud computing: one type of distributed computing refers to decomposing a huge data computing process program into innumerable small programs through a network "cloud", and then processing and analyzing the small programs through a system of multiple servers to obtain results and returning the results to users.
Private cloud (PrivateCloud): the cloud infrastructure and the software and hardware resources are created in the firewall so that each department in the organization or enterprise can share the resources in the data center. A private cloud is created, typically cloud device (IaaS, infrastructureasaService, infrastructure as a service) software in addition to hardware resources. Private cloud computing also includes three levels of cloud hardware, cloud platform, cloud services. In contrast, cloud hardware is a user's own personal computer or server, rather than a data center of a cloud computing vendor. Cloud computing manufacturers build data centers to provide public cloud services for millions of users, thus requiring tens of millions of servers. Private cloud computing serves only friends and relatives to individuals, and staff and clients and suppliers to businesses, so personal or business's own personal computers or servers are sufficient to provide cloud services.
Public cloud (PublicCloud): typically, a third party provider provides a cloud for users, and public cloud is generally available through the Internet, and may be free or low-cost, and the core attribute of public cloud is shared resource service. There are many examples of such clouds that can provide services throughout the open public network today.
And (3) middleware: the system software between the cloud server and the client uses basic services (functions) provided by the system software to connect various parts of an application system or different applications on the cloud server, so that the purposes of resource sharing and function sharing can be achieved.
And (3) assembly: a binary package generated by compiling a plurality of function functions and having relatively independent functions is referred to, and an application program can use functions corresponding to the components by calling the integrated components.
An interface: is a reference type that specifies a set of function members without implementing members, other types such as classes and structures may implement interfaces that may include: the disclosed method, usable variables and compliant protocols of the callable component have explicit functions for each interface, and specific function points can be realized by calling the interfaces.
Referring to fig. 1, fig. 1 is a schematic diagram of an application environment provided in an embodiment of the present application, where the application environment may include a client 10, a cloud server 20, and a middleware 30, and the client 10, the cloud server 20, and the middleware 30 may be indirectly connected through a wireless communication manner. The client 10 runs a calling program for the target component and sends a calling instruction for the target component to the middleware 30. The middleware 30 responds to the call instruction, where the call instruction carries target call related information, and analyzes the target call related information to obtain operation related information of the data access operation, where the operation related information may include: the method comprises the steps that when a client 10 monitors data access operation of a middleware 30 to a system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information, the middleware 30 receives skip interface information corresponding to the system interface sent by the client 10 and controls a target component to access the system interface through the skip interface information so as to execute the data access operation; the jump interface information is interface information corresponding to a user-defined interface configured by the client 10 for a system interface, and the target component is a functional component provided by a cloud service corresponding to the cloud server 20. It should be noted that fig. 1 is only an example.
The client may be a smart phone, a computer (such as a desktop computer, a tablet computer, a notebook computer), a digital assistant, an intelligent voice interaction device (such as an intelligent sound box), an intelligent wearable device, an on-board terminal, or other type of entity device, or may be software running in the entity device, such as a computer program. The operating system corresponding to the first client may be an Android system, an iOS system (which is a mobile operating system developed by apple corporation), a Linux system (an operating system), a microsoft windows system (microsoft windows operating system), and the like.
The cloud server side may be a cloud server that provides basic cloud computing services such as cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, CDNs (ContentDelivery Network, content delivery networks), big data, artificial intelligence platforms, and the like. The cloud server may include a network communication unit, a processor, a memory, and the like. The cloud server side can provide background services for the corresponding client side.
The client 10 and the cloud server 20 may be used to construct a system for data processing, which may be a distributed system. Taking a distributed system as an example of a blockchain system, the blockchain system is formed by a plurality of nodes (any form of computing devices in an access network, such as servers and user terminals) and clients, a point-to-point (P2P, peerToPeer) network is formed between the nodes, and the P2P protocol is an application layer protocol running on top of a transmission control protocol (TCP, transmissionControlProtocol) protocol. In a distributed system, any machine, such as a server, a terminal, may join to become a node, including a hardware layer, an intermediate layer, an operating system layer, and an application layer.
The functions of each node in the blockchain system include:
1) The routing, the node has basic functions for supporting communication between nodes.
