CN110109956B - Method and terminal for preventing cache from penetrating - Google Patents

Method and terminal for preventing cache from penetrating Download PDF

Info

Publication number
CN110109956B
CN110109956B CN201910215734.4A CN201910215734A CN110109956B CN 110109956 B CN110109956 B CN 110109956B CN 201910215734 A CN201910215734 A CN 201910215734A CN 110109956 B CN110109956 B CN 110109956B
Authority
CN
China
Prior art keywords
key
cache
buffer
empty
null
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910215734.4A
Other languages
Chinese (zh)
Other versions
CN110109956A (en
Inventor
刘德建
林伟
郭玉湖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN201910215734.4A priority Critical patent/CN110109956B/en
Publication of CN110109956A publication Critical patent/CN110109956A/en
Application granted granted Critical
Publication of CN110109956B publication Critical patent/CN110109956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management

Abstract

The invention discloses a method and a terminal for preventing cache penetration, wherein keys with empty database query results are recorded in an empty value cache, the request times of each key in the empty value cache in preset time are counted, when the request times reach the preset times, the keys with the request times reaching the preset times are added to a common cache, and the method is different from the prior art of adding all empty value caches in a database to the common cache.

Description

Method and terminal for preventing cache from penetrating
Technical Field
The present invention relates to the field of cache technologies, and in particular, to a method and a terminal for preventing cache from being penetrated.
Background
The cache technology is a common means for improving the running performance of a program, a general system uses a special cache server such as redis or memcache as a cache layer, provides cache service in a cluster or single-node manner, and adds corresponding codes in a service system to support the cache service.
Generally, the interface service queries the cache in advance, queries the database if the cache does not contain data to be queried, and loads the queried data into the cache, so that data with frequent requests can be put into the cache, and the pressure of the database is relieved. But when a malicious attack occurs, all pressure can still be given to the database through cache penetration. For example, the keys currently cached are positive integers, and when a negative number is used as a key to access the cache, the cache is penetrated, the database is continuously accessed, and particularly in a high concurrency condition, great pressure is brought to the database.
The cache penetration generally has three conditions of malicious attack, first data access and empty data, wherein the malicious attack is to use a key which does not exist in the current cache to access; for the first data access, namely no data exist in the current cache, all requests access the database; the empty data, namely the data of the database, is also empty, so that the condition that the data cannot be obtained when the database is accessed is caused, and the data cannot be obtained, so that the corresponding data cannot exist in the cache, the penetration is caused, and the pressure is brought to the database.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the method and the terminal for preventing the cache from penetrating are provided, the cache can be dynamically controlled, and the cache from penetrating is effectively prevented.
In order to solve the technical problems, the invention adopts a technical scheme that:
a method of preventing cache breakthrough, comprising the steps of:
s1, recording the key with the database query result being empty to an empty value buffer;
s2, counting the request times of each key in the null value buffer within the preset time, judging whether the request times reach the preset times, and if so, adding the keys of which the request times reach the preset times to a common buffer.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a terminal for preventing cache breakthrough, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
s1, recording the key with the database query result being empty to an empty value buffer;
s2, counting the request times of each key in the null value buffer within the preset time, judging whether the request times reach the preset times, and if so, adding the keys of which the request times reach the preset times to a common buffer.
The invention has the beneficial effects that: the method comprises the steps of recording empty keys in a database query result to an empty value buffer, counting the number of times of requests of each key in the empty value buffer within preset time, and adding the keys with the number of times of requests reaching the preset number to a common buffer when the number of times of requests in the empty value buffer reaches the preset number, wherein the method is different from the prior art of adding all empty value buffers in the database to the common buffer.
Drawings
FIG. 1 is a flowchart illustrating steps of a method for preventing cache snooping according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a terminal for preventing cache breakthrough according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating relationships among modules in a method for preventing cache breakthrough according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating relationships among modules in a method for preventing cache breakthrough according to an embodiment of the present invention;
description of reference numerals:
1. a terminal for preventing cache breakthrough; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
The key concept of the invention is that the key with empty database query result is recorded to an empty value buffer, if the number of times of requests in the empty value buffer reaches the preset number of times of keys in the preset time, the number of times of requests reaches the preset number of times of keys is added to a common buffer.
Referring to fig. 1, a method for preventing cache breakthrough includes the steps of:
s1, recording the key with the database query result being empty to an empty value buffer;
s2, counting the request times of each key in the null value buffer within the preset time, judging whether the request times reach the preset times, and if so, adding the keys of which the request times reach the preset times to a common buffer.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of recording empty keys in a database query result to an empty value buffer, counting the number of times of requests of each key in the empty value buffer within preset time, and adding the keys with the number of times of requests reaching the preset number to a common buffer when the number of times of requests in the empty value buffer reaches the preset number, wherein the method is different from the prior art of adding all empty value buffers in the database to the common buffer.
Further, the step S1 includes, before the step,:
receiving a data request, wherein the data request comprises a key corresponding to data;
accessing the common cache according to the key, if the query result of the common cache is null, querying the database, judging whether the query result of the database is null, if so, querying the null cache, and executing S1; if not, adding the data corresponding to the key to a common buffer;
the step S1 includes:
judging whether data corresponding to a key with an empty database query result can be queried in an empty value buffer, if not, adding the key to the empty value buffer, and recording the number of requests corresponding to the key, wherein the initial value of the number of requests is 1; and if so, adding 1 to the numerical value of the request times corresponding to the key.
According to the above description, the null value cache in the database is dynamically controlled by the control cache, and the null value cache processing and the common cache are separately arranged without affecting the original logic, so that the counting of the null value cache key is realized, whether the null value cache key is added to the common cache or not is conveniently judged subsequently, a large amount of cache penetration services in a high concurrency scene are effectively prevented, and the stability of the database is maintained.
Further, setting corresponding expiration time for each key in the null value buffer;
in step S2, the step of counting the number of times of requests of each key in the null value buffer within a preset time specifically includes:
counting the number of times of requests of each key in the null value buffer before the corresponding expiration time;
the step S2 further includes:
and judging whether the key corresponding to the expiration time in the null value buffer is expired or not according to the expiration time, and if so, automatically deleting the data corresponding to the expired key.
According to the description, the expired keys can be automatically cleared in time by setting the expiration time of each key in the null value buffer and automatically deleting the keys when the keys expire, so that a large number of key values are prevented from occupying null value buffer resources.
Further, before adding the key whose number of requests reaches the preset number to the normal buffer in step S2, the method further includes:
and calling a local cache adding interface provided by each application, and adding the key with the request times reaching the preset times to a local memory through the local cache adding interface.
As can be seen from the above description, by adding the key whose number of times of request reaches the preset number to the local memory in advance, the corresponding null cache can be read from the local memory when querying the null cache, and compared with reading the corresponding null cache from the general cache, the local memory can respond to the data information more quickly without performance loss, and realize faster data response without affecting the original service logic.
Further, a switch mark is arranged in the local memory;
the step of receiving the data request and accessing the common buffer according to the key further comprises the following steps:
judging whether to access a local memory according to the switch mark, and if not, accessing a common cache according to the key; and if the key is found, inquiring a local memory according to the key, and if the data corresponding to the key is not inquired in the local memory, accessing the common buffer according to the key.
As can be seen from the above description, by setting the switch flag, when the switch flag is turned on to access the local memory, the local memory is accessed in advance to perform an inquiry, and when the switch flag is turned off to access the local memory, the common cache is accessed according to the original logic, so that whether the local memory is accessed or not can be controlled conveniently, and convenience is improved.
Referring to fig. 2, a terminal for preventing cache breakthrough includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the following steps:
s1, recording the key with the database query result being empty to an empty value buffer;
s2, counting the request times of each key in the null value buffer within the preset time, judging whether the request times reach the preset times, and if so, adding the keys of which the request times reach the preset times to a common buffer.
From the above description, the beneficial effects of the present invention are: the method comprises the steps of recording empty keys in a database query result to an empty value buffer, counting the number of times of requests of each key in the empty value buffer within preset time, and adding the keys with the number of times of requests reaching the preset number to a common buffer when the number of times of requests in the empty value buffer reaches the preset number, wherein the method is different from the prior art of adding all empty value buffers in the database to the common buffer.
Further, the step S1 includes, before the step,:
receiving a data request, wherein the data request comprises a key corresponding to data;
accessing the common cache according to the key, if the query result of the common cache is null, querying the database, judging whether the query result of the database is null, if so, querying the null cache, and executing S1; if not, adding the data corresponding to the key to a common buffer;
the step S1 includes:
judging whether data corresponding to a key with an empty database query result can be queried in an empty value buffer, if not, adding the key to the empty value buffer, and recording the number of requests corresponding to the key, wherein the initial value of the number of requests is 1; and if so, adding 1 to the numerical value of the request times corresponding to the key.
According to the above description, the null value cache in the database is dynamically controlled by the control cache, and the null value cache processing and the common cache are separately arranged without affecting the original logic, so that the counting of the null value cache key is realized, whether the null value cache key is added to the common cache or not is conveniently judged subsequently, a large amount of cache penetration services in a high concurrency scene are effectively prevented, and the stability of the database is maintained.
Further, setting corresponding expiration time for each key in the null value buffer;
in step S2, the step of counting the number of times of requests of each key in the null value buffer within a preset time specifically includes:
counting the number of times of requests of each key in the null value buffer before the corresponding expiration time;
the step S2 further includes:
and judging whether the key corresponding to the expiration time in the null value buffer is expired or not according to the expiration time, and if so, automatically deleting the data corresponding to the expired key.
According to the description, the expired keys can be automatically cleared in time by setting the expiration time of each key in the null value buffer and automatically deleting the keys when the keys expire, so that a large number of key values are prevented from occupying null value buffer resources.
Further, before adding the key whose number of requests reaches the preset number to the normal buffer in step S2, the method further includes:
and calling a local cache adding interface provided by each application, and adding the key with the request times reaching the preset times to a local memory through the local cache adding interface.
As can be seen from the above description, by adding the key whose number of times of request reaches the preset number to the local memory in advance, the corresponding null cache can be read from the local memory when querying the null cache, and compared with reading the corresponding null cache from the general cache, the local memory can respond to the data information more quickly without performance loss, and realize faster data response without affecting the original service logic.
Further, a switch mark is arranged in the local memory;
the step of receiving the data request and accessing the common buffer according to the key further comprises the following steps:
judging whether to access a local memory according to the switch mark, and if not, accessing a common cache according to the key; and if the key is found, inquiring a local memory according to the key, and if the data corresponding to the key is not inquired in the local memory, accessing the common buffer according to the key.
As can be seen from the above description, by setting the switch flag, when the switch flag is turned on to access the local memory, the local memory is accessed in advance to perform an inquiry, and when the switch flag is turned off to access the local memory, the common cache is accessed according to the original logic, so that whether the local memory is accessed or not can be controlled conveniently, and convenience is improved.
Example one
Referring to fig. 1 and 3, a method for preventing cache breakthrough includes the steps of:
an interface API receives a data request sent by a client, wherein the data request comprises a key corresponding to data;
the interface API accesses the common cache according to the key, and if the query result of the common cache is an empty string, the query result is directly returned to the client; if the query result of the common buffer is null, querying the database, judging whether the query result of the database is null, if so, indicating that no relevant data information is found, querying the null buffer, and executing S1; if not, adding the data corresponding to the key to a common buffer;
the empty string refers to that data is inquired according to the key, but the data is the empty string; the null value is that data is not inquired according to the key;
the common buffer is a main buffer;
s1, recording the key with the database query result being empty to an empty value buffer;
specifically, whether data corresponding to a key with an empty database query result can be queried in an empty value buffer is judged, if not, the key is added to the empty value buffer, and a request number value corresponding to the key is recorded, wherein an initial value of the request number value is 1, and the request number value is also stored in the empty value buffer; if yes, the key is stored in the null value buffer, and the value of the request times value corresponding to the key is added with 1;
the key with the database query result being empty is the empty value cache key;
as shown in fig. 3, when the empty buffer needs to be accessed, the modules through which the whole process flows are a client, an interface API, a common buffer, a database and an empty buffer;
s2, counting the request times of each key in the null value buffer within the preset time, judging whether the request times reach the preset times, and if so, adding the keys of which the request times reach the preset times to a common buffer.
Wherein, preferably, the preset times are 30 times;
for example, a certain key in the null value buffer is requested 30 times within a preset time, and a null value is returned every time the database is queried, at this time, the value of the number of times of request value of the key in the null value buffer is 30, and the key is added to the common buffer when the preset number of times is reached;
when the data request with the key is received next time, the interface API only needs to inquire and return in the common buffer, and a database does not need to be inquired.
Example two
The difference between this embodiment and the first embodiment is:
setting corresponding expiration time for each key in the null value buffer;
the expiration time can be set according to a specific service scenario, and preferably, the expiration time corresponding to each key in the null value buffer is consistent with the expiration time of each key in the database;
in step S2, the step of counting the number of times of requests of each key in the null value buffer within a preset time specifically includes:
counting the number of times of requests of each key in the null value buffer before the corresponding expiration time;
for example, the expiration time is 1 minute, a certain key in the null value buffer is requested 30 times within 1 minute, and a null value is returned every time the database is queried, at this time, the value of the number of times the key is requested in the null value buffer is 30, and the key is added to the normal buffer when the preset number is reached;
the step S2 further includes:
and judging whether the key corresponding to the expiration time in the null value buffer is expired or not according to the expiration time, and if so, automatically deleting the data corresponding to the expired key.
EXAMPLE III
Referring to fig. 4, the difference between the present embodiment and the first or second embodiment is:
before adding the key whose number of requests reaches the preset number to the normal buffer in the step S2, the method further includes:
calling a local cache adding interface provided by each application, wherein the local cache adding interface is used for adding null value cache keys to a local memory;
adding the key with the request times reaching the preset times to a local memory through the local cache adding interface;
as shown in fig. 4, the null value cache further performs an operation of adding a null value cache key to the local memory;
a switch mark is arranged in the local memory, and the switch mark can be represented by a boolean parameter, for example, 1 represents that local memory access is started, and 0 represents that local memory access is closed;
the failure time of the switch mark is consistent with the failure time of the key, namely the failure time of the key in the database is consistent with the expiration time of the key in the database;
the step of receiving the data request and accessing the common buffer according to the key further comprises the following steps:
judging whether to access a local memory according to the switch mark, and if not, accessing a common cache according to the key; and if the key is found, inquiring a local memory according to the key, and if the data corresponding to the key is not inquired in the local memory, accessing the common buffer according to the key.
Example four
Referring to fig. 2, a terminal 1 for preventing cache breakthrough includes a memory 2, a processor 3, and a computer program stored on the memory 2 and executable on the processor 3, where the processor 3 implements the steps in the first embodiment when executing the computer program.
EXAMPLE five
Referring to fig. 2, a terminal 1 for preventing cache breakthrough includes a memory 2, a processor 3, and a computer program stored in the memory 2 and running on the processor 3, wherein the processor 3 implements the steps of the second embodiment when executing the computer program.
EXAMPLE six
Referring to fig. 2, a terminal 1 for preventing cache breakthrough includes a memory 2, a processor 3, and a computer program stored in the memory 2 and running on the processor 3, wherein the processor 3 implements the steps of the third embodiment when executing the computer program.
In summary, the method and the terminal for preventing cache penetration provided by the present invention record the key with empty database query result into the empty value buffer, set the corresponding expiration time for each key in the empty value buffer, count the number of requests of each key in the empty value buffer within the expiration time, add the key with the number of requests reaching the preset number to the local memory and the normal buffer when the key with the number of requests reaching the preset number occurs in the empty value buffer, query the local memory in advance when the data request of the key is received next time, access the normal buffer for query when the query result of the local memory is empty, different from the prior art of adding all empty value buffers in the database to the normal buffer, the present invention sets the empty value buffer to dynamically control the empty value buffers, and realize mutual independence with the normal buffer, the expired keys can be automatically cleaned in time, empty value buffer resources are prevented from being occupied by a large number of key values, meanwhile, only the empty value buffer keys with the request times exceeding the preset times are added to the common buffer, the number of the empty value buffer keys in the common buffer is reduced, the local memory is inquired in advance, faster data response can be achieved under the condition that the original service logic is not influenced, and the problem of buffer penetration in a high-concurrency scene is effectively prevented.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method for preventing cache breakthrough, comprising the steps of:
s1, recording the key with the database query result being empty to an empty value buffer;
s2, counting the request times of each key in the null value buffer within a preset time, judging whether the request times reach the preset times, and if so, adding the keys of which the request times reach the preset times to a common buffer;
before adding the key whose number of requests reaches the preset number to the normal buffer in the step S2, the method further includes:
and calling a local cache adding interface provided by each application, and adding the key with the request times reaching the preset times to a local memory through the local cache adding interface.
2. The method for preventing cache penetration according to claim 1, wherein the step S1 is preceded by:
receiving a data request, wherein the data request comprises a key corresponding to data;
accessing the common cache according to the key, if the query result of the common cache is null, querying the database, judging whether the query result of the database is null, if so, querying the null cache, and executing S1; if not, adding the data corresponding to the key to a common buffer;
the step S1 includes:
judging whether data corresponding to a key with an empty database query result can be queried in an empty value buffer, if not, adding the key to the empty value buffer, and recording the number of requests corresponding to the key, wherein the initial value of the number of requests is 1; and if so, adding 1 to the numerical value of the request times corresponding to the key.
3. The method according to claim 1, further comprising setting an expiration time for each key in the null value buffer;
in step S2, the step of counting the number of times of requests of each key in the null value buffer within a preset time specifically includes:
counting the number of times of requests of each key in the null value buffer before the corresponding expiration time;
the step S2 further includes:
and judging whether the key corresponding to the expiration time in the null value buffer is expired or not according to the expiration time, and if so, automatically deleting the data corresponding to the expired key.
4. The method according to claim 2, wherein a switch flag is set in the local memory;
the step of receiving the data request and accessing the common buffer according to the key further comprises the following steps:
judging whether to access a local memory according to the switch mark, and if not, accessing a common cache according to the key; and if the key is found, inquiring a local memory according to the key, and if the data corresponding to the key is not inquired in the local memory, accessing the common buffer according to the key.
5. A terminal for preventing cache breakthrough, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
s1, recording the key with the database query result being empty to an empty value buffer;
s2, counting the request times of each key in the null value buffer within a preset time, judging whether the request times reach the preset times, and if so, adding the keys of which the request times reach the preset times to a common buffer;
before adding the key whose number of requests reaches the preset number to the normal buffer in the step S2, the method further includes:
and calling a local cache adding interface provided by each application, and adding the key with the request times reaching the preset times to a local memory through the local cache adding interface.
6. The terminal for preventing cache penetration according to claim 5, wherein the step S1 is preceded by:
receiving a data request, wherein the data request comprises a key corresponding to data;
accessing the common cache according to the key, if the query result of the common cache is null, querying the database, judging whether the query result of the database is null, if so, querying the null cache, and executing S1; if not, adding the data corresponding to the key to a common buffer;
the step S1 includes:
judging whether data corresponding to a key with an empty database query result can be queried in an empty value buffer, if not, adding the key to the empty value buffer, and recording the number of requests corresponding to the key, wherein the initial value of the number of requests is 1; and if so, adding 1 to the numerical value of the request times corresponding to the key.
7. The terminal of claim 5, further comprising setting an expiration time for each key in the null value buffer;
in step S2, the step of counting the number of times of requests of each key in the null value buffer within a preset time specifically includes:
counting the number of times of requests of each key in the null value buffer before the corresponding expiration time;
the step S2 further includes:
and judging whether the key corresponding to the expiration time in the null value buffer is expired or not according to the expiration time, and if so, automatically deleting the data corresponding to the expired key.
8. The terminal for preventing cache penetration according to claim 6, wherein a switch flag is set in the local memory;
the step of receiving the data request and accessing the common buffer according to the key further comprises the following steps:
judging whether to access a local memory according to the switch mark, and if not, accessing a common cache according to the key; and if the key is found, inquiring a local memory according to the key, and if the data corresponding to the key is not inquired in the local memory, accessing the common buffer according to the key.
CN201910215734.4A 2019-03-21 2019-03-21 Method and terminal for preventing cache from penetrating Active CN110109956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910215734.4A CN110109956B (en) 2019-03-21 2019-03-21 Method and terminal for preventing cache from penetrating

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910215734.4A CN110109956B (en) 2019-03-21 2019-03-21 Method and terminal for preventing cache from penetrating

Publications (2)

Publication Number Publication Date
CN110109956A CN110109956A (en) 2019-08-09
CN110109956B true CN110109956B (en) 2021-10-01

Family

ID=67484471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910215734.4A Active CN110109956B (en) 2019-03-21 2019-03-21 Method and terminal for preventing cache from penetrating

Country Status (1)

Country Link
CN (1) CN110109956B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114116796A (en) * 2021-11-02 2022-03-01 浪潮云信息技术股份公司 Distributed cache system for preventing cache treading

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6763357B1 (en) * 2000-06-27 2004-07-13 Ncr Corporation Method for determining the computability of data for an active multi-dimensional cache in a relational database management system
CN106021445B (en) * 2016-05-16 2019-10-15 努比亚技术有限公司 It is a kind of to load data cached method and device
CN106815287A (en) * 2016-12-06 2017-06-09 中国银联股份有限公司 A kind of buffer memory management method and device
CN107124466B (en) * 2017-05-23 2020-12-29 努比亚技术有限公司 Method and device for preventing cache from penetrating and computer readable storage medium

Also Published As

Publication number Publication date
CN110109956A (en) 2019-08-09

Similar Documents

Publication Publication Date Title
TWI536184B (en) Application Method and System of Statistical Table Based on OLTP Environment
US10198363B2 (en) Reducing data I/O using in-memory data structures
US20190272265A1 (en) Hybrid Database Table Stored As Both Row and Column Store
CN102117309B (en) Data caching system and data query method
CN107408128B (en) System and method for providing access to a sharded database using caching and shard topology
US9305056B1 (en) Results cache invalidation
EP2369494A1 (en) Web application based database system and data management method therof
CN110909025A (en) Database query method, query device and terminal
CN108429777B (en) Data updating method based on cache and server
WO2015149628A1 (en) Dns cache information processing method, device and system
CN109842621B (en) Method and terminal for reducing token storage quantity
CN112364278A (en) Data classification optimization method based on CockroachDB bottom key values
US7249219B1 (en) Method and apparatus to improve buffer cache hit rate
CN110109956B (en) Method and terminal for preventing cache from penetrating
US10558636B2 (en) Index page with latch-free access
CN100576848C (en) Distribution-type data dynamic program agent method
CN113836162A (en) Method and device for service decoupling and automatic updating of multi-level cache
US20220342888A1 (en) Object tagging
US7240065B2 (en) Providing mappings between logical time values and real time values
CN114840608B (en) Distributed data access method, device and storage medium
US20150106884A1 (en) Memcached multi-tenancy offload
JPH05143435A (en) Data base system
CN110019259B (en) Data updating method, device and storage medium of distributed index service engine
CN112163130A (en) Access processing method for social security data query
CN111858588B (en) Distributed application index service platform and data processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant