CN108153777A - The acquisition methods and device of data access information - Google Patents

The acquisition methods and device of data access information Download PDF

Info

Publication number
CN108153777A
CN108153777A CN201611105450.2A CN201611105450A CN108153777A CN 108153777 A CN108153777 A CN 108153777A CN 201611105450 A CN201611105450 A CN 201611105450A CN 108153777 A CN108153777 A CN 108153777A
Authority
CN
China
Prior art keywords
time
target data
access table
user
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611105450.2A
Other languages
Chinese (zh)
Other versions
CN108153777B (en
Inventor
相利
王昌坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201611105450.2A priority Critical patent/CN108153777B/en
Publication of CN108153777A publication Critical patent/CN108153777A/en
Application granted granted Critical
Publication of CN108153777B publication Critical patent/CN108153777B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/24569Query processing with adaptation to specific hardware, e.g. adapted for using GPUs or SSDs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application discloses the acquisition methods and device of a kind of data access information, method includes:The operation information of target data is obtained in real time, and the target data, which has, starts the time;Extract the target user's mark for the user that the target data is operated in the operation information;It is being that the target data is set and its time parameter values in the first access table for starting time consistency with searching whether that there are target user marks in advance, the first access table includes user identifier, it is accessed in table to described first if it does not, the target user is identified storage.The application realizes the first filling for accessing table by carrying out the extraction of user identifier to the operation information of access target data in real time, without directly be inquired database or the operations such as data statistics, accelerate the computation rate to the access information of target data, realize the application purpose.

Description

The acquisition methods and device of data access information
Technical field
The present invention relates to stream process technical field, the acquisition methods and device of more particularly to a kind of data access information.
Background technology
In the epoch of data explosion, stream process is calculated as instantly popular research field, efficiently with quick characteristic As the emphasis mainly studied.And the accessed situation of specific data how is calculated in a streaming process, such as television programme data quilt Which user's viewing etc. and a kind of scheme of worth research.
In the prior art, by writing data into database in real time, then pass through the sql inquiries of database and duplicate removal Multiple operation, and then obtain the query result of the accessed situation of specific data.
But although scheme of the prior art is simple, in the case of big data quantity, the speed that is calculated by this scheme Spending slowly, can not meet the needs of stream process.
Invention content
In view of the above problems, it is proposed that the application overcomes in order to provide one kind or solves at least partly in the prior art Data be accessed situation computation rate it is excessively slow the technical issues of.
This application provides a kind of acquisition methods of data access information, including:
The operation information of target data is obtained in real time, and the target data, which has, starts the time;
Extract the target user's mark for the user that the target data is operated in the operation information;
It is being target data setting and its time parameter values and the first access table for starting time consistency in advance In search whether there are target user mark, the first access table includes user identifier, if it does not, described in general Target user identifies storage and is accessed in table to described first.
The above method, it is preferred that further include:
Inquiry request is received, the inquiry request returns to the accessed state of the target data for request, and described Query time is included at least in inquiry request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described in First access table is returned.
The above method, it is preferred that if described first accesses there is no target user mark in table, the method is also Including:
The target user is identified and the startup time storage is visited to second in advance for target data setting It asks in table.
The above method, it is preferred that further include:
Inquiry request is received, the inquiry request returns to the accessed state of the target data for request, and described Query time is included at least in inquiry request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described in First access table is returned, if it is not, being inquired in the second access table based on the inquiry request.
The above method, it is preferred that it is described to be inquired in the second access table based on the inquiry request, including:
The query time is compared with each starting the time in the second access table;
Startup time corresponding user identifier consistent with the query time in the second access table is returned It returns.
Present invention also provides a kind of acquisition device of data access information, including:
Acquiring unit is operated, for obtaining the operation information of target data in real time, the target data, which has, starts the time;
Marker extraction unit, for extracting the target user for the user that the target data is operated in operation information mark Know;
Identifier lookup unit, for being target data setting and its time parameter values and the startup time in advance Search whether that, there are target user mark, the first access table includes user's mark in the first consistent access table Know, if it does not, the first storage unit of triggering;
First storage unit is accessed to described first in table for the target user to be identified storage.
Above device, it is preferred that further include:
First query unit, for receiving inquiry request, the inquiry request returns to the target data for request Accessed state, and query time is included at least in the inquiry request, judge whether the query time visits with described first Ask that the time parameter values of table are consistent, if so, the first access table is returned.
Above device, it is preferred that further include:
Second storage unit, for not finding target user in the first access table in the identifier lookup unit During mark, the target user is identified and the startup time storage is accessed to second in advance for target data setting In table.
Above device, it is preferred that further include:
Second query unit, for receiving inquiry request, the inquiry request returns to the target data for request Accessed state, and query time is included at least in the inquiry request, judge whether the query time visits with described first Ask that the time parameter values of table are consistent, if so, the first access table is returned, if it is not, triggering table cargo tracer Member;
Table query unit, for being inquired in the second access table based on the inquiry request.
Above device, it is preferred that the table query unit includes:
Time transfer receiver subelement, for the query time to be compared with each starting the time in the second access table It is right;
Mark returns to subelement, for accessing the startup time pair consistent with the query time in table by described second The user identifier answered is returned.
By above-mentioned technical proposal, the acquisition methods and device of a kind of data access information that the application provides pass through base The first access table is pre-set in the startup time of target data, the user of the user for the operation that accesses to target data is marked Knowledge carries out principal characteristic and stores, that is to say, that the user identifier being only not present in the first access table of storage, and to having existed the User identifier in one access table does not need to be responded, and the user identifier stored in the first access table as a result, characterizes Access to target data after target data startup the user of operation, thus obtains the access information of data, this mistake It carries out the extraction of user identifier in journey to the operation information of access target data in real time and then realizes the first filling for accessing table, nothing It needs directly inquire database or the operations such as data statistics, accelerates the computation rate to the access information of target data, it is real Existing the application purpose.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, below the special specific embodiment for lifting the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this field Technical staff will become clear.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is the flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application one provides
Fig. 2 is the application exemplary plot of the embodiment of the present application;
Fig. 3 is the flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application two provides;
Fig. 4 is the flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application three provides;
Fig. 5 is the another application exemplary plot of the embodiment of the present application;
Fig. 6 is the partial process view of the embodiment of the present application three;
Fig. 7 is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application four provides;
Fig. 8 is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application five provides;
Fig. 9 is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application six provides;
Figure 10 is another structure diagram of the embodiment of the present application six;
Figure 11 is the part-structure schematic diagram of the embodiment of the present application six.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
It is the realization flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application one provides with reference to figure 1, The accessed situation of specific data is counted suitable for stream process, situations such as viewing such as some video frequency program by which user, Specifically, this method may comprise steps of:
Step 101:The operation information of target data is obtained in real time.
Wherein, target data, which has, starts the time, such as time for being opened of video frequency program, web document are uploaded to clothes Time that business device, game on-line are activated etc..
It should be noted that operation information refers to user's browsing objective web document, viewing video frequency program or operation game The operation information at interface.User can realize the access to target data by various terminals or interface.
Step 102:Target user's mark of the user of target data is operated in extraction operation information.
Wherein, target user's mark can be the user's name of the user of operation target data or characterization user identity Number etc..
Step 103:In the first access set in advance for target data and its time parameter values is consistent with starting the time It is searched whether in table there are target user's mark, if it does not, performing step 104.
Wherein, the time parameter values of the first access table are consistent with starting the time, that is to say, that target data is activated When, the first access table of the target data can be generated simultaneously, and the first access table is initialized;Or it is generated in advance more A first accesses table, after target data is activated, selects one first to access table and accesses table as the first of target data, And it is initialized.Here initialization can be understood as the data item in the first access table of initialization, such as be accessed first Multiple data entry fields in table are set, and each field is emptied, in order to follow-up storage user identifier.
Need to illustrate when, the setting of the first access table or generated time and its time parameter values are simultaneously not belonging to same value, The setting of first access table or generated time refer to the first access table execution time that setting acts from scratch, and first accesses The property value that the time parameter values of table access table for first, this time parameter values access the number of targets belonging to table with first According to be activated or the operating time is identical.
Step 104:The target user is identified storage to access in table to described first.
That is, the first access table has the startup time of its corresponding target data consistent time parameter values, Meanwhile first only storage accesses to target data by the startup time of target data the user's of operation in access table User identifier, as shown in Figure 2.It, can be by accessing mark stored in table to first and before user identifier is stored Knowledge is inquired, and only storage realizes deduplication operation, in looking into for subsequent user without there is the user identifier in accessing table first In inquiry, without carrying out duplicate removal processing again.
By above-mentioned technical proposal, a kind of acquisition methods for data access information that the embodiment of the present application one provides pass through base The first access table is pre-set in the startup time of target data, the user of the user for the operation that accesses to target data is marked Knowledge carries out principal characteristic and stores, that is to say, that the user identifier being only not present in the first access table of storage, and to having existed the User identifier in one access table does not need to be responded, and the user identifier stored in the first access table as a result, characterizes Access to target data after target data startup the user of operation, thus obtains the access information of data, this mistake It carries out the extraction of user identifier in journey to the operation information of access target data in real time and then realizes the first filling for accessing table, nothing It needs directly inquire database or the operations such as data statistics, accelerates the computation rate to the access information of target data, it is real Existing the application purpose.
In one implementation, the staff such as analyst can inquire target data by the inquiry to the first access table It is a kind of obtaining for data access information that the embodiment of the present application two provides specifically, with reference to figure 3 by which user's access operation The realization flow chart of method is taken, wherein, this method may also comprise the following steps::
Step 301:Receive inquiry request.
Wherein, inquiry request is for asking the accessed state of the return target data, in the present embodiment, with first Every user identifier in access table come characterize the target data belonging to the first access table operated or accessed state.And Query time is included at least in the inquiry request, the inquiry request comprising this query time refers to look into required for staff The target data of inquiry is after query time startup by the request of which user's access operation.
Step 302:Judge whether query time is consistent with the time parameter values of the first access table, if so, performing step Rapid 303.
Step 303:The first access table is returned.
Which for example, in a streaming process, after target data is activated, start user to be accessed to target data by Operation is counted, if which user's access target data staff has started a query at this time, if any which user's viewing Program, first look at query time in inquiry request and current the first access table for carrying out stream process time parameter values whether Unanimously, if it is, directly being returned to the first access table, the user stored in this first access table at this time marks Know as the mark of user since being activated the time, such as watched since 17 points of 2016.09.20 program in program Know.
In one implementation, in order to ensure the reliability of data, the present embodiment can identify the target user extracted And the startup time of corresponding target data is preserved, specifically, with reference to figure 4, provided for the embodiment of the present application three one The realization flow chart of the acquisition methods of kind data access information, inquires target is not present in the first access table in step 103 After user identifier, this method may also comprise the following steps::
Step 105:Target user is identified and starts time storage and accesses table to second in advance for target data setting In.
That is, can be recorded in the second access table target data start in any one time being activated it is accessed The user identifier of user and corresponding start the time, and second accesses user identifier in table in target data in any one quilt Do not repeated on the time of startup, as shown in Figure 5, video frequency program on startup between on 14 points of 2016.09.20, have user A, B And C viewings, there are user A, C and D viewing with the 17 of 2016.09.20 points.
And analyst is being supplied to when staff carry out user identifier inquiry, when needing the inquiry inquired to user Between whether unanimously judged with startup time of the target data of current stream process, to ensure the reliability of inquiry, tool Body, as shown in Figure 6, this method may also comprise the following steps::
Step 601:Receive inquiry request.
Wherein, inquiry request returns to the accessed state of the target data for request, and in the inquiry request extremely Include query time less, the target data that the inquiry request comprising this query time refers to inquire required for staff is at this By the request of which user's access operation after query time startup.
Step 602:Judge whether query time is consistent with the time parameter values of the first access table, if so, performing step Rapid 603, if it is not, performing step 604.
Step 603:First access table is returned.
Step 604:It is inquired in the second access table based on inquiry request.
That is, can be first looked in the present embodiment query time in inquiry request whether with it is right in current stream process Whether the startup time of target data is consistent in the query task that target data is accessed by which user, that is, checks that inquiry please Whether whether the query time in asking consistent with the time parameter values of the first access table, if it is, showing that user needs to inquire First accesses the user identifier in table caused by current stream process, performs step 603 at this time and returns the first access table It returns, and if not the time parameter values of the first access table generated in current stream process, then show that user needs to check Other startup times of target data were accessed by which user, performed step 604 at this time and were including target data when arbitrary It carves and is inquired in the second access table of the access user identifier started.
In the specific implementation, the target data that the present embodiment starts query time based on inquiry request in the second access table Which when being accessed by user, can specifically be accomplished by the following way:
First, query time with each starting the time in the second access table is compared, is then accessed second in table The startup time corresponding user identifier consistent with query time is returned.
For example, the time in inquiry request is 14 points of 2016.09.20, it will in the as shown in Figure 5 second access table Query time is compared with each startup time, find consistent startup time 2016.09.20 14 points, then by this Start time corresponding user identifier A, B and C is returned.
It is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application four provides with reference to figure 7, The accessed situation of specific data is counted suitable for stream process, situations such as viewing such as some video frequency program by which user, Specifically, the device can include with lower structure:
Acquiring unit 701 is operated, for obtaining the operation information of target data in real time.
Wherein, target data, which has, starts the time, such as time for being opened of video frequency program, web document are uploaded to clothes Time that business device, game on-line are activated etc..
It should be noted that operation information refers to user's browsing objective web document, viewing video frequency program or operation game The operation information at interface.User can realize the access to target data by various terminals or interface.
Marker extraction unit 702, for extracting the use for the target user that the target data is operated in the operation information Family identifies.
Wherein, target user's mark can be the user's name of the user of operation target data or characterization user identity Number etc..
Identifier lookup unit 703, for being target data setting and its time parameter values and startup time in advance It searches whether that there are target user marks, described first in the first consistent access table to access the setting time of table and institute State start the time it is consistent, if it does not, triggering the first storage unit 704.
Wherein, the time parameter values of the first access table are consistent with starting the time, that is to say, that target data is activated When, the first access table of the target data can be generated simultaneously, and the first access table is initialized;Or it is generated in advance more A first accesses table, after target data is activated, selects one first to access table and accesses table as the first of target data, And it is initialized.Here initialization can be understood as the data item in the first access table of initialization, such as be accessed first Multiple data entry fields in table are set, and each field is emptied, in order to follow-up storage user identifier.
Need to illustrate when, the setting of the first access table or generated time and its time parameter values are simultaneously not belonging to same value, The setting of first access table or generated time refer to the first access table execution time that setting acts from scratch, and first accesses The property value that the time parameter values of table access table for first, this time parameter values access the number of targets belonging to table with first According to be activated or the operating time is identical.
First storage unit 704 is accessed to described first in table for the target user to be identified storage.
That is, the first access table has the startup time of its corresponding target data consistent time parameter values, Meanwhile first only storage accesses to target data by the startup time of target data the user's of operation in access table User identifier, as shown in Figure 2.It, can be by accessing mark stored in table to first and before user identifier is stored Knowledge is inquired, and only storage realizes deduplication operation, in looking into for subsequent user without there is the user identifier in accessing table first In inquiry, without carrying out duplicate removal processing again.
In the concrete realization, which can include processor and memory, be arranged on server or other-end, Aforesaid operations acquiring unit 701, marker extraction unit 702, identifier lookup unit 703, first storage unit 704 etc. are used as journey Sequence unit stores in memory, performs above procedure unit stored in memory by processor to realize corresponding work( Energy.
And it is gone in memory to transfer corresponding program unit by kernel comprising kernel in processor.Kernel can set one It is a or more, it was accessed upon actuation by which user by adjusting kernel parameter to count target data.
Memory can include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM), memory includes at least one deposit Store up chip.
By above-mentioned technical proposal, a kind of acquisition device for data access information that the embodiment of the present application four provides passes through base The first access table is pre-set in the startup time of target data, the user of the user for the operation that accesses to target data is marked Knowledge carries out principal characteristic and stores, that is to say, that the user identifier being only not present in the first access table of storage, and to having existed the User identifier in one access table does not need to be responded, and the user identifier stored in the first access table as a result, characterizes Access to target data after target data startup the user of operation, thus obtains the access information of data, this mistake It carries out the extraction of user identifier in journey to the operation information of access target data in real time and then realizes the first filling for accessing table, nothing It needs directly inquire database or the operations such as data statistics, accelerates the computation rate to the access information of target data, it is real Existing the application purpose.
In one implementation, the staff such as analyst can inquire target data by the inquiry to the first access table It is a kind of obtaining for data access information that the embodiment of the present application five provides specifically, with reference to figure 8 by which user's access operation The structure diagram of device is taken, which can also include with lower structure:
First query unit 705, for receiving inquiry request, the inquiry request returns to the target data for request Accessed state, in the present embodiment, characterized belonging to the first access table with every user identifier in the first access table Target data operated or accessed state.And query time is included at least in the inquiry request, judge the inquiry The time parameter values whether time accesses table with described first are consistent, if so, the first access table is returned.
Wherein, inquiry request includes at least query time, and the inquiry request comprising this query time refers to staff The target data of required inquiry is after query time startup by the request of which user's access operation.
Which for example, in a streaming process, after target data is activated, start user to be accessed to target data by Operation is counted, if which user's access target data staff has started a query at this time, if any which user's viewing Program, first look at query time in inquiry request and current the first access table for carrying out stream process time parameter values whether Unanimously, if it is, directly being returned to the first access table, the user stored in this first access table at this time marks Know as the mark of user since being activated the time, such as watched since 17 points of 2016.09.20 program in program Know.
In one implementation, in order to ensure the reliability of data, the present embodiment can identify the target user extracted And the startup time of corresponding target data is preserved, specifically, with reference to figure 9, provided for the embodiment of the present application six one The structure diagram of the acquisition device of kind data access information, the device can also include with lower structure:
Second storage unit 706, for not finding target user in the first access table in identifier lookup unit 703 During mark, the target user is identified and the startup time storage is accessed to second in advance for target data setting In table.
That is, can be recorded in the second access table target data start in any one time being activated it is accessed The user identifier of user and corresponding start the time, and second accesses user identifier in table in target data in any one quilt Do not repeated on the time of startup, as shown in Figure 5, video frequency program on startup between on 14 points of 2016.09.20, have user A, B And C viewings, there are user A, C and D viewing with the 17 of 2016.09.20 points.
And analyst is being supplied to when staff carry out user identifier inquiry, when needing the inquiry inquired to user Between whether unanimously judged with startup time of the target data of current stream process, to ensure the reliability of inquiry, tool Body, as shown in Figure 10, which can also include with lower structure:
Second query unit 707, for receiving inquiry request, the inquiry request returns to the target data for request Accessed state, and query time is included at least in the inquiry request, judges the query time whether with described first The time parameter values for accessing table are consistent, if so, the first access table is returned, if it is not, triggering table inquiry Unit 708;
Wherein, inquiry request includes at least query time, and the inquiry request comprising this query time refers to staff The target data of required inquiry is after query time startup by the request of which user's access operation.
Table query unit 708, for being inquired in the second access table based on the inquiry request.
That is, can be first looked in the present embodiment query time in inquiry request whether with it is right in current stream process Whether the startup time of target data is consistent in the query task that target data is accessed by which user, that is, checks that inquiry please Whether whether the query time in asking consistent with the time parameter values of the first access table, if it is, showing that user needs to inquire First accesses the user identifier in table caused by current stream process, is at this time returned to the first access table, and such as Fruit is not the time parameter values of the first access table generated in current stream process, then show user need to check target data other Start the time was accessed by which user, was including the of access user identifier that target data starts at any time at this time It is inquired in two access tables.
In the specific implementation, the mesh that table query unit 708 starts query time based on inquiry request in the second access table When mark data are accessed by which user, it can specifically be realized by structure, as shown in figure 11:
Time transfer receiver subelement 781, for will each start in the query time and the second access table the time into Row compares;
Mark returns to subelement 782, during for accessing consistent with query time startup in table by described second Between corresponding user identifier returned.
That is, query time is compared with each starting the time in the second access table first in the present embodiment, Then startup time corresponding user identifier consistent with query time in the second access table is returned.
For example, the time in inquiry request is 14 points of 2016.09.20, it will in the as shown in Figure 5 second access table Query time is compared with each startup time, find consistent startup time 2016.09.20 14 points, then by this Start time corresponding user identifier A, B and C is returned.
A kind of computer program product is additionally provided in the embodiment of the present application, the data processings such as server is may operate in and sets It is standby upper, and the computer program product in the present embodiment is on data processing equipment when performing, be adapted for carrying out initialization have it is following The program code of method and step:
The operation information of target data is obtained in real time, and the target data, which has, starts the time;Extract the operation information Target user's mark of the user of the middle operation target data;It is being target data setting and its time parameter values in advance It to be accessed in table with searching whether that there are target user marks, described first in the first access table for starting time consistency Including user identifier, accessed in table to described first if it does not, the target user is identified storage.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the application Apply the form of example.Moreover, the computer for wherein including computer usable program code in one or more can be used in the application The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real The device of function specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps are performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, CD-ROM read-only memory (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, available for storing the information that can be accessed by a computing device.It defines, calculates according to herein Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It these are only embodiments herein, be not limited to the application.To those skilled in the art, The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent replacement, Improve etc., it should be included within the scope of claims hereof.

Claims (10)

1. a kind of acquisition methods of data access information, which is characterized in that including:
The operation information of target data is obtained in real time, and the target data, which has, starts the time;
Extract the target user's mark for the user that the target data is operated in the operation information;
It is being that the target data is set and its time parameter values in the first access table for starting time consistency with looking into advance It looks for and being identified with the presence or absence of the target user, the first access table includes user identifier, if it does not, by the target User identifier storage is accessed to described first in table.
2. it according to the method described in claim 1, it is characterized in that, further includes:
Inquiry request is received, the inquiry request returns to the accessed state of the target data, and the inquiry for request Query time is included at least in request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described first Access table is returned.
3. if according to the method described in claim 1, it is characterized in that, there is no target use in the first access table Family identifies, and the method further includes:
The target user is identified and the startup time is stored to the second access table for being in advance target data setting In.
4. it according to the method described in claim 3, it is characterized in that, further includes:
Inquiry request is received, the inquiry request returns to the accessed state of the target data, and the inquiry for request Query time is included at least in request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described first Access table is returned, if it is not, being inquired in the second access table based on the inquiry request.
5. according to the method described in claim 4, it is characterized in that, described please based on the inquiry in the described second access table It asks and is inquired, including:
The query time is compared with each starting the time in the second access table;
Startup time corresponding user identifier consistent with the query time in the second access table is returned.
6. a kind of acquisition device of data access information, which is characterized in that including:
Acquiring unit is operated, for obtaining the operation information of target data in real time, the target data, which has, starts the time;
Marker extraction unit, for extracting the target user for the user that the target data is operated in operation information mark;
Identifier lookup unit, for being target data setting and its time parameter values and the startup time phase one in advance Search whether that, there are target user mark, the first access table includes user identifier, such as in the first access table caused Fruit is not present, and triggers the first storage unit;
First storage unit is accessed to described first in table for the target user to be identified storage.
7. device according to claim 6, which is characterized in that further include:
First query unit, for receiving inquiry request, the inquiry request returns to the interviewed of the target data for request Ask state, and query time included at least in the inquiry request, judge the query time whether with the first access table Time parameter values it is consistent, if so, the first access table is returned.
8. device according to claim 6, which is characterized in that further include:
Second storage unit, for not finding target user's mark in the first access table in the identifier lookup unit When, the target user is identified and the startup time is stored to the second access table for being in advance target data setting In.
9. device according to claim 8, which is characterized in that further include:
Second query unit, for receiving inquiry request, the inquiry request returns to the interviewed of the target data for request Ask state, and query time included at least in the inquiry request, judge the query time whether with the first access table Time parameter values it is consistent, if so, the first access table is returned, if it is not, triggering table query unit;
Table query unit, for being inquired in the second access table based on the inquiry request.
10. device according to claim 9, which is characterized in that the table query unit includes:
Time transfer receiver subelement, for the query time to be compared with each starting the time in the second access table;
Mark returns to subelement, corresponding for accessing the startup time consistent with the query time in table by described second User identifier is returned.
CN201611105450.2A 2016-12-05 2016-12-05 Method and device for acquiring data access information Active CN108153777B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611105450.2A CN108153777B (en) 2016-12-05 2016-12-05 Method and device for acquiring data access information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611105450.2A CN108153777B (en) 2016-12-05 2016-12-05 Method and device for acquiring data access information

Publications (2)

Publication Number Publication Date
CN108153777A true CN108153777A (en) 2018-06-12
CN108153777B CN108153777B (en) 2022-02-22

Family

ID=62470057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611105450.2A Active CN108153777B (en) 2016-12-05 2016-12-05 Method and device for acquiring data access information

Country Status (1)

Country Link
CN (1) CN108153777B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955847A (en) * 2018-09-26 2020-04-03 北京国双科技有限公司 Information processing method and device, storage medium and processor
CN112261134A (en) * 2020-10-21 2021-01-22 阳光保险集团股份有限公司 Network data access auditing method, device, equipment and storage medium
CN112732807A (en) * 2020-12-30 2021-04-30 福建卓融信息技术有限公司 Interface calling method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012108539A1 (en) * 2011-02-10 2012-08-16 株式会社エヌ・ティ・ティ・ドコモ Terminal number estimation device and terminal number estimation method
CN103020058A (en) * 2011-09-21 2013-04-03 阿里巴巴集团控股有限公司 Multi-version data acquisition method and device
CN103200281A (en) * 2013-01-24 2013-07-10 中国联合网络通信集团有限公司 Method, device and system for accessing intranet server
CN103207882A (en) * 2012-01-13 2013-07-17 阿里巴巴集团控股有限公司 Shop visiting data processing method and system
CN103577441A (en) * 2012-07-30 2014-02-12 腾讯科技(深圳)有限公司 Storage method and storage device for user operation data
CN104298675A (en) * 2013-07-18 2015-01-21 国际商业机器公司 Method and device for cache management

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012108539A1 (en) * 2011-02-10 2012-08-16 株式会社エヌ・ティ・ティ・ドコモ Terminal number estimation device and terminal number estimation method
CN103020058A (en) * 2011-09-21 2013-04-03 阿里巴巴集团控股有限公司 Multi-version data acquisition method and device
CN103207882A (en) * 2012-01-13 2013-07-17 阿里巴巴集团控股有限公司 Shop visiting data processing method and system
CN103577441A (en) * 2012-07-30 2014-02-12 腾讯科技(深圳)有限公司 Storage method and storage device for user operation data
CN103200281A (en) * 2013-01-24 2013-07-10 中国联合网络通信集团有限公司 Method, device and system for accessing intranet server
CN104298675A (en) * 2013-07-18 2015-01-21 国际商业机器公司 Method and device for cache management

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955847A (en) * 2018-09-26 2020-04-03 北京国双科技有限公司 Information processing method and device, storage medium and processor
CN110955847B (en) * 2018-09-26 2023-08-25 北京国双科技有限公司 Information processing method, device, storage medium and processor
CN112261134A (en) * 2020-10-21 2021-01-22 阳光保险集团股份有限公司 Network data access auditing method, device, equipment and storage medium
CN112261134B (en) * 2020-10-21 2023-06-30 阳光保险集团股份有限公司 Network data access auditing method, device, equipment and storage medium
CN112732807A (en) * 2020-12-30 2021-04-30 福建卓融信息技术有限公司 Interface calling method and device

Also Published As

Publication number Publication date
CN108153777B (en) 2022-02-22

Similar Documents

Publication Publication Date Title
CN108270629B (en) Website visitor behavior monitoring method and device
US9256665B2 (en) Creation of inverted index system, and data processing method and apparatus
TW201322021A (en) Image search method and image search apparatus
CN105404627B (en) It is a kind of for determining the method and apparatus of search result
US11100073B2 (en) Method and system for data assignment in a distributed system
CN110597852B (en) Data processing method, device, terminal and storage medium
US20190303486A1 (en) Dynamic hash partitioning for large-scale database management systems
CN107515879B (en) Method and electronic equipment for document retrieval
CN110888837B (en) Object storage small file merging method and device
CN110012049B (en) Information push method, system, server and computer readable storage medium
CN108153777A (en) The acquisition methods and device of data access information
CN110704418A (en) Block chain information query method, device and equipment
US20180276244A1 (en) Method and system for searching for similar images that is nearly independent of the scale of the collection of images
CN109885535A (en) A kind of method and relevant apparatus of file storage
CN109003012B (en) Goods location recommendation link information acquisition method, goods location recommendation method, device and system
CN107644033B (en) Method and equipment for querying data in non-relational database
EP3042316B1 (en) Music identification
CN108154024A (en) A kind of data retrieval method, device and electronic equipment
CN111125499A (en) Data query method and device
CN106294700A (en) The storage of a kind of daily record and read method and device
CN110019448B (en) Data interaction method and device
CN108121733B (en) Data query method and device
US9158825B1 (en) Search validity in data backup systems
CN111597368A (en) Data processing method and device
CN108073596B (en) Data deletion method and device for OLAP database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100080 No. 401, 4th Floor, Haitai Building, 229 North Fourth Ring Road, Haidian District, Beijing

Applicant after: Beijing Guoshuang Technology Co.,Ltd.

Address before: 100086 Cuigong Hotel, 76 Zhichun Road, Shuangyushu District, Haidian District, Beijing

Applicant before: Beijing Guoshuang Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant