Communication service data access system and method
A technology for data access and communication services, applied in the direction of transmission systems, electrical components, etc., can solve problems such as inability to separate, data processing functions/processing services cannot be performed normally, and difficult to promote, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] This embodiment provides as figure 1 The communication service data access system shown includes a browser 1, an aspect interception component 2, a business data module 3 and a cache layer 4, the browser is connected to the aspect interception component, and the aspect interception components are respectively connected to business data Module and caching layer.
[0023] This embodiment provides as figure 2 A communication service data access method shown, comprising steps:
[0024] S1. The browser obtains the user's access operation;
[0025] S2. The aspect interception component intercepts the user's data access request from the access operation, obtains the user's access authority from the cache layer, and reorganizes the data access request according to the access authority;
[0026] S3. The business data module reads and outputs response data to the browser according to the reorganized data access request.
Embodiment 2
[0028] This embodiment provides as image 3 A communication service data access framework shown includes a page (i.e. a browser), an aspect interception (i.e. an interceptor, which belongs to an aspect interception component and is used to specifically execute interception steps), a control layer (used to undertake an aspect interceptor, business layer and page), business layer (whose purpose is to process / process data, that is, a collection of business execution unit and request filtering unit), data access layer (whose purpose is to exchange data with the database) and database (data storage unit).
[0029] The specific process of the framework includes:
[0030] 1. The user accesses the system through the browser and passes the query parameter object (in fact, the browser provides a variety of functions for the user to access, and the query data is only a part of it. Correspondingly, the purpose of the section interception is to intercept the client's access to the browser....
Embodiment 3
[0042] This example serves to illustrate the preferred solution.
[0043] Such as Figure 4 shown in figure 1 The preferred communication service data access system based on the above-mentioned method includes a browser 1, an aspect interception component 2, a business data module 3 and a cache layer 4, the browser is connected to the aspect interception component, and the aspect interception component is respectively connected to the business data Module and Cache Layer, Cache Layer Connection Permissions Configuration Unit 5.
[0044] Among them, the purpose of the permission configuration unit is to allow people with permission management capabilities to arrange permissions. User permissions are specifically used to limit the types of business execution (different departments require different processing methods, that is, business), the data of the accessed data Type (same as above) and token of the user's permission (i.e. the code / encoding used to denote the permission). ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


