Access request shunting method and related equipment

An access request and request-end technology, applied in the computer field, can solve problems such as response timeout, no response, and reduced stability of the system to be accessed, and achieve the effect of improving stability

Pending Publication Date: 2020-11-10
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The amount of data in the access request of the system to be accessed is too large, which increases the pressure on the system to be accessed, causing the server to be prone to interruption, no response, response timeout, and long response time, etc., resulting in a decrease in the stability of the system to be accessed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request shunting method and related equipment
  • Access request shunting method and related equipment
  • Access request shunting method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] figure 1 It is a flow chart of the access request distribution method provided by Embodiment 1 of the present invention. The method for distributing access requests is applied to computer equipment, and is used for distributing access requests, balancing the access pressure of the systems to be accessed including multiple systems, and improving the stability of the systems to be accessed.

[0051] like figure 1 As shown, the access request distribution method includes:

[0052] 101. Receive a first access request from a requesting end.

[0053] The requesting end may include a mobile terminal or a PC terminal. The first access request of the mobile terminal may be received, or the first access request of the PC terminal may be received.

[0054] The first access request may include a type identifier, a service identifier, description information of the target data to be requested, and the like.

[0055]In a specific embodiment, when the requesting end needs multipl...

Embodiment 2

[0092] figure 2 It is a structural diagram of an access request distribution device provided in Embodiment 2 of the present invention. The access request distribution apparatus 20 is applied to computer equipment. The access request distribution device 20 is used to classify the objects to be supervised according to the indicators, so as to improve the accuracy of the classification results.

[0093] like figure 2 As shown, the device 20 for splitting access requests may include a first receiving module 201 , a judging module 202 , a determining module 203 , a returning module 204 , a second receiving module 205 , and a splitting module 206 .

[0094] The first receiving module 201 is configured to receive a first access request from a requesting end.

[0095] The requesting end may include a mobile terminal or a PC terminal. The first access request of the mobile terminal may be received, or the first access request of the PC terminal may be received.

[0096] The firs...

Embodiment 3

[0131] This embodiment provides a computer-readable storage medium, where computer-readable instructions are stored on the computer-readable storage medium, and when the computer-readable instructions are executed by a processor, the steps in the above embodiments of the access request distribution method are implemented, for example figure 1 Steps 101-106 shown:

[0132] 101. Receive a first access request from a requesting end;

[0133] 102. Determine the access type of the requesting end according to the first access request;

[0134] 103. When the access type of the requesting end is a webpage request, determine a target system from multiple systems according to the service identifier of the first access request;

[0135] 104. Return the COOKIE identifier to the requesting end through the target system, so that the requesting end stores the COOKIE identifier;

[0136] 105. Receive a second access request carrying the COOKIE identifier from the requesting end;

[0137] 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computers, and provides an access request shunting method and related equipment. The access request shunting method comprises the steps of receiving a first access request of a request end; judging the access type of the request end according to the first access request; when the access type of the request end is a webpage request, determining a target system from a plurality of systems according to the service identifier of the first access request; returning a COOKIE identifier to the request end through the target system, so that the request end stores the COOKIE identifier; receiving a second access request carrying a COOKIE identifier of the request end; and shunting the second access request to the target system according to the COOKIEidentifier in the second access request. The access request is shunted, the access pressure of a to-be-accessed system is balanced, and the stability of the to-be-accessed system is improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an access request distribution method, device, computer equipment and computer-readable storage medium. Background technique [0002] Currently, the systems to be accessed that provide access services include multiple systems. The data volume of the access request of the system to be accessed is too large, which increases the pressure of the system to be accessed, causing the server to be prone to problems such as interruption, no response, response timeout, and long response time, resulting in a decrease in the stability of the system to be accessed. [0003] How to improve the stability of the system to be accessed has become a problem to be solved. Contents of the invention [0004] In view of the above, it is necessary to propose an access request distribution method, device, computer equipment, and computer-readable storage medium, which can distribute access re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/953G06F16/955G06F16/958
CPCG06F16/953G06F16/955G06F16/958
Inventor 席维成
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products