CN108153777A - The acquisition methods and device of data access information - Google Patents
The acquisition methods and device of data access information Download PDFInfo
- Publication number
- CN108153777A CN108153777A CN201611105450.2A CN201611105450A CN108153777A CN 108153777 A CN108153777 A CN 108153777A CN 201611105450 A CN201611105450 A CN 201611105450A CN 108153777 A CN108153777 A CN 108153777A
- Authority
- CN
- China
- Prior art keywords
- time
- target data
- access table
- user
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/24569—Query processing with adaptation to specific hardware, e.g. adapted for using GPUs or SSDs
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
This application discloses the acquisition methods and device of a kind of data access information, method includes:The operation information of target data is obtained in real time, and the target data, which has, starts the time;Extract the target user's mark for the user that the target data is operated in the operation information;It is being that the target data is set and its time parameter values in the first access table for starting time consistency with searching whether that there are target user marks in advance, the first access table includes user identifier, it is accessed in table to described first if it does not, the target user is identified storage.The application realizes the first filling for accessing table by carrying out the extraction of user identifier to the operation information of access target data in real time, without directly be inquired database or the operations such as data statistics, accelerate the computation rate to the access information of target data, realize the application purpose.
Description
Technical field
The present invention relates to stream process technical field, the acquisition methods and device of more particularly to a kind of data access information.
Background technology
In the epoch of data explosion, stream process is calculated as instantly popular research field, efficiently with quick characteristic
As the emphasis mainly studied.And the accessed situation of specific data how is calculated in a streaming process, such as television programme data quilt
Which user's viewing etc. and a kind of scheme of worth research.
In the prior art, by writing data into database in real time, then pass through the sql inquiries of database and duplicate removal
Multiple operation, and then obtain the query result of the accessed situation of specific data.
But although scheme of the prior art is simple, in the case of big data quantity, the speed that is calculated by this scheme
Spending slowly, can not meet the needs of stream process.
Invention content
In view of the above problems, it is proposed that the application overcomes in order to provide one kind or solves at least partly in the prior art
Data be accessed situation computation rate it is excessively slow the technical issues of.
This application provides a kind of acquisition methods of data access information, including:
The operation information of target data is obtained in real time, and the target data, which has, starts the time;
Extract the target user's mark for the user that the target data is operated in the operation information;
It is being target data setting and its time parameter values and the first access table for starting time consistency in advance
In search whether there are target user mark, the first access table includes user identifier, if it does not, described in general
Target user identifies storage and is accessed in table to described first.
The above method, it is preferred that further include:
Inquiry request is received, the inquiry request returns to the accessed state of the target data for request, and described
Query time is included at least in inquiry request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described in
First access table is returned.
The above method, it is preferred that if described first accesses there is no target user mark in table, the method is also
Including:
The target user is identified and the startup time storage is visited to second in advance for target data setting
It asks in table.
The above method, it is preferred that further include:
Inquiry request is received, the inquiry request returns to the accessed state of the target data for request, and described
Query time is included at least in inquiry request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described in
First access table is returned, if it is not, being inquired in the second access table based on the inquiry request.
The above method, it is preferred that it is described to be inquired in the second access table based on the inquiry request, including:
The query time is compared with each starting the time in the second access table;
Startup time corresponding user identifier consistent with the query time in the second access table is returned
It returns.
Present invention also provides a kind of acquisition device of data access information, including:
Acquiring unit is operated, for obtaining the operation information of target data in real time, the target data, which has, starts the time;
Marker extraction unit, for extracting the target user for the user that the target data is operated in operation information mark
Know;
Identifier lookup unit, for being target data setting and its time parameter values and the startup time in advance
Search whether that, there are target user mark, the first access table includes user's mark in the first consistent access table
Know, if it does not, the first storage unit of triggering;
First storage unit is accessed to described first in table for the target user to be identified storage.
Above device, it is preferred that further include:
First query unit, for receiving inquiry request, the inquiry request returns to the target data for request
Accessed state, and query time is included at least in the inquiry request, judge whether the query time visits with described first
Ask that the time parameter values of table are consistent, if so, the first access table is returned.
Above device, it is preferred that further include:
Second storage unit, for not finding target user in the first access table in the identifier lookup unit
During mark, the target user is identified and the startup time storage is accessed to second in advance for target data setting
In table.
Above device, it is preferred that further include:
Second query unit, for receiving inquiry request, the inquiry request returns to the target data for request
Accessed state, and query time is included at least in the inquiry request, judge whether the query time visits with described first
Ask that the time parameter values of table are consistent, if so, the first access table is returned, if it is not, triggering table cargo tracer
Member;
Table query unit, for being inquired in the second access table based on the inquiry request.
Above device, it is preferred that the table query unit includes:
Time transfer receiver subelement, for the query time to be compared with each starting the time in the second access table
It is right;
Mark returns to subelement, for accessing the startup time pair consistent with the query time in table by described second
The user identifier answered is returned.
By above-mentioned technical proposal, the acquisition methods and device of a kind of data access information that the application provides pass through base
The first access table is pre-set in the startup time of target data, the user of the user for the operation that accesses to target data is marked
Knowledge carries out principal characteristic and stores, that is to say, that the user identifier being only not present in the first access table of storage, and to having existed the
User identifier in one access table does not need to be responded, and the user identifier stored in the first access table as a result, characterizes
Access to target data after target data startup the user of operation, thus obtains the access information of data, this mistake
It carries out the extraction of user identifier in journey to the operation information of access target data in real time and then realizes the first filling for accessing table, nothing
It needs directly inquire database or the operations such as data statistics, accelerates the computation rate to the access information of target data, it is real
Existing the application purpose.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, below the special specific embodiment for lifting the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this field
Technical staff will become clear.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is the flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application one provides
Fig. 2 is the application exemplary plot of the embodiment of the present application;
Fig. 3 is the flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application two provides;
Fig. 4 is the flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application three provides;
Fig. 5 is the another application exemplary plot of the embodiment of the present application;
Fig. 6 is the partial process view of the embodiment of the present application three;
Fig. 7 is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application four provides;
Fig. 8 is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application five provides;
Fig. 9 is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application six provides;
Figure 10 is another structure diagram of the embodiment of the present application six;
Figure 11 is the part-structure schematic diagram of the embodiment of the present application six.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
It is the realization flow chart of the acquisition methods of a kind of data access information that the embodiment of the present application one provides with reference to figure 1,
The accessed situation of specific data is counted suitable for stream process, situations such as viewing such as some video frequency program by which user,
Specifically, this method may comprise steps of:
Step 101:The operation information of target data is obtained in real time.
Wherein, target data, which has, starts the time, such as time for being opened of video frequency program, web document are uploaded to clothes
Time that business device, game on-line are activated etc..
It should be noted that operation information refers to user's browsing objective web document, viewing video frequency program or operation game
The operation information at interface.User can realize the access to target data by various terminals or interface.
Step 102:Target user's mark of the user of target data is operated in extraction operation information.
Wherein, target user's mark can be the user's name of the user of operation target data or characterization user identity
Number etc..
Step 103:In the first access set in advance for target data and its time parameter values is consistent with starting the time
It is searched whether in table there are target user's mark, if it does not, performing step 104.
Wherein, the time parameter values of the first access table are consistent with starting the time, that is to say, that target data is activated
When, the first access table of the target data can be generated simultaneously, and the first access table is initialized;Or it is generated in advance more
A first accesses table, after target data is activated, selects one first to access table and accesses table as the first of target data,
And it is initialized.Here initialization can be understood as the data item in the first access table of initialization, such as be accessed first
Multiple data entry fields in table are set, and each field is emptied, in order to follow-up storage user identifier.
Need to illustrate when, the setting of the first access table or generated time and its time parameter values are simultaneously not belonging to same value,
The setting of first access table or generated time refer to the first access table execution time that setting acts from scratch, and first accesses
The property value that the time parameter values of table access table for first, this time parameter values access the number of targets belonging to table with first
According to be activated or the operating time is identical.
Step 104:The target user is identified storage to access in table to described first.
That is, the first access table has the startup time of its corresponding target data consistent time parameter values,
Meanwhile first only storage accesses to target data by the startup time of target data the user's of operation in access table
User identifier, as shown in Figure 2.It, can be by accessing mark stored in table to first and before user identifier is stored
Knowledge is inquired, and only storage realizes deduplication operation, in looking into for subsequent user without there is the user identifier in accessing table first
In inquiry, without carrying out duplicate removal processing again.
By above-mentioned technical proposal, a kind of acquisition methods for data access information that the embodiment of the present application one provides pass through base
The first access table is pre-set in the startup time of target data, the user of the user for the operation that accesses to target data is marked
Knowledge carries out principal characteristic and stores, that is to say, that the user identifier being only not present in the first access table of storage, and to having existed the
User identifier in one access table does not need to be responded, and the user identifier stored in the first access table as a result, characterizes
Access to target data after target data startup the user of operation, thus obtains the access information of data, this mistake
It carries out the extraction of user identifier in journey to the operation information of access target data in real time and then realizes the first filling for accessing table, nothing
It needs directly inquire database or the operations such as data statistics, accelerates the computation rate to the access information of target data, it is real
Existing the application purpose.
In one implementation, the staff such as analyst can inquire target data by the inquiry to the first access table
It is a kind of obtaining for data access information that the embodiment of the present application two provides specifically, with reference to figure 3 by which user's access operation
The realization flow chart of method is taken, wherein, this method may also comprise the following steps::
Step 301:Receive inquiry request.
Wherein, inquiry request is for asking the accessed state of the return target data, in the present embodiment, with first
Every user identifier in access table come characterize the target data belonging to the first access table operated or accessed state.And
Query time is included at least in the inquiry request, the inquiry request comprising this query time refers to look into required for staff
The target data of inquiry is after query time startup by the request of which user's access operation.
Step 302:Judge whether query time is consistent with the time parameter values of the first access table, if so, performing step
Rapid 303.
Step 303:The first access table is returned.
Which for example, in a streaming process, after target data is activated, start user to be accessed to target data by
Operation is counted, if which user's access target data staff has started a query at this time, if any which user's viewing
Program, first look at query time in inquiry request and current the first access table for carrying out stream process time parameter values whether
Unanimously, if it is, directly being returned to the first access table, the user stored in this first access table at this time marks
Know as the mark of user since being activated the time, such as watched since 17 points of 2016.09.20 program in program
Know.
In one implementation, in order to ensure the reliability of data, the present embodiment can identify the target user extracted
And the startup time of corresponding target data is preserved, specifically, with reference to figure 4, provided for the embodiment of the present application three one
The realization flow chart of the acquisition methods of kind data access information, inquires target is not present in the first access table in step 103
After user identifier, this method may also comprise the following steps::
Step 105:Target user is identified and starts time storage and accesses table to second in advance for target data setting
In.
That is, can be recorded in the second access table target data start in any one time being activated it is accessed
The user identifier of user and corresponding start the time, and second accesses user identifier in table in target data in any one quilt
Do not repeated on the time of startup, as shown in Figure 5, video frequency program on startup between on 14 points of 2016.09.20, have user A, B
And C viewings, there are user A, C and D viewing with the 17 of 2016.09.20 points.
And analyst is being supplied to when staff carry out user identifier inquiry, when needing the inquiry inquired to user
Between whether unanimously judged with startup time of the target data of current stream process, to ensure the reliability of inquiry, tool
Body, as shown in Figure 6, this method may also comprise the following steps::
Step 601:Receive inquiry request.
Wherein, inquiry request returns to the accessed state of the target data for request, and in the inquiry request extremely
Include query time less, the target data that the inquiry request comprising this query time refers to inquire required for staff is at this
By the request of which user's access operation after query time startup.
Step 602:Judge whether query time is consistent with the time parameter values of the first access table, if so, performing step
Rapid 603, if it is not, performing step 604.
Step 603:First access table is returned.
Step 604:It is inquired in the second access table based on inquiry request.
That is, can be first looked in the present embodiment query time in inquiry request whether with it is right in current stream process
Whether the startup time of target data is consistent in the query task that target data is accessed by which user, that is, checks that inquiry please
Whether whether the query time in asking consistent with the time parameter values of the first access table, if it is, showing that user needs to inquire
First accesses the user identifier in table caused by current stream process, performs step 603 at this time and returns the first access table
It returns, and if not the time parameter values of the first access table generated in current stream process, then show that user needs to check
Other startup times of target data were accessed by which user, performed step 604 at this time and were including target data when arbitrary
It carves and is inquired in the second access table of the access user identifier started.
In the specific implementation, the target data that the present embodiment starts query time based on inquiry request in the second access table
Which when being accessed by user, can specifically be accomplished by the following way:
First, query time with each starting the time in the second access table is compared, is then accessed second in table
The startup time corresponding user identifier consistent with query time is returned.
For example, the time in inquiry request is 14 points of 2016.09.20, it will in the as shown in Figure 5 second access table
Query time is compared with each startup time, find consistent startup time 2016.09.20 14 points, then by this
Start time corresponding user identifier A, B and C is returned.
It is the structure diagram of the acquisition device of a kind of data access information that the embodiment of the present application four provides with reference to figure 7,
The accessed situation of specific data is counted suitable for stream process, situations such as viewing such as some video frequency program by which user,
Specifically, the device can include with lower structure:
Acquiring unit 701 is operated, for obtaining the operation information of target data in real time.
Wherein, target data, which has, starts the time, such as time for being opened of video frequency program, web document are uploaded to clothes
Time that business device, game on-line are activated etc..
It should be noted that operation information refers to user's browsing objective web document, viewing video frequency program or operation game
The operation information at interface.User can realize the access to target data by various terminals or interface.
Marker extraction unit 702, for extracting the use for the target user that the target data is operated in the operation information
Family identifies.
Wherein, target user's mark can be the user's name of the user of operation target data or characterization user identity
Number etc..
Identifier lookup unit 703, for being target data setting and its time parameter values and startup time in advance
It searches whether that there are target user marks, described first in the first consistent access table to access the setting time of table and institute
State start the time it is consistent, if it does not, triggering the first storage unit 704.
Wherein, the time parameter values of the first access table are consistent with starting the time, that is to say, that target data is activated
When, the first access table of the target data can be generated simultaneously, and the first access table is initialized;Or it is generated in advance more
A first accesses table, after target data is activated, selects one first to access table and accesses table as the first of target data,
And it is initialized.Here initialization can be understood as the data item in the first access table of initialization, such as be accessed first
Multiple data entry fields in table are set, and each field is emptied, in order to follow-up storage user identifier.
Need to illustrate when, the setting of the first access table or generated time and its time parameter values are simultaneously not belonging to same value,
The setting of first access table or generated time refer to the first access table execution time that setting acts from scratch, and first accesses
The property value that the time parameter values of table access table for first, this time parameter values access the number of targets belonging to table with first
According to be activated or the operating time is identical.
First storage unit 704 is accessed to described first in table for the target user to be identified storage.
That is, the first access table has the startup time of its corresponding target data consistent time parameter values,
Meanwhile first only storage accesses to target data by the startup time of target data the user's of operation in access table
User identifier, as shown in Figure 2.It, can be by accessing mark stored in table to first and before user identifier is stored
Knowledge is inquired, and only storage realizes deduplication operation, in looking into for subsequent user without there is the user identifier in accessing table first
In inquiry, without carrying out duplicate removal processing again.
In the concrete realization, which can include processor and memory, be arranged on server or other-end,
Aforesaid operations acquiring unit 701, marker extraction unit 702, identifier lookup unit 703, first storage unit 704 etc. are used as journey
Sequence unit stores in memory, performs above procedure unit stored in memory by processor to realize corresponding work(
Energy.
And it is gone in memory to transfer corresponding program unit by kernel comprising kernel in processor.Kernel can set one
It is a or more, it was accessed upon actuation by which user by adjusting kernel parameter to count target data.
Memory can include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM), memory includes at least one deposit
Store up chip.
By above-mentioned technical proposal, a kind of acquisition device for data access information that the embodiment of the present application four provides passes through base
The first access table is pre-set in the startup time of target data, the user of the user for the operation that accesses to target data is marked
Knowledge carries out principal characteristic and stores, that is to say, that the user identifier being only not present in the first access table of storage, and to having existed the
User identifier in one access table does not need to be responded, and the user identifier stored in the first access table as a result, characterizes
Access to target data after target data startup the user of operation, thus obtains the access information of data, this mistake
It carries out the extraction of user identifier in journey to the operation information of access target data in real time and then realizes the first filling for accessing table, nothing
It needs directly inquire database or the operations such as data statistics, accelerates the computation rate to the access information of target data, it is real
Existing the application purpose.
In one implementation, the staff such as analyst can inquire target data by the inquiry to the first access table
It is a kind of obtaining for data access information that the embodiment of the present application five provides specifically, with reference to figure 8 by which user's access operation
The structure diagram of device is taken, which can also include with lower structure:
First query unit 705, for receiving inquiry request, the inquiry request returns to the target data for request
Accessed state, in the present embodiment, characterized belonging to the first access table with every user identifier in the first access table
Target data operated or accessed state.And query time is included at least in the inquiry request, judge the inquiry
The time parameter values whether time accesses table with described first are consistent, if so, the first access table is returned.
Wherein, inquiry request includes at least query time, and the inquiry request comprising this query time refers to staff
The target data of required inquiry is after query time startup by the request of which user's access operation.
Which for example, in a streaming process, after target data is activated, start user to be accessed to target data by
Operation is counted, if which user's access target data staff has started a query at this time, if any which user's viewing
Program, first look at query time in inquiry request and current the first access table for carrying out stream process time parameter values whether
Unanimously, if it is, directly being returned to the first access table, the user stored in this first access table at this time marks
Know as the mark of user since being activated the time, such as watched since 17 points of 2016.09.20 program in program
Know.
In one implementation, in order to ensure the reliability of data, the present embodiment can identify the target user extracted
And the startup time of corresponding target data is preserved, specifically, with reference to figure 9, provided for the embodiment of the present application six one
The structure diagram of the acquisition device of kind data access information, the device can also include with lower structure:
Second storage unit 706, for not finding target user in the first access table in identifier lookup unit 703
During mark, the target user is identified and the startup time storage is accessed to second in advance for target data setting
In table.
That is, can be recorded in the second access table target data start in any one time being activated it is accessed
The user identifier of user and corresponding start the time, and second accesses user identifier in table in target data in any one quilt
Do not repeated on the time of startup, as shown in Figure 5, video frequency program on startup between on 14 points of 2016.09.20, have user A, B
And C viewings, there are user A, C and D viewing with the 17 of 2016.09.20 points.
And analyst is being supplied to when staff carry out user identifier inquiry, when needing the inquiry inquired to user
Between whether unanimously judged with startup time of the target data of current stream process, to ensure the reliability of inquiry, tool
Body, as shown in Figure 10, which can also include with lower structure:
Second query unit 707, for receiving inquiry request, the inquiry request returns to the target data for request
Accessed state, and query time is included at least in the inquiry request, judges the query time whether with described first
The time parameter values for accessing table are consistent, if so, the first access table is returned, if it is not, triggering table inquiry
Unit 708;
Wherein, inquiry request includes at least query time, and the inquiry request comprising this query time refers to staff
The target data of required inquiry is after query time startup by the request of which user's access operation.
Table query unit 708, for being inquired in the second access table based on the inquiry request.
That is, can be first looked in the present embodiment query time in inquiry request whether with it is right in current stream process
Whether the startup time of target data is consistent in the query task that target data is accessed by which user, that is, checks that inquiry please
Whether whether the query time in asking consistent with the time parameter values of the first access table, if it is, showing that user needs to inquire
First accesses the user identifier in table caused by current stream process, is at this time returned to the first access table, and such as
Fruit is not the time parameter values of the first access table generated in current stream process, then show user need to check target data other
Start the time was accessed by which user, was including the of access user identifier that target data starts at any time at this time
It is inquired in two access tables.
In the specific implementation, the mesh that table query unit 708 starts query time based on inquiry request in the second access table
When mark data are accessed by which user, it can specifically be realized by structure, as shown in figure 11:
Time transfer receiver subelement 781, for will each start in the query time and the second access table the time into
Row compares;
Mark returns to subelement 782, during for accessing consistent with query time startup in table by described second
Between corresponding user identifier returned.
That is, query time is compared with each starting the time in the second access table first in the present embodiment,
Then startup time corresponding user identifier consistent with query time in the second access table is returned.
For example, the time in inquiry request is 14 points of 2016.09.20, it will in the as shown in Figure 5 second access table
Query time is compared with each startup time, find consistent startup time 2016.09.20 14 points, then by this
Start time corresponding user identifier A, B and C is returned.
A kind of computer program product is additionally provided in the embodiment of the present application, the data processings such as server is may operate in and sets
It is standby upper, and the computer program product in the present embodiment is on data processing equipment when performing, be adapted for carrying out initialization have it is following
The program code of method and step:
The operation information of target data is obtained in real time, and the target data, which has, starts the time;Extract the operation information
Target user's mark of the user of the middle operation target data;It is being target data setting and its time parameter values in advance
It to be accessed in table with searching whether that there are target user marks, described first in the first access table for starting time consistency
Including user identifier, accessed in table to described first if it does not, the target user is identified storage.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the application
Apply the form of example.Moreover, the computer for wherein including computer usable program code in one or more can be used in the application
The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real
The device of function specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps are performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or
The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, CD-ROM read-only memory (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, available for storing the information that can be accessed by a computing device.It defines, calculates according to herein
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It these are only embodiments herein, be not limited to the application.To those skilled in the art,
The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent replacement,
Improve etc., it should be included within the scope of claims hereof.
Claims (10)
1. a kind of acquisition methods of data access information, which is characterized in that including:
The operation information of target data is obtained in real time, and the target data, which has, starts the time;
Extract the target user's mark for the user that the target data is operated in the operation information;
It is being that the target data is set and its time parameter values in the first access table for starting time consistency with looking into advance
It looks for and being identified with the presence or absence of the target user, the first access table includes user identifier, if it does not, by the target
User identifier storage is accessed to described first in table.
2. it according to the method described in claim 1, it is characterized in that, further includes:
Inquiry request is received, the inquiry request returns to the accessed state of the target data, and the inquiry for request
Query time is included at least in request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described first
Access table is returned.
3. if according to the method described in claim 1, it is characterized in that, there is no target use in the first access table
Family identifies, and the method further includes:
The target user is identified and the startup time is stored to the second access table for being in advance target data setting
In.
4. it according to the method described in claim 3, it is characterized in that, further includes:
Inquiry request is received, the inquiry request returns to the accessed state of the target data, and the inquiry for request
Query time is included at least in request;
Judge whether the query time is consistent with the time parameter values of the first access table, if so, by described first
Access table is returned, if it is not, being inquired in the second access table based on the inquiry request.
5. according to the method described in claim 4, it is characterized in that, described please based on the inquiry in the described second access table
It asks and is inquired, including:
The query time is compared with each starting the time in the second access table;
Startup time corresponding user identifier consistent with the query time in the second access table is returned.
6. a kind of acquisition device of data access information, which is characterized in that including:
Acquiring unit is operated, for obtaining the operation information of target data in real time, the target data, which has, starts the time;
Marker extraction unit, for extracting the target user for the user that the target data is operated in operation information mark;
Identifier lookup unit, for being target data setting and its time parameter values and the startup time phase one in advance
Search whether that, there are target user mark, the first access table includes user identifier, such as in the first access table caused
Fruit is not present, and triggers the first storage unit;
First storage unit is accessed to described first in table for the target user to be identified storage.
7. device according to claim 6, which is characterized in that further include:
First query unit, for receiving inquiry request, the inquiry request returns to the interviewed of the target data for request
Ask state, and query time included at least in the inquiry request, judge the query time whether with the first access table
Time parameter values it is consistent, if so, the first access table is returned.
8. device according to claim 6, which is characterized in that further include:
Second storage unit, for not finding target user's mark in the first access table in the identifier lookup unit
When, the target user is identified and the startup time is stored to the second access table for being in advance target data setting
In.
9. device according to claim 8, which is characterized in that further include:
Second query unit, for receiving inquiry request, the inquiry request returns to the interviewed of the target data for request
Ask state, and query time included at least in the inquiry request, judge the query time whether with the first access table
Time parameter values it is consistent, if so, the first access table is returned, if it is not, triggering table query unit;
Table query unit, for being inquired in the second access table based on the inquiry request.
10. device according to claim 9, which is characterized in that the table query unit includes:
Time transfer receiver subelement, for the query time to be compared with each starting the time in the second access table;
Mark returns to subelement, corresponding for accessing the startup time consistent with the query time in table by described second
User identifier is returned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611105450.2A CN108153777B (en) | 2016-12-05 | 2016-12-05 | Method and device for acquiring data access information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611105450.2A CN108153777B (en) | 2016-12-05 | 2016-12-05 | Method and device for acquiring data access information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108153777A true CN108153777A (en) | 2018-06-12 |
CN108153777B CN108153777B (en) | 2022-02-22 |
Family
ID=62470057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611105450.2A Active CN108153777B (en) | 2016-12-05 | 2016-12-05 | Method and device for acquiring data access information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108153777B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955847A (en) * | 2018-09-26 | 2020-04-03 | 北京国双科技有限公司 | Information processing method and device, storage medium and processor |
CN112261134A (en) * | 2020-10-21 | 2021-01-22 | 阳光保险集团股份有限公司 | Network data access auditing method, device, equipment and storage medium |
CN112732807A (en) * | 2020-12-30 | 2021-04-30 | 福建卓融信息技术有限公司 | Interface calling method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012108539A1 (en) * | 2011-02-10 | 2012-08-16 | 株式会社エヌ・ティ・ティ・ドコモ | Terminal number estimation device and terminal number estimation method |
CN103020058A (en) * | 2011-09-21 | 2013-04-03 | 阿里巴巴集团控股有限公司 | Multi-version data acquisition method and device |
CN103200281A (en) * | 2013-01-24 | 2013-07-10 | 中国联合网络通信集团有限公司 | Method, device and system for accessing intranet server |
CN103207882A (en) * | 2012-01-13 | 2013-07-17 | 阿里巴巴集团控股有限公司 | Shop visiting data processing method and system |
CN103577441A (en) * | 2012-07-30 | 2014-02-12 | 腾讯科技(深圳)有限公司 | Storage method and storage device for user operation data |
CN104298675A (en) * | 2013-07-18 | 2015-01-21 | 国际商业机器公司 | Method and device for cache management |
-
2016
- 2016-12-05 CN CN201611105450.2A patent/CN108153777B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012108539A1 (en) * | 2011-02-10 | 2012-08-16 | 株式会社エヌ・ティ・ティ・ドコモ | Terminal number estimation device and terminal number estimation method |
CN103020058A (en) * | 2011-09-21 | 2013-04-03 | 阿里巴巴集团控股有限公司 | Multi-version data acquisition method and device |
CN103207882A (en) * | 2012-01-13 | 2013-07-17 | 阿里巴巴集团控股有限公司 | Shop visiting data processing method and system |
CN103577441A (en) * | 2012-07-30 | 2014-02-12 | 腾讯科技(深圳)有限公司 | Storage method and storage device for user operation data |
CN103200281A (en) * | 2013-01-24 | 2013-07-10 | 中国联合网络通信集团有限公司 | Method, device and system for accessing intranet server |
CN104298675A (en) * | 2013-07-18 | 2015-01-21 | 国际商业机器公司 | Method and device for cache management |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955847A (en) * | 2018-09-26 | 2020-04-03 | 北京国双科技有限公司 | Information processing method and device, storage medium and processor |
CN110955847B (en) * | 2018-09-26 | 2023-08-25 | 北京国双科技有限公司 | Information processing method, device, storage medium and processor |
CN112261134A (en) * | 2020-10-21 | 2021-01-22 | 阳光保险集团股份有限公司 | Network data access auditing method, device, equipment and storage medium |
CN112261134B (en) * | 2020-10-21 | 2023-06-30 | 阳光保险集团股份有限公司 | Network data access auditing method, device, equipment and storage medium |
CN112732807A (en) * | 2020-12-30 | 2021-04-30 | 福建卓融信息技术有限公司 | Interface calling method and device |
Also Published As
Publication number | Publication date |
---|---|
CN108153777B (en) | 2022-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108270629B (en) | Website visitor behavior monitoring method and device | |
US9256665B2 (en) | Creation of inverted index system, and data processing method and apparatus | |
TW201322021A (en) | Image search method and image search apparatus | |
CN105404627B (en) | It is a kind of for determining the method and apparatus of search result | |
US11100073B2 (en) | Method and system for data assignment in a distributed system | |
CN110597852B (en) | Data processing method, device, terminal and storage medium | |
US20190303486A1 (en) | Dynamic hash partitioning for large-scale database management systems | |
CN107515879B (en) | Method and electronic equipment for document retrieval | |
CN110888837B (en) | Object storage small file merging method and device | |
CN110012049B (en) | Information push method, system, server and computer readable storage medium | |
CN108153777A (en) | The acquisition methods and device of data access information | |
CN110704418A (en) | Block chain information query method, device and equipment | |
US20180276244A1 (en) | Method and system for searching for similar images that is nearly independent of the scale of the collection of images | |
CN109885535A (en) | A kind of method and relevant apparatus of file storage | |
CN109003012B (en) | Goods location recommendation link information acquisition method, goods location recommendation method, device and system | |
CN107644033B (en) | Method and equipment for querying data in non-relational database | |
EP3042316B1 (en) | Music identification | |
CN108154024A (en) | A kind of data retrieval method, device and electronic equipment | |
CN111125499A (en) | Data query method and device | |
CN106294700A (en) | The storage of a kind of daily record and read method and device | |
CN110019448B (en) | Data interaction method and device | |
CN108121733B (en) | Data query method and device | |
US9158825B1 (en) | Search validity in data backup systems | |
CN111597368A (en) | Data processing method and device | |
CN108073596B (en) | Data deletion method and device for OLAP database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100080 No. 401, 4th Floor, Haitai Building, 229 North Fourth Ring Road, Haidian District, Beijing Applicant after: Beijing Guoshuang Technology Co.,Ltd. Address before: 100086 Cuigong Hotel, 76 Zhichun Road, Shuangyushu District, Haidian District, Beijing Applicant before: Beijing Guoshuang Technology Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |