Request processing method, system and device

A request processing and service request technology, applied in the field of communication, can solve problems such as inefficiency and complex verification management, and achieve the effect of improving the efficiency of verification management and simplifying the complexity of verification management

Active Publication Date: 2015-05-20
GUANGZHOU HUADUO NETWORK TECH
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem of complex and inefficient authentication management of access devices in the above technologies, the embodiments of the present invention provide a request processing method, system and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request processing method, system and device
  • Request processing method, system and device
  • Request processing method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0068] Please refer to figure 1 , which shows a schematic structural diagram of an implementation environment involved in various embodiments of the present invention. The implementation environment includes: a service providing device 11 and at least one access device cluster 12 . Each access device cluster 12 includes a proxy device 13 and at least one access device 14 . in:

[0069] One access device cluster 12 may correspond to one service requester. For example, the service requester may be a third-party application, and the third-party application requests access to the service providing device 11 to obtain related services. For a service requester, it may have one or more access devices 14 . Different from the prior art, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a request processing method, system and device, which belongs to the technical field of communication. The method comprises the steps of receiving a service request transmitted by an access device by virtue of proxy equipment, wherein the proxy equipment and the access device belong the same access device group; forwarding the service request to service providing equipment by virtue of the proxy equipment; verifying whether the proxy equipment is trusty equipment or not after the service providing device receives the service request; generating a response message corresponding to the service request by virtue of the service providing device if the proxy equipment is the trusty device; transmitting the response message to the proxy equipment by virtue of the service providing device; forwarding the response message to the access device by virtue of the proxy equipment. By adopting the request processing method, the complexity and low efficiency problem of the verification management for the access device in the prior art can be solved; an effect for simplifying the verification management complexity and improving the verification management efficiency can be achieved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to a request processing method, system, and device. Background technique [0002] In network management, in order to improve the security of data transmission, it is usually necessary to perform security verification on access devices. [0003] Take the IP (Internet Protocol, Internet Protocol) address verification performed by the service provider on the access device of the service requester as an example. When the access device of the service requester needs to obtain related services from the service providing device of the service provider, the access device sends a service request to the service providing device. After receiving the service request sent by the access device, the service providing device obtains the IP address of the access device, and detects whether the IP address exists in the IP address whitelist. If the IP address of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0281H04L63/08
Inventor 曾维杰
Owner GUANGZHOU HUADUO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products