CN106250535A - Application process that key word stores in big data and system - Google Patents
Application process that key word stores in big data and system Download PDFInfo
- Publication number
- CN106250535A CN106250535A CN201610640762.7A CN201610640762A CN106250535A CN 106250535 A CN106250535 A CN 106250535A CN 201610640762 A CN201610640762 A CN 201610640762A CN 106250535 A CN106250535 A CN 106250535A
- Authority
- CN
- China
- Prior art keywords
- storage
- data
- keyword
- key position
- big data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2219—Large Object storage; Management thereof
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides application process and system that a kind of key word stores in big data, described method comprises the steps: to receive the data needing storage;After this data storage being completed, search the key position of its keyword storage, in the data of the key position backup needs storage that this keyword stores.The technical scheme that the present invention provides has the advantage that safety is high.
Description
Technical field
The present invention relates to big data fields, particularly relate to application process and system that a kind of key word stores in big data.
Background technology
Big data (big data), or claim flood tide data, refer to need new tupe just can have higher decision-making
Power, insight and the magnanimity of process optimization ability, high growth rate and diversified information assets.At Victor mayer-She En
In " big data age " that Burger and Kenneth Cook are write, big data refer to without random analysis method (sampling survey) so
Shortcut, and use all data be analyzed process.The 4V feature of big data: Volume (in a large number), Velocity (at a high speed),
Variety (various), Value (value).
Existing big data cannot be carried out back-up processing, and Information Security is low.
Summary of the invention
The application process providing a kind of key word to store in big data, which solves low the lacking of prior art Information Security
Point.
On the one hand, it is provided that the application process that a kind of key word stores in big data, described method comprises the steps:
Receive the data needing storage;
After this data storage being completed, search the key position of its keyword storage;
Data in the key position backup needs storage that this keyword stores.
Optionally, described method also includes:
After keyword storage completes, send backup completion message.
Optionally, described method also includes:
Prompting residue memory capacity.
Second aspect, it is provided that a kind of application system providing key word to store in big data, described system includes:
Receive unit, for receiving the data needing storage;
Search unit, after this data storage being completed, search the key position of its keyword storage;
Backup units, the key position backup for storing at this keyword needs the data of storage.
Optionally, described system also includes:
Transmitting element, for after keyword storage completes, sends backup completion message.
Optionally, described system also includes:
Tip element, for prompting residue memory capacity.
The technical scheme that the specific embodiment of the invention provides receives the data needing storage, this data storage is completed
After, search the key position of its keyword storage, in the data of the key position backup needs storage that this keyword stores,
So its advantage being capable of back-up processing.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to
Other accompanying drawing is obtained according to these accompanying drawings.
The flow chart of the application process that a kind of key word that Fig. 1 provides for the present invention stores in big data;
The structure chart of the application system that a kind of key word that Fig. 2 provides for the present invention stores in big data.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
There is provided, for the present invention the first better embodiment, application process that key word stores in big data refering to Fig. 1, Fig. 1
Flow chart, the method is completed by server, and the method is as it is shown in figure 1, comprise the steps:
Step S101, reception need the data of storage;
Step S102, this data storage is completed after, search its keyword storage key position;
Step S103, the data of the key position backup needs storage stored at this keyword.
The technical scheme that the specific embodiment of the invention provides receives the data needing storage, this data storage is completed
After, search the key position of its keyword storage, in the data of the key position backup needs storage that this keyword stores,
So its advantage being capable of back-up processing.
Optionally, said method can also include after step s 103:
After keyword storage completes, send backup completion message.
Optionally, said method can also include after step s 103:
Prompting residue memory capacity.
The application system stored in big data for the present invention the second better embodiment offer key word refering to Fig. 2, Fig. 2,
This system includes:
Receive unit 201, for receiving the data needing storage;
Search unit 202, after this data storage being completed, search the key position of its keyword storage;
Backup units 203, the key position backup for storing at this keyword needs the data of storage.
The technical scheme that the specific embodiment of the invention provides receives the data needing storage, this data storage is completed
After, search the key position of its keyword storage, in the data of the key position backup needs storage that this keyword stores,
So its advantage being capable of back-up processing.
Optionally, said system can also include:
Transmitting element 204, for after keyword storage completes, sends backup completion message.
Optionally, said system can also include:
Tip element 205, for prompting residue memory capacity.
It should be noted that for aforesaid each method embodiment or embodiment, in order to be briefly described, therefore by its all table
Stating as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement
Restriction, because of according to the present invention, some step can use other orders or carry out simultaneously.Secondly, people in the art
Member also should know, embodiment described in the specification or embodiment belong to preferred embodiment, involved action and list
Necessary to the unit not necessarily present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiments.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.This area
The feature of the different embodiments described in this specification and different embodiment can be combined or combine by technical staff.
Through the above description of the embodiments, those skilled in the art it can be understood that to the present invention permissible
Realize with hardware, or firmware realizes, or combinations thereof mode realizes.When implemented in software, can be by above-mentioned functions
It is stored in computer-readable medium or is transmitted as the one or more instructions on computer-readable medium or code.Meter
Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another
The individual local any medium transmitting computer program.Storage medium can be any usable medium that computer can access.With
As a example by this but be not limited to: computer-readable medium can include random access memory (Random Access Memory,
RAM), read only memory (Read-Only Memory, ROM), EEPROM (Electrically
Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-
Only Memory, CD-ROM) or other optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in
Carry or store and there is instruction or the desired program code of data structure form can be by any other of computer access
Medium.In addition.Any connection can be suitable become computer-readable medium.Such as, if software is to use coaxial cable, light
Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and
The wireless technology of microwave etc from website, server or other remote source, then coaxial cable, optical fiber cable, double
The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc be included in affiliated medium fixing in.Such as this
Bright used, dish (Disk) and dish (disc) include compress laser disc (CD), laser dish, laser disc, Digital Versatile Disc (DVD),
Floppy disk and Blu-ray Disc, the duplication data of the usual magnetic of its mid-game, dish then carrys out the duplication data of optics with laser.Group above
Close within should also be as being included in the protection domain of computer-readable medium.
In a word, the foregoing is only the preferred embodiment of technical solution of the present invention, be not intended to limit the present invention's
Protection domain.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included in
Within protection scope of the present invention.
Claims (6)
1. the application process that a key word stores in big data, it is characterised in that described method comprises the steps:
Receive the data needing storage;
After this data storage being completed, search the key position of its keyword storage;
Data in the key position backup needs storage that this keyword stores.
Method the most according to claim 1, it is characterised in that described method also includes:
After keyword storage completes, send backup completion message.
Method the most according to claim 1, it is characterised in that described method also includes:
Prompting residue memory capacity.
4. one kind provides the application system that key word stores in big data, it is characterised in that described system includes:
Receive unit, for receiving the data needing storage;
Search unit, after this data storage being completed, search the key position of its keyword storage;
Backup units, the key position backup for storing at this keyword needs the data of storage.
System the most according to claim 4, it is characterised in that described system also includes:
Transmitting element, for after keyword storage completes, sends backup completion message.
System the most according to claim 4, it is characterised in that described system also includes:
Tip element, for prompting residue memory capacity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610640762.7A CN106250535A (en) | 2016-08-08 | 2016-08-08 | Application process that key word stores in big data and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610640762.7A CN106250535A (en) | 2016-08-08 | 2016-08-08 | Application process that key word stores in big data and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106250535A true CN106250535A (en) | 2016-12-21 |
Family
ID=58078405
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610640762.7A Pending CN106250535A (en) | 2016-08-08 | 2016-08-08 | Application process that key word stores in big data and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106250535A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018027469A1 (en) * | 2016-08-08 | 2018-02-15 | 马岩 | Application method and system of keyword in big data storage |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104699857A (en) * | 2015-04-09 | 2015-06-10 | 成都卡莱博尔信息技术有限公司 | Big data storage method based on knowledge engineering |
CN104731967A (en) * | 2015-04-09 | 2015-06-24 | 成都卡莱博尔信息技术有限公司 | Research and development orientated knowledge storage method |
CN104750841A (en) * | 2015-04-09 | 2015-07-01 | 成都卡莱博尔信息技术有限公司 | Knowledge storage method |
CN104915441A (en) * | 2015-06-26 | 2015-09-16 | 上海承蓝电子科技有限公司 | Image data visualization method, and device and system thereof |
US20150347253A1 (en) * | 2014-05-29 | 2015-12-03 | Dell Products, Lp | Federating and Protecting Multiple Big Data Sources Combined with Enterprise Data Sources for BI |
-
2016
- 2016-08-08 CN CN201610640762.7A patent/CN106250535A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150347253A1 (en) * | 2014-05-29 | 2015-12-03 | Dell Products, Lp | Federating and Protecting Multiple Big Data Sources Combined with Enterprise Data Sources for BI |
CN104699857A (en) * | 2015-04-09 | 2015-06-10 | 成都卡莱博尔信息技术有限公司 | Big data storage method based on knowledge engineering |
CN104731967A (en) * | 2015-04-09 | 2015-06-24 | 成都卡莱博尔信息技术有限公司 | Research and development orientated knowledge storage method |
CN104750841A (en) * | 2015-04-09 | 2015-07-01 | 成都卡莱博尔信息技术有限公司 | Knowledge storage method |
CN104915441A (en) * | 2015-06-26 | 2015-09-16 | 上海承蓝电子科技有限公司 | Image data visualization method, and device and system thereof |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018027469A1 (en) * | 2016-08-08 | 2018-02-15 | 马岩 | Application method and system of keyword in big data storage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106293528A (en) | Dropbox stores the method and system of big data | |
CN106294011A (en) | The big date storage method of sort-type and system | |
CN106294010A (en) | The storage method and system of big data in distributed system | |
CN106250516A (en) | Synonym application process in big data search and system | |
CN106294637A (en) | Realize the method and system of phonetic search | |
CN106250538A (en) | Wechat is shared the method and system of big data | |
CN106241504A (en) | The method and system of foot Bit andits control vertical coil winding machine | |
CN106296428A (en) | Horizontal coil winding machine rotates forward control method and system | |
CN106157196A (en) | The evaluation methodology in house and system | |
CN106203925A (en) | Automobile logistics website method and system | |
CN106294645A (en) | Different part of speech realization method and systems in big data search | |
CN106250509A (en) | Key class searching method and system in big data | |
CN106250535A (en) | Application process that key word stores in big data and system | |
CN106254662A (en) | Interior of mobile phone control method and system | |
CN106253787A (en) | The rotating speed method and system of closed loop control horizontal coil winding machine | |
CN106161799A (en) | The method for closing of application program of mobile phone and system | |
CN106303036A (en) | The hidden method of app and system under specific use scene | |
CN106326033A (en) | Real-time backup method and system based on big data | |
CN106331323A (en) | Method and system for sorting apps according to place | |
CN106296859A (en) | The attendance recording method of GPRS and system in security protection | |
CN106294711A (en) | Different part of speech realization method and systems in big data search | |
CN106250531A (en) | Synonym application process in big data search and system | |
CN106250530A (en) | Key class searching method and system in big data | |
CN106326875A (en) | Security protection fingerprint recognition method and system | |
CN106294692A (en) | Realize the method and system of phonetic search |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161221 |