CN110839065A - Information storage method, system, equipment and storage medium - Google Patents

Information storage method, system, equipment and storage medium Download PDF

Info

Publication number
CN110839065A
CN110839065A CN201911042123.0A CN201911042123A CN110839065A CN 110839065 A CN110839065 A CN 110839065A CN 201911042123 A CN201911042123 A CN 201911042123A CN 110839065 A CN110839065 A CN 110839065A
Authority
CN
China
Prior art keywords
storage
request
identifier
information
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201911042123.0A
Other languages
Chinese (zh)
Inventor
常江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yiside Logistics Technology Co Ltd
Original Assignee
Beijing Yiside Logistics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yiside Logistics Technology Co Ltd filed Critical Beijing Yiside Logistics Technology Co Ltd
Priority to CN201911042123.0A priority Critical patent/CN110839065A/en
Publication of CN110839065A publication Critical patent/CN110839065A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention provides an information storage method, a system, equipment and a storage medium, wherein the method comprises the steps of sending a creation request to a storage server, so that the storage server creates a storage file according to the creation request and determines the identifier of the storage file after determining that the creation request passes; receiving an identifier, sending a storage request to a storage server according to the identifier, so that the storage server determines a storage file according to the identifier, and storing information to be stored carried by the storage request to the storage file; therefore, a plurality of storage information can be stored only by one unique identifier, and the method is convenient and quick. Meanwhile, the storage file with the storage information can further provide information query.

Description

Information storage method, system, equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, a system, a device, and a storage medium for storing information.
Background
With the rapid development of internet technology, various terminal devices are available for serving people in life. In particular online shopping, online payment services. With the advent of more and more services, more and more information needs to be stored. Such as a plurality of payment service information used in online payment.
Disclosure of Invention
Embodiments of the present invention provide a method, a system, a device, and a storage medium for storing information, which can conveniently and quickly store a large amount of information.
The embodiment of the invention provides an information storage method, which is characterized by comprising the following steps: sending a creation request to a storage server, so that the storage server creates a storage file according to the creation request and determines an identifier of the storage file after determining that the creation request passes; and receiving the identifier, and sending a storage request to the storage server according to the identifier, so that the storage server determines the storage file according to the identifier, and stores the information to be stored carried by the storage request to the storage file.
The embodiment of the invention also provides an information storage method, which comprises the following steps: receiving a creation request, creating a storage file according to the creation request and determining the identifier of the storage file after the creation request is determined to pass; returning the identification and receiving a storage request; and determining the storage file according to the identifier carried by the storage request, and storing the information to be stored carried by the storage request to the storage file.
An embodiment of the present invention further provides an information storage system, including: a first device and a second device; the first device is used for sending a creation request to the second device; the second device is used for creating a storage file according to the creation request after the creation request is determined to pass, determining the identifier of the storage file, and sending the identifier to the first device; the first device is used for sending a storage request to the second device according to the identifier; and the second device is used for determining the storage file according to the identifier and storing the information to be stored carried by the storage request to the storage file.
An embodiment of the present invention further provides an apparatus, including: a memory, a processor, and a communication component; the memory for storing a computer program; the communication component is used for receiving a creation request; returning the identification and receiving a storage request; the processor to execute the computer program to: after the creation request is determined to pass, creating a storage file according to the creation request and determining the identifier of the storage file; and determining the storage file according to the identifier carried by the storage request, and storing the information to be stored carried by the storage request to the storage file.
Embodiments of the present invention also provide a computer-readable storage medium storing a computer program, which when executed by one or more processors causes the one or more processors to implement the steps in the above-mentioned information storage method.
The technical scheme has the following beneficial effects: sending a creation request to a storage server, so that the storage server creates a storage file and determines an identifier of the storage file according to the creation request after determining that the creation request passes; receiving an identifier, sending a storage request to a storage server according to the identifier, so that the storage server determines a storage file according to the identifier, and storing information to be stored carried by the storage request to the storage file; therefore, a plurality of storage information can be stored only by one unique identifier, and the method is convenient and quick. Meanwhile, the storage file with the storage information can further provide information query.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method for storing information according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for storing information according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an information storage system according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an information storage device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an information storage device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of an information storage method according to an exemplary embodiment of the present application. The method 100 provided by the embodiment of the present application may be executed by a terminal device, such as a computer. The method 100 includes:
101: and sending a creation request to a storage server, so that the storage server creates a storage file according to the creation request and determines the identifier of the storage file after determining that the creation request passes.
102: and receiving the identifier, and sending a storage request to the storage server according to the identifier, so that the storage server determines a storage file according to the identifier, and stores the information to be stored carried by the storage request to the storage file.
The following is set forth with respect to the above steps:
101: and sending a creation request to a storage server, so that the storage server creates a storage file according to the creation request and determines the identifier of the storage file after determining that the creation request passes.
Wherein the storage file is a carrier for storing information. For example, a table is stored.
The identification is information for uniquely indicating the stored file, such as an ID.
For example, the development user may call the creation interface from the creation interface recorded in the development document, and the creation interface may be called by a post method of the http protocol. The computer may send a create request to a storage server, which may also be referred to as a platform server, in a post manner in response to an operation of developing a user call interface. The storage server receives the creation request, which instructs the storage server to create a table storing information. The storage server creates a table needing to store information and returns the unique identification ID of the table to the computer for the development user to use.
In addition, the method 100 further comprises: sending a verification request to a storage server; after the verification request passes, receiving an identity verification identifier sent by a storage server and the valid time of the identity verification identifier; and in the effective time, sending a creation request to the storage server according to the identity authentication identifier, so that the storage server determines that the identity authentication identifier passes the effective time and determines that the creation request passes the effective time.
Where the identity is proof of validity, e.g. a digital token, indicating that the identity is valid. The valid time means that the authentication identifier is valid within a preset time, and is invalid when the authentication identifier expires, and the authentication identifier needs to be reapplied, for example, one day.
For example, as described above, the development user may invoke the authentication interface by invoking the authentication interface recorded in the development document. The development user can call the interface through a computer. The computer responds to the calling operation of the development user, calls an interface through a post mode of an http protocol, and sends an authentication request to the storage server, wherein the authentication request can carry a user name and an authentication password (also called a key) of the calling interface. After receiving the request, the storage server inquires that the identity of the interface calling person is legal and correct through the user name and the verification password, and returns an identity token calling other interfaces and the valid time of the token to the computer for the development user to use.
When a development user calls the creation interface through a computer, the identity token can be set in the creation request within the token valid time and is sent to the storage server together. After receiving the creation request, the storage server verifies the identity token, determines that the identity token is correct and within the valid time, and then determines that the creation request passes through and executes the step of creating the table.
Further, the method 100 may further include: and sending the registration information to a registration server so that the registration server can perform auditing according to the registration information, and returning information such as a user name, an authentication password and a development document of the calling interface after the auditing is passed.
The registration server may be a storage server or another physical service device.
The auditing mode can be manual auditing or server automatic auditing, and when the server is automatically audited, auditing can be carried out according to a preset auditing rule, whether the registration information is matched with the auditing rule or not is determined, and when the registration information is matched with the auditing rule, the auditing is determined to be passed.
The information returning mode can be that the server sends the information to the mailbox of the user calling the interface in a mail mode, and the information can also be directly returned to the terminal equipment, such as a computer.
For example, as described above, the development user performs basic information registration, and registers the registration information such as name, unit name, contact phone, contact address, etc. of the development user into an account through the APP of the computer web site or the mobile phone. For example, the computer responds to the registration operation of the development user, and sends a registration request to the registration server, wherein the registration request can carry registration information. After receiving the registration request, the registration server may send an audit instruction of the registration request to a manager of the registration server in an instant message manner. And after receiving the message, the manager checks the registration information, and when the registration information conforms to the checking rule and the information is determined to be correct, the manager passes the checking. The manager can send the result of the verification to the registration server, and after the registration server receives the result, the registration server can send information to the development user in the form of a mail according to the mail address in the registration information, the information is written to be approved, and the user name and the key of the calling interface and the development document of the calling interface are given. When the audit is not passed, the auditor can directly reject the registration request and record the reject reason, namely the reason that the audit is not passed. And returning the refusal result and the refusal reason to the registration server, and after receiving the refusal reason and the refusal result, the registration server can send the refusal reason and the refusal result to a computer in an instant message form for a user to check. In addition, the registration server can also send information to the development user in the form of an email according to the email address in the registration information, and the information can write the rejection result and the rejection reason for the user to view. After the development user checks the registration information, the registration information can be modified according to the refuge reason, and the registration information is submitted to the registration server again, and the auditing process is carried out again until the auditing is passed.
102: and receiving the identifier, and sending a storage request to the storage server according to the identifier, so that the storage server determines a storage file according to the identifier, and stores the information to be stored carried by the storage request to the storage file.
The information to be stored may refer to various information that is desired to be stored in the server, such as a two-dimensional code, a barcode, a Radio Frequency Identification (RFID), and the like. The two-dimensional Code is also called as a two-dimensional Bar Code, and a common two-dimensional Code is a qr (quick response) Code quick response two-dimensional Code, which is an ultra-popular encoding mode on mobile equipment in recent years, and can store more information and represent more data types than the traditional Bar Code.
A bar code (barcode) is a graphic identifier in which a plurality of black bars and spaces having different widths are arranged according to a certain coding rule to express a set of information. Common bar codes are a pattern of parallel lines of dark bars (simply bars) and white bars (simply spaces) of widely differing reflectivity.
For example, as described above, after the computer receives the ID of the table, the development user can store the two-dimensional code by using the ID. The development user can call the storage information interface recorded in the development document, and can call the storage information interface in a post mode of an http protocol. And the computer responds to the storage operation, calls a storage information interface in a post mode of an http protocol, and sends a storage request to the storage server, wherein the storage request can carry the ID of the table and the two-dimensional code to be stored. And the storage server determines a table stored in the storage server according to the ID, stores the two-dimensional code into the table, and returns a message of successful storage to the computer for the user to check. Therefore, the process of quickly and conveniently storing information through identification is realized.
In addition, the method 100 further comprises: and in the effective time, sending a storage request to the storage server according to the identity authentication identifier, so that the storage server determines that the identity authentication identifier passes the effective time, determines that the storage request passes the effective time, and stores the information to be stored.
For example, as described above, when a development user calls a storage interface through a computer, the identity token may be set in a storage request and sent to the storage server together with the storage request within the token valid time. And after receiving the storage request, the storage server firstly verifies the identity token, determines that the identity token is correct and within the valid time, then determines that the storage request passes through, and executes the step of storing the two-dimensional code in the table.
It should be noted that before the information to be stored is stored, the content of the information to be stored may also be checked, whether the information to be stored conforms to the storage rule and/or is legal is determined, and when the information to be stored conforms to the rule and/or is legal, the information to be stored is stored.
The information to be stored can be compared with the preset storage rule and/or the preset legal rule, and if the matching is successful, the information to be stored can be determined to be in accordance with the rule and/or legal.
In addition, the method 100 further comprises: sending a query request to a storage server according to the identifier so that the storage server determines a storage file according to the identifier and acquires storage information in the storage file; and receiving the storage information sent by the storage server.
For example, according to the foregoing, after the information is created and stored, the development user may call the query interface of the server at any time according to the service scenario of the development user, and only the identity credential and the unique table identifier ID are required to be transmitted to obtain all the stored code information, or may specify that only the required code information is returned to perform subsequent service logic processing. For example, the development user may call the query interface recorded in the development document, and may call the query interface in a post manner of the http protocol. The computer responds to the query operation, calls a query interface in a post mode of an http protocol, and sends a query request to the storage server, wherein the query request can carry the ID of the query form, or the ID of the query form and the two-dimension code identifier, or directly carry the two-dimension code identifier, namely the information identifier to be queried. And after receiving the query request, the storage server determines the table according to the ID of the table, acquires the two-dimensional code stored in the table, and returns the two-dimensional code to the computer for the development user to check. Or after receiving the query request, the storage server determines the table according to the ID of the table, acquires the corresponding two-dimensional code in the table according to the two-dimensional code identifier, and returns the corresponding two-dimensional code to the computer for the development user to check. Or after receiving the query request, the storage server directly acquires the corresponding two-dimensional code according to the two-dimensional code identifier and returns the corresponding two-dimensional code to the computer for the development user to check.
It should be noted that, in the embodiment of the present application, only one unique identification ID is needed, and a two-dimensional code, for example, a two-dimensional code of a commodity, various kinds of codes of an article or other products that need to be bound, or all stored related code information of number information, etc. can be queried.
In addition, the method 100 further comprises: sending query request to the storage service end according to the identity authentication identifier within the effective time, so that the storage service end determines the identity authentication identifier and determines that the query request passes after the effective time passes, and acquiring the storage information,
for example, according to the foregoing, when a development user calls a query interface through a computer, the identity token may be set in a query request and sent to the storage server together with the query request within the token valid time. After receiving the query request, the storage server firstly verifies the identity token, determines that the identity token is correct and within the valid time, then determines that the query request passes through, and executes the step of acquiring the two-dimensional code in the table.
In addition, the method 100 further comprises: and sending an updating request to the storage server according to the identifier so that the storage server determines a storage file according to the identifier and stores the storage information to be updated carried by the updating request to the storage file.
For example, according to the foregoing, after all the information is created and stored, the development user may call the updated information interface through the updated information interface recorded in the development document, and may call the updated information interface in a post manner of the http protocol. And the computer responds to the updating operation, calls an updating information interface in a post mode of an http protocol, and sends an updating request to the storage server, wherein the updating request can carry the ID of the query table and the two-dimension code to identify the two-dimension code to be updated. And after receiving the updating request, the storage server determines a table according to the ID of the table, stores the two-dimensional code to be updated into the table, and returns the information of successful updating to the computer for the development user to check.
In addition, the method 100 further comprises: and in the effective time, sending an updating request to the storage server according to the identity authentication identifier, so that the storage server determines that the identity authentication identifier passes the effective time, determines that the updating request passes the effective time, and stores the storage information to be updated.
For example, as described above, when the development user calls the update information interface through the computer, the identity token may be set in the update request and sent to the storage server together with the update request within the token valid time. After receiving the update request, the storage server firstly verifies the identity token, determines that the identity token is correct and within the valid time, then determines that the update request passes through, and executes the step of storing the storage information to be updated.
It should be noted that, the development user pays attention to and determines whether the identity token is about to fail before use, and if the identity token is failed, the identity token can be obtained again through the user name and the key, that is, through the authentication request.
When the invalid identity token is used for calling the interface, the server detects that the identity token is expired, and then the server returns the wrong information of the identity token to the computer for the user to reapply.
The embodiment of the application provides a data binding interface to store and bind various codes and number information, and receives information (codes or numbers and the like) submitted by the current application through the data interface; the identity of an application information submitter can be inquired through a service processor in the server, and uploaded information is combined; storing the information submitted by the current application through a data processor; and providing a data query information interface, transmitting any number or code information, and querying and acquiring all relevant codes or number information corresponding to the number or code information through business processing.
Fig. 2 is a schematic flowchart of an information storage method according to an exemplary embodiment of the present application. The method provided by the embodiment of the present application may be executed by a server, and the method 200 includes:
201: receiving a creation request, creating a storage file according to the creation request and determining the identification of the storage file after determining that the creation request passes.
202: the identification is returned and a storage request is received.
203: and determining a storage file according to the identifier carried by the storage request, and storing the information to be stored carried by the storage request to the storage file.
In addition, the method 200 further comprises: receiving a query request, determining a storage file according to an identifier carried by the query request and acquiring storage information in the storage file; and returning the acquired storage information.
In addition, the method 200 further comprises: receiving an authentication request, and sending an identity authentication identifier and the valid time of the identity authentication identifier after the authentication request passes; after receiving the creation request and determining that the identity authentication identifier carried by the creation request passes within the corresponding effective time, determining that the creation request passes, or after receiving the storage request and determining that the identity authentication identifier carried by the storage request passes within the corresponding effective time, determining that the storage request passes and storing the information to be stored, or after receiving the query request and determining that the identity authentication identifier carried by the query request passes within the corresponding effective time, determining that the query request passes and acquiring the stored information.
Since the foregoing detailed description of the method 100 is similar to the detailed implementation of the method 200, further description is omitted here.
Reference is made to embodiments of the method 100 for embodiments of the method 200 that are not illustrated.
Fig. 3 is a schematic structural diagram of an information storage system according to an exemplary embodiment of the present application. The system 300 provided by the embodiment of the present application includes: a first device 301 and a second device 302.
The first device 301 is configured to send a creation request to the second device 302.
The second device 302 is configured to, after determining that the creation request passes, create a storage file according to the creation request, determine an identifier of the storage file, and send the identifier to the first device 301.
The first device 301 is configured to send a storage request to the second device 302 according to the identifier.
And the second device 302 is configured to determine a storage file according to the identifier, and store the information to be stored carried by the storage request to the storage file.
Since the foregoing embodiments of the method 100 are similar to the system 300, further description is omitted here.
For embodiments of the system 300 not illustrated, reference is made to embodiments of the method 100.
Fig. 4 is a schematic structural diagram of an information storage device according to an exemplary embodiment of the present application. The apparatus 400 provided in the embodiment of the present application is applied to a terminal device, such as a computer, and the apparatus 400 includes the following modules: a transmitting module 401 and a receiving module 402; and is described in detail with respect to the following modules:
the sending module 401 is configured to send a creation request to the storage server, so that the storage server creates a storage file according to the creation request and determines an identifier of the storage file after determining that the creation request passes.
The receiving module 402 is configured to receive the identifier, send a storage request to the storage server according to the identifier, so that the storage server determines a storage file according to the identifier, and store information to be stored carried by the storage request to the storage file.
In addition, the apparatus 400 further comprises: the sending module is used for sending a query request to the storage server according to the identifier so that the storage server determines the storage file according to the identifier and obtains the storage information in the storage file; and receiving the storage information sent by the storage server.
In addition, the apparatus 400 further comprises: and sending an updating request to the storage server according to the identifier so that the storage server determines a storage file according to the identifier and stores the storage information to be updated carried by the updating request to the storage file.
In addition, the apparatus 400 further comprises: sending a verification request to a storage server; after the verification request passes, receiving an identity verification identifier sent by a storage server and the valid time of the identity verification identifier; sending a creation request to the storage server according to the identity authentication identifier within the valid time so that the storage server determines the identity authentication identifier and the valid time passes, determining that the creation request passes, or sending a storage request to the storage server according to the identity authentication identifier within the valid time so that the storage server determines the identity authentication identifier and the valid time passes, determining that the storage request passes, and storing the information to be stored, or sending an inquiry request to the storage server according to the identity authentication identifier within the valid time so that the storage server determines the identity authentication identifier and the valid time passes, determining that the inquiry request passes, and acquiring the storage information, or sending an update request to the storage server according to the identity authentication identifier within the valid time so that the storage server determines the identity authentication identifier and the valid time passes, and determining that the updating request passes, and storing the storage information to be updated.
For embodiments of the apparatus 400 not illustrated, reference is made to embodiments of the method 100.
Fig. 5 is a schematic structural diagram of an information storage device according to an exemplary embodiment of the present application. The apparatus 500 provided by the embodiment of the present application is applied to a server, and the apparatus 500 includes the following modules: a receiving module 501, a returning module 502 and a storing module 503; and is described in detail with respect to the following modules:
the receiving module 501 is configured to receive a creation request, create a storage file according to the creation request after the creation request is determined to pass, and determine an identifier of the storage file.
A returning module 502, configured to return the identifier and receive the storage request.
The storage module 503 is configured to determine the storage file according to the identifier carried in the storage request, and store the information to be stored carried in the storage request in the storage file.
In addition, the receiving module 501 is further configured to: receiving a query request, determining a storage file according to an identifier carried by a long query request, and acquiring storage information in the storage file; and returning the acquired storage information.
In addition, the receiving module 501 is further configured to: receiving an authentication request, and sending an identity authentication identifier and the valid time of the identity authentication identifier after the authentication request passes; the apparatus 500 further includes a determining module, configured to determine, after receiving the creation request and determining that the authentication identifier carried in the creation request passes within the corresponding valid time, that the creation request passes, or determine, after receiving the storage request and determining that the authentication identifier carried in the storage request passes within the corresponding valid time, that the storage request passes, and store the information to be stored, or determine, after receiving the query request and determining that the authentication identifier carried in the query request passes within the corresponding valid time, that the query request passes, and obtain the storage information.
An exemplary embodiment of the present application provides an apparatus, such as a server. The device may include a memory, a processor, and a communication component.
A memory for storing a computer program;
a communication component for receiving a create request; returning the identifier and receiving a storage request;
a processor for executing a computer program for: after the creation request is determined to pass, creating a storage file according to the creation request and determining the identifier of the storage file; and determining a storage file according to the identifier carried by the storage request, and storing the information to be stored carried by the storage request to the storage file.
An exemplary embodiment of the present application provides a computer-readable storage medium storing a computer program, which, when executed by one or more processors, causes the one or more processors to implement the steps in the method for storing information shown in fig. 2.
It should be understood that the specific order or hierarchy of steps in the processes disclosed is an example of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged without departing from the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not intended to be limited to the specific order or hierarchy presented.
In the foregoing detailed description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, invention lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby expressly incorporated into the detailed description, with each claim standing on its own as a separate preferred embodiment of the invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. To those skilled in the art; various modifications to these embodiments will be readily apparent, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term "comprising" as "comprising" is interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean a "non-exclusive or".
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method for storing information, comprising:
sending a creation request to a storage server, so that the storage server creates a storage file according to the creation request and determines an identifier of the storage file after determining that the creation request passes;
and receiving the identifier, and sending a storage request to the storage server according to the identifier, so that the storage server determines the storage file according to the identifier, and stores the information to be stored carried by the storage request to the storage file.
2. The method of claim 1, further comprising:
sending a query request to the storage server according to the identifier, so that the storage server determines the storage file according to the identifier and acquires storage information in the storage file;
and receiving the storage information sent by the storage server.
3. The method of claim 1, further comprising:
and sending an updating request to the storage server according to the identifier, so that the storage server determines the storage file according to the identifier and stores the storage information to be updated carried by the updating request to the storage file.
4. The method according to any one of claims 1-3, further comprising:
sending a verification request to the storage server;
after the verification request passes, receiving an identity verification identifier sent by the storage server and the valid time of the identity verification identifier;
in the effective time, the creation request is sent to the storage server according to the identity authentication identifier, so that the storage server determines that the creation request passes after the identity authentication identifier is determined and the effective time passes, or
In the valid time, the storage request is sent to the storage server according to the identity authentication identifier, so that after the storage server determines that the identity authentication identifier and the valid time pass, the storage server determines that the storage request passes, and stores the information to be stored, or
In the valid time, the query request is sent to the storage server according to the identity authentication identifier, so that the storage server determines that the identity authentication identifier and the valid time pass, then determines that the query request passes, and acquires the storage information, or
And sending the updating request to the storage server side according to the identity authentication identifier within the effective time, so that the storage server side determines that the updating request passes after determining that the identity authentication identifier and the effective time pass, and stores the storage information to be updated.
5. A method for storing information, comprising:
receiving a creation request, creating a storage file according to the creation request and determining the identifier of the storage file after the creation request is determined to pass;
returning the identification and receiving a storage request;
and determining the storage file according to the identifier carried by the storage request, and storing the information to be stored carried by the storage request to the storage file.
6. The method of claim 5, further comprising:
receiving a query request, determining the storage file according to the identifier carried by the query request and acquiring storage information in the storage file;
and returning the acquired storage information.
7. The method of claim 5, further comprising:
receiving an authentication request, and sending an identity authentication identifier and the valid time of the identity authentication identifier after the authentication request passes;
after receiving the creation request and determining that the identity authentication identifier carried by the creation request passes the corresponding valid time, determining that the creation request passes, or
After receiving the storage request and determining that the identity authentication identifier carried by the storage request passes the corresponding valid time, determining that the storage request passes the corresponding valid time, and storing the information to be stored, or
And after the query request is received and the identity authentication identifier carried by the query request passes in the corresponding effective time, determining that the query request passes and acquiring the storage information.
8. A system for storing information, comprising: a first device and a second device;
the first device is used for sending a creation request to the second device;
the second device is used for creating a storage file according to the creation request after the creation request is determined to pass, determining the identifier of the storage file, and sending the identifier to the first device;
the first device is used for sending a storage request to the second device according to the identifier;
and the second device is used for determining the storage file according to the identifier and storing the information to be stored carried by the storage request to the storage file.
9. An apparatus, comprising: a memory, a processor, and a communication component;
the memory for storing a computer program;
the communication component is used for receiving a creation request; returning the identification and receiving a storage request;
the processor to execute the computer program to:
after the creation request is determined to pass, creating a storage file according to the creation request and determining the identifier of the storage file;
and determining the storage file according to the identifier carried by the storage request, and storing the information to be stored carried by the storage request to the storage file.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by one or more processors, causes the one or more processors to perform the steps of the method of any one of claims 1-7.
CN201911042123.0A 2019-10-30 2019-10-30 Information storage method, system, equipment and storage medium Withdrawn CN110839065A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911042123.0A CN110839065A (en) 2019-10-30 2019-10-30 Information storage method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911042123.0A CN110839065A (en) 2019-10-30 2019-10-30 Information storage method, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110839065A true CN110839065A (en) 2020-02-25

Family

ID=69576034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911042123.0A Withdrawn CN110839065A (en) 2019-10-30 2019-10-30 Information storage method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110839065A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112416964A (en) * 2020-11-17 2021-02-26 深圳依时货拉拉科技有限公司 Data processing method, device and system, computer equipment and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112416964A (en) * 2020-11-17 2021-02-26 深圳依时货拉拉科技有限公司 Data processing method, device and system, computer equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
JP4864871B2 (en) Ordering method for mobile radio network users
CN105512881B (en) A kind of method and terminal for completing payment based on two dimensional code
KR102498672B1 (en) Information processing device, information processing system, information processing method, and program
US9571474B2 (en) Method for providing a service based on tag information, and corresponding tag and tag reading device
US10248946B2 (en) Methods, server, merchant device, computer programs and computer program products for setting up communication
CN201331775Y (en) Cellphone visitor management system based on barcode certificates
CN103593773A (en) Product anti-fake method and system and client terminal
US10477598B2 (en) Methods and apparatus for registering network identifiers and/or taking different actions based on the type of network identifier being registered or reported
JP2011141785A (en) Member registration system using portable terminal and authentication system
CN1478260A (en) Method for securing transaction on computer network
WO2002065404A2 (en) Identification system for providing access to facilities, buildings or customer loyalty schemes
US20230342770A1 (en) Product payment method and device using ai speaker
JP7202500B1 (en) Information processing device, information processing method, and program
CN110839065A (en) Information storage method, system, equipment and storage medium
CN108900525B (en) Processing method and device for verification code request
US11282044B2 (en) System for transmitting payment information using mobile terminal and method thereof
CN101931855A (en) Method and system for registering and querying changed telephone number
CN114971632A (en) Social platform binding system, method and device, electronic equipment and storage medium
CN112437427A (en) Card writing method, device, equipment and computer readable storage medium
CN115114052B (en) Method and device for intelligently providing database microservice
WO2014027287A1 (en) Issuance, obtaining and utilization of personalized digital end user credentials for use in electronic transactions performed with a mobile device
JP7271779B1 (en) Information processing device, information processing method, and program
KR101425919B1 (en) A method setting up a service information for financial dealings using a smartphone, there for a server
KR101380616B1 (en) Realtime automatic goods reserveration management method using smartphone
US20150199690A1 (en) Method for Securing a Transaction Performed by Bank Card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200225