[go: up one dir, main page]

CN112925812A - Data access processing method and device and computer storage medium - Google Patents

Data access processing method and device and computer storage medium Download PDF

Info

Publication number
CN112925812A
CN112925812A CN202110224987.5A CN202110224987A CN112925812A CN 112925812 A CN112925812 A CN 112925812A CN 202110224987 A CN202110224987 A CN 202110224987A CN 112925812 A CN112925812 A CN 112925812A
Authority
CN
China
Prior art keywords
target data
resource table
access
data
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110224987.5A
Other languages
Chinese (zh)
Inventor
张艳丽
吴毅成
赵梦娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Weilai Energy Co ltd
Original Assignee
Wuhan Weilai Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Weilai Energy Co ltd filed Critical Wuhan Weilai Energy Co ltd
Priority to CN202110224987.5A priority Critical patent/CN112925812A/en
Publication of CN112925812A publication Critical patent/CN112925812A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides a data access processing method, a data access processing device and a computer storage medium, which mainly comprise the steps of determining identification information of target data according to the target data to be accessed, obtaining an access identification result which comprises that the target data is configured in a first resource table, a second resource table, a third resource table or the target data is not configured according to the identification information of the target data, and accessing or discarding the target data according to the access identification result of the target data. The method and the device can improve the data access processing efficiency, and are particularly suitable for application scenarios of high-concurrency real-time data access.

Description

Data access processing method and device and computer storage medium
Technical Field
The embodiment of the application relates to the technical field of data processing, in particular to a data access processing method and device and a computer storage medium.
Background
Along with the popularization of new energy vehicles, higher requirements are also provided for the battery management and maintenance of the new energy vehicles, wherein the cloud-based battery management technology is a mainstream battery management scheme at present, and the battery management system of the vehicle end is in communication connection with the cloud-based battery platform so that the cloud-based battery platform can manage and maintain the batteries of the vehicle ends according to various battery data uploaded by the battery management system of the vehicle ends.
The above-mentioned battery management scheme based on high in the clouds needs high in the clouds battery platform to insert the real-time battery data of big data volume, that is, each vehicle end needs regularly to upload each item battery data to high in the clouds battery platform, the battery data is including warning information at least, the vehicle electricity core information of real-time change, battery temperature information etc. its data access throughput to high in the clouds battery platform has proposed higher requirement.
In addition, in the prior art, when the white list cache in the cache needs to be updated, a system restart operation is often required to be performed, which easily causes a problem of data breakdown.
Disclosure of Invention
In view of the above, the present application provides a data access processing method, apparatus and computer storage medium, which can overcome the above problems or at least partially solve the above problems.
A first aspect of the present application provides a data access processing method, which includes: determining identification information of target data according to the target data to be accessed; obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result includes one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table, and the target data not configured; and accessing or discarding the target data according to the access identification result of the target data.
Optionally, the identification information of the target data includes a primary key value of the target data.
Optionally, the first resource table is a first white list stored in a cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database.
Optionally, obtaining an access identification result of the target data according to the identification information of the target data includes: inquiring the first resource table according to the identification information of the target data, and if the inquiry result is that the target data is configured in the first resource table, obtaining a first access identification result of the target data; if the query result is that the target data is not configured in the first resource table, querying the second resource table, and if the query result is that the target data is configured in the second resource table, obtaining a second access identification result of the target data; if the query result is that the target data is not configured in the second resource table, querying the third resource table, and if the query result is that the target data is configured in the third resource table, obtaining a third access identification result of the target data; and if the query result indicates that the target data is not configured in the third resource table, obtaining a fourth access identification result of the target data.
Optionally, accessing the target data according to the first recognition result or the third recognition result of the target data; discarding the target data according to the second recognition result or the fourth recognition result of the target data.
Optionally, the method further includes adding the identification information of the target data to the first resource table when the third access identification result of the target data is obtained.
Optionally, the method further includes adding the identification information of the target data to the second resource table when the fourth access identification result of the target data is obtained.
Optionally, the method further includes initializing the first resource table according to the third resource table based on a preset trigger condition; the preset triggering condition comprises that when the system is restarted or the current time meets the preset initialization time.
Optionally, the method further includes sending, by a real-time message queue, the newly added identification information to the third resource table to update the third resource table.
Optionally, the method further includes setting each valid time for each identification information configured in the second resource table; and if the effective time of the identification information is invalid, moving the identification information out of the second resource table.
Optionally, the method further comprises: and dynamically adjusting the effective time based on the current flow size of the target data.
A second aspect of the present application provides a computer storage medium, wherein instructions for executing the steps of the data access processing method according to the first aspect are stored in the computer storage medium.
A third aspect of the present application provides a data access processing apparatus, including: the identification module is used for determining identification information of target data according to the target data to be accessed, and obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result comprises one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table and the target data not configured; and the access processing module is used for accessing or discarding the target data according to the access identification result of the target data.
Optionally, the first resource table is a first white list stored in a cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database.
According to the technical scheme, the data access processing method, the data access processing device and the computer storage medium provided by the embodiment of the application can improve the access processing efficiency of the data to be accessed by setting the black and white list cache list in the cache and combining the white list cache list stored in the database, and can dynamically update the black and white list cache list in the cache on the premise of not needing to execute a restarting system so as to be suitable for an application scene of high-concurrency real-time data access.
In addition, the method and the device can set the effective time for the blacklist cache list in the cache, and dynamically adjust the effective time according to the current flow of the target data to be accessed, so that smooth automatic dynamic update of the blacklist cache list can be realized.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart illustrating a data access processing method according to a first embodiment of the present application.
Fig. 2 is a flowchart illustrating a data access processing method according to a second embodiment of the present application.
Fig. 3 is a schematic structural diagram of a data access processing apparatus according to a fourth embodiment of the present application.
Fig. 4 is a schematic structural diagram of a data access processing device according to a fifth embodiment of the present application.
Element number
300: a data access processing device; 301: a first resource table; 302: a second resource table; 303: a third resource table; 310: an identification module; 320: accessing a processing module; 330: and updating the module.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application shall fall within the scope of the protection of the embodiments in the present application.
As described in the background section, the existing data access processing method cannot provide different resource recommendation strategies according to the current application scenario of the user, so that the resource recommendation result cannot meet the use requirement of the actual application scenario of the user. In view of the above, the present application provides a data access processing method, apparatus and computer storage medium to solve various technical problems in the prior art.
The following further describes a specific implementation of the embodiments of the present application with reference to the drawings of the embodiments of the present application.
First embodiment
Fig. 1 shows a processing flow of a data access processing method according to a first embodiment of the present application.
The data access processing method provided by the embodiment mainly comprises the following steps:
step S11, determining identification information of the target data according to the target data to be accessed.
Alternatively, the identification information of the target data may be a primary key value of the target data, such as a recognition code, but not limited to, and other identification information may be used, including identification information of a character string type or identification information of a numerical value type.
And step S12, obtaining the access identification result of the target data according to the identification information of the target data.
In this embodiment, the access identification result of the target data includes that the target data is configured in the first resource table, the target data is configured in the second resource table, the target data is configured in the third resource table, or the target data is not configured (i.e., the target data is not configured in any of the first resource table, the second resource table, or the third resource table).
In this embodiment, whether the first resource table, the second resource table, and the third resource table store the identification information of the target data may be identified to determine in which resource table the target data is currently configured, so as to obtain the access identification result of the target data.
Optionally, the first resource table is a first white list stored in the cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database (e.g., MySQL).
And step S13, accessing or discarding the target data according to the access identification result of the target data.
In this embodiment, when the access identification result is that the target data is configured in the first resource table (i.e., the first white list) or the third resource table (i.e., the second white list), the target data is accessed; and when the target data is configured in the second resource table (namely the blacklist) or the target data is not configured in any resource table as a result of the identification, discarding the target data to be accessed.
In summary, the data access processing method provided in this embodiment analyzes the access identification result of the target data by setting the black and white list in the cache and combining the white list stored in the database, and performs the access processing on the target data according to the access identification result of the target data, so that the data access processing method of this embodiment can improve the data access processing efficiency.
Second embodiment
Fig. 2 shows a data access processing method according to a second embodiment of the present application, and as shown in the figure, the data access processing method according to the present embodiment mainly includes:
in step S21, a first resource table is initialized.
In this embodiment, when the data node is started, the third resource table (the second white list) in the database may be read and stored in the cache, so as to execute the initialization operation of the first resource table (the first white list).
Step S22, acquiring target data to be accessed, and identifying identification information of the target data.
In this embodiment, the primary key value of the target data can be identified according to the target data to be accessed.
In step S23, it is determined whether the identifier is allocated in the first resource table, and if not, the process proceeds to step S24, and if so, the process proceeds to step S27.
In this embodiment, whether the primary key value of the target data is configured in the first white list in the cache may be checked first, and if so, the first access identification result of the target data is obtained.
In step S24, it is determined whether the identifier is allocated in the second resource table, and if not, the process proceeds to step S25, and if so, the process proceeds to step S29.
In this embodiment, if the target data to be accessed is not configured in the first white list in the cache, whether the primary key value of the target data is configured in the black list in the cache is checked, and if so, a second access identification result of the target data is obtained.
In step S25, it is determined whether the identifier information is allocated in the third resource table, if so, step S26 is performed, and if not, step S28 is performed.
In this embodiment, if the target data to be accessed is not configured in the blacklist in the cache, whether the primary key value of the target data is configured in the second whitelist in the database may be checked, and if so, a second access identification result of the target data is obtained.
Step S26, add the identification information to the first resource table, and proceed to step S27.
In this embodiment, when the target data is not configured in the first white list in the cache but configured in the second white list in the database, the primary key value of the target data is added to the first white list, so as to implement dynamic update of the first white list.
Step S27, target data is accessed.
Step S28, add the identification information to the second resource table, and proceed to step S29.
In this embodiment, when the first white list, the blacklist list and the second white list in the cache are not configured with the primary key value of the target data, the primary key value of the target data is added to the blacklist in the cache.
In step S29, the target data is discarded.
In another embodiment, the data access processing method of the present application may, in addition to implementing dynamic update of the first resource table through the step S26, initialize the first resource table (the first white list in the cache) according to the third resource table (the second white list in the database) based on a preset trigger condition.
Optionally, the preset trigger condition is, for example, when the system is restarted or when the current time meets a preset initialization time.
In one embodiment, the first resource table may be initialized according to the third resource table when the system is restarted (i.e., step S21).
In another embodiment, the preset initialization time is a specific time, for example, and the system can be configured to initialize the first resource table according to the third resource table when the current time satisfies the specific time.
In another embodiment, the predetermined initialization time is, for example, a predetermined interval time, and the system may be configured to initialize the first resource table according to the third resource table periodically when the current time satisfies the predetermined interval time.
Optionally, the method of this embodiment further includes sending the newly added identification information to the second white list through the real-time message queue, so as to update the second white list.
Optionally, the method of this embodiment further includes setting each valid time for each identification information configured in the second resource table (i.e., the blacklist in the cache), so as to move the identification information out of the second resource table when the valid time of the identification information is determined to be invalid (e.g., when the configuration duration of the identification information configured in the second resource table exceeds the valid duration).
Optionally, the method of this embodiment further includes dynamically adjusting the effective time based on the current traffic size of the target data.
In this embodiment, the valid time is longer if the current flow rate of the target data is larger, whereas the valid time is shorter if the current flow rate of the target data is smaller.
In summary, the embodiment of the present application introduces the reverse-control blacklist into the cache, and dynamically updates the blacklist according to the forward real-time inflow target data, so as to improve the processing efficiency of data access. In addition, the effective time of the blacklist can be dynamically adjusted according to the flow of the target data, so that smooth and automatic dynamic updating of the black and white list is achieved.
Third embodiment
A third embodiment of the present application provides a computer storage medium, where instructions for executing the steps of the data access processing method according to any one of the first to second embodiments are stored in the computer storage medium.
Fourth embodiment
Fig. 3 is a schematic diagram illustrating an architecture of a data access processing apparatus according to a fourth embodiment of the present application, and as shown in the drawing, the data access processing apparatus 300 of the present embodiment mainly includes an identification module 310 and an access processing module 320.
The identification module 310 is configured to determine, according to target data to be accessed, identification information of the target data, and obtain an access identification result of the target data according to the identification information of the target data, where the access identification result includes one of the target data configured in a first resource table 301, the target data configured in a first resource table 302, the target data configured in a third resource table 303, and the target data not configured.
Optionally, the identification information of the target data includes a primary key value of the target data.
Optionally, the first resource table 301 is a first white list stored in a cache; the first resource table 302 is a blacklist stored in the cache; the third resource table 303 is a second white list stored in the local database or the cloud database.
The access processing module 320 is configured to access or discard the target data according to the access identification result of the target data.
Optionally, the access processing module 320 further queries the first resource table 301 according to the identification information of the target data, and obtains a first access identification result of the target data if the query result indicates that the target data is configured in the first resource table 301; if the query result is that the target data is not configured in the first resource table 301, querying the first resource table 302, and if the query result is that the target data is configured in the first resource table 302, obtaining a second access identification result of the target data; querying the third resource table 303 if the query result indicates that the target data is not configured in the first resource table 302, and obtaining a third access identification result of the target data if the query result indicates that the target data is configured in the third resource table 303; if the query result is that the target data is not configured in the third resource table 303, a fourth access identification result of the target data is obtained.
Optionally, the accessing processing module 320 further accesses the target data according to the first recognition result or the third recognition result of the target data; discarding the target data according to the second recognition result or the fourth recognition result of the target data.
Fifth embodiment
Fig. 4 shows a schematic architecture diagram of a data access processing device 300 according to a fifth embodiment of the present application, where the data access processing device 300 of the present embodiment further includes an updating module 330 in addition to the identification module 310 and the access processing module 320.
An updating module 330, configured to add the identification information of the target data to the first resource table 301 when the third access identification result of the target data is obtained.
Optionally, the updating module 330 further includes adding the identification information of the target data to the first resource table 302 when the fourth access identification result of the target data is obtained.
Optionally, the updating module 330 is further configured to initialize the first resource table 301 according to the third resource table 303 based on a preset trigger condition; the preset triggering condition comprises that when the system is restarted or the current time meets the preset initialization time.
Optionally, the updating module 330 further sends the newly added identification information to the third resource table 303 through a real-time message queue to update the third resource table 303.
Optionally, the updating module 330 further includes setting each valid time for each identification information configured in the second resource table 302; and if the validity time of the identification information is invalid, removing the identification information from the second resource table 302.
Optionally, the updating module 330 further comprises dynamically adjusting the effective time based on the current traffic size of the target data.
In addition, the data access processing apparatus 300 according to the fourth embodiment and the fifth embodiment of the present application can also be used to implement other steps in the foregoing data access processing method embodiments, and has the beneficial effects of the corresponding method step embodiments, which are not described herein again.
To sum up, the data access processing method, the data access processing device, and the computer storage medium provided in the embodiments of the present application analyze the access identification result of the target data to be accessed by setting the black and white list cache list in the cache and combining the white list in the database, and perform access processing or discard processing on the target data, thereby improving the access processing efficiency of the data to be accessed, and being suitable for an application scenario of high-concurrency real-time data access.
Moreover, according to the application, the black and white list cache list in the cache can be dynamically updated on the premise of not restarting the system according to the analysis result of the access identification result of the target data to be accessed, and the effective time of the black list can be dynamically adjusted according to the flow of the target data, so that smooth and automatic dynamic updating of the black and white list can be realized.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the embodiments of the present application, and are not limited thereto; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A data access processing method is characterized by comprising the following steps:
determining identification information of target data according to the target data to be accessed;
obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result includes one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table, and the target data not configured; and
and accessing or discarding the target data according to the access identification result of the target data.
2. The data access processing method of claim 1, wherein the identification information of the target data comprises a primary key value of the target data.
3. The data access processing method of claim 1, wherein the first resource table is a first white list stored in a cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database.
4. The data access processing method of claim 3, wherein obtaining the access identification result of the target data according to the identification information of the target data comprises:
inquiring the first resource table according to the identification information of the target data, and if the inquiry result is that the target data is configured in the first resource table, obtaining a first access identification result of the target data;
if the query result is that the target data is not configured in the first resource table, querying the second resource table, and if the query result is that the target data is configured in the second resource table, obtaining a second access identification result of the target data;
if the query result is that the target data is not configured in the second resource table, querying the third resource table, and if the query result is that the target data is configured in the third resource table, obtaining a third access identification result of the target data; and
and if the query result is that the target data is not configured in the third resource table, obtaining a fourth access identification result of the target data.
5. The data access processing method according to claim 4, wherein the accessing or discarding the target data according to the access identification result of the target data comprises:
accessing the target data according to the first identification result or the third identification result of the target data;
discarding the target data according to the second recognition result or the fourth recognition result of the target data.
6. The data access processing method of claim 4, wherein the method further comprises:
when the third access identification result of the target data is obtained, adding the identification information of the target data to the first resource table.
7. The data access processing method of claim 4, wherein the method further comprises:
when the fourth access identification result of the target data is obtained, adding the identification information of the target data to the second resource table.
8. The data access processing method of claim 3, further comprising:
initializing the first resource table according to the third resource table based on a preset trigger condition;
the preset triggering condition comprises that when the system is restarted or the current time meets the preset initialization time.
9. A computer storage medium having stored therein instructions for carrying out the steps of the data access processing method according to any one of claims 1 to 8.
10. A data access processing apparatus, comprising:
the identification module is used for determining identification information of target data according to the target data to be accessed, and obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result comprises one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table and the target data not configured; and
and the access processing module is used for accessing or discarding the target data according to the access identification result of the target data.
CN202110224987.5A 2021-03-01 2021-03-01 Data access processing method and device and computer storage medium Pending CN112925812A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110224987.5A CN112925812A (en) 2021-03-01 2021-03-01 Data access processing method and device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110224987.5A CN112925812A (en) 2021-03-01 2021-03-01 Data access processing method and device and computer storage medium

Publications (1)

Publication Number Publication Date
CN112925812A true CN112925812A (en) 2021-06-08

Family

ID=76172733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110224987.5A Pending CN112925812A (en) 2021-03-01 2021-03-01 Data access processing method and device and computer storage medium

Country Status (1)

Country Link
CN (1) CN112925812A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003036198A (en) * 2001-07-23 2003-02-07 Alps System Integration Co Ltd Cache controlling method of proxy server by white list
CN101262524A (en) * 2008-04-23 2008-09-10 沈阳东软软件股份有限公司 Rubbish voice filtration method and system
CN102067678A (en) * 2008-03-26 2011-05-18 高通股份有限公司 Device managed access point lists in wireless communications
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN106506784A (en) * 2015-09-07 2017-03-15 中兴通讯股份有限公司 A kind of method and device of blocking disturbance call
CN107124717A (en) * 2017-03-31 2017-09-01 捷开通讯(深圳)有限公司 A kind of network connection management method, mobile terminal and storage device
CN107426154A (en) * 2017-04-14 2017-12-01 广州羊城通有限公司 A kind of method for managing black list
WO2018188727A1 (en) * 2017-04-10 2018-10-18 Nokia Solutions And Networks Oy Method, apparatus, medium and system for caching data
CN111314328A (en) * 2020-02-03 2020-06-19 北京字节跳动网络技术有限公司 Network attack protection method and device, storage medium and electronic equipment
CN112039709A (en) * 2020-09-02 2020-12-04 北京首都在线科技股份有限公司 Resource scheduling method, device, equipment and computer readable storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003036198A (en) * 2001-07-23 2003-02-07 Alps System Integration Co Ltd Cache controlling method of proxy server by white list
CN102067678A (en) * 2008-03-26 2011-05-18 高通股份有限公司 Device managed access point lists in wireless communications
CN101262524A (en) * 2008-04-23 2008-09-10 沈阳东软软件股份有限公司 Rubbish voice filtration method and system
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN106506784A (en) * 2015-09-07 2017-03-15 中兴通讯股份有限公司 A kind of method and device of blocking disturbance call
CN107124717A (en) * 2017-03-31 2017-09-01 捷开通讯(深圳)有限公司 A kind of network connection management method, mobile terminal and storage device
WO2018188727A1 (en) * 2017-04-10 2018-10-18 Nokia Solutions And Networks Oy Method, apparatus, medium and system for caching data
CN107426154A (en) * 2017-04-14 2017-12-01 广州羊城通有限公司 A kind of method for managing black list
CN111314328A (en) * 2020-02-03 2020-06-19 北京字节跳动网络技术有限公司 Network attack protection method and device, storage medium and electronic equipment
CN112039709A (en) * 2020-09-02 2020-12-04 北京首都在线科技股份有限公司 Resource scheduling method, device, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US9043660B2 (en) Data store capable of efficient storing of keys
CN113132267A (en) Distributed system, data aggregation method and computer readable storage medium
CN108429777B (en) Data updating method based on cache and server
CN111552246B (en) Equipment production line scheduling method and cloud computing server applied to smart parks
CN102170479A (en) Updating method of Web buffer and updating device of Web buffer
CN114071576B (en) Network slice selection method, system, computer device and storage medium
CN111190861B (en) Hotspot file management method, server and computer-readable storage medium
CN103218416A (en) Method, device and system for loading database
CN112565334A (en) Access method and device of Internet of things equipment and MQTT gateway
CN114968845A (en) A method, system, device and storage medium for cache processing
CN113157609A (en) Storage system, data processing method, data processing device, electronic device, and storage medium
Abbasi et al. An intelligent method for reducing the overhead of analysing big data flows in Openflow switch
CN112925812A (en) Data access processing method and device and computer storage medium
CN113973294B (en) Signaling processing method, network warehouse function network element and communication system
CN105786723A (en) Application cache management method and device based on linked list
US10241927B2 (en) Linked-list-based method and device for application caching management
CN114745275A (en) Node updating method and device in cloud service environment and computer equipment
CN106294375B (en) Data request real-time processing method and device
CN106815334A (en) A kind of data query method and device for terminal
CN114884883B (en) Traffic forwarding method, device, equipment and storage medium
CN114254001B (en) Query request response method and device, storage medium and electronic device
CN117750252A (en) Method for quick responding to simple network management protocol request optical network unit data
CN113727128A (en) Hot spot traffic processing method and system
CN113743488B (en) Vehicle monitoring methods, devices, equipment and storage media based on parallel Internet of Vehicles
AU2016277745A1 (en) Linked-list-based method and device for application caching management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210608

RJ01 Rejection of invention patent application after publication