Besides the routing function, the node can also have the following functions:
2) The application is used for being deployed in a block chain to realize specific service according to actual service requirements, recording data related to the realization function to form recorded data, carrying a digital signature in the recorded data to represent the source of task data, sending the recorded data to other nodes in the block chain system, and adding the recorded data into a temporary block when the source and the integrity of the recorded data are verified by the other nodes.
3) The blockchain comprises a series of blocks (blocks) which are connected with each other according to the generated sequence time, the new blocks are not removed once being added into the blockchain, and record data submitted by nodes in the blockchain system are recorded in the blocks.
It should be noted that, the data processing method provided by the present application may be applied to a client or a server, and is not limited to the embodiment of the application environment.
In the following, a specific embodiment of a data processing method provided by the present application is described, and fig. 2 is a schematic flow chart of a data processing method provided by an embodiment of the present application, where the method operation steps are as described in the examples or the flow chart, but more or fewer operation steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. In actual system or product execution, the methods illustrated in the embodiments or figures may be performed sequentially or in parallel (e.g., in a parallel processor or multi-threaded processing environment). Specifically, as shown in fig. 2, the method is applied to middleware between a cloud server and a client, and the method may include:
S201, under the condition that a client runs a calling program aiming at a target component, responding to a calling instruction aiming at the target component sent by the client, wherein the calling instruction carries target calling associated information, analyzing and processing the target calling associated information to obtain operation associated information of data access operation, and the operation associated information comprises: system interface information and operation attribute information corresponding to data access operation;
S202, when the client monitors the data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information, receiving the skip interface information corresponding to the system interface sent by the client;
S203, the control target component accesses the system interface through the jump interface information to execute data access operation;
the jump interface information is interface information corresponding to a user-defined interface configured by a client for a system interface, and the target component is a functional component provided by cloud service corresponding to a cloud server.
In the embodiment of the specification, the middleware may be an interactive software platform between the client and the cloud server, and the client may call the functional component provided by the cloud server through the middleware, so as to ensure the security of the data access process.
In the embodiment of the present disclosure, the target component may be a functional component provided for a cloud service corresponding to a cloud server, for example, the target component may include: two-dimensional code scanning and identifying component, client sharing component, positioning component, gateway component, safety keyboard component, etc.
In the embodiment of the present specification, the calling program may be an executable program for calling the function related to the target component, and in particular, the calling program may be an automation script.
In a particular embodiment, the client may trigger a call instruction for the target component based on the caller and send the call instruction to the middleware. In one example, when the client runs the calling program for the target component, after reaching a preset trigger time point or after the user actively triggers, the client generates a calling instruction for the target component, receives the calling instruction by the middleware, and calls a component corresponding to the calling instruction. Optionally, the preset trigger time point may be preset according to the component function and the component call requirement in the actual application.
In the embodiment of the present disclosure, the above-mentioned target call association information may be configuration information related to the execution action and the function implementation of the target component, for example, the target call association information of the target component may include: function parameters, compilation options, callback functions, etc.
In this embodiment of the present disclosure, the operation related information of the data access operation may be operation configuration information required for the target component to perform the data access operation, and specifically, the data access operation may include operations such as creating a database file, adding or deleting a database table, opening or closing. The operation association information may include: the system interface information may be address mapping information of a system interface to be called by the target component for performing the data access operation, for example, the system interface information may be a system function corresponding to the system interface, and the operation attribute information may be information related to an operation behavior attribute of the data access operation, for example, the operation attribute information may include: operation type information and operation value information.
In a specific embodiment, the client may perform a hook operation (hook) on the system interface, so as to play a role in monitoring the system interface, and configure a corresponding custom interface for the system interface to serve as a jump interface of the system interface. Specifically, the access systems of the database, the file and the sandbox in the client side all provide a set of system interfaces, and the client side carries out hooking operation on the system interfaces to convert the hooked custom interface into an entry function of the middleware, so that the function of data isolation is achieved.
In a specific embodiment, the client may perform validity verification on the data access operation based on the operation attribute information of the data access operation, for example, in a case where the operation attribute information corresponding to the data access operation to be performed currently contradicts the operation attribute information corresponding to the data access operation performed currently, the data access operation to be performed currently is considered to be an illegal operation, which is schematically indicated that the downloading component is downloading the video through the middleware, but the cache component of the program background calls the system interface to want to delete the file data including the video, and at this time, the data deletion operation of the cache component is the illegal operation, and the client may intercept the system interface call request of the data deletion operation.
According to the embodiment, the characteristics of public cloud and private cloud are combined on a software layer, the client can send the calling instruction of the component aiming at cloud service to the middleware, the calling of the component is realized through the middleware, the client can monitor the data access operation of the middleware to the system interface in the calling process of the component, and under the condition that the data access operation is confirmed to be legal, the component needs to jump to the system interface through the custom jump interface of the client to execute the data access operation, so that the safety management of the client to the data access operation is realized, and the resource waste caused by the privately development of the component can be reduced while the safety of the data access is improved.
In practical applications, the cloud service provider prefers to provide services through public cloud, that is, provides unified functional components and places the unified functional components in the cloud official network to face different users, however, different users of the cloud service generally have customized secondary development requirements on the functional components provided by the cloud service, for example, after entering a code scanning page of an application program through a code scanning component, the UI layout, style and screen adaptation condition of the page also need to be customized according to the type of the application program.
In a specific embodiment, as shown in fig. 3, the method may further include:
s301, determining the calling frequency of the client to each of a plurality of function functions in the cloud service according to the preset calculation type of the cloud service.
Specifically, the preset computing type may be set in combination with a cloud computing manner provided by a cloud service in an actual application, for example, the preset computing type may include, but is not limited to: distributed computing, load balancing, or parallel computing, among others.
In particular, the function may be an algorithm consisting of a system function plus a resource load.
S302, determining a set of objective functions corresponding to the plurality of functional functions according to the calling frequency.
In one example, the frequency of user calls to different function functions can be obtained through distributed computation, load balancing or parallel computation in the cloud service, so that the frequency of use is calculated. For example, the code scanning function may include two basic functions of identifying a bar code and identifying a two-dimensional code, and two extended functions of copying an identification result and clicking an identification result to jump, where the identification bar code function and the identification two-dimensional code function are respectively composed of corresponding functions a+b+ C, A1 +b1+b1+c1, and the copy identification result function and/or the clicking identification result to jump correspond to functions D and D1, respectively, so that four objective function sets of a+b+c+ D, A +b+c+d1, a1+b1+c1+ D, A1+b1+c1+d1 can be formed.
S303, generating a calling program corresponding to the target function set and environment configuration information corresponding to the target function set according to respective preset calling association information of at least one function in the target function set, so that the client side packages the target function set based on the preset calling association information and the environment configuration information to obtain a target component, configures the calling program corresponding to the target function set as a calling program of the target component, and sends a calling instruction carrying the target calling association information to the middleware based on the calling program under the condition of running the calling program of the target component, wherein the target calling association information is information composed of the respective preset calling association information of at least one function.
In the embodiment of the present disclosure, the preset call related information of any function may be configuration information related to the execution action and the function implementation of the corresponding function, for example, the preset call related information of any function may include: function parameters, compilation options, callback functions, etc.
In one example, the preset call related information of any function may be represented as a preset call keyword (key-word) and a keyword parameter, where the preset call keyword may be determined in combination with an execution action and a function implementation of the corresponding function, and the keyword parameter may be determined in combination with a specific value of the execution action and the function implementation of the corresponding function, for example, the preset call keyword of the code scanning function may be an IP, a port number, and provide a basis for a network request of a service operation to be successfully executed in a subsequent scan and an action of completing execution.
In the embodiment of the present specification, the environment configuration information may be information for configuring the execution environment of the set of objective functions. In particular, the environment configuration information may be represented as an environment file of the set of objective functions.
In a specific embodiment, the client may package the target function set based on preset call association information and environment configuration information to obtain a target component, reserve a corresponding component interface for the middleware to call, configure a calling program corresponding to the target function set as a calling program of the target component, and send a calling instruction carrying the target call association information to the middleware based on the calling program under the condition of running the calling program of the target component, so that the middleware calls the target component through the component interface.
In one example, a calling program of the target component may generate a call-in object according to target call-related information in the calling program in a running process, and a call instruction sent by the client may carry the call-in object, so that the middleware performs component call based on the call-in object.
Referring to fig. 4, the use frequency of different function functions can be calculated through a cloud server, and the basic function and the extension function of the component are determined, so that an automation script corresponding to the component is deployed, and an environment file corresponding to the component is set.
The above embodiment shows that after the functional functions of the components are split in fine granularity, the user can perform custom expansion according to the split functional functions, so that the flexibility of custom development of the calling program is met.
In a specific embodiment, the method may further include:
1) Responding to the call instruction, and decrypting the encrypted call associated information in the target component to obtain decrypted call associated information;
2) Signature verification processing is carried out on the decrypted call related information, and a verification result is obtained;
3) Calling the target component based on the decrypted call correlation information under the condition that the verification result indicates that the decrypted call correlation information passes verification;
The encrypted call associated information is obtained by encrypting preset call associated information in the process of packaging the target function set by the client.
Specifically, the client can encrypt the preset call associated information before packaging the component to obtain encrypted call associated information, and correspondingly, the middleware can decrypt and check the encrypted call associated information in the component in the process of calling the component so as to secure the data transmission process.
The above embodiment shows that the security protection operation of encrypting and decrypting and checking the signature is performed in the data transmission process, so that the security of data processing is improved.
In some embodiments, the operation association information may further include: in the case that the data transmission type information indicates that the data access operation is local data transmission, as shown in fig. 5, before the control target component accesses the system interface through the hop interface information, the method may further include:
s204, receiving an operation behavior record sent by the client, wherein the operation behavior record is generated by the client based on the data access operation and the operation attribute information.
Specifically, the client uses the time when the target component calls the system interface to be intercepted by the runtime, records the parameter initialization of the API (ApplicationProgrammingInterface, application program interface) function of the system interface when the target component starts to be loaded, and generates an operation record.
S205, carrying out instantiation processing on the data access operation based on the operation behavior record to obtain operation instance information.
Specifically, the operation instance information may be instance information obtained after the data access operation is instantiated.
In a specific embodiment, the data access operation is instantiated in the middleware, and the instantiated data is generated by using a reflection mechanism to obtain operation instance information, wherein the operation instance information can store the attribute of the access data, the operation behavior attribute, the associated information of the service module and the like.
Accordingly, the control target component may access the system interface through the hop interface information, which includes:
S2031, based on the operation instance information, the control target component accesses the system interface through the hop interface information to perform the data access operation.
According to the embodiment, under the condition that the system interface of the local data access carries out hooking processing, the operation behavior is instantiated and then executed, so that the efficiency of the data access operation can be improved on the premise of ensuring the data security.
In a specific embodiment, the method may further include:
1) Analyzing the target call associated information to obtain operation associated information of each data access operation, wherein the operation associated information of each data access operation comprises operation attribute information of the corresponding data access operation.
2) And receiving a plurality of operation behavior records corresponding to a plurality of data access operations sent by the client.
3) And classifying the plurality of operation behavior records based on the operation attribute information of each data access operation to obtain at least one record set.
Specifically, the middleware can classify a plurality of operation behavior records, and classification rules can be preset according to a service module where a current component is located, and can be dynamically issued and adjusted by the cloud server. For example, after a plurality of operation behavior records are displayed in a list form in a page, the plurality of operation behavior records are queried and classified according to classification rules.
4) And respectively carrying out instantiation processing on the data access operation corresponding to at least one operation behavior record in each record set to obtain an operation instance set corresponding to each record set.
Specifically, the operation instance set corresponding to each record set may include operation instance information corresponding to each operation behavior record in the corresponding record set.
In a specific embodiment, the data access operation corresponding to each operation behavior record is instantiated in the middleware, and the instantiated data is subjected to object generation by utilizing a reflection mechanism to obtain operation instance information corresponding to each operation behavior record, wherein the operation instance information can store the attribute of the access data, the operation behavior attribute, the associated service module and other information in the corresponding operation behavior record.
5) And executing the data access operation corresponding to each operation behavior record in batches based on the operation instance set.
Specifically, after the data amount of the operation instance information in the operation instance set reaches the preset amount, the operation behavior attribute of each operation instance information in the operation instance set can be traversed, and the middleware performs batch execution on the operation instance information with the same operation behavior attribute. In practical applications, the preset number may be set in combination with the data processing efficiency requirement.
Referring to fig. 6, the client may perform a hooking operation on the system interface, thereby playing a role in monitoring the system interface, and configure a corresponding custom interface for the system interface as a jump interface of the system interface, so that the runtime may be utilized to intercept the opportunity of the middleware to control the target component to call the system interface, record the parameter initialization of the API function of the system interface when the target component starts to be loaded, generate a plurality of operation behavior records corresponding to a plurality of data access operations, and send the plurality of operation behavior records to the middleware. The middleware can classify the plurality of operation behavior records according to classification rules issued by the cloud server to obtain at least one record set, and respectively perform instantiation processing on data access operations corresponding to at least one operation behavior record in each record set to obtain an operation instance set corresponding to each record set, and when the data volume of operation instance information in the operation instance set reaches a preset number, the operation behavior attribute of each operation instance information in the operation instance set can be traversed, and batch execution is performed on the operation instance information with the same operation behavior attribute.
According to the embodiment, under the condition that the system interface of the local data access carries out hooking processing, the operation behaviors are classified and then instantiated into the set, so that clients can directly carry out batched operation on the addition, deletion and modification of the local data, and the operation efficiency is improved on the premise of data safety.
In some embodiments, the operation association information may further include: in the case where the data transmission type information indicates that the data access operation is network data transmission, as shown in fig. 7, the method may further include:
S206, starting the local agent corresponding to the client, so that the local agent monitors transmission data associated with the proxy server identification under the data transmission port corresponding to the port information, and controlling the target component to access the system interface through the jump interface so as to store the transmission data.
Specifically, when data is transmitted in a network, the target call associated information in a call instruction received by the middleware is utilized to determine the protocol address information, port information and proxy server identification of the network transmission, so that a local proxy is started, data input under the port is monitored, because asynchronous execution of a network data request is required, a data stream belonging to the same network data request is marked in a request header, request data and response data belonging to the same network data request are determined, splicing of the request data and the response data is realized, and a target component is controlled by the local proxy to access a system interface through a jump interface so as to store the spliced data. Alternatively, the protocol address information may be an IP address corresponding to the IP protocol.
In a particular embodiment, the data access operation may include: the network data request sending operation, where the home agent corresponding to the start client may include:
S2061, receiving jump interface information corresponding to a system interface sent by a client under the condition that the client monitors network data request operation of the middleware on the system interface;
s2062, a home agent corresponding to the hop interface information is configured in the client so that the home agent performs the network data request transmission operation.
Specifically, the home agent may perform a network data request transmission operation according to the protocol address information and the port information determined by the target call association information.
In a specific embodiment, the method may further include:
1) Receiving a proxy server identification and transmission data sent by a local proxy;
2) And transmitting the transmission data to the service proxy server corresponding to the proxy server identification.
Specifically, the transmission data sent by the local agent is captured through the service proxy server deployed to the user machine room during transmission, so that the self-closing loop of the network data in the user is realized.
According to the embodiment, the transmission of the network data is determined through the protocol address information of the target call associated information, the proxy server identification and the port, so that the transmission data is guided to the self-owned service proxy server of the user by the local proxy of the client, and the efficiency of data access operation can be improved on the premise of ensuring the data security.
Referring to fig. 8, fig. 8 is a schematic diagram of a data access scheme in a cloud server componentized deployment scenario provided by the embodiment of the present application, specifically, a crowd list is pulled through cloud computing, a developer corresponding to a client writes a keyword, an automation script is input, an environment file required by component deployment is generated, the keyword and the environment file are encrypted when the component is packaged, a middleware calling interface is opened after packaging, then the client can start a terminal program, a call of an interface function of a system interface is initialized, and a hook operation of the interface function is executed, so that the interface function is converted into an entry function of the middleware, when data access is generated, if the access data is terminal local data, an operation record for calling the local data access interface is classified, an instantiation object is performed on the data by the middleware, and batch operation is put into a collection; if the access data is network data, starting a local proxy service, monitoring network transmission data by a local proxy, splicing request data and response data belonging to the same network data request to obtain spliced data, and uploading the spliced data to a service proxy server through a transmission channel of a middleware.
According to the technical scheme provided by the embodiment of the application, in the application scene of the cloud server assembly deployment, the characteristics of public cloud and private cloud are combined on the software level, after the function functions of the assemblies are split in fine granularity, users can carry out custom expansion according to the split function functions, the flexibility of custom development of calling programs is met, then a client can send a calling instruction of the assemblies aiming at cloud services to a middleware, the calling of the assemblies is realized through the middleware, the client can monitor the data access operation of the middleware to a system interface in the assembly calling process, and the assemblies need to jump to a system interface through a custom jump port of the client to execute the data access operation under the condition of confirming that the data access operation is legal operation, so that the safety management of the data access operation by the client is realized, the resource waste brought by the proprietary development of the assemblies is reduced at the same time, in addition, under the condition that the data access operation is local data transmission, the system interface of the local data access is hooked, the operation behavior is carried out on, the client can be directly carried out to a client, the data access operation can be directly carried out to a user interface through a network, the user interface is provided with a network access protocol, the user interface can be directly transferred to a user interface through a network access interface, and the user interface can be determined, and the network access operation can be carried out by a user interface is carried out by a user interface, and the user interface can be directly, and a network access operation can be determined by a user interface is provided, both can promote the efficiency of data access operation under the prerequisite of guaranteeing data security.
The embodiment of the application also provides a data processing device, as shown in fig. 9, which is applied to middleware between a cloud server and a client, and the device can comprise:
The first parsing module 910 is configured to, when the client runs a calling program for the target component, respond to a calling instruction for the target component sent by the client, where the calling instruction carries target calling association information, parse the target calling association information to obtain operation association information of a data access operation, and system interface information and operation attribute information corresponding to the data access operation;
The hop interface information receiving module 920 is configured to receive hop interface information corresponding to a system interface sent by a client when the client monitors a data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal based on operation attribute information;
An operation execution module 930, configured to control the target component to access the system interface through the hop interface information, so as to execute a data access operation;
the jump interface information is interface information corresponding to a user-defined interface configured by a client for a system interface, and the target component is a functional component provided by cloud service corresponding to a cloud server.
In a specific embodiment, the apparatus may further include:
The calling frequency determining module is used for determining the calling frequency of each of a plurality of function functions in the cloud service by the client according to the preset calculation type of the cloud service;
The objective function set module is used for determining objective function sets corresponding to the plurality of functional functions according to the calling frequency;
The calling program generating module is used for generating a calling program corresponding to the target function set and environment configuration information corresponding to the target function set according to preset calling association information of at least one function in the target function set, so that the client side packages the target function set based on the preset calling association information and the environment configuration information to obtain a target component, the calling program corresponding to the target function set is configured as a calling program of the target component, and under the condition of running the calling program of the target component, a calling instruction carrying target calling association information is sent to the middleware based on the calling program, wherein the target calling association information is information composed of the preset calling association information of the at least one function.
In a specific embodiment, the apparatus may further include:
the decryption module is used for responding to the call instruction, decrypting the encrypted call associated information in the target component and obtaining decrypted call associated information;
the signature verification module is used for carrying out signature verification processing on the decrypted call associated information to obtain a verification result;
The target component calling module is used for calling the target component based on the decrypted call associated information under the condition that the verification result indicates that the decrypted call associated information passes verification;
The encrypted call associated information is obtained by encrypting preset call associated information in the process of packaging the target function set by the client.
In some embodiments, the operation association information may further include: the apparatus may further include data transmission type information corresponding to the data access operation, where the data transmission type information indicates that the data access operation is local data transmission:
The first operation behavior record receiving module is used for receiving operation behavior records sent by the client, wherein the operation behavior records are generated by the client based on data access operation and operation attribute information;
The first instantiation processing module is used for carrying out instantiation processing on the data access operation based on the operation behavior record to obtain operation instance information;
accordingly, the operation performing module 930 may include:
and the first operation execution unit is used for controlling the target component to access the system interface through the jump interface information based on the operation instance information so as to execute the data access operation.
In a specific embodiment, the apparatus may further include:
The second analysis processing module is used for analyzing the target call associated information to obtain operation associated information of each data access operation, wherein the operation associated information of each data access operation comprises operation attribute information of the corresponding data access operation;
The second operation behavior record receiving module is used for receiving a plurality of operation behavior records corresponding to a plurality of data access operations sent by the client;
the record classification module is used for classifying the plurality of operation behavior records based on the operation attribute information of each data access operation to obtain at least one record set;
The second instantiation processing module is used for respectively carrying out instantiation processing on the data access operation corresponding to each operation behavior record in each record set to obtain an operation instance set corresponding to each record set;
And the batch execution module is used for executing batch execution on the data access operation corresponding to each of the at least one operation behavior record based on the operation instance set.
In some embodiments, the operation association information may further include: data transmission type information, port information and proxy server identification corresponding to the data access operation, in the case where the data transmission type information indicates that the data access operation is network data transmission, the apparatus may further include:
The local agent starting module is used for starting the local agent corresponding to the client, so that the local agent monitors transmission data associated with the proxy server identifier under the data transmission port corresponding to the port information, and controls the target component to access the system interface through the jump interface so as to store the transmission data.
In a particular embodiment, the data access operation may include: the network data request-to-send operation, the home agent startup module may include:
the information receiving unit of the jump interface is used for receiving the information of the jump interface corresponding to the system interface sent by the client under the condition that the client monitors the network data request operation of the middleware on the system interface;
and the local agent configuration unit is used for configuring the local agent corresponding to the jump interface information in the client so as to enable the local agent to execute the network data request sending operation.
In a specific embodiment, the apparatus may further include:
The transmission data receiving module is used for receiving the proxy server identification and transmission data sent by the local proxy;
and the transmission data sending module is used for sending the transmission data to the service proxy server corresponding to the proxy server identifier.
It should be noted that, the apparatus and method embodiments in the apparatus embodiments are based on the same inventive concept.
An embodiment of the present application provides a data processing apparatus, including a processor and a memory, where at least one instruction or at least one program is stored, where the at least one instruction or the at least one program is loaded and executed by the processor to implement a data processing method as provided in the above method embodiment.
Further, fig. 10 shows a schematic hardware structure of a data processing apparatus for implementing the data processing method provided by the embodiment of the present application, where the data processing apparatus may participate in forming or including the data processing device provided by the embodiment of the present application. As shown in fig. 10, the data processing apparatus 100 may include one or more (shown as 1002a, 1002b, … …,1002n in the figures) processors 1002 (the processor 1002 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA), a memory 1004 for storing data, and a transmission device 1006 for communication functions. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 10 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, data processing device 100 may also include more or fewer components than shown in FIG. 10, or have a different configuration than shown in FIG. 10.
It should be noted that the one or more processors 1002 and/or other data processing circuits described above may be referred to herein generally as "data processing circuits. The data processing circuit may be embodied in whole or in part in software, hardware, firmware, or any other combination. Further, the data processing circuitry may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the data processing device 100 (or mobile device). As referred to in embodiments of the application, the data processing circuit acts as a processor control (e.g., selection of the path of the variable resistor termination connected to the interface).
The memory 1004 may be used to store software programs and modules of application software, and the processor 1002 executes the software programs and modules stored in the memory 1004 to perform various functions and data processing, i.e., implement one of the data processing methods described above, according to the program instructions/data storage device corresponding to the data processing method in the embodiment of the present application. Memory 1004 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 1004 may further include memory located remotely from processor 1002, which may be connected to data processing device 100 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 1006 is for receiving or transmitting data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the data processing apparatus 100. In one example, the transmission means 1006 includes a network adapter (NetworkInterfaceController, NIC) that can be connected to other network devices via a base station to communicate with the internet. In one embodiment, the transmission device 1006 may be a radio frequency (RadioFrequency, RF) module for communicating with the internet wirelessly.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the data processing device 100 (or mobile device).
Embodiments of the present application also provide a computer readable storage medium that can be disposed in a data processing apparatus to store at least one instruction or at least one program for implementing the data processing method of the method embodiment, where the at least one instruction or the at least one program is loaded and executed by the processor to implement the data processing method provided by the method embodiment.
Alternatively, in this embodiment, the storage medium may be located in at least one network server among a plurality of network servers of the computer network. Alternatively, in the present embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-only memory (ROM), a random access memory (RandomAccessMemory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium and executes the computer instructions to cause the computer device to perform a data processing method as provided by the method embodiments.
It should be noted that: the sequence of the embodiments of the present application is only for description, and does not represent the advantages and disadvantages of the embodiments. And the foregoing description has been directed to specific embodiments of this application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The embodiments of the present application are described in a progressive manner, and the same and similar parts of the embodiments are all referred to each other, and each embodiment is mainly described in the differences from the other embodiments. In particular, for the apparatus and device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, with reference to the description of the method embodiments in part.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The foregoing description of the preferred embodiments of the application is not intended to limit the application to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the application are intended to be included within the scope of the application.