CN105677579B - Data access method in caching system and system - Google Patents
Data access method in caching system and system Download PDFInfo
- Publication number
- CN105677579B CN105677579B CN201410668491.7A CN201410668491A CN105677579B CN 105677579 B CN105677579 B CN 105677579B CN 201410668491 A CN201410668491 A CN 201410668491A CN 105677579 B CN105677579 B CN 105677579B
- Authority
- CN
- China
- Prior art keywords
- data
- field
- configuration file
- memory
- written
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A kind of data access method in caching system, the method includes:Receive the data write request of requesting party;Memory is written into the data of request write-in according to the data write request;The data for having been written into memory are split as multiple fields according to preset configuration file, the correspondence of data type and field is included in the configuration file;The field obtained after fractionation is verified;After verification passes through, then the data for having been written into memory are written back to database in the form of field.Using this method, when data are stored without considering data type, to overcome the problem of needing to write write-back program for different types of data because of data storage corresponding with data type, the workload of application developer is thus greatly saved.Further, it would be desirable to provide the data access systems in a kind of caching system.
Description
Technical field
The present invention relates to field of computer technology, more particularly in a kind of caching system data access method and be
System.
Background technology
Generally Redis, MemCache etc. is used to be stored in a plurality of types of data of caching at present in terms of data storage
Memory improves the reading speed of data, and the real time response speed of data-storage system is improved with this.Traditional data storage side
Formula is that data storage corresponding with data type is needed when different types of data are written back to database by memory for not
Same data type writes different write-back programs respectively, when the workload of application developer thus being caused to increase, is a large amount of
Between be wasted.
Invention content
Based on this, it is necessary to which in view of the above technical problems, providing a kind of can save the slow of application developer's workload
Data access method in deposit system and system.
A kind of data access method in caching system, the method includes:
Receive the data write request of requesting party;
Memory is written into the data of request write-in according to the data write request;
The data for having been written into memory are split as multiple fields according to preset configuration file, in the configuration file
Include the correspondence of data type and field;
The field obtained after fractionation is verified;
After verification passes through, then the data for having been written into memory are written back to database in the form of field.
A kind of data access system in caching system, the system comprises:
Request receiving module, the data write request for receiving requesting party;
Data write. module, for memory to be written in the data of request write-in according to the data write request;
Data split module, for the data for having been written into memory to be split as multiple words according to preset configuration file
Section, the correspondence of data type and field is included in the configuration file;
First field correction verification module, for being verified to the field obtained after fractionation;
The data for having been written into memory are then written back to by write back data module after passing through for verification in the form of field
Database.
Data access method in said buffer system and system write the data of request write-in according to data write request
Enter memory, multiple fields are split as to the data for having been written into memory according to preset configuration file and verify, after verification passes through,
The data for having been written into memory are written back to database in the form of field.Due to including pair of data type and field in configuration file
It should be related to, the data for having been written into memory are to be split into field according to configuration file, write-back in the form of fields after verification passes through
To database, therefore, when data are stored without considering data type, to overcome because of data storage corresponding with data type
And the problem of needing to write write-back program for different types of data, the workload of application developer is thus greatly saved.
Description of the drawings
Fig. 1 is the flow chart of the data access method in caching system in one embodiment;
Fig. 2 is the flow chart for splitting into field in one embodiment to data and being verified;
Fig. 3 is the applied environment figure of the data access method in data buffering system in one embodiment;
Fig. 4 is the flow chart of digital independent in one embodiment;
Fig. 5 is the flow chart verified in data read process in one embodiment;
Fig. 6 is the structural schematic diagram of the data access system in caching system in one embodiment;
Fig. 7 is the structural schematic diagram of the first field correction verification module in one embodiment;
Fig. 8 is the structural schematic diagram of the data access system in caching system in another embodiment;
Fig. 9 is the structural schematic diagram of the second field correction verification module in one embodiment;
Figure 10 is data removing module structural schematic diagram in one embodiment.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the present invention, not
For limiting the present invention.
In one embodiment, as shown in Figure 1, a kind of data access method in providing caching system, the present embodiment
It is applied to server end in this way for example, specifically including:
Step 102, the data write request of requesting party is received.
A kind of system architecture of data access is built in advance in server end, the specific can be that building a data group
Part, and have preset configuration file in server storage, include but not limited to that data type is corresponding with field in configuration file
Relationship.Data package may include data buffering system, multiple and different virtual server and database.Data buffering system branch
Hold a variety of different data types, including but not limited to character string, chained list, set, Hash table etc..
Requesting party is directed to the side that request of data occurs for data buffering system, can be the client opposite with server end
End, can also be the other applications for operating in server end.Client is carried out with before data buffering system by network
Communication.Data write-in includes data addition, data modification etc..
Step 104, the data of request write-in are written by memory according to data write request.
After receiving the data write request that requesting party sends, according to the request, memory is written into the data of request write-in.Example
Such as, a new data are added in memory, or existing data in memory are modified.After memory is written in data, to
Requesting party returns to operating result, such as returned data has been added or changed.
Step 106, the data for having been written into memory are split as by multiple fields according to preset configuration file, in configuration file
Include the correspondence of data type and field.
Field can be expressed as the row in list in the database.For example, in address book data library, name, telephone number
It is the attribute that all rows in list share, these row can be known as name field and telephone number field.In data package
The correspondence for including data type and field in preset configuration file, such as the quantity or field of the corresponding field of data type
Title etc., such as:Character string corresponds to 2 fields, and chained list corresponds to 5 fields etc..According to data type in configuration file and word
The correspondence of section splits the data for having been written into memory, is split data specifically, being referred to separator, obtains
Field after to fractionation.Data can not also be done and be divided, the data of write-in are encoded, the mode of coding can be in number
Description information is added according to head, may include field name etc. in description information, using the data after coding as a field.
Step 108, the field obtained after fractionation is verified.
According to the corresponding field quantity of preset data type in configuration file or field name to the word that is obtained after fractionation
Duan Jinhang is verified.Specifically, the field quantity in the quantity and configuration file of the field obtained after fractionation is matched, then verify
Pass through.Or the field name in the title and configuration file of the field obtained after fractionation matches, then verification passes through.
Step 110, after verification passes through, then the data for having been written into memory are written back to database in the form of field.
Obtained after fractionation field verification pass through after, by the data for having been written into memory be written back in the form of field database into
Row storage.If the field obtained after splitting is not validated, the data for having been written into memory are deleted.
In the present embodiment, due to including the correspondence of data type and field in configuration file, the number of memory is had been written into
According to being to be split into field according to configuration file, verification is written back to database after passing through, therefore, is deposited in data in the form of fields
Without considering data type when storage, need to be directed to different types of data because of data storage corresponding with data type to overcome
Thus the workload of application developer is greatly saved in the problem of writing write-back program.Meanwhile it being deposited using field form
Storage, further overcome due to Redis originally in a manner of binary data stream or preset command format store data, lead to people
The problem of data stored for reading None- identified, so that application developer can be by visually identifying storage
Data bring facility for application developer.
In one embodiment, as shown in Fig. 2, the step of being verified to the field obtained after fractionation includes:
Step 202, the field obtained after fractionation is ranked up according to the sequence of write-in memory.
Step 204, after sequence, according to the corresponding field quantity of preset data type in configuration file or field name
The field obtained after fractionation is verified.
Step 206, if the field quantity in the quantity and configuration file of the field obtained after splitting matches or splits
Field name in the title and configuration file of the field obtained afterwards matches, then passes through verification.
After the field obtained after fractionation is ranked up according to the sequence of write-in memory, if the number of the field obtained after splitting
Amount requirement identical as the field quantity in configuration file or meeting the field quantity in configuration file, then pass through verification.For example,
Preset character string corresponds to 2 fields or is more than 2 and is less than 5 in configuration file, if the data that data type is character string are torn open
The field sum obtained after point is 2 or 4, then passes through verification;If being less than 2, failure is verified.Alternatively, the field obtained after splitting
Title it is identical as the field name in configuration file or comprising identical keyword, then pass through verification.For example, in configuration file
The keyword for including in the corresponding field name of preset character string is " name ", if containing in the title of the field after then splitting
" name ", then by verification, otherwise, verification failure.The mode of verification can effectively remove dirty data, and dirty data includes data lattice
The data etc. that formula is illegal, coding nonstandard data and is illegally distorted.To effectively increase data storage safety and
Reliability.
In one embodiment, the data access method in caching system can be applied to application environment as shown in Figure 3
In.A data package is built at background server end, data package includes data buffering system 302, data acquisition server
304, data update server 306 and database 308, wherein data acquisition server 304 and data update server 306 are void
Quasi- server.Data package may operate on a physical server, and a configuration text need to be only stored on the physical server
Part can also be separately operable on more physical servers, store a configuration file on every physical server respectively.Data
It is attached, is communicated by network respectively between caching system 302 and data acquisition server 304, data update server 306
Asynchronous communication can be used in mode, and Data Concurrent rate thus can be improved.In addition, data buffering system 302 and data acquisition server
304, it can also be attached by message queue between data update server 306.Data acquisition server 304, data are more
New demand servicing device 306 is attached by network respectively with database 308.
For client by network to 302 transmission data write request of data buffering system, data buffering system 302 receives should
After data write request, memory is written into the data of request write-in, and operating result is returned to client.Data buffering system
The data for having been written into memory are sent to data update server 306 by 302, and data update server 306 will according to configuration file
The data for having been written into memory are split as multiple fields, and are verified to the field obtained after fractionation, and after verification passes through, data are more
The data for having been written into memory are written back to database 308 by new demand servicing device 306 in the form of field.
In one embodiment, as shown in figure 4, the data for having been written into memory to be written back to the step of database in the form of field
After rapid, further include:
Step 402, the data read request of requesting party is received.
Step 404, according to whether being stored with corresponding data in data read request audit memory;If so, then entering step
Rapid 406, otherwise, enter step 408.
Step 406, data corresponding with data read request are extracted and is back to requesting party.
Step 408, corresponding field is extracted in database according to data read request, and school is carried out according to configuration file
It tests.
Step 410, after verification passes through, then the field of extraction is assembled into data corresponding with data read request, and will
Data corresponding with data read request are back to requesting party.
Whether data buffering system receives the data read request that requesting party sends, and deposited according in the requesting query memory
Contain corresponding data.If so, data buffering system extracts data corresponding with data read request from memory, and
Corresponding data are back to requesting party.Otherwise, data read request is forwarded to data acquisition server by data buffering system.
Data acquisition server is inquired according to the request in server, if existed in database corresponding with data read request
Field then extracts corresponding field, according to the corresponding field quantity of preset data type in configuration file or word
Name section verifies the field of extraction.
After verification passes through, the field of extraction is assembled into data corresponding with data read request by data acquisition server,
Specifically, for the field divided by separator, the sequence of memory can be written according to field or field name carries out group
Dress;For the field obtained after coding, corresponding decoding can be carried out, decoded mode can delete retouching for data header addition
Information is stated, by data convert.After being completed, data corresponding with data read request are back to number by data acquisition server
According to caching system, corresponding data are back to requesting party by data buffering system.
If be appreciated that database in be not present data corresponding with data read request, data acquisition server to
It is that data buffering system returned data is not present as a result, data buffering system is not present to requesting party's returned data accordingly.
In the present embodiment, according to corresponding data whether are stored in data read request audit memory, if so, then directly
It extracts corresponding data and is back to requesting party, otherwise, corresponding field and root are extracted in database according to data read request
Field is verified according to configuration file, verifies and the field of extraction is assembled into data corresponding with data read request after passing through
And it is back to requesting party.Thus it effectively prevents that due to the loss of data for being written back to database Redis need to be restarted, and Redis meetings
The situation that data during last time is operated all load.If being written back to the loss of data of database, it is not required to restart data
Caching system only need to load data according to data read request, save system resource.
In one embodiment, as shown in figure 5, extracting corresponding field, and root in database according to data read request
The step of being verified according to configuration file include:
Step 502, the sequence for memory being written according to field according to data read request extracts corresponding word from database
Section.
Step 504, according to the corresponding field quantity of preset data type in configuration file or field name to extraction
Field verified.
Step 506, if field quantity in the quantity and configuration file of the field of extraction matches or the field extracted
Title matches with the field name in configuration file, then passes through verification.
The sequence that memory is written according to field according to data read request extracts corresponding field in the database, specifically
, it, can be according to the corresponding sequence of field and separator for the field divided by separator, it will be corresponding with read requests
Field is extracted from database;For the field obtained after coding, can will be asked with reading by the corresponding sequence of field and coding
Corresponding field is asked to be extracted from database.If the quantity of the field of extraction is identical as the preset field quantity in configuration file
Or meet the requirement of the preset field quantity in configuration file, then by verification, if extraction field title and configuration
Field name in file is identical or comprising identical keyword, then passes through verification.Which thereby enhance the reliability of data.
In one embodiment, method further includes:When deleting not accessed or default recently beyond preset time in memory
Interior not accessed data.
It can also include the superseded mode of cold data in configuration file.Cold data refers to not accessed beyond preset time
The data not being accessed in data or nearest preset time, preset time can be nearest a period of time, such as nearest 1 month,
Can be more than certain time the not accessed time, such as larger than 3 months.Cold data it is superseded refer to by cold data from memory
It deletes.According to configuration file, cold data is eliminated, thereby saves memory headroom, improves the effect of data buffering system
Rate.
In one embodiment, as shown in fig. 6, a kind of data access system in providing caching system, the system packet
It includes:Request receiving module 602, Data write. module 604, data split module 606, the first field correction verification module 608 and data
Write-back module 610, wherein:
Request receiving module 602, the data write request for receiving requesting party.
Data write. module 604, for memory to be written in the data of request write-in according to data write request.
Data split module 606, for the data for having been written into memory to be split as multiple words according to preset configuration file
Section, the correspondence of data type and field is included in configuration file.
First field correction verification module 608, for being verified to the field obtained after fractionation.
The data for having been written into memory are then written back to number by write back data module 610 after passing through for verification in the form of field
According to library.
In one embodiment, as shown in fig. 7, the first field correction verification module 608 includes:Sequencing unit 608a and the first school
Verification certificate member 608b, wherein:
Sequencing unit 608a, the field for being obtained after fractionation are ranked up according to the sequence of write-in memory.
First verification unit 608b, after sorting, according to the corresponding field of preset data type in configuration file
Quantity or field name verify the field obtained after fractionation;If in the quantity and configuration file of the field obtained after splitting
Field quantity match or the title and configuration file of the field that are obtained after splitting in field name match, then pass through
Verification.
In one embodiment, as shown in figure 8, the digital independent that request receiving module 602 is additionally operable to receive requesting party is asked
It asks;The system further includes:Data inquiry module 612, the first data return to module 614, the second field correction verification module 616 and second
Data return to module 618, wherein:
Data inquiry module 612, for according to whether being stored with corresponding data in data read request audit memory.
First data return to module 614, if for being stored with corresponding data in memory, it will be with data read request pair
The data answered extract and are back to requesting party.
Second field correction verification module 616 exists for if corresponding data to be not present in memory according to data read request
Database extracts corresponding field, and is verified according to configuration file.
Second data return to module 618, for after verifying and passing through, being then assembled into the field of extraction and data read request
Corresponding data, and data corresponding with data read request are back to requesting party.
In one embodiment, as shown in figure 9, the second field correction verification module 616 includes:Extraction unit 616a and the second school
Verification certificate member 616b, wherein:
Extraction unit 616a, the sequence for memory to be written according to field according to data read request are extracted in the database
Corresponding field.
Second verification unit 616a, for according to the corresponding field quantity of preset data type in configuration file or word
Name section verifies the field of extraction;If the field quantity in the quantity and configuration file of the field of extraction matches or carries
Field name in the title and configuration file of the field taken matches, then passes through verification.
In one embodiment, as shown in Figure 10, which further includes:Data removing module 620, for deleting in memory
Beyond the data not being accessed in the accessed or nearest preset time of preset time.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
Cannot the limitation to the scope of the claims of the present invention therefore be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention
Protect range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. the data access method in a kind of caching system, the method includes:
Receive the data write request of requesting party;
Memory is written into the data of request write-in according to the data write request, the data for having been written into memory include corresponding to
Data type;
The data for having been written into memory are split as multiple fields according to preset configuration file, include in the configuration file
The correspondence of data type and field, the correspondence of data type and field includes the data of field in the configuration file
Type is corresponding with the title of the quantity of field or field;
The field obtained after fractionation is carried out according to the corresponding field quantity of data type in the configuration file or field name
Verification;
After verification passes through, then the data for having been written into memory are written back to database in the form of field.
2. according to the method described in claim 1, it is characterized in that, the step of described pair of field obtained after splitting verifies
Including:
The field obtained after the fractionation is ranked up according to the sequence of write-in memory;
After sequence, torn open to described according to the corresponding field quantity of preset data type in the configuration file or field name
The field obtained after point is verified;
If the quantity of the field obtained after the fractionation matches or described with the field quantity in the configuration file
The title of the field obtained after fractionation matches with the field name in the configuration file, then passes through verification.
3. according to the method described in claim 1, it is characterized in that, it is described by the data for having been written into memory in the form of field
After the step of being written back to database, further include:
Receive the data read request of requesting party;
It whether is stored with corresponding data according in the data read request audit memory;
If so, then extracting by data corresponding with the data read request and being back to requesting party;
Otherwise, corresponding field is extracted in database according to the data read request, and according to the configuration file to extraction
Field verified;
After verification passes through, then the field of the extraction is assembled into data corresponding with the data read request, and will be with institute
It states the corresponding data of data read request and is back to requesting party.
4. according to the method described in claim 3, it is characterized in that, described extract according to the data read request in database
Corresponding field, and the step of being verified to the field of extraction according to the configuration file includes:
The sequence that memory is written according to field according to the data read request extracts corresponding field from database;
According to the corresponding field quantity of preset data type in the configuration file or field name to the field of extraction into
Row verification;
If field quantity in the quantity of the field of the extraction and the configuration file matches or the field of the extraction
Title matches with the field name in the configuration file, then passes through verification.
5. method according to any one of claims 1 to 4, which is characterized in that the method further includes:
It deletes in memory beyond the data not being accessed in the accessed or nearest preset time of preset time.
6. the data access system in a kind of caching system, which is characterized in that the system comprises:
Request receiving module, the data write request for receiving requesting party;
Data write. module, it is described to have been written into for memory to be written in the data of request write-in according to the data write request
The data of memory include corresponding data type;
Data split module, for the data for having been written into memory to be split as multiple fields according to preset configuration file,
Include the correspondence of data type and field in the configuration file, data type is corresponding with field in the configuration file
Relationship includes that the data type of field is corresponding with the title of the quantity of field or field;
First field correction verification module, for according to the corresponding field quantity of data type in the configuration file or field name pair
The field obtained after fractionation is verified;
The data for having been written into memory are then written back to data by write back data module after passing through for verification in the form of field
Library.
7. system according to claim 6, which is characterized in that the first field correction verification module includes:
Sequencing unit, for the field obtained after the fractionation to be ranked up according to the sequence of write-in memory;
First verification unit, after sorting, according to the corresponding field quantity of preset data type in the configuration file
Or field name verifies the field obtained after the fractionation;If the quantity of the field obtained after the fractionation is matched with described
Set the field quantity in file match or the fractionation after the obtained title of field in the configuration file
Field name matches, then passes through verification.
8. system according to claim 6, which is characterized in that the request receiving module is additionally operable to receive the number of requesting party
According to read requests;
The system also includes:
Data inquiry module, for whether being stored with corresponding data according in the data read request audit memory;
First data return to module, if for being stored with corresponding data in memory, it will be corresponding with the data read request
Data extract and be back to requesting party;
Second field correction verification module, if for corresponding data to be not present in memory, according to the data read request in number
Corresponding field is extracted according to library, and is verified according to the configuration file;
Second data return to module, after passing through for verification, are then assembled into the field of the extraction and are asked with the digital independent
Corresponding data are sought, and data corresponding with the data read request are back to requesting party.
9. system according to claim 8, which is characterized in that the second field correction verification module includes:
Field extraction unit, the sequence for memory to be written according to field according to the data read request are extracted in the database
Corresponding field;
Second verification unit, for according to the corresponding field quantity of preset data type in the configuration file or field name
Title verifies the field of extraction;If the quantity of the field of the extraction matches with the field quantity in the configuration file
Or the title of the field of the extraction matches with the field name in the configuration file, then passes through verification.
10. according to claim 6 to 9 any one of them system, which is characterized in that the system also includes:
Data removing module, for delete in memory beyond preset time it is accessed or recently in preset time it is not accessed
Data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410668491.7A CN105677579B (en) | 2014-11-20 | 2014-11-20 | Data access method in caching system and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410668491.7A CN105677579B (en) | 2014-11-20 | 2014-11-20 | Data access method in caching system and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105677579A CN105677579A (en) | 2016-06-15 |
CN105677579B true CN105677579B (en) | 2018-08-17 |
Family
ID=56957354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410668491.7A Active CN105677579B (en) | 2014-11-20 | 2014-11-20 | Data access method in caching system and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105677579B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106407345B (en) * | 2016-09-06 | 2020-07-14 | 阿里巴巴(中国)有限公司 | Dirty data updating method and device |
CN110727691A (en) * | 2019-10-22 | 2020-01-24 | 北京明略软件***有限公司 | Data analysis and verification method and device |
CN111382128A (en) * | 2020-03-20 | 2020-07-07 | 中国邮政储蓄银行股份有限公司 | File splitting method and device and computer system |
CN113268440B (en) * | 2021-05-26 | 2022-08-02 | 上海哔哩哔哩科技有限公司 | Cache elimination method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902335A (en) * | 2009-05-27 | 2010-12-01 | 北京启明星辰信息技术股份有限公司 | Data filter and combination method |
CN102387200A (en) * | 2011-10-20 | 2012-03-21 | 中国科学院上海微***与信息技术研究所 | Sensor network backend data processing method based on labview and database |
US8204911B2 (en) * | 2001-01-09 | 2012-06-19 | Nextair Corporation | Software, devices and methods facilitating execution of server-side applications at mobile devices |
-
2014
- 2014-11-20 CN CN201410668491.7A patent/CN105677579B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8204911B2 (en) * | 2001-01-09 | 2012-06-19 | Nextair Corporation | Software, devices and methods facilitating execution of server-side applications at mobile devices |
CN101902335A (en) * | 2009-05-27 | 2010-12-01 | 北京启明星辰信息技术股份有限公司 | Data filter and combination method |
CN102387200A (en) * | 2011-10-20 | 2012-03-21 | 中国科学院上海微***与信息技术研究所 | Sensor network backend data processing method based on labview and database |
Also Published As
Publication number | Publication date |
---|---|
CN105677579A (en) | 2016-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3560143B1 (en) | Data isolation in a blockchain network | |
US8914856B1 (en) | Synchronization of networked storage systems and third party systems | |
US8291058B2 (en) | High speed network data extractor | |
KR101312125B1 (en) | Contents filtering apparatus and method thereof | |
US20230074102A1 (en) | Method and apparatus for processing data based on block chain, device and readable storage medium | |
CN107436725A (en) | A kind of data are write, read method, apparatus and distributed objects storage cluster | |
CN105677579B (en) | Data access method in caching system and system | |
US9146929B2 (en) | Automatic resource ownership assignment system and method | |
CN104123280A (en) | File comparison method and device | |
CN107832423B (en) | File reading and writing method for distributed file system | |
US9600486B2 (en) | File system directory attribute correction | |
CN109597640B (en) | Account management method, device, equipment and medium for application program | |
US20080282355A1 (en) | Document container data structure and methods thereof | |
WO2019226297A1 (en) | Edit transactions for blockchains | |
CN103150402A (en) | Index-code-based virtual file system, establishment method and access method | |
US8352442B2 (en) | Determination of an updated data source from disparate data sources | |
CN106909595A (en) | A kind of data migration method and device | |
CN103902660A (en) | System and method for prefetching file layout through readdir++ in cluster file system | |
CN109471843A (en) | A kind of metadata cache method, system and relevant apparatus | |
CN104657677A (en) | File encryption method based on alternate data streams | |
US20220083507A1 (en) | Trust chain for official data and documents | |
KR100680034B1 (en) | Context cognizance enhancing message transform system, and method for the same | |
US8498622B2 (en) | Data processing system with synchronization policy | |
CN108241705A (en) | A kind of data insertion method and device | |
CN110555682A (en) | multi-channel implementation method based on alliance chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |