Abstract:
The invention provides a file transmitting method and system. The file transmitting method is used for a system comprising N network file systems, N file receiving and forwarding servers, N network access servers, N client servers and N backstage servers that are in a one-to-one correspondence with the network file systems, comprising: the backstage server sends a file transmitting request to the file receiving and forwarding server, the file transmitting request comprises information on the file sending party, the file destination party and the file to be transmitted; the file receiving and forwarding server verifies the legitimacy of the file transmitting request; if legitimate, a file is transmitted between the file sending party and the file destination party; otherwise, a response that prohibits the transmitting is generated and returned to the backstage server that initiated the request. With the invention, transmission of files can be realized.
Abstract:
The invention provides a file transmitting method and system. The file transmitting method is used for a system comprising N network file systems, N file receiving and forwarding servers, N network access servers, N client servers and N backstage servers that are in a one-to-one correspondence with the network file systems, comprising: the backstage server sends a file transmitting request to the file receiving and forwarding server, the file transmitting request comprises information on the file sending party, the file destination party and the file to be transmitted; the file receiving and forwarding server verifies the legitimacy of the file transmitting request; if legitimate, a file is transmitted between the file sending party and the file destination party; otherwise, a response that prohibits the transmitting is generated and returned to the backstage server that initiated the request. With the invention, transmission of files can be realized.
Abstract:
The invention provides a file transmitting method and system. The file transmitting method is used for a system comprising N network file systems, N file receiving and forwarding servers, N network access servers, N client servers and N backstage servers that are in a one-to-one correspondence with the network file systems, comprising: the backstage server sends a file transmitting request to the file receiving and forwarding server, the file transmitting request comprises information on the file sending party, the file destination party and the file to be transmitted; the file receiving and forwarding server verifies the legitimacy of the file transmitting request; if legitimate, a file is transmitted between the file sending party and the file destination party; otherwise, a response that prohibits the transmitting is generated and returned to the backstage server that initiated the request. With the invention, transmission of files can be realized.
Abstract:
The present disclosure provides a method and a device for transaction clearing. The method includes receiving first clearing requests transmitted by a quantity N of terminals, where N>1; according to the first clearing requests, acquiring transaction data of the quantity N of terminals from a database; initializing a cache queue, and loading the transaction data into the cache queue; reading the transaction data in the cache queue, and performing a clearing process on the transaction data; and writing a clearing result into the database and feeding back the terminals with an execution result of the first clearing requests.
Abstract:
The invention provides an entrusted-authorization system and an entrusted-authorization method. The entrusted-authorization system comprises an accounting system, a switch module and an entrusted-authorization module, wherein the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system, the switch module is connected with the accounting system and the entrusted-authorization module for transmitting transaction request messages from the client terminal to the entrusted-authorization module for processing in case that the accounting system is unavailable, wherein the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system for processing. The transaction request messages comprise financial account information, financial institution information, transaction-initiation institution information and transaction amount. With the entrusted-authorization system and entrusted-authorization method of the invention, a normal processing of transaction request can be ensured when the accounting system is unavailable.
Abstract:
The present application discloses a method, an apparatus, a device for controlling traffic limitation and a storage medium, and belongs to the field of data processing. The method for controlling traffic limitation includes: acquiring, in response to a present request, a first timestamp of the present request; acquiring a pre-created traffic limitation instance, the traffic limitation instance including N storage blocks, a total number of instance requests, a traffic limitation request threshold number, an identifier of a storage block for a previous request, a second timestamp of the previous request and request waiting time; updating the traffic limitation instance based on a time interval between the first timestamp and the second timestamp, the unit time length, and the traffic limitation request threshold number; and determining whether to perform traffic limitation based on the request waiting time in the updated traffic limitation instance.
Abstract:
The present disclosure provides an application log coding output method, a device, a system, and a computer readable storage medium. The method comprises: loading a conversion appender using an extension mechanism of a native logger, loading a log converter and a native appender for outputting a log message using the conversion appender, the log converter comprising one or more log sub-converters, and loading the log sub-converters specified by an initialization parameter using the log converter; receiving the log message sent by the native logger using the conversion appender, scheduling the log sub-converters specified by the initialization parameter to execute log coding, and sending the processed log to the native appender for secure output. By using the method, diversified log coding output can be achieved without retrofitting an application, and the method is more friendly to developers.
Abstract:
Disclosed are a method and device for timeout monitoring, comprising: determining key information of a request message, the key information including a sending time of the request message; storing the key information to a first level cache; scanning the first level cache according to a set frequency, if the first level cache includes a first request message, storing the key information of the first request message into a second level cache, the first request message being a request message for which a reply message is not received; scanning the second level cache, and determining by a message log whether a reply message is received for a second request message in the second level cache, if not, the second request message times out, the second request message is a request message in which the difference value between a sending time and a current time is greater than a time-out threshold.
Abstract:
The present invention relates to a data processing system for providing business continuity protection, comprising: a business center comprising a first data processing unit, a first pre-communication unit, and at least a first post-communication unit; a disaster recovery center comprising a second data processing unit, a second pre-communication unit, and at least a second post-communication unit; wherein the first pre-communication unit and the second pre-communication unit are communicatively coupled to the first post-communication unit respectively when the business center operates normally; the first pre-communication unit and the second pre-communication unit are communicatively coupled to the second post-communication unit respectively when the disaster recovery center operates in place of the business center. The data processing system can reliably switch between the business center and the disaster recovery center, thereby providing a complete protection for the business continuity.
Abstract:
The invention provides an entrusted-authorization system and an entrusted-authorization method. The entrusted-authorization system comprises an accounting system, a switch module and an entrusted-authorization module, wherein the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system, the switch module is connected with the accounting system and the entrusted-authorization module for transmitting transaction request messages from the client terminal to the entrusted-authorization module for processing in case that the accounting system is unavailable, wherein the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system for processing. The transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount. With the entrusted-authorization system and entrusted-authorization method of the invention, a normal processing of transaction request can be ensured when the accounting system is unavailable.