Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50 results about "Proxy pattern" patented technology

In computer programming, the proxy pattern is a software design pattern. A proxy, in its most general form, is a class functioning as an interface to something else. The proxy could interface to anything: a network connection, a large object in memory, a file, or some other resource that is expensive or impossible to duplicate. In short, a proxy is a wrapper or agent object that is being called by the client to access the real serving object behind the scenes. Use of the proxy can simply be forwarding to the real object, or can provide additional logic. In the proxy, extra functionality can be provided, for example caching when operations on the real object are resource intensive, or checking preconditions before operations on the real object are invoked. For the client, usage of a proxy object is similar to using the real object, because both implement the same interface.

Data encryption/decryption and desensitization operation engine and working method thereof

The invention relates to a data encryption / decryption and desensitization operation engine, a working method thereof and a computer readable storage medium. The working method of the data encryption / decryption and desensitization operation engine comprises the following steps of: 10, intercepting SQL statements by an SDK client integrated to a business system, judging whether the SQL statements need to be rewritten or not according to a metadata configuration, directly sending requests to a database by the SQL statements not needing to be rewritten, and requesting a security service by the SQLstatements needing to be rewritten so as to be rewritten; 20, obtaining the SQL statements needing to be rewritten by the security service, completing SQL statement rewriting according to the metadata configuration, returning the rewritten SQL statements to the SDK client, and calling the rewritten SQL statements to initiate a request to the database by the SDK client; and 30, for the request involved in desensitization processing, taking a database expansion function as an RPC client to call an operation component of an RPC operation service so as to return a result. By using a client SDK mode, the business unavailability risk, caused by stability, of transparent data encryption gateway agency mode is avoided.
Owner:SHENZHEN TIANYUAN DIC INFORMATION TECH CO LTD

Internet of cards intelligent recharging management method

The invention relates to the technical field of communication, and provides an internet of cards intelligent recharging management method which comprises the following steps of S1, creating an Internet of cards recharging management system applied to an Internet of cards centralized management platform, the Internet of cards recharging management system comprising a system setting module, an Internet of cards state detection module, an Internet of cards configuration module and a recharging payment module; S2, setting the state of each Internet of card as a test period, a silencing period, a charging period, a stop period and a termination period; S3, detecting the current state of each Internet of card in real time by an Internet of cards state detection module, recharging the Internet ofcards according to the states, converting the recharging fee into corresponding flow, and recharging the flow into the Internet of cards; and S4, setting a platform recharging fee payment module andan agent recharging fee payment module in the recharging payment module. The internet of cards intelligent recharging management method solves the problems that the existing Internet of cards cannot effectively plan the card recharging data, so that the cost of selling the Internet of cards by a service provider is too high, and the agent modes of all levels and the benefit distribution managementcannot be generated, and the like.
Owner:福建省公田软件股份有限公司

Method for processing product application forms of cloud platform in multi-hierarchy agent mode

The invention relates to the technical field of public cloud, in particular to a method for processing product application forms of a cloud platform in a multi-hierarchy agent mode. The method comprises the steps that users submit product application forms in a public cloud sales platform; agents receive the application forms submitted by the users, the application forms agreed to be applied can directly pass audit, and the application forms not meeting the requirements can be refused to be applied and modification suggestions are fed back; if the agents cannot determine whether the application forms can be audited or not, the agents submit the application forms to a general agent, and the general agent determines whether the audit is passed or not; the application forms passing the audit enter a product delivery process; and the application forms not passing the audit are modified by the user and enters an application form process again. According to the method, the problems of application form processing disorder and non-timely response under the condition of relatively large agent scale are solved; and meanwhile, when the sub-agents are insufficiently familiar with G-Cloud platform resource conditions and cannot accurately judge whether the applications are authorized or not, the sub-agents can submit the application forms to the general agent for making a judgment.
Owner:G CLOUD TECH

Method and device for realizing authentication of interface calling party in dynamic proxy mode

The invention particularly relates to a method and a device for realizing authentication of an interface calling party in a dynamic proxy mode. According to the method and the device for realizing authentication of the interface calling party in the dynamic proxy mode. The method is characterized by firstly defining a service interface and an implementation class to realize the service interface, and rewriting and realizing a business logic method; then, defining a section abstract class, and rewriting business logic methods of starting, ending, exception, front enhancement and rear enhancement according to needs when the section abstract class is defined; creating a section class, configuring an entry point and enhancement in the section class, and verifying the identity of the caller; and finally, testing and generating a dynamic agent class. According to the method and the device for realizing authentication of the interface calling party in the dynamic proxy mode, non-intrusive code expansion is realized, the method can be enhanced under the condition of not modifying a source code, and meanwhile, proxy logic and business logic are mutually independent and are not coupled so that high reliability and high availability of system use and service provision are ensured.
Owner:INSPUR SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products