Summary of the invention
The invention provides a kind of also method of execution action information of analyzing in computer system, described method comprises: receive action message; Analyze described action message and generate analysis result information; Judge the type of described action message according to analysis result information; If the type of described action message for arranging, is then carried out action is set, release is set returns the information of finishing that arranges; If the type of described action message for calculating, is then carried out and calculated action, calculate release and return result of calculation information; If the type of described action message is then carried out query actions for inquiry, query actions finishes to return Query Result information.
Preferably, wherein, if the type of described action message is for calculating, then carry out and calculate action, further judge the security strategy classification according to described analysis result after calculating release, if security strategy is senior, then after calculating release, result of calculation information is carried out buffer memory return simultaneously to calculate and finish information, and do not return result of calculation information; If security strategy is rudimentary, then after calculating release, returns to calculate and finish information and return simultaneously result of calculation information.
Preferably, wherein, if the type of described action message is inquiry, then carry out query actions, query actions is further judged the security strategy classification according to described analysis result after finishing, if security strategy is senior: carry out security verification according to analysis result, if by the checking return Query Result information, if not by the checking return failure; If security strategy is rudimentary: return Query Result information.
Preferably, search an object information according to analysis result, carry out that based on described object information action, calculating action or query actions being set.Wherein, according to analysis result identification one link, search described object information according to described link.
Preferably, the action message that receives is encrypted action message, and the encrypted action message that first deciphering receives before analyzing described action message.
The present invention provides a kind of also method of execution action information of analyzing simultaneously in computer system, described method comprises: receive the first action message; Analyze described the first action message and generate the first analysis result information; Resolve the first analysis result acquisition of information computing information, and carry out the calculating action according to described computing information, after the calculating release, buffer memory result of calculation information is also returned the information of finishing of calculating; Receive the second action message; Analyze described the second action message and generate the second analysis result information; Resolve the second analysis result acquisition of information Query Information, and carry out query actions according to described Query Information, poll-final returns Query Result information.Wherein before resolving the first analysis result acquisition of information computing information, also comprise: resolve the first analysis result acquisition of information configuration information, and according to described configuration information execution action is set.
Preferably, wherein said Query Result information is described result of calculation information, and the described result of calculation information of buffer memory is to an impact damper, and described query actions is the described impact damper of inquiry.
Preferably, wherein, resolve the second analysis result acquisition of information Query Information, and according to described Query Information execution query actions, further resolve the second analysis result behind the poll-final to obtain the security strategy classification information, if the security strategy classification information is senior: further resolve the second analysis result and obtain security verification information and verify, then return if the verification passes Query Result information, if checking not by return failure; If security strategy is rudimentary: return Query Result information.
Preferably, search respectively an object information according to the first analysis result information or the second analysis result information, carry out that based on described object information action, calculating action or query actions being set.Wherein, according to the first analysis result information or the second analysis result information identification one link, search described object information according to described link.
Preferably, the first action message that receives or the second action message are encrypted action messages, and first deciphering receives before analyzing described the first action message or the second action message encrypted the first action message or the second action message.
Embodiment
Provide hereinafter instructions and be in order to make those skilled in the art can make and use the present invention, and instructions is to provide in the context of application-specific and demand thereof.Various modifications for disclosed embodiment easily see to those skilled in the art, and can be applied to other embodiments and application in the General Principle of this definition, and do not break away from the spirit and scope of the present invention.Thus, the present invention is intended to be limited to shown embodiment, but meets the most widely scope consistent with principle disclosed herein and feature.
These technology that the present invention relates to can be implemented as independent utility, perhaps are embodied as subroutine or functional module in the Another Application.In addition, function at least part of can be configured to client computer (such as, personal computer, laptop computer, cell phone, PDA or other equipment that can the operating computer readable data) the upper execution, perhaps by network (such as, the combination of internet, Intranet, LAN, WAN, MAN or network or be supported in the other technologies of communicating by letter between the computing system) via the computing system that is associated from the long-range execution of client computer.Thus, purchase information, software product and configuration-direct can local be stored (for example, on local computer) and/or remotely storage (for example, on computing machine or server via access to netwoks).
Generally speaking, functional module comprises the routine carrying out particular task or realize particular abstract data type, program, object, assembly, data structure etc.In addition, those skilled in the art will recognize that: computer system may not be limited to conventional personal computer, and comprising other calculating configuration, this comprises handheld device, multicomputer system, based on electronic equipment for consumption microprocessor or programmable, network PC, microcomputer, mainframe computer etc.Similarly, computing equipment is not necessarily limited to independent computing equipment, because these mechanism also can realize in distributed computing environment, executes the task and utilize in distributed computing environment by the teleprocessing equipment of communication network link.In distributed computing environment, functional module can be arranged in local and remote memory storage devices the two.
With reference to figure 1, computer system receives action message; Action message can come from user's operation, can come from network request, perhaps the request of inside computer system parts.Receive after the action message, analyze described action message and generate analysis result information by analysis module; Described analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in it in record sheet after analyzing described analysis result information, so that inquiry and access.The analysis result information that computer system obtains after according to above-mentioned analysis is judged the type of described action message; Search record sheet when for example needing and determine the corresponding type information of corresponding actions information.Further described type information is judged, if the type of described action message for arranging, is then carried out action is set, release is set returns the information of finishing that arranges; It is webpage setting, page setup, window setting, application setting etc. that action wherein is set.If the type of described action message for calculating, is then carried out and calculated action, calculate release and return result of calculation information; Described calculating action is flow rate calculation, power consumption calculation, calculation of capacity, computation etc.If the type of described action message is inquiry, then to transfer and carry out query actions, query actions finishes to return Query Result information; Wherein query actions is access queries, information inquiry, network inquiry, caching query etc.
According to one preferred embodiment of the present invention, for security consideration, wherein, if the type of described action message is to calculate, then carry out and calculate action, further judge the security strategy classification according to described analysis result after the calculating release, if security strategy is senior, then after calculating release, result of calculation information is carried out buffer memory return simultaneously to calculate and finish information, and do not return result of calculation information; If security strategy is rudimentary, then after calculating release, return to calculate and finish information and return simultaneously result of calculation information, wherein the result of calculation information cache is to impact damper.Wherein, if the type of described action message is inquiry, then carry out query actions, query actions is further judged the security strategy classification according to described analysis result after finishing, if security strategy is senior: carry out security verification according to analysis result, if by the checking return Query Result information, if not by the checking return failure; If security strategy is rudimentary: return Query Result information.
According to one preferred embodiment of the present invention, after analysis module is analyzed described action message, computer system is determined an object information or search an object information in record sheet according to analysis result information, and action is set, calculates action or query actions based on described object information execution.According to another embodiment of the present invention, described computer system is according to analysis result information identification one link or search a link in record sheet, search described object information according to described link, particularly, memory location or document location according to the address location object information of described link, and search object information in this memory location or document location, then carry out action being set, calculating and move or query actions based on the object information that finds.Wherein for carrying out at described object action is set, calculates action or query actions based on described object information.One of ordinary skill in the art will readily recognize that above-mentioned object can be various hardware resources or software resource or function or the class etc. in the computer system.Above-mentioned process information can be various address informations, function pointer, function, data message etc.The above-mentioned setting can be various settings to window, as maximizing, minimize, close, open, create example etc., also can be to using, as open, close etc., and also can be to webpage, such as rollback, advance etc.Above-mentioned calculating can be computational resource, computing time, computing power, calculating power consumption, computation period etc.Above-mentioned inquiry can be query buffer, query webpage information, data query base resource, inquiry system resource, query text, inquiry hardware resource etc.Sometimes for security, the action message that receives is encrypted action message, and the encrypted action message that first deciphering receives before analyzing described action message, and described decryption oprerations can be carried out according to PKI or private key.
With reference to figure 2, computer system receives the first action message; The first action message can come from user's operation, can come from network request, perhaps the request of inside computer system parts.Receive after the first action message, analyze described the first action message and generate the first analysis result information by analysis module; The first analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in it in record sheet after analyzing described the first analysis result information, so that inquiry and access; Resolve the first analysis result acquisition of information computing information, and carry out calculating according to described computing information and move, after calculating release, buffer memory result of calculation information is also returned the information of finishing of calculating, and described calculating action is flow rate calculation, power consumption calculation, calculation of capacity, computation etc.; Receive the second action message, the second action message can come from user's operation, can come from network request, perhaps the request of inside computer system parts; Analyze described the second action message and generate the second analysis result information, the second analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in it in described record sheet after analyzing described the second analysis result information, so that inquiry and access; Resolve the second analysis result acquisition of information Query Information, and carry out query actions according to described Query Information, poll-final returns Query Result information, and wherein query actions is access queries, information inquiry, network inquiry, caching query etc.Wherein said Query Result information is described result of calculation information, and the described result of calculation information of buffer memory is to an impact damper, and described query actions is the described impact damper of inquiry.Wherein before resolving the first analysis result acquisition of information computing information, also comprise: resolve the first analysis result acquisition of information configuration information, and carry out according to described configuration information action is set, action wherein is set is webpage setting, page setup, window setting, use and arrange etc.
According to one preferred embodiment of the present invention, for security consideration, wherein, resolve the second analysis result acquisition of information Query Information, and according to described Query Information execution query actions, further resolve the second analysis result behind the poll-final to obtain the security strategy classification information, if the security strategy classification information is senior: further resolve the second analysis result and obtain security verification information and verify, then return if the verification passes Query Result information, if checking does not have by then returns failure; If security strategy is rudimentary: return Query Result information.Wherein obtaining security verification information comprises, obtain user right information, digital signature information or encrypted message etc., utilize authentication module to carry out described checking this security verification information after obtaining security verification information, for example, whether authentication module inquiring and authenticating table is verified that user right information is legal, verifies whether digital signature matches success, whether is verified that password is correct etc.Those skilled in the art can know that above-mentioned proof procedure only is exemplary illustration, and checking herein can be adopted all solutions that can realize described checking.
According to one preferred embodiment of the present invention, after analysis module is analyzed described the first action message or the second action message, generate the first analysis result information or the second analysis result information, then, computer system is determined an object information or search an object information in record sheet according to the first analysis result information or the second analysis result information, and action is set, calculates action or query actions based on described object information execution.According to another embodiment of the present invention, described computer system is according to the first analysis result information or the second analysis result information identification one link, search described object information according to described link, particularly, memory location or document location according to the address location object information of described link, and search object information in this memory location or document location, then carry out action being set, calculating and move or query actions based on the object information that finds.Wherein for carrying out at described object action is set, calculates action or query actions based on described object information.One of ordinary skill in the art will readily recognize that above-mentioned object can be various hardware resources or software resource or function or the class etc. in the computer system.Above-mentioned process information can be various address informations, function pointer, function, data message etc.The above-mentioned setting can be various settings to window, as maximizing, minimize, close, open, create example etc., also can be to using, as open, close etc., and also can be to webpage, such as rollback, advance etc.Above-mentioned calculating can be computational resource, computing time, computing power, calculating power consumption, computation period etc.Above-mentioned inquiry can be query buffer, query webpage information, data query base resource, inquiry system resource, query text, inquiry hardware resource etc.Sometimes for security, the first action message that receives and/or the second action message are encrypted action messages, and first deciphering receives before analyzing described the first action message and/or the second action message encrypted the first action message and/or the second action message, described decryption oprerations can be carried out according to PKI or private key.It will be understood by those skilled in the art that the processing to the first action action message can equally be applied to the second action message, similarly, can equally be applied to the second analysis result information to the processing of the first analysis result information.
When the present invention allows various improvement and alternative structure, shown the embodiment of some explanation of the present invention in the accompanying drawing and be described in detail.But, should be appreciated that this is not to attempt the present invention is limited to the form of appointment or disclosed form, and on the contrary, the present invention covers all improvement and substitutes and various merging and combination, and all equivalents all within the spirit and scope of the present invention.