CN112925812A - Data access processing method and device and computer storage medium - Google Patents
Data access processing method and device and computer storage medium Download PDFInfo
- Publication number
- CN112925812A CN112925812A CN202110224987.5A CN202110224987A CN112925812A CN 112925812 A CN112925812 A CN 112925812A CN 202110224987 A CN202110224987 A CN 202110224987A CN 112925812 A CN112925812 A CN 112925812A
- Authority
- CN
- China
- Prior art keywords
- target data
- resource table
- access
- data
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24552—Database cache management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Computational Linguistics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application provides a data access processing method, a data access processing device and a computer storage medium, which mainly comprise the steps of determining identification information of target data according to the target data to be accessed, obtaining an access identification result which comprises that the target data is configured in a first resource table, a second resource table, a third resource table or the target data is not configured according to the identification information of the target data, and accessing or discarding the target data according to the access identification result of the target data. The method and the device can improve the data access processing efficiency, and are particularly suitable for application scenarios of high-concurrency real-time data access.
Description
Technical Field
The embodiment of the application relates to the technical field of data processing, in particular to a data access processing method and device and a computer storage medium.
Background
Along with the popularization of new energy vehicles, higher requirements are also provided for the battery management and maintenance of the new energy vehicles, wherein the cloud-based battery management technology is a mainstream battery management scheme at present, and the battery management system of the vehicle end is in communication connection with the cloud-based battery platform so that the cloud-based battery platform can manage and maintain the batteries of the vehicle ends according to various battery data uploaded by the battery management system of the vehicle ends.
The above-mentioned battery management scheme based on high in the clouds needs high in the clouds battery platform to insert the real-time battery data of big data volume, that is, each vehicle end needs regularly to upload each item battery data to high in the clouds battery platform, the battery data is including warning information at least, the vehicle electricity core information of real-time change, battery temperature information etc. its data access throughput to high in the clouds battery platform has proposed higher requirement.
In addition, in the prior art, when the white list cache in the cache needs to be updated, a system restart operation is often required to be performed, which easily causes a problem of data breakdown.
Disclosure of Invention
In view of the above, the present application provides a data access processing method, apparatus and computer storage medium, which can overcome the above problems or at least partially solve the above problems.
A first aspect of the present application provides a data access processing method, which includes: determining identification information of target data according to the target data to be accessed; obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result includes one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table, and the target data not configured; and accessing or discarding the target data according to the access identification result of the target data.
Optionally, the identification information of the target data includes a primary key value of the target data.
Optionally, the first resource table is a first white list stored in a cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database.
Optionally, obtaining an access identification result of the target data according to the identification information of the target data includes: inquiring the first resource table according to the identification information of the target data, and if the inquiry result is that the target data is configured in the first resource table, obtaining a first access identification result of the target data; if the query result is that the target data is not configured in the first resource table, querying the second resource table, and if the query result is that the target data is configured in the second resource table, obtaining a second access identification result of the target data; if the query result is that the target data is not configured in the second resource table, querying the third resource table, and if the query result is that the target data is configured in the third resource table, obtaining a third access identification result of the target data; and if the query result indicates that the target data is not configured in the third resource table, obtaining a fourth access identification result of the target data.
Optionally, accessing the target data according to the first recognition result or the third recognition result of the target data; discarding the target data according to the second recognition result or the fourth recognition result of the target data.
Optionally, the method further includes adding the identification information of the target data to the first resource table when the third access identification result of the target data is obtained.
Optionally, the method further includes adding the identification information of the target data to the second resource table when the fourth access identification result of the target data is obtained.
Optionally, the method further includes initializing the first resource table according to the third resource table based on a preset trigger condition; the preset triggering condition comprises that when the system is restarted or the current time meets the preset initialization time.
Optionally, the method further includes sending, by a real-time message queue, the newly added identification information to the third resource table to update the third resource table.
Optionally, the method further includes setting each valid time for each identification information configured in the second resource table; and if the effective time of the identification information is invalid, moving the identification information out of the second resource table.
Optionally, the method further comprises: and dynamically adjusting the effective time based on the current flow size of the target data.
A second aspect of the present application provides a computer storage medium, wherein instructions for executing the steps of the data access processing method according to the first aspect are stored in the computer storage medium.
A third aspect of the present application provides a data access processing apparatus, including: the identification module is used for determining identification information of target data according to the target data to be accessed, and obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result comprises one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table and the target data not configured; and the access processing module is used for accessing or discarding the target data according to the access identification result of the target data.
Optionally, the first resource table is a first white list stored in a cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database.
According to the technical scheme, the data access processing method, the data access processing device and the computer storage medium provided by the embodiment of the application can improve the access processing efficiency of the data to be accessed by setting the black and white list cache list in the cache and combining the white list cache list stored in the database, and can dynamically update the black and white list cache list in the cache on the premise of not needing to execute a restarting system so as to be suitable for an application scene of high-concurrency real-time data access.
In addition, the method and the device can set the effective time for the blacklist cache list in the cache, and dynamically adjust the effective time according to the current flow of the target data to be accessed, so that smooth automatic dynamic update of the blacklist cache list can be realized.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart illustrating a data access processing method according to a first embodiment of the present application.
Fig. 2 is a flowchart illustrating a data access processing method according to a second embodiment of the present application.
Fig. 3 is a schematic structural diagram of a data access processing apparatus according to a fourth embodiment of the present application.
Fig. 4 is a schematic structural diagram of a data access processing device according to a fifth embodiment of the present application.
Element number
300: a data access processing device; 301: a first resource table; 302: a second resource table; 303: a third resource table; 310: an identification module; 320: accessing a processing module; 330: and updating the module.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application shall fall within the scope of the protection of the embodiments in the present application.
As described in the background section, the existing data access processing method cannot provide different resource recommendation strategies according to the current application scenario of the user, so that the resource recommendation result cannot meet the use requirement of the actual application scenario of the user. In view of the above, the present application provides a data access processing method, apparatus and computer storage medium to solve various technical problems in the prior art.
The following further describes a specific implementation of the embodiments of the present application with reference to the drawings of the embodiments of the present application.
First embodiment
Fig. 1 shows a processing flow of a data access processing method according to a first embodiment of the present application.
The data access processing method provided by the embodiment mainly comprises the following steps:
step S11, determining identification information of the target data according to the target data to be accessed.
Alternatively, the identification information of the target data may be a primary key value of the target data, such as a recognition code, but not limited to, and other identification information may be used, including identification information of a character string type or identification information of a numerical value type.
And step S12, obtaining the access identification result of the target data according to the identification information of the target data.
In this embodiment, the access identification result of the target data includes that the target data is configured in the first resource table, the target data is configured in the second resource table, the target data is configured in the third resource table, or the target data is not configured (i.e., the target data is not configured in any of the first resource table, the second resource table, or the third resource table).
In this embodiment, whether the first resource table, the second resource table, and the third resource table store the identification information of the target data may be identified to determine in which resource table the target data is currently configured, so as to obtain the access identification result of the target data.
Optionally, the first resource table is a first white list stored in the cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database (e.g., MySQL).
And step S13, accessing or discarding the target data according to the access identification result of the target data.
In this embodiment, when the access identification result is that the target data is configured in the first resource table (i.e., the first white list) or the third resource table (i.e., the second white list), the target data is accessed; and when the target data is configured in the second resource table (namely the blacklist) or the target data is not configured in any resource table as a result of the identification, discarding the target data to be accessed.
In summary, the data access processing method provided in this embodiment analyzes the access identification result of the target data by setting the black and white list in the cache and combining the white list stored in the database, and performs the access processing on the target data according to the access identification result of the target data, so that the data access processing method of this embodiment can improve the data access processing efficiency.
Second embodiment
Fig. 2 shows a data access processing method according to a second embodiment of the present application, and as shown in the figure, the data access processing method according to the present embodiment mainly includes:
in step S21, a first resource table is initialized.
In this embodiment, when the data node is started, the third resource table (the second white list) in the database may be read and stored in the cache, so as to execute the initialization operation of the first resource table (the first white list).
Step S22, acquiring target data to be accessed, and identifying identification information of the target data.
In this embodiment, the primary key value of the target data can be identified according to the target data to be accessed.
In step S23, it is determined whether the identifier is allocated in the first resource table, and if not, the process proceeds to step S24, and if so, the process proceeds to step S27.
In this embodiment, whether the primary key value of the target data is configured in the first white list in the cache may be checked first, and if so, the first access identification result of the target data is obtained.
In step S24, it is determined whether the identifier is allocated in the second resource table, and if not, the process proceeds to step S25, and if so, the process proceeds to step S29.
In this embodiment, if the target data to be accessed is not configured in the first white list in the cache, whether the primary key value of the target data is configured in the black list in the cache is checked, and if so, a second access identification result of the target data is obtained.
In step S25, it is determined whether the identifier information is allocated in the third resource table, if so, step S26 is performed, and if not, step S28 is performed.
In this embodiment, if the target data to be accessed is not configured in the blacklist in the cache, whether the primary key value of the target data is configured in the second whitelist in the database may be checked, and if so, a second access identification result of the target data is obtained.
Step S26, add the identification information to the first resource table, and proceed to step S27.
In this embodiment, when the target data is not configured in the first white list in the cache but configured in the second white list in the database, the primary key value of the target data is added to the first white list, so as to implement dynamic update of the first white list.
Step S27, target data is accessed.
Step S28, add the identification information to the second resource table, and proceed to step S29.
In this embodiment, when the first white list, the blacklist list and the second white list in the cache are not configured with the primary key value of the target data, the primary key value of the target data is added to the blacklist in the cache.
In step S29, the target data is discarded.
In another embodiment, the data access processing method of the present application may, in addition to implementing dynamic update of the first resource table through the step S26, initialize the first resource table (the first white list in the cache) according to the third resource table (the second white list in the database) based on a preset trigger condition.
Optionally, the preset trigger condition is, for example, when the system is restarted or when the current time meets a preset initialization time.
In one embodiment, the first resource table may be initialized according to the third resource table when the system is restarted (i.e., step S21).
In another embodiment, the preset initialization time is a specific time, for example, and the system can be configured to initialize the first resource table according to the third resource table when the current time satisfies the specific time.
In another embodiment, the predetermined initialization time is, for example, a predetermined interval time, and the system may be configured to initialize the first resource table according to the third resource table periodically when the current time satisfies the predetermined interval time.
Optionally, the method of this embodiment further includes sending the newly added identification information to the second white list through the real-time message queue, so as to update the second white list.
Optionally, the method of this embodiment further includes setting each valid time for each identification information configured in the second resource table (i.e., the blacklist in the cache), so as to move the identification information out of the second resource table when the valid time of the identification information is determined to be invalid (e.g., when the configuration duration of the identification information configured in the second resource table exceeds the valid duration).
Optionally, the method of this embodiment further includes dynamically adjusting the effective time based on the current traffic size of the target data.
In this embodiment, the valid time is longer if the current flow rate of the target data is larger, whereas the valid time is shorter if the current flow rate of the target data is smaller.
In summary, the embodiment of the present application introduces the reverse-control blacklist into the cache, and dynamically updates the blacklist according to the forward real-time inflow target data, so as to improve the processing efficiency of data access. In addition, the effective time of the blacklist can be dynamically adjusted according to the flow of the target data, so that smooth and automatic dynamic updating of the black and white list is achieved.
Third embodiment
A third embodiment of the present application provides a computer storage medium, where instructions for executing the steps of the data access processing method according to any one of the first to second embodiments are stored in the computer storage medium.
Fourth embodiment
Fig. 3 is a schematic diagram illustrating an architecture of a data access processing apparatus according to a fourth embodiment of the present application, and as shown in the drawing, the data access processing apparatus 300 of the present embodiment mainly includes an identification module 310 and an access processing module 320.
The identification module 310 is configured to determine, according to target data to be accessed, identification information of the target data, and obtain an access identification result of the target data according to the identification information of the target data, where the access identification result includes one of the target data configured in a first resource table 301, the target data configured in a first resource table 302, the target data configured in a third resource table 303, and the target data not configured.
Optionally, the identification information of the target data includes a primary key value of the target data.
Optionally, the first resource table 301 is a first white list stored in a cache; the first resource table 302 is a blacklist stored in the cache; the third resource table 303 is a second white list stored in the local database or the cloud database.
The access processing module 320 is configured to access or discard the target data according to the access identification result of the target data.
Optionally, the access processing module 320 further queries the first resource table 301 according to the identification information of the target data, and obtains a first access identification result of the target data if the query result indicates that the target data is configured in the first resource table 301; if the query result is that the target data is not configured in the first resource table 301, querying the first resource table 302, and if the query result is that the target data is configured in the first resource table 302, obtaining a second access identification result of the target data; querying the third resource table 303 if the query result indicates that the target data is not configured in the first resource table 302, and obtaining a third access identification result of the target data if the query result indicates that the target data is configured in the third resource table 303; if the query result is that the target data is not configured in the third resource table 303, a fourth access identification result of the target data is obtained.
Optionally, the accessing processing module 320 further accesses the target data according to the first recognition result or the third recognition result of the target data; discarding the target data according to the second recognition result or the fourth recognition result of the target data.
Fifth embodiment
Fig. 4 shows a schematic architecture diagram of a data access processing device 300 according to a fifth embodiment of the present application, where the data access processing device 300 of the present embodiment further includes an updating module 330 in addition to the identification module 310 and the access processing module 320.
An updating module 330, configured to add the identification information of the target data to the first resource table 301 when the third access identification result of the target data is obtained.
Optionally, the updating module 330 further includes adding the identification information of the target data to the first resource table 302 when the fourth access identification result of the target data is obtained.
Optionally, the updating module 330 is further configured to initialize the first resource table 301 according to the third resource table 303 based on a preset trigger condition; the preset triggering condition comprises that when the system is restarted or the current time meets the preset initialization time.
Optionally, the updating module 330 further sends the newly added identification information to the third resource table 303 through a real-time message queue to update the third resource table 303.
Optionally, the updating module 330 further includes setting each valid time for each identification information configured in the second resource table 302; and if the validity time of the identification information is invalid, removing the identification information from the second resource table 302.
Optionally, the updating module 330 further comprises dynamically adjusting the effective time based on the current traffic size of the target data.
In addition, the data access processing apparatus 300 according to the fourth embodiment and the fifth embodiment of the present application can also be used to implement other steps in the foregoing data access processing method embodiments, and has the beneficial effects of the corresponding method step embodiments, which are not described herein again.
To sum up, the data access processing method, the data access processing device, and the computer storage medium provided in the embodiments of the present application analyze the access identification result of the target data to be accessed by setting the black and white list cache list in the cache and combining the white list in the database, and perform access processing or discard processing on the target data, thereby improving the access processing efficiency of the data to be accessed, and being suitable for an application scenario of high-concurrency real-time data access.
Moreover, according to the application, the black and white list cache list in the cache can be dynamically updated on the premise of not restarting the system according to the analysis result of the access identification result of the target data to be accessed, and the effective time of the black list can be dynamically adjusted according to the flow of the target data, so that smooth and automatic dynamic updating of the black and white list can be realized.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the embodiments of the present application, and are not limited thereto; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.
Claims (10)
1. A data access processing method is characterized by comprising the following steps:
determining identification information of target data according to the target data to be accessed;
obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result includes one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table, and the target data not configured; and
and accessing or discarding the target data according to the access identification result of the target data.
2. The data access processing method of claim 1, wherein the identification information of the target data comprises a primary key value of the target data.
3. The data access processing method of claim 1, wherein the first resource table is a first white list stored in a cache; the second resource table is a blacklist list stored in the cache; the third resource table is a second white list stored in a local database or a cloud database.
4. The data access processing method of claim 3, wherein obtaining the access identification result of the target data according to the identification information of the target data comprises:
inquiring the first resource table according to the identification information of the target data, and if the inquiry result is that the target data is configured in the first resource table, obtaining a first access identification result of the target data;
if the query result is that the target data is not configured in the first resource table, querying the second resource table, and if the query result is that the target data is configured in the second resource table, obtaining a second access identification result of the target data;
if the query result is that the target data is not configured in the second resource table, querying the third resource table, and if the query result is that the target data is configured in the third resource table, obtaining a third access identification result of the target data; and
and if the query result is that the target data is not configured in the third resource table, obtaining a fourth access identification result of the target data.
5. The data access processing method according to claim 4, wherein the accessing or discarding the target data according to the access identification result of the target data comprises:
accessing the target data according to the first identification result or the third identification result of the target data;
discarding the target data according to the second recognition result or the fourth recognition result of the target data.
6. The data access processing method of claim 4, wherein the method further comprises:
when the third access identification result of the target data is obtained, adding the identification information of the target data to the first resource table.
7. The data access processing method of claim 4, wherein the method further comprises:
when the fourth access identification result of the target data is obtained, adding the identification information of the target data to the second resource table.
8. The data access processing method of claim 3, further comprising:
initializing the first resource table according to the third resource table based on a preset trigger condition;
the preset triggering condition comprises that when the system is restarted or the current time meets the preset initialization time.
9. A computer storage medium having stored therein instructions for carrying out the steps of the data access processing method according to any one of claims 1 to 8.
10. A data access processing apparatus, comprising:
the identification module is used for determining identification information of target data according to the target data to be accessed, and obtaining an access identification result of the target data according to the identification information of the target data, wherein the access identification result comprises one of the target data configured in a first resource table, the target data configured in a second resource table, the target data configured in a third resource table and the target data not configured; and
and the access processing module is used for accessing or discarding the target data according to the access identification result of the target data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110224987.5A CN112925812A (en) | 2021-03-01 | 2021-03-01 | Data access processing method and device and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110224987.5A CN112925812A (en) | 2021-03-01 | 2021-03-01 | Data access processing method and device and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112925812A true CN112925812A (en) | 2021-06-08 |
Family
ID=76172733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110224987.5A Pending CN112925812A (en) | 2021-03-01 | 2021-03-01 | Data access processing method and device and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112925812A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003036198A (en) * | 2001-07-23 | 2003-02-07 | Alps System Integration Co Ltd | Cache controlling method of proxy server by white list |
CN101262524A (en) * | 2008-04-23 | 2008-09-10 | 沈阳东软软件股份有限公司 | Rubbish voice filtration method and system |
CN102067678A (en) * | 2008-03-26 | 2011-05-18 | 高通股份有限公司 | Device managed access point lists in wireless communications |
CN105005722A (en) * | 2015-06-26 | 2015-10-28 | 北京北信源软件股份有限公司 | Access control method and apparatus for mobile storage device |
CN106506784A (en) * | 2015-09-07 | 2017-03-15 | 中兴通讯股份有限公司 | A kind of method and device of blocking disturbance call |
CN107124717A (en) * | 2017-03-31 | 2017-09-01 | 捷开通讯(深圳)有限公司 | A kind of network connection management method, mobile terminal and storage device |
CN107426154A (en) * | 2017-04-14 | 2017-12-01 | 广州羊城通有限公司 | A kind of method for managing black list |
WO2018188727A1 (en) * | 2017-04-10 | 2018-10-18 | Nokia Solutions And Networks Oy | Method, apparatus, medium and system for caching data |
CN111314328A (en) * | 2020-02-03 | 2020-06-19 | 北京字节跳动网络技术有限公司 | Network attack protection method and device, storage medium and electronic equipment |
CN112039709A (en) * | 2020-09-02 | 2020-12-04 | 北京首都在线科技股份有限公司 | Resource scheduling method, device, equipment and computer readable storage medium |
-
2021
- 2021-03-01 CN CN202110224987.5A patent/CN112925812A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003036198A (en) * | 2001-07-23 | 2003-02-07 | Alps System Integration Co Ltd | Cache controlling method of proxy server by white list |
CN102067678A (en) * | 2008-03-26 | 2011-05-18 | 高通股份有限公司 | Device managed access point lists in wireless communications |
CN101262524A (en) * | 2008-04-23 | 2008-09-10 | 沈阳东软软件股份有限公司 | Rubbish voice filtration method and system |
CN105005722A (en) * | 2015-06-26 | 2015-10-28 | 北京北信源软件股份有限公司 | Access control method and apparatus for mobile storage device |
CN106506784A (en) * | 2015-09-07 | 2017-03-15 | 中兴通讯股份有限公司 | A kind of method and device of blocking disturbance call |
CN107124717A (en) * | 2017-03-31 | 2017-09-01 | 捷开通讯(深圳)有限公司 | A kind of network connection management method, mobile terminal and storage device |
WO2018188727A1 (en) * | 2017-04-10 | 2018-10-18 | Nokia Solutions And Networks Oy | Method, apparatus, medium and system for caching data |
CN107426154A (en) * | 2017-04-14 | 2017-12-01 | 广州羊城通有限公司 | A kind of method for managing black list |
CN111314328A (en) * | 2020-02-03 | 2020-06-19 | 北京字节跳动网络技术有限公司 | Network attack protection method and device, storage medium and electronic equipment |
CN112039709A (en) * | 2020-09-02 | 2020-12-04 | 北京首都在线科技股份有限公司 | Resource scheduling method, device, equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9043660B2 (en) | Data store capable of efficient storing of keys | |
CN113132267A (en) | Distributed system, data aggregation method and computer readable storage medium | |
CN108429777B (en) | Data updating method based on cache and server | |
CN111552246B (en) | Equipment production line scheduling method and cloud computing server applied to smart parks | |
CN102170479A (en) | Updating method of Web buffer and updating device of Web buffer | |
CN114071576B (en) | Network slice selection method, system, computer device and storage medium | |
CN111190861B (en) | Hotspot file management method, server and computer-readable storage medium | |
CN103218416A (en) | Method, device and system for loading database | |
CN112565334A (en) | Access method and device of Internet of things equipment and MQTT gateway | |
CN114968845A (en) | A method, system, device and storage medium for cache processing | |
CN113157609A (en) | Storage system, data processing method, data processing device, electronic device, and storage medium | |
Abbasi et al. | An intelligent method for reducing the overhead of analysing big data flows in Openflow switch | |
CN112925812A (en) | Data access processing method and device and computer storage medium | |
CN113973294B (en) | Signaling processing method, network warehouse function network element and communication system | |
CN105786723A (en) | Application cache management method and device based on linked list | |
US10241927B2 (en) | Linked-list-based method and device for application caching management | |
CN114745275A (en) | Node updating method and device in cloud service environment and computer equipment | |
CN106294375B (en) | Data request real-time processing method and device | |
CN106815334A (en) | A kind of data query method and device for terminal | |
CN114884883B (en) | Traffic forwarding method, device, equipment and storage medium | |
CN114254001B (en) | Query request response method and device, storage medium and electronic device | |
CN117750252A (en) | Method for quick responding to simple network management protocol request optical network unit data | |
CN113727128A (en) | Hot spot traffic processing method and system | |
CN113743488B (en) | Vehicle monitoring methods, devices, equipment and storage media based on parallel Internet of Vehicles | |
AU2016277745A1 (en) | Linked-list-based method and device for application caching management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210608 |
|
RJ01 | Rejection of invention patent application after publication |