CN116910479A - Unique identifier generation method, system and medium based on distributed ID generator - Google Patents
Unique identifier generation method, system and medium based on distributed ID generator Download PDFInfo
- Publication number
- CN116910479A CN116910479A CN202310898969.4A CN202310898969A CN116910479A CN 116910479 A CN116910479 A CN 116910479A CN 202310898969 A CN202310898969 A CN 202310898969A CN 116910479 A CN116910479 A CN 116910479A
- Authority
- CN
- China
- Prior art keywords
- data
- node
- information
- generating
- identifier generation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000007405 data analysis Methods 0.000 claims abstract description 44
- 238000004458 analytical method Methods 0.000 claims abstract description 24
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 241000533950 Leucojum Species 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012163 sequencing technique Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
Landscapes
- Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Theoretical Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the application provides a unique identifier generation method, a system and a medium based on a distributed ID generator, wherein the method comprises the following steps: acquiring an identifier generation request, and acquiring a corresponding node code according to the identifier generation request; extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information; comparing the data analysis information with preset information to obtain analysis deviation rate; judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value; if the node code is greater than or equal to the node code, adjusting the node code; if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out; identifying nodes in the data segment through the machine code and generating a unique identifier; the application obtains the machine code through the registration center, and then stores the machine code into the memory to be bound with the information, the life cycle of the machine code is consistent with the life cycle of the service, and the identifier generation accuracy is higher.
Description
Technical Field
The application relates to the field of identifier generation, in particular to a unique identifier generation method, a unique identifier generation system and a unique identifier generation medium based on a distributed ID generator.
Background
The ID generator is a tool for generating a unique identifier. In a distributed system, in order to ensure the uniqueness of data, a distributed ID generator needs to be used. Common distributed ID generators are snowflake algorithms, DB segments, etc. The snowflake algorithm is a distributed ID generation algorithm of the Twitter open source, which can ensure that unique IDs are generated in a distributed system. The DB number segment refers to dividing the ID space into a plurality of sections, each section being responsible for generating an ID by one database instance. This approach can avoid single point failure, but needs to consider the problem of database expansion, and in practical application, in order to ensure the uniqueness and trend increment of the ID, factors in various aspects, such as clock synchronization, machine identification, serial number, etc. need to be considered. Meanwhile, in order to improve the performance and usability of the ID generator, technologies such as caching and asynchronous loading are required to be considered, most of the ID generators in the market at present are mainly designed for the traditional stateful deployment situation, and as cloud computing containerized deployment is mature, snowflake algorithm applicability is poor, and an effective technical solution is needed at present for the problems.
Disclosure of Invention
The embodiment of the application aims to provide a unique identifier generation method, a unique identifier generation system and a unique identifier generation medium based on a distributed ID generator, which can actively go to a registration center to acquire a machine code when each service is started, then the machine code is stored in a memory to be bound with information, the life cycle of the machine code is consistent with the life cycle of the service, one machine code is started to be closed by the same service, and the identifier generation accuracy is higher.
The embodiment of the application also provides a unique identifier generation method based on the distributed ID generator, which comprises the following steps:
acquiring an identifier generation request, and acquiring a corresponding node code according to the identifier generation request;
extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information;
comparing the data analysis information with preset information to obtain analysis deviation rate;
judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value;
if the node code is greater than or equal to the node code, adjusting the node code;
if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out;
nodes within the data segment are identified by machine code and a unique identifier is generated.
Optionally, in the method for generating a unique identifier based on a distributed ID generator according to the embodiment of the present application, the obtaining an identifier generating request, and obtaining a corresponding node code according to the identifier generating request, specifically includes:
acquiring an identifier generation request, generating a call key, decrypting data characters in the node according to the call key, and obtaining node decryption information;
performing similarity calculation on the node decryption information and preset call information;
judging whether the similarity meets a preset similarity range or not;
if yes, encoding the decrypted node;
if not, isolating the data in the node.
Optionally, in the method for generating a unique identifier based on a distributed ID generator according to the embodiment of the present application, the extracting a data segment in a database according to node encoding and performing data analysis to obtain data analysis information includes:
acquiring node codes, dividing data segments according to the node codes, and generating an identification key of each data segment;
matching the identification secret key with the identifier generation request to obtain request matching degree;
judging whether the matching degree is larger than a preset matching degree threshold value or not;
if the data segment is larger than the data segment, generating adjustment information, and performing secondary division on the data segment according to the adjustment information;
and if the character is smaller than the preset value, performing character analysis on the corresponding node according to the node code.
Optionally, in the method for generating the unique identifier based on the distributed ID generator according to the embodiment of the present application, if the unique identifier is smaller than the unique identifier, a machine code is acquired through a unified registry, and information binding is performed, specifically:
acquiring a data call key, comparing a plurality of data call keys, and judging whether the data call keys are identical;
if the number of the keys is the same, calculating the number of the keys by data call to obtain the number of the keys;
identifying data calling time according to the data calling key and generating a calling time stamp;
encoding the machine code according to the number of keys and the calling time stamp and the calling time sequence;
if the data are different, the characteristics of the data calling key are obtained, and the machine code is configured according to the data calling key.
Optionally, in the method for generating a unique identifier based on a distributed ID generator according to the embodiment of the present application, before the obtaining an identifier generating request, before obtaining a corresponding node code according to the identifier generating request, the method further includes:
acquiring an access request and judging the access type of the access request;
if the access type is a public parameter, not performing identity verification;
if the access type is a private key, identity authentication is carried out, user identity information is obtained, and an identity mark is generated;
carrying out identity matching according to the identity mark and generating matching degree;
judging whether the matching degree is larger than or equal to a preset matching degree threshold value;
if the access key is greater than or equal to the identifier, the matching is successful, an access private key is generated, and an identifier generation request is acquired;
if the matching is smaller than the threshold value, the matching fails, and warning information is generated.
Optionally, in the method for generating a unique identifier based on a distributed ID generator according to the embodiment of the present application, the identifying data calling time according to a data calling key and generating a calling timestamp specifically includes:
monitoring signals flowing through a signal timestamp generator in a network, and recording the arrival time of the monitored signals; and generating time stamp information;
adding the time stamp information into the data frame to package so as to obtain a time stamp data frame;
and analyzing the time stamp data frame, outputting the data frame with the time stamp information, and generating a calling time stamp.
In a second aspect, an embodiment of the present application provides a unique identifier generation system based on a distributed ID generator, the system comprising: the device comprises a memory and a processor, wherein the memory comprises a program based on a unique identifier generating method of a distributed ID generator, and the program based on the unique identifier generating method of the distributed ID generator realizes the following steps when being executed by the processor:
acquiring an identifier generation request, and acquiring a corresponding node code according to the identifier generation request;
extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information;
comparing the data analysis information with preset information to obtain analysis deviation rate;
judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value;
if the node code is greater than or equal to the node code, adjusting the node code;
if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out;
nodes within the data segment are identified by machine code and a unique identifier is generated.
Optionally, in the unique identifier generating system based on a distributed ID generator according to the embodiment of the present application, the obtaining an identifier generating request obtains a corresponding node code according to the identifier generating request, specifically:
acquiring an identifier generation request, generating a call key, decrypting data characters in the node according to the call key, and obtaining node decryption information;
performing similarity calculation on the node decryption information and preset call information;
judging whether the similarity meets a preset similarity range or not;
if yes, encoding the decrypted node;
if not, isolating the data in the node.
Optionally, in the unique identifier generating system based on a distributed ID generator according to the embodiment of the present application, the extracting a data segment in a database according to node encoding and performing data analysis to obtain data analysis information includes:
acquiring node codes, dividing data segments according to the node codes, and generating an identification key of each data segment;
matching the identification secret key with the identifier generation request to obtain request matching degree;
judging whether the matching degree is larger than a preset matching degree threshold value or not;
if the data segment is larger than the data segment, generating adjustment information, and performing secondary division on the data segment according to the adjustment information;
and if the character is smaller than the preset value, performing character analysis on the corresponding node according to the node code.
In a third aspect, an embodiment of the present application further provides a computer readable storage medium, including a unique identifier generating method program based on a distributed ID generator, where the unique identifier generating method program based on a distributed ID generator implements the steps of the unique identifier generating method based on a distributed ID generator according to any one of the above described embodiments when executed by a processor.
As can be seen from the above, the unique identifier generating method, system and medium based on the distributed ID generator provided by the embodiments of the present application acquire the corresponding node code according to the identifier generating request by acquiring the identifier generating request; extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information; comparing the data analysis information with preset information to obtain analysis deviation rate; judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value; if the node code is greater than or equal to the node code, adjusting the node code; if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out; identifying nodes in the data segment through the machine code and generating a unique identifier; the application obtains the machine code through the registration center, and then stores the machine code into the memory to be bound with the information, the life cycle of the machine code is consistent with the life cycle of the service, and the identifier generation accuracy is higher.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, the claims, and the drawings, as well as the objects and advantages of the application may be realized and obtained by means of the instrumentalities particularly pointed out in the written description, claims, and drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a unique identifier generation method based on a distributed ID generator according to an embodiment of the present application;
FIG. 2 is a flowchart of a method for obtaining node codes based on a unique identifier generation method of a distributed ID generator according to an embodiment of the present application;
FIG. 3 is a flowchart of a method for generating unique identifiers based on a distributed ID generator to obtain data analysis information according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a unique identifier generating system based on a distributed ID generator according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that like reference numerals and letters refer to like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
Referring to fig. 1, fig. 1 is a flowchart of a unique identifier generation method based on a distributed ID generator according to some embodiments of the present application. The unique identifier generating method based on the distributed ID generator is used in the terminal equipment and comprises the following steps:
s101, acquiring an identifier generation request, and acquiring a corresponding node code according to the identifier generation request;
s102, extracting data segments in a database according to node codes, and performing data analysis to obtain data analysis information;
s103, comparing the data analysis information with preset information to obtain analysis deviation rate; judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value;
s104, if the node code is greater than or equal to the node code, adjusting the node code; if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out;
s105, identifying nodes in the data segment through the machine code and generating a unique identifier.
The unique identifier can be generated by encoding the node and acquiring the machine code from the same registration center to realize information binding, so that the accuracy of data use is improved.
Referring to fig. 2, fig. 2 is a flowchart of a method for acquiring node codes based on a unique identifier generation method of a distributed ID generator according to some embodiments of the present application. According to the embodiment of the application, the identifier generation request is acquired, and the corresponding node code is acquired according to the identifier generation request, specifically:
s201, acquiring an identifier generation request, generating a call key, decrypting data characters in a node according to the call key, and obtaining node decryption information;
s202, similarity calculation is carried out on node decryption information and preset call information;
s203, judging whether the similarity meets a preset similarity range;
s204, if yes, encoding the decrypted node;
and S205, if the data in the nodes are not satisfied, isolating the data in the nodes.
The key decryption node is called, whether the node decryption information meets the requirement is judged, node coding or data isolation is realized, the redundancy of data is reduced, and the data analysis speed is improved.
Referring to fig. 3, fig. 3 is a flowchart of a method for generating a unique identifier based on a distributed ID generator according to some embodiments of the present application. According to the embodiment of the application, the data segments in the database are extracted according to the node codes, and data analysis is performed to obtain data analysis information, which comprises the following steps:
s301, acquiring node codes, dividing data segments according to the node codes, and generating an identification secret key of each data segment;
s302, matching the identification secret key with the identifier generation request to obtain request matching degree;
s303, judging whether the matching degree is larger than a preset matching degree threshold value;
s304, if the data segment is larger than the data segment, generating adjustment information, and performing secondary division on the data segment according to the adjustment information;
and S305, if the number is smaller than the threshold value, performing character analysis on the corresponding node according to the node code.
It should be noted that, by judging the matching degree of the representation key and the identifier generation, the accuracy of the data segment division in the node is improved, so that accurate data analysis is realized.
According to the embodiment of the application, if the machine code is smaller than the machine code, the machine code is acquired through the unified registry, and information binding is performed, specifically:
acquiring a data call key, comparing a plurality of data call keys, and judging whether the data call keys are identical;
if the number of the keys is the same, calculating the number of the keys by data call to obtain the number of the keys;
identifying data calling time according to the data calling key and generating a calling time stamp;
encoding the machine code according to the number of keys and the calling time stamp and the calling time sequence;
if the data are different, the characteristics of the data calling key are obtained, and the machine code is configured according to the data calling key.
It should be noted that, the unified registration center obtains the machine code to realize information binding, and performs calling time sequencing according to the number of the data calling keys, so as to prevent the data from calling the cache and improve the data loading speed.
According to the embodiment of the application, before the identifier generation request is acquired and the corresponding node code is acquired according to the identifier generation request, the method further comprises the following steps:
acquiring an access request and judging the access type of the access request;
if the access type is a public parameter, not performing identity verification;
if the access type is a private key, identity authentication is carried out, user identity information is obtained, and an identity mark is generated;
carrying out identity matching according to the identity mark and generating matching degree;
judging whether the matching degree is larger than or equal to a preset matching degree threshold value;
if the access key is greater than or equal to the identifier, the matching is successful, an access private key is generated, and an identifier generation request is acquired;
if the matching is smaller than the threshold value, the matching fails, and warning information is generated.
It should be noted that, by analyzing the access request and the access type to process the user identity in different ways, the matching of the identity in the data calling process is realized, and the security of the data calling is improved.
According to the embodiment of the application, the data calling time is identified according to the data calling key, and a calling time stamp is generated, specifically:
monitoring signals flowing through a signal timestamp generator in a network, and recording the arrival time of the monitored signals; and generating time stamp information;
adding the time stamp information into the data frame to package so as to obtain a time stamp data frame;
and analyzing the time stamp data frame, outputting the data frame with the time stamp information, and generating a calling time stamp.
By detecting the time of arrival of the signal at the time stamp generator in real time, the time sequence of the data call is recorded, thereby ensuring the order in the data call process and preventing the data call disorder.
According to an embodiment of the present application, further comprising:
acquiring a data segment serial number, and generating a data calling sequence according to the time stamp information;
sequentially calling according to the sequence of the data segments and the sequence numbers of the data segments to generate a data calling result;
judging whether the data calling result meets the requirement;
if yes, generating data calling total time;
and if not, adjusting the data information in the node.
The data segments are numbered to form serial numbers, and the data segments are called in sequence according to the serial numbers of the data segments, so that the data calling speed is improved.
Referring to fig. 4, fig. 4 is a schematic diagram illustrating a unique identifier generating system based on a distributed ID generator according to some embodiments of the present application. In a second aspect, embodiments of the present application provide a unique identifier generation system 4 based on a distributed ID generator, the system comprising: the memory 41 and the processor 42, the memory 41 includes a program for generating a unique identifier by a distributed ID generator, and the program for generating a unique identifier by a distributed ID generator realizes the following steps when executed by the processor:
acquiring an identifier generation request, and acquiring a corresponding node code according to the identifier generation request;
extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information;
comparing the data analysis information with preset information to obtain analysis deviation rate;
judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value;
if the node code is greater than or equal to the node code, adjusting the node code;
if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out;
nodes within the data segment are identified by machine code and a unique identifier is generated.
The unique identifier can be generated by encoding the node and acquiring the machine code from the same registration center to realize information binding, so that the accuracy of data use is improved.
According to the embodiment of the application, the identifier generation request is acquired, and the corresponding node code is acquired according to the identifier generation request, specifically:
acquiring an identifier generation request, generating a call key, decrypting data characters in the node according to the call key, and obtaining node decryption information;
performing similarity calculation on the node decryption information and preset call information;
judging whether the similarity meets a preset similarity range or not;
if yes, encoding the decrypted node;
if not, isolating the data in the node.
The key decryption node is called, whether the node decryption information meets the requirement is judged, node coding or data isolation is realized, the redundancy of data is reduced, and the data analysis speed is improved.
According to the embodiment of the application, the data segments in the database are extracted according to the node codes, and data analysis is performed to obtain data analysis information, which comprises the following steps:
acquiring node codes, dividing data segments according to the node codes, and generating an identification key of each data segment;
matching the identification secret key with the identifier generation request to obtain request matching degree;
judging whether the matching degree is larger than a preset matching degree threshold value or not;
if the data segment is larger than the data segment, generating adjustment information, and performing secondary division on the data segment according to the adjustment information;
and if the character is smaller than the preset value, performing character analysis on the corresponding node according to the node code.
It should be noted that, by judging the matching degree of the representation key and the identifier generation, the accuracy of the data segment division in the node is improved, so that accurate data analysis is realized.
According to the embodiment of the application, if the machine code is smaller than the machine code, the machine code is acquired through the unified registry, and information binding is performed, specifically:
acquiring a data call key, comparing a plurality of data call keys, and judging whether the data call keys are identical;
if the number of the keys is the same, calculating the number of the keys by data call to obtain the number of the keys;
identifying data calling time according to the data calling key and generating a calling time stamp;
encoding the machine code according to the number of keys and the calling time stamp and the calling time sequence;
if the data are different, the characteristics of the data calling key are obtained, and the machine code is configured according to the data calling key.
It should be noted that, the unified registration center obtains the machine code to realize information binding, and performs calling time sequencing according to the number of the data calling keys, so as to prevent the data from calling the cache and improve the data loading speed.
According to the embodiment of the application, before the identifier generation request is acquired and the corresponding node code is acquired according to the identifier generation request, the method further comprises the following steps:
acquiring an access request and judging the access type of the access request;
if the access type is a public parameter, not performing identity verification;
if the access type is a private key, identity authentication is carried out, user identity information is obtained, and an identity mark is generated;
carrying out identity matching according to the identity mark and generating matching degree;
judging whether the matching degree is larger than or equal to a preset matching degree threshold value;
if the access key is greater than or equal to the identifier, the matching is successful, an access private key is generated, and an identifier generation request is acquired;
if the matching is smaller than the threshold value, the matching fails, and warning information is generated.
It should be noted that, by analyzing the access request and the access type to process the user identity in different ways, the matching of the identity in the data calling process is realized, and the security of the data calling is improved.
According to the embodiment of the application, the data calling time is identified according to the data calling key, and a calling time stamp is generated, specifically:
monitoring signals flowing through a signal timestamp generator in a network, and recording the arrival time of the monitored signals; and generating time stamp information;
adding the time stamp information into the data frame to package so as to obtain a time stamp data frame;
and analyzing the time stamp data frame, outputting the data frame with the time stamp information, and generating a calling time stamp.
By detecting the time of arrival of the signal at the time stamp generator in real time, the time sequence of the data call is recorded, thereby ensuring the order in the data call process and preventing the data call disorder.
According to an embodiment of the present application, further comprising:
acquiring a data segment serial number, and generating a data calling sequence according to the time stamp information;
sequentially calling according to the sequence of the data segments and the sequence numbers of the data segments to generate a data calling result;
judging whether the data calling result meets the requirement;
if yes, generating data calling total time;
and if not, adjusting the data information in the node.
The data segments are numbered to form serial numbers, and the data segments are called in sequence according to the serial numbers of the data segments, so that the data calling speed is improved.
A third aspect of the present application provides a computer-readable storage medium having embodied therein a unique identifier generation method program based on a distributed ID generator, which when executed by a processor, implements the steps of the unique identifier generation method based on a distributed ID generator as in any one of the above.
The application discloses a unique identifier generation method, a unique identifier generation system and a unique identifier generation medium based on a distributed ID generator, wherein corresponding node codes are acquired according to an identifier generation request by acquiring the identifier generation request; extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information; comparing the data analysis information with preset information to obtain analysis deviation rate; judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value; if the node code is greater than or equal to the node code, adjusting the node code; if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out; identifying nodes in the data segment through the machine code and generating a unique identifier; the application obtains the machine code through the registration center, and then stores the machine code into the memory to be bound with the information, the life cycle of the machine code is consistent with the life cycle of the service, and the identifier generation accuracy is higher.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of units is only one logical function division, and there may be other divisions in actual implementation, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, or the like, which can store program codes.
Alternatively, the above-described integrated units of the present application may be stored in a readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solution of the embodiments of the present application may be embodied in essence or a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, ROM, RAM, magnetic or optical disk, or other medium capable of storing program code.
Claims (10)
1. A unique identifier generation method based on a distributed ID generator, comprising:
acquiring an identifier generation request, and acquiring a corresponding node code according to the identifier generation request;
extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information;
comparing the data analysis information with preset information to obtain analysis deviation rate;
judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value;
if the node code is greater than or equal to the node code, adjusting the node code;
if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out;
nodes within the data segment are identified by machine code and a unique identifier is generated.
2. The unique identifier generation method based on the distributed ID generator according to claim 1, wherein the obtaining an identifier generation request obtains a corresponding node code according to the identifier generation request, specifically:
acquiring an identifier generation request, generating a call key, decrypting data characters in the node according to the call key, and obtaining node decryption information;
performing similarity calculation on the node decryption information and preset call information;
judging whether the similarity meets a preset similarity range or not;
if yes, encoding the decrypted node;
if not, isolating the data in the node.
3. The method for generating unique identifiers based on distributed ID generator according to claim 2, wherein the extracting the data segments in the database according to the node codes and performing data analysis to obtain data analysis information comprises:
acquiring node codes, dividing data segments according to the node codes, and generating an identification key of each data segment;
matching the identification secret key with the identifier generation request to obtain request matching degree;
judging whether the matching degree is larger than a preset matching degree threshold value or not;
if the data segment is larger than the data segment, generating adjustment information, and performing secondary division on the data segment according to the adjustment information;
and if the character is smaller than the preset value, performing character analysis on the corresponding node according to the node code.
4. The method for generating unique identifier based on distributed ID generator according to claim 2, wherein if the unique identifier is smaller than the unique identifier, the machine code is acquired through a unified registry, and information binding is performed, specifically:
acquiring a data call key, comparing a plurality of data call keys, and judging whether the data call keys are identical;
if the number of the keys is the same, calculating the number of the keys by data call to obtain the number of the keys;
identifying data calling time according to the data calling key and generating a calling time stamp;
encoding the machine code according to the number of keys and the calling time stamp and the calling time sequence;
if the data are different, the characteristics of the data calling key are obtained, and the machine code is configured according to the data calling key.
5. The unique identifier generation method based on a distributed ID generator according to claim 4, wherein the acquiring the identifier generation request, before acquiring the corresponding node code according to the identifier generation request, further comprises:
acquiring an access request and judging the access type of the access request;
if the access type is a public parameter, not performing identity verification;
if the access type is a private key, identity authentication is carried out, user identity information is obtained, and an identity mark is generated;
carrying out identity matching according to the identity mark and generating matching degree;
judging whether the matching degree is larger than or equal to a preset matching degree threshold value;
if the access key is greater than or equal to the identifier, the matching is successful, an access private key is generated, and an identifier generation request is acquired;
if the matching is smaller than the threshold value, the matching fails, and warning information is generated.
6. The unique identifier generating method based on a distributed ID generator according to claim 5, wherein the identifying the data call time according to the data call key and generating the call time stamp is specifically:
monitoring signals flowing through a signal timestamp generator in a network, and recording the arrival time of the monitored signals; and generating time stamp information;
adding the time stamp information into the data frame to package so as to obtain a time stamp data frame;
and analyzing the time stamp data frame, outputting the data frame with the time stamp information, and generating a calling time stamp.
7. A unique identifier generation system based on a distributed ID generator, the system comprising: the device comprises a memory and a processor, wherein the memory comprises a program based on a unique identifier generating method of a distributed ID generator, and the program based on the unique identifier generating method of the distributed ID generator realizes the following steps when being executed by the processor:
acquiring an identifier generation request, and acquiring a corresponding node code according to the identifier generation request;
extracting a data segment in a database according to node codes, and performing data analysis to obtain data analysis information;
comparing the data analysis information with preset information to obtain analysis deviation rate;
judging whether the analysis deviation rate is larger than or equal to a preset deviation rate threshold value;
if the node code is greater than or equal to the node code, adjusting the node code;
if the number is smaller than the number, the machine code is acquired through the unified registration center, and information binding is carried out;
nodes within the data segment are identified by machine code and a unique identifier is generated.
8. The unique identifier generation system based on a distributed ID generator according to claim 7, wherein the obtaining an identifier generation request obtains a corresponding node code according to the identifier generation request, specifically:
acquiring an identifier generation request, generating a call key, decrypting data characters in the node according to the call key, and obtaining node decryption information;
performing similarity calculation on the node decryption information and preset call information;
judging whether the similarity meets a preset similarity range or not;
if yes, encoding the decrypted node;
if not, isolating the data in the node.
9. The unique identifier generating system based on a distributed ID generator according to claim 8, wherein the extracting the data segments in the database according to the node codes and performing data analysis to obtain data analysis information comprises:
acquiring node codes, dividing data segments according to the node codes, and generating an identification key of each data segment;
matching the identification secret key with the identifier generation request to obtain request matching degree;
judging whether the matching degree is larger than a preset matching degree threshold value or not;
if the data segment is larger than the data segment, generating adjustment information, and performing secondary division on the data segment according to the adjustment information;
and if the character is smaller than the preset value, performing character analysis on the corresponding node according to the node code.
10. A computer-readable storage medium, characterized in that a unique identifier generating method program based on a distributed ID generator is included in the computer-readable storage medium, which, when executed by a processor, implements the steps of the unique identifier generating method based on a distributed ID generator as claimed in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310898969.4A CN116910479A (en) | 2023-07-21 | 2023-07-21 | Unique identifier generation method, system and medium based on distributed ID generator |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310898969.4A CN116910479A (en) | 2023-07-21 | 2023-07-21 | Unique identifier generation method, system and medium based on distributed ID generator |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116910479A true CN116910479A (en) | 2023-10-20 |
Family
ID=88350757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310898969.4A Pending CN116910479A (en) | 2023-07-21 | 2023-07-21 | Unique identifier generation method, system and medium based on distributed ID generator |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116910479A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117785385A (en) * | 2023-12-30 | 2024-03-29 | 北京领雁科技股份有限公司 | ID generation system and method based on snowflake algorithm |
-
2023
- 2023-07-21 CN CN202310898969.4A patent/CN116910479A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117785385A (en) * | 2023-12-30 | 2024-03-29 | 北京领雁科技股份有限公司 | ID generation system and method based on snowflake algorithm |
CN117785385B (en) * | 2023-12-30 | 2024-06-07 | 北京领雁科技股份有限公司 | ID generation system and method based on snowflake algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180004852A1 (en) | Method and system for facilitating terminal identifiers | |
CN112905536B (en) | Data verification synchronization method and device based on block chain | |
CN109308421A (en) | A kind of information tamper resistant method, device, server and computer storage medium | |
CN116910479A (en) | Unique identifier generation method, system and medium based on distributed ID generator | |
CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN117349895B (en) | Block chain-based automobile financial digital archive management method and device | |
CN111148094A (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN111475690B (en) | Character string matching method and device, data detection method and server | |
CN103797490A (en) | Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme | |
CN110266653B (en) | Authentication method, system and terminal equipment | |
CN108765615B (en) | Block chain-based card punching information storage method and system | |
CN117792761A (en) | Safe data management method and system based on time-staggered key distribution | |
CN111148213B (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN112713996A (en) | Fault verification method based on block chain, server and terminal | |
CN111132149A (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN111400771A (en) | Target partition checking method and device, storage medium and computer equipment | |
CN113378120B (en) | Version authorization control method, device, equipment and storage medium based on block chain | |
CN115935391A (en) | Card manufacturing method, card issuing method, device, medium, and program product for IC card | |
CN114124469A (en) | Data processing method, device and equipment | |
CN115313627A (en) | Power data remote monitoring method, system, terminal and storage medium | |
CN114706932A (en) | Method and system for encryption desensitization and query of geographic information | |
CN111132156B (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN113395281A (en) | Verification method and device capable of verifying statement and electronic equipment | |
CN112865981A (en) | Token obtaining and verifying method and device | |
CN109960922B (en) | Method and device for identifying newly activated equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |