CN105677579B - Data access method in caching system and system - Google Patents

Data access method in caching system and system Download PDF

Info

Publication number
CN105677579B
CN105677579B CN201410668491.7A CN201410668491A CN105677579B CN 105677579 B CN105677579 B CN 105677579B CN 201410668491 A CN201410668491 A CN 201410668491A CN 105677579 B CN105677579 B CN 105677579B
Authority
CN
China
Prior art keywords
data
field
configuration file
memory
written
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410668491.7A
Other languages
Chinese (zh)
Other versions
CN105677579A (en
Inventor
祁舟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Burson Marsteller Network Game Development (shenzhen) Co Ltd
Original Assignee
Burson Marsteller Network Game Development (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Burson Marsteller Network Game Development (shenzhen) Co Ltd filed Critical Burson Marsteller Network Game Development (shenzhen) Co Ltd
Priority to CN201410668491.7A priority Critical patent/CN105677579B/en
Publication of CN105677579A publication Critical patent/CN105677579A/en
Application granted granted Critical
Publication of CN105677579B publication Critical patent/CN105677579B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A kind of data access method in caching system, the method includes:Receive the data write request of requesting party;Memory is written into the data of request write-in according to the data write request;The data for having been written into memory are split as multiple fields according to preset configuration file, the correspondence of data type and field is included in the configuration file;The field obtained after fractionation is verified;After verification passes through, then the data for having been written into memory are written back to database in the form of field.Using this method, when data are stored without considering data type, to overcome the problem of needing to write write-back program for different types of data because of data storage corresponding with data type, the workload of application developer is thus greatly saved.Further, it would be desirable to provide the data access systems in a kind of caching system.

Description

Data access method in caching system and system
Technical field
The present invention relates to field of computer technology, more particularly in a kind of caching system data access method and be System.
Background technology
Generally Redis, MemCache etc. is used to be stored in a plurality of types of data of caching at present in terms of data storage Memory improves the reading speed of data, and the real time response speed of data-storage system is improved with this.Traditional data storage side Formula is that data storage corresponding with data type is needed when different types of data are written back to database by memory for not Same data type writes different write-back programs respectively, when the workload of application developer thus being caused to increase, is a large amount of Between be wasted.
Invention content
Based on this, it is necessary to which in view of the above technical problems, providing a kind of can save the slow of application developer's workload Data access method in deposit system and system.
A kind of data access method in caching system, the method includes:
Receive the data write request of requesting party;
Memory is written into the data of request write-in according to the data write request;
The data for having been written into memory are split as multiple fields according to preset configuration file, in the configuration file Include the correspondence of data type and field;
The field obtained after fractionation is verified;
After verification passes through, then the data for having been written into memory are written back to database in the form of field.
A kind of data access system in caching system, the system comprises:
Request receiving module, the data write request for receiving requesting party;
Data write. module, for memory to be written in the data of request write-in according to the data write request;
Data split module, for the data for having been written into memory to be split as multiple words according to preset configuration file Section, the correspondence of data type and field is included in the configuration file;
First field correction verification module, for being verified to the field obtained after fractionation;
The data for having been written into memory are then written back to by write back data module after passing through for verification in the form of field Database.
Data access method in said buffer system and system write the data of request write-in according to data write request Enter memory, multiple fields are split as to the data for having been written into memory according to preset configuration file and verify, after verification passes through, The data for having been written into memory are written back to database in the form of field.Due to including pair of data type and field in configuration file It should be related to, the data for having been written into memory are to be split into field according to configuration file, write-back in the form of fields after verification passes through To database, therefore, when data are stored without considering data type, to overcome because of data storage corresponding with data type And the problem of needing to write write-back program for different types of data, the workload of application developer is thus greatly saved.
Description of the drawings
Fig. 1 is the flow chart of the data access method in caching system in one embodiment;
Fig. 2 is the flow chart for splitting into field in one embodiment to data and being verified;
Fig. 3 is the applied environment figure of the data access method in data buffering system in one embodiment;
Fig. 4 is the flow chart of digital independent in one embodiment;
Fig. 5 is the flow chart verified in data read process in one embodiment;
Fig. 6 is the structural schematic diagram of the data access system in caching system in one embodiment;
Fig. 7 is the structural schematic diagram of the first field correction verification module in one embodiment;
Fig. 8 is the structural schematic diagram of the data access system in caching system in another embodiment;
Fig. 9 is the structural schematic diagram of the second field correction verification module in one embodiment;
Figure 10 is data removing module structural schematic diagram in one embodiment.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the present invention, not For limiting the present invention.
In one embodiment, as shown in Figure 1, a kind of data access method in providing caching system, the present embodiment It is applied to server end in this way for example, specifically including:
Step 102, the data write request of requesting party is received.
A kind of system architecture of data access is built in advance in server end, the specific can be that building a data group Part, and have preset configuration file in server storage, include but not limited to that data type is corresponding with field in configuration file Relationship.Data package may include data buffering system, multiple and different virtual server and database.Data buffering system branch Hold a variety of different data types, including but not limited to character string, chained list, set, Hash table etc..
Requesting party is directed to the side that request of data occurs for data buffering system, can be the client opposite with server end End, can also be the other applications for operating in server end.Client is carried out with before data buffering system by network Communication.Data write-in includes data addition, data modification etc..
Step 104, the data of request write-in are written by memory according to data write request.
After receiving the data write request that requesting party sends, according to the request, memory is written into the data of request write-in.Example Such as, a new data are added in memory, or existing data in memory are modified.After memory is written in data, to Requesting party returns to operating result, such as returned data has been added or changed.
Step 106, the data for having been written into memory are split as by multiple fields according to preset configuration file, in configuration file Include the correspondence of data type and field.
Field can be expressed as the row in list in the database.For example, in address book data library, name, telephone number It is the attribute that all rows in list share, these row can be known as name field and telephone number field.In data package The correspondence for including data type and field in preset configuration file, such as the quantity or field of the corresponding field of data type Title etc., such as:Character string corresponds to 2 fields, and chained list corresponds to 5 fields etc..According to data type in configuration file and word The correspondence of section splits the data for having been written into memory, is split data specifically, being referred to separator, obtains Field after to fractionation.Data can not also be done and be divided, the data of write-in are encoded, the mode of coding can be in number Description information is added according to head, may include field name etc. in description information, using the data after coding as a field.
Step 108, the field obtained after fractionation is verified.
According to the corresponding field quantity of preset data type in configuration file or field name to the word that is obtained after fractionation Duan Jinhang is verified.Specifically, the field quantity in the quantity and configuration file of the field obtained after fractionation is matched, then verify Pass through.Or the field name in the title and configuration file of the field obtained after fractionation matches, then verification passes through.
Step 110, after verification passes through, then the data for having been written into memory are written back to database in the form of field.
Obtained after fractionation field verification pass through after, by the data for having been written into memory be written back in the form of field database into Row storage.If the field obtained after splitting is not validated, the data for having been written into memory are deleted.
In the present embodiment, due to including the correspondence of data type and field in configuration file, the number of memory is had been written into According to being to be split into field according to configuration file, verification is written back to database after passing through, therefore, is deposited in data in the form of fields Without considering data type when storage, need to be directed to different types of data because of data storage corresponding with data type to overcome Thus the workload of application developer is greatly saved in the problem of writing write-back program.Meanwhile it being deposited using field form Storage, further overcome due to Redis originally in a manner of binary data stream or preset command format store data, lead to people The problem of data stored for reading None- identified, so that application developer can be by visually identifying storage Data bring facility for application developer.
In one embodiment, as shown in Fig. 2, the step of being verified to the field obtained after fractionation includes:
Step 202, the field obtained after fractionation is ranked up according to the sequence of write-in memory.
Step 204, after sequence, according to the corresponding field quantity of preset data type in configuration file or field name The field obtained after fractionation is verified.
Step 206, if the field quantity in the quantity and configuration file of the field obtained after splitting matches or splits Field name in the title and configuration file of the field obtained afterwards matches, then passes through verification.
After the field obtained after fractionation is ranked up according to the sequence of write-in memory, if the number of the field obtained after splitting Amount requirement identical as the field quantity in configuration file or meeting the field quantity in configuration file, then pass through verification.For example, Preset character string corresponds to 2 fields or is more than 2 and is less than 5 in configuration file, if the data that data type is character string are torn open The field sum obtained after point is 2 or 4, then passes through verification;If being less than 2, failure is verified.Alternatively, the field obtained after splitting Title it is identical as the field name in configuration file or comprising identical keyword, then pass through verification.For example, in configuration file The keyword for including in the corresponding field name of preset character string is " name ", if containing in the title of the field after then splitting " name ", then by verification, otherwise, verification failure.The mode of verification can effectively remove dirty data, and dirty data includes data lattice The data etc. that formula is illegal, coding nonstandard data and is illegally distorted.To effectively increase data storage safety and Reliability.
In one embodiment, the data access method in caching system can be applied to application environment as shown in Figure 3 In.A data package is built at background server end, data package includes data buffering system 302, data acquisition server 304, data update server 306 and database 308, wherein data acquisition server 304 and data update server 306 are void Quasi- server.Data package may operate on a physical server, and a configuration text need to be only stored on the physical server Part can also be separately operable on more physical servers, store a configuration file on every physical server respectively.Data It is attached, is communicated by network respectively between caching system 302 and data acquisition server 304, data update server 306 Asynchronous communication can be used in mode, and Data Concurrent rate thus can be improved.In addition, data buffering system 302 and data acquisition server 304, it can also be attached by message queue between data update server 306.Data acquisition server 304, data are more New demand servicing device 306 is attached by network respectively with database 308.
For client by network to 302 transmission data write request of data buffering system, data buffering system 302 receives should After data write request, memory is written into the data of request write-in, and operating result is returned to client.Data buffering system The data for having been written into memory are sent to data update server 306 by 302, and data update server 306 will according to configuration file The data for having been written into memory are split as multiple fields, and are verified to the field obtained after fractionation, and after verification passes through, data are more The data for having been written into memory are written back to database 308 by new demand servicing device 306 in the form of field.
In one embodiment, as shown in figure 4, the data for having been written into memory to be written back to the step of database in the form of field After rapid, further include:
Step 402, the data read request of requesting party is received.
Step 404, according to whether being stored with corresponding data in data read request audit memory;If so, then entering step Rapid 406, otherwise, enter step 408.
Step 406, data corresponding with data read request are extracted and is back to requesting party.
Step 408, corresponding field is extracted in database according to data read request, and school is carried out according to configuration file It tests.
Step 410, after verification passes through, then the field of extraction is assembled into data corresponding with data read request, and will Data corresponding with data read request are back to requesting party.
Whether data buffering system receives the data read request that requesting party sends, and deposited according in the requesting query memory Contain corresponding data.If so, data buffering system extracts data corresponding with data read request from memory, and Corresponding data are back to requesting party.Otherwise, data read request is forwarded to data acquisition server by data buffering system. Data acquisition server is inquired according to the request in server, if existed in database corresponding with data read request Field then extracts corresponding field, according to the corresponding field quantity of preset data type in configuration file or word Name section verifies the field of extraction.
After verification passes through, the field of extraction is assembled into data corresponding with data read request by data acquisition server, Specifically, for the field divided by separator, the sequence of memory can be written according to field or field name carries out group Dress;For the field obtained after coding, corresponding decoding can be carried out, decoded mode can delete retouching for data header addition Information is stated, by data convert.After being completed, data corresponding with data read request are back to number by data acquisition server According to caching system, corresponding data are back to requesting party by data buffering system.
If be appreciated that database in be not present data corresponding with data read request, data acquisition server to It is that data buffering system returned data is not present as a result, data buffering system is not present to requesting party's returned data accordingly.
In the present embodiment, according to corresponding data whether are stored in data read request audit memory, if so, then directly It extracts corresponding data and is back to requesting party, otherwise, corresponding field and root are extracted in database according to data read request Field is verified according to configuration file, verifies and the field of extraction is assembled into data corresponding with data read request after passing through And it is back to requesting party.Thus it effectively prevents that due to the loss of data for being written back to database Redis need to be restarted, and Redis meetings The situation that data during last time is operated all load.If being written back to the loss of data of database, it is not required to restart data Caching system only need to load data according to data read request, save system resource.
In one embodiment, as shown in figure 5, extracting corresponding field, and root in database according to data read request The step of being verified according to configuration file include:
Step 502, the sequence for memory being written according to field according to data read request extracts corresponding word from database Section.
Step 504, according to the corresponding field quantity of preset data type in configuration file or field name to extraction Field verified.
Step 506, if field quantity in the quantity and configuration file of the field of extraction matches or the field extracted Title matches with the field name in configuration file, then passes through verification.
The sequence that memory is written according to field according to data read request extracts corresponding field in the database, specifically , it, can be according to the corresponding sequence of field and separator for the field divided by separator, it will be corresponding with read requests Field is extracted from database;For the field obtained after coding, can will be asked with reading by the corresponding sequence of field and coding Corresponding field is asked to be extracted from database.If the quantity of the field of extraction is identical as the preset field quantity in configuration file Or meet the requirement of the preset field quantity in configuration file, then by verification, if extraction field title and configuration Field name in file is identical or comprising identical keyword, then passes through verification.Which thereby enhance the reliability of data.
In one embodiment, method further includes:When deleting not accessed or default recently beyond preset time in memory Interior not accessed data.
It can also include the superseded mode of cold data in configuration file.Cold data refers to not accessed beyond preset time The data not being accessed in data or nearest preset time, preset time can be nearest a period of time, such as nearest 1 month, Can be more than certain time the not accessed time, such as larger than 3 months.Cold data it is superseded refer to by cold data from memory It deletes.According to configuration file, cold data is eliminated, thereby saves memory headroom, improves the effect of data buffering system Rate.
In one embodiment, as shown in fig. 6, a kind of data access system in providing caching system, the system packet It includes:Request receiving module 602, Data write. module 604, data split module 606, the first field correction verification module 608 and data Write-back module 610, wherein:
Request receiving module 602, the data write request for receiving requesting party.
Data write. module 604, for memory to be written in the data of request write-in according to data write request.
Data split module 606, for the data for having been written into memory to be split as multiple words according to preset configuration file Section, the correspondence of data type and field is included in configuration file.
First field correction verification module 608, for being verified to the field obtained after fractionation.
The data for having been written into memory are then written back to number by write back data module 610 after passing through for verification in the form of field According to library.
In one embodiment, as shown in fig. 7, the first field correction verification module 608 includes:Sequencing unit 608a and the first school Verification certificate member 608b, wherein:
Sequencing unit 608a, the field for being obtained after fractionation are ranked up according to the sequence of write-in memory.
First verification unit 608b, after sorting, according to the corresponding field of preset data type in configuration file Quantity or field name verify the field obtained after fractionation;If in the quantity and configuration file of the field obtained after splitting Field quantity match or the title and configuration file of the field that are obtained after splitting in field name match, then pass through Verification.
In one embodiment, as shown in figure 8, the digital independent that request receiving module 602 is additionally operable to receive requesting party is asked It asks;The system further includes:Data inquiry module 612, the first data return to module 614, the second field correction verification module 616 and second Data return to module 618, wherein:
Data inquiry module 612, for according to whether being stored with corresponding data in data read request audit memory.
First data return to module 614, if for being stored with corresponding data in memory, it will be with data read request pair The data answered extract and are back to requesting party.
Second field correction verification module 616 exists for if corresponding data to be not present in memory according to data read request Database extracts corresponding field, and is verified according to configuration file.
Second data return to module 618, for after verifying and passing through, being then assembled into the field of extraction and data read request Corresponding data, and data corresponding with data read request are back to requesting party.
In one embodiment, as shown in figure 9, the second field correction verification module 616 includes:Extraction unit 616a and the second school Verification certificate member 616b, wherein:
Extraction unit 616a, the sequence for memory to be written according to field according to data read request are extracted in the database Corresponding field.
Second verification unit 616a, for according to the corresponding field quantity of preset data type in configuration file or word Name section verifies the field of extraction;If the field quantity in the quantity and configuration file of the field of extraction matches or carries Field name in the title and configuration file of the field taken matches, then passes through verification.
In one embodiment, as shown in Figure 10, which further includes:Data removing module 620, for deleting in memory Beyond the data not being accessed in the accessed or nearest preset time of preset time.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously Cannot the limitation to the scope of the claims of the present invention therefore be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention Protect range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. the data access method in a kind of caching system, the method includes:
Receive the data write request of requesting party;
Memory is written into the data of request write-in according to the data write request, the data for having been written into memory include corresponding to Data type;
The data for having been written into memory are split as multiple fields according to preset configuration file, include in the configuration file The correspondence of data type and field, the correspondence of data type and field includes the data of field in the configuration file Type is corresponding with the title of the quantity of field or field;
The field obtained after fractionation is carried out according to the corresponding field quantity of data type in the configuration file or field name Verification;
After verification passes through, then the data for having been written into memory are written back to database in the form of field.
2. according to the method described in claim 1, it is characterized in that, the step of described pair of field obtained after splitting verifies Including:
The field obtained after the fractionation is ranked up according to the sequence of write-in memory;
After sequence, torn open to described according to the corresponding field quantity of preset data type in the configuration file or field name The field obtained after point is verified;
If the quantity of the field obtained after the fractionation matches or described with the field quantity in the configuration file The title of the field obtained after fractionation matches with the field name in the configuration file, then passes through verification.
3. according to the method described in claim 1, it is characterized in that, it is described by the data for having been written into memory in the form of field After the step of being written back to database, further include:
Receive the data read request of requesting party;
It whether is stored with corresponding data according in the data read request audit memory;
If so, then extracting by data corresponding with the data read request and being back to requesting party;
Otherwise, corresponding field is extracted in database according to the data read request, and according to the configuration file to extraction Field verified;
After verification passes through, then the field of the extraction is assembled into data corresponding with the data read request, and will be with institute It states the corresponding data of data read request and is back to requesting party.
4. according to the method described in claim 3, it is characterized in that, described extract according to the data read request in database Corresponding field, and the step of being verified to the field of extraction according to the configuration file includes:
The sequence that memory is written according to field according to the data read request extracts corresponding field from database;
According to the corresponding field quantity of preset data type in the configuration file or field name to the field of extraction into Row verification;
If field quantity in the quantity of the field of the extraction and the configuration file matches or the field of the extraction Title matches with the field name in the configuration file, then passes through verification.
5. method according to any one of claims 1 to 4, which is characterized in that the method further includes:
It deletes in memory beyond the data not being accessed in the accessed or nearest preset time of preset time.
6. the data access system in a kind of caching system, which is characterized in that the system comprises:
Request receiving module, the data write request for receiving requesting party;
Data write. module, it is described to have been written into for memory to be written in the data of request write-in according to the data write request The data of memory include corresponding data type;
Data split module, for the data for having been written into memory to be split as multiple fields according to preset configuration file, Include the correspondence of data type and field in the configuration file, data type is corresponding with field in the configuration file Relationship includes that the data type of field is corresponding with the title of the quantity of field or field;
First field correction verification module, for according to the corresponding field quantity of data type in the configuration file or field name pair The field obtained after fractionation is verified;
The data for having been written into memory are then written back to data by write back data module after passing through for verification in the form of field Library.
7. system according to claim 6, which is characterized in that the first field correction verification module includes:
Sequencing unit, for the field obtained after the fractionation to be ranked up according to the sequence of write-in memory;
First verification unit, after sorting, according to the corresponding field quantity of preset data type in the configuration file Or field name verifies the field obtained after the fractionation;If the quantity of the field obtained after the fractionation is matched with described Set the field quantity in file match or the fractionation after the obtained title of field in the configuration file Field name matches, then passes through verification.
8. system according to claim 6, which is characterized in that the request receiving module is additionally operable to receive the number of requesting party According to read requests;
The system also includes:
Data inquiry module, for whether being stored with corresponding data according in the data read request audit memory;
First data return to module, if for being stored with corresponding data in memory, it will be corresponding with the data read request Data extract and be back to requesting party;
Second field correction verification module, if for corresponding data to be not present in memory, according to the data read request in number Corresponding field is extracted according to library, and is verified according to the configuration file;
Second data return to module, after passing through for verification, are then assembled into the field of the extraction and are asked with the digital independent Corresponding data are sought, and data corresponding with the data read request are back to requesting party.
9. system according to claim 8, which is characterized in that the second field correction verification module includes:
Field extraction unit, the sequence for memory to be written according to field according to the data read request are extracted in the database Corresponding field;
Second verification unit, for according to the corresponding field quantity of preset data type in the configuration file or field name Title verifies the field of extraction;If the quantity of the field of the extraction matches with the field quantity in the configuration file Or the title of the field of the extraction matches with the field name in the configuration file, then passes through verification.
10. according to claim 6 to 9 any one of them system, which is characterized in that the system also includes:
Data removing module, for delete in memory beyond preset time it is accessed or recently in preset time it is not accessed Data.
CN201410668491.7A 2014-11-20 2014-11-20 Data access method in caching system and system Active CN105677579B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410668491.7A CN105677579B (en) 2014-11-20 2014-11-20 Data access method in caching system and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410668491.7A CN105677579B (en) 2014-11-20 2014-11-20 Data access method in caching system and system

Publications (2)

Publication Number Publication Date
CN105677579A CN105677579A (en) 2016-06-15
CN105677579B true CN105677579B (en) 2018-08-17

Family

ID=56957354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410668491.7A Active CN105677579B (en) 2014-11-20 2014-11-20 Data access method in caching system and system

Country Status (1)

Country Link
CN (1) CN105677579B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407345B (en) * 2016-09-06 2020-07-14 阿里巴巴(中国)有限公司 Dirty data updating method and device
CN110727691A (en) * 2019-10-22 2020-01-24 北京明略软件***有限公司 Data analysis and verification method and device
CN111382128A (en) * 2020-03-20 2020-07-07 中国邮政储蓄银行股份有限公司 File splitting method and device and computer system
CN113268440B (en) * 2021-05-26 2022-08-02 上海哔哩哔哩科技有限公司 Cache elimination method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902335A (en) * 2009-05-27 2010-12-01 北京启明星辰信息技术股份有限公司 Data filter and combination method
CN102387200A (en) * 2011-10-20 2012-03-21 中国科学院上海微***与信息技术研究所 Sensor network backend data processing method based on labview and database
US8204911B2 (en) * 2001-01-09 2012-06-19 Nextair Corporation Software, devices and methods facilitating execution of server-side applications at mobile devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8204911B2 (en) * 2001-01-09 2012-06-19 Nextair Corporation Software, devices and methods facilitating execution of server-side applications at mobile devices
CN101902335A (en) * 2009-05-27 2010-12-01 北京启明星辰信息技术股份有限公司 Data filter and combination method
CN102387200A (en) * 2011-10-20 2012-03-21 中国科学院上海微***与信息技术研究所 Sensor network backend data processing method based on labview and database

Also Published As

Publication number Publication date
CN105677579A (en) 2016-06-15

Similar Documents

Publication Publication Date Title
EP3560143B1 (en) Data isolation in a blockchain network
US8914856B1 (en) Synchronization of networked storage systems and third party systems
US8291058B2 (en) High speed network data extractor
KR101312125B1 (en) Contents filtering apparatus and method thereof
US20230074102A1 (en) Method and apparatus for processing data based on block chain, device and readable storage medium
CN107436725A (en) A kind of data are write, read method, apparatus and distributed objects storage cluster
CN105677579B (en) Data access method in caching system and system
US9146929B2 (en) Automatic resource ownership assignment system and method
CN104123280A (en) File comparison method and device
CN107832423B (en) File reading and writing method for distributed file system
US9600486B2 (en) File system directory attribute correction
CN109597640B (en) Account management method, device, equipment and medium for application program
US20080282355A1 (en) Document container data structure and methods thereof
WO2019226297A1 (en) Edit transactions for blockchains
CN103150402A (en) Index-code-based virtual file system, establishment method and access method
US8352442B2 (en) Determination of an updated data source from disparate data sources
CN106909595A (en) A kind of data migration method and device
CN103902660A (en) System and method for prefetching file layout through readdir++ in cluster file system
CN109471843A (en) A kind of metadata cache method, system and relevant apparatus
CN104657677A (en) File encryption method based on alternate data streams
US20220083507A1 (en) Trust chain for official data and documents
KR100680034B1 (en) Context cognizance enhancing message transform system, and method for the same
US8498622B2 (en) Data processing system with synchronization policy
CN108241705A (en) A kind of data insertion method and device
CN110555682A (en) multi-channel implementation method based on alliance chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant