Three, summary of the invention
1, goal of the invention:
The present invention is directed to each professional different unfixing and uncurrent problem of configuration frame form of configurable framework that generate, disclose a kind of processing method of dynamic generation configuration frame.
2, technical solution:
Adopt unified interface and consolidation formization dynamically to generate configuration frame, realize the dynamic auto generation and the encryption of configuration frame.A request process is sent in professional end request, after service end is accepted, generates a configuration frame file in real time automatically, returns response format (wherein comprising the configuration frame file or the file address that have generated).Request and all encrypt or decipher when returning.
3, description of drawings:
Fig. 1 is unitized interface schema, is before the different platform terminal request data data uniform format interface to be handled description figure.
Fig. 2 is database distribution service and query graph, is database to be carried out the distribution service request of data, the description figure that database is handled on request through the unitized back of interface.
Fig. 3 is that the terminal inquiry result resolves feedback diagram, is the Business Processing description figure that from database, obtains turning back to behind the data result inquiry terminal according to terminal request.
Four, embodiment
The automatic generation technique of dynamic-configuration framework:
1. unified interfaceization:
1.2 request form interface:
Request package is an eXtensible Markup Language document, is sent by the XMLHttpRequest object with the post mode.(XML is called for short in the back)
Produce mess code down for fear of different coding, the text among this xml should and can not use the String form to create with the DOM establishment.Directly write out the data that the element of xml containing element name all must provide for all request package.
1.2 feedback response bag:
Respond packet is an xml document that structure is good.
Mess code under the different coding, the text among this xml should be created and can not use the String form to create with DOM.
When operation failure, can return the numerical value of appointing according to the different business difference.(example: successfully return 0, get nowhere and return 1).
2. distribution service and inquiry:
2.1 setting up database connects:
Set up each and show needed table space, adopt the SQL hardware standard according to the equipment otherness.Authorize for database inside search access right.Be connected to database.(set up the relevant inquiring table space.)
2.2 querying service database:
Carry out the optimization that dichotomy (dichotomy) and Hash (Hash) mutually combine for each business demand data of needs inquiries.Thereby reach the accurate matching of input data, shorten the inquiry institute purpose of service time.
Dichotomy:
Binary chop is claimed binary search again, and it is the higher lookup method of a kind of efficient.
Binary chop requires: linear list is an ordered list, and promptly node is according to keywords orderly in the table, and will use the storage organization of vector as table.Might as well establish ordered list increases progressively orderly.
Hash:
HASH is mainly used in AES in the information security field; It changes into 128 mixed and disorderly coding to the information of some different lengths; These encoded radios are called the HASH value. we can say that also hash is exactly the mapping relations that find between a kind of data content and the deposit data address.
2.3 verification msg correctness:
Data are carried out secondary checksum verification data correctness by the MD5 mode once more.
MD5: to the concise and to the point narration of MD5 algorithm can for: MD5 handles the information of input with 512 groupings; And each divides into groups to be divided into again 16 32 seats and divides into groups; After having passed through a series of processing; The output of algorithm is formed by four 32, with generating 128 hashed values after these four 32 packet concatenation.
2.4 inner debugging mechanism:
When connection or optimization or validation failure, internal server equipment forms daily record (LogData) with the numbering of the timing error of automatic misregistration generation.Convenient inquiry, and can start corresponding inner debugging mechanism, repair frequent fault, guarantee data query stability and robustness.
2.5 ISN conversion:
According to the different language requirement of information flow ISSUER platform, the unified UTF8 ISN form that adopts.When outputing to presentation layer, can reduce the occurrence frequency of mess code, accomplish optimization output and the effect that improves delivery efficiency.
UTF8:UTF-8 is that a kind of elongated character code of UNICODE is claimed ten thousand country codes again, is created in 1992 by Ken Thompson.Be standardized as RFC 3629 now.UTF-8 is with 1 to 6 byte code UNICODE character.Being used in can the simplified traditional font of same page Chinese display and other language (like Japanese, the Korean) on the webpage
2.6 acquisition Query Result:
Character information data stream after will passing through verification and changing turns back on the target query terminal as Query Result.Adopt the mode of network or WIFI or other various wireless or wired (according to device requirements) to transmit.
3. the terminal inquiry result resolves feedback:
3.1 network measuring verification:
By the terminal inter-area traffic interarea is carried out parity check.(employing all be data flow to be regarded as 16 integers stream repeat stack and calculate.For calculate the check with, at first the check and field be changed to 0.Then, in the valid data scope each 16 carry out complement of one's summation, the result exists in check and the field, data length is that odd number is then mended a byte 0.After receiving data, equally each 16 figure place in the valid data scope are carried out the summation of the complement of one's.The recipient in computational process, comprised transmit leg exist in the stem check with, any mistake does not take place in stem in transmission course, recipient's result calculated should be complete 0 or complete 1.If the result is not complete 0 or complete 1, the expression error in data.)
3.2 output verification:
Whether the character that test will be exported is the UTF8 form, if not the UTF8 formatted request is made mistakes, inside then attempts using the mode of " 2.1 set up database connects " once more.(UTF8 explains and asks for an interview the conversion of 2.5 ISNs).
3.3 data transaction:
Adopt international eXtensible Markup Language mode to change traffic flow information, generate configuration frame in real time.
3.4 terminal output:
Configuration XML file is carried out the mode of feedback response bag carry out md5 encryption output.