CN115004643B - Authority configuration method, device, node equipment and data processing system - Google Patents

Authority configuration method, device, node equipment and data processing system Download PDF

Info

Publication number
CN115004643B
CN115004643B CN202080094698.1A CN202080094698A CN115004643B CN 115004643 B CN115004643 B CN 115004643B CN 202080094698 A CN202080094698 A CN 202080094698A CN 115004643 B CN115004643 B CN 115004643B
Authority
CN
China
Prior art keywords
data processing
processing node
resource access
node
priority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202080094698.1A
Other languages
Chinese (zh)
Other versions
CN115004643A (en
Inventor
郭子亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN115004643A publication Critical patent/CN115004643A/en
Application granted granted Critical
Publication of CN115004643B publication Critical patent/CN115004643B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/427Loop networks with decentralised control
    • H04L12/433Loop networks with decentralised control with asynchronous transmission, e.g. token ring, register insertion

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a permission configuration method, a permission configuration device, node equipment and a data processing system. Comprising the following steps: the current data processing node acquires a data processing node to be configured; acquiring a resource access priority of a data processing node to be configured; if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node; and configuring the resource access rights to the target data processing node. Therefore, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted.

Description

Authority configuration method, device, node equipment and data processing system
Technical Field
The present application relates to the field of distributed data processing, and in particular, to a method, an apparatus, a node device, and a data processing system for configuring rights.
Background
In a data processing system, there is often a case where multiple data processing nodes share the same resource, and in this case, the multiple data processing nodes acquire access rights to the resource according to a specified order, so as to perform resource access in a mutually exclusive manner. However, the related resource access method for performing the mutual exclusion method has a problem of low access efficiency and resource waste.
Disclosure of Invention
In view of the above, the present application proposes a rights configuration method, apparatus, node device and data processing system to improve the above-mentioned problems.
In a first aspect, the present application provides a rights configuration method, where the method includes: the method comprises the steps that a current data processing node obtains a data processing node to be subjected to resource access authority configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access authority configuration is the next data processing node adjacent to the current data processing node in corresponding resource access sequence; acquiring the resource access priority of the data processing node to be configured; if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node; and configuring the resource access authority to the target data processing node.
In a second aspect, the present application provides a rights configuration method applied to a data processing system, the data processing system including a control node and a data processing node, the method comprising: the control node obtains a target data processing node to be configured with resource access authority as a target data processing node to be configured, wherein the data processing node to be configured with the resource access authority is the next data processing node adjacent to the resource access sequencing of the current data processing node in the corresponding resource access sequencing; acquiring the resource access priority of the data processing node to be configured; if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node; and configuring the resource access authority to the target data processing node.
In a third aspect, the present application provides a resource access rights configuration apparatus, the apparatus comprising: the node selection unit is used for acquiring a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access permission configuration is the next data processing node adjacent to the resource access ordering of the current data processing node for the corresponding resource access ordering; a priority obtaining unit, configured to obtain a resource access priority of the data processing node to be configured; the node detection unit is used for taking the data processing node to be configured as a target data processing node if the resource access priority meets the target condition; and the permission configuration unit is used for configuring the resource access permission to the target data processing node.
In a fourth aspect, the present application provides a data processing system comprising a control node and a data processing node; the data processing node is used for processing data based on shared resources; the control node is configured to acquire a target data processing node to be configured with resource access authority as a target data processing node to be configured, and the data processing node to be configured with resource access authority of the data processing node to be configured with resource access authority is a next data processing node adjacent to the resource access sequencing of the current data processing node in corresponding resource access sequencing; acquiring the resource access priority of the data processing node to be configured; if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node; and configuring the resource access authority to the target data processing node.
In a fifth aspect, the present application provides a node device comprising one or more processors and memory; one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the methods described above.
In a sixth aspect, the present application provides a computer readable storage medium having program code executable by a processor, the program code causing the processor to perform the method described above.
According to the permission configuration method, the device, the node equipment and the data processing system, after a current data processing node obtains a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, firstly obtaining the resource access priority of the data processing node to be configured, and then taking the data processing node to be configured as a target data processing node if the resource access priority meets a target condition so as to configure the resource access permission to the target data processing node. By the method, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access authority under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a schematic diagram of an application scenario according to an embodiment of the present application;
fig. 2 shows a schematic diagram of another application scenario proposed by an embodiment of the present application;
FIG. 3 is a flowchart of a method for configuring rights according to an embodiment of the present application;
FIG. 4 is a flowchart of another rights configuration method according to an embodiment of the present application;
FIG. 5 is a flowchart of another rights configuration method according to an embodiment of the present application;
FIG. 6 is a flowchart of another rights configuration method according to an embodiment of the present application;
FIG. 7 is a flowchart of another rights configuration method according to an embodiment of the present application;
fig. 8 is a block diagram of a rights configuration device according to an embodiment of the present application;
FIG. 9 is a block diagram of another rights configuration device according to an embodiment of the present application;
FIG. 10 is a block diagram of a rights configuration device according to another embodiment of the present application;
fig. 11 shows a block diagram of a node device according to an embodiment of the present application.
Fig. 12 is a storage unit for storing or carrying program code for implementing the rights configuration method according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In a computer system, a flow of data processing is unavoidable. For example, in a shopping system, browsing data is processed, order data is processed, and chat data may be processed. For another example, there may be processing of data to be transmitted in the information transmission system, or processing of data to be stored may be performed correspondingly.
With the increasing amount of data that needs to be processed in modern computer systems, multiple data processing nodes may be configured in a computer system to perform data processing, thereby increasing the data processing capacity of the entire computer system. In this case, different data processing nodes may all need to access the same resource (e.g., critical resource accessed mutually exclusive) for data processing. In order to enable different data processing nodes to access the same resource orderly, a token form can be adopted to determine which data processing node has resource access authority currently. In this case, the token may be transferred between different data processing nodes, and the data processing nodes that have acquired the token may have access to the resource in a mutually exclusive manner.
However, the inventors have found in the above-described studies of such a token-based authority configuration scheme that there are also problems of low access efficiency and resource waste. In particular, in the case of multiple data processing nodes, the data processing tasks performed by each data processing node may be different, meaning that the opportunities for resource access by the different data processing nodes are different, but the opportunities for each data processing node to acquire tokens are equal. The inventors have thus found that if tokens are passed directly in sequence, it may be that the data processing node that acquired the token does not actually need to have resource access, which may cause the data processing node that acquired the token to pass the token to the next data processing node without performing resource access. Therefore, when the data processing node which does not need to access the resource still acquires the token and also needs to execute the token passing operation, invalid token passing communication overhead is caused, so that resource waste is caused, and the processing efficiency of the data processing node which needs the resource access right urgently at present is also influenced.
Therefore, in order to improve the above-mentioned problems, the inventor proposes a permission configuration method, a device, a node device and a data processing system in the present application, after a current data processing node obtains a data processing node to be configured with a resource access permission as a data processing node to be configured, the resource access priority of the data processing node to be configured is obtained first, and then if the resource access priority meets a target condition, the data processing node to be configured is used as a target data processing node, so as to configure the resource access permission to the target data processing node.
By the method, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access authority under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted.
The environment of a data processing system in which the rights configuration method and apparatus provided by the present application operate will be described.
As shown in FIG. 1, data processing system 100 shown in FIG. 1 includes data processing node 121, data processing node 122, data processing node 123, data processing node 124, data processing node 125, and data processing node 126. And wherein data processing node 121, data processing node 122, data processing node 123, data processing node 124, data processing node 125, and data processing node 126 are in a ring structure. In the environment shown in fig. 1, the data processing nodes that can acquire the resource access rights are determined by the node that currently acquires the resource access rights. Illustratively, in the case where the data processing node 121 currently acquires the resource access right, the data processing node 121 determines the data processing node that acquires the resource access right next. For example, if the determination is made according to the resource access order, the data processing node 121 detects whether the data processing node 122 following the corresponding resource access order can acquire the resource access right, if so, the resource access right may be configured to the data processing node 122 in an instruction manner, and if not, it continues to detect whether the data processing node 123 following the data processing node 122 in the corresponding resource access order can acquire the resource access right.
Furthermore, in addition to the environment illustrated in FIG. 1, the data processing system provided by the present application may also be the environment illustrated in FIG. 2. In the environment shown in fig. 2, the next data processing node that can obtain access rights to the resource is detected by the control node 110.
It should be noted that the ring structures shown in fig. 1 and 2 are merely exemplary, and that the specific environment structure may be other, and that the location of each data processing node in the ring structure may be modified. Illustratively, the round robin order preceding the data processing nodes may be in a counter-clockwise manner in addition to the clockwise one shown in FIG. 1.
It should be noted that the data processing nodes shown in fig. 1 and 2 may be hardware device nodes or software nodes. For example, in the case of a software node, the data processing node may be a process or a thread. For example, the plurality of data processing nodes are processes of different application programs respectively, and the same resource to be accessed is a computing resource of the processor. For another example, the plurality of data processing nodes are respectively different threads of the same application program, and the same resource to be accessed is a channel for communicating with an external program. In the case of a hardware node, the data processing node may be a plurality of cooperating devices, for example a plurality of cooperating smartphones, smartbracelets, drones or the like. And the same resource to be accessed can be a communication frequency band, etc.
Embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Referring to fig. 3, the present application provides a method for configuring rights, which includes:
s110: the method comprises the steps that a current data processing node obtains a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access permission configuration is the next data processing node adjacent to the current data processing node in corresponding resource access sequence.
It should be noted that, the current data processing node is the data processing node that currently acquires the resource access right. Each data processing node is formed by a ring network structure shown in fig. 1 or fig. 2, and then each data processing node corresponds to a respective resource access sequence, and the resource access sequence represents a positional relationship of the corresponding data processing node relative to other data processing nodes. For example, as shown in FIG. 1, the arrows between data processing nodes indicate the order of resource accesses, and if the current data processing node is data processing node 121, then the next data processing node adjacent to the current data processing node's resource access order is data processing node 122.
S120: and acquiring the resource access priority of the data processing node to be configured.
In the embodiment of the application, each data processing node corresponds to the resource access priority, and the data processing node with higher corresponding resource access priority can acquire the resource access authority with higher probability. The current data processing node may have a plurality of ways for obtaining the resource access priority of the data processing node to be configured.
As one way, the current data processing node may obtain the resource access priority to the data processing node to be configured by sending an inquiry request to the data processing node to be configured. In this way, the current data processing node may send an inquiry request to the data processing node to be configured, and after receiving the inquiry request, the data processing node to be configured locally inquires the corresponding resource access priority, and then returns the inquired resource access priority to the current data processing node, so that the current data processing node may acquire the resource access priority of the data processing node to be configured.
Alternatively, node priority information may be configured on each data processing node, where the node priority information may store resource access priorities of data processing nodes that are in the same ring network structure as the current data processing node. In this manner, the current data processing node may obtain the resource access priority to the data processing node to be configured by querying local node priority information. Optionally, in order to enable each data processing node to acquire the latest resource access priority of the other data processing nodes in real time, each data processing node may send a priority synchronization request to the other data processing nodes after detecting the corresponding resource access priority update, so as to synchronize the updated resource access priority to the other data processing nodes in real time.
It should be noted that, due to system confusion, etc., between different data processing nodes, synchronous update of the resource access priority cannot be performed immediately. For example, if a module in a certain data processing node responsible for sending a priority synchronization request crashes, it will cause that the latest resource access priority of the certain data processing node cannot be synchronized with other data processing nodes, although the data processing operation can still be performed. In this case, as a way, the current data processing node may query the local node priority information preferentially, and acquire the update time of the latest resource access priority of the data processing node to be configured from the local node priority information, and if the time length between the update time and the current time is less than the threshold time length, determine that the latest resource access priority of the data processing node to be configured recorded in the local node priority information is valid, and further directly acquire the resource access priority of the data processing node to be configured from the local node priority information. If the time length between the update time and the current time is not less than the threshold time length, determining that the latest resource access priority of the data processing node to be configured recorded in the local node priority information is invalid, and triggering the data processing node to be configured to inquire the latest resource access priority from the local and return the latest resource access priority to the current data processing node in real time by sending an inquiry request to the data processing node to be configured.
S130: and if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node.
Alternatively, the target condition may include that the resource access priority is greater than the specified priority, or that the resource access priority is within a specified priority interval.
S140: and configuring the resource access authority to the target data processing node.
As a way, each data processing node may be configured with a node identifier identifying its own identity, in which way the data processing node may identify whether it is currently the current data processing node that has acquired the resource access rights. Correspondingly, in the process that the current data processing node configures the resource access right to the target data processing node, a right configuration instruction can be sent to the target data processing node, and the target data processing node can update the node identification of the target data processing node to represent the current data processing node which has acquired the resource access right after receiving the right configuration instruction. For example, if the value of the node identifier is 0, it indicates that the resource access right is not obtained, and if the value of the node identifier is 1, it indicates that the resource access right is obtained. In this case, the target data processing node may update its own node identifier to 1 after receiving the permission configuration instruction, and the target data processing node may start to access the resource after further detecting that the node identifier is 1.
According to the authority configuration method provided by the embodiment of the application, after the current data processing node obtains the data processing node to be subjected to resource access authority configuration as the data processing node to be configured, the resource access priority of the data processing node to be configured is obtained first, and then if the resource access priority meets the target condition, the data processing node to be configured is used as the target data processing node, so that the resource access authority is configured to the target data processing node. By the method, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access authority under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted.
Referring to fig. 4, the present application provides a method for configuring rights, which includes:
S210: the method comprises the steps that a current data processing node obtains a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access permission configuration is the next data processing node adjacent to the current data processing node in corresponding resource access sequence.
S220: and acquiring the resource access priority of the data processing node to be configured.
S230: detecting whether the resource access priority is greater than a specified priority.
Alternatively, the resource access priority of the data processing nodes in embodiments of the present application may be between-128 and 127. Alternatively, the specified priority may be one-half of the lowest resource access priority. For example, if the resource access priority of the data processing node may be between-128 and 127, then the specified priority may be-128/2= -64.
S240: and if the resource access priority is detected to be greater than the designated priority, judging that the resource access priority meets a target condition.
S250: and if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node.
S251: and configuring the resource access authority to the target data processing node.
S260: and if the resource access priority is detected to be not greater than the designated priority, acquiring the resource access identification of the data processing node to be configured.
S270: and detecting the resource access identification of the data processing node to be configured.
S271: and if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node allowing resource access, taking the data processing node to be configured as a target data processing node, and configuring the data processing node to be configured as a node not allowing resource access.
S272: and configuring the resource access authority to the target data processing node.
S273: and if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node which does not allow resource access, taking the next data processing node adjacent to the target data processing node which is currently subjected to resource access permission configuration as a new data processing node to be configured, and configuring the data processing node to be configured as a node which allows resource access.
Optionally, if the resource access identifier is 1, the target data processing node is represented as a node that does not allow resource access, which can be understood as representing that the data processing node to be configured needs to be skipped and the next data processing node adjacent to the data processing node to be configured is taken as a new data processing node to be configured, so as to further detect whether the new data processing node to be configured can acquire the resource access authority. And if the resource access identifier is 0, the target data processing node is characterized as a node allowing resource access.
As a way, the resource access rights are configured to the next data processing node adjacent to the target data processing node currently to be configured for resource access rights in the corresponding resource access sequence.
Illustratively, as shown in FIG. 1, data processing node 121, data processing node 122, and data processing node 123 are three data processing nodes ordered sequentially in the order of resource access. If the data processing node 121 is the current data processing node, the data processing node 121 uses the data processing node 122 adjacent to the current data processing node as the data processing node to be configured when the permission is transferred, and uses the data processing node 123 adjacent to the data processing node 122 as the new data processing node to be configured when the resource access identifier of the data processing node 122 is determined to indicate that the data processing node 122 is not currently a node allowing the resource access.
In the permission configuration method provided by the embodiment of the application, after the current data processing node obtains the data processing node to be subjected to resource access permission configuration as the data processing node to be configured, the resource access priority of the data processing node to be configured is obtained first, and then if the resource access priority is greater than the designated priority, the data processing node to be configured is used as the target data processing node, so that the resource access permission is configured to the target data processing node.
By the method, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access authority under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted. In this embodiment, when it is detected that the resource access priority is not greater than the specified priority, the resource access identifier of the data processing node to be configured is further detected, and the target data processing node capable of acquiring the resource access rights is determined according to the value of the resource access identifier, so that the whole rights configuration process is more flexible, and it is also possible to determine which data processing nodes actually need the resource access rights more accurately.
Referring to fig. 5, the present application provides a method for configuring rights, which includes:
S310: the method comprises the steps that a current data processing node obtains a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access permission configuration is the next data processing node adjacent to the current data processing node in corresponding resource access sequence.
S320: and acquiring the resource access priority of the data processing node to be configured.
S330: and if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node.
S340: and configuring the resource access authority to the target data processing node.
S350: and if the confirmation message returned by the target data processing node is not received within the appointed duration, judging that the target data processing node is invalid.
Correspondingly, if the confirmation message returned by the target data processing node is received within the appointed duration, the target data processing node is confirmed to successfully acquire the resource access right.
S360: and taking the next data processing node adjacent to the corresponding resource access sequence of the target data processing node as the data processing node to be configured.
It should be noted that, as one way, if the resource access authority is obtained, a confirmation message is returned to the data processing node that is ranked before the current data processing node in the corresponding resource access.
If the resource access authority is acquired, returning a confirmation message to the data processing node which is sequenced before the current data processing node and corresponds to the resource access authority further comprises: and if the need of resource access is detected, the access priority of the current data processing node is improved.
If the resource access authority is acquired, returning a confirmation message to the data processing node which is sequenced before the current data processing node and corresponds to the resource access authority further comprises: and if no resource access is detected, reducing the access priority of the current data processing node.
It should be noted that, a task to be processed storage area may be configured in each data processing node, and the task to be processed storage area may store a task that the data processing node is currently required to process. And when the tasks in the task storage area to be processed are processed, deleting the processed task to be processed from the task storage area to be processed. The data processing node (e.g., the current data processing node) may detect whether resource access is required by querying whether a task to be processed is stored in the task to be processed storage area, e.g., if the task to be processed is queried, then resource access is detected to be required, and if the task to be processed storage area is queried to be empty, then resource access is detected to be unnecessary.
The permission configuration method provided by the embodiment of the application realizes that when the next data processing node with the resource access permission is determined, the resource access priority of the data processing node to be configured is confirmed, and when the resource access priority meets the target condition, the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access permission, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access permission is avoided, thereby causing low access efficiency and resource waste. In addition, in this embodiment, a confirmation message mechanism is introduced during the configuration process of the resource access rights, so that the current data processing node can effectively confirm whether the determined target data processing node successfully acquires the resource access rights, so as to avoid that the resource access rights are stagnated between the current data processing node and the determined target data processing node, and other data processing nodes cannot acquire the resource access rights.
Referring to fig. 6, the present application provides a method for configuring rights, which includes:
S410: and acquiring an online data processing node.
As one way, the method further comprises: broadcasting on-line prompt information to other data processing nodes when the data processing nodes are on-line; the acquiring online data processing node comprises: acquiring locally received online prompt information; and taking the data processing node which sends the online prompt information as an online data processing node.
As a way, the obtaining the locally received online prompt information includes: and acquiring the locally received online prompt information in a specified time period, wherein the specified time period is the time period between the last time the current data processing node is used as the current data processing node and the current time the current data processing node is used as the current data processing node.
S420: generating current resource access sequence information according to the online data processing nodes, wherein the resource access sequence information comprises the current corresponding resource access sequence of each data processing node.
S430: the method comprises the steps that a current data processing node obtains a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access permission configuration is the next data processing node adjacent to the current data processing node in corresponding resource access sequence.
S440: and acquiring the resource access priority of the data processing node to be configured.
S450: and if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node.
S460: and configuring the resource access authority to the target data processing node.
It should be noted that, as one way, the configuring the resource access right to the target data processing node includes: transmitting an authority configuration instruction to the target data processing node through a first communication path so as to configure the resource access authority to the target data processing node; the method further comprises the steps of: and sending the online prompt information to other data processing nodes through a second communication path.
Optionally, the second communication path may be further used to send the query request for obtaining the resource access priority in the foregoing embodiment, and may be further used to send the priority synchronization request.
The permission configuration method provided by the embodiment of the application realizes that when the next data processing node with the resource access permission is determined, the resource access priority of the data processing node to be configured is confirmed, and when the resource access priority meets the target condition, the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access permission, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access permission is avoided, thereby causing low access efficiency and resource waste. In this embodiment, the online data processing node is acquired before the next data processing node with the resource access right is determined, and then the current resource access sequence information including the current corresponding resource access sequence of each data processing node is generated according to the online data processing node, so that the current data processing nodes in the working state can be effectively determined in real time, and the problem that the offline data processing node is determined as the target data processing node and resource waste is caused is avoided.
Referring to fig. 7, the present application provides a method for configuring rights, which includes: applied to a data processing system comprising a control node and a data processing node, the method comprising:
s510: the control node obtains a target data processing node to be configured with the resource access authority as a target data processing node to be configured, and the data processing node to be configured with the resource access authority is the next data processing node adjacent to the resource access sequencing of the current data processing node in the corresponding resource access sequencing.
S520: and acquiring the resource access priority of the data processing node to be configured.
S530: and if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node.
S540: and configuring the resource access authority to the target data processing node.
When necessary, the functions that can be performed by the control node in this embodiment are the same as those that can be performed by the current data processing node in the foregoing embodiment. The steps performed by the current data processing node in the foregoing embodiments may all be directly executed in the control node in this embodiment.
The application provides a permission configuration method, which comprises the steps of firstly acquiring a resource access priority of a data processing node to be configured after a current data processing node acquires the data processing node to be configured with the resource access permission as the data processing node to be configured, and then taking the data processing node to be configured as a target data processing node if the resource access priority meets a target condition so as to configure the resource access permission to the target data processing node. By the method, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access authority under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted.
Referring to fig. 8, the present application provides a resource access right configuration device 600, where the device 600 includes:
The node selection unit 610 is configured to obtain a data processing node to be configured with resource access rights as a data processing node to be configured, where the data processing node to be configured with resource access rights is a next data processing node adjacent to the resource access ordering of the current data processing node for a corresponding resource access ordering.
A priority obtaining unit 620, configured to obtain a resource access priority of the data processing node to be configured.
The node detection unit 630 is configured to take the data processing node to be configured as a target data processing node if the resource access priority meets a target condition.
And the permission configuration unit 640 is used for configuring the resource access permission to the target data processing node.
The node detecting unit 630 is specifically configured to detect whether the resource access priority is greater than a specified priority; and if the resource access priority is detected to be greater than the designated priority, judging that the resource access priority meets a target condition.
As one way, the node detecting unit 630 is specifically configured to detect the resource access identifier of the data processing node to be configured if it is detected that the resource access priority is not greater than the specified priority; and if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node allowing resource access, taking the data processing node to be configured as a target data processing node, and configuring the data processing node to be configured as a node not allowing resource access. Correspondingly, the node detection unit 630 is further specifically configured to, if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node that does not allow resource access, take a next data processing node adjacent to the target data processing node to be configured with the current resource access permission as a new data processing node to be configured, and configure the data processing node to be configured as a node that allows resource access.
In this manner, the permission configuration unit 640 is specifically configured to configure the resource access permission to the next data processing node adjacent to the target data processing node to which the resource access permission is currently to be configured in the corresponding resource access order.
As one way, the node selection unit 610 is further configured to determine that the target data processing node fails if an acknowledgement message returned by the target data processing node is not received within a specified duration; and taking the next data processing node adjacent to the corresponding resource access sequence of the target data processing node as the data processing node to be configured. In this manner, as shown in fig. 9, the apparatus 600 further includes an acknowledgement message sending unit 650 configured to return an acknowledgement message to the data processing node that is ranked before the current data processing node for resource access if the resource access right is acquired.
As one way, as shown in fig. 10, the apparatus 600 further includes: and the priority management unit 660 is configured to, if it is detected that resource access is required, promote the access priority of the current data processing node. And if no resource access is detected, reducing the access priority of the current data processing node.
As a way, the node selection unit 610 is further configured to obtain an online data processing node; generating current resource access sequence information according to the online data processing nodes, wherein the resource access sequence information comprises the current corresponding resource access sequence of each data processing node. Optionally, the node selection unit 610 is further configured to obtain configured valid data processing nodes from the online data processing nodes, and the corresponding node selection unit 610 is specifically configured to generate current resource access sequence information according to the valid data processing nodes. Optionally, the node selection unit 610 is specifically configured to obtain locally received online prompt information; and taking the data processing node which sends the online prompt information as an online data processing node. The node selection unit 610 is specifically configured to obtain online prompt information received locally within a specified time period, where the specified time period is a time period between the current data processing node being the current data processing node last time and the current data processing node being the current data processing node.
As one way, the rights configuration unit 640 is specifically configured to send a rights configuration instruction to the target data processing node through the first communication path, so as to configure the resource access rights to the target data processing node. In this manner, as shown in fig. 10, the apparatus 600 further includes: the online prompting unit 660 is configured to send online prompting information to other data processing nodes through the second communication path.
The application provides a permission configuration device, which is characterized in that after a current data processing node obtains a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, the resource access priority of the data processing node to be configured is obtained first, and then if the resource access priority meets a target condition, the data processing node to be configured is used as a target data processing node, so that the resource access permission is configured to the target data processing node. By the method, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access authority under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted.
It should be noted that, the content in the apparatus embodiment and the content in the foregoing method embodiment correspond to each other, and for further technical details in the apparatus embodiment, reference may be made to the content in the foregoing method embodiment, which is not described herein again.
A node device according to the present application will be described with reference to fig. 11.
Referring to fig. 11, based on the foregoing short message pushing method, another node device 200 including a processor 102 capable of executing the foregoing short message pushing method is provided in the embodiment of the present application. The node device 200 also includes a memory 104, and a network module 106. The memory 104 stores therein a program capable of executing the contents of the foregoing embodiments, and the processor 102 can execute the program stored in the memory 104.
Wherein the processor 102 utilizes various interfaces and lines to connect various portions of the overall node device 200, perform various functions of the node device 200 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 104, and invoking data stored in the memory 104. Alternatively, the processor 102 may be implemented in hardware in at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 102 may integrate one or a combination of several of a central processing unit (Central Processing Unit, CPU), an image processor (Graphics Processing Unit, GPU), and a modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for being responsible for rendering and drawing of display content; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 102 and may be implemented solely by a single communication chip.
The Memory 104 may include random access Memory (Random Access Memory, RAM) or Read-Only Memory (RAM). Memory 104 may be used to store instructions, programs, code sets, or instruction sets. The memory 104 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (e.g., a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described below, etc. The storage data area may also store data created by the terminal 100 in use (such as phonebook, audio-video data, chat-record data), etc.
The network module 106 is configured to receive and transmit electromagnetic waves, and to implement mutual conversion between the electromagnetic waves and the electrical signals, so as to communicate with a communication network or other devices, such as an audio playing device. The network module 106 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and the like. The network module 106 may communicate with various networks such as the Internet, intranets, wireless networks, or other devices via wireless networks. The wireless network may include a cellular telephone network, a wireless local area network, or a metropolitan area network. For example, the network module 106 may interact with base stations.
Alternatively, the node device 200 may be a smart phone, a smart bracelet, a server, a drone, or the like.
Referring to fig. 12, a block diagram of a computer readable storage medium according to an embodiment of the present application is shown. The computer readable medium 1100 has stored therein program code that can be invoked by a processor to perform the methods described in the method embodiments above.
The computer readable storage medium 1100 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Optionally, computer readable storage medium 1100 includes non-volatile computer readable medium (non-transitory computer-readable storage medium). The computer readable storage medium 1100 has storage space for program code 810 that performs any of the method steps described above. The program code can be read from or written to one or more computer program products. Program code 1110 may be compressed, for example, in a suitable form.
In summary, according to the permission configuration method, the device, the node equipment and the data processing system provided by the application, after the current data processing node obtains the data processing node to be subjected to resource access permission configuration as the data processing node to be configured, the resource access priority of the data processing node to be configured is obtained first, and then if the resource access priority meets the target condition, the data processing node to be configured is used as the target data processing node, so that the resource access permission is configured to the target data processing node. By the method, when the next data processing node with the resource access authority is determined, the resource access priority of the data processing node to be configured is confirmed, and the data processing node to be configured is taken as the target data processing node capable of acquiring the resource access authority under the condition that the resource access priority meets the target condition, so that the target data processing node can be determined by the priority, and the probability that each data processing node has the same resource access authority is avoided, and the access efficiency is low and the resource is wasted.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be appreciated by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not drive the essence of the corresponding technical solutions to depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (16)

1. A rights configuration method, the method comprising:
the method comprises the steps that a current data processing node obtains a data processing node to be subjected to resource access authority configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access authority configuration is the next data processing node adjacent to the current data processing node in corresponding resource access sequence;
acquiring the resource access priority of the data processing node to be configured;
detecting whether the resource access priority is greater than a specified priority;
if the resource access priority is detected to be greater than the appointed priority, judging that the resource access priority meets a target condition;
If the resource access priority meets the target condition, the data processing node to be configured is used as a target data processing node, and the resource access authority is configured to the target data processing node;
if the resource access priority is detected to be not greater than the designated priority, detecting a resource access identifier of the data processing node to be configured;
if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node allowing resource access, the data processing node to be configured is used as a target data processing node, the data processing node to be configured is configured as a node not allowing resource access, and the resource access authority is configured to the target data processing node;
and if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node which does not allow resource access, taking the next data processing node adjacent to the data processing node to be configured with the resource access authority as a new data processing node to be configured, and configuring the data processing node to be configured as a node which allows resource access.
2. The method according to claim 1, wherein the method further comprises:
and configuring the resource access authority to the next data processing node adjacent to the data processing node to be configured with the resource access authority.
3. The method according to any of claims 1-2, wherein said configuring said resource access rights to said target said data processing node further comprises, after:
if the confirmation message returned by the target data processing node is not received within the appointed duration, judging that the target data processing node is invalid;
and taking the next data processing node adjacent to the corresponding resource access sequence of the target data processing node as the data processing node to be configured.
4. The method according to claim 1, wherein before the current data processing node obtains the data processing node to be configured for resource access rights as the data processing node to be configured, further comprises:
and if the resource access permission is acquired, returning a confirmation message to the data processing node which is sequenced before the current data processing node and corresponds to the resource access.
5. The method of claim 4, wherein if the resource access rights are obtained, returning an acknowledgement message to the data processing node that is ranked prior to the current data processing node to the corresponding resource access, further comprises:
and if the need of resource access is detected, the access priority of the current data processing node is improved.
6. The method according to claim 5, wherein if the resource access rights are obtained, returning an acknowledgement message to the data processing node that is ranked before the current data processing node to the corresponding resource access, further comprises:
and if no resource access is detected, reducing the access priority of the current data processing node.
7. The method according to claim 1, wherein before the current data processing node obtains the data processing node to be configured for resource access rights as the data processing node to be configured, further comprises:
acquiring an online data processing node;
generating current resource access sequence information according to the online data processing nodes, wherein the resource access sequence information comprises the current corresponding resource access sequence of each data processing node.
8. The method of claim 7, wherein prior to generating the current resource access order information from the online data processing node, further comprising:
acquiring configured effective data processing nodes from the online data processing nodes;
the generating current resource access sequence information according to the online data processing node comprises the following steps:
and generating current resource access sequence information according to the effective data processing node.
9. The method of claim 7, wherein the method further comprises: broadcasting on-line prompt information to other data processing nodes when the data processing nodes are on-line; the acquiring online data processing node comprises:
acquiring locally received online prompt information;
and taking the data processing node which sends the online prompt information as an online data processing node.
10. The method of claim 9, wherein the obtaining the locally received online prompt message comprises:
and acquiring the locally received online prompt information in a specified time period, wherein the specified time period is the time period between the last time the current data processing node is used as the current data processing node and the current time the current data processing node is used as the current data processing node.
11. The method of claim 1, wherein said configuring the resource access rights to the target data processing node comprises:
transmitting an authority configuration instruction to the target data processing node through a first communication path so as to configure the resource access authority to the target data processing node;
the method further comprises the steps of:
and sending the online prompt information to other data processing nodes through a second communication path.
12. A rights configuration method, applied to a data processing system, the data processing system comprising a control node and a data processing node, the method comprising:
the control node obtains a target data processing node to be configured with resource access authority as a target data processing node to be configured, wherein the data processing node to be configured with the resource access authority is the next data processing node adjacent to the resource access sequencing of the current data processing node in the corresponding resource access sequencing;
acquiring the resource access priority of the data processing node to be configured;
detecting whether the resource access priority is greater than a specified priority;
If the resource access priority is detected to be greater than the appointed priority, judging that the resource access priority meets a target condition;
if the resource access priority meets the target condition, the data processing node to be configured is used as a target data processing node, and the resource access authority is configured to the target data processing node;
if the resource access priority is detected to be not greater than the designated priority, detecting a resource access identifier of the data processing node to be configured;
if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node allowing resource access, the data processing node to be configured is used as a target data processing node, the data processing node to be configured is configured as a node not allowing resource access, and the resource access authority is configured to the target data processing node;
and if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node which does not allow resource access, taking the next data processing node adjacent to the data processing node to be configured with the resource access authority as a new data processing node to be configured, and configuring the data processing node to be configured as a node which allows resource access.
13. A resource access rights configuration apparatus, the apparatus comprising:
the node selection unit is used for acquiring a data processing node to be subjected to resource access permission configuration as a data processing node to be configured, wherein the data processing node to be subjected to resource access permission configuration is the next data processing node adjacent to the corresponding resource access sequence of the data processing node;
a priority obtaining unit, configured to obtain a resource access priority of the data processing node to be configured;
a node detection unit, configured to detect whether the resource access priority is greater than a specified priority; if the resource access priority is detected to be greater than the designated priority, judging that the resource access priority meets a target condition, and if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node;
the authority configuration unit is used for configuring the resource access authority to the target data processing node;
the node detection unit is further configured to detect a resource access identifier of the data processing node to be configured if it is detected that the resource access priority is not greater than the specified priority; if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node allowing resource access, the data processing node to be configured is used as a target data processing node, the data processing node to be configured is configured as a node not allowing resource access, and the resource access authority is configured to the target data processing node;
And if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node which does not allow resource access, taking the next data processing node adjacent to the data processing node to be configured with the resource access authority as a new data processing node to be configured, and configuring the data processing node to be configured as a node which allows resource access.
14. A data processing system, the data processing system comprising a control node and a data processing node;
the data processing node is used for processing data based on shared resources;
the control node is configured to acquire a target data processing node to be configured with resource access authority as a target data processing node to be configured, and the data processing node to be configured with resource access authority of the data processing node to be configured with resource access authority is a next data processing node adjacent to the resource access sequencing of the current data processing node in corresponding resource access sequencing; acquiring the resource access priority of the data processing node to be configured; detecting whether the resource access priority is greater than a specified priority; if the resource access priority is detected to be greater than the appointed priority, judging that the resource access priority meets a target condition; if the resource access priority meets the target condition, taking the data processing node to be configured as a target data processing node; configuring the resource access rights to the target data processing node;
If the resource access priority is detected to be not greater than the designated priority, detecting a resource access identifier of the data processing node to be configured; if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node allowing resource access, the data processing node to be configured is used as a target data processing node, the data processing node to be configured is configured as a node not allowing resource access, and the resource access authority is configured to the target data processing node;
and if the resource access identifier of the data processing node to be configured indicates that the data processing node to be configured is currently a node which does not allow resource access, taking the next data processing node adjacent to the data processing node to be configured with the resource access authority as a new data processing node to be configured, and configuring the data processing node to be configured as a node which allows resource access.
15. A node device comprising one or more processors and memory;
one or more programs stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-11.
16. A computer readable storage medium storing program code executable by a processor, the program code causing the processor to perform the method of any one of claims 1-11.
CN202080094698.1A 2020-05-12 2020-05-12 Authority configuration method, device, node equipment and data processing system Active CN115004643B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/089755 WO2021226820A1 (en) 2020-05-12 2020-05-12 Permission configuration method and apparatus, and node device and data processing system

Publications (2)

Publication Number Publication Date
CN115004643A CN115004643A (en) 2022-09-02
CN115004643B true CN115004643B (en) 2023-09-08

Family

ID=78525590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080094698.1A Active CN115004643B (en) 2020-05-12 2020-05-12 Authority configuration method, device, node equipment and data processing system

Country Status (2)

Country Link
CN (1) CN115004643B (en)
WO (1) WO2021226820A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4726018A (en) * 1986-08-25 1988-02-16 International Business Machines Corporation Method of providing priority access to a transmission communication ring
US4819229A (en) * 1986-03-13 1989-04-04 University Of Strathclyde Local area network priority control system
US5553073A (en) * 1993-05-17 1996-09-03 Ibm Corporation Token ring network
CN101330458A (en) * 2008-07-22 2008-12-24 宇龙计算机通信科技(深圳)有限公司 Method, apparatus and system for controlling access authority of pickaback plane
CN102394916A (en) * 2011-10-11 2012-03-28 上海创件信息科技有限公司 Method for controlling resource access rights in relation to network cooperation space-time equalization
CN103533661A (en) * 2013-10-23 2014-01-22 中国舰船研究设计中心 Wireless channel access control method based on virtual token
CN106843170A (en) * 2016-11-30 2017-06-13 浙江中控软件技术有限公司 Method for scheduling task based on token

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3537353A1 (en) * 1985-10-19 1987-04-23 Licentia Gmbh Data transmission system with a ring-shaped transmission line
US7181547B1 (en) * 2001-06-28 2007-02-20 Fortinet, Inc. Identifying nodes in a ring network
CN103473846B (en) * 2013-09-22 2015-11-25 四川智行电子科技有限公司 The dynamic queuing strategy of complicated many tokens
CN108737321A (en) * 2017-04-13 2018-11-02 成都卫士通信息产业股份有限公司 Multi-course concurrency processing system and its method based on PKCS#11 standards

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4819229A (en) * 1986-03-13 1989-04-04 University Of Strathclyde Local area network priority control system
US4726018A (en) * 1986-08-25 1988-02-16 International Business Machines Corporation Method of providing priority access to a transmission communication ring
US5553073A (en) * 1993-05-17 1996-09-03 Ibm Corporation Token ring network
CN101330458A (en) * 2008-07-22 2008-12-24 宇龙计算机通信科技(深圳)有限公司 Method, apparatus and system for controlling access authority of pickaback plane
CN102394916A (en) * 2011-10-11 2012-03-28 上海创件信息科技有限公司 Method for controlling resource access rights in relation to network cooperation space-time equalization
CN103533661A (en) * 2013-10-23 2014-01-22 中国舰船研究设计中心 Wireless channel access control method based on virtual token
CN106843170A (en) * 2016-11-30 2017-06-13 浙江中控软件技术有限公司 Method for scheduling task based on token

Also Published As

Publication number Publication date
CN115004643A (en) 2022-09-02
WO2021226820A1 (en) 2021-11-18

Similar Documents

Publication Publication Date Title
EP3596989B1 (en) Method, non-transitory computer-readable storage medium and apparatus for assisted automatic network service request and delivery in a network environment
US10624022B2 (en) Method for establishing wireless LAN communication connection and electronic device therefor
CN110728363B (en) Task processing method and device
US9680604B2 (en) Method and apparatus for device to device communication
CN112732628A (en) Inter-core data processing method and system, system on chip and electronic equipment
KR20220098777A (en) Positioning information processing method, device and storage medium
CN112346751B (en) Application program installation method and device, electronic equipment and storage medium
CN115004673A (en) Message pushing method and device, electronic equipment and computer readable medium
CN108965359B (en) Communication method, communication device, readable medium, and electronic apparatus
CN114077568A (en) Inter-core communication method and device, electronic assembly and electronic equipment
CN114327710A (en) Function management method, management device, terminal equipment and readable storage medium
CN115004643B (en) Authority configuration method, device, node equipment and data processing system
CN110708293B (en) Method and device for distributing multimedia service
CN111338710A (en) Application program control method and device, electronic equipment and storage medium
CN110597643B (en) Inter-core communication method, processor and electronic equipment
CN106954191A (en) Broadcast transmission method, device and terminal device
CN114363414A (en) Method, device and system for scheduling calculation examples
CN114556892A (en) Method and device for subscribing resources
CN114285906B (en) Message processing method and device, electronic equipment and storage medium
CN111813529B (en) Data processing method, device, electronic equipment and storage medium
CN105978853B (en) Session scheduling method, scheduling server and terminal
CN115220993A (en) Process monitoring method, device, vehicle and storage medium
CN109086107B (en) Bullet screen message distribution method, device, equipment and storage medium
CN109274509B (en) Broadcast state determination method and device, electronic equipment and storage medium
CN114189384B (en) Service processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant