CN112711608B - Data display method, device, computer readable storage medium and computer equipment - Google Patents

Data display method, device, computer readable storage medium and computer equipment Download PDF

Info

Publication number
CN112711608B
CN112711608B CN201911024442.9A CN201911024442A CN112711608B CN 112711608 B CN112711608 B CN 112711608B CN 201911024442 A CN201911024442 A CN 201911024442A CN 112711608 B CN112711608 B CN 112711608B
Authority
CN
China
Prior art keywords
data
sub
blacklist
identifier
searched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911024442.9A
Other languages
Chinese (zh)
Other versions
CN112711608A (en
Inventor
冯锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911024442.9A priority Critical patent/CN112711608B/en
Publication of CN112711608A publication Critical patent/CN112711608A/en
Application granted granted Critical
Publication of CN112711608B publication Critical patent/CN112711608B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2425Iterative querying; Query formulation based on the results of a preceding query
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to a data presentation method, a device, a computer readable storage medium and a computer apparatus, the method comprising: receiving a data viewing instruction sent by a user terminal, wherein the data viewing instruction carries a data identifier, and acquiring corresponding sub-data identifiers according to the data identifier; searching each sub-data identifier in the blacklist cache, and filtering the searched sub-data identifiers from each sub-data identifier to obtain each first sub-data identifier; a blacklist detection request is sent to a target database server, and the blacklist detection request carries all first sub-data identifiers, so that the target database server determines all second sub-data identifiers in the target database according to all the first sub-data identifiers; and acquiring each second sub-data identifier returned by the target database server, acquiring each sub-data corresponding to each second sub-data identifier, and returning each sub-data to the user terminal for display. The scheme provided by the application can improve the efficiency of data display.

Description

Data display method, device, computer readable storage medium and computer equipment
Technical Field
The present application relates to the field of internet technologies, and in particular, to a data display method, a data display device, a computer readable storage medium, and a computer device.
Background
With the development of internet technology, blacklists are one of the common network environment striking means. Currently, in a high-concurrency data display service scenario, multiple database servers are generally expanded due to limited bearing performance of a single database server. When the service server detects the blacklist of the data to be displayed, a detection request needs to be sent to the database server, the database server returns a detection result to the service server after detecting the blacklist according to the detection request, and the service server determines whether to display the data according to the detection result. However, in the case of high concurrency, the database server takes a certain time to process a large number of detection requests, so that the performance of blacklist detection is reduced, resulting in reduced efficiency of data presentation.
Disclosure of Invention
Based on this, it is necessary to provide a data presentation method, apparatus, computer-readable storage medium and computer device for solving the technical problem of the blacklist detection performance degradation.
A data presentation method comprising:
receiving a data viewing instruction sent by a user terminal, wherein the data viewing instruction carries a data identifier, and acquiring corresponding sub-data identifiers according to the data identifier;
searching each sub-data identifier in the blacklist cache, and filtering the searched sub-data identifiers from each sub-data identifier to obtain each first sub-data identifier which is not searched in the blacklist cache;
sending a blacklist detection request to a target database server, wherein the blacklist detection request carries all first sub-data identifiers so that the target database server searches all first sub-data identifiers in the target database, and filtering the searched first sub-data identifiers from all first sub-data identifiers to obtain all second sub-data identifiers which are not searched in the target database;
and acquiring each second sub-data identifier returned by the target database server, acquiring each sub-data corresponding to each second sub-data identifier, and returning each sub-data to the user terminal for display.
A data presentation device, the device comprising:
the sub-identifier acquisition module is used for receiving a data viewing instruction sent by the user terminal, wherein the data viewing instruction carries a data identifier, and each corresponding sub-data identifier is acquired according to the data identifier;
The first identifier obtaining module is used for searching each sub-data identifier in the blacklist cache, filtering the searched sub-data identifiers from each sub-data identifier, and obtaining each first sub-data identifier which is not searched in the blacklist cache;
the second identifier obtaining module is used for sending a blacklist detection request to the target database server, wherein the blacklist detection request carries all first sub-data identifiers so that the target database server searches all first sub-data identifiers in the target database, and filters the searched first sub-data identifiers from all first sub-data identifiers to obtain all second sub-data identifiers which are not searched in the target database;
the data display module is used for acquiring each second sub-data identifier returned by the target database server, acquiring each sub-data corresponding to each second sub-data identifier, and returning each sub-data to the user terminal for display.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the program:
receiving a data viewing instruction sent by a user terminal, wherein the data viewing instruction carries a data identifier, and acquiring corresponding sub-data identifiers according to the data identifier;
Searching each sub-data identifier in the blacklist cache, and filtering the searched sub-data identifiers from each sub-data identifier to obtain each first sub-data identifier which is not searched in the blacklist cache;
sending a blacklist detection request to a target database server, wherein the blacklist detection request carries all first sub-data identifiers so that the target database server searches all first sub-data identifiers in the target database, and filtering the searched first sub-data identifiers from all first sub-data identifiers to obtain all second sub-data identifiers which are not searched in the target database;
and acquiring each second sub-data identifier returned by the target database server, acquiring each sub-data corresponding to each second sub-data identifier, and returning each sub-data to the user terminal for display.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, causes the processor to perform the steps of:
receiving a data viewing instruction sent by a user terminal, wherein the data viewing instruction carries a data identifier, and acquiring corresponding sub-data identifiers according to the data identifier;
searching each sub-data identifier in the blacklist cache, and filtering the searched sub-data identifiers from each sub-data identifier to obtain each first sub-data identifier which is not searched in the blacklist cache;
Sending a blacklist detection request to a target database server, wherein the blacklist detection request carries all first sub-data identifiers so that the target database server searches all first sub-data identifiers in the target database, and filtering the searched first sub-data identifiers from all first sub-data identifiers to obtain all second sub-data identifiers which are not searched in the target database;
and acquiring each second sub-data identifier returned by the target database server, acquiring each sub-data corresponding to each second sub-data identifier, and returning each sub-data to the user terminal for display.
According to the data display method, the device, the computer readable storage medium and the computer equipment, through receiving the data checking instruction, each sub-data identifier is searched in the blacklist cache, the searched sub-data identifier is filtered from each sub-data identifier to obtain each first sub-data identifier, then each first sub-data identifier is searched in the target database server, each searched first sub-data identifier is filtered from each first sub-data identifier to obtain each second sub-data identifier, sub-data corresponding to the second sub-data identifier is obtained, each sub-data is returned to the user terminal for display, and the blacklist data is directly detected in the blacklist cache by using the blacklist cache to replace a plurality of databases, so that the blacklist detection performance is improved. Meanwhile, the target database server is used for further detecting the blacklist data, so that the accuracy and the instantaneity of the blacklist data are guaranteed, the blacklist detection performance is further improved, and the data display efficiency is further improved.
Drawings
FIG. 1 is an application environment diagram of a data presentation method in one embodiment;
FIG. 2 is a flow chart of a method of displaying data in one embodiment;
FIG. 3 is a diagram of an application environment for data presentation in a conventional technology in one embodiment;
FIG. 4 is a flow diagram of synchronizing blacklist data in one embodiment;
FIG. 5 is a schematic diagram of a bitmap database data structure in one embodiment;
FIG. 6 is a flowchart of a method for obtaining blacklist alert information according to an embodiment;
FIG. 7 is an application environment diagram of a data presentation method in one embodiment;
FIG. 8 is a timing diagram of a data presentation method in one embodiment;
FIG. 9 is a block diagram of a data presentation device in one embodiment;
FIG. 10 is a block diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
FIG. 1 is a diagram of an application environment for a data presentation method in one embodiment. Referring to fig. 1, the data display method is applied to a data display system. The data presentation system includes a user terminal 102, a business server 104, and a target database server 106. The user terminal 102 and the service server 104 are connected through a network, and the service server 104 and the target database server 106 are connected through a network. The terminal 102 may be a desktop terminal or a mobile terminal, and the mobile terminal may be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server may be implemented as a stand-alone server or as a server cluster composed of a plurality of servers.
Specifically, the service server 104 receives a data viewing instruction sent by the user terminal 102, wherein the data viewing instruction carries a data identifier, and obtains corresponding sub-data identifiers according to the data identifier; the service server 104 searches each sub-data identifier in the blacklist cache, and filters the searched sub-data identifier from each sub-data identifier to obtain each first sub-data identifier which is not searched in the blacklist cache; the service server 104 sends a blacklist detection request to the target database server 106, wherein the blacklist detection request carries all first sub-data identifiers, so that the target database server 106 searches all first sub-data identifiers in a target database, and filters the searched first sub-data identifiers from all first sub-data identifiers to obtain all second sub-data identifiers which are not searched in the target database; the service server 104 obtains each second sub-data identifier returned by the target database server 106, obtains each sub-data corresponding to each second sub-data identifier, and returns each sub-data to the user terminal 102 for display.
As shown in fig. 2, in one embodiment, a data presentation method is provided. The present embodiment is mainly exemplified by the application of the method to the service server 104 in fig. 1. Referring to fig. 2, the data display method specifically includes the following steps:
S202, receiving a data viewing instruction sent by a user terminal, wherein the data viewing instruction carries data identifiers, and acquiring corresponding sub-data identifiers according to the data identifiers.
Wherein the data identification is used for uniquely identifying the data to be viewed by the user, and can be a name, a number, a character string and the like. The data is stored in the service server in the form of individual sub-data. The sub-data identification is used for uniquely identifying the sub-data, and can be a name, a number, a character string and the like. For example, the user may look up a book and the data identifier may be the name of the book. The sub-data identification refers to the chapter name of the book.
Specifically, the service server displays the data identifier on the user terminal, the user can check the data corresponding to the data identifier through the user terminal, the service server receives the data check instruction sent by the user terminal, and the data check instruction is analyzed to obtain the data identifier. And acquiring corresponding sub-data identifiers according to the data identifiers. For example, a user clicks a book name on a data identifier through a user terminal, the user terminal receives a click command, a book viewing command is sent to a service according to the book name carried in the click command, a service server receives the data viewing command, analyzes the data viewing command to obtain the book name, and obtains each chapter name corresponding to the book name.
S204, searching each sub-data identifier in the blacklist cache, and filtering the searched sub-data identifiers from each sub-data identifier to obtain each first sub-data identifier which is not searched in the blacklist cache.
The blacklist cache refers to a cache database for storing blacklist data by a service server. I.e. the service server stores the blacklist data in a local cache. For example, chapter names belonging to a blacklist in a book may be stored. The first sub-data identifier refers to a sub-data identifier detected by a blacklist cache in the service server, i.e. a sub-data identifier not in the blacklist cache.
Specifically, the service server searches each sub-data identifier in the blacklist cache, and when the sub-data identifier is searched in the blacklist cache, filters the searched sub-data identifier from each sub-data identifier to obtain each first sub-data identifier which is not searched in the blacklist cache. For example, the book to be viewed by the user has 100 chapters in total, and the service server searches the blacklist cache for 2 chapter names in the 100 chapters. The 2 chapter names are filtered from the 100 chapter names to obtain 98 chapter names which are not found in the blacklist cache database.
S206, sending a blacklist detection request to the target database server, wherein the blacklist detection request carries all first sub-data identifiers, so that the target database server searches all first sub-data identifiers in the target database, and filters the searched first sub-data identifiers from all first sub-data identifiers to obtain all second sub-data identifiers which are not searched in the target database.
The target database server is used as a secondary cache of the blacklist data, and can update the blacklist data in real time, so that the real-time performance of the blacklist data is ensured. The target database is a high-performance database storing blacklist data, such as a bitmap database, a hash database, and the like. The second sub-data identifier refers to a sub-data identifier detected by a target database in the target database server.
Specifically, the service server sends a blacklist detection request to the target database server, wherein the blacklist detection request carries each first sub-data identifier. When the target database server receives the blacklist detection request, analyzing to obtain each first sub-data identifier, searching each first sub-data identifier in the target database, filtering the searched first sub-data identifier from each first sub-data identifier when the first sub-data identifier can be searched, obtaining each second sub-data identifier which is not searched in the target database, and returning each second sub-data identifier to the service server.
S208, each second sub-data identifier returned by the target database server is obtained, each sub-data corresponding to each second sub-data identifier is obtained, and each sub-data is returned to the user terminal for display.
Specifically, the service server acquires each second sub-data identifier returned by the target database server, acquires each sub-data corresponding to the second sub-data identifier, and returns each sub-data to the user terminal for display.
Currently, the conventional technology generally needs to detect a blacklist when data is displayed. However, in a highly concurrent business scenario, as shown in fig. 3, the manager synchronizes the blacklist data into the standby database 306B and the standby database 306C by writing the blacklist data into the main database 306A at the management end 308. When data display is needed, the user terminal 302 sends a large number of service requests to the service server 304, when the service server 304 receives the large number of service requests, a blacklist checking request is sent to the main database 306A, the standby database 306B and the standby database 306C, the large number of service requests are checked through the main database 306A and the standby database 306C, then the detection result is returned to the service server 304, and the service server 304 acquires service data which is not in the blacklist according to the checking result and returns to the user terminal for display. That is, in the conventional technology, a certain time is required for the database server to process a large number of detection requests, so that the performance of blacklist detection is reduced, and the efficiency of data display is reduced. Moreover, in a highly concurrent business scenario, the database must be extended to multiple, and synchronization of blacklist data needs to be achieved. When data synchronization is performed between databases, a certain data synchronization delay is inevitably generated, and the risk of data synchronization failure exists, so that the capacity of the blacklist service is further reduced.
The method comprises the steps of receiving a data checking instruction through a service server, searching each sub-data identifier in a blacklist cache, filtering the searched sub-data identifiers from each sub-data identifier to obtain each first sub-data identifier, searching each first sub-data identifier in a target database server, filtering the searched first sub-data identifier from each first sub-data identifier to obtain each second sub-data identifier, acquiring sub-data corresponding to the second sub-data identifier, and returning each sub-data to a user terminal for display. The blacklist cache is used for replacing a plurality of databases, so that the service server can directly detect blacklist data in the blacklist cache, and the blacklist detection performance is improved. Meanwhile, the target database server is used for further detecting the blacklist data, so that the accuracy and the instantaneity of the blacklist data are guaranteed, the blacklist detection performance is further improved, and the data display efficiency is further improved.
In one embodiment, as shown in fig. 4, before step S202, before receiving a data viewing instruction sent by a user terminal, the data viewing instruction carries a data identifier, and before obtaining each corresponding sub-data identifier according to the data identifier, the method further includes:
S402, a blacklist synchronization request is sent to a blacklist data server at regular time.
S404, the target sub-data identification returned by the blacklist data server according to the blacklist synchronization request is obtained, and the target sub-data identification is stored in the blacklist cache.
The blacklist data server refers to a server for storing blacklist data. The target sub-data identifier refers to a sub-data identifier corresponding to sub-data which cannot be displayed at the user terminal.
Specifically, the service server sends a blacklist synchronization request to the blacklist data server at regular time, the blacklist data server receives the blacklist synchronization request, searches all target sub-data identifiers to be synchronized according to the blacklist synchronization request, synchronizes all the target sub-data identifiers to the service server, and stores all the target sub-data identifiers to the blacklist cache when the service server receives all the target sub-data identifiers.
In one embodiment, the blacklist data server receives a blacklist identifier writing instruction sent by the management terminal, acquires a target sub-data identifier sent by the management terminal according to the blacklist identifier writing instruction, and stores the target sub-data identifier in the database.
In one embodiment, the target database server receives a blacklist identifier writing instruction sent by the management terminal, acquires a target sub-data identifier sent by the management terminal according to the blacklist identifier writing instruction, and stores the target sub-data identifier in the target database.
In one embodiment, the target database server may send a blacklist data synchronization instruction to the blacklist data server, and the blacklist data server synchronizes the stored target sub-data identifier to the target database server according to the synchronization instruction.
In the above embodiment, the target sub-data identifier is synchronized from the blacklist data server at regular time through the service server and stored in the local blacklist cache, and when the blacklist is detected, the local blacklist cache can be directly used for checking, so that the problem that the blacklist needs to be pulled from the database server for many times when the blacklist is detected in the conventional technology is avoided, and the blacklist detection efficiency is improved. Meanwhile, a target database server is used for carrying out secondary detection, so that the problem that the timing synchronization blacklist data are inconsistent is solved, and the instantaneity and the accuracy of the blacklist data are ensured.
In one embodiment, after step S204, that is, after searching the blacklist cache for each sub-data identifier, the method further includes the steps of:
and acquiring the first sub-data identifier searched in the blacklist cache, and acquiring corresponding blacklist prompt information according to the searched first sub-data identifier.
The blacklist prompt information is information for prompting the user that the data corresponding to the first sub-data identifier belongs to a blacklist.
Specifically, when the first sub-data identifier is found in the blacklist cache, the first sub-data identifier is obtained, and corresponding blacklist prompt information is obtained according to the found first sub-data identifier.
Step S208, namely, returning each piece of sub data to the user terminal for display, includes the steps of:
and returning the blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
Specifically, when each piece of sub data is returned to the user terminal, the blacklist prompt information corresponding to the searched first piece of sub data identification is returned to the user terminal for display. Namely, the blacklist detection result is returned to the user terminal for display, so that the user experience is improved.
In one embodiment, step S206, namely, sending a blacklist detection request to the target database server, where the blacklist detection request carries each first sub-data identifier, so that the target database server searches for each first sub-data identifier in the target database, includes the steps of:
and sending a blacklist detection request to the bitmap database server, wherein the blacklist detection request carries all the first sub-data identifiers, so that the bitmap database server converts all the first sub-data identifiers into numerical values, calculates the storage position of the numerical values in the bitmap database, acquires the target value of the storage position, and determines the searched first sub-data identifiers according to the target value.
The bitmap database server refers to a server for establishing a bitmap database based on bitmap technology. Bitmap (bitmap) technology refers to the use of each bit to store a state, which is suitable for large-scale data, but the data state is not much the same. Typically to determine the absence of a certain data store. The target value refers to a binary value corresponding to the blacklist data. For example, when a bitmap database is created, "1" indicates that blacklist data exists, and "0" indicates that blacklist data does not exist. The storage location refers to the location of the storage bit of the blacklist data in the bitmap database.
Specifically, the service server sends a blacklist detection request to the bitmap database server, the blacklist detection request carries each first sub-data identifier, the bitmap database server receives each first sub-data identifier, converts each first sub-data identifier into a numerical value, calculates a storage position of the numerical value in the bitmap database, acquires a target value of the storage position, and determines the searched first sub-data identifier according to the target value. For example, the bitmap data structure is 8 bits, and when the value obtained by converting the first sub-data identifier is 1234, the storage position obtained by calculation is bit 2 of 154 bytes. And acquiring the value of the No. 2 bit at 154, and when the value is 1, determining that the first sub-data identifier corresponding to the value 1234 is the blacklist data, and determining that the first sub-data identifier is the searched first sub-data identifier.
In one embodiment, as illustrated in FIG. 5, the data structure is stored in a bitmap database for blacklist data that is stored in 64-bit binary, i.e., each of the 64-bit binary may store corresponding blacklist data. Bitmap data is obtained from 64-bit binary stored in black list data, in the range of 0 to 64. Bitmap data is stored in a shared memory local to the bitmap database server.
In the above embodiment, the first sub-data identifier is determined according to the target value in the storage location in the bitmap database server, so that the efficiency and accuracy of detecting the blacklist data can be improved, and the performance of the blacklist service can be improved.
In one embodiment, sending a blacklist detection request to the target database server, where the blacklist detection request carries each first sub-data identifier, so that the target database server searches for each first sub-data identifier in the target database, and the method includes:
and sending a blacklist detection request to the hash database server, wherein the blacklist detection request carries all the first sub-data identifiers, so that the hash database server calculates hash values of all the first sub-data identifiers, searches the hash values of all the first sub-data identifiers in the hash database, and determines the searched first sub-data identifiers.
Wherein the hash database is a database storing hash values.
Specifically, the service server sends a blacklist detection request to the hash database server, the blacklist detection request carries each first sub-data identifier, the hash database server receives the blacklist detection request, analyzes the blacklist detection request to obtain each first sub-data identifier, calculates hash values of each first sub-data identifier by using a hash algorithm, searches hash values corresponding to each first sub-data identifier in the hash database, and when the hash values can be found, takes the corresponding first sub-data identifier as the found first sub-data identifier, namely the found first sub-data identifier is blacklist data.
In the above embodiment, by using the hash database server as the secondary cache to perform blacklist detection, the efficiency and accuracy of detecting blacklist data can be improved, and the performance of the blacklist service can be improved.
In one embodiment, as shown in fig. 6, after step S206, that is, after sending a blacklist detection request to the target database server, the blacklist detection request carries each first sub-data identifier, so that the target database server searches the target database for each first sub-data identifier, the method further includes the steps of:
s602, acquiring a first sub-data identifier which is returned by the target database server and is searched in the target database.
S604, obtaining corresponding target blacklist prompt information according to the searched first sub-data identification.
Specifically, when the target database server searches the first sub-data identifier in the target database, the searched first sub-data identifier is returned to the service server, and the service server acquires the first sub-data identifier which is returned by the target database server and is searched in the target database. Obtaining corresponding target blacklist prompt information according to the searched first sub-data identifier
Step S208, namely, returning each piece of sub data to the user terminal for display, includes the steps of:
and returning the target blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
Specifically, the service server returns the target blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display, so that user experience is improved.
In a specific embodiment, the data display method is applied to a novel website, as shown in fig. 7, and is a schematic diagram of a business scenario displayed on the novel website. The administrator uploads the edited blacklist of novels to the management end 710, and the management end 710 writes the blacklist of novels into the blacklist database server 706 and the bitmap database server 708, respectively. The web server 704 periodically synchronizes a complete novice blacklist from the blacklist database server 706, for example, the novice blacklist may include the thirty-fourth chapter of novice name "xx". The web server saves the complete novel blacklist in the local cache. The user may view the novice through the website at the user terminal 702. At this time, the user terminal 702 sends a viewing instruction of the novel "xx" to the website server 704, the website server 704 obtains each chapter name corresponding to the novel according to the novel name "xx", searches each chapter name in the local novel blacklist, searches the chapter name of the thirty-fourth chapter in the novel blacklist, and filters the chapter name of the thirty-fourth chapter from each chapter name corresponding to the novel to obtain the remaining chapter names. And sending a blacklist detection request to the bitmap database server 708 according to the remained chapter names, converting the remained chapter names into numbers when the bitmap database server 708 receives the blacklist detection request, calculating the storage position of the numbers in the bitmap database, acquiring a target value in the storage position, and indicating that the chapter name corresponding to the storage position is a chapter in the blacklist when the target value is 1. Each chapter name with the target value of 1 is acquired, each chapter name with the target value of 1 is filtered from the remaining chapter names to obtain each chapter name which is not in the blacklist, the chapter names which are not in the blacklist are returned to the website server 704, the website server 704 acquires corresponding chapter contents according to the chapter names which are not in the blacklist, the chapter contents which are not in the blacklist are returned to the user terminal, and the user terminal displays each chapter content which is not in the blacklist.
In a specific embodiment, the data display method is applied to a music website, as shown in fig. 8, and is specifically shown as a timing chart of music for the music website:
the music website management end writes the music blacklist into a database server and a bitmap database server, and the website server synchronizes the music blacklist from the database server and stores the music blacklist into a local cache. The user sends a music viewing request to the website server through the user terminal, the music viewing request carries album names, the website server obtains each music name in the album according to the album names, each music name in the album is searched in the local cache, and the searched music names are filtered from each music name in the album to obtain each filtered music name.
And the website server sends a blacklist detection request to the target database server, wherein the blacklist detection request carries each filtered music name. The bitmap database server searches each filtered music name in the bitmap database, and filters the searched music names from each filtered music name to obtain each music name which is not in the blacklist. And returning the music names which are not in the blacklist to the website server.
The website server acquires all the music names which are returned by the bitmap database server and are not in the blacklist, acquires all the audio data corresponding to all the music names which are not in the blacklist, and returns all the audio data to the user terminal for display. The user can click the audio data to play, so that the efficiency of audio data display is improved.
It should be understood that, although the steps in the flowcharts of fig. 2, 4, and 6 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2, 4, and 6 may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed sequentially, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 9, a data display apparatus 900 is provided, including a child identifier acquisition module 902, a first identifier obtaining module 904, a second identifier obtaining module 906, and a data display module 908, wherein:
the sub-identifier obtaining module 902 is configured to receive a data viewing instruction sent by the user terminal, where the data viewing instruction carries a data identifier, and obtain corresponding sub-data identifiers according to the data identifier;
the first identifier obtaining module 904 is configured to search each sub-data identifier in the blacklist cache, and filter the searched sub-data identifier from each sub-data identifier to obtain each first sub-data identifier that is not searched in the blacklist cache;
the second identifier obtaining module 906 is configured to send a blacklist detection request to the target database server, where the blacklist detection request carries each first sub-data identifier, so that the target database server searches for each first sub-data identifier in the target database, and filters the searched first sub-data identifier from each first sub-data identifier to obtain each second sub-data identifier that is not searched in the target database;
the data display module 908 is configured to obtain each second sub-data identifier returned by the target database server, obtain each sub-data corresponding to each second sub-data identifier, and return each sub-data to the user terminal for display.
In one embodiment, the data presentation device 900 further comprises:
the request sending module is used for sending a blacklist synchronization request to the blacklist data server at regular time;
the identification storage module is used for acquiring each target sub-data identification returned by the blacklist data server according to the blacklist synchronization request, and storing the target sub-data identification into the blacklist cache.
In one embodiment, the first identification obtaining module 904 includes:
the prompt information acquisition module is used for acquiring the first sub-data identifier searched in the blacklist cache and acquiring corresponding blacklist prompt information according to the searched first sub-data identifier;
the data presentation module 908 comprises:
and the prompt information display module is used for returning the blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
In one embodiment, the second identification obtaining module 906 includes:
the target value searching module is used for sending a blacklist detection request to the bitmap database server, wherein the blacklist detection request carries all first sub-data identifiers, so that the bitmap database server converts all the first sub-data identifiers into numerical values, calculates the storage position of the numerical values in the bitmap database, acquires the target value of the storage position, and determines the searched first sub-data identifiers according to the target value.
In one embodiment, the second identification obtaining module 906 includes:
the hash value searching module is used for sending a blacklist detection request to the hash database server, wherein the blacklist detection request carries all the first sub-data identifiers, so that the hash database server calculates hash values of all the first sub-data identifiers, searches the hash values of all the first sub-data identifiers in the hash database, and determines the searched first sub-data identifiers.
In one embodiment, the second identification obtaining module 906 further includes:
the target prompt information acquisition module is used for acquiring a first sub-data identifier which is returned by the target database server and is searched in the target database; obtaining corresponding target blacklist prompt information according to the searched first sub-data identification;
the data presentation module 908 comprises:
and the target prompt information display module is used for returning the target blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
FIG. 10 illustrates an internal block diagram of a computer device in one embodiment. The computer device may be in particular the service server 104 of fig. 1. As shown in fig. 10, the computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing blacklist data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data presentation method.
It will be appreciated by those skilled in the art that the structure shown in FIG. 10 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, the data presentation apparatus provided by the present application may be implemented in the form of a computer program that is executable on a computer device as shown in fig. 10. The memory of the computer device may store various program modules that make up the data presentation apparatus, such as the sub-identification acquisition module 902, the first identification acquisition module 904, the second identification acquisition module 906, and the data presentation module 908 shown in fig. 9. The computer program of each program module causes a processor to execute the steps in the data presentation method of each embodiment of the present application described in the present specification.
For example, the computer apparatus shown in fig. 10 may perform step S202 through the child identifier acquisition module 902 in the data presentation apparatus as shown in fig. 9. The computer device may perform step S204 through the first identification acquisition module 904. The computer device may perform step S206 through the second identification acquisition module 906. The computer device may perform step S208 through the data presentation module 908.
In one embodiment, a computer device is provided that includes a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the data presentation method described above. The steps of the data presentation method herein may be the steps of the data presentation method of the above embodiments.
In one embodiment, a computer readable storage medium is provided, storing a computer program which, when executed by a processor, causes the processor to perform the steps of the data presentation method described above. The steps of the data presentation method herein may be the steps of the data presentation method of the above embodiments.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (12)

1. A data presentation method comprising:
receiving a data viewing instruction sent by a user terminal, wherein the data viewing instruction carries a data identifier, and acquiring corresponding sub-data identifiers according to the data identifier;
searching each sub-data identifier in a blacklist cache, and filtering the searched sub-data identifiers from each sub-data identifier to obtain each first sub-data identifier which is not searched in the blacklist cache;
Sending a blacklist detection request to a target database server, wherein the blacklist detection request carries all the first sub-data identifiers, so that the target database server searches all the first sub-data identifiers in a target database, filters the searched first sub-data identifiers from all the first sub-data identifiers to obtain all second sub-data identifiers which are not searched in the target database, and the blacklist detection request comprises the following steps: transmitting a blacklist detection request to a bitmap database server, wherein the blacklist detection request carries all first sub-data identifiers, so that the bitmap database server converts all the first sub-data identifiers into numerical values, calculates storage positions of the numerical values in the bitmap database, acquires target values of the storage positions, and determines the searched first sub-data identifiers according to the target values;
and acquiring the second sub-data identifiers returned by the target database server, acquiring the sub-data corresponding to the second sub-data identifiers, and returning the sub-data to the user terminal for display.
2. The method of claim 1, wherein before the receiving the data viewing instruction sent by the user terminal, the data viewing instruction carries a data identifier, and each corresponding sub-data identifier is obtained according to the data identifier, the method further comprises:
A blacklist synchronization request is sent to a blacklist data server at regular time;
and acquiring a target sub-data identifier returned by the blacklist data server according to the blacklist synchronization request, and storing the target sub-data identifier into the blacklist cache.
3. The method of claim 1, wherein after searching the blacklist cache for the respective sub-data identifier, further comprising:
acquiring a first sub-data identifier searched in the blacklist cache, and acquiring corresponding blacklist prompt information according to the first sub-data identifier searched;
returning each sub-data to the user terminal for display, including:
and returning the blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
4. The method of claim 1, wherein the sending a blacklist detection request to the target database server, where the blacklist detection request carries the first sub-data identifiers, so that the target database server searches the target database for the first sub-data identifiers, includes:
and sending a blacklist detection request to a hash database server, wherein the blacklist detection request carries all the first sub-data identifiers, so that the hash database server calculates hash values of all the first sub-data identifiers, searches the hash values of all the first sub-data identifiers in a hash database, and determines the searched first sub-data identifiers.
5. The method according to claim 1, wherein after the sending a blacklist detection request to the target database server, the blacklist detection request carries the first sub-data identifiers, so that the target database server searches the target database for the first sub-data identifiers, the method further includes:
acquiring a first sub-data identifier which is returned by the target database server and is searched in the target database;
acquiring corresponding target blacklist prompt information according to the searched first sub-data identifier;
returning each sub-data to the user terminal for display, including:
and returning the target blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
6. A data presentation device, the device comprising:
the sub-identifier acquisition module is used for receiving a data viewing instruction sent by the user terminal, wherein the data viewing instruction carries a data identifier, and each corresponding sub-data identifier is acquired according to the data identifier;
the first identifier obtaining module is used for searching each sub-data identifier in the blacklist cache, filtering the searched sub-data identifiers from each sub-data identifier, and obtaining each first sub-data identifier which is not searched in the blacklist cache;
The second identifier obtaining module is configured to send a blacklist detection request to a target database server, where the blacklist detection request carries the first sub-data identifiers, so that the target database server searches for the first sub-data identifiers in a target database, filters the first searched sub-data identifiers from the first sub-data identifiers, and obtains second sub-data identifiers that are not searched in the target database, and the second identifier obtaining module includes: the target value searching module is used for sending a blacklist detection request to the bitmap database server, wherein the blacklist detection request carries the first sub-data identifiers, so that the bitmap database server converts the first sub-data identifiers into numerical values, calculates storage positions of the numerical values in the bitmap database, acquires target values of the storage positions, and determines the searched first sub-data identifiers according to the target values;
the data display module is used for acquiring the second sub-data identifiers returned by the target database server, acquiring the sub-data corresponding to the second sub-data identifiers, and returning the sub-data to the user terminal for display.
7. The apparatus of claim 6, wherein the apparatus further comprises:
the request sending module is used for sending a blacklist synchronization request to the blacklist data server at regular time;
and the blacklist synchronization module is used for acquiring a target sub-data identifier returned by the blacklist data server according to the blacklist synchronization request, and storing the target sub-data identifier into the blacklist cache.
8. The apparatus of claim 6, wherein the first identification obtaining module comprises:
the prompt information acquisition module is used for acquiring the first sub-data identifier searched in the blacklist cache and acquiring corresponding blacklist prompt information according to the first sub-data identifier searched;
the data display module comprises:
and the prompt information display module is used for returning the blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
9. The apparatus of claim 6, wherein the second identification obtaining module comprises:
the hash value searching module is used for sending a blacklist detection request to the hash database server, wherein the blacklist detection request carries the first sub-data identifiers, so that the hash database server calculates hash values of the first sub-data identifiers, searches the hash values of the first sub-data identifiers in the hash database, and determines the searched first sub-data identifiers.
10. The apparatus of claim 6, wherein the second identification obtaining module further comprises:
the target prompt information acquisition module is used for acquiring a first sub-data identifier which is returned by the target database server and is searched in the target database; acquiring corresponding target blacklist prompt information according to the searched first sub-data identifier;
the data display module comprises:
and the target prompt information display module is used for returning the target blacklist prompt information corresponding to the searched first sub-data identifier to the user terminal for display.
11. A computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of any one of claims 1 to 5.
12. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method of any of claims 1 to 5.
CN201911024442.9A 2019-10-25 2019-10-25 Data display method, device, computer readable storage medium and computer equipment Active CN112711608B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911024442.9A CN112711608B (en) 2019-10-25 2019-10-25 Data display method, device, computer readable storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911024442.9A CN112711608B (en) 2019-10-25 2019-10-25 Data display method, device, computer readable storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN112711608A CN112711608A (en) 2021-04-27
CN112711608B true CN112711608B (en) 2023-10-27

Family

ID=75540788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911024442.9A Active CN112711608B (en) 2019-10-25 2019-10-25 Data display method, device, computer readable storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN112711608B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010099715A1 (en) * 2009-03-04 2010-09-10 成都市华为赛门铁克科技有限公司 Method, system, client and data server for data operation
CN106708476A (en) * 2015-07-20 2017-05-24 腾讯科技(深圳)有限公司 Stand-alone application instruction processing method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010099715A1 (en) * 2009-03-04 2010-09-10 成都市华为赛门铁克科技有限公司 Method, system, client and data server for data operation
CN106708476A (en) * 2015-07-20 2017-05-24 腾讯科技(深圳)有限公司 Stand-alone application instruction processing method and device

Also Published As

Publication number Publication date
CN112711608A (en) 2021-04-27

Similar Documents

Publication Publication Date Title
US11614990B2 (en) Automatic correlation of dynamic system events within computing devices
US11604782B2 (en) Systems and methods for scheduling concurrent summarization of indexed data
US10268755B2 (en) Systems and methods for providing dynamic indexer discovery
US20180329921A1 (en) Method and apparatus for storing time series data
US11176110B2 (en) Data updating method and device for a distributed database system
US10133622B2 (en) Enhanced error detection in data synchronization operations
CN106407360B (en) Data processing method and device
CN113111129A (en) Data synchronization method, device, equipment and storage medium
CN112100160B (en) Elastic Search based double-activity real-time data warehouse construction method
JP2020057416A (en) Method and device for processing data blocks in distributed database
CN103716384A (en) Method and device for realizing cloud storage data synchronization in cross-data-center manner
CN115825312B (en) Chromatographic detection data interaction method, chromatographic detection data interaction device, chromatographic detection data interaction equipment and computer readable medium
CN111061740A (en) Data synchronization method, equipment and storage medium
CN110737719A (en) Data synchronization method, device, equipment and computer readable storage medium
CN109947730A (en) Metadata restoration methods, device, distributed file system and readable storage medium storing program for executing
CN110515803B (en) Processing method and device for log message and electronic equipment
CN112711608B (en) Data display method, device, computer readable storage medium and computer equipment
CN113849524B (en) Data processing method and device
CN112818204B (en) Service processing method, device, equipment and storage medium
CN114238264A (en) Data processing method, data processing device, computer equipment and storage medium
CN114064674A (en) Data synchronization method, device, computer equipment, storage medium and product
CN111104787B (en) Method, apparatus and computer program product for comparing files
CN117097599B (en) Network service detection method, device, computer equipment and storage medium
CN117271445A (en) Log data processing method, device, server, storage medium and program product
CN116795835A (en) Correlation query method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40042460

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant