CN110162412A - In the method and apparatus that client carries out data manipulation - Google Patents

In the method and apparatus that client carries out data manipulation Download PDF

Info

Publication number
CN110162412A
CN110162412A CN201810151840.6A CN201810151840A CN110162412A CN 110162412 A CN110162412 A CN 110162412A CN 201810151840 A CN201810151840 A CN 201810151840A CN 110162412 A CN110162412 A CN 110162412A
Authority
CN
China
Prior art keywords
data
mapping
key assignments
key
operation data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810151840.6A
Other languages
Chinese (zh)
Other versions
CN110162412B (en
Inventor
何武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810151840.6A priority Critical patent/CN110162412B/en
Publication of CN110162412A publication Critical patent/CN110162412A/en
Application granted granted Critical
Publication of CN110162412B publication Critical patent/CN110162412B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of method and apparatus for carrying out data manipulation in client, are related to field of computer technology.One specific embodiment of this method includes: to have data operation layer between terminal applies and local storage space, it include the key name to operation data to operation data information the method includes obtaining from the data operation request of terminal applies to operation data information;Key name to operation data is packaged into mapping major key;Data manipulation is executed according to mapping major key.The embodiment can flexibly, easily storing data, different business data can not be isolated, the problems such as data expired time can not be arranged by solving.

Description

In the method and apparatus that client carries out data manipulation
Technical field
The present invention relates to field of computer technology more particularly to a kind of methods and dress that data manipulation is carried out in client It sets.
Background technique
With the development of web site traffic, more and more data are placed on the storage that client does persistence, both mitigate in this way Server stress also reduces network flow.How to facilitate effective storing data just at a critical issue in client.
At present there are mainly two types of browser local datastore schemes:
First is that cookie is stored in local hard drive using the data cookie being stored on user local terminal, browse Device can read the cookie value of corresponding domain name when accessing certain domain name from hard disk, and be associated with the document of current page On document object;
Second is that localStorage is locally stored using in the 5th edition html5 specification of hypertext markup language, it equally will Data are stored in local hard drive, and browser can read the data of corresponding domain name, be then associated with and work as when accessing certain domain name On the window window object of the preceding page.
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery:
1, there are three defects for cookie technology: first is that capacity is too small, being usually no more than 2KB;Second is that the net that browser is each It can all be attached to upper cookie in network request, increase the expense of network flow;Third is that written in code trouble, cookie storage are One whole section of character string needs manually format data when operating cookie every time;
2, localStorage technology is locally stored, the shortcomings that this mode improves cookie, but it also has oneself The shortcomings that: it can not self-defining data expired time, the data that different business can not be isolated etc..
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method and apparatus for carrying out data manipulation in client, Neng Gouling Work, easily storing data, different business data can not be isolated, the problems such as data expired time can not be arranged by solving.
To achieve the above object, according to an aspect of an embodiment of the present invention, it provides a kind of in client progress data The method of operation.
A method of data manipulation being carried out in client, there is data behaviour between terminal applies and local storage space Make layer, which comprises it is obtained from the data operation request of terminal applies to operation data information, it is described to operation data Information includes the key name to operation data;The key name to operation data is packaged into mapping major key;It is led according to the mapping Key executes data manipulation.
Optionally, if described to operation data information further includes the key assignments to operation data, according to the mapping Major key executes the step of data manipulation includes: whether to preserve Map Key according to mapping major key lookup local storage space Value;If not saving, using the key assignments as mapping key assignments, then using the mapping major key and the mapping key assignments as encapsulation Afterwards to operation data;Otherwise, the corresponding mapping key assignments of the mapping major key is obtained, and according to the key assignments and the Map Key Value generates new mapping key assignments, then using the mapping major key and the new mapping key assignments as after encapsulating to operand According to;Local storage space will be saved in operation data after the encapsulation.
Optionally, the step of generating new mapping key assignments according to the key assignments and the mapping key assignments includes: described in judgement Whether map in key assignments includes expired time;If so, whether being already expired according to expired time judgement is described to operation data Phase, and when deletion when operation data is out of date is described to operation data, using the key assignments as new mapping key assignments;When It is described when operation data is not out of date, obtain the expired time to operation data from the mapping key assignments, and according to institute It states key assignments and the expired time generates new mapping key assignments;Otherwise, using the key assignments as new mapping key assignments.
Optionally, if described to operation data information further includes the key assignments and expired time to operation data, root The step of executing data manipulation according to the mapping major key includes: to generate mapping key assignments according to the key assignments and the expired time, Then using it is described mapping major key and it is described mapping key assignments as encapsulate after to operation data;By after the encapsulation to operand According to being saved in local storage space.
Optionally, if described to operation data information further includes the expired time to operation data, according to The step of mapping major key executes data manipulation includes: to obtain the Map Key that local storage space saves according to the mapping major key Value;New mapping key assignments is generated according to the expired time and the mapping key assignments, then by the mapping major key and described new Mapping key assignments as encapsulate after to operation data;Local storage space will be saved in operation data after the encapsulation.
Optionally, the step of generating new mapping key assignments according to the expired time and the mapping key assignments includes: judgement Whether include former expired time in the mapping key assignments;If so, described to operation data according to the former expired time judgement It is whether out of date, and when deletion when operation data is out of date is described to operation data, when described to the non-mistake of operation data When the phase, the key assignments to operation data is obtained from the mapping key assignments, and raw according to the key assignments and the expired time The mapping key assignments of Cheng Xin;Otherwise, obtain the key assignments to operation data from the mapping key assignments, and according to the key assignments and The expired time generates new mapping key assignments.
Optionally, by after the encapsulation the step of being saved in local storage space to operation data before, further includes: really Determining local storage space, there is no the corresponding data of the mapping major key.
Optionally, if described to operation data information only includes the key name to operation data, according to the mapping The step of major key execution data manipulation includes: to search the mapping major key pair from local storage space according to the mapping major key The data answered.
Optionally, after the step of searching the corresponding data of the mapping major key in local storage space, further includes: sentence Whether the data of breaking are expired;If the data are not out of date or not set expired time, the data are returned;Otherwise, it deletes The data, and return to null value.
Optionally, the mapping major key is generated by the key name and data class indication.
According to another aspect of an embodiment of the present invention, a kind of device that data manipulation is carried out in client is provided.
A kind of device carrying out data manipulation in client, described device is between terminal applies and local storage space Data operation layer, described device includes: data obtaining module, for obtaining from the data operation request of terminal applies wait grasp Date information, described to operation data information includes key name to operation data;Key name package module, for by described wait grasp The key name for making data is packaged into mapping major key;Data operation modules, for executing data manipulation according to the mapping major key.
Optionally, if described to operation data information further includes the key assignments to operation data, the data manipulation Module is also used to: searching whether local storage space preserves mapping key assignments according to the mapping major key;If not saving, by institute State key assignments as mapping key assignments, then using it is described mapping major key and it is described mapping key assignments as encapsulate after to operation data;It is no Then, the corresponding mapping key assignments of the mapping major key is obtained, and new Map Key is generated according to the key assignments and the mapping key assignments Value, then using the mapping major key and the new mapping key assignments as after encapsulating to operation data;After the encapsulation Local storage space is saved in operation data.
Optionally, whether the data operation modules are also used to: judging in the mapping key assignments comprising expired time;If Be, then it is described whether out of date to operation data according to expired time judgement, and when described when operation data is out of date To operation data described in deleting, using the key assignments as new mapping key assignments;When described when operation data is not out of date, from described It maps and obtains the expired time to operation data in key assignments, and new reflect is generated according to the key assignments and the expired time Penetrate key assignments;Otherwise, using the key assignments as new mapping key assignments.
Optionally, if described to operation data information further includes the key assignments and expired time to operation data, institute It states data operation modules to be also used to: mapping key assignments being generated according to the key assignments and the expired time, then leads the mapping Key and it is described mapping key assignments as encapsulate after to operation data;Being saved in after the encapsulation to operation data is locally stored Space.
Optionally, if described to operation data information further includes the expired time to operation data, the data Operation module is also used to: obtaining the mapping key assignments that local storage space saves according to the mapping major key;According to it is described expired when Between and the mapping key assignments generate new mapping key assignments, then using the mapping major key and the new mapping key assignments as encapsulating Afterwards to operation data;Local storage space will be saved in operation data after the encapsulation.
Optionally, whether the data operation modules are also used to: judging in the mapping key assignments comprising former expired time;If Be, then it is described whether out of date to operation data according to the former expired time judgement, and when described out of date to operation data When delete it is described to operation data, when described when operation data is not out of date, obtained from the mapping key assignments described in wait operate The key assignments of data, and new mapping key assignments is generated according to the key assignments and the expired time;Otherwise, from the mapping key assignments The key assignments to operation data is obtained, and generates new mapping key assignments according to the key assignments and the expired time.
Optionally, further include data determining module, be used for: local deposit will be saved in operation data after the encapsulation Before storing up space, determining local storage space, there is no the corresponding data of the mapping major key.
Optionally, if described to operation data information only includes the key name to operation data, the data manipulation Module is also used to: according to the mapping major key, searching the corresponding data of the mapping major key from local storage space.
Optionally, further include data check module, be used for: is corresponding searching the mapping major key from local storage space After data, judge whether the data are expired;If the data are not out of date or not set expired time, the number is returned According to;Otherwise, the data are deleted, and return to null value.
Optionally, the mapping major key is generated by the key name and data class indication.
Optionally, described device is realized based on mapping object.
Another aspect according to an embodiment of the present invention provides a kind of electronic equipment that data manipulation is carried out in client.
A kind of electronic equipment carrying out data manipulation in client, comprising: one or more processors;Storage device is used In storing one or more programs, when one or more of programs are executed by one or more of processors, so that described One or more processors realize the method for carrying out data manipulation in client provided by the embodiment of the present invention.
It is according to an embodiment of the present invention in another aspect, providing a kind of computer-readable medium.
A kind of computer-readable medium is stored thereon with computer program, realizes this when described program is executed by processor The method for carrying out data manipulation in client provided by inventive embodiments.
One embodiment in foregoing invention have the following advantages that or the utility model has the advantages that by terminal applies in client with Increase data operation layer between local storage space, and will be obtained from the data operation request of terminal applies by data operation layer The key name to operation data be packaged to obtain mapping major key, data manipulation is then executed according to mapping major key, is realized pair Client local data is operated, user without the actual storage mode of focused data (can with cookie, SessionStorage, localStorage etc.), so as to flexibly, easily storing data, so that solving can not be isolated The problems such as data expired time can not be arranged in different business data, meanwhile, when using sessionStorage, When the storage modes such as localStorage, it is also equipped with being locally stored, not will increase network load, store data long term for large capacity And written in code the advantages that facilitating.
Further effect possessed by above-mentioned non-usual optional way adds hereinafter in conjunction with specific embodiment With explanation.
Detailed description of the invention
Attached drawing for a better understanding of the present invention, does not constitute an undue limitation on the present invention.Wherein:
Fig. 1 is the schematic diagram of the main flow of the method according to an embodiment of the present invention that data manipulation is carried out in client;
Fig. 2 is the operating process schematic diagram of the setting expired time of the embodiment of the present invention;
Fig. 3 is the data manipulation flow diagram of the embodiment of the present invention;
Fig. 4 is the schematic diagram of the main modular of the device according to an embodiment of the present invention that data manipulation is carried out in client;
Fig. 5 is that the embodiment of the present invention can be applied to exemplary system architecture figure therein;
Fig. 6 is adapted for the structural representation of the computer system for the terminal device or server of realizing the embodiment of the present invention Figure.
Specific embodiment
Below in conjunction with attached drawing, an exemplary embodiment of the present invention will be described, including the various of the embodiment of the present invention Details should think them only exemplary to help understanding.Therefore, those of ordinary skill in the art should recognize It arrives, it can be with various changes and modifications are made to the embodiments described herein, without departing from scope and spirit of the present invention.Together Sample, for clarity and conciseness, descriptions of well-known functions and structures are omitted from the following description.
The core of technical solution of the present invention is: providing " the data manipulation realized based on mapping object for user Layer ", mapping object expose " additions and deletions, which change, looks into " operation interface of data outward, and no longer directly access is locally stored user Data in localStorage, but the data in localStorage are accessed indirectly by these operation interfaces.Therefore, This " data operation layer " shields the actual data manipulation of bottom.The present invention is based on this " data operation layers ", may be implemented The extension functions such as isolation, the verification of data expired time of different business data.It, can be by using retouching based on object mapping mechanism The metadata mapped between object and data storage is stated, object is persisted to local data memory space automatically.In the following, to this Two key points of the technical solution of invention are described respectively.
First is that " data operation layer ", currently, only there are two the stages for the data manipulation of client: user is touched by terminal applies Data manipulation is sent out, localStorage receives message and corresponding operation is carried out to data.The present invention the two above stage it Between, increase the stage of one " data operation layer " newly: firstly, user is grasped by the data that various events trigger " additions and deletions, which change, looks into " Make, and transmits the data of practical operation to " data operation layer ";Then, " data operation layer " receives the data manipulation message of user And it is packaged according to client environment using data manipulation message of the different data encapsulation methods to user, and will be after encapsulation Message transmission to bottom localStorage;Finally, localStorage carries out actual data storage or returns to number According to;The data of return are also needed through " data operation layer ", from " data operation layer " check data availability and then to User's returned data.
Second is that " mapping object ", mapping object essence is a common Javascript object.But the present invention uses This method of Object.defineProperty has redefined the setter method of this object properties (for being arranged or depositing Store up data) and getter method (for obtaining or searching data), it is added in setter method to localStorage and is sent out The code for sending data operation information, the no longer attribute value of returning an object value itself in getter method, but return Value in localStorage.In this way, mapping object corresponding will go to grasp when user is when operating this mapping object Make localStorage.Mapping object keeps apart user and actual storage container (local storage space), and user is not It is concerned about how actual data store, it is only necessary to pass through code: var jshop=Storage (' jshop '), it can be right Data in local data space jshop carry out the operation of " additions and deletions, which change, looks into ".At the same time it can also expand on mapping object Put on display NameSpace and expired time function, with solve localStorage can not be isolated different business data and not can from The problem of defining expired time.
There can be multiple business on the usual same page, such as: certain part commodity is paid close attention to, some shop is collected, obtains shop The different business such as gift bag can be located on the same page.Confounding of variable between business or duplication of name in order to prevent, different industry Business data are preferably formed with independent " memory space ".Isolation for the data variable of different business, there is no browser branch at present It holds.In order to solve this problem, the present invention is the data of different business, by adding different lives by the way of NameSpace The data classifications mark such as name prefix or name suffix, to simulate this independent " memory space ", to reach following realization Effect (in the embodiment of the present invention for adding name prefix prefix): user is passed to mapping pair in operation data That as (" data operation layer ") is data key name key, but key can be automatically converted to " prefix+key " simultaneously by data operation layer LocalStorage is passed to as mapping major key to go to save.User is not aware that the data are real in localStorage in this way It is stored separately according to NameSpace on border, user only needs that difference can be operated by generating different mapping objects Data space, whether weight can occur with the key in another data space without the data be concerned about in a data space It is multiple.
The present invention in specific implementation, has firstly, generating one by factory method (new Storage (" prefix ")) The mapping object of the NameSpace of standby uniqueness, the NameSpace can add name prefix prefix for data.Factory method Mode (FACTORY METHOD) is a kind of common Object Creation type design pattern, and the core spirit of this mode is in encapsulation class Constant part, extracting wherein personalized part apt to change is separate class, by relying on injection to reach decoupling, multiplexing and conveniently The purpose that later maintenance is expanded.
The mapping object (" data operation layer ") of generation does number to the mapping object after being provided with name prefix prefix When according to accessing operation, mapping object can add corresponding name prefix to the data key name key received.User can be for not With the scope of business using different name prefix prefix (for example member data uses mem, gift data using gift etc., Independently defined by user, the present invention does not do any restrictions), and it is unique for keeping name prefix, so that it may reach isolation not With the purpose of business datum.When user setup data, { key:value } key-value pair for transmitting data into mapping object, reflects The key-value pair of one { prefix+key:value } can be generated by penetrating object i.e., so as to distinguish the data of different business.
In addition, for the data of client storage, many times all requirements of time-effectiveness.Data are not out of date When, it can normally access, should be disposed once expired.The present invention uses " lazyness is removed " mode: when accessing data, doing The expired inspection of data, normal return, otherwise clears data and returns to null value if data are not out of date.For can not be customized expired The problem of time, the present invention are reflected by being packaged into one according to the key assignments value of data and the expired time time of user setting The method of key-value pair elephant is penetrated to solve.Such as: it, can when user needs the expired time time of the data of the entitled key of set key To be realized by calling setExpires (key, the time) method of mapping object (" data operation layer "), the Map Key of generation Value is, for example: { val:value, expires:time }, then by the key name key of the data and the mapping key assignments of generation with key assignments Pair form save.
The expired time of data is arranged by setExpires method, can be divided into two steps: acquisition key first is corresponding Data;Then mapping key assignments is generated for the corresponding data of key, and is saved using key and mapping key assignments as a data object Into localStorage.In this way, when needing to obtain the corresponding value of a key, if this key be not provided with it is expired Time, then just directly returning to the corresponding storing data value of this key.If this key is provided with expired time, Actually back in be a mapping key assignments, later, according to this mapping key assignments in include the corresponding mistake of " expires " parameter Time phase time, and time is compared with local zone time to judge whether the data expired.If expired be returned to Null value, and the corresponding value of the key in localStorage is deleted, and prompt this data of user out of date.If do not had Phase is returned to the corresponding value of " val " parameter (that is: the corresponding value of key) in mapping key assignments included.
The realization process of technical solution of the present invention is specifically introduced below with reference to embodiment.
Fig. 1 is the schematic diagram of the main flow of the method according to an embodiment of the present invention that data manipulation is carried out in client. The method for carrying out data manipulation in client of the embodiment of the present invention is by being arranged between terminal applies and local storage space Data operation layer execute.Wherein, terminal applies are, for example, to be deployed in the various application programs of terminal, class of such as doing shopping application, (merely illustrative) such as web browser applications, searching class application, instant messaging tools, mailbox client, social platform softwares;This Ground memory space is, for example, to be located at local disk, CD, magneto-optic disk, semiconductor memory of client device etc., or be USB (Universal Serial Bus, universal serial bus) flash disk for being connect with client device, mobile hard disk etc.. As shown in Figure 1, the method for carrying out data manipulation in client of the embodiment of the present invention mainly includes the following steps, namely S101 to step Rapid S103.
Step S101: it obtains from the data operation request of terminal applies to operation data information, to operation data information Including the key name to operation data;
Step S102: the key name to operation data is packaged into mapping major key;
Step S103: data manipulation is executed according to mapping major key.
In the present invention, data manipulation can be summarized as two classes: data save and data search, correspond respectively to mapping object In two methods of setter and getter.According to the specific implementation process of data manipulation, data save operation may include number According to newly-increased, data modification;Data look-up operations may include data query, data deletion.Below according in data operation request Including the difference to operation data information, introduce the specific implementation procedure of data manipulation respectively.
Embodiment one: if further including the key assignments to operation data to operation data information, it may be assumed that operation data information be to The key name and key assignments of operation data, the then process that step S103 executes data manipulation according to mapping major key are specific as follows:
Search whether local storage space preserves mapping key assignments according to mapping major key;
If not saving, using key assignments as mapping key assignments, then using map major key and map key assignments as encapsulate after to Operation data;Otherwise, the corresponding mapping key assignments of mapping major key is obtained, and new Map Key is generated according to key assignments and mapping key assignments Value, then will map major key and new mapping key assignments as after encapsulating to operation data;
Local storage space will be saved in operation data after encapsulation.
Specifically, may include: with the step of key assignments generates new mapping key assignments is mapped according to key assignments
Whether judge to map in key assignments comprising expired time;
If so, being judged according to expired time whether out of date to operation data, and deleted when operation data is out of date Except to operation data, using key assignments as new mapping key assignments;When operation data is not out of date, obtain from mapping key assignments wait grasp Make the expired time of data, and generates new mapping key assignments according to key assignments and expired time;
Otherwise, using key assignments as new mapping key assignments.
If may be newly-increased data, it is also possible to right to key name and key assignments that operation data information is to operation data The data that local storage space saves are modified.When executing data manipulation, need according to the mapping major key generated by key name Search whether that there are the corresponding data of mapping major key from local storage space.It if it does not exist, then is that data are newly-increased, and if it exists, It is then data modification.Wherein, mapping major key can be by key name and the generation of data class indication.In this way, can be realized to difference The data of business carry out classification isolation.
It is newly-increased for data, then can directly will to the key assignments of operation data as mapping key assignments, then will mapping major key with The mapping key assignments is saved in local storage space in the form of key-value pair.
For data modification, firstly, obtain the corresponding mapping key assignments of mapping major key, and judge to map in key assignments whether include Expired time.If comprising, judged according to expired time it is whether out of date to operation data, and when operation data is out of date It deletes to operation data, at this point, executing the newly-increased process of data: using key assignments as new mapping key assignments, then will map major key With new mapping key assignments as after encapsulating to operation data.When operation data is not out of date, from mapping key assignments in obtain to The expired time of operation data, and new mapping key assignments is generated according to key assignments and expired time, then by mapping major key and newly Map key assignments as encapsulate after to operation data;Otherwise, when mapping in key assignments not comprising expired time, using key assignments as new Mapping key assignments, then will map major key and new mapping key assignments as after encapsulating to operation data.Finally, by after encapsulation It is saved in local storage space in the form of key-value pair to the mapping major key in operation data with mapping key assignments.Wherein, it is protecting Before data after depositing encapsulation, need to be deleted data previously stored in local storage space according to mapping major key, that is: really Determining local storage space, there is no the corresponding data of mapping major key.
Embodiment two: if further including the key assignments and expired time to operation data to operation data information, it may be assumed that operand It is believed that breath is key name, key assignments and expired time to operation data, then step S103 executes data manipulation according to mapping major key Process is specific as follows:
According to key assignments and expired time generate mapping key assignments, then will map major key and map key assignments as after encapsulating to Operation data;
Local storage space will be saved in operation data after encapsulation.
If being key name, key assignments and expired time to operation data to operation data information, may be newly-increased data and Expired time is set, it is also possible to which key assignments and expired time to the data of local storage space preservation carry out whole modifications.This When, either data are newly-increased or data modification can be directly according to key without searching corresponding data from local storage space Name generates mapping major key, and generates mapping key assignments according to key assignments and expired time, then will mapping major key and mapping key assignments conduct Key-value pair data is saved in local storage space.Wherein, before saving key-value pair data, it is thus necessary to determine that local storage space is not There are the corresponding data of mapping major key, that is: if data modification, needing will be before local storage space according to mapping major key The data of preservation are deleted.
Embodiment three: if further including the expired time to operation data to operation data information, it may be assumed that operation data information For the key name and expired time to operation data, then step S103 executes the process of data manipulation specifically such as according to mapping major key Under:
The mapping key assignments that local storage space saves is obtained according to mapping major key;
New mapping key assignments is generated according to expired time and mapping key assignments, then major key will be mapped and new mapping key assignments is made For encapsulation after to operation data;
Local storage space will be saved in operation data after encapsulation.
Specifically, may include: with the step of key assignments generates new mapping key assignments is mapped according to expired time
Whether judge to map in key assignments comprising former expired time;
If so, judged according to former expired time it is whether out of date to operation data, and when operation data is out of date It deletes to operation data, when operation data is not out of date, the key assignments to operation data is obtained from mapping key assignments, and according to key Value and expired time generate new mapping key assignments;
Otherwise, the key assignments to operation data is obtained from mapping key assignments, and new reflect is generated according to key assignments and expired time Penetrate key assignments.
If may be to be arranged for data are newly-increased to key name and expired time that operation data information is to operation data Time phase, it is also possible to modify to the expired time for the data that local storage space saves.At this point, can be according to mapping major key Search corresponding data in local storage space, and obtain mapping key assignments, then according to whether having expired in mapping key assignments when Between determine newly-increased expired time or modification expired time.It is expired by included in mapping key assignments here for differentiation Time is known as " former expired time ".
As shown in Fig. 2, being the operating process schematic diagram of the setting expired time of the embodiment of the present invention.When mapping key assignments in not It is then newly-increased expired time when comprising former expired time.At this point, getting key assignments value from mapping key assignments, and according to key assignments Value and expired time time generates new mapping key assignments { val:value, expires:time }, then reflecting the data Penetrate major key and new mapping key assignments be saved in the form of key-value pair as encapsulated object local storage space (such as: LocalStorage in).
It is then modification expired time when mapping in key assignments comprising former expired time.At this point, first according to former expired time Judge it is whether out of date to operation data, and when operation data is out of date delete to operation data;When to operation data not When expired, the key assignments value to operation data is obtained from mapping key assignments, and raw according to key assignments value and expired time time The mapping key assignments { val:value, expires:time } of Cheng Xin, after then mapping major key and new mapping key assignments as encapsulation Saved in the form of key-value pair to operation data.
Wherein, before saving key-value pair data, it is thus necessary to determine that there is no the mapping major key is corresponding for local storage space Data, that is: if data modification, need to be deleted the previously stored data of local storage space according to mapping major key.
Example IV: if only including the key name to operation data to operation data information, step S103 is led according to mapping The process that key executes data manipulation is specific as follows:
According to, to operation data, searching the corresponding data of mapping major key from local storage space after encapsulation.
If data manipulation at this time is that data query or data obtain to the key name that operation data information is to operation data It takes.According to the method for data manipulation, data operation layer after receiving operation requests, will be generated according to key name mapping major key with It realizes data encapsulation, corresponding data content is then searched from local storage space according to mapping major key.Also, it is deposited from local After storing up the corresponding data of spatial lookup mapping major key, can also include:
Judge whether the data are expired;
If the data are not out of date or not set expired time, the data are returned;
Otherwise, the data are deleted, and return to null value.
Wherein, if not finding corresponding data according to mapping major key, null value is returned to, and prompt user.
In addition, after can finding data, continuing to execute delete operation when user needs to delete data.
According to the technique and scheme of the present invention, if expired time, mapping at this time can not be arranged by only needing to solve the problems, such as Major key can be the key name key to operation data, no longer need to be generated according to key name key and data classification mark.If also needing Solve the problems, such as that business datum can not be isolated, then mapping major key at this time is generated by key name key and data classification mark.
Fig. 3 is the data manipulation flow diagram of the embodiment of the present invention.Such as Fig. 3, it illustrates data manipulations of the invention Principle.When user increases storing data { key:value } newly, transmitting { key:value } key-value pair to mapping object (" data behaviour Make layer ") in, mapping object generates { prefix+key:value } key-value pair, then according to mapping major key prefix+key from originally Search whether the data have expired time setting in ground storage localStorage.If not provided, directly saving { prefix+ Key:value } key-value pair is into localStorage;If there is and it is not out of date, then generate prefix+key:{ val:value, Expires:time } } (time is the expired time of key, such as " 1515943718780 " to object, indicates the Chinese Industrial Standards (CIS) time 14 2018 23:28:38GMT+0800 of Sun Jan shows the key if the active client time is more than this time Corresponding data are expired) and save to being locally stored in localStorage.If data are out of date, local deposit is deleted The former data in localStorage are stored up, and { prefix+key:value } key-value pair that mapping object generates is saved in local It stores in localStorage.
When user obtains data, data key name key value is transmitted into mapping object, and mapping object generates mapping major key: Prefix+key, and corresponding data are inquired and obtained in local storage space localStorage as index, if data Expired for empty or data, then data are unavailable, return to null value and prompt user;If data are not out of date or not set expired Time, then returned data.
Fig. 4 is the schematic diagram of the main modular of the device according to an embodiment of the present invention that data manipulation is carried out in client. As shown in figure 4, the device 400 for carrying out data manipulation in client of the embodiment of the present invention is located at terminal applies and sky is locally stored Between between data operation layer, and mainly include data obtaining module 401, key name package module 402 and data operation modules 403。
Data obtaining module 401 is used to obtain from the data operation request of terminal applies to operation data information, wait grasp Date information includes the key name to operation data;
Key name package module 402 is used to the key name to operation data being packaged into mapping major key;
Data operation modules 403 are used to execute data manipulation according to mapping major key.
If data operation modules 403 can be also used for the key assignments that operation data information further includes to operation data:
Search whether local storage space preserves mapping key assignments according to mapping major key;
If not saving, using key assignments as mapping key assignments, then using map major key and map key assignments as encapsulate after to Operation data;Otherwise, the corresponding mapping key assignments of mapping major key is obtained, and new Map Key is generated according to key assignments and mapping key assignments Value, then will map major key and new mapping key assignments as after encapsulating to operation data;
Local storage space will be saved in operation data after encapsulation.
Specifically, data operation modules 403 can be also used for:
Whether judge to map in key assignments comprising expired time;
If so, being judged according to expired time whether out of date to operation data, and deleted when operation data is out of date Except to operation data, using key assignments as new mapping key assignments;When operation data is not out of date, obtain from mapping key assignments wait grasp Make the expired time of data, and generates new mapping key assignments according to key assignments and expired time;
Otherwise, using key assignments as new mapping key assignments.
If data operation modules 403 are also to key assignments and expired time that operation data information further includes to operation data It can be used for:
According to key assignments and expired time generate mapping key assignments, then will map major key and map key assignments as after encapsulating to Operation data;
Local storage space will be saved in operation data after encapsulation.
If to the expired time that operation data information further includes to operation data, data operation modules 403 can also be used In:
The mapping key assignments that local storage space saves is obtained according to mapping major key;
New mapping key assignments is generated according to expired time and mapping key assignments, then major key will be mapped and new mapping key assignments is made For encapsulation after to operation data;
Local storage space will be saved in operation data after encapsulation.
Specifically, data operation modules 403 can be also used for:
Whether judge to map in key assignments comprising former expired time;
If so, judged according to former expired time it is whether out of date to operation data, and when operation data is out of date It deletes to operation data, when operation data is not out of date, the key assignments to operation data is obtained from mapping key assignments, and according to key Value and expired time generate new mapping key assignments;
Otherwise, the key assignments to operation data is obtained from mapping key assignments, and new reflect is generated according to key assignments and expired time Penetrate key assignments.
The device 400 for carrying out data manipulation in client of the embodiment of the present invention can also include data determining module (figure In be not shown), be used for: after encapsulating be saved in local storage space to operation data before, determine local storage space There is no the corresponding data of mapping major key.
If data operation modules 403 can be also used for the key name that operation data information is to operation data:
According to, to operation data, searching the corresponding data of mapping major key from local storage space after encapsulation.
The device 400 for carrying out data manipulation in client of the embodiment of the present invention can also include data check module (figure In be not shown), be used for: after searching the corresponding data of mapping major key from local storage space, judge the data whether mistake Phase;
If data are not out of date or not set expired time, returned data;
Otherwise, data are deleted, and return to null value.
Technical solution according to an embodiment of the present invention, mapping major key are generated by key name and data class indication.
The device 400 for carrying out data manipulation in client of the embodiment of the present invention is realized based on mapping object.
Technical solution according to an embodiment of the present invention, by increasing between the terminal applies and local storage space of client Add data operation layer, and the key name to operation data that will be obtained from the data operation request of terminal applies by data operation layer It is packaged to obtain mapping major key, data manipulation is then executed according to mapping major key, realizes and client local data is carried out Operation, user (can use cookie, sessionStorage, localStorage without the actual storage mode of focused data Deng), so as to flexibly, easily storing data, so that different business data can not be isolated, data mistake can not be arranged by solving The problems such as time phase, meanwhile, when using storage modes such as sessionStorage, localStorage, it is also equipped with large capacity Be locally stored, not will increase the advantages that network load, store data long term and written in code facilitate.
Key point of the invention is that the encapsulation of " data operation layer ", since the present invention is realized by mapping object The encapsulation of data operation layer, so theoretically can constantly extend various data inside this " data operation layer " Operating function (such as data log record, data manipulation rollback etc.), and can be compatible with different client storages and not only Being limited to localStorage, this is locally stored.
Fig. 5 show can using the embodiment of the present invention client carry out data manipulation method or client into The exemplary system architecture 500 of the device of row data manipulation.
As shown in figure 5, system architecture 500 may include terminal device 501,502,503, network 504 and server 505. Network 504 between terminal device 501,502,503 and server 505 to provide the medium of communication link.Network 504 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 501,502,503 and be interacted by network 504 with server 505, to receive or send out Send message etc..Various telecommunication customer end applications, such as the application of shopping class, net can be installed on terminal device 501,502,503 (merely illustrative) such as the application of page browsing device, searching class application, instant messaging tools, mailbox client, social platform softwares.
Terminal device 501,502,503 can be the various electronic equipments with display screen and supported web page browsing, packet Include but be not limited to smart phone, tablet computer, pocket computer on knee and desktop computer etc..
Server 505 can be to provide the server of various services, such as utilize terminal device 501,502,503 to user The shopping class website browsed provides the back-stage management server (merely illustrative) supported.Back-stage management server can be to reception To the data such as information query request analyze etc. processing, and by processing result (such as target push information, product letter Breath -- merely illustrative) feed back to terminal device.
It should be noted that carrying out the method for data manipulation generally by servicing in client provided by the embodiment of the present invention Device 505 executes, and correspondingly, is generally positioned in server 505 in the device that client carries out data manipulation.
It should be understood that the number of terminal device, network and server in Fig. 5 is only schematical.According to realization need It wants, can have any number of terminal device, network and server.
Below with reference to Fig. 6, it illustrates the calculating of the terminal device or server that are suitable for being used to realize the embodiment of the present invention The structural schematic diagram of machine system 600.Terminal device or server shown in Fig. 6 are only an example, should not be to of the invention real The function and use scope for applying example bring any restrictions.
As shown in fig. 6, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and Execute various movements appropriate and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data. CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always Line 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted into storage section 608 as needed.
Particularly, disclosed embodiment, the process described above with reference to flow chart may be implemented as counting according to the present invention Calculation machine software program.For example, embodiment disclosed by the invention includes a kind of computer program product comprising be carried on computer Computer program on readable medium, the computer program include the program code for method shown in execution flow chart.? In such embodiment, which can be downloaded and installed from network by communications portion 609, and/or from can Medium 611 is dismantled to be mounted.When the computer program is executed by central processing unit (CPU) 601, system of the invention is executed The above-mentioned function of middle restriction.
It should be noted that computer-readable medium shown in the present invention can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the present invention, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In invention, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in the embodiment of the present invention involved unit or module can be realized by way of software, can also be with It is realized by way of hardware.Described unit or module also can be set in the processor, for example, can be described as: A kind of processor includes data obtaining module, key name package module and data operation modules.Wherein, the name of these units or module Claim not constituting the restriction to the unit or module itself under certain conditions, for example, data obtaining module can also be described For " for obtaining the module to operation data information from the data operation request of terminal applies ".
As on the other hand, the present invention also provides a kind of computer-readable medium, which be can be Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the equipment, makes Obtaining the equipment includes: to have data operation layer between terminal applies and local storage space, comprising: from the data of terminal applies It is obtained in operation requests to operation data information, described to operation data information includes key name to operation data;Will it is described to The key name of operation data is packaged into mapping major key;Data manipulation is executed according to the mapping major key.
Technical solution according to an embodiment of the present invention, by increasing between the terminal applies and local storage space of client Add data operation layer, and by data operation layer by the key name to operation data obtained from terminal applies data operation request into Row encapsulation obtains mapping major key, then executes data manipulation according to mapping major key, realizes and grasp to client local data Make, user (can use cookie, sessionStorage, localStorage without the actual storage mode of focused data Deng), so as to flexibly, easily storing data, so that different business data can not be isolated, data mistake can not be arranged by solving The problems such as time phase, meanwhile, when using storage modes such as sessionStorage, localStorage, it is also equipped with large capacity Be locally stored, not will increase the advantages that network load, store data long term and written in code facilitate.
Above-mentioned specific embodiment, does not constitute a limitation on the scope of protection of the present invention.Those skilled in the art should be bright It is white, design requirement and other factors are depended on, various modifications, combination, sub-portfolio and substitution can occur.It is any Made modifications, equivalent substitutions and improvements etc. within the spirit and principles in the present invention, should be included in the scope of the present invention Within.

Claims (23)

1. a kind of method for carrying out data manipulation in client, which is characterized in that between terminal applies and local storage space With data operation layer, which comprises
It is obtained from the data operation request of terminal applies to operation data information, described to operation data information includes wait operate The key name of data;
The key name to operation data is packaged into mapping major key;
Data manipulation is executed according to the mapping major key.
2. the method according to claim 1, wherein if described to operation data information further includes described wait operate The key assignments of data, then according to the mapping major key execute data manipulation the step of include:
Search whether local storage space preserves mapping key assignments according to the mapping major key;
If not saving, using the key assignments as mapping key assignments, then using the mapping major key and the mapping key assignments as envelope After dress to operation data;Otherwise, the corresponding mapping key assignments of the mapping major key is obtained, and according to the key assignments and the mapping Key assignments generates new mapping key assignments, then using the mapping major key and the new mapping key assignments as after encapsulating to operand According to;
Local storage space will be saved in operation data after the encapsulation.
3. according to the method described in claim 2, it is characterized in that, generating new reflect according to the key assignments and the mapping key assignments The step of penetrating key assignments include:
Whether judge in the mapping key assignments comprising expired time;
If so, described whether out of date to operation data according to expired time judgement, and when it is described to operation data To operation data described in being deleted when expired, using the key assignments as new mapping key assignments;When described when operation data is not out of date, The expired time to operation data is obtained from the mapping key assignments, and is generated according to the key assignments and the expired time New mapping key assignments;
Otherwise, using the key assignments as new mapping key assignments.
4. the method according to claim 1, wherein if described to operation data information further includes described wait operate The key assignments and expired time of data, then according to the mapping major key execute data manipulation the step of include:
Mapping key assignments is generated according to the key assignments and the expired time, then makees the mapping major key and the mapping key assignments For encapsulation after to operation data;
Local storage space will be saved in operation data after the encapsulation.
5. the method according to claim 1, wherein if described to operation data information further includes described wait operate The expired time of data, then according to the mapping major key execute data manipulation the step of include:
The mapping key assignments that local storage space saves is obtained according to the mapping major key;
New mapping key assignments is generated according to the expired time and the mapping key assignments, then by the mapping major key and described new Mapping key assignments as encapsulate after to operation data;
Local storage space will be saved in operation data after the encapsulation.
6. according to the method described in claim 5, it is characterized in that, being generated according to the expired time and the mapping key assignments new Mapping key assignments the step of include:
Whether judge in the mapping key assignments comprising former expired time;
If so, it is described whether out of date to operation data according to the former expired time judgement, and when described to operation data To operation data described in being deleted when out of date, when described when operation data is not out of date, from the mapping key assignments described in acquisition To the key assignments of operation data, and new mapping key assignments is generated according to the key assignments and the expired time;
Otherwise, obtain the key assignments to operation data from the mapping key assignments, and according to the key assignments and it is described expired when Between generate new mapping key assignments.
7. according to the method any in claim 2-6, which is characterized in that by being saved to operation data after the encapsulation Before the step of to local storage space, further includes:
Determining local storage space, there is no the corresponding data of the mapping major key.
8. the method according to claim 1, wherein if described to operation data information only includes described wait operate The key name of data, then according to the mapping major key execute data manipulation the step of include:
According to the mapping major key, the corresponding data of the mapping major key are searched from local storage space.
9. according to the method described in claim 8, being corresponded to it is characterized in that, searching the mapping major key from local storage space Data the step of after, further includes:
Judge whether the data are expired;
If the data are not out of date or not set expired time, the data are returned;
Otherwise, the data are deleted, and return to null value.
10. any method in -6 or 8-9 according to claim 1, which is characterized in that the mapping major key is by the key name It is generated with data class indication.
11. a kind of device for carrying out data manipulation in client, which is characterized in that described device is located at terminal applies and deposits with local The data operation layer between space is stored up, described device includes:
Data obtaining module, it is described wait operate for being obtained from the data operation request of terminal applies to operation data information Data information includes the key name to operation data;
Key name package module, for the key name to operation data to be packaged into mapping major key;
Data operation modules, for executing data manipulation according to the mapping major key.
12. device according to claim 11, which is characterized in that if described to operation data information further include described wait grasp Make the key assignments of data, then the data operation modules are also used to:
Search whether local storage space preserves mapping key assignments according to the mapping major key;
If not saving, using the key assignments as mapping key assignments, then using the mapping major key and the mapping key assignments as envelope After dress to operation data;Otherwise, the corresponding mapping key assignments of the mapping major key is obtained, and according to the key assignments and the mapping Key assignments generates new mapping key assignments, then using the mapping major key and the new mapping key assignments as after encapsulating to operand According to;
Local storage space will be saved in operation data after the encapsulation.
13. device according to claim 12, which is characterized in that the data operation modules are also used to:
Whether judge in the mapping key assignments comprising expired time;
If so, described whether out of date to operation data according to expired time judgement, and when it is described to operation data To operation data described in being deleted when expired, using the key assignments as new mapping key assignments;When described when operation data is not out of date, The expired time to operation data is obtained from the mapping key assignments, and is generated according to the key assignments and the expired time New mapping key assignments;
Otherwise, using the key assignments as new mapping key assignments.
14. device according to claim 11, which is characterized in that if described to operation data information further include described wait grasp Make the key assignments and expired time of data, then the data operation modules are also used to:
Mapping key assignments is generated according to the key assignments and the expired time, then makees the mapping major key and the mapping key assignments For encapsulation after to operation data;
Local storage space will be saved in operation data after the encapsulation.
15. device according to claim 11, which is characterized in that if described to operation data information further include described wait grasp Make the expired time of data, then the data operation modules are also used to:
The mapping key assignments that local storage space saves is obtained according to the mapping major key;
New mapping key assignments is generated according to the expired time and the mapping key assignments, then by the mapping major key and described new Mapping key assignments as encapsulate after to operation data;
Local storage space will be saved in operation data after the encapsulation.
16. device according to claim 15, which is characterized in that the data operation modules are also used to:
Whether judge in the mapping key assignments comprising former expired time;
If so, it is described whether out of date to operation data according to the former expired time judgement, and when described to operation data To operation data described in being deleted when out of date, when described when operation data is not out of date, from the mapping key assignments described in acquisition To the key assignments of operation data, and new mapping key assignments is generated according to the key assignments and the expired time;
Otherwise, obtain the key assignments to operation data from the mapping key assignments, and according to the key assignments and it is described expired when Between generate new mapping key assignments.
17. any device in 2-16 according to claim 1, which is characterized in that further include data determining module, be used for:
By after the encapsulation be saved in local storage space to operation data before, determine local storage space there is no institute State the corresponding data of mapping major key.
18. device according to claim 11, which is characterized in that if described to operation data information only include described wait grasp Make the key name of data, then the data operation modules are also used to:
According to the mapping major key, the corresponding data of the mapping major key are searched from local storage space.
19. device according to claim 18, which is characterized in that further include data check module, be used for: being deposited from local After storing up the corresponding data of mapping major key described in spatial lookup, judge whether the data are expired;
If the data are not out of date or not set expired time, the data are returned;
Otherwise, the data are deleted, and return to null value.
20. any device in 1-16 or 18-19 according to claim 1, which is characterized in that the mapping major key is by described Key name and data class indication generate.
21. device according to claim 11, which is characterized in that described device is realized based on mapping object.
22. a kind of electronic equipment for carrying out data manipulation in client characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-10.
23. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor The method as described in any in claim 1-10 is realized when row.
CN201810151840.6A 2018-02-14 2018-02-14 Method and device for performing data operation on client Active CN110162412B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810151840.6A CN110162412B (en) 2018-02-14 2018-02-14 Method and device for performing data operation on client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810151840.6A CN110162412B (en) 2018-02-14 2018-02-14 Method and device for performing data operation on client

Publications (2)

Publication Number Publication Date
CN110162412A true CN110162412A (en) 2019-08-23
CN110162412B CN110162412B (en) 2024-05-17

Family

ID=67635519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810151840.6A Active CN110162412B (en) 2018-02-14 2018-02-14 Method and device for performing data operation on client

Country Status (1)

Country Link
CN (1) CN110162412B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782549A (en) * 2020-07-31 2020-10-16 北京字节跳动网络技术有限公司 Test method and device and electronic equipment
CN112214351A (en) * 2020-10-12 2021-01-12 珠海格力电器股份有限公司 Backup data recovery method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618698A (en) * 2013-11-08 2014-03-05 北京奇虎科技有限公司 Method and device for processing cookie information
CN105786879A (en) * 2014-12-22 2016-07-20 广州市动景计算机科技有限公司 Page Cookie isolation method and apparatus
WO2017123859A1 (en) * 2016-01-15 2017-07-20 Instartlogic, Inc. Web cookie virtualization
CN107329910A (en) * 2017-06-27 2017-11-07 中南大学 A kind of web front end data based on localStorage are locally stored and access method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618698A (en) * 2013-11-08 2014-03-05 北京奇虎科技有限公司 Method and device for processing cookie information
CN105786879A (en) * 2014-12-22 2016-07-20 广州市动景计算机科技有限公司 Page Cookie isolation method and apparatus
WO2017123859A1 (en) * 2016-01-15 2017-07-20 Instartlogic, Inc. Web cookie virtualization
CN107329910A (en) * 2017-06-27 2017-11-07 中南大学 A kind of web front end data based on localStorage are locally stored and access method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782549A (en) * 2020-07-31 2020-10-16 北京字节跳动网络技术有限公司 Test method and device and electronic equipment
CN112214351A (en) * 2020-10-12 2021-01-12 珠海格力电器股份有限公司 Backup data recovery method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110162412B (en) 2024-05-17

Similar Documents

Publication Publication Date Title
CN106980669B (en) A kind of storage of data, acquisition methods and device
CN109274731A (en) Deployment, call method and the device of web services based on multi-tenant technology
CN109683998A (en) Internationalize implementation method, device and system
CN102455913B (en) The customization of indicating template
CN109409119A (en) Data manipulation method and device
JP2020530610A (en) Editing the database while previewing a virtual web page
CN110083660A (en) A kind of method, apparatus of synchrodata, medium and electronic equipment
CN109413127A (en) A kind of method of data synchronization and device
CN106559438A (en) A kind of program method for uploading and device based on objective network platform
CN110019080B (en) Data access method and device
CN109981322A (en) The method and apparatus of cloud resource management based on label
CN112930529B (en) Generating software artifacts from conceptual data models
CN109492053A (en) Method and apparatus for accessing data
CN109241033A (en) The method and apparatus for creating real-time data warehouse
CN110471848A (en) A kind of method and apparatus of dynamic returned packet
CN110109983B (en) Method and device for operating Redis database
CN110019539A (en) A kind of method and apparatus that the data of data warehouse are synchronous
CN110162412A (en) In the method and apparatus that client carries out data manipulation
CN109960212A (en) Task sending method and device
CN110020271A (en) Method and system for cache management
CN109284452A (en) The online methods of exhibiting of electronic protocol, device, electronic equipment, storage medium
CN108845864A (en) A kind of JVM rubbish recovering method and device based on spring frame
CN108959294A (en) A kind of method and apparatus accessing search engine
CN110020373A (en) The method and apparatus that static page is stored, browsed
CN111736835A (en) Form processing method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant