The present application relates to the field of distributed service technologies, and in particular, to a method and an apparatus for checking integrity of distributed service processing.
A distributed service system can flexibly and efficiently process services. Through distributed service processing, a conventional system can be split into a series of subsystems that are independent of each other and can be connected based on a relationship between services to complete overall processing of the services in parallel and coordinately. For example, currently, an e-commerce platform (such as the Alipay system), a localized searching service platform (such as 58.com), a membership registration and a marketing system, etc. all can flexibly process various services by using a distributed service system.
The membership registration and the marketing system are used as an example. Based on various functions related to a membership registration and a marketing service, different service subsystems can be included, such as registration page system A, membership registration system B, APP push system C, authentication association system D, marketing system E, short message system H, and email system I. As shown in
S1: Registration page system A receives a membership registration and a marketing request (assuming that a service serial number of the request is No. 001).
The membership registration and the marketing request can be the request that is sent by a front-end server to registration page system A in the distributed service system after the server receives a registration request sent by a client.
S2: Registration page system A parses the related membership registration data corresponding to the membership registration and the marketing request to perform corresponding service processing. When determining that the related membership registration data corresponding to the membership registration and the marketing request satisfies service condition 1, system A sends the related membership registration data corresponding to the membership registration and the marketing request to membership registration system B corresponding to service condition 1; or if the data satisfies service condition 2, system A sends the data to APP push system C corresponding to service condition 2.
For example, service condition 1 is new registration and service condition 2 is registration by using a mobile phone.
S3: Membership registration system B parses the related membership registration data corresponding to the membership registration and the marketing request to perform corresponding service processing. When determining that the related membership registration data that is corresponding to the membership registration and the marketing request, obtained through parsing, satisfies service condition 3, system B sends the data to authentication association system D; or if the data satisfies service condition 4, system B sends the data to marketing system E.
S4: Authentication association system D performs corresponding service processing based on the received data.
S5: Marketing system E parses the related membership registration data corresponding to the membership registration and the marketing request to perform corresponding service processing. When determining that the related membership registration data that is corresponding to the membership registration and the marketing request, obtained through parsing, satisfies service condition 5, system E sends the data to short message system H; or if the data satisfies service condition 6, system E sends the data to email system I.
S6: Short message system H and email system I separately perform corresponding service processing based on the received data.
Short message system H and email system I separately perform corresponding service processing based on the received data to complete a marketing task.
When a plurality of subsystems coordinately complete one service, factors such as a service constraint (for example, a red envelope does not satisfy a use condition or an account balance is insufficient) and a system fault (for example, a network or a system times out or a database constraint is not satisfied) may result in interruption of a distributed service processing process. The interruption causes inconsistency between data of some executed tasks and other data, and the inconsistency may seriously affect subsequent services. Therefore, to ensure data consistency, the integrity of distributed task processing needs to be checked.
In the existing technology, a method for checking integrity of distributed task processing is to record a service processing result of each service subsystem in a table, as shown in Table 1.
In the previous method, a relatively large amount of data is stored. Particularly, for a current large-sized Internet service, one service may trigger tens of subsystems to perform different subservice processing. As such, for one service flow, a table recording tens of pieces of data may be required. The storage amount is relatively large.
An objective of implementations of the present application is to provide a method and an apparatus for checking integrity of distributed service processing to reduce an amount of stored data.
To resolve the previous technical problem, the method and the apparatus for checking integrity of distributed service processing provided in the implementations of the present application are implemented as described below.
A method for checking integrity of distributed service processing is provided, where a distributed service system receives a service request and transfers the service request to subsequent service subsystems level by level based on a service condition. A service processing status of each service subsystem in the distributed system is monitored, and the method includes the following:
When an entry service subsystem receives the service request and needs to transfer the service request to a level-1 service subsystem, for each level-1 service subsystem that needs to be transferred, generating a joint identifier of the entry service subsystem and the level-1 service subsystem by the entry service subsystem, and performing exclusive OR processing on the generated joint identifiers to obtain a first check value.
After completing the process, record a joint identifier transferred from an upper-level service subsystem by each common service subsystem. For each lower-level service subsystem that the common service subsystem transfers the service request to, generate a joint identifier of the common service subsystem and the lower-level service subsystem that needs to be transferred. Each common service subsystem performs exclusive OR processing on the recorded joint identifier with the generated joint identifier and the first check value, and updates the first check value.
After completing the process, record a joint identifier transferred from an upper-level service subsystem by each leaf service subsystem, perform exclusive OR processing on the recorded joint identifier and the first check value by each leaf service subsystem, and update the first check value.
An apparatus for checking integrity of distributed service processing is provided, where a distributed service system receives a service request and transfers the service request to subsequent service subsystems level by level based on a service condition. The apparatus includes the following:
A monitoring unit, configured to monitor a service processing status of each service subsystem in the distributed system; a first generation unit, configured to generate a joint identifier of the entry service subsystem and the level-1 service subsystem when an entry service subsystem receives the service request and needs to transfer the service request to a level-1 service subsystem, for each level-1 service subsystem that needs to be transferred.
A first exclusive OR unit, configured to perform exclusive OR processing on the joint identifiers generated by the first generation unit to obtain a first check value; a recording unit, configured to record a joint identifier transferred from an upper-level service subsystem after each service subsystem completes the process; a second generation unit, configured to generate a joint identifier of the common service subsystem and the lower-level service subsystem that needs to be transferred for each lower-level service subsystem that needs to transfer the service request to a common service subsystem needs to transfer the service request; and a second exclusive OR unit, configured to perform exclusive OR processing on the joint identifier recorded by each common service subsystem, the joint identifier generated by each common service subsystem, and the first check value, and update the first check value; moreover, perform exclusive OR processing on a joint identifier recorded by each leaf service subsystem and the first check value, and update the first check value.
A method for checking integrity of distributed service processing is provided; where when transferring a service request to a lower-level service subsystem, any service subsystem in a distributed system generates a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred. When completing the process, any service subsystem in the distributed system records a joint identifier transferred from an upper-level service subsystem to the service subsystem; and the method includes the following: by an entry service subsystem, performing exclusive OR processing on a joint identifier generated by the service subsystem to obtain a check value; and by each level of service subsystem other than the entry service subsystem, performing exclusive OR processing on a joint identifier recorded by the service subsystem, a joint identifier generated by the service subsystem, and a check value of an upper-level service subsystem to obtain a final check value.
An apparatus for checking integrity of distributed service processing is provided, including the following: a third generation unit, configured to generate a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred when any service subsystem in a distributed system transfers a service request to a lower-level service subsystem; a recording unit, configured to record a joint identifier transferred from an upper-level service subsystem to the service subsystem when any service subsystem in the distributed system completes the process; a third exclusive OR unit, configured to perform exclusive OR processing on a joint identifier generated by an entry service subsystem to obtain a check value; and a fourth exclusive OR unit, configured to perform exclusive OR processing on a joint identifier recorded by each level of service subsystem other than the entry service subsystem, a joint identifier generated by the service subsystem other than the entry service subsystem, and a check value of an upper-level service subsystem to obtain a final check value.
A method for checking integrity of distributed service processing is provided, where when transferring a service request to a lower-level service subsystem, each service subsystem in a distributed system generates a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred. When completing the process, each service subsystem in the distributed system records a joint identifier transferred from an upper-level service subsystem; and the method includes the following: performing exclusive OR processing on the joint identifiers recorded by all the service subsystems and the joint identifiers generated by all the service subsystems to obtain a final check value.
An apparatus for checking integrity of distributed service processing is provided, including the following: a fourth generation unit, configured to generate a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred when each service subsystem in a distributed system transfers a service request to a lower-level service subsystem; a recording unit, configured to record a joint identifier transferred from an upper-level service subsystem to the service subsystem when any service subsystem in the distributed system completes the process; and a seventh exclusive OR unit, configured to perform exclusive OR processing on the joint identifiers recorded by all the service subsystems and the joint identifiers generated by all the service subsystems to obtain a final check value.
In the implementations of the present application, it can be learned from the technical solutions provided in the implementations of the present application that, unlike the existing technology, there is no need to record each service subsystem by using a very large table. Instead, an exclusive OR operation is performed based on a rule so that a service processing status of the distributed system can be stored by using relatively small space.
To describe the technical solutions in the implementations of the present application or in the existing technology more clearly, the following briefly describes the accompanying drawings required for describing the implementations or the existing technology. Apparently, the accompanying drawings in the following description merely show some implementations of the present application, and a person of ordinary skill in the art can still derive other drawings from these accompanying drawings without creative efforts.
Implementations of the present application provide a method and an apparatus for checking integrity of distributed service processing.
To enable a person skilled in the art to better understand the technical solutions in the present application, the following describes the technical solutions in the implementations of the present application with reference to the accompanying drawings. The described implementations are merely some but not all of the implementations of the present application. All other implementations obtained by a person of ordinary skill in the art based on the implementations of the present application without creative efforts shall fall within the protection scope of the present application.
The present application provides an implementation of a method for checking integrity of distributed service processing. The following describes the implementation of the present application in detail with reference to
In the distributed system, the level-1 service subsystem to a level-n service subsystem can be set as a common service subsystem and a leaf service subsystem, other than the entry service subsystem. The common service subsystem can have a service connection to an upper-level service subsystem and have a service connection to a lower-level service subsystem. The leaf service subsystem can have a service connection to only an upper-level service subsystem and have no lower-level service subsystem with the leaf service subsystem service connection.
In
System P in a block represents another distributed system. Generally, a network service provider that provides an integrated service can have a plurality of distributed service systems to process different services.
The present application provides an implementation of a method for checking integrity of distributed service processing. A process can be shown in
S310: A distributed service system receives a service request and transfers the service request to subsequent service subsystems level by level based on a service condition.
For example, as shown in
S1: Registration page system A receives a membership registration and a marketing request (assuming that a service serial number of the request is No. 001).
The membership registration and the marketing request can be the request that is sent by a front-end server to registration page system A in the distributed service system after the server receives a registration request sent by a client.
S2: Registration page system A parses the related membership registration data corresponding to the membership registration and the marketing request to perform corresponding service processing. When determining that the related membership registration data corresponding to the membership registration and the marketing request satisfies service condition 1, system A sends the related membership registration data corresponding to the membership registration and the marketing request to membership registration system B corresponding to service condition 1; or if the data satisfies service condition 2, system A sends the data to APP push system C corresponding to service condition 2.
For example, service condition 1 is new registration and service condition 2 is registration by using a mobile phone.
S3: Membership registration system B parses the related membership registration data corresponding to the membership registration and the marketing request to perform corresponding service processing. When determining that the related membership registration data that is corresponding to the membership registration and the marketing request, obtained through parsing, satisfies service condition 3, system B sends the data to authentication association system D; or if the data satisfies service condition 4, system B sends the data to marketing system E.
S4: Authentication association system D performs corresponding service processing based on the received data.
S5: Marketing system E parses the related membership registration data corresponding to the membership registration and the marketing request to perform corresponding service processing. When determining that the related membership registration data that is corresponding to the membership registration and the marketing request, obtained through parsing, satisfies service condition 5, system E sends the data to short message system H; or if the data satisfies service condition 6, system E sends the data to email system I.
S6: Short message system H and email system I separately perform corresponding service processing based on the received data.
Short message system H and email system I separately perform corresponding service processing based on the received data to complete a marketing task.
In the previous process, registration page system A is an entry service subsystem; membership registration system B, APP push system C, and marketing system E are intermediate service subsystems; and authentication association system D, short message system H, and email system I are leaf service subsystems. Membership registration system B and APP push system C are level-1 service subsystems; authentication association system D and marketing system E are level-2 service subsystems; and short message system H and email system I are level-3 service subsystems.
S320: When an entry service subsystem receives the service request and needs to transfer the service request to a level-1 service subsystem, for each level-1 service subsystem that needs to be transferred, the entry service subsystem generates a joint identifier of the entry service subsystem and the level-1 service subsystem, and performs exclusive OR processing on the generated joint identifiers to obtain a first check value.
Here, for ease of understanding, if the distributed service system is an example of membership marketing system, the entry service subsystem is an example of registration page system A, and correspondingly, the service processing request is an example of the membership registration and the marketing request.
In addition, the service request can have a service serial number, for example, No. 001.
After receiving the service request, the entry service subsystem can process the service request and can transfer related data to the level-1 service subsystem based on a predetermined service condition. Here, the level-1 service subsystem is an example of membership registration system B and APP push system C shown in
For each level-1 service subsystem that needs to be transferred, the joint identifier of the entry service subsystem and each level-1 service subsystem is generated. For example, for membership registration system B, the joint identifier of the entry service subsystem and the level-1 service subsystem can be generated. That is, a joint identifier of registration page system A and membership registration system B is generated, for example, tokenAB. For APP push system C, the joint identifier of the entry service subsystem and the level-1 service subsystem can be generated. That is, a joint identifier of registration page system A and APP push system C is generated, for example, tokenAC.
Exclusive OR processing is performed on the joint identifiers of the entry service subsystem and all the level-1 service subsystems to obtain the first check value.
An exclusive OR processing rule in mathematical calculation is as follows:
a⊕a=0
a⊕0=a
a⊕(b⊕c)=(a{circle around (Γ)}b)⊕c
An exclusive OR result of a number and itself is 0, and an exclusive OR operator satisfies the associative law.
For example, the exclusive OR processing is performed on the joint identifier tokenAB generated for membership registration system B and the joint identifier tokenAC generated for APP push system C, and a result is tokenAB⊕tokenAC, where tokenAB⊕tokenAC is the first check value.
It should be noted that if each level-1 service subsystem that needs to be transferred includes only one first-level service subsystem, for example, in the example of
S330: After completing the process, each common service subsystem records a joint identifier transferred from an upper-level service subsystem. For each lower-level service subsystem that the common service subsystem transfers the service request to, generate a joint identifier of the common service subsystem and the lower-level service subsystem that needs to be transferred, and each common service subsystem performs exclusive OR processing on the recorded joint identifier with the generated joint identifier and the first check value, and updates the first check value. After completing the process, each leaf service subsystem records a joint identifier transferred from an upper-level service subsystem, and each leaf service subsystem performs exclusive OR processing on the recorded joint identifier and the first check value and updates the first check value.
After S320, the entry service subsystem can transfer the generated joint identifier to a corresponding level-1 service subsystem. With reference to
Still with reference to
For each lower-level subsystem that the common service subsystem transfers the service request to after completing the process, the common service subsystem generates the joint identifier of the common service subsystem and the lower-level service subsystem that needs to be transferred. Each lower-level subsystem that the common service subsystem transfers the service request to after completing the process can be each lower-level subsystem that the level-1 service subsystem needs to transfer, based on a predetermined rule, the service request to after completing the process.
With reference to
Each common service subsystem can perform exclusive OR processing on the recorded joint identifier with the generated joint identifier and the first check value, and update the first check value. For example, after completing corresponding processing, membership registration system B records the joint identifier tokenAB, and membership registration system B further generates the joint identifier tokenBD and the joint identifier tokenBE. Membership registration system B can perform exclusive OR processing on the recorded joint identifier with the generated joint identifier and the first check value. Specifically, the recorded joint identifier is tokenAB, the generated joint identifier is tokenBD and tokenBE, the first check value is tokenAB⊕tokenAC, and a result obtained after exclusive OR processing is performed on the recorded joint identifier with the generated joint identifier and the first check value is tokenAB⊕tokenBD⊕tokenBE⊕tokenAB⊕tokenAC=tokenBD⊕tokenBE⊕tokenAC. The first check value can be updated to the exclusive OR processing result.
In
For each level of service subsystem that needs to be transferred to, the previous processing can be repeated, until all service subsystems complete service processing or processing is terminated.
With reference to
For the level-2 service subsystems such as the authentication association system D and the marketing system E, the authentication association system D is a leaf service subsystem, and no longer transfers the service request to a lower-level subsystem after completing the process. The marketing system E is a common service subsystem, transfers the service request to a lower-level service subsystem after completing the process, that is, short message system H and email system I, and therefore generates a joint identifier tokenEH and a joint identifier tokenEI. Authentication association system D performs exclusive OR processing on the recorded joint identifier and the first check value, and updates the first check value, which is: tokenBD⊕tokenBD⊕tokenBE=tokenBE. Marketing system E performs exclusive OR processing on the recorded joint identifier with the generated joint identifier and the first check value, and updates the first check value, which is tokenBE⊕tokenEH⊕tokenEI⊕tokenBE=tokenEH⊕tokenEI.
For a level-3 service subsystem such as short message system H and email system I, both short message system H and email system I are leaf service subsystems. After completing the process, short message system H can record a joint identifier transferred from an upper-level service subsystem, that is, tokenEH transferred from marketing system E. Short message system H performs exclusive OR processing on the recorded joint identifier with the generated joint identifier and the first check value, and updates the first check value to tokenEH⊕tokenEH⊕tokenEI=tokenEI. After completing the process, email system I can record a joint identifier transferred from the upper-level service subsystem, that is, tokenEI transferred from marketing system E. Email system I performs exclusive OR processing on the recorded joint identifier with the generated joint identifier and the first check value, and updates the first check value to tokenEI⊕tokenEI=0.
If a distributed service system completes all processing on a service request, a final result is 0 based on the processing method in the previous implementation of the present application. In other words, if the final check value obtained based on the previous method is 0, it indicates that the distributed service system completes all processing on the service request.
Based on the previous processing, assuming that short message system H does not complete processing, an integrity checking apparatus does not record the joint identifier EH transferred from the upper-level service subsystem to short message system H, and based on the previous processing method, a final result is tokenEI⊕tokenEH⊕tokenEI, that is, tokenEH. The result can indicate that the distributed system terminates processing at the short message system H, which may be because the service request is not transferred to service subsystem H or service subsystem H does not complete processing. Existence of the joint identifier tokenEH indicates that service subsystem E has generated at least the joint identifier of service subsystem E and service subsystem H that the service request needs to be transferred to. In other words, the final check value obtained based on the previous method is a joint identifier. If the final result is a joint identifier, a service subsystem corresponding to the last identifier in the joint identifier does not complete service processing, that is, a service subsystem in which the distributed service system terminates processing of the service request.
Similarly, if the final result is two or more joint identifiers, a service subsystem corresponding to the last identifier in each joint identifier that has not completed service processing. For example, if the final result is tokenEH⊕tokenEI, that is, there are two joint identifiers, the last H in the first joint identifier EH indicates that the service subsystem H has not complete service processing, and the last I in the second joint identifier EI indicates that the email system I has not complete service processing.
With reference to
After completing corresponding processing, membership registration system B records the received tokenAB. After completing corresponding processing, APP push system C records the received tokenAC. Membership registration system B generates tokenBD and tokenBE, transfers the generated tokenBD and tokenBE respectively to authentication association system D and marketing system E, and obtains a second check value tokenAB⊕tokenAC⊕tokenBD⊕tokenBE⊕tokenAB⊕tokenAC=tokenBD⊕tokenBE.
Assuming that authentication association system D completes the process, authentication association system D records the joint identifier tokenBD transferred from the upper-level service subsystem to authentication association system D. Assuming that marketing system E does not complete processing, marketing system E does not record tokenBE. Because marketing system E does not complete processing, marketing system E does not generate tokenEH and tokenEI, and obtains a third check value: tokenBD⊕tokenBD⊕tokenBE=tokenBE.
The previous result indicates that service processing in the distributed service system terminates processing at marketing system E.
After obtaining the processing result BE of the distributed service system, a related system can perform corresponding subsequent service processing, for example, check and remove a fault of marketing system E, or restart service processing of marketing system E.
The previous example shows only a distributed system having one entry service subsystem and three levels of service subsystems, and an actual distributed service system may have dozens or hundreds of service subsystem levels. In the method provided in this implementation of the present application, unlike the existing technology, there is no need to record each service subsystem by using a very large table. Instead, an exclusive OR operation is performed based on a rule so that a service processing status of the distributed system can be stored by using relatively small space.
In addition, there is a synchronous calling processing method in the existing technology. In the existing technology, all calling chains of upper-level service subsystems for lower-level service subsystems shown in
However, in the solutions of the previous implementation of the present application, a service processing status of the distributed system can be checked in a timely manner. Synchronous processing is not needed, so a service processing time is not prolonged, user experience is not affected, and an overall throughput of the system is not affected.
The present application further provides an implementation of an apparatus for checking integrity of distributed service processing, including the following: a monitoring unit, configured to monitor a service processing status of each service subsystem in a distributed system; a first generation unit, configured to generate a joint identifier of the entry service subsystem and the level-1 service subsystem when an entry service subsystem receives a service request and needs to transfer the service request to a level-1 service subsystem, for each level-1 service subsystem that needs to be transferred to; a first exclusive OR unit, configured to perform exclusive OR processing on the joint identifiers generated by the first generation unit to obtain a first check value; a recording unit, configured to record a joint identifier transferred from an upper-level service subsystem after each service subsystem completes the process; a second generation unit, configured to generate a joint identifier of the subsystem and the lower-level subsystem for each lower-level subsystem that the service subsystem needs to transfer the service request to after completing the process; and a second exclusive OR unit, configured to perform exclusive OR processing on the joint identifier recorded by the recording unit, the joint identifier generated by the second generation unit, and a first check value obtained last time to obtain a new check value.
Preferably, the apparatus is disposed inside or outside the distributed system.
Preferably, the service request has a serial number.
Preferably, the joint identifier includes identifiers of combined service subsystems.
Preferably, the recording unit does not record a joint identifier transferred from an upper-level service subsystem to a service subsystem that does not complete processing.
The following describes an implementation of another method for checking integrity of distributed service processing in the present application. In this implementation, when each service subsystem in a distributed system transfers a service request to a lower-level service subsystem, an integrity checking apparatus generates a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred; when each service subsystem in the distributed system completes the process, the integrity checking apparatus records a joint identifier transferred from an upper-level service subsystem. The method includes the following: by the integrity checking apparatus, performing exclusive OR processing on a joint identifier generated by an entry service subsystem to obtain a check value; and by the integrity checking apparatus, performing exclusive OR processing on a joint identifier recorded by each level of service subsystem other than the entry service subsystem, a joint identifier generated by the service subsystem other than the entry service subsystem, and a check value of an upper-level service subsystem to obtain a final check value.
Particularly, the last level of service subsystem is usually a leaf service subsystem, and does not generate a joint identifier. In this case, it can be considered that a generated joint identifier is 0, and considering the previous exclusive OR operation, if 0 is used in the exclusive OR operation, an operation result is not affected.
The implementations in this specification are all described progressively. For same or similar parts in the implementations, refer to these implementations mutually. Each implementation focuses on a difference from other implementations. Particularly, a system implementation is similar to a method implementation, and therefore, is described briefly. For related parts, refer to related descriptions in the method implementation.
The following describes an implementation of another apparatus for checking integrity of distributed service processing in the present application, including the following: a third generation unit, configured to generate a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred when any service subsystem in a distributed system transfers a service request to a lower-level service subsystem; a recording unit, configured to record a joint identifier transferred from an upper-level service subsystem to the service subsystem when any service subsystem in the distributed system completes the process; a third exclusive OR unit, configured to perform exclusive OR processing on a joint identifier generated by an entry service subsystem to obtain a check value; and a fourth exclusive OR unit, configured to perform exclusive OR processing on a joint identifier recorded by each level of service subsystem other than the entry service subsystem, a joint identifier generated by the service subsystem other than the entry service subsystem, and a check value of an upper-level service subsystem to obtain a final check value.
The following describes an implementation of a method for checking integrity of distributed service processing in the present application. When transferring a service request to a lower-level service subsystem, each service subsystem in a distributed system generates a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred. When completing the process, each service subsystem in the distributed system records a joint identifier transferred from an upper-level service subsystem; and the method includes the following: performing exclusive OR processing on the joint identifiers recorded by all the service subsystems and the joint identifiers generated by all the service subsystems to obtain a final check value.
For example, for a service request whose serial number is No. 001, an entry service subsystem generates a joint identifier tokenAB and a joint identifier tokenAC that are to be transferred to a lower-level service subsystem; after completing the process, service subsystem B records the joint identifier tokenAB received by service subsystem B. After completing the process, service subsystem C records the joint identifier tokenAC received by service subsystem C; service subsystem B generates a joint identifier tokenBD and a joint identifier tokenBE that are to be transferred to a lower-level service subsystem. After completing the process, service subsystem D records the joint identifier tokenBD received by service subsystem D; after completing the process, service subsystem E records the joint identifier tokenBE received by service subsystem E; service subsystem E generates a joint identifier tokenEH and a joint identifier tokenEI that are to be transferred to a lower-level service subsystem. After completing the process, service subsystem H records the joint identifier tokenEH received by service subsystem H; and after completing the process, service subsystem I records the joint identifier tokenEI received by service subsystem I.
Assuming that each level of service subsystem completes the process, the exclusive OR processing is performed on the joint identifier generated by the entry service subsystem, the joint identifier recorded by each level of service subsystem other than the entry service subsystem, and the joint identifier generated by the service subsystem other than the entry service subsystem, to obtain the following final check result tokenAB⊕tokenAC⊕tokenAB⊕tokenAC⊕tokenBD⊕tokenBE⊕tokenBD⊕tokenBE⊕tokenEH⊕tokenEI⊕tokenEH⊕tokenEI=0.
Similarly, based on the previous processing, assuming that short message system H does not complete processing, an integrity checking apparatus does not record the joint identifier EH transferred from the upper-level service subsystem to short message system H, and based on the previous processing method, the final result is tokenEH. The result can be used to indicate that the distributed system terminates processing at short message system H, that is, the service subsystem H does not complete processing.
The following describes an implementation of an apparatus for checking integrity of distributed service processing in the present application, including the following: a fourth generation unit, configured to generate a joint identifier of the service subsystem and the lower-level service subsystem that needs to be transferred when each service subsystem in a distributed system transfers a service request to a lower-level service subsystem; a recording unit, configured to record a joint identifier transferred from an upper-level service subsystem to the service subsystem when any service subsystem in the distributed system completes the process; and a seventh exclusive OR unit, configured to perform exclusive OR processing on the joint identifiers recorded by all the service subsystems and the joint identifiers generated by all the service subsystems to obtain a final check value.
In the 1990s, whether technology improvement is hardware improvement (for example, improvement of a circuit structure, such as a diode, a transistor, or a switch) or software improvement (improvement of a method procedure) can be obviously distinguished. However, as technologies develop, the current improvement for many method procedures can be considered as a direct improvement of a hardware circuit structure. A designer usually programs an improved method procedure to a hardware circuit, to obtain a corresponding hardware circuit structure. Therefore, a method procedure can be improved by using a hardware entity module. For example, a programmable logic device (PLD) (for example, a field programmable gate array (FPGA)) is such an integrated circuit, and a logical function of the PLD is determined by a user through device programming. The designer performs programming to “integrate” a digital system to a PLD without requesting a chip manufacturer to design and produce an application-specific integrated circuit chip. In addition, the programming is mostly implemented by using “logic compiler” software instead of manually making an integrated circuit chip. This is similar to a software compiler used for program development and compiling. However, original code before compiling is also written in a specific programming language, which is referred to as a hardware description language (HDL). There are many HDLs, such as an Advanced Boolean Expression Language (ABEL), an Altera Hardware Description Language (AHDL), Confluence, a Cornell University Programming Language (CUPL), HDCal, a Java Hardware Description Language (JHDL), Lava, Lola, MyHDL, PALASM, and a Ruby Hardware Description Language (RHDL). Currently, a Very-High-Speed Integrated Circuit Hardware Description Language (VHDL) and Verilog are most commonly used. A person skilled in the art should also understand that a hardware circuit that implements a logical method procedure can be readily obtained once the method procedure is logically programmed by using the several described hardware description languages and is programmed into an integrated circuit.
A controller can be implemented in any appropriate manner. For example, the controller can be a microprocessor, a processor, or a computer readable medium, a logic gate, a switch, an application-specific integrated circuit (ASIC), a programmable logic controller, or an embedded microcontroller that stores computer readable program code (for example, software or firmware) that can be executed by the processor (or the microprocessor). Examples of the controller include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, or Silicon Labs C8051F320. A memory controller can also be implemented as a part of control logic of the memory. A person skilled in the art also knows that a controller can be implemented in a manner of pure computer readable program code, and the steps in the method can be logically programmed to enable the controller to implement same functions in forms of a logical gate, a switch, an application-specific integrated circuit, a programmable logic controller, an embedded microcontroller, etc. Therefore, the controller can be considered as a hardware component, and an apparatus configured to implement various functions in the controller can also be considered as a structure in a hardware component. Alternatively, an apparatus configured to implement various functions can be considered as a software module that can implement the method or a structure in a hardware component.
The system, apparatus, module, or unit illustrated in the previous implementations can be implemented by using a computer chip or an entity, or can be implemented by using a product having a certain function.
For ease of description, the described apparatus is described by dividing functions into various units. Certainly, when the present application is implemented, the functions of each unit can be implemented in one or more pieces of software and/or hardware.
A person skilled in the art should understand that the implementations of the present disclosure can be provided as a method, a system, or a computer program product. Therefore, the present disclosure can use a form of hardware only implementations, software only implementations, or implementations with a combination of software and hardware. In addition, the present disclosure can use a form of a computer program product implemented on one or more computer-usable storage media (including but not limited to a magnetic disk memory, a compact disc read-only memory (CD-ROM), and an optical memory) that include computer-usable program code.
The present disclosure is described with reference to the flowcharts and/or block diagrams of the method, the device (system), and the computer program product based on the implementations of the present disclosure. It should be understood that computer program instructions can be used to implement each procedure and/or each block in the flowcharts and/or the block diagrams and a combination of a procedure and/or a block in the flowcharts and/or the block diagrams. These computer program instructions can be provided for a general-purpose computer, a dedicated computer, an embedded processor, or a processor of another programmable data processing device to generate a machine, so that the instructions are executed by the computer or the processor of another programmable data processing device to generate an apparatus for implementing a specified function in one or more procedures in the flowcharts and/or in one or more blocks in the block diagrams.
These computer program instructions can be stored in a computer readable memory that can instruct the computer or another programmable data processing device to work in a particular way, so that the instructions stored in the computer readable memory generate an artifact that includes an instruction apparatus. The instruction apparatus implements a particular function in one or more procedures in the flowcharts and/or in one or more blocks in the block diagrams.
These computer program instructions can be loaded to a computer or another programmable data processing device, so that a series of operations and steps are performed on the computer or another programmable device to generate computer-implemented processing. Therefore, the instructions executed on the computer or another programmable device provide steps for implementing a specified function in one or more procedures in the flowcharts and/or in one or more blocks in the block diagrams.
In a typical configuration, a computing device includes one or more processors (CPU), an input/output interface, a network interface, and a memory.
The memory can include a volatile memory, a random access memory (RAM), and/or a nonvolatile memory, etc. in a computer readable medium, such as a read-only memory (ROM) or a flash memory. The memory is an example of the computer readable medium.
The computer readable medium includes persistent, non-persistent, movable, and unmovable media that can store information by using any method or technology. The information can be a computer readable instruction, a data structure, a program module, or other data. Examples of a computer storage medium include but are not limited to a phase change RAM (PRAM), a static RAM (SRAM), a dynamic RAM (DRAM), a RAM of another type, a ROM, an electrically erasable programmable read-only memory (EEPROM), a flash memory or another memory technology, a compact disc read-only memory (CD-ROM), a digital versatile disc (DVD) or another optical storage, a magnetic tape, a magnetic disk storage, another magnetic storage device, or any other non-transmission medium. The computer storage medium can be used to store information that can be accessed by a computing device. As described in the present application, the computer readable medium does not include transitory media, for example, a modulated data signal and a carrier.
It should be further noted that, the term “include”, “comprise”, or any other variant is intended to cover non-exclusive inclusion, so that a process, a method, a commodity, or a device that includes a series of elements not only includes these elements, but also includes other elements that are not expressly listed, or further includes elements inherent to such a process, method, commodity, or device. An element preceded by “includes a . . . ” does not, without more constraints, exclude the existence of additional identical elements in the process, method, commodity, or device that includes the element.
A person skilled in the art should understand that the implementations of the present application can be provided as a method, a system, or a computer program product. Therefore, the present application can use a form of hardware only implementations, software only implementations, or implementations with a combination of software and hardware. In addition, the present application can use a form of a computer program product implemented on one or more computer-usable storage media (including but not limited to a magnetic disk memory, a CD-ROM, and an optical memory) that include computer-usable program code.
The present application can be described in common contexts of computer executable instructions executed by a computer, such as a program module. Generally, the program module includes a routine, a program, an object, a component, a data structure, etc. executing a specific task or implementing a specific abstract data type. The present application can also be practiced in distributed computing environments. In these distributed computing environments, tasks are executed by remote processing devices that are connected by using a communications network. In the distributed computing environments, the program module can be located in local and remote computer storage media that include storage devices.
The implementations in the present application are described in a progressive way. For same or similar parts in the implementations, refer to the implementations. Each implementation focuses on a difference from other implementations. Particularly, a system implementation is similar to a method implementation, and therefore, is described briefly. For related parts, refer to related descriptions in the method implementation.
The previous descriptions are merely implementations of the present application and are not intended to limit the present application. A person skilled in the art can make various modifications and changes to the present application. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principle of the present application shall fall within the protection scope of the claims of the present application.
At 402, a service request is received at an entry service subsystem of a distributed service system. From 402, method 400 proceeds to 404.
At 404, the service request is transferred from the entry service subsystem to subsequent levels of service subsystems based on a service condition, wherein a service processing status of each subsequent service subsystem in the distributed system is monitored. From 404, method 400 proceeds to 406.
At 406, for each level-1 service subsystem satisfying the service condition, a level-1 joint identifier is generated comprising data associated with the entry service subsystem and the level-1 service subsystem. From 406, method 400 proceeds to 408.
At 408, the generated level-1 joint identifiers are processed to generate a first check value. From 408, method 400 proceeds to 410.
At 410, after the processing, the level-1 joint identifier transferred from, and corresponding to, an upper-level service subsystem is recorded with each common service subsystem. From 410, method 400 proceeds to 412.
At 412, for each lower-level service subsystem to which the common service subsystem transfers the service request, a lower-level joint identifier is generated comprising data associated with the common service subsystem and the lower-level service subsystem satisfying the service condition. From 412, method 400 proceeds to 414.
At 414, the recorded level-1 joint identifier, the generated lower-level joint identifiers, and the first check value are processed (for example, using an exclusive OR). From 414, method 400 proceeds to 416.
At 416, the first check value is updated for each lower-level service subsystem with the processing result. From 416, method 400 proceeds to 418.
At 418, each leaf service subsystem records a lower-level joint identifier transferred from, and corresponding to, a lower-level service subsystem. From 418, method 400 proceeds to 420.
At 420, each leaf service subsystem processes the recorded lower-level joint identifier and the first check value. From 420, method 400 proceeds to 422.
At 422, the first check value is updated for each leaf service subsystem with the processing result.
In some implementations, when transferring the service request to a lower-level service subsystem, any service subsystem in the distributed system generates a joint identifier of the service subsystem and the lower-level service subsystem satisfying the service condition. When completing the process, any service subsystem in the distributed system records a joint identifier transferred from an upper-level service subsystem to the service. Transferring the service request to a lower-level service subsystem further includes: processing, by an entry service subsystem and to obtain a check value, a joint identifier generated by the service subsystem and performing, by each level of service subsystems other than the entry service subsystem to obtain a final check value, processing of a joint identifier recorded by the service subsystem, a joint identifier generated by the service subsystem, and a check value of an upper-level service subsystem. In some implementations, if the final check value has a value of 0, the distributed service system is considered to have completed all processing on the received service request, or if the final check value is a joint identifier, a last identifier in the joint identifier indicates that a service subsystem corresponding to the identifier has not completed service processing and the joint identifier is not recorded.
In some implementations, when transferring the service request to a lower-level service subsystem, each service subsystem in the distributed system generates a joint identifier of the service subsystem and the lower-level service subsystem satisfying the service condition. When completing the process, each service subsystem in the distributed system records a joint identifier transferred from an upper-level service subsystem. Transferring the service request to a lower-level service subsystem further includes: processing, to obtain to obtain a final check value, the joint identifiers recorded by all of the service subsystems and the joint identifiers generated by all of the service subsystems. In some implementations, if the final check value has a value of 0, the distributed service system is considered to have completed all processing on the received service request, or if the final check value is a joint identifier, a last identifier in the joint identifier indicates that a service subsystem corresponding to the identifier has not completed service processing and the joint identifier is not recorded. After 422, method 400 ends.
A network service provider that provides an integrated service can have a plurality of distributed service systems to process different services. Implementations of the subject matter described in this specification can be implemented so as to realize particular advantages or technical effects. For example, the described subject matter can be used to verify the integrity and distributed service processing efficiency of a service. For example, internal relationships between portions of a service split to enhance distributed service processing efficiency can be used to enhance processing efficiency of the service.
The described integrity checking of distributed service processing methodology can ensure the efficient usage of computer resources (for example, processing cycles, network bandwidth, and memory usage). Integrity check of a distributed service can help prevent waste of available computer resources with respect to preventing undesired, invalid, or delayed transactions. Instead of users needing to perform multiple or repeated service transactions (for example, searches), service efficiency and integrity can be enhanced, increasing overall service/transaction speed, reducing data usage, and reducing network bandwidth, network congestion, computational cycles (for example, both on clients and servers), and data storage requirements (either persistent or transitory).
Embodiments and the operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification or in combinations of one or more of them. The operations can be implemented as operations performed by a data processing apparatus on data stored on one or more computer-readable storage devices or received from other sources. A data processing apparatus, computer, or computing device may encompass apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, a system on a chip, or multiple ones, or combinations, of the foregoing. The apparatus can include special purpose logic circuitry, for example, a central processing unit (CPU), a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC). The apparatus can also include code that creates an execution environment for the computer program in question, for example, code that constitutes processor firmware, a protocol stack, a database management system, an operating system (for example an operating system or a combination of operating systems), a cross-platform runtime environment, a virtual machine, or a combination of one or more of them. The apparatus and execution environment can realize various different computing model infrastructures, such as web services, distributed computing and grid computing infrastructures.
A computer program (also known, for example, as a program, software, software application, software module, software unit, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment. A program can be stored in a portion of a file that holds other programs or data (for example, one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (for example, files that store one or more modules, sub-programs, or portions of code). A computer program can be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
Processors for execution of a computer program include, by way of example, both general- and special-purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random-access memory or both. The essential elements of a computer are a processor for performing actions in accordance with instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data. A computer can be embedded in another device, for example, a mobile device, a personal digital assistant (PDA), a game console, a Global Positioning System (GPS) receiver, or a portable storage device. Devices suitable for storing computer program instructions and data include non-volatile memory, media and memory devices, including, by way of example, semiconductor memory devices, magnetic disks, and magneto-optical disks. The processor and the memory can be supplemented by, or incorporated in, special-purpose logic circuitry.
Mobile devices can include handsets, user equipment (UE), mobile telephones (for example, smartphones), tablets, wearable devices (for example, smart watches and smart eyeglasses), implanted devices within the human body (for example, biosensors, cochlear implants), or other types of mobile devices. The mobile devices can communicate wirelessly (for example, using radio frequency (RF) signals) to various communication networks (described below). The mobile devices can include sensors for determining characteristics of the mobile device's current environment. The sensors can include cameras, microphones, proximity sensors, GPS sensors, motion sensors, accelerometers, ambient light sensors, moisture sensors, gyroscopes, compasses, barometers, fingerprint sensors, facial recognition systems, RF sensors (for example, Wi-Fi and cellular radios), thermal sensors, or other types of sensors. For example, the cameras can include a forward- or rear-facing camera with movable or fixed lenses, a flash, an image sensor, and an image processor. The camera can be a megapixel camera capable of capturing details for facial and/or iris recognition. The camera along with a data processor and authentication information stored in memory or accessed remotely can form a facial recognition system. The facial recognition system or one-or-more sensors, for example, microphones, motion sensors, accelerometers, GPS sensors, or RF sensors, can be used for user authentication.
To provide for interaction with a user, embodiments can be implemented on a computer having a display device and an input device, for example, a liquid crystal display (LCD) or organic light-emitting diode (OLED)/virtual-reality (VR)/augmented-reality (AR) display for displaying information to the user and a touchscreen, keyboard, and a pointing device by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, for example, visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input. In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's client device in response to requests received from the web browser.
Embodiments can be implemented using computing devices interconnected by any form or medium of wireline or wireless digital data communication (or combination thereof), for example, a communication network. Examples of interconnected devices are a client and a server generally remote from each other that typically interact through a communication network. A client, for example, a mobile device, can carry out transactions itself, with a server, or through a server, for example, performing buy, sell, pay, give, send, or loan transactions, or authorizing the same. Such transactions may be in real time such that an action and a response are temporally proximate; for example an individual perceives the action and the response occurring substantially simultaneously, the time difference for a response following the individual's action is less than 1 millisecond (ms) or less than 1 second (s), or the response is without intentional delay taking into account processing limitations of the system.
Examples of communication networks include a local area network (LAN), a radio access network (RAN), a metropolitan area network (MAN), and a wide area network (WAN). The communication network can include all or a portion of the Internet, another communication network, or a combination of communication networks. Information can be transmitted on the communication network according to various protocols and standards, including Long Term Evolution (LTE), 5G, IEEE 802, Internet Protocol (IP), or other protocols or combinations of protocols. The communication network can transmit voice, video, biometric, or authentication data, or other information between the connected computing devices.
Features described as separate implementations may be implemented, in combination, in a single implementation, while features described as a single implementation may be implemented in multiple implementations, separately, or in any suitable sub-combination. Operations described and claimed in a particular order should not be understood as requiring that the particular order, nor that all illustrated operations must be performed (some operations can be optional). As appropriate, multitasking or parallel-processing (or a combination of multitasking and parallel-processing) can be performed.
| Number | Date | Country | Kind |
|---|---|---|---|
| 201610113586.1 | Feb 2016 | CN | national |
This application is a continuation of PCT Application No. PCT/CN2017/073916, filed on Feb. 17, 2017, which claims priority to Chinese Patent Application No. 201610113586.1, filed on Feb. 29, 2016, and each application is hereby incorporated by reference in its entirety.
| Number | Date | Country | |
|---|---|---|---|
| Parent | PCT/CN2017/073916 | Feb 2017 | US |
| Child | 16114945 | US |