CN113315736A - Data synchronization method and device between business processes - Google Patents
Data synchronization method and device between business processes Download PDFInfo
- Publication number
- CN113315736A CN113315736A CN202010119365.1A CN202010119365A CN113315736A CN 113315736 A CN113315736 A CN 113315736A CN 202010119365 A CN202010119365 A CN 202010119365A CN 113315736 A CN113315736 A CN 113315736A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- users
- splicing
- connector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
- H04L65/1104—Session initiation protocol [SIP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2082—Data synchronisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Quality & Reliability (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses a method and a device for synchronizing data among business processes, wherein the method comprises the following steps: after the first process is restarted, the second process screens out the encrypted attribute data of the user of the specified type from the user data maintained by the process, and synchronizes the screened data to the first process; wherein the first process is a business process for processing SIP messages and the second process is a business process for processing Zero Message Queue (ZMQ) messages; the user of the appointed type is an encryption terminal user of the core network. By applying the technical scheme disclosed by the application, the data synchronization speed can be effectively improved.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for synchronizing data between service processes.
Background
In the conventional mobile communication system, in a multi-process scenario, service processes such as user registration, full duplex point call, half duplex point call, and group call are performed by a service process (core process) for processing a Session Initiation Protocol (SIP) message, and a Zero Message Queue (ZMQ) message of a user is performed by a base.
As shown in fig. 1, after the user registers in the core process, the core process updates some user variable information. Then, the user variable information on the core process is synchronized to the base process. When the reset of the core process occurs in the server, the base process still works normally, so that after the core process is restarted, the base process needs to synchronize partial attribute data of all users to the core process, so that the core process can normally process the SIP message.
The inventor discovers that in the process of implementing the invention: in practical application, by adopting the technical scheme, the speed of synchronizing the user data to the core process by the base process after the core process is restarted is very low. After the inventor analyzes the existing scheme, the reason that the problems exist is found that:
in the above scheme, when the base process synchronizes the user data after the core process is restarted, the corresponding data of each user needs to be synchronized to the core process one by one, and the number of users in the system in an actual scene is large, so that the amount of user data to be synchronized by the base process is large, which may cause the data synchronization rate to be reduced at this time, and further reduce the performance of the server.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method and an apparatus for data synchronization between business processes, which can effectively improve the data synchronization speed.
In order to achieve the above purpose, the embodiment of the present invention provides a technical solution:
a method for synchronizing data among business processes comprises the following steps:
after the first process is restarted, the second process screens out the encrypted attribute data of the user of the specified type from the user data maintained by the process, and synchronizes the screened data to the first process;
the first process is a business process for processing SIP messages, and the second process is a business process for processing messages in a zero message queue ZMQ; the user of the appointed type is an encryption terminal user of the core network.
Preferably, the synchronizing the screened data to the first process includes:
a. extracting the encrypted attribute data of M users from the screened data, splicing the encrypted attribute data of the M users, and synchronizing the splicing result to the first process at one time;
if the data which is not extracted currently in the screened data comprises at least N user encryption attribute data, M is equal to N, and otherwise, M is equal to K; n is the maximum number of users corresponding to the preset single synchronous data, and is greater than 1; k is the number of users corresponding to the data which are not extracted currently;
b. and c, judging whether the screened data contains data which is not extracted, if so, returning to the step a.
Preferably, the splicing the encrypted attribute data of the M users includes:
splicing the encrypted attribute data of the M users by using a preset first connector and a preset second connector according to a preset splicing rule, wherein the splicing rule comprises: connecting the user number and the encrypted attribute data belonging to the same user by using the first connector; and for adjacent data belonging to different users, connecting by using the second connector, wherein the first connector is different from the second connector.
Preferably, synchronizing the splicing result to the first process at a time includes:
the second process sends the splicing result to the first process at one time;
and the first process analyzes the received splicing result according to the splicing rule to obtain the encryption attribute data of the M users.
An apparatus for data synchronization between business processes, comprising: a processor to:
after the first process is restarted, according to an instruction of a second process, screening out encryption attribute data of a user of a specified type from user data maintained by the second process, and synchronizing the screened out data to the first process;
the first process is a business process for processing SIP messages, and the second process is a business process for processing messages in a zero message queue ZMQ; the user of the appointed type is an encryption terminal user of the core network.
Preferably, the processor is specifically configured to, according to the instruction of the second process, screen out encryption attribute data of a user of a specified type from user data maintained by the second process, where the encryption attribute data includes:
a. extracting encrypted attribute data of M users from the screened data according to the instruction of the second process, splicing the encrypted attribute data of the M users, and synchronizing a splicing result to the first process at one time;
if the data which is not extracted currently in the screened data comprises at least N user encryption attribute data, M is equal to N, and otherwise, M is equal to K; n is the maximum number of users corresponding to the preset single synchronous data, and is greater than 1; k is the number of users corresponding to the data which are not extracted currently;
b. and c, judging whether the screened data contains data which is not extracted, if so, returning to the step a.
Preferably, the processor is specifically configured to splice the encrypted attribute data of the M users, including:
splicing the encrypted attribute data of the M users by using a preset first connector and a preset second connector according to a preset splicing rule, wherein the splicing rule comprises: connecting the user number and the encrypted attribute data belonging to the same user by using the first connector; and for adjacent data belonging to different users, connecting by using the second connector, wherein the first connector is different from the second connector.
Preferably, the processor is specifically configured to synchronize the splicing result to the first process at one time, and includes:
according to the instruction of the second process, the splicing result is sent to the first process at one time;
and analyzing the splicing result received by the first process according to the instruction of the first process and a splicing rule to obtain the encryption attribute data of the M users.
The present application also discloses a non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps of the method for data synchronization between business processes as described above.
The application also discloses an electronic device comprising the non-volatile computer-readable storage medium as described above, and the processor having access to the non-volatile computer-readable storage medium.
According to the technical scheme, when the second process synchronizes data to the first process after the first process is restarted, the encryption attribute data of part of users (namely encryption terminal users of all core networks) are synchronized to the first process instead of synchronizing the encryption attribute data of all the users to the first process, so that the amount of the synchronized data can be greatly reduced, and the speed of the service process for processing ZMQ messages to synchronize the data to the service process after the service process for processing SIP messages is restarted is effectively improved.
Drawings
FIG. 1 is a diagram illustrating data synchronization between a base process and a core process in the prior art;
FIG. 2 is a schematic flow chart of a method according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 2 is a schematic method flow diagram of an embodiment of the present invention, and as shown in fig. 2, the method for synchronizing data between service processes implemented in the embodiment mainly includes:
The first process is a business process for processing SIP messages, and the second process is a business process for processing messages in a zero message queue ZMQ; the user of the appointed type is an encryption terminal user of the core network.
In this step, it should be noted that, by analyzing the use of the data synchronized with the first process after the restart of the second process, the inventor finds that: after the second process is restarted, only the encrypted attribute data of a part of the users, which are core network terminals and users of the encrypted terminals, need to be used, while for other users, their encrypted attribute data are useless for the second process. Based on this, in this step, in order to improve the efficiency of the second process synchronizing data to the first process after the first process is restarted, only the encrypted attribute data of the encrypted end users of all the core networks are synchronized to the first process, instead of synchronizing the encrypted attribute data of all the users to the first process, so that when the number of users in the system is large, a higher synchronization speed can still be obtained, thereby avoiding the influence on the performance of the server.
Specifically, the first process may be a core process in an existing system, but is not limited to this, as long as the first process is a service process for processing an SIP message in a system to which the present solution is applied.
The second process may be a base process in an existing system, but is not limited thereto, as long as the second process is a business process for processing the zero message queue ZMQ message in the system to which the present solution is applied.
Preferably, in this step, when performing data synchronization, a method different from the method in the prior art in which data of only one user is synchronized at a time and data synchronization is performed one by one user may be adopted, but data of multiple users are synchronized at a time, so as to further increase the synchronization speed, and specifically, the screened data may be synchronized to the first process by using the following method:
step a, extracting encrypted attribute data of M users from the screened data, splicing the encrypted attribute data of the M users, and synchronizing a splicing result to the first process at one time;
if the data which is not extracted currently in the screened data comprises at least N user encryption attribute data, M is equal to N, and otherwise, M is equal to K; n is the maximum number of users corresponding to the preset single synchronous data, and is greater than 1; and K is the number of users corresponding to the data which are not extracted currently.
And b, judging whether the screened data contains data which is not extracted, and if so, returning to the step a.
In the above method, N is used to define how many users' data can be synchronized at a time, and a person skilled in the art may set a suitable value of N according to the processing capacity of the actual server and the number of users, for example, the value may be 1000, but is not limited thereto.
Preferably, in order to facilitate the first process to quickly and accurately parse the data synchronized by the second process, the following splicing rules may be adopted to splice the encrypted attribute data of the M users synchronized each time by using a preset first connector and a preset second connector:
and splicing the encrypted attribute data of the M users according to a preset splicing rule by using a preset first connector and a preset second connector.
Wherein the stitching rule comprises: connecting the user number and the encrypted attribute data belonging to the same user by using the first connector; and for adjacent data belonging to different users, connecting by using the second connector, wherein the first connector is different from the second connector.
Based on the splicing rule, the related data (including the user number and the encryption attribute data) of each user can be concatenated for the encryption attribute data of the M users one by one, so that the data of the users can be synchronized to the first process at one time.
Specifically, the first connector may be "|", and the second connector may be ",", where the form of the splicing result is as follows:
user number 1| user number 1 encryption variable, user number 2| user number 2 encryption variable, user number 3| user number 3 encryption variable, … user number i | user number i encryption variable.
In practical applications, a person skilled in the art may set the first connector and the second connector according to actual needs.
Preferably, after the second process splices the user data based on the rule, the splicing result of the encrypted attribute data of the M users can be synchronized to the first process at one time by adopting the following method:
the second process sends the splicing result to the first process at one time;
and the first process analyzes the received splicing result according to the splicing rule to obtain the encryption attribute data of the M users.
In the method, after the splicing result received by the first process, the splicing result can be analyzed according to the splicing rule adopted by the second process, so that the encrypted attribute data of each user can be obtained. Namely: specifically, the first process may obtain, in the concatenation result, each sub-character string connected by the second connector by using the second connector, where each sub-character string corresponds to data of one user, and then obtain, by searching the first connector in the sub-string, the user number and the encryption attribute data of the corresponding user connected by the first connector.
Corresponding to the method, the application also provides a data synchronization device among business processes, which comprises: a processor to:
after the first process is restarted, according to an instruction of a second process, screening out encryption attribute data of a user of a specified type from user data maintained by the second process, and synchronizing the screened out data to the first process;
the first process is a business process for processing SIP messages, and the second process is a business process for processing messages in a zero message queue ZMQ; the user of the appointed type is an encryption terminal user of the core network.
Preferably, the processor is specifically configured to, according to the instruction of the second process, screen out encryption attribute data of a user of a specified type from user data maintained by the second process, where the encryption attribute data includes:
a. extracting encrypted attribute data of M users from the screened data according to the instruction of the second process, splicing the encrypted attribute data of the M users, and synchronizing a splicing result to the first process at one time;
if the data which is not extracted currently in the screened data comprises at least N user encryption attribute data, M is equal to N, and otherwise, M is equal to K; n is the maximum number of users corresponding to the preset single synchronous data, and is greater than 1; k is the number of users corresponding to the data which are not extracted currently;
b. and c, judging whether the screened data contains data which is not extracted, if so, returning to the step a.
Preferably, the processor is specifically configured to splice the encrypted attribute data of the M users, including:
splicing the encrypted attribute data of the M users by using a preset first connector and a preset second connector according to a preset splicing rule, wherein the splicing rule comprises: connecting the user number and the encrypted attribute data belonging to the same user by using the first connector; and for adjacent data belonging to different users, connecting by using the second connector, wherein the first connector is different from the second connector.
Preferably, the processor is specifically configured to synchronize the splicing result to the first process at one time, and includes:
according to the instruction of the second process, the splicing result is sent to the first process at one time;
and analyzing the splicing result received by the first process according to the instruction of the first process and a splicing rule to obtain the encryption attribute data of the M users.
Further, the present application provides a non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps of the method for data synchronization between business processes as described above.
Further, the present application provides an electronic device comprising the non-volatile computer-readable storage medium as described above, and the processor having access to the non-volatile computer-readable storage medium.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. A method for synchronizing data between business processes is characterized by comprising the following steps:
after the first process is restarted, the second process screens out the encrypted attribute data of the user of the specified type from the user data maintained by the process, and synchronizes the screened data to the first process;
the first process is a business process for processing SIP messages, and the second process is a business process for processing messages in a zero message queue ZMQ; the user of the appointed type is an encryption terminal user of the core network.
2. The method of claim 1, wherein: the synchronizing the screened data to the first process comprises:
a. extracting the encrypted attribute data of M users from the screened data, splicing the encrypted attribute data of the M users, and synchronizing the splicing result to the first process at one time;
if the data which is not extracted currently in the screened data comprises at least N user encryption attribute data, M is equal to N, and otherwise, M is equal to K; n is the maximum number of users corresponding to the preset single synchronous data, and is greater than 1; k is the number of users corresponding to the data which are not extracted currently;
b. and c, judging whether the screened data contains data which is not extracted, if so, returning to the step a.
3. The method of claim 2, wherein: splicing the encrypted attribute data of the M users comprises the following steps:
splicing the encrypted attribute data of the M users by using a preset first connector and a preset second connector according to a preset splicing rule, wherein the splicing rule comprises: connecting the user number and the encrypted attribute data belonging to the same user by using the first connector; and for adjacent data belonging to different users, connecting by using the second connector, wherein the first connector is different from the second connector.
4. The method of claim 3, wherein: synchronizing the splicing result to the first process at one time comprises:
the second process sends the splicing result to the first process at one time;
and the first process analyzes the received splicing result according to the splicing rule to obtain the encryption attribute data of the M users.
5. An apparatus for data synchronization between business processes, comprising: a processor to:
after the first process is restarted, according to an instruction of a second process, screening out encryption attribute data of a user of a specified type from user data maintained by the second process, and synchronizing the screened out data to the first process;
the first process is a business process for processing SIP messages, and the second process is a business process for processing messages in a zero message queue ZMQ; the user of the appointed type is an encryption terminal user of the core network.
6. The apparatus of claim 5, wherein: the processor is specifically configured to, according to an instruction of the second process, screen encryption attribute data of a user of a specified type from user data maintained by the second process, where the screening includes:
a. extracting encrypted attribute data of M users from the screened data according to the instruction of the second process, splicing the encrypted attribute data of the M users, and synchronizing a splicing result to the first process at one time;
if the data which is not extracted currently in the screened data comprises at least N user encryption attribute data, M is equal to N, and otherwise, M is equal to K; n is the maximum number of users corresponding to the preset single synchronous data, and is greater than 1; k is the number of users corresponding to the data which are not extracted currently;
b. and c, judging whether the screened data contains data which is not extracted, if so, returning to the step a.
7. The apparatus of claim 6, wherein: the processor is specifically configured to splice the encrypted attribute data of the M users, including:
splicing the encrypted attribute data of the M users by using a preset first connector and a preset second connector according to a preset splicing rule, wherein the splicing rule comprises: connecting the user number and the encrypted attribute data belonging to the same user by using the first connector; and for adjacent data belonging to different users, connecting by using the second connector, wherein the first connector is different from the second connector.
8. The apparatus of claim 7, wherein: the processor is specifically configured to synchronize the splicing result to the first process at one time, and includes:
according to the instruction of the second process, the splicing result is sent to the first process at one time;
and analyzing the splicing result received by the first process according to the instruction of the first process and a splicing rule to obtain the encryption attribute data of the M users.
9. A non-transitory computer readable storage medium storing instructions which, when executed by a processor, cause the processor to perform the steps of the method for data synchronization between business processes of any one of claims 1 to 4.
10. An electronic device comprising the non-volatile computer-readable storage medium of claim 9, and the processor having access to the non-volatile computer-readable storage medium.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010119365.1A CN113315736B (en) | 2020-02-26 | 2020-02-26 | Data synchronization method and device between business processes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010119365.1A CN113315736B (en) | 2020-02-26 | 2020-02-26 | Data synchronization method and device between business processes |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113315736A true CN113315736A (en) | 2021-08-27 |
CN113315736B CN113315736B (en) | 2022-09-23 |
Family
ID=77370750
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010119365.1A Active CN113315736B (en) | 2020-02-26 | 2020-02-26 | Data synchronization method and device between business processes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113315736B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116501476A (en) * | 2023-06-28 | 2023-07-28 | 成都赛力斯科技有限公司 | Processing method, device, equipment and medium for linux universal character equipment |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0030359D0 (en) * | 1999-12-13 | 2001-01-31 | Ibm | Restartable computer database message processing |
US20020199023A1 (en) * | 2001-06-02 | 2002-12-26 | Ravi Chandra | Method and apparatus for process sync restart |
WO2004051509A1 (en) * | 2002-12-04 | 2004-06-17 | Nokia Corporation | Selecting data for synchronization and for software configuration |
US20060234706A1 (en) * | 2002-11-05 | 2006-10-19 | Pontus Wallentin | Collective notification of node reset to subset of connections in radio access network |
US20070244962A1 (en) * | 2005-10-20 | 2007-10-18 | The Trustees Of Columbia University In The City Of New York | Methods, media and systems for managing a distributed application running in a plurality of digital processing devices |
CN102857363A (en) * | 2012-05-04 | 2013-01-02 | 运软网络科技(上海)有限公司 | Automatic computing system and method for virtual networking |
US20140164829A1 (en) * | 2012-12-10 | 2014-06-12 | International Business Machines Corporation | Recovery for long running multithreaded processes |
US20140280398A1 (en) * | 2013-03-15 | 2014-09-18 | Miosoft Corporation | Distributed database management |
US20150163102A1 (en) * | 2009-06-17 | 2015-06-11 | Constantin Staykoff | Client-server system for network services and applications for mobile telecommunications terminals |
EP3119067A1 (en) * | 2015-01-08 | 2017-01-18 | Opencode Systems O.O.D. | Client-server system for network services and applications for mobile telecommunications terminals |
US20170093807A1 (en) * | 2015-09-28 | 2017-03-30 | At&T Intellectual Property I, Lp | Method and apparatus for encryption of communications over a network |
CN108781426A (en) * | 2016-03-17 | 2018-11-09 | T移动美国公司 | Communication session is registered and auxiliary request processing |
-
2020
- 2020-02-26 CN CN202010119365.1A patent/CN113315736B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0030359D0 (en) * | 1999-12-13 | 2001-01-31 | Ibm | Restartable computer database message processing |
US20020199023A1 (en) * | 2001-06-02 | 2002-12-26 | Ravi Chandra | Method and apparatus for process sync restart |
US20060234706A1 (en) * | 2002-11-05 | 2006-10-19 | Pontus Wallentin | Collective notification of node reset to subset of connections in radio access network |
WO2004051509A1 (en) * | 2002-12-04 | 2004-06-17 | Nokia Corporation | Selecting data for synchronization and for software configuration |
US20070244962A1 (en) * | 2005-10-20 | 2007-10-18 | The Trustees Of Columbia University In The City Of New York | Methods, media and systems for managing a distributed application running in a plurality of digital processing devices |
US20150163102A1 (en) * | 2009-06-17 | 2015-06-11 | Constantin Staykoff | Client-server system for network services and applications for mobile telecommunications terminals |
CN102857363A (en) * | 2012-05-04 | 2013-01-02 | 运软网络科技(上海)有限公司 | Automatic computing system and method for virtual networking |
US20140164829A1 (en) * | 2012-12-10 | 2014-06-12 | International Business Machines Corporation | Recovery for long running multithreaded processes |
US20140280398A1 (en) * | 2013-03-15 | 2014-09-18 | Miosoft Corporation | Distributed database management |
EP3119067A1 (en) * | 2015-01-08 | 2017-01-18 | Opencode Systems O.O.D. | Client-server system for network services and applications for mobile telecommunications terminals |
US20170093807A1 (en) * | 2015-09-28 | 2017-03-30 | At&T Intellectual Property I, Lp | Method and apparatus for encryption of communications over a network |
CN108781426A (en) * | 2016-03-17 | 2018-11-09 | T移动美国公司 | Communication session is registered and auxiliary request processing |
Non-Patent Citations (3)
Title |
---|
李凯,姜慧,刘春雪: "数据同步软件服务器的配置与维护", 《林业勘查设计》 * |
董恩强等: "强实时环境下的高可靠性技术研究", 《计算机工程与科学》 * |
魏佳莉等: "基于国产祖冲之加密算法的移动分组网应用", 《信息通信技术》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116501476A (en) * | 2023-06-28 | 2023-07-28 | 成都赛力斯科技有限公司 | Processing method, device, equipment and medium for linux universal character equipment |
CN116501476B (en) * | 2023-06-28 | 2023-09-12 | 成都赛力斯科技有限公司 | Processing method, device, equipment and medium for linux universal character equipment |
Also Published As
Publication number | Publication date |
---|---|
CN113315736B (en) | 2022-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10992769B2 (en) | Data transmission method, apparatus and system | |
WO2016095516A1 (en) | Complex event processing method, apparatus and system | |
CN112738791B (en) | User information correlation backfill method, device, equipment and medium based on 5G core network | |
CN111328108B (en) | 5G service data processing method, device and distribution equipment | |
US9699080B2 (en) | Method for determining management domain, network device, and virtual cluster | |
WO2016173194A1 (en) | Updating method, device and system for information about resources | |
CN113315736B (en) | Data synchronization method and device between business processes | |
CN114157607A (en) | Media stream transmission method and system | |
CN114500633A (en) | Data forwarding method, related device, program product and data transmission system | |
CN110493022B (en) | Method, device and system for establishing three-party session | |
CN111224891A (en) | Traffic application identification system and method based on dynamic learning triples | |
CN115865528A (en) | Multi-device based user profile operation method, system and readable storage medium | |
CN109634908A (en) | Data correlation method, data processing equipment and storage medium | |
CN107749809B (en) | ATCA integration-based high-efficiency dynamic convergence mechanism implementation method and system | |
CN113329080B (en) | Video playing method and device based on WebSocket, electronic equipment and storage medium | |
CN112073215A (en) | Method for realizing application and service controller | |
CN110198294A (en) | Security attack detection method and device | |
CN110602172B (en) | Link identification generation method and device | |
CN110324377B (en) | Push interaction method and device, electronic equipment and medium | |
CN112738823A (en) | Interface data interaction method, distributed unit and central unit | |
CN107820222B (en) | Method and device for managing multiple tenants | |
CN113014615A (en) | Data synchronization method, device and system | |
CN117041272B (en) | Data processing method, device, equipment and storage medium | |
JP6298013B2 (en) | Policy control system and policy control method | |
EP2699028A2 (en) | Method and apparatus for sending messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |