Movatterモバイル変換


[0]ホーム

URL:


CN102761519A - Technology for generating dynamic XML frameworks - Google Patents

Technology for generating dynamic XML frameworks
Download PDF

Info

Publication number
CN102761519A
CN102761519ACN2011101046386ACN201110104638ACN102761519ACN 102761519 ACN102761519 ACN 102761519ACN 2011101046386 ACN2011101046386 ACN 2011101046386ACN 201110104638 ACN201110104638 ACN 201110104638ACN 102761519 ACN102761519 ACN 102761519A
Authority
CN
China
Prior art keywords
technology
file
configuration
request
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101046386A
Other languages
Chinese (zh)
Inventor
苏捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co LtdfiledCriticalSHANGHAI ZHENSHI INFORMATION TECHNOLOGY Co Ltd
Priority to CN2011101046386ApriorityCriticalpatent/CN102761519A/en
Publication of CN102761519ApublicationCriticalpatent/CN102761519A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

The invention relates to a data generating technology, particularly to a technology for dynamically generating XML architectures, wherein the technology can realize mobile internet data association among different service lines and different mobile phone platforms, such as Iphone, Android, Symbian, Windows Mobile and the like. Therefore, the technology is a file generating technology for automatically generating a final configuration architecture file. The technology provided by the invention adopts a unified interface and a unified format for dynamically generating configuration architectures, thereby achieving dynamic automatic generation and encryption of the configuration architectures. The service end makes a request to send a request process; after receiving the request, the service end automatically generates a configuration architecture file in real time and returns a response format (including the generated configuration architecture file or addresses thereof). The file is encrypted or decrypted in the processes of both requesting and returning.

Description

The dynamic framework generation technique of XML
One, technical field
The present invention relates to a kind of data generation technique; Relate to a kind of can be with the dynamic generation technique of XML framework of realizing between different business kind, different mobile platform such as Iphone, Android, Symbian, the Windows Mobile etc. that mobile Internet data is related, with the file generation technique of the final configuration frame file of automatic generation.
Two, background technology
The present invention is directed to the uncurrent problem of configuration frame form between different business kind, different mobile platform such as Iphone, Android, Symbian, the Windows Mobile etc.; A kind of processing method of dynamic generation configuration frame is disclosed; Adopt unified interface and consolidation formization dynamically to generate configuration frame, realize the dynamic auto generation of configuration frame.
Three, summary of the invention
1, goal of the invention:
The present invention is directed to each professional different unfixing and uncurrent problem of configuration frame form of configurable framework that generate, disclose a kind of processing method of dynamic generation configuration frame.
2, technical solution:
Adopt unified interface and consolidation formization dynamically to generate configuration frame, realize the dynamic auto generation and the encryption of configuration frame.A request process is sent in professional end request, after service end is accepted, generates a configuration frame file in real time automatically, returns response format (wherein comprising the configuration frame file or the file address that have generated).Request and all encrypt or decipher when returning.
3, description of drawings:
Fig. 1 is unitized interface schema, is before the different platform terminal request data data uniform format interface to be handled description figure.
Fig. 2 is database distribution service and query graph, is database to be carried out the distribution service request of data, the description figure that database is handled on request through the unitized back of interface.
Fig. 3 is that the terminal inquiry result resolves feedback diagram, is the Business Processing description figure that from database, obtains turning back to behind the data result inquiry terminal according to terminal request.
Four, embodiment
The automatic generation technique of dynamic-configuration framework:
1. unified interfaceization:
1.2 request form interface:
Request package is an eXtensible Markup Language document, is sent by the XMLHttpRequest object with the post mode.(XML is called for short in the back)
Produce mess code down for fear of different coding, the text among this xml should and can not use the String form to create with the DOM establishment.Directly write out the data that the element of xml containing element name all must provide for all request package.
1.2 feedback response bag:
Respond packet is an xml document that structure is good.
Mess code under the different coding, the text among this xml should be created and can not use the String form to create with DOM.
When operation failure, can return the numerical value of appointing according to the different business difference.(example: successfully return 0, get nowhere and return 1).
2. distribution service and inquiry:
2.1 setting up database connects:
Set up each and show needed table space, adopt the SQL hardware standard according to the equipment otherness.Authorize for database inside search access right.Be connected to database.(set up the relevant inquiring table space.)
2.2 querying service database:
Carry out the optimization that dichotomy (dichotomy) and Hash (Hash) mutually combine for each business demand data of needs inquiries.Thereby reach the accurate matching of input data, shorten the inquiry institute purpose of service time.
Dichotomy:
Binary chop is claimed binary search again, and it is the higher lookup method of a kind of efficient.
Binary chop requires: linear list is an ordered list, and promptly node is according to keywords orderly in the table, and will use the storage organization of vector as table.Might as well establish ordered list increases progressively orderly.
Hash:
HASH is mainly used in AES in the information security field; It changes into 128 mixed and disorderly coding to the information of some different lengths; These encoded radios are called the HASH value. we can say that also hash is exactly the mapping relations that find between a kind of data content and the deposit data address.
2.3 verification msg correctness:
Data are carried out secondary checksum verification data correctness by the MD5 mode once more.
MD5: to the concise and to the point narration of MD5 algorithm can for: MD5 handles the information of input with 512 groupings; And each divides into groups to be divided into again 16 32 seats and divides into groups; After having passed through a series of processing; The output of algorithm is formed by four 32, with generating 128 hashed values after these four 32 packet concatenation.
2.4 inner debugging mechanism:
When connection or optimization or validation failure, internal server equipment forms daily record (LogData) with the numbering of the timing error of automatic misregistration generation.Convenient inquiry, and can start corresponding inner debugging mechanism, repair frequent fault, guarantee data query stability and robustness.
2.5 ISN conversion:
According to the different language requirement of information flow ISSUER platform, the unified UTF8 ISN form that adopts.When outputing to presentation layer, can reduce the occurrence frequency of mess code, accomplish optimization output and the effect that improves delivery efficiency.
UTF8:UTF-8 is that a kind of elongated character code of UNICODE is claimed ten thousand country codes again, is created in 1992 by Ken Thompson.Be standardized as RFC 3629 now.UTF-8 is with 1 to 6 byte code UNICODE character.Being used in can the simplified traditional font of same page Chinese display and other language (like Japanese, the Korean) on the webpage
2.6 acquisition Query Result:
Character information data stream after will passing through verification and changing turns back on the target query terminal as Query Result.Adopt the mode of network or WIFI or other various wireless or wired (according to device requirements) to transmit.
3. the terminal inquiry result resolves feedback:
3.1 network measuring verification:
By the terminal inter-area traffic interarea is carried out parity check.(employing all be data flow to be regarded as 16 integers stream repeat stack and calculate.For calculate the check with, at first the check and field be changed to 0.Then, in the valid data scope each 16 carry out complement of one's summation, the result exists in check and the field, data length is that odd number is then mended a byte 0.After receiving data, equally each 16 figure place in the valid data scope are carried out the summation of the complement of one's.The recipient in computational process, comprised transmit leg exist in the stem check with, any mistake does not take place in stem in transmission course, recipient's result calculated should be complete 0 or complete 1.If the result is not complete 0 or complete 1, the expression error in data.)
3.2 output verification:
Whether the character that test will be exported is the UTF8 form, if not the UTF8 formatted request is made mistakes, inside then attempts using the mode of " 2.1 set up database connects " once more.(UTF8 explains and asks for an interview the conversion of 2.5 ISNs).
3.3 data transaction:
Adopt international eXtensible Markup Language mode to change traffic flow information, generate configuration frame in real time.
3.4 terminal output:
Configuration XML file is carried out the mode of feedback response bag carry out md5 encryption output.

Claims (2)

CN2011101046386A2011-04-262011-04-26Technology for generating dynamic XML frameworksPendingCN102761519A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2011101046386ACN102761519A (en)2011-04-262011-04-26Technology for generating dynamic XML frameworks

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2011101046386ACN102761519A (en)2011-04-262011-04-26Technology for generating dynamic XML frameworks

Publications (1)

Publication NumberPublication Date
CN102761519Atrue CN102761519A (en)2012-10-31

Family

ID=47055841

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2011101046386APendingCN102761519A (en)2011-04-262011-04-26Technology for generating dynamic XML frameworks

Country Status (1)

CountryLink
CN (1)CN102761519A (en)

Similar Documents

PublicationPublication DateTitle
US10802804B2 (en)File generation method, device, server, and storage medium
WO2022126966A1 (en)Interface parameter verification and conversion method and apparatus, and device and storage medium
US10057217B2 (en)System and method to secure sensitive content in a URI
CN111563109B (en)Radix statistics method, apparatus, system, device, and computer-readable storage medium
CN102810089B (en)Short link system and implementation method based on content
US10223550B2 (en)Generating canonical representations of JSON documents
CN106126722A (en)A kind of prefix compound tree based on checking and method for designing
CN109101504B (en)Log compression and indexing method
CN106210161A (en)A kind of short chain delivers a child into method and system
CN112817973A (en)Data processing method, data processing device, data processing equipment and storage medium
CN108090106A (en)Database conversion server and database conversion method thereof
AU2014315494B2 (en)Automatically generating certification documents
CN105574021A (en)Data compression method and device of database
CN104601554B (en)A kind of method for interchanging data and DEU data exchange unit
CN111782882A (en) A kind of TCP message conversion method, device, system and computer storage medium
CN107704554A (en)The method and its system that data high-speed based on MPP databases imports
US7761590B2 (en)Method, apparatus, mobile terminal and computer program product for converting from a first forms markup language to a second forms markup language
CN112835573A (en)Data query method and device, electronic equipment and storage medium
CN115775184A (en)Data processing method, device, equipment, storage medium and program product
US11297139B2 (en)Method and apparatus for client side encoding in a data processing system
CN110362560A (en)A method of without business major key data at storing data library duplicate removal
KR20120063387A (en)Device and method for generating sms message
CN102761519A (en)Technology for generating dynamic XML frameworks
CN111984958B (en)Authentication method supporting VNC double factors
CN104008191A (en)Data inquiring method

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
DD01Delivery of document by public notice

Addressee:Shanghai Zhenshi Information Technology Co., Ltd.

Document name:Notification that Application Deemed to be Withdrawn

C02Deemed withdrawal of patent application after publication (patent law 2001)
WD01Invention patent application deemed withdrawn after publication

Application publication date:20121031


[8]ページ先頭

©2009-2025 Movatter.jp