CN107196962B - User access control method and system - Google Patents
User access control method and system Download PDFInfo
- Publication number
- CN107196962B CN107196962B CN201710522528.9A CN201710522528A CN107196962B CN 107196962 B CN107196962 B CN 107196962B CN 201710522528 A CN201710522528 A CN 201710522528A CN 107196962 B CN107196962 B CN 107196962B
- Authority
- CN
- China
- Prior art keywords
- user
- files
- current user
- threshold
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 230000004044 response Effects 0.000 claims description 18
- 230000008859 change Effects 0.000 claims description 17
- 230000008569 process Effects 0.000 claims description 12
- 238000007726 management method Methods 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 2
- 230000009471 action Effects 0.000 description 3
- 230000008846 dynamic interplay Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/561—Adding application-functional data or data for application control, e.g. adding metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Library & Information Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application discloses a user access control method, which is applied to a distributed storage system and comprises the following steps: when an access request sent by a user terminal is received, acquiring the number of current user files; the number of files of the current user is the number of files owned by the current user, and the access request is a file creation request; judging whether the number of the current user files is larger than or equal to a preset threshold value or not; and if the number of the current user files is larger than or equal to the threshold value, forbidding to respond to the access request. Therefore, the method provided by the embodiment of the application solves the problem that a single user has no limitation on system access, and improves user experience. In addition, the application also correspondingly discloses a user access control system.
Description
Technical Field
The present invention relates to the field of distributed storage systems, and in particular, to a user access control method and system.
Background
In a conventional network storage system, a centralized storage server is generally used to store all data in the system, and obviously, with the increasing amount of data, such a system cannot meet the requirement of storing data on a large scale. Under the background, a distributed storage system is rapidly developed, the distributed storage system dispersedly stores data on a plurality of independent devices, a plurality of storage servers are used for sharing and storing the data, and a position server is used for positioning and storing information. However, in the distributed storage system, there are many problems, such as: in the ceph storage system, the system supports file operations of multiple clients and multiple clients, so that a large number of files can be stored by individual users of multiple clients, and in this case, when other users perform related operations on files in the storage system, a problem that the operation response is too slow and user experience is affected occurs, which is also a difficult problem in the technical field.
Disclosure of Invention
In view of this, the present invention provides a method and a system for controlling user access, which aims to improve user experience of a user in a distributed storage system. The specific scheme is as follows:
a user access control method is applied to a distributed storage system and comprises the following steps:
when an access request sent by a user terminal is received, acquiring the number of current user files; the number of files of the current user is the number of files owned by the current user; the access request is a file creation request;
judging whether the number of the current user files is larger than or equal to a preset threshold value or not;
and if the number of the current user files is larger than or equal to the threshold value, forbidding to respond to the access request.
Preferably, the threshold setting process includes:
and acquiring a threshold setting instruction sent by the management terminal, and performing corresponding threshold setting processing according to the threshold setting instruction to obtain the threshold.
Preferably, the method further comprises the following steps:
and if the number of the current user files is less than the threshold value, allowing the response to the access request.
Preferably, after the process of allowing the response to the access request, the method further includes:
counting corresponding file change information;
and recording the file change information to a log file, and caching the log file to a metadata server.
Preferably, the method further comprises the following steps:
and storing the number of the current user files and the threshold value in the metadata server in a data structure.
Preferably, the method further comprises the following steps:
and correspondingly adjusting the threshold value by using the number of the current user files so as to update the threshold value.
Preferably, the method further comprises the following steps:
counting the file access frequency of the user terminal;
and correspondingly adjusting the threshold value by utilizing the file access frequency so as to update the threshold value.
The invention also discloses a user access control system, which is applied to the distributed storage system and comprises the following components:
the user file number acquisition module is used for acquiring the number of the current user files when receiving an access request sent by a user terminal; the number of files of the current user is the number of files owned by the current user; the access request is a file creation request;
the threshold judging module is used for judging whether the number of the current user files is greater than or equal to a preset threshold;
and the access request forbidding module is used for forbidding to respond to the access request if the number of the current user files is larger than or equal to the threshold value.
Preferably, the method further comprises the following steps:
and the first threshold updating module is used for correspondingly adjusting the threshold by utilizing the number of the current user files so as to update the threshold.
Preferably, the method further comprises the following steps:
the access frequency counting module is used for counting the file access frequency of the user terminal;
and the second threshold updating module is used for correspondingly adjusting the threshold by utilizing the file access frequency so as to update the threshold.
The invention discloses a user access control method, which is applied to a distributed storage system and comprises the following steps: when an access request sent by a user terminal is received, acquiring the number of current user files; the number of files of the current user is the number of files owned by the current user; judging whether the number of the current user files is larger than or equal to a preset threshold value or not; and if the number of the current user files is larger than or equal to the threshold value, forbidding to respond to the access request. In the invention, the current number of user files is compared with a preset threshold value, when the number of the user files is greater than or equal to the preset threshold value, the user is prohibited from responding to the access request sent by the user terminal, thus the occurrence of the situations of unlimited access and writing of individual users to files in the cluster system is effectively limited by setting the threshold value for the number of the single user access files, and the like, so that the operation of the single user to the files is limited in a certain range.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a user access control method according to an embodiment of the present invention;
fig. 2 is a flowchart of a user access control method disclosed in the second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a user access control system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a user access control method, which is shown in figure 1 and comprises the following steps:
step S11: when an access request sent by a user terminal is received, acquiring the number of current user files; the number of files of the current user is the number of files owned by the current user; moreover, the access request is a file creation request;
it can be understood that, in the distributed storage system, the process of data interaction is dynamically changed, so in this embodiment, obtaining the number of files that have been accessed by the current user to execute the subsequent method steps may better conform to the rule of data dynamic interaction.
Step S12: judging whether the number of the current user files is larger than or equal to a preset threshold value or not;
it should be noted that, in this embodiment, the preset threshold may be a fixed threshold set by the user, or may be a preset threshold set according to a log file before the system; it can be understood that, the user can make the preset threshold more accord with the personal habit of the user operation through a fixed threshold set by the user; certainly, the preset threshold value can also be set by counting the number of user files of the user before, so that the influence of some non-objective factors is avoided compared with the threshold value set by the user;
certainly, further, the preset threshold value may also be adjusted correspondingly by using the number of current user files or by counting the file access frequency of the user terminal, so as to dynamically update the preset threshold value; it can be understood that the rule of the user for accessing the operation data can be more objectively and accurately met by dynamically adjusting and updating the preset threshold, and the user experience of the user can be greatly improved by the method.
Step S13: and if the number of the current user files is larger than or equal to a preset threshold value, forbidding to respond to the access request.
It can be understood that if the number of current user files is greater than or equal to the preset threshold, it indicates that the number of current user files has reached the upper limit of the user operation, and if the user file number is resumed, the user experience of other users in the distributed storage system is affected, in this case, the response to the access request of the user is prohibited, and in this way, the user experience of the user in the distributed storage system is improved.
It can be seen that, in the present invention, the current number of user files is compared with a preset threshold, when the number of user files is greater than or equal to the preset threshold, the user is prohibited from responding to the access request sent by the user terminal, and by setting the threshold for the number of individual user files, the occurrence of situations such as unlimited access and writing of individual users to files in the cluster system is effectively limited, so that the operation of individual users to files is limited within a certain range, and by such a method, the user experience in the distributed storage system is greatly improved.
The second embodiment of the present invention discloses a specific user access control method, and as shown in fig. 2, compared with the first embodiment, this embodiment further describes and optimizes the technical solution. Specifically, the method comprises the following steps:
step S21: when an access request sent by a user terminal is received, acquiring the number of current user files; the number of files of the current user is the number of files owned by the current user; moreover, the access request is a file creation request;
it can be understood that, in the distributed storage system, the process of data interaction is dynamically changed, so in this embodiment, obtaining the number of files that have been accessed by the current user to execute the subsequent method steps may better conform to the rule of data dynamic interaction.
Step S22: judging whether the number of the current user files is larger than or equal to a preset threshold value or not, and if not, entering the step S23; if so, go to step S24;
specifically, the threshold setting process includes acquiring a threshold setting instruction sent by the management terminal, and performing corresponding threshold setting processing according to the threshold setting instruction to obtain the threshold.
It can be understood that the threshold value is set by the user himself, and in this way, the personal habits of the user operation can be better met. Specifically, the preset threshold may be set by the user through his own personal habits, or may be set according to a log file before the system, where the method for setting the threshold by the user is not limited.
Certainly, further, the preset threshold value can be correspondingly adjusted by using the number of the current user files, so as to dynamically update the preset threshold value; it can be understood that the objective rules of various data recently called by the user can be better met by dynamically adjusting and updating the preset threshold; for example, the threshold value preset before the user terminal a is 100, but the number of the current user files of the user terminal is 20, obviously, the preset threshold value is larger than the current number of the user files, at this time, the threshold value of the user terminal a should be correspondingly adjusted according to the current number of the user files, and the threshold value is correspondingly adjusted to 30, which is more suitable for the actual situation than the previously set threshold value; similarly, in other similar cases, the threshold preset by the user should be adjusted correspondingly according to the principle, which is not described herein again.
Of course, the preset threshold may also be obtained by counting the file access frequency of the user terminal and correspondingly adjusting the preset threshold by using the obtained file access frequency, so as to update the preset threshold. For example, assuming that the same threshold 100 is allocated to both the user terminal a and the user terminal B in the initial stage, in a later period of time, it is monitored that the file access frequency of the user terminal a is 1 file number created per day, and the file access frequency of the user terminal B is 2 file numbers created per day, so that it can be inferred that the file access demand of the user terminal B is more, in order to improve the user experience of the user terminal B, the threshold corresponding to the user terminal B may be adjusted from the original 100 to 200, and the threshold corresponding to the user terminal a may be kept unchanged, so as to avoid that too much file storage space is in an idle state for a long time.
In addition, in this embodiment, the two adjustment modes may be used in turn to adjust the threshold of a certain user terminal, so as to further improve the user experience.
Step S23: allowing a response to the access request;
specifically, after responding to the access request, the method further includes step S231, step S232, and step S233.
Step S231: counting corresponding file change information;
step S232: recording the file number change information to a log file, and caching the log file to a metadata server;
it can be understood that, when receiving an access request from a user, the system normally responds to the access request first, and creates and/or deletes a user file and/or modifies user information; after the access request of the user is responded, the system counts the corresponding file change information, records the file change information into the log file, and caches the log file in the metadata server. It should be noted that, the log file generated by the change information of the file is stored in the metadata server, which is more convenient for the user to call the data quickly and is more convenient for the user to check the related data record than the log file is stored in other storage systems.
Of course, this step may also correspond to the process of setting the threshold, and it can be understood that, according to the technical scheme of this step, the corresponding file change information can be accurately counted, and on this basis, the preset threshold is adjusted by the corresponding file change information, so that the purpose of improving the user experience can also be achieved.
Step S233: and storing the current user file number and the threshold value in a metadata server in a data structure form.
It is understood that in practical applications, additional data structures include, but are not limited to, user ID, user group ID, number of user files, version number of user data statistics, and the like. In the implementation, the operation efficiency and the storage efficiency of the storage system can be improved by adding the data structure to classify the data sets of different types.
Step S24: responses to access requests are prohibited.
It can be understood that if the number of current user files is greater than or equal to the preset threshold, it indicates that the number of current user files has reached the upper limit of the user operation, and if the user file number is resumed, the user experience of other users in the distributed storage system is affected, in this case, the response to the access request of the user is prohibited, and in this way, the user experience of the user in the distributed storage system is improved.
Correspondingly, the present invention also discloses a user access control system, as shown in fig. 3, the system includes:
a user file number obtaining module 301, configured to obtain the number of current user files when receiving an access request sent by a user terminal; the number of files of the current user is the number of files owned by the current user; moreover, the access request is a file creation request;
a threshold determining module 302, configured to determine whether the number of current user files is greater than or equal to a preset threshold;
an access request prohibiting module 303, configured to prohibit a response to the access request if the number of current user files is greater than or equal to the threshold.
Specifically, the threshold determining module 302 includes:
and the threshold setting unit is used for acquiring the threshold setting instruction sent by the management terminal and carrying out corresponding threshold setting processing according to the threshold setting instruction to obtain the threshold.
Preferably, the user access control system disclosed in the embodiment of the present application further includes:
and an access request response module 304, configured to allow response to the access request when the number of current user files is smaller than the threshold.
Preferably, the user access control system disclosed in the embodiment of the present application further includes:
a change information counting module 305 for counting the corresponding file change information after the access request response module allows the access request response;
the log file caching module 306 is configured to record the file change information to a log file, and cache the log file to the metadata server.
Preferably, the user access control system disclosed in the embodiment of the present application further includes:
and the data storage module 307 is used for storing the number of the current user files and the threshold in the form of a data structure at the metadata server.
Preferably, the user access control system disclosed in the embodiment of the present application further includes:
the first threshold updating module 308 is configured to perform corresponding adjustment on the threshold according to the number of current user files, so as to update the threshold.
Preferably, the user access control system disclosed in the embodiment of the present application further includes:
an access frequency counting module 309, configured to count a file access frequency of the user terminal;
and a second threshold updating module 310, configured to perform corresponding adjustment on the threshold by using the file access frequency, so as to implement updating of the threshold.
For more detailed working processes of the modules and the units, reference may be made to corresponding contents disclosed in the foregoing embodiments, and details are not described here.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The user access control method and system provided by the present invention are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (7)
1. A user access control method is applied to a distributed storage system and comprises the following steps:
when an access request sent by a user terminal is received, acquiring the number of current user files; the number of files of the current user is the number of files owned by the current user; the access request is a file creation request;
judging whether the number of the current user files is larger than or equal to a preset threshold value or not;
if the number of the current user files is larger than or equal to the threshold value, the response to the access request is forbidden;
further comprising:
if the number of the current user files is smaller than the threshold value, allowing the response to the access request;
after the process of allowing the response to the access request, the method further includes:
counting corresponding file change information;
recording the file change information to a log file, and caching the log file to a metadata server;
and storing the number of the current user files and the threshold value in the metadata server in a data structure.
2. The method of claim 1, wherein the threshold setting process comprises:
and acquiring a threshold setting instruction sent by the management terminal, and performing corresponding threshold setting processing according to the threshold setting instruction to obtain the threshold.
3. The method of claim 1 or 2, further comprising:
and correspondingly adjusting the threshold value by using the number of the current user files so as to update the threshold value.
4. The method of claim 1 or 2, further comprising:
counting the file access frequency of the user terminal;
and correspondingly adjusting the threshold value by utilizing the file access frequency so as to update the threshold value.
5. A user access control system, applied to a distributed storage system, comprising:
the user file number acquisition module is used for acquiring the number of the current user files when receiving an access request sent by a user terminal; the number of files of the current user is the number of files owned by the current user;
the threshold judging module is used for judging whether the number of the current user files is greater than or equal to a preset threshold; the access request is a file creation request;
the access request forbidding module is used for forbidding to respond to the access request if the number of the current user files is larger than or equal to the threshold value;
further comprising:
the access request response module is used for allowing the response to the access request when the number of the current user files is smaller than a threshold value;
the change information counting module is used for counting corresponding file change information after the access request response module allows the access request to respond;
the log file caching module is used for recording the file change information to a log file and caching the log file to the metadata server;
and the data storage module is used for storing the number of the current user files and the threshold value in a metadata server in a data structure form.
6. The user access control system of claim 5, further comprising:
and the first threshold updating module is used for correspondingly adjusting the threshold by utilizing the number of the current user files so as to update the threshold.
7. The user access control system of claim 5, further comprising:
the access frequency counting module is used for counting the file access frequency of the user terminal;
and the second threshold updating module is used for correspondingly adjusting the threshold by utilizing the file access frequency so as to update the threshold.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710522528.9A CN107196962B (en) | 2017-06-30 | 2017-06-30 | User access control method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710522528.9A CN107196962B (en) | 2017-06-30 | 2017-06-30 | User access control method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107196962A CN107196962A (en) | 2017-09-22 |
CN107196962B true CN107196962B (en) | 2020-05-29 |
Family
ID=59880295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710522528.9A Active CN107196962B (en) | 2017-06-30 | 2017-06-30 | User access control method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107196962B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109086364A (en) * | 2018-07-19 | 2018-12-25 | 深圳市网心科技有限公司 | Data managing method, data management apparatus and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104598495A (en) * | 2013-10-31 | 2015-05-06 | 南京中兴新软件有限责任公司 | Hierarchical storage method and system based on distributed file system |
CN106126328A (en) * | 2016-06-24 | 2016-11-16 | 同济大学 | A kind of traffic metadata management method based on event classification and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201222231A (en) * | 2010-11-18 | 2012-06-01 | Promise Tecnnology Inc | Network-attached storage system |
US9130920B2 (en) * | 2013-01-07 | 2015-09-08 | Zettaset, Inc. | Monitoring of authorization-exceeding activity in distributed networks |
CN103618625B (en) * | 2013-11-28 | 2019-03-01 | 深圳云之家网络有限公司 | Control method, the device and system of Internet resources in a kind of microblogging |
CN105468989B (en) * | 2014-09-04 | 2018-10-12 | 中国石油化工股份有限公司 | Cloud storage quota management method based on linux kernel monitoring |
-
2017
- 2017-06-30 CN CN201710522528.9A patent/CN107196962B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104598495A (en) * | 2013-10-31 | 2015-05-06 | 南京中兴新软件有限责任公司 | Hierarchical storage method and system based on distributed file system |
CN106126328A (en) * | 2016-06-24 | 2016-11-16 | 同济大学 | A kind of traffic metadata management method based on event classification and system |
Also Published As
Publication number | Publication date |
---|---|
CN107196962A (en) | 2017-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9984013B2 (en) | Method, controller, and system for service flow control in object-based storage system | |
US9952753B2 (en) | Predictive caching and fetch priority | |
US20200349160A1 (en) | Data query method, apparatus and device | |
US8433693B2 (en) | Locking semantics for a storage system based on file types | |
KR100791628B1 (en) | Method for active controlling cache in mobile network system, Recording medium and System thereof | |
CN109087055B (en) | Service request control method and device | |
CN109190070B (en) | Data processing method, device and system and application server | |
CN106713028B (en) | Service degradation method and device and distributed task scheduling system | |
EP3049940B1 (en) | Data caching policy in multiple tenant enterprise resource planning system | |
US20150095448A1 (en) | Cloud system, control method thereof, management server and control method thereof | |
WO2015149644A1 (en) | Intelligent file pre-fetch based on access patterns | |
US10242102B2 (en) | Network crawling prioritization | |
US9876873B1 (en) | Caching techniques | |
WO2020094064A1 (en) | Performance optimization method, device, apparatus, and computer readable storage medium | |
CN108737371A (en) | Hive data access control methods, server and computer storage media | |
US10579676B2 (en) | Highly scalable fine grained rate limiting | |
CN107196962B (en) | User access control method and system | |
EP2940587A1 (en) | Computer, control device for computer system, and recording medium | |
CN106612329B (en) | Caching method and device | |
US10915376B2 (en) | Systems and methods for increasing efficiency of application programming interface calls | |
US20140324923A1 (en) | Computer system, data management method, and non-transitory computer readable medium | |
JP5208613B2 (en) | Server system | |
CN111506254A (en) | Distributed storage system and management method and device thereof | |
CN106557469A (en) | The method and device of data in a kind of processing data warehouse | |
CN112463322B (en) | Method and related equipment for controlling requests in distributed system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |