Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Business processing method and device, electronic equipment and storage medium

A business processing and processor technology, applied in the Internet field, can solve the problems of pharmacy data duplication, system unreliability increase, time cost increase, etc., achieve deployment security, prevent a large number of malicious useless requests, and improve the effect of high availability

Pending Publication Date: 2022-04-26
挂号网(杭州)科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When the inpatient system is used in a clustered deployment process, there are scheduled tasks in the service that need to call information such as drug data, drug inventory, and inspection items from the external system. Tasks are executed simultaneously under multiple nodes at the same time, which will cause pharmacies in the hospital Duplicate drug catalog information appears in the data; and in a weak network environment, when the resident doctor checks the doctor's order, the form data is repeatedly submitted, and the medicines prescribed by the doctor's order have duplicate inspection items, which will also require a lot of medical staff costs to delete the duplication data, which in turn reduces the efficiency of personnel, increases time costs, and increases the unreliability of the system
[0003] Existing service-based cluster deployment: The common solution is to use the token token mechanism. When calling the service interface, first request the backend to generate a token, store the token in the cache redis-key and return it to the frontend, and the frontend submits the form The token needs to be carried on the Header to request the backend interface, which may cause the user to maliciously tamper with a large number of tokens and request the backend interface concurrently, resulting in excessive system load, a large number of useless keys in redis in a short period of time, and even cause the server to be unavailable
And the existing method based on annotation class is to intercept and verify the unique identifier before calling the method before the target method enters through the idea of ​​cutting, which also causes a large number of invalid unique identifiers in a short period of time, which cannot be customized. Componentized form, and cannot be quickly and efficiently integrated into engineering projects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business processing method and device, electronic equipment and storage medium
  • Business processing method and device, electronic equipment and storage medium
  • Business processing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0053] Like numbers and letters denote similar items in the following figures, so that once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance.

[0054] In this application, by obtaining the target business request, determine the idempotent function corresponding to the target business request, judge whether to obtain the lock corresponding to the target business request according to the idempotent function, if so, execute the business logic corresponding to the target business request; if not, return an exception information.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a business processing method and device, electronic equipment and a storage medium. The method comprises the following steps: acquiring a target business request; determining an idempotent function corresponding to the target service request, and judging whether a lock corresponding to the target service request is obtained or not according to the idempotent function; if yes, service logic corresponding to the target service request is executed; and if not, returning abnormal information. According to the method, a large number of malicious useless repeated requests can be prevented, and repeated submission of repeated form data caused by network jitter can be prevented, so that high availability, high expansibility, safety and the like of the system are efficiently improved, clustering deployment of the service system is safer, more concise and more stable, and the method and the device are based on configuration. And the service is quickly accessed to a service system without invasion.

Description

technical field [0001] The present application relates to the Internet field, and in particular to a business processing method and device, electronic equipment, and a storage medium. Background technique [0002] When the inpatient system is used in a clustered deployment process, there are scheduled tasks in the service that need to call information such as drug data, drug inventory, and inspection items from the external system. Tasks are executed simultaneously under multiple nodes at the same time, which will cause pharmacies in the hospital Duplicate drug catalog information appears in the data; and in a weak network environment, when the resident doctor checks the doctor's order, the form data is repeatedly submitted, and the medicines prescribed by the doctor's order have duplicate inspection items, which will also require a lot of medical staff costs to delete the duplication In turn, the efficiency of personnel is reduced, the cost of time is increased, and the unr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F16/23
CPCG06F21/552G06F16/2343
Inventor 童晶继
Owner 挂号网(杭州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products