WO2018050055A1 - 数据请求处理方法及其系统、接入设备、存储设备 - Google Patents

数据请求处理方法及其系统、接入设备、存储设备 Download PDF

Info

Publication number
WO2018050055A1
WO2018050055A1 PCT/CN2017/101442 CN2017101442W WO2018050055A1 WO 2018050055 A1 WO2018050055 A1 WO 2018050055A1 CN 2017101442 W CN2017101442 W CN 2017101442W WO 2018050055 A1 WO2018050055 A1 WO 2018050055A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
information
storage device
target data
verification information
Prior art date
Application number
PCT/CN2017/101442
Other languages
English (en)
French (fr)
Inventor
武勇栋
傅飞玲
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018050055A1 publication Critical patent/WO2018050055A1/zh
Priority to US16/018,259 priority Critical patent/US11128622B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1087Peer-to-peer [P2P] networks using cross-functional networking aspects
    • H04L67/1091Interfacing with client-server systems or between P2P systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Definitions

  • the present application relates to the field of Internet technologies, and in particular, to a data request processing method and system thereof, an access device, and a storage device.
  • distributed storage With the continuous development and improvement of Internet technology, distributed storage has good scalability and disaster tolerance. Therefore, in the network environment of big data, distributed storage is widely used to store data.
  • the process of requesting data in the storage device of the distributed storage device is: the user terminal requests data from the access device, and the storage device information corresponding to the data is synchronized in the access device, and the corresponding information can be accessed according to the storage device information.
  • Storage device to get the data and return to the user terminal.
  • the access device cannot obtain the data specified by the user terminal, or the acquired data is not the data requested by the user terminal. This leads to low response accuracy and low success rate of data requests.
  • the returned data is wrong, but the returned data is the data of other users, resulting in the leakage of data, and thus the problem of low data security.
  • An embodiment of the present application provides a data request processing method and system thereof, an access device, and a storage
  • the device can improve the accuracy of the requested data and ensure the security of the data storage.
  • a first aspect of the embodiments of the present application provides a data request processing method, which may include:
  • the user terminal sends a data request carrying the data information of the target data to the access device;
  • the access device searches for the storage device identifier and the first verification information associated with the data information, and sends the first verification information and the data information to a storage device corresponding to the storage device identifier;
  • the storage device verifies the first verification information, and obtains the target data indicated by the data information after the verification is passed, and sends the target data to the access device;
  • the access device acquires the target data sent by the storage device, and sends the target data to the user terminal to respond to the data request.
  • a second aspect of the embodiments of the present application provides a data request processing method, which may include:
  • a third aspect of the embodiments of the present application provides a data request processing method, which may include:
  • a fourth aspect of the embodiments of the present application provides an access device, which may include:
  • the data information obtaining unit is configured to acquire a data request that is sent by the user terminal and carry the data information of the target data, and parse and obtain the data information carried in the data request;
  • An information sending unit configured to search for a storage device identifier and first verification information associated with the data information, and send the first verification information and the data information to a storage device corresponding to the storage device identifier, to And causing the storage device to verify the first verification information, and acquiring the target data indicated by the data information after the verification is passed, and sending the target data to the access device;
  • the first data sending unit is configured to acquire the target data sent by the storage device, and send the target data to the user terminal to respond to the data request.
  • a fifth aspect of the embodiments of the present application provides a storage device, which may include:
  • An information acquiring unit configured to acquire data information of target data sent by the access device, and first verification information associated with the data information, where the data information is obtained by the access device parsing a data request sent by the user terminal Information that the first verification information is associated information that the access device searches according to the data information;
  • a data sending unit configured to verify the first verification information, and obtain the target data indicated by the data information after the verification is passed, and send the target data to the access device, so that the The access device acquires the target data sent by the storage device, so that the access device sends the target data to the user terminal in response to the data request.
  • the sixth aspect of the embodiments of the present application provides a data request processing system, which may include: a user terminal, an access device, and a storage device;
  • the user terminal is configured to send, to the access device, a data request that carries data information of the target data;
  • the access device is configured to acquire the data request sent by the user terminal, and parse and obtain the data information carried in the data request;
  • the access device is further configured to: search for a storage device identifier and first verification information associated with the data information, and send the first verification information and the data information to a storage corresponding to the storage device identifier device;
  • the storage device is configured to verify the first verification information, and obtain the target data indicated by the data information after the verification is passed, and send the target data to the access device;
  • the access device is further configured to acquire the target data sent by the storage device, and send the target data to the user terminal to respond to the data request.
  • a seventh aspect of the present application provides a data request processing method, which is applied to an access device, and includes:
  • a data request that carries the first identifier where the data request is: a storage request of the storage target data or a read request of the read target data, where the first identifier is the user client according to the pre-preparation Setting an identifier generated by the rule and related to the target data storage;
  • Performing a preset process on the first identifier to obtain a first storage device identifier where the first storage device identifier is: a device identifier of a storage device that stores the target data;
  • the eighth aspect of the embodiments of the present application provides a data request processing method, which is applied to a storage device, and includes:
  • An eighth aspect of the present application provides a computer storage medium, where the computer storage medium stores computer executable instructions for executing a data request processing method provided by one or more of the foregoing technical solutions.
  • a ninth aspect of the present application provides a processing device, where the processing device is an access device or a storage device, and includes:
  • transceiver for data interaction with other devices
  • a memory for storing data
  • a processor configured to connect to the transceiver and the memory, respectively, for implementing a data request processing method provided by one or more of the foregoing technical solutions by executing a computer program located on the memory.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the first verification information that is set in advance The storage device verifies the first verification information, and returns the target data indicated by the data information to the access device after the verification is passed, and finally the target device sends the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation ensures the accuracy and security of the requested data.
  • FIG. 1 is a schematic flowchart of a data request processing method according to an embodiment of the present application.
  • FIG. 2 is a sequence diagram of a process of a data request processing method according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of another data request processing method provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of still another data request processing method according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of still another data request processing method according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of still another data request processing method according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an access device according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of another access device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of still another access device according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of a storage device according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of another storage device according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of a data sending unit according to an embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of another storage device according to an embodiment of the present disclosure.
  • FIG. 14 is a schematic structural diagram of a data request processing system according to an embodiment of the present disclosure.
  • 15 is a schematic flowchart of still another data request processing method according to an embodiment of the present application.
  • FIG. 16 is a schematic flowchart diagram of still another data request processing method according to an embodiment of the present invention.
  • the data that caused the user terminal to be unable to provide the user terminal request may be caused by a communication failure of the current access device, or the current storage device is faulty, or the current storage device is performing data transfer. If the access device fails, the access device cannot synchronize to the storage device information stored in the data in time, which may result in the failure to obtain data. At the same time, when there is data transfer, the user terminal will use the other access device to When the data is stored in the storage device, it is easy to obtain the wrong data, which affects the accuracy of the requested data and the security of the data storage. To this end, the data request processing method provided by the embodiment of the present application can be applied to a scenario of a distributed storage data request.
  • the user terminal sends a data request carrying the data information of the target data to the access device
  • the access device acquires the data request sent by the user terminal, parses and acquires the data information carried in the data request
  • the access device searches for the storage device identifier and the first verification information associated with the data information, and sends the first verification information and the data information to a storage device corresponding to the storage device identifier, where the storage device Verifying the first verification information, and acquiring the target data indicated by the data information after the verification is passed, and sending the target data to the connection
  • the access device acquires the target data sent by the storage device, and sends the target data to the user terminal to respond to the scenario of the data request, and the like.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation ensures the accuracy and security of the requested data.
  • the user terminal may include a terminal device including a tablet computer, a personal computer (PC), a smart phone, a palmtop computer, and a mobile internet device (MID), and the like;
  • the access device may be a switch device that interfaces with the user terminal and the storage device in the distributed storage, is configured to receive a data request of the user terminal, a data storage request, and access the storage device for data access, etc.;
  • the storage device may be distributed storage
  • the background storage device may be composed of a plurality of servers, configured to store data sent by the access device and send corresponding data to the access device in response to the data request;
  • the management device may be in distributed storage.
  • the central node is configured to manage access devices and storage devices in the distributed system, and manage metadata information including resource utilization, data index, and the like.
  • FIG. 1 is a schematic flowchart of a data request processing method according to an embodiment of the present application. As shown in FIG. 1 , the method in the embodiment of the present application is specifically described from the user terminal side, the access device side, and the storage device side, and the method may include the following steps S101 to S105.
  • the user terminal sends, to the access device, a data request that carries data information of the target data.
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device, where the data information may be: a data attribute such as a data name and a data type of the target data.
  • the access device acquires the data request sent by the user terminal, parses and acquires the data request. Data information carried in the data request;
  • the access device acquires the data request sent by the user terminal, and may parse the data request and obtain the data information carried in the data request.
  • the access device searches for the storage device identifier and the first verification information that are associated with the data information, and sends the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the access device searches for the storage device identifier and the first verification information that are associated with the data information.
  • the storage device identifier may be: the management device performs the target data.
  • the device identifier of the storage device that stores the target data according to related information such as resource utilization of the current distributed storage.
  • the device identifier may be a device ID of the storage device, or may be a storage number assigned to the storage device by the management device, or may be a resource identifier assigned to the storage resource when the management device allocates the same storage resource.
  • the storage device identifier herein may be an indication identifier that uniquely locates a serial number, a character string, and the like of a storage device.
  • the first verification information may be: routing information that is selected by the management device in the information pool for the target data to match the target data.
  • the access device may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device performs verification on the first verification information, and obtains the target data indicated by the data information after the verification is passed, and sends the target data to the access device.
  • the storage device receives the data information and the first verification information that are sent by the access device.
  • the storage device may first verify the first verification information.
  • the access device is allowed to access the target data after the first verification information is verified.
  • the S104 may be: after the first verification information is verified, the deposit
  • the storage device queries the target data according to the data information, and sends the queried target data to the access device.
  • the storage device denies the access device from accessing the target data.
  • the storage device may directly return an indication of failure of the acquisition failure to the access device.
  • the storage device may further send prompt information for obtaining data failure to the access device.
  • the prompt information may include: a possible cause of the prompt failure.
  • the first verification information is not verified by the verification; for example, when the information of the first verification information is not complete, the first verification information that is currently provided is incomplete, and when the first verification information does not exist, the current first verification information does not exist, etc. .
  • the access device can forward the prompt information to the user terminal, so that the user terminal can perform adjustment, thereby improving user satisfaction, and on the other hand assisting the user terminal to obtain the data that is desired.
  • the access device acquires the target data sent by the storage device, and sends the target data to the user terminal to respond to the data request. That is, the access device receives the target data from the storage device. After receiving the target data, the target number is sent to the user terminal requesting to read the target data.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation ensures the accuracy and security of the requested data.
  • FIG. 2 a flow diagram of a data request processing method is provided in an embodiment of the present application. As shown in FIG. 2, the method in the embodiment of the present application is specifically described from the user terminal side, the access device side, and the storage device side, and the method may include the following steps S201 to S211.
  • the access device acquires target data sent by the user terminal, and acquires a storage device identifier that is indicated by the management device for the target data.
  • the user terminal may store the target data in the storage device by using the access device in advance.
  • the user terminal can send the target data that needs to be stored currently to the currently connected access device.
  • the target data that needs to be stored here can be the data that will be queried later.
  • the user terminal may back up one or more of the data stored in the phone, the photo, the music or movie that the user likes, and other user data waiting to be stored, based on the user's instruction or based on internal instructions, to the network side.
  • the mobile phone can be properly deleted locally to avoid excessive occupation of the local storage space of the mobile phone.
  • the data stored in the address book and photos waiting to be stored in the distributed storage system will be queried as the target data that the user terminal will subsequently request. Further, the access device receives the target data sent by the user terminal, and after receiving the target data, forwards the target data to a distributed storage platform formed by the plurality of storage devices for storage. At the same time, the access device may also request the management device for the storage device identifier of the storage device storing the data it sends. The management device may indicate the storage device identifier for the target data according to the related information such as the resource utilization in the current distributed storage, and update the data index, and the access device acquires the storage device identifier indicated by the management device. .
  • the access device carries the stored data to be stored by the user terminal, and the management device receives the storage request, and the management device sends a request to the storage request. Then, the storage device storing the information to be stored is selected according to the storage status information related to the storage, such as the storage resource utilization of each storage device, the current available storage resource quantity, the currently available storage resource rate, and the current storage load. And carry this storage request The data to be stored is sent to the selected storage device for storage.
  • the management device also returns a storage response to the storage device; the storage response may be returned to the access device by carrying information such as the storage device identifier. In this way, after receiving the storage response, the access device can consider that the distributed storage of the information specified by the user terminal is completed.
  • the access device sends the target data to a storage device corresponding to the storage device identifier
  • the storage device stores the target data, and acquires second verification information that is sent by the management device and is associated with the target data.
  • the access device may send the target data to a storage device corresponding to the storage device identifier, where the storage device receives the target data sent by the access device, and the target data The data is stored.
  • the second verification information may also be part of the storage response.
  • the management device may send second verification information associated with the target data to the management device, where the second verification information may be: The storage device obtains the second verification information that is sent by the management device.
  • the access device acquires the second verification information that is synchronized by the management device.
  • the management device may further synchronize the second verification information to the access device, where the access device acquires the second verification information that is synchronized by the management device.
  • the user terminal sends, to the access device, a data request that carries data information of the target data.
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device, where the data information may be: a data attribute such as a data name and a data type of the target data.
  • the access device acquires the data request sent by the user terminal, parses and acquires the data request. Data information carried in the data request;
  • the access device acquires the data request sent by the user terminal, and may parse the data request and obtain the data information carried in the data request.
  • the access device searches for the storage device identifier and the first verification information that are associated with the data information, and sends the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the access device searches for the storage device identifier and the first verification information that are associated with the data information.
  • the storage device identifier may be used by the management device to store the target data.
  • the first verification information may be: the only selected by the management device in the information pool for the target data and the target data, according to the related information of the current distributed storage resource utilization and the like. Matching routing information.
  • the access device may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device searches for the second verification information associated with the data information, and matches the first verification information and the second verification information.
  • the storage device may search for the second verification information that is allocated by the management device to the target data in advance, and if the second verification information is found, the storage device may A verification information and the second verification information are matched.
  • the storage device acquires the target data indicated by the data information, and sends the target data to the access device.
  • the storage device allows the access device to access the target data, where the data may be acquired by the storage device.
  • the target data indicated by the information and the target data is sent to the access device.
  • the storage device rejects the access of the access device to the target data, which may specifically be The storage device sends, to the access device, prompt information for failing to obtain data, and the like.
  • the access device acquires the target data sent by the storage device, and sends the target data to the user terminal to respond to the data request.
  • the management device recovers the second verification information, and deletes the second authentication information in the access device and the storage device, respectively.
  • the management device may recover the second verification information to the information.
  • the pool is used for subsequent data storage, and the second verification information in the access device and the storage device is deleted.
  • first verification information and the second verification information related to the embodiment of the present application may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request.
  • the verification information obtained in each process may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request. The verification information obtained in each process.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation guarantees the accuracy of the requested data.
  • the security by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, thereby further realizing the process of acquiring the data, and effectively guaranteeing The accuracy and security of the requested data; by recycling the used second verification information, the verification information can be reused, the resource allocation in the distributed system is optimized, and the availability of the distributed system is improved.
  • FIG. 3 is a schematic flowchart diagram of another data request processing method according to an embodiment of the present application. As shown in FIG. 3, the method in the embodiment of the present application is specifically described from the access device side, and the method may include the following steps S301 to S303.
  • S301 Acquire a data request that is sent by the user terminal and carries the data information of the target data, and parse and obtain the data information carried in the data request.
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device, where the data information may be: a data attribute such as a data name and a data type of the target data.
  • the access device acquires the data request sent by the user terminal, and may parse the data request and obtain the data information carried in the data request.
  • S302 Search for the storage device identifier and the first verification information that are associated with the data information, and send the first verification information and the data information to the storage device corresponding to the storage device identifier.
  • the access device searches for the storage device identifier and the first verification information that are associated with the data information.
  • the storage device identifier may be used by the management device to store the target data.
  • the first verification information may be: the only selected by the management device in the information pool for the target data and the target data, according to the related information of the current distributed storage resource utilization and the like. Matching routing information.
  • the access device may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device may first verify the first verification information, and after the first verification information is verified, the access device is allowed to access the target data, which may be specifically The storage device acquires the target data indicated by the data information, and sends the target data to the access device. It is to be understood that, when the first verification information is not verified, the storage device rejects the access of the access device to the target data, and specifically, the storage device sends the access to the access device. Prompt information for data failure, etc.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation ensures the accuracy and security of the requested data.
  • FIG. 4 a flow chart of still another data request processing method is provided in the embodiment of the present application. As shown in FIG. 4, the method in the embodiment of the present application is specifically described from the access device side, and the method may include the following steps S401-S406.
  • S401 Acquire target data sent by the user terminal, and obtain a storage device identifier that is indicated by the management device for the target data.
  • the user terminal may store the target data in the storage device by using the access device in advance.
  • the user terminal may send the target data that needs to be stored to the current connection.
  • the access device where the access device obtains the target data sent by the user terminal, may request the storage device identifier corresponding to the storage device from the management device, where the management device may use the resource utilization rate in the current distributed storage, and the like.
  • the related information indicates the storage device identifier for the target data, and the data index is updated, and the access device acquires the storage device identifier indicated by the management device.
  • the access device may send the target data to a storage device corresponding to the storage device identifier, where the storage device receives the target data sent by the access device, and the target data The data is stored.
  • the management device may send second verification information associated with the target data to the management device, where the second verification information may be:
  • the storage device obtains the second verification information that is sent by the management device.
  • the management device may further synchronize the second verification information to the access device, where the access device acquires the second verification information that is synchronized by the management device.
  • S404 Acquire a data request that is sent by the user terminal and carry the data information of the target data, and parse and obtain the data information carried in the data request.
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device, where the data information may be: a data attribute such as a data name and a data type of the target data.
  • the access device acquires the data request sent by the user terminal, and may parse the data request and obtain the data information carried in the data request.
  • S405 Search for the storage device identifier and the first verification information that are associated with the data information, and send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the access device searches for the storage device identifier and the first verification information that are associated with the data information.
  • the storage device identifier may be used by the management device to store the target data.
  • the first verification information may be: the only selected by the management device in the information pool for the target data and the target data, according to the related information of the current distributed storage resource utilization and the like. Matching routing information.
  • the access device may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device may search for the second verification information that is allocated by the management device to the target data in advance. If the second verification information is found, the storage device may use the first verification information and The second verification information is matched. When the first verification information and the second verification information are consistent, the storage device allows the access device to access the target data, and specifically, the storage device obtains the indication indicated by the data information. Decoding the target data and transmitting the target data to the access device. When the second verification information is not found, or the first verification information is inconsistent with the second verification information, the storage device rejects the access of the access device to the target data, which may specifically be The storage device sends, to the access device, prompt information for failing to obtain data, and the like.
  • the management device may recover the second verification information to The information pool is used for subsequent data storage, and the second verification information in the access device and the storage device is deleted.
  • first verification information and the second verification information related to the embodiment of the present application may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request.
  • the verification information obtained in each process may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request. The verification information obtained in each process.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the accuracy and security of the requested data are ensured; by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, further realizing The process of data acquisition effectively guarantees the accuracy and security of the requested data.
  • the verification information can be reused and the resource allocation in the distributed system is optimized. Increased availability of distributed systems.
  • FIG. 5 a flow chart of still another data request processing method is provided in the embodiment of the present application. As shown in FIG. 5, the method in the embodiment of the present application is specifically described from the storage device side, and the method may include the following steps S501 to S502.
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device, where the data information may be: a data attribute such as a data name and a data type of the target data.
  • the access device acquires the data request sent by the user terminal, and may parse the data request and obtain the data information carried in the data request.
  • the access device searches for the storage device identifier and the first verification information associated with the data information. It can be understood that the storage device identifier may be used by the management device in the target data.
  • the first verification information may be: the only selected by the management device in the information pool for the target data and the target, according to the related information of the current distributed storage resource utilization and the like. The routing information that the data matches.
  • the access device may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device receives the data information and the first verification information sent by the access device.
  • S502 Verify the first verification information, and obtain the target data indicated by the data information after the verification is passed, and send the target data to the access device.
  • the storage device may perform the verification on the first verification information, and the access device may be allowed to access the target data after the first verification information is verified, which may be the storage device.
  • the access device Obtaining the target data indicated by the data information, and transmitting the target data to the access device.
  • the access device acquires the target data sent by the storage device, and sends the target data to the user terminal to respond to the data request.
  • the storage device rejects the access of the access device to the target data, and specifically, the storage device sends the access to the access device. Prompt information for data failure, etc.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation ensures the accuracy and security of the requested data.
  • FIG. 6 a flowchart of still another data request processing method is provided in the embodiment of the present application. As shown in FIG. 6, the method in the embodiment of the present application is specifically described from the storage device side, and the method may include the following steps S601-S605.
  • the user terminal may store the target data in the storage device by using the access device in advance.
  • the user terminal may send the target data that needs to be stored to the currently connected access device, where the access is performed.
  • the device obtains the target data sent by the user terminal, and may request the storage device identifier corresponding to the storage device from the management device, where the management device may indicate the storage device according to the resource utilization and other related information in the current distributed storage. Identifying, simultaneously updating the data index, the access device acquiring the storage device identifier indicated by the management device.
  • the access device may send the target data to a storage device corresponding to the storage device identifier, where the storage device receives the target data sent by the access device.
  • S602. Store the target data, and acquire second verification information that is sent by the management device and is associated with the target data.
  • the storage device stores the target data, and after storing the target data, sending, to the management device, second verification information associated with the target data, the second The verification information may be: routing information that is uniquely matched with the target data, and the storage device acquires the second verification information that is sent by the management device.
  • the management device may further synchronize the second verification information to the access device, where the access device acquires the second verification information that is synchronized by the management device.
  • the user terminal may send, to the currently connected access device, a data request that carries data information of the target data, where the data information may be: a data name of the target data, Data attributes such as data types.
  • the access device acquires the data request sent by the user terminal, and may parse the data request and obtain the data information carried in the data request.
  • the access device searches for the storage device identifier and the first verification information associated with the data information. It can be understood that the storage device identifier may be used by the management device in the process of storing the target data.
  • the first verification information may be: the routing information that the management device selects in the information pool that matches the target data, and the routing information that is selected by the management device for the target data. .
  • the access device may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device receives the data information and the first verification information sent by the access device.
  • the storage device may search for the second verification information that is allocated by the management device to the target data in advance, and if the second verification information is found, the storage device may A verification information and the second verification information are matched.
  • the storage device allows the access device to access the target data, where the data may be acquired by the storage device.
  • the target data indicated by the information and the target data is sent to the access device.
  • the access device acquires the target data sent by the storage device, and sends the target data to the user terminal to respond to the data request.
  • the storage device rejects the access of the access device to the target data, which may specifically be The storage device sends, to the access device, prompt information for failing to obtain data, and the like.
  • the management device may recover the second verification information to The information pool is used for subsequent data storage, and the second verification information in the access device and the storage device is deleted.
  • first verification information and the second verification information related to the embodiment of the present application may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request.
  • the verification information obtained in each process may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request. The verification information obtained in each process.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the accuracy and security of the requested data are ensured; by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, further realizing The process of data acquisition effectively guarantees the accuracy and security of the requested data.
  • the verification information can be reused and the resource allocation in the distributed system is optimized. Increased availability of distributed systems.
  • the access device provided by the embodiment of the present application is described in detail below with reference to FIG. 7 and FIG. It should be noted that the access device shown in FIG. 7 and FIG. 8 is used to perform the method of the embodiment shown in FIG. 3 and FIG. 4 of the present application. For the convenience of description, only the embodiment of the present application is shown. For the part that is not disclosed in the specific technical details, please refer to the figures shown in Figure 3 and Figure 4 of the present application. Example.
  • FIG. 7 is a schematic structural diagram of an access device according to an embodiment of the present application.
  • the access device 1 of the embodiment of the present application may include: a data information acquiring unit 11, an information transmitting unit 12, and a first data transmitting unit 13.
  • the data information acquiring unit 11 is configured to acquire a data request that is sent by the user terminal and carry the data information of the target data, and parse and obtain the data information carried in the data request;
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device 1, and the data information may be: a data attribute such as a data name and a data type of the target data.
  • the data information obtaining unit 11 acquires the data request sent by the user terminal, and may parse the data request and acquire the data information carried in the data request.
  • the information sending unit 12 is configured to search for the storage device identifier and the first verification information associated with the data information, and send the first verification information and the data information to the storage device corresponding to the storage device identifier;
  • the information sending unit 12 searches for the storage device identifier and the first verification information associated with the data information, it being understood that the storage device identifier may be the management device at the target
  • the first verification information may be selected according to the information about the current distributed storage resource utilization and the like, and the first verification information may be selected by the management device for the target data in the information pool.
  • the routing information that the target data matches.
  • the information sending unit 12 may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device receives the data information sent by the access device 1 and the first verification information.
  • the storage device may first verify the first verification information, when the first After the authentication information is verified, the access device 1 is allowed to access the target data, and specifically, the target data indicated by the data information may be acquired by the storage device, and The target data is sent to the access device 1. It is to be understood that, when the first verification information is not verified, the storage device rejects the access of the access device 1 to the target data, and specifically, the storage device may be the access device 1 Send a message indicating that data acquisition failed.
  • the first data sending unit 13 is configured to acquire the target data sent by the storage device, and send the target data to the user terminal in response to the data request.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation ensures the accuracy and security of the requested data.
  • FIG. 8 is a schematic structural diagram of another access device according to an embodiment of the present application.
  • the access device 1 of the embodiment of the present application may include: a data information acquiring unit 11, an information sending unit 12, a first data sending unit 13, an identifier obtaining unit 14, a second data sending unit 15, and The verification information acquisition unit 16 is provided.
  • the identifier obtaining unit 14 is configured to acquire target data sent by the user terminal, and acquire a storage device identifier that is indicated by the management device for the target data;
  • the user terminal may store the target data in the storage device by using the access device 1 in advance. Alternatively, the user terminal may send the target data that needs to be stored to the currently connected access device 1 .
  • the identifier obtaining unit 14 acquires that the user terminal sends
  • the target data of the storage device may be requested by the management device, and the management device may indicate the storage device identifier for the target data according to the resource utilization and other related information in the current distributed storage, and update the data index.
  • the identifier obtaining unit 14 acquires the storage device identifier indicated by the management device.
  • the second data sending unit 15 is configured to send the target data to a storage device corresponding to the storage device identifier
  • the verification information obtaining unit 16 is configured to acquire the second verification information that is synchronized by the management device;
  • the second data sending unit 15 may send the target data to a storage device corresponding to the storage device identifier, where the storage device receives the target data sent by the access device 1 And storing the target data.
  • the management device may send second verification information associated with the target data to the management device, where the second verification information may be:
  • the storage device obtains the second verification information that is sent by the management device.
  • the management device may further synchronize the second verification information to the access device 1, and the verification information obtaining unit 16 acquires the second verification information that is synchronized by the management device.
  • the data information acquiring unit 11 is configured to acquire a data request that is sent by the user terminal and carry the data information of the target data, and parse and obtain the data information carried in the data request;
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device 1, and the data information may be: a data attribute such as a data name and a data type of the target data.
  • the data information obtaining unit 11 acquires the data request sent by the user terminal, and may parse the data request and acquire the data information carried in the data request.
  • the information sending unit 12 is configured to search for a storage device identifier associated with the data information And the first verification information, and the first verification information and the data information are sent to the storage device corresponding to the storage device identifier;
  • the information sending unit 12 searches for the storage device identifier and the first verification information associated with the data information, it being understood that the storage device identifier may be the management device at the target
  • the first verification information may be selected according to the information about the current distributed storage resource utilization and the like, and the first verification information may be selected by the management device for the target data in the information pool.
  • the routing information that the target data matches.
  • the information sending unit 12 may send the first verification information and the data information to a storage device corresponding to the storage device identifier.
  • the storage device may search for the second verification information that is allocated by the management device to the target data in advance. If the second verification information is found, the storage device may use the first verification information and The second verification information is matched. When the first verification information and the second verification information are consistent, the storage device allows the access device 1 to access the target data, where the storage device may obtain the indication of the data information. The target data is sent to the access device 1. When the second verification information is not found, or the first verification information is inconsistent with the second verification information, the storage device rejects the access of the access device 1 to the target data, which may be specifically The storage device sends prompt information for obtaining data failure to the access device 1 and the like.
  • the first data sending unit 13 is configured to acquire the target data sent by the storage device, and send the target data to the user terminal in response to the data request.
  • the management device may recover the second verification information to The information pool is used for subsequent data storage, and the second verification information in the access device 1 and the storage device is deleted.
  • first verification information and the second verification information related to the embodiment of the present application may be The same authentication information is used, and the "first" and “second” naming methods are only used to distinguish the verification information obtained in the two processes of data storage and data request.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the accuracy and security of the requested data are ensured; by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, further realizing The process of data acquisition effectively guarantees the accuracy and security of the requested data.
  • the verification information can be reused and the resource allocation in the distributed system is optimized. Increased availability of distributed systems.
  • FIG. 9 is a schematic structural diagram of still another access device according to an embodiment of the present application.
  • the access device 1000 can include at least one processor 1001, such as a CPU, at least one network interface 1004, a user interface 1003, a memory 1005, and at least one communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between these components.
  • the user interface 1003 can include a display and a keyboard.
  • the optional user interface 1003 can also include a standard wired interface and a wireless interface.
  • the network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the memory 1005 may be at least one located away from the foregoing The storage device of the processor 1001.
  • an operating system, a network communication module, a user interface module, and a data request application may be included in the memory 1005 as a computer storage medium.
  • the user interface 1003 is mainly used to provide an input interface for the user to obtain data input by the user;
  • the network interface 1004 is mainly used for data communication with the user terminal, the storage device, and the management device;
  • the processor 1001 can be used to call the data request application stored in the memory 1005, and specifically perform the following operations:
  • the processor 1001 performs the following operations before performing the data request for acquiring the data information of the target data sent by the user terminal:
  • the access device acquires the number of targets carried by the user terminal.
  • the storage device identifier associated with the data information may be obtained, and the first set first verification information associated with the data information may be acquired, and the first verification information and the data information are obtained by the access device.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the accuracy and security of the requested data are ensured; by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, further realizing The process of data acquisition effectively guarantees the accuracy and security of the requested data.
  • FIG. 10 to FIG. 12 is used to perform the method of the embodiment shown in FIG. 5 and FIG. 6 of the present application.
  • FIG. 5 and FIG. 6 of the present application are shown. In part, specific technical details are not disclosed, please refer to the embodiment shown in FIG. 5 and FIG. 6 of the present application.
  • FIG. 10 is a schematic structural diagram of a storage device according to an embodiment of the present application.
  • the storage device 2 of the embodiment of the present application may include: an information acquiring unit 21 and a data sending unit 22.
  • the information acquiring unit 21 is configured to acquire data information of target data sent by the access device and first verification information associated with the data information;
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device, where the data information may be: a data attribute of the target data, a data type, and the like.
  • the data information may be: a data attribute of the target data, a data type, and the like.
  • the access device searches for the storage device identifier and the first verification information associated with the data information. It can be understood that the storage device identifier may be used by the management device in the process of storing the target data.
  • the first verification information may be: the routing information that the management device selects in the information pool that matches the target data, and the routing information that is selected by the management device for the target data. .
  • the access device may send the first verification information and the data information to the storage device 2 corresponding to the storage device identifier.
  • the information acquiring unit 21 receives the data information and the first verification information that are sent by the access device.
  • the data sending unit 22 is configured to verify the first verification information, and obtain the target data indicated by the data information after the verification is passed, and send the target data to the access device;
  • the data sending unit 22 may first verify the first verification information, and allow the access device to access the target data after the first verification information is verified, which may be specifically The data sending unit 22 acquires the target data indicated by the data information, and sends the target data to the access device.
  • the access device acquires the target data sent by the storage device 2, and sends the target data to the user terminal to respond to the data request.
  • the data sending unit 22 rejects the access of the access device to the target data, and specifically, the data sending unit 22 may The incoming device sends a prompt message for failure to obtain data.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed Target data Returning to the access device, the target device finally transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the situation ensures the accuracy and security of the requested data.
  • FIG. 11 is a schematic structural diagram of another storage device according to an embodiment of the present application.
  • the storage device 2 of the embodiment of the present application may include: an information acquiring unit 21, a data transmitting unit 22, a data receiving unit 23, and a data storage unit 24.
  • the data receiving unit 23 is configured to receive target data that is sent by the access device according to the storage device identifier indicated by the management device;
  • the user terminal may store the target data in the storage device 2 through the access device in advance.
  • the user terminal may send the target data that needs to be stored to the currently connected access device.
  • the access device obtains the target data sent by the user terminal, and may request the storage device identifier corresponding to the storage device 2 from the management device, where the management device may use the related information such as resource utilization in the current distributed storage as the target.
  • the data indicates the storage device identifier, and the data index is updated, and the access device acquires the storage device identifier indicated by the management device.
  • the access device may send the target data to the storage device 2 corresponding to the storage device identifier, and the data receiving unit 23 receives the target data sent by the access device.
  • the data storage unit 24 is configured to store the target data, and acquire second verification information that is sent by the management device and is associated with the target data;
  • the data storage unit 24 stores the target data, and after storing the target data, sends second verification information associated with the target data to the management device,
  • the second verification information may be: routing information that is uniquely matched with the target data, and the data storage unit 24 acquires the second verification sent by the management device information.
  • the management device may further synchronize the second verification information to the access device, where the access device acquires the second verification information that is synchronized by the management device.
  • the information acquiring unit 21 is configured to acquire data information of target data sent by the access device and first verification information associated with the data information;
  • the user terminal may send a data request carrying the data information of the target data to the currently connected access device, where the data information may be: a data attribute of the target data, a data type, and the like.
  • the access device acquires the data request sent by the user terminal, and may parse the data request and obtain the data information carried in the data request.
  • the access device searches for the storage device identifier and the first verification information associated with the data information. It can be understood that the storage device identifier may be used by the management device in the process of storing the target data.
  • the first verification information may be: the routing information that the management device selects in the information pool that matches the target data, and the routing information that is selected by the management device for the target data. .
  • the access device may send the first verification information and the data information to the storage device 2 corresponding to the storage device identifier.
  • the information acquiring unit 21 receives the data information and the first verification information that are sent by the access device.
  • the data sending unit 22 is configured to verify the first verification information, and obtain the target data indicated by the data information after the verification is passed, and send the target data to the access device;
  • the data sending unit 22 may first verify the first verification information, and allow the access device to access the target data after the first verification information is verified, which may be specifically
  • the data sending unit 22 acquires the target data indicated by the data information, and sends the target data to the access device. Obtaining, by the access device, the target data sent by the storage device 2, and sending the target data to the user terminal In response to the data request.
  • the data sending unit 22 rejects the access of the access device to the target data, and specifically, the data sending unit 22 may The incoming device sends a prompt message for failure to obtain data.
  • FIG. 12 is a schematic structural diagram of a data sending unit according to an embodiment of the present application.
  • the data sending unit 22 may include:
  • the information matching subunit 221 is configured to search for the second verification information associated with the data information, and match the first verification information and the second verification information;
  • the information matching sub-unit 221 may search for the associated second verification information that is allocated by the management device to the target data in advance, and if the second verification information is found, the information matches.
  • the subunit 221 may match the first verification information and the second verification information.
  • the data sending sub-unit 222 is configured to: when the first verification information and the second verification information match, acquire the target data indicated by the data information, and send the target data to the access device ;
  • the data sending sub-unit 222 allows the access device to access the target data, which may be the data.
  • the sending subunit 222 acquires the target data indicated by the data information, and sends the target data to the access device.
  • the access device acquires the target data sent by the storage device 2, and sends the target data to the user terminal to respond to the data request.
  • the data sending subunit 222 denies the access device from accessing the target data, specifically The data sending subunit 222 may send, to the access device, prompt information for obtaining data failure, and the like.
  • the management device may recover the second verification information.
  • the information is used in the information pool for subsequent data storage, and the second verification information in the access device and the storage device 2 is deleted.
  • first verification information and the second verification information related to the embodiment of the present application may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request.
  • the verification information obtained in each process may be the same verification information, and the “first” and “second” naming manners are only used to distinguish between data storage and data request. The verification information obtained in each process.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the accuracy and security of the requested data are ensured; by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, further realizing The process of data acquisition effectively guarantees the accuracy and security of the requested data.
  • the verification information can be reused and the resource allocation in the distributed system is optimized. Increased availability of distributed systems.
  • FIG. 13 is a schematic structural diagram of still another storage device according to an embodiment of the present application.
  • the storage device 2000 may include at least one processor 2001, such as a CPU, at least one network interface 2004, a user interface 2003, a memory 2005, and at least one communication bus 2002.
  • the communication bus 2002 is used to implement connection communication between these components.
  • the user interface 2003 may include a display, a keyboard, and the optional user interface 2003 may also include a standard wired interface and a wireless interface.
  • Network interface 2004 may optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
  • the memory 2005 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the memory 2005 can optionally also be at least one storage device located remotely from the aforementioned processor 2001. As shown in FIG. 13, an operating system, a network communication module, a user interface module, and a data request application may be included in the memory 2005 as a computer storage medium.
  • the user interface 2003 is mainly used to provide an input interface for the user to acquire data input by the user;
  • the network interface 2004 is mainly used for data communication with the access device and the management device; and the processor 2001 can be used to call the data request application stored in the memory 2005, and specifically perform the following operations:
  • the processor 1001 further performs the following operations before performing the acquiring the data information of the target data sent by the access device and the first verification information associated with the data information:
  • Target data sent by the storage device identifier indicated by the management device where the target data is data sent by the user terminal to the access device
  • the processor 1001 performs verification on the first verification information, and acquires the target data indicated by the data information after the verification is passed, and sends the target data to the connection.
  • the processor 1001 performs verification on the first verification information, and acquires the target data indicated by the data information after the verification is passed, and sends the target data to the connection.
  • the target data indicated by the data information is acquired, and the target data is sent to the access device.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the accuracy and security of the requested data are ensured; by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, further realizing The process of data acquisition effectively guarantees the accuracy and security of the requested data.
  • FIG. 14 is a schematic structural diagram of a data request processing system according to an embodiment of the present application.
  • the system may include a user terminal, an access device, and a storage device, and the user terminal and the access device and the access device and the storage device may be connected to each other through a network, where the access device Specifically, the access device 1 of the embodiment shown in FIG. 7 or FIG. 8 stores The device is specifically the storage device 2 of the embodiment shown in FIG. 10 or FIG. 12, or the access device may be the access device 1000 of the embodiment shown in FIG. 2000.
  • the user terminal is configured to send, to the access device, a data request that carries data information of the target data;
  • the access device is configured to acquire the data request sent by the user terminal, and parse and obtain the data information carried in the data request;
  • the access device is further configured to: search for a storage device identifier and first verification information associated with the data information, and send the first verification information and the data information to a storage corresponding to the storage device identifier. device;
  • the storage device is configured to verify the first verification information, and obtain the target data indicated by the data information after the verification is passed, and send the target data to the access device;
  • the access device is further configured to acquire the target data sent by the storage device, and send the target data to the user terminal to respond to the data request.
  • system further includes: a management device, where the user terminal is configured to send the data request carrying the data information of the target data to the access device, and further includes:
  • the access device is configured to acquire target data sent by the user terminal, and obtain a storage device identifier that is indicated by the management device for the target data;
  • the access device is further configured to send the target data to a storage device corresponding to the storage device identifier;
  • the storage device is configured to store the target data, and acquire second verification information that is sent by the management device and is associated with the target data;
  • the access device is further configured to acquire the second verification information that is synchronized by the management device.
  • the storage device is configured to verify the first verification information, Obtaining, by the verification, the target data indicated by the data information, and sending the target data to the access device, configured to: search for the second verification information associated with the data information, And matching the first verification information and the second verification information; when the first verification information and the second verification information match, acquiring the target data indicated by the data information, The target data is sent to the access device.
  • the method further includes:
  • the management device is configured to: when the target data is removed in the storage device, recover the second verification information, and delete the second verification in the access device and the storage device respectively information.
  • the access device may obtain the storage device identifier associated with the data information when acquiring the data request of the data information carrying the target data sent by the user terminal, and may also acquire the data device information associated with the data information. And sending, by the access device, the first verification information and the data information to the storage device corresponding to the storage device identifier, for the storage device to verify the first verification information, and indicating the data information after the verification is passed The target data is returned to the access device, and finally the target device transmits the target data to the user terminal in response to the data request.
  • the first verification information associated with the data information of the requested data is added, and the requested data can be acquired after the first verification information is passed, thereby avoiding the acquisition of the erroneous data due to data transfer or other new data replacement.
  • the accuracy and security of the requested data are ensured; by assigning the second verification information to the target data in advance, the first verification information and the second verification information can be matched in the subsequent data request, further realizing The process of data acquisition effectively guarantees the accuracy and security of the requested data.
  • the verification information can be reused and the resource allocation in the distributed system is optimized. Increased availability of distributed systems.
  • the embodiment provides a data request processing method, which is applied to an access device, and includes:
  • Step S710 Receive a data request that is sent by the user terminal and that carries the first identifier.
  • the data request is: a storage request of the storage target data or a read request of the read target data, where the first identifier is the user client.
  • Step S720 Perform a preset process on the first identifier to obtain a first storage device identifier, where the first storage device identifier is: a device identifier of a storage device that stores the target data;
  • Step S730 Acquire first verification information that performs storage verification on the access device.
  • Step S740 Send the data request and the first verification information to the corresponding storage device according to the identifier of the first storage device, where the first verification information is used by the corresponding storage device to access the The device performs storage verification, and the data request is used to trigger the corresponding storage device to perform a data request response after being verified by the storage;
  • Step S750 Receive a processing result of the data request returned by the corresponding storage device.
  • Step S760 Return a response result of the data request to the user terminal according to the processing result.
  • the access device provided by the embodiment of the present invention is a device that can be accessed by the user terminal to the network where the storage device is located.
  • the storage device corresponding to the access device may be a storage device that is similar to the access device in physical space or in a topological space.
  • the access device and the user terminal can establish a data connection.
  • the user terminal may send a data request to the access device according to its own needs.
  • the data request here includes a storage request requesting storage of data, and a read request requesting reading of data.
  • the data to be stored or the data to be read in this embodiment are the target data pointed to by this data request.
  • the user terminal Before requesting the storage of the data, the user terminal generates an identifier that identifies the target data storage based on the preset rule.
  • the identifier is referred to as the first identifier in this embodiment, and can be used as a subsequent user.
  • the terminal queries or operates the identifier of the target data.
  • the first identifier is carried in either the storage request or the read request. In some cases, the first identification may be referred to as a key that operates the target data.
  • the access device after receiving the data request carrying the first identifier.
  • the first identifier is subjected to a preset process, for example, a function processing is performed on the first identifier, where the function may be a hash function, and the first identifier is hashed.
  • the first identifier may be hashed by using the MD5 algorithm, and the obtained function value has a corresponding relationship with the storage device identifier of the storage device.
  • the function value itself may directly be used as the storage device identifier.
  • the storage device identifier obtained by the processing of the first identifier is the first storage device identifier.
  • the first storage device identifier herein may be a device identifier of the storage device storing the target data or the target data.
  • the device identifier may be an International Device Identity (IMEI), or a Network Protocol (IP) address, or a storage logical address assigned by the management device, such as a sequence and/or a character string of the identification device.
  • IMEI International Device Identity
  • IP Network Protocol
  • the access device After determining the first storage device identifier of the storage device that responds to the data request, the access device needs to send the data request to the corresponding storage device.
  • the first verification information for performing storage verification on the access device is also synchronously sent.
  • the first verification information is verification information specific to the access device.
  • the data request from the user terminal A and the user terminal B sends the same first verification information to the storage device.
  • the storage device corresponding to the first storage device identifier receives not only the data request but also the first verification information for the access device.
  • the storage device first verifies the first verification information before responding to the data request. If the access device is abnormal, the correct first authentication information may not be provided, which may cause the storage verification to fail. If the storage verification fails, the storage device refuses to respond to the data request, thereby storing the data or reading. By taking data, problems such as data processing errors caused by abnormal access devices and leaks caused by data error readings can be avoided.
  • the first verification information is for the access device, not for the target data or the data request.
  • the data request response by one access device may only need one
  • the number of verification information is small, and it is not necessary to separately allocate corresponding verification information for each target data or data request for storage verification.
  • the first verification information is for the access device. If the access device sends the fault to the storage device, the first verification information may not be verified, and the access device may be processed.
  • An error write caused by an abnormality for example, an error is written in a storage device that the access device does not have permission to write, causing the corresponding storage device to cover the data written by other access devices in response to its write operation. Improve the reliability and robustness of data storage.
  • the obtaining the first verification information in step S730 may include: querying the first verification information locally in the access device, or the access device generates the first verification according to a certain generation parameter according to a preset manner. information.
  • the verification information may be generated in the same manner for the storage verification of the access device.
  • the storage device processes the data request accordingly to form a processing result.
  • the processing result in this embodiment includes: a first type of processing result and a second type of processing result.
  • the first type of processing result is used to indicate whether to respond to the data request according to whether the storage verification is passed.
  • the first type of processing result includes at least: verification failure.
  • the second type of processing result is used to indicate a processing result of the target data after the storage verification is passed.
  • the second type of processing result includes: storage success or storage in response to the storage request The result of the failure processing.
  • the second type of storage result further includes: a processing result including the target data returned in response to the success of the read request, and a processing result when the target data is not successfully read in response to the read request.
  • the step S750 may include: after receiving the second type of processing result, the access device may directly return the second type of result as a final response result of the data request to the user terminal.
  • the step S750 may include: after the access device receives the first type of processing result, the access device may perform the steps S720 to S750 again until the second device is received from the storage device.
  • the result of the class processing, or repeating the steps S720 to S750 for a predetermined number of times, after the predetermined number of times has not passed the verification, the result of the response failure is directly returned to the user terminal.
  • the access device may directly forward the processing result to the user terminal.
  • the access device When the data request is a storage request, the access device sends the target data to be stored to the storage device for storage by the storage device in step S740.
  • the access device receives the carry in step S750. There is processing result of the target data.
  • the first verification information includes: first routing information that is sent by the management device to the access device, where the first routing information is: the management device is allocated according to the Information generated by the storage area of the device.
  • the first routing information may include: a storage address allocated to a starting sub-area of a storage area of the access device, and/or a storage address of a terminating sub-area of the storage area, and the like.
  • the first routing information may be directly the storage address of the starting sub-area and the storage address of the terminating sub-area, or may be information generated by processing the storage address or the like by using various functions such as a hash algorithm. And may also be allocated to the entire storage area of the access device Storage address, etc.
  • the first routing information may not only inform the access device, but the related information allocated by the current management device to the storage area is also used as the first verification information.
  • the management device can notify the access device of the first verification information without additionally sending the information, and implements information multiplexing on the one hand, and does not need additional signaling overhead for increasing information interaction on the other hand. Strong technical compatibility.
  • the method further includes:
  • the identifier of the first storage device is a preset storage device identifier, where the preset storage device identifier is a device that is allocated to the storage device for data storage of the access device Identification
  • the step S740 may include: when the first storage device identifier is the preset storage device identifier, sending the data request and the first verification information to the storage device corresponding to the first storage device identifier.
  • the first storage device identifier obtained by the processing of the first identifier is obviously not located in the storage area corresponding to the first routing information, indicating that the access device does not have the operation authority for the data or the access device is in the calculation. If an error occurs in the process of identifying the first storage device, or at least one of the access device and the user terminal fails, the data request may not be sent to the storage device to reduce the storage device. The invalid load of the data request.
  • the method further includes:
  • the management device Receiving, by the management device, the first storage configuration information that is sent by the management device, where the first storage configuration information includes at least: the first verification information or the generation information of the first verification information.
  • the first storage configuration information includes the first verification information or the generation information of the first verification information.
  • the generating information herein may include: generating a policy and generating a parameter; performing data processing on the generated parameter by using the generating policy, and obtaining the first verification information.
  • the first storage configuration information may also directly carry the first verification information. For example, when the first verification information is the first routing information, the first storage configuration information may directly include the first routing information.
  • the embodiment provides a data request processing method, which is applied to a storage device, and includes:
  • Step S810 Receive a data request of the user terminal and first verification information corresponding to the access device from the access device.
  • Step S820 Perform storage verification on the access device based on the first verification information.
  • Step S830 When the storage verification is performed based on the first verification information, respond to the data request to obtain a processing result;
  • Step S840 Return the processing result to the access device.
  • the data request processing method provided in this embodiment is a method applied to a storage device.
  • the storage device also receives the first verification information for the access device while receiving the data request received by the access device.
  • the access device Before responding to the data request, the access device needs to perform storage verification based on the first verification information. If the storage verification is passed, the data request is responded to. In this case, the data request response is performed only when the access device itself is determined to be normal, and at least the abnormality of the access device is solved. The problem of storing exceptions and reading exceptions.
  • the method further includes:
  • the step S820 may include: matching the first verification information and the second verification information; and when the first verification information and the second verification information are consistent, determining that the storage verification is passed.
  • the storage device is configured in advance from the management device for the second storage configuration information of the access device.
  • the obtaining the second verification information based on the second storage configuration information may include: directly extracting the second verification information from the second storage configuration information. Or generating the second verification information according to the second storage configuration information.
  • the generation processing may be performed based on the generation parameter and the generation rule to obtain the second storage configuration information.
  • the generation parameters and the generation rules received by the storage device are consistent with the generation parameters and generation rules received by the access device from the management device.
  • step S820 the first verification information and the second verification information are matched. If the two verification information matches are known, the storage verification passes, otherwise the storage verification may be considered different.
  • the obtaining the second verification information based on the second storage configuration information may include: obtaining, according to the second storage configuration information, second routing information corresponding to the access device, where The second routing information is generated by the storage device according to a storage area allocated by the management device to the access device.
  • the step S820 may include: matching the first routing information and the second routing information, and performing storage verification according to the matching result.
  • the step S830 may include:
  • the target data is stored when the verification is performed by the storage based on the first verification information
  • the storage record includes a storage location of the target data and a correspondence between the first identifiers, so that if the user terminal queries the target data, the first identifier is received.
  • the storage record may be queried according to the first identifier, and the target data is read to a corresponding storage location based on the corresponding relationship in the storage record, and the target data is returned to the access device.
  • the step S830 may include:
  • the embodiment further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used in a data request processing method provided by one or more of the foregoing technical solutions, for example, executable At least one of the data request processing methods shown in FIGS. 1 to 5 and 8 to 9.
  • the computer storage medium may be a storage medium such as a read only memory, a random access memory, a flash memory, a mobile hard disk or an optical disk, and the computer storage medium may be a non-transitory storage medium.
  • a processing device is provided by the embodiment of the present invention.
  • the processing device is an access device or a storage device, and includes:
  • transceiver for data interaction with other devices
  • a memory for storing data
  • a processor respectively connected to the transceiver and the memory, for implementing a data request processing method as shown in FIG. 1 to FIG. 5 and FIG. 8 to FIG. 9 by executing a computer program located on the memory At least one of them.
  • the transceiver may include: various types of network interfaces, and the network interfaces may include: an optical cable interface, a cable interface, a transceiver antenna, and the like.
  • the transceiver can be used for data interaction.
  • the memory can be used for the storage of various information.
  • the processor can be a central processing unit, a microprocessor, a digital signal processor, an application processor, a programmable array, or an application specific integrated circuit.
  • the processor may be connected to the memory and the transceiver through a bus interface such as an integrated circuit bus, and used to implement the data request processing method provided by the one or more technical solutions by executing computer executable instructions such as a computer program. of.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage device includes the following steps: the foregoing storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk or an optical disk.
  • optical disk A medium that can store program code.
  • the above integrated unit of the present application is implemented in the form of a software functional module and Separate products can also be stored on a computer readable storage medium when sold or used.
  • the technical solution of the embodiments of the present application may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a magnetic disk, or an optical disk.
  • the technical solution provided in the embodiment of the present application determines the storage device identifier of the storage device according to the data information or the first identifier, and obtains the first verification information, and sends the first verification information to the corresponding storage device, where the storage device is By verifying and responding, verification ensures the reliability of data processing and has a positive industrial effect. At the same time, it can be realized by setting corresponding computer executable instructions in the storage device, the access device, and the management device, thereby being industrially achievable.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本申请实施例公开一种数据请求处理方法及其系统、接入设备、存储设备,其中方法包括如下步骤:用户终端向接入设备发送携带有目标数据的数据信息的数据请求;接入设备获取用户终端发送的数据请求,解析并获取数据请求中携带的数据信息;接入设备查找与数据信息相关联的存储设备标识和第一验证信息,并将第一验证信息和数据信息发送至存储设备标识对应的存储设备;存储设备对第一验证信息进行验证,并在验证通过后获取数据信息指示的目标数据,将目标数据发送至接入设备;接入设备获取存储设备发送的目标数据,并将目标数据发送至用户终端以响应数据请求。本申请实施例还提供了一种计算机存储介质。

Description

数据请求处理方法及其系统、接入设备、存储设备
本申请基于申请号为201610821976.4、申请日为2016年09月13日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及互联网技术领域,尤其涉及一种数据请求处理方法及其系统、接入设备、存储设备。
背景技术
随着互联网技术不断的开发和完善,由于分布式存储的方式具有良好的扩展性和容灾性,因此在大数据的网络环境下普遍采用分布式存储的方式对数据进行存储。然而,现有的在分布式存储的存储设备中请求数据的过程为:用户终端向接入设备请求数据,接入设备中同步有该数据对应的存储设备信息,可以依据该存储设备信息访问对应的存储设备以获取该数据并返回至用户终端。然而在具体实现时,依然存在接入设备无法获取到用户终端指定的数据,或者,获取的数据并非用户终端请求的数据的现象。这样就导致,数据请求的响应准确率低以及成功率低的问题。此外,由于返回的数据错误,但是被返回的数据是其他用户的数据,导致数据的泄露,从而还有数据安全性低的问题。
发明内容
本申请实施例提供一种数据请求处理方法及其系统、接入设备、存储 设备,可以提升所请求数据的准确性,保证数据存储的安全性。
本申请实施例第一方面提供了一种数据请求处理方法,可包括:
用户终端向接入设备发送携带有目标数据的数据信息的数据请求;
所述接入设备获取用户终端发送的所述数据请求,解析并获取所述数据请求中携带的数据信息;
所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
所述接入设备获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
本申请实施例第二方面提供了一种数据请求处理方法,可包括:
获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备,以使所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
本申请实施例第三方面提供了一种数据请求处理方法,可包括:
获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息,所述数据信息为所述接入设备解析用户终端发送的数据 请求所获取的信息,所述第一验证信息为所述接入设备根据所述数据信息查找的相关联的信息;
对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备,以使所述接入设备获取所述存储设备发送的所述目标数据,使所述接入设备将所述目标数据发送至所述用户终端以响应所述数据请求。
本申请实施例第四方面提供了一种接入设备,可包括:
数据信息获取单元,配置为获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
信息发送单元,配置为查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备,以使所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
第一数据发送单元,配置为获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
本申请实施例第五方面提供了一种存储设备,可包括:
信息获取单元,配置为获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息,所述数据信息为所述接入设备解析用户终端发送的数据请求所获取的信息,所述第一验证信息为所述接入设备根据所述数据信息查找的相关联的信息;
数据发送单元,配置为对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备,以使所述接入设备获取所述存储设备发送的所述目标数据,使所述接入设备将所述目标数据发送至所述用户终端以响应所述数据请求。
本申请实施例第六方面提供了一种数据请求处理系统,可包括:用户终端、接入设备以及存储设备;其中,
所述用户终端,配置为向所述接入设备发送携带有目标数据的数据信息的数据请求;
所述接入设备,配置为获取用户终端发送的所述数据请求,解析并获取所述数据请求中携带的数据信息;
所述接入设备,还配置为查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
所述存储设备,配置为对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
所述接入设备,还配置为获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
本申请实施例第七方面提供了一种数据请求处理方法,应用于接入设备中,包括:
接收用户终端发送的携带第一标识的数据请求;其中,所述数据请求为:存储目标数据的存储请求或读取目标数据的读取请求,所述第一标识为所述用户客户端按照预设规则生成的,与所述目标数据存储相关的标识;
对所述第一标识进行预设处理,以获得第一存储设备标识,其中,所述第一存储设备标识为:存储所述目标数据的存储设备的设备标识;
获取对所述接入设备进行存储验证的第一验证信息;
根据所述第一存储设备标识,向对应的存储设备发送所述数据请求及所述第一验证信息,其中,所述第一验证信息,用于对应的存储设备对所述接入设备进行存储验证,所述数据请求,用于触发对应的存储设备在通 过所述存储验证后进行数据请求响应;
接收对应的存储设备返回的所述数据请求的处理结果;
根据所述处理结果向所述用户终端返回所述数据请求的响应结果。
本申请实施例第八方面提供一种数据请求处理方法,应用于存储设备中,包括:
从接入设备接收用户终端的数据请求及所述接入设备对应的第一验证信息;
基于所述第一验证信息对所述接入设备进行存储验证;
当基于所述第一验证信息通过所述存储验证时,响应所述数据请求,以获得处理结果;
将所述处理结果返回给所述接入设备。
本申请实施例第八方面提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行前述一个或多个技术方案提供的数据请求处理方法。
本申请实施例第九方面提供一种处理设备,所述处理设备为接入设备或存储设备,包括:
收发器,用于与其他设备进行数据交互;
存储器,用于存储数据;
处理器,分别与所述收发器及所述存储器连接,用于通过执行位于所述存储器上的计算机程序,实现前述一个或多个技术方案提供的数据请求处理方法。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供 存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种数据请求处理方法的流程示意图;
图2是本申请实施例提供的一种数据请求处理方法的流程时序图;
图3是本申请实施例提供的另一种数据请求处理方法的流程示意图;
图4是本申请实施例提供的又一种数据请求处理方法的流程示意图;
图5是本申请实施例提供的又一种数据请求处理方法的流程示意图;
图6是本申请实施例提供的又一种数据请求处理方法的流程示意图;
图7是本申请实施例提供的一种接入设备的结构示意图;
图8是本申请实施例提供的另一种接入设备的结构示意图;
图9是本申请实施例提供的又一种接入设备的结构示意图;
图10是本申请实施例提供的一种存储设备的结构示意图;
图11是本申请实施例提供的另一种存储设备的结构示意图;
图12是本申请实施例提供的数据发送单元的结构示意图;
图13是本申请实施例提供的另一种存储设备的结构示意图;
图14是本申请实施例提供的一种数据请求处理系统的结构示意图;
图15是本申请实施例提供的再一种数据请求处理方法的流程示意图;
图16是本发明实施例提供的又一种数据请求处理方法的流程示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
研究发现,导致无法准确或成功提供用户终端请求的数据,有可能是当前接入设备出现通讯故障、或者,当前存储设备故障、或者,当前存储设备正在进行数据转移。若接入设备出现故障,由于接入设备无法及时同步到数据对应存储的存储设备信息,容易导致无法获取到数据的情况,同时,当存在数据转移时,以及用户终端通过其它接入设备将新的数据存储至该存储设备时,容易出现获取到错误数据的情况,影响了所请求数据的准确性以及数据存储的安全性。针对此,本申请实施例提供的数据请求处理方法可以应用于分布式存储的数据请求的场景中。例如:用户终端向接入设备发送携带有目标数据的数据信息的数据请求,所述接入设备获取用户终端发送的所述数据请求,解析并获取所述数据请求中携带的数据信息,所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备,所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接 入设备,所述接入设备获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求的场景等。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性。
本申请实施例涉及的用户终端可以包括平板电脑、个人计算机(PC)、智能手机、掌上电脑以及移动互联网设备(MID)等具备数据存取功能在内的终端设备;所述接入设备可以为分布式存储中与所述用户终端以及所述存储设备对接的交换机设备,用于接收用户终端的数据请求、数据存储请求以及访问存储设备进行数据存取等;所述存储设备可以为分布式存储中的后台存储设备,具体可以由多个服务器组成,用于对所述接入设备发送的数据进行存储以及响应数据请求将相应的数据发送至接入设备;管理设备可以为分布式存储中的中心节点,用于管理分布式系统中的接入设备以及存储设备,管理包括资源利用率、数据索引等元数据信息。
下面将结合附图1-附图6,对本申请实施例提供的数据请求处理方法进行详细介绍。
请参见图1,为本申请实施例提供了一种数据请求处理方法的流程示意图。如图1所示,本申请实施例的所述方法具体从用户终端侧、接入设备侧以及存储设备侧共同阐述,该方法可以包括以下步骤S101-步骤S105。
S101,用户终端向接入设备发送携带有目标数据的数据信息的数据请求;
可选地,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。
S102,所述接入设备获取用户终端发送的所述数据请求,解析并获取 所述数据请求中携带的数据信息;
可选地,所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。
S103,所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。
可选地,所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为:所述管理设备在所述目标数据进行存储的过程中,根据当前分布式存储的资源利用率等相关信息所分配的存储所述目标数据的存储设备的设备标识。这里的设备标识可以为存储设备的设备编号,也可以也是管理设备分配给该存储设备的存储编号、或者,还可以是由管理设备同一调度存储资源时分配给存储资源的资源标识等。总之,这里的存储设备标识可为唯一定位到一个存储设备的序列号、字符串等各种信息的指示标识。
所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。
所述接入设备可以将所述第一验证信息和所述数据信息,发送至所述存储设备标识对应的存储设备。
S104,所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
可选地,所述存储设备接收所述接入设备发送的所述数据信息和所述第一验证信息,可选地,所述存储设备可以先对所述第一验证信息进行验证,当所述第一验证信息验证通过后才允许所述接入设备访问所述目标数据。例如,所述S104可以为:在所述第一验证信息通过验证之后,所述存 储设备根据所述数据信息,查询所述目标数据,并将查询的所述目标数据发送至所述接入设备。
可以理解的是,当所述第一验证信息验证不通过,则所述存储设备拒绝所述接入设备对所述目标数据的访问。在一些实施例中,所述存储设备可以直接向接入设备返回获取失败的失败指示。在另一些实施例中,所述存储设备还可以向所述接入设备发送获取数据失败的提示信息等。所述提示信息可包括:提示失败的可能原因。例如,提示第一验证信息未通过验证;例如,第一验证信息的信息不全时,提示当前提供的第一验证信息不全、当第一验证信息不存在时,提示当前第一验证信息不存在等。这样所述接入设备可以将所述提示信息转发给用户终端,方便用户终端进行调整,一方面提升用户满意度,另一方面尽可能协助用户终端获取其想要的数据。
S105,所述接入设备获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。即,所述接入设备从所述存储设备接收所述目标数据。在接收到目标数据之后,将该目标数发送给请求读取该目标数据的用户终端。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性。
请参见图2,为本申请实施例提供了一种数据请求处理方法的流程时序图。如图2所示,本申请实施例的所述方法具体从用户终端侧、接入设备侧以及存储设备侧共同阐述,该方法可以包括以下步骤S201-步骤S211。
S201,接入设备获取用户终端发送的目标数据,并获取管理设备针对所述目标数据指示的存储设备标识;
可选地,用户终端可以预先将目标数据通过所述接入设备存储至存储设备中。这样的话,用户终端可以将当前需要存储的目标数据发送至当前连接的接入设备。这里的当前需要存储的目标数据,可为后续会被查询的数据。例如,用户终端可能会基于用户指示或基于内部指令,将手机内的通讯录、照片、用户喜欢的音乐或电影以及其他用户数据等待存储的数据中的一个或多尔衮,备份到网络侧的分布式存储系统中,这样的话,手机本地可以进行适当的删除,以免手机本地存储空间被过度占用的现象。而这些上传到分布式存储系统中的通讯录、照片等待存储的数据,就会作为用户终端后续会请求的目标数据被查询。进而,所述接入设备,将会接收到所述用户终端发送的目标数据,在接收到目标数据后,将所述目标数据转发至由多个存储设备形成分布式存储平台进行存储。与此同时,接入设备还可以向管理设备请求存储其发送的数据的存储设备的存储设备标识。所述管理设备可以根据当前分布式存储中的资源利用率等相关信息为所述目标数据指示存储设备标识,同时更新数据索引,所述接入设备获取所述管理设备指示的所述存储设备标识。
在一些实施例中,所述接入设备将用户终端请求存储的待存储数据,携带在存储请求中,所述管理设备会接收到所述存储请求,所述管理设备在将诶手到存储请求后,根据各个存储设备的存储资源利用率、当前可用存储资源数量、当前可用存储资源率以及当前存储负荷等与存储相关的存储状况信息,选择出存储该待存储信息的存储设备。并将该存储请求中携 带的待存储数据发送给选择出的存储设备进行存储。所述管理设备,还会向所述存储设备返回存储响应;所述存储响应可携带有所述存储设备标识等信息返回给所述接入设备。这样,所述接入设备在接收到所述存储响应之后,就可认为完成了用户终端指定存储的信息的分布式存储。
S202,所述接入设备将所述目标数据发送至所述存储设备标识对应的存储设备中;
S203,所述存储设备对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
可选地,所述接入设备可以将所述目标数据发送至所述存储设备标识对应的存储设备中,所述存储设备接收所述接入设备发送的所述目标数据,并对所述目标数据进行存储。在一些实施例中,所述第二验证信息也可以作为所述存储响应的组成部分。
所述管理设备在所述存储设备对所述目标数据进行存储后,可以向所述管理设备发送与所述目标数据相关联的第二验证信息,所述第二验证信息可选为:与所述目标数据唯一匹配的路由信息,所述存储设备获取所述管理设备发送的所述第二验证信息。
S204,所述接入设备获取所述管理设备同步的所述第二验证信息;
可选地,所述管理设备还可以将所述第二验证信息同步至所述接入设备中,所述接入设备获取所述管理设备同步的所述第二验证信息。
S205,用户终端向接入设备发送携带有目标数据的数据信息的数据请求;
可选地,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。
S206,所述接入设备获取用户终端发送的所述数据请求,解析并获取 所述数据请求中携带的数据信息;
可选地,所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。
S207,所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
可选地,所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述接入设备可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。
S208,所述存储设备查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;
可选地,所述存储设备可以查找所述管理设备预先对所述目标数据分配的相关联的第二验证信息,若查找到所述第二验证信息,则所述存储设备可以对所述第一验证信息和所述第二验证信息进行匹配。
S209,当所述第一验证信息和所述第二验证信息匹配一致时,所述存储设备获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
可选地,当所述第一验证信息和所述第二验证信息匹配一致时,所述存储设备才允许所述接入设备访问所述目标数据,具体可以为所述存储设备获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。
当未查找到所述第二验证信息或者所述第一验证信息与所述第二验证信息匹配不一致时,所述存储设备拒绝所述接入设备对所述目标数据的访问,具体可以为所述存储设备向所述接入设备发送获取数据失败的提示信息等。
S210,所述接入设备获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求;
S211,当所述目标数据在所述存储设备中移除时,所述管理设备回收所述第二验证信息,并分别删除所述接入设备和所述存储设备中的所述第二验证信息;
可选地,当用户终端取消对所述目标数据的存储时,即当所述目标数据在所述存储设备中被移除时,所述管理设备可以回收所述第二验证信息至所述信息池中以备后续数据存储进行使用,同时分别删除所述接入设备和所述存储设备中的所述第二验证信息。
需要说明的是,本申请实施例涉及的第一验证信息和第二验证信息可以为相同的验证信息,采用“第一”和“第二”的命名方式仅用于区分数据存储以及数据请求两个过程中分别获取的验证信息。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以 及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性;通过对利用后的第二验证信息进行回收,可以实现验证信息的重复利用,优化了分布式系统中的资源分配,提高了分布式系统的可用性。
请参见图3,为本申请实施例提供了另一种数据请求处理方法的流程示意图。如图3所示,本申请实施例的所述方法具体从接入设备侧阐述,该方法可以包括以下步骤S301-步骤S303。
S301,获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
可选地,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。
S302,查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
可选地,所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述接入设备可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。
所述存储设备接收所述接入设备发送的所述数据信息和所述第一验证 信息,可选地,所述存储设备可以先对所述第一验证信息进行验证,当所述第一验证信息验证通过后才允许所述接入设备访问所述目标数据,具体可以为所述存储设备获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。可以理解的是,当所述第一验证信息验证不通过,则所述存储设备拒绝所述接入设备对所述目标数据的访问,具体可以为所述存储设备向所述接入设备发送获取数据失败的提示信息等。
S303,获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性。
请参见图4,为本申请实施例提供了又一种数据请求处理方法的流程示意图。如图4所示,本申请实施例的所述方法具体从接入设备侧阐述,该方法可以包括以下步骤S401-步骤S406。
S401,获取用户终端发送的目标数据,并获取管理设备针对所述目标数据指示的存储设备标识;
可选地,用户终端预先可以将目标数据通过所述接入设备存储至存储设备中,可选地,用户终端可以将需要进行存储的目标数据发送至当前连 接的接入设备,所述接入设备获取所述用户终端发送的目标数据,可以向管理设备请求存储设备对应的存储设备标识,所述管理设备可以根据当前分布式存储中的资源利用率等相关信息为所述目标数据指示存储设备标识,同时更新数据索引,所述接入设备获取所述管理设备指示的所述存储设备标识。
S402,将所述目标数据发送至所述存储设备标识对应的存储设备中;
S403,获取所述管理设备同步的所述第二验证信息;
可选地,所述接入设备可以将所述目标数据发送至所述存储设备标识对应的存储设备中,所述存储设备接收所述接入设备发送的所述目标数据,并对所述目标数据进行存储。
所述管理设备在所述存储设备对所述目标数据进行存储后,可以向所述管理设备发送与所述目标数据相关联的第二验证信息,所述第二验证信息可选为:与所述目标数据唯一匹配的路由信息,所述存储设备获取所述管理设备发送的所述第二验证信息。所述管理设备还可以将所述第二验证信息同步至所述接入设备中,所述接入设备获取所述管理设备同步的所述第二验证信息。
S404,获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
可选地,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。
S405,查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
可选地,所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述接入设备可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。
所述存储设备可以查找所述管理设备预先对所述目标数据分配的相关联的第二验证信息,若查找到所述第二验证信息,则所述存储设备可以对所述第一验证信息和所述第二验证信息进行匹配。当所述第一验证信息和所述第二验证信息匹配一致时,所述存储设备才允许所述接入设备访问所述目标数据,具体可以为所述存储设备获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。当未查找到所述第二验证信息或者所述第一验证信息与所述第二验证信息匹配不一致时,所述存储设备拒绝所述接入设备对所述目标数据的访问,具体可以为所述存储设备向所述接入设备发送获取数据失败的提示信息等。
S406,获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求;
在本申请实施例中,当用户终端取消对所述目标数据的存储时,即当所述目标数据在所述存储设备中被移除时,所述管理设备可以回收所述第二验证信息至所述信息池中以备后续数据存储进行使用,同时分别删除所述接入设备和所述存储设备中的所述第二验证信息。
需要说明的是,本申请实施例涉及的第一验证信息和第二验证信息可以为相同的验证信息,采用“第一”和“第二”的命名方式仅用于区分数据存储以及数据请求两个过程中分别获取的验证信息。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性;通过对利用后的第二验证信息进行回收,可以实现验证信息的重复利用,优化了分布式系统中的资源分配,提高了分布式系统的可用性。
请参见图5,为本申请实施例提供了又一种数据请求处理方法的流程示意图。如图5所示,本申请实施例的所述方法具体从存储设备侧阐述,该方法可以包括以下步骤S501-步骤S502。
S501,获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息;
可选地,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行 存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述接入设备可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。所述存储设备接收所述接入设备发送的所述数据信息和所述第一验证信息。
S502,对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
可选地,所述存储设备可以先对所述第一验证信息进行验证,当所述第一验证信息验证通过后才允许所述接入设备访问所述目标数据,具体可以为所述存储设备获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。所述接入设备获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
可以理解的是,当所述第一验证信息验证不通过,则所述存储设备拒绝所述接入设备对所述目标数据的访问,具体可以为所述存储设备向所述接入设备发送获取数据失败的提示信息等。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性。
请参见图6,为本申请实施例提供了又一种数据请求处理方法的流程示意图。如图6所示,本申请实施例的所述方法具体从存储设备侧阐述,该方法可以包括以下步骤S601-步骤S605。
S601,接收接入设备根据管理设备指示的存储设备标识发送的目标数据;
可选地,用户终端预先可以将目标数据通过所述接入设备存储至存储设备中,可选地,用户终端可以将需要进行存储的目标数据发送至当前连接的接入设备,所述接入设备获取所述用户终端发送的目标数据,可以向管理设备请求存储设备对应的存储设备标识,所述管理设备可以根据当前分布式存储中的资源利用率等相关信息为所述目标数据指示存储设备标识,同时更新数据索引,所述接入设备获取所述管理设备指示的所述存储设备标识。所述接入设备可以将所述目标数据发送至所述存储设备标识对应的存储设备中,所述存储设备接收所述接入设备发送的所述目标数据。
S602,对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
可选地,所述存储设备对所述目标数据进行存储,并在对所述目标数据进行存储后,向所述管理设备发送与所述目标数据相关联的第二验证信息,所述第二验证信息可选为:与所述目标数据唯一匹配的路由信息,所述存储设备获取所述管理设备发送的所述第二验证信息。
需要说明的是,所述管理设备还可以将所述第二验证信息同步至所述接入设备中,所述接入设备获取所述管理设备同步的所述第二验证信息。
S603,获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息;
可选地,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、 数据类型等数据属性。所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述接入设备可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。所述存储设备接收所述接入设备发送的所述数据信息和所述第一验证信息。
S604,查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;
可选地,所述存储设备可以查找所述管理设备预先对所述目标数据分配的相关联的第二验证信息,若查找到所述第二验证信息,则所述存储设备可以对所述第一验证信息和所述第二验证信息进行匹配。
S605,当所述第一验证信息和所述第二验证信息匹配一致时,获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
可选地,当所述第一验证信息和所述第二验证信息匹配一致时,所述存储设备才允许所述接入设备访问所述目标数据,具体可以为所述存储设备获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。所述接入设备获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
当未查找到所述第二验证信息或者所述第一验证信息与所述第二验证信息匹配不一致时,所述存储设备拒绝所述接入设备对所述目标数据的访问,具体可以为所述存储设备向所述接入设备发送获取数据失败的提示信息等。
在本申请实施例中,当用户终端取消对所述目标数据的存储时,即当所述目标数据在所述存储设备中被移除时,所述管理设备可以回收所述第二验证信息至所述信息池中以备后续数据存储进行使用,同时分别删除所述接入设备和所述存储设备中的所述第二验证信息。
需要说明的是,本申请实施例涉及的第一验证信息和第二验证信息可以为相同的验证信息,采用“第一”和“第二”的命名方式仅用于区分数据存储以及数据请求两个过程中分别获取的验证信息。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性;通过对利用后的第二验证信息进行回收,可以实现验证信息的重复利用,优化了分布式系统中的资源分配,提高了分布式系统的可用性。
下面将结合附图7和附图8,对本申请实施例提供的接入设备进行详细介绍。需要说明的是,附图7和附图8所示的接入设备,用于执行本申请图3和图4所示实施例的方法,为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请图3和图4所示的实 施例。
请参见图7,为本申请实施例提供了一种接入设备的结构示意图。如图7所示,本申请实施例的所述接入设备1可以包括:数据信息获取单元11、信息发送单元12和第一数据发送单元13。
数据信息获取单元11,配置为获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
在一些实施例中,用户终端可以向当前连接的接入设备1发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。所述数据信息获取单元11获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。
信息发送单元12,配置为查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
在一些实施例中,所述信息发送单元12查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述信息发送单元12可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。
所述存储设备接收所述接入设备1发送的所述数据信息和所述第一验证信息,可选地,所述存储设备可以先对所述第一验证信息进行验证,当所述第一验证信息验证通过后才允许所述接入设备1访问所述目标数据,具体可以为所述存储设备获取所述数据信息指示的所述目标数据,并将所 述目标数据发送至所述接入设备1。可以理解的是,当所述第一验证信息验证不通过,则所述存储设备拒绝所述接入设备1对所述目标数据的访问,具体可以为所述存储设备向所述接入设备1发送获取数据失败的提示信息等。
第一数据发送单元13,配置为获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性。
请参见图8,为本申请实施例提供了另一种接入设备的结构示意图。如图8所示,本申请实施例的所述接入设备1可以包括:数据信息获取单元11、信息发送单元12、第一数据发送单元13、标识获取单元14、第二数据发送单元15和验证信息获取单元16。
标识获取单元14,配置为获取用户终端发送的目标数据,并获取管理设备针对所述目标数据指示的存储设备标识;
在一些实施例中,用户终端预先可以将目标数据通过所述接入设备1存储至存储设备中,可选地,用户终端可以将需要进行存储的目标数据发送至当前连接的接入设备1,所述标识获取单元14获取所述用户终端发送 的目标数据,可以向管理设备请求存储设备对应的存储设备标识,所述管理设备可以根据当前分布式存储中的资源利用率等相关信息为所述目标数据指示存储设备标识,同时更新数据索引,所述标识获取单元14获取所述管理设备指示的所述存储设备标识。
第二数据发送单元15,配置为将所述目标数据发送至所述存储设备标识对应的存储设备中;
验证信息获取单元16,配置为获取所述管理设备同步的所述第二验证信息;
在一些实施例中,所述第二数据发送单元15可以将所述目标数据发送至所述存储设备标识对应的存储设备中,所述存储设备接收所述接入设备1发送的所述目标数据,并对所述目标数据进行存储。
所述管理设备在所述存储设备对所述目标数据进行存储后,可以向所述管理设备发送与所述目标数据相关联的第二验证信息,所述第二验证信息可选为:与所述目标数据唯一匹配的路由信息,所述存储设备获取所述管理设备发送的所述第二验证信息。所述管理设备还可以将所述第二验证信息同步至所述接入设备1中,所述验证信息获取单元16获取所述管理设备同步的所述第二验证信息。
数据信息获取单元11,配置为获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
在一些实施例中,用户终端可以向当前连接的接入设备1发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。所述数据信息获取单元11获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。
信息发送单元12,配置为查找与所述数据信息相关联的存储设备标识 和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
在一些实施例中,所述信息发送单元12查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述信息发送单元12可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备。
所述存储设备可以查找所述管理设备预先对所述目标数据分配的相关联的第二验证信息,若查找到所述第二验证信息,则所述存储设备可以对所述第一验证信息和所述第二验证信息进行匹配。当所述第一验证信息和所述第二验证信息匹配一致时,所述存储设备才允许所述接入设备1访问所述目标数据,具体可以为所述存储设备获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备1。当未查找到所述第二验证信息或者所述第一验证信息与所述第二验证信息匹配不一致时,所述存储设备拒绝所述接入设备1对所述目标数据的访问,具体可以为所述存储设备向所述接入设备1发送获取数据失败的提示信息等。
第一数据发送单元13,配置为获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
在本申请实施例中,当用户终端取消对所述目标数据的存储时,即当所述目标数据在所述存储设备中被移除时,所述管理设备可以回收所述第二验证信息至所述信息池中以备后续数据存储进行使用,同时分别删除所述接入设备1和所述存储设备中的所述第二验证信息。
需要说明的是,本申请实施例涉及的第一验证信息和第二验证信息可 以为相同的验证信息,采用“第一”和“第二”的命名方式仅用于区分数据存储以及数据请求两个过程中分别获取的验证信息。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性;通过对利用后的第二验证信息进行回收,可以实现验证信息的重复利用,优化了分布式系统中的资源分配,提高了分布式系统的可用性。
请参见图9,为本申请实施例提供了又一种接入设备的结构示意图。如图9所示,所述接入设备1000可以包括:至少一个处理器1001,例如CPU,至少一个网络接口1004,用户接口1003,存储器1005,至少一个通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。其中,用户接口1003可以包括显示屏(Display)、键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。存储器1005可选的还可以是至少一个位于远离前述处 理器1001的存储装置。如图9所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及数据请求应用程序。
在图9所示的接入设备1000中,用户接口1003主要用于为用户提供输入的接口,获取用户输入的数据;网络接口1004主要用于与用户终端、存储设备以及管理设备进行数据通信;而处理器1001可以用于调用存储器1005中存储的数据请求应用程序,并具体执行以下操作:
获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备,以使所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
在一个实施例中,所述处理器1001在执行获取用户终端发送的携带有目标数据的数据信息的数据请求之前,还执行以下操作:
获取用户终端发送的目标数据,并获取管理设备针对所述目标数据指示的存储设备标识;
将所述目标数据发送至所述存储设备标识对应的存储设备中,以使所述存储设备对所述目标数据进行存储,使所述存储设备获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
获取所述管理设备同步的所述第二验证信息。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数 据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性。
下面将结合附图10-附图12,对本申请实施例提供的存储设备进行详细介绍。需要说明的是,附图10-附图12所示的存储设备,用于执行本申请图5和图6所示实施例的方法,为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请图5和图6所示的实施例。
请参见图10,为本申请实施例提供了一种存储设备的结构示意图。如图10所示,本申请实施例的所述存储设备2可以包括:信息获取单元21和数据发送单元22。
信息获取单元21,用于获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息;
在一些实施例中,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信 息。所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述接入设备可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备2。所述信息获取单元21接收所述接入设备发送的所述数据信息和所述第一验证信息。
数据发送单元22,用于对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
在一些实施例中,所述数据发送单元22可以先对所述第一验证信息进行验证,当所述第一验证信息验证通过后才允许所述接入设备访问所述目标数据,具体可以为所述数据发送单元22获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。所述接入设备获取所述存储设备2发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
可以理解的是,当所述第一验证信息验证不通过,则所述数据发送单元22拒绝所述接入设备对所述目标数据的访问,具体可以为所述数据发送单元22向所述接入设备发送获取数据失败的提示信息等。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据 返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性。
请参见图11,为本申请实施例提供了另一种存储设备的结构示意图。如图11所示,本申请实施例的所述存储设备2可以包括:信息获取单元21、数据发送单元22、数据接收单元23和数据存储单元24。
数据接收单元23,配置为接收接入设备根据管理设备指示的存储设备标识发送的目标数据;
在一些实施例中,用户终端预先可以将目标数据通过所述接入设备存储至存储设备2中,可选地,用户终端可以将需要进行存储的目标数据发送至当前连接的接入设备,所述接入设备获取所述用户终端发送的目标数据,可以向管理设备请求存储设备2对应的存储设备标识,所述管理设备可以根据当前分布式存储中的资源利用率等相关信息为所述目标数据指示存储设备标识,同时更新数据索引,所述接入设备获取所述管理设备指示的所述存储设备标识。所述接入设备可以将所述目标数据发送至所述存储设备标识对应的存储设备2中,所述数据接收单元23接收所述接入设备发送的所述目标数据。
数据存储单元24,配置为对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
在一些实施例中,所述数据存储单元24对所述目标数据进行存储,并在对所述目标数据进行存储后,向所述管理设备发送与所述目标数据相关联的第二验证信息,所述第二验证信息可选为:与所述目标数据唯一匹配的路由信息,所述数据存储单元24获取所述管理设备发送的所述第二验证 信息。
需要说明的是,所述管理设备还可以将所述第二验证信息同步至所述接入设备中,所述接入设备获取所述管理设备同步的所述第二验证信息。
信息获取单元21,配置为获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息;
在一些实施例中,用户终端可以向当前连接的接入设备发送携带有目标数据的数据信息的数据请求,所述数据信息可选为:所述目标数据的数据名称、数据类型等数据属性。所述接入设备获取用户终端发送的所述数据请求,可以解析所述数据请求并获取所述数据请求中携带的所述数据信息。所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,可以理解的是,所述存储设备标识可以为所述管理设备在所述目标数据进行存储的过程中根据当前分布式存储的资源利用率等相关信息所分配的,所述第一验证信息可选为:所述管理设备针对所述目标数据在信息池中选择的唯一与所述目标数据匹配的路由信息。所述接入设备可以将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备2。所述信息获取单元21接收所述接入设备发送的所述数据信息和所述第一验证信息。
数据发送单元22,配置为对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
在一些实施例中,所述数据发送单元22可以先对所述第一验证信息进行验证,当所述第一验证信息验证通过后才允许所述接入设备访问所述目标数据,具体可以为所述数据发送单元22获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。所述接入设备获取所述存储设备2发送的所述目标数据,并将所述目标数据发送至所述用户终端 以响应所述数据请求。
可以理解的是,当所述第一验证信息验证不通过,则所述数据发送单元22拒绝所述接入设备对所述目标数据的访问,具体可以为所述数据发送单元22向所述接入设备发送获取数据失败的提示信息等。
可选地,请一并参见图12,为本申请实施例提供了数据发送单元的结构示意图。如图12所示,所述数据发送单元22可以包括:
信息匹配子单元221,配置为查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;
在一些实施例中,所述信息匹配子单元221可以查找所述管理设备预先对所述目标数据分配的相关联的第二验证信息,若查找到所述第二验证信息,则所述信息匹配子单元221可以对所述第一验证信息和所述第二验证信息进行匹配。
数据发送子单元222,配置为当所述第一验证信息和所述第二验证信息匹配一致时,获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
在一些实施例中,当所述第一验证信息和所述第二验证信息匹配一致时,所述数据发送子单元222才允许所述接入设备访问所述目标数据,具体可以为所述数据发送子单元222获取所述数据信息指示的所述目标数据,并将所述目标数据发送至所述接入设备。所述接入设备获取所述存储设备2发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
当未查找到所述第二验证信息或者所述第一验证信息与所述第二验证信息匹配不一致时,所述数据发送子单元222拒绝所述接入设备对所述目标数据的访问,具体可以为所述数据发送子单元222向所述接入设备发送获取数据失败的提示信息等。
在本申请实施例中,当用户终端取消对所述目标数据的存储时,即当所述目标数据在所述存储设备2中被移除时,所述管理设备可以回收所述第二验证信息至所述信息池中以备后续数据存储进行使用,同时分别删除所述接入设备和所述存储设备2中的所述第二验证信息。
需要说明的是,本申请实施例涉及的第一验证信息和第二验证信息可以为相同的验证信息,采用“第一”和“第二”的命名方式仅用于区分数据存储以及数据请求两个过程中分别获取的验证信息。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性;通过对利用后的第二验证信息进行回收,可以实现验证信息的重复利用,优化了分布式系统中的资源分配,提高了分布式系统的可用性。
请参见图13,为本申请实施例提供了又一种存储设备的结构示意图。如图13所示,所述存储设备2000可以包括:至少一个处理器2001,例如CPU,至少一个网络接口2004,用户接口2003,存储器2005,至少一个通信总线2002。其中,通信总线2002用于实现这些组件之间的连接通信。其 中,用户接口2003可以包括显示屏(Display)、键盘(Keyboard),可选用户接口2003还可以包括标准的有线接口、无线接口。网络接口2004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器2005可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。存储器2005可选的还可以是至少一个位于远离前述处理器2001的存储装置。如图13所示,作为一种计算机存储介质的存储器2005中可以包括操作系统、网络通信模块、用户接口模块以及数据请求应用程序。
在图13所示的存储设备2000中,用户接口2003主要用于为用户提供输入的接口,获取用户输入的数据;网络接口2004主要用于与接入设备以及管理设备进行数据通信;而处理器2001可以用于调用存储器2005中存储的数据请求应用程序,并具体执行以下操作:
获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息,所述数据信息为所述接入设备解析用户终端发送的数据请求所获取的信息,所述第一验证信息为所述接入设备根据所述数据信息查找的相关联的信息;
对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备,以使所述接入设备获取所述存储设备发送的所述目标数据,使所述接入设备将所述目标数据发送至所述用户终端以响应所述数据请求。
在一个实施例中,所述处理器1001在执行获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息之前,还执行以下操作:
接收接入设备根据管理设备指示的存储设备标识发送的目标数据,所述目标数据为用户终端向所述接入设备发送的数据;
对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息。
在一个实施例中,所述处理器1001在执行对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备时,具体执行以下操作:
查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;
当所述第一验证信息和所述第二验证信息匹配一致时,获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性。
请参见图14,为本申请实施例提供了一种数据请求处理系统的结构示意图。如图14所示,所述系统可以包括用户终端、接入设备以及存储设备,用户终端和接入设备之间以及接入设备和存储设备之间均可以通过网络相互连接,其中,接入设备具体为图7或图8所示实施例的接入设备1,存储 设备具体为图10-图12任一所示实施例的存储设备2,或者接入设备可以为图9所示实施例的接入设备1000,存储设备可以为图13所示实施例的存储设备2000。
所述用户终端,配置为向所述接入设备发送携带有目标数据的数据信息的数据请求;
所述接入设备,配置为获取用户终端发送的所述数据请求,解析并获取所述数据请求中携带的数据信息;
所述接入设备,还用于查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
所述存储设备,配置为对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
所述接入设备,还配置为获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
在一个实施例中,所述系统还包括管理设备,所述用户终端用于向接入设备发送携带有目标数据的数据信息的数据请求之前,还包括:
所述接入设备,配置为获取用户终端发送的目标数据,并获取所述管理设备针对所述目标数据指示的存储设备标识;
所述接入设备,还配置为将所述目标数据发送至所述存储设备标识对应的存储设备中;
所述存储设备,配置为对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
所述接入设备,还配置为获取所述管理设备同步的所述第二验证信息。
在一个实施例中,所述存储设备用于对所述第一验证信息进行验证, 并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备时,配置为:查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;当所述第一验证信息和所述第二验证信息匹配一致时,获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备。
在一个实施例中,还包括:
所述管理设备,配置为当所述目标数据在所述存储设备中移除时,回收所述第二验证信息,并分别删除所述接入设备和所述存储设备中的所述第二验证信息。
在本申请实施例中,接入设备在获取到用户终端发送的携带有目标数据的数据信息的数据请求时,可以获取到与数据信息关联的存储设备标识,同时还可以获取与数据信息关联的预先设置的第一验证信息,通过接入设备将第一验证信息和数据信息发送至存储设备标识对应的存储设备,以供存储设备验证第一验证信息,并在验证通过后将数据信息指示的目标数据返回至接入设备,最终由接入设备将目标数据发送至用户终端以响应数据请求。通过加入与所请求数据的数据信息相关联的第一验证信息,并在第一验证信息通过后才可以获取请求的数据,避免由于数据转移或其它新的数据代替时导致的获取到错误数据的情况,保证了所请求数据的准确性以及安全性;通过预先对目标数据分配唯一的第二验证信息,可以在后续数据请求时,对第一验证信息和第二验证信息进行匹配,进一步实现了对数据获取的过程,有效的保证了所请求数据的准确性以及安全性;通过对利用后的第二验证信息进行回收,可以实现验证信息的重复利用,优化了分布式系统中的资源分配,提高了分布式系统的可用性。
如图15所示,本实施例提供一种数据请求处理方法,应用于接入设备中,包括:
步骤S710:接收用户终端发送的携带第一标识的数据请求;其中,所述数据请求为:存储目标数据的存储请求或读取目标数据的读取请求,所述第一标识为所述用户客户端按照预设规则生成的,与所述目标数据存储相关的标识;
步骤S720:对所述第一标识进行预设处理,以获得第一存储设备标识,其中,所述第一存储设备标识为:存储所述目标数据的存储设备的设备标识;
步骤S730:获取对所述接入设备进行存储验证的第一验证信息;
步骤S740:根据所述第一存储设备标识,向对应的存储设备发送所述数据请求及所述第一验证信息,其中,所述第一验证信息,用于对应的存储设备对所述接入设备进行存储验证,所述数据请求,用于触发对应的存储设备在通过所述存储验证后进行数据请求响应;
步骤S750:接收对应的存储设备返回的所述数据请求的处理结果;
步骤S760:根据所述处理结果向所述用户终端返回所述数据请求的响应结果。
本发明实施例提供的接入设备的为可供用户终端接入到存储设备所在网络的设备。
通常情况下,根据就近存储原址,所述接入设备对应的存储设备可为在物理空间上或在拓扑空间上,与所述接入设备比较相近的存储设备。
在本实施例中接入设备与所述用户终端可建立数据连接。所述用户终端可以根据自身的需求,向接入设备发送数据请求。这里的数据请求包括:请求存储数据的存储请求,和请求读取数据的读取请求。在本实施例中待存储的数据或待读取的数据都为本次数据请求指向的目标数据。
用户终端在请求存储数据之前,会基于预设规则生成一个标识该目标数据存储的标识,该标识在本实施例中称之为第一标识,可作为后续用户 终端查询或操作该目标数据的标识。不管是存储请求还是读取请求中,都会携带所述第一标识。在一些情况下,所述第一标识可称为操作所述目标数据的键值(key)。
接入设备在接收到携带有第一标识的数据请求之后。
在步骤S420中会对所述第一标识进行预设处理,例如,对所述第一标识进行函数处理,这里的函数可为哈希函数,则对所述第一标识进行哈希处理。在步骤S720中可采用MD5算法对所述第一标识进行哈希处理,处理得到的函数值,与存储设备的存储设备标识具有对应关系,例如,函数值本身就可以直接作为所述存储设备标识,或基于函数值与存储设备标识的对应关系,获得一个存储设备标识。在本实施例中通过对第一标识的处理,得到的存储设备标识为第一存储设备标识。这里的第一存储设备标识,可为存储所述目标数据或存储有所述目标数据的存储设备的设备标识。所述设备标识可为国际设备标识(IMEI)、或网络协议(IP)地址,或者,管理设备分配的存储逻辑地址等标识设备的序列和/或字符串等信息。
接入设备在确定出响应所述数据请求的存储设备的第一存储设备标识以后,需要向对应的存储设备发送所述数据请求。在本实施例中,还会同步发送对所述接入设备进行存储验证的第一验证信息。
该第一验证信息是专门针对于所述接入设备的验证信息。在本实施例中,不管所述接入设备接收的数据请求是来自哪一个用户终端,例如,来自用户终端A和用户终端B,若所述接入设备自身对应的验证信息未变,则针对于用户终端A和用户终端B的数据请求,向存储设备发送的是同一个第一验证信息。
这样的话,第一存储设备标识对应的存储设备,接收到的不仅有数据请求,还有针对于接入设备的第一验证信息。
存储设备在进行数据请求的响应之前,首先对第一验证信息进行验证。 若接入设备当前异常,则可能无法提供正确的第一验证信息,则可能会导致存储验证失败,若存储验证失败,则存储设备会拒绝响应所述数据请求,从而不管是存储数据,还是读取数据,都可以避免因为接入设备异常导致的数据处理错误、数据错误读取导致的泄露等问题。
在本实施例中第一验证信息是针对于接入设备的,而非针对所述目标数据或所述数据请求的,这样的话,通过一个接入设备进行的数据请求响应,可能仅需要一个第一验证信息,显然验证信息的条数少,不用单独为每一个目标数据或数据请求分配对应的验证信息进行存储验证。
且在本实施例中,所述第一验证信息是针对于接入设备的,若接入设备发送给了错误的存储设备,则有可能第一验证信息无法通过验证,从而可以接入设备处理异常导致的错误写入,例如,错误写入了接入设备未有权限写入的存储设备中,导致对应的存储设备在响应其写入操作覆盖了其他接入设备写入的数据的问题,提升了数据存储的可靠性和鲁棒性。
在本实施例中,不管是数据存储还是数据读取,都需要结合第一验证信息进行验证。
在步骤S730中获取所述第一验证信息,可包括:在所述接入设备的本地查询所述第一验证信息,或者,接入设备按照预设方式基于一定生成参数生成所述第一验证信息。存储设备在进行第一验证信息的验证时,同样可以采用同样的方式生成一个验证信息,用于对所述接入设备的存储验证。
存储设备会对所述数据请求进行相应的处理,形成一个处理结果。
在本实施例中所述处理结果包括:第一类处理结果及第二类处理结果。
所述第一类处理结果,用于指示根据存储验证是否通过,指示是否响应所述数据请求。所述第一类处理结果,至少包括:验证失败。
所述第二类处理结果,用于指示在存储验证通过后,对所述目标数据的处理结果。所述第二类处理结果包括:响应存储请求的存储成功或存储 失败的处理结果。所述第二类存储结果还包括:响应读取请求成功时返回的包括目标数据的处理结果,响应读取请求未成功读取到目标数据时的处理结果。
所述步骤S750可包括:所述接入设备接收到所述第二类处理结果之后,可以直接将第二类结果作为所述数据请求的最终响应结果,返回给所述用户终端。
所述步骤S750可包括:所述接入设备接收到第一类处理结果之后,所述接入设备可以重新执行所述步骤S720至步骤S750,一直到从所述存储设备接收到所述第二类处理结果,或者,重复执行所述步骤S720至步骤S750预定次数,达到预定次数之后第一验证信息仍然没有通过验证,则直接向所述用户终端返回响应失败的结果。当然以上尽是举例,在一些情况下,所述接入设备可以直接将所述处理结果转发给所述用户终端。
当所述数据请求为存储请求时,在步骤S740中接入设备会将待存储的目标数据发送给存储设备,供存储设备存储。
当所述数据请求为读取请求时,在步骤S740中携带的数据请求中是没有对应的目标数据,若存储设备查询到了对应的目标数据,则会在步骤S750中接入设备会接收到携带有目标数据的处理结果。
在一些实施例中,所述第一验证信息包括:管理设备下发给所述接入设备的第一路由信息,其中,所述第一路由信息为:所述管理设备根据分配给所述接入设备的存储区域生成的信息。
所述第一路由信息可包括:分配给所述接入设备的存储区域的起始子区域的存储地址,和/或,所述存储区域的终止子区域的存储地址等生成的。
所述第一路由信息可以直接为所述起始子区域的存储地址和终止子区域的存储地址,也可以是采用哈希算法等各种函数,对所述存储地址等进行处理之后生成的信息,还可以是分配给所述接入设备的整个存储区域的 存储地址等。
在本实施例中所述第一路由信息,不仅可以告知接入设备,当前管理设备分配给其存储区域的相关信息,还被复用作为所述第一验证信息使用。这样的话,管理设备可以不用额外下发信息就相当于向接入设备告知了第一验证信息,一方面实现了信息复用,另一方面不需要额外的增加信息交互的信令开销,与现有技术的兼容性强。
可选地,所述方法还包括:
根据所述第一路由信息,判断对所述第一存储设备标识是否为预设存储设备标识;其中,所述预设存储设备标识为分配给所述接入设备进行数据存储的存储设备的设备标识;
所述步骤S740可包括:当所述第一存储设备标识为所述预设存储设备标识时,向所述第一存储设备标识对应的存储设备发送所述数据请求及所述第一验证信息。
例如,通过对第一标识的处理,得到的第一存储设备标识,明显并非位于所述第一路由信息对应的存储区域中,表明接入设备没有对该数据的操作权限或接入设备在计算所述第一存储设备标识的过程中出现了错误,或者,接入设备及用户终端的至少其中之一出现故障,则此时可以不用向存储设备发送所述数据请求,以减少所述存储设备的数据请求的无效负载。
在一些实施例中,所述方法还包括:
接收管理设备下发的针对所述接入设备的第一存储配置信息,其中,所述第一存储配置信息至少包括:所述第一验证信息或所述第一验证信息的生成信息。
其中,所述第一存储配置信息,包括所述第一验证信息,或所述第一验证信息的生成信息。这里的生成信息可包括:生成策略及生成参数;利用所述生成策略对所述生成参数进行数据处理,会得到所述第一验证信息。 所述第一存储配置信息也可以直接携带所述第一验证信息。例如,当所述第一验证信息为所述第一路由信息时,所述第一存储配置信息可以直接包括所述第一路由信息即可。
如图16所示,本实施例提供一种数据请求处理方法,应用于存储设备中,包括:
步骤S810:从接入设备接收用户终端的数据请求及所述接入设备对应的第一验证信息;
步骤S820:基于所述第一验证信息对所述接入设备进行存储验证;
步骤S830:当基于所述第一验证信息通过所述存储验证时,响应所述数据请求,以获得处理结果;
步骤S840:将所述处理结果返回给所述接入设备。
本实施例提供的数据请求处理方法,为应用于存储设备中的方法。存储设备从接入设备接收的数据请求的同时,还会接收针对于接入设备的第一验证信息。
在响应所述数据请求之前,需要先基于第一验证信息对接入设备进行存储验证。若存储验证通过之后,才会响应所述数据请求,这样的话,相当于只有确定出接入设备自身正常的情况下,才会进行所述数据请求的响应,至少解决了接入设备的异常导致的存储异常和读取异常的问题。
可选地,所述方法还包括:
从管理设备接收针对于所述接入设备的第二存储配置信息;
基于所述第二存储配置信息,获得第二验证信息;
所述步骤S820可包括:将所述第一验证信息和所述第二验证信息进行匹配;当所述第一验证信息和所述第二验证信息一致时,确定所述存储验证通过。
所述存储设备预先从管理设备针对于接入设备的第二存储配置信息。 基于第二存储配置信息,获得第二验证信息,可包括:从第二存储配置信息中直接提取所述第二验证信息。或者,根据所述第二存储配置信息生成所述第二验证信息。例如,根据第二存储配置信息生成第二验证信息时,可以基于生成参数及生成规则进行生成处理,得到所述第二存储配置信息。这里存储设备接收的生成参数和生成规则,和接入设备从管理设备接收的生成参数和生成规则是一致。
在步骤S820中,匹配第一验证信息和第二验证信息。若两个验证信息匹配已知,则存储验证通过,否则可认为存储验证不同。
在一些实施例中,所述基于所述第二存储配置信息,获得第二验证信息可包括:基于所述第二存储配置信息,获得所述接入设备对应的第二路由信息,其中,所述第二路由信息为所述存储设备根据管理设备分配给所述接入设备的存储区域生成的。
若接入设备提供的第一验证信息为第一路由信息,则在所述步骤S820可包括:将第一路由信息和第二路由信息进行匹配,根据匹配的结果,进行存储验证。
当所述数据请求为存储请求时,所述步骤S830可包括:
在基于第一验证信息通过所述存储验证时,存储所述目标数据;
并形成目标数据的存储记录,该存储记录包括所述目标数据的存储位置及所述第一标识的对应关系,这样后续,若用户终端查询所述目标数据时,接收到携带有第一标识的读取请求之后,可以依据第一标识查询所述存储记录,基于存储记录中的对应关系,到对应的存储位置读取所述目标数据,将所述目标数据返回给所述接入设备。
故当所述数据请求为读取请求时,所述步骤S830可包括:
当基于所述第一验证信息通过存储验证时,从所述读取请求中提取第一标识;
以所述第一标识为查询依据查询所述对应关系,确定出所述目标数据的存储位置;
到所述存储位置读取所述目标数据。
本实施例还提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于前述一个或多个技术方案提供的数据请求处理方法,例如,可执行如图1至图5和图8至图9所示数据请求处理方法的至少其中之一。
所述计算机存储介质可为:只读存储器、随机存储器、闪存、移动硬盘或光盘等存储介质,所述计算机存储介质可为非瞬间存储介质。
本发明实施例提供的一种处理设备,所述处理设备为接入设备或存储设备,包括:
收发器,用于与其他设备进行数据交互;
存储器,用于存储数据;
处理器,分别与所述收发器及所述存储器连接,用于通过执行位于所述存储器上的计算机程序,实现可执行如图1至图5和图8至图9所示数据请求处理方法的至少其中之一。
所述收发器可包括:各种类型的网络接口,所述网络接口可包括:光缆接口、电缆接口及收发天线等。所述收发器可用于数据交互。所述存储器可用于各种信息的储存。
所述处理器可为中央处理器、微处理器、数字信号处理器、应用处理器、可编程阵列或专用集成电路等。所述处理器可以通过集成电路总线等总线接口,分别与所述存储器及收发器连接,用于通过计算机程序等计算机可执行指令的执行,实现前述一个或多个技术方案提供的数据请求处理方法的。
以上所揭露的仅为本申请较佳实施例而已,当然不能以此来限定本申 请之权利范围,因此依本申请权利要求所作的等同变化,仍属本申请所涵盖的范围。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本申请各实施例中的各功能单元可以全部集成在一个处理模块中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本申请上述集成的单元如果以软件功能模块的形式实现并作为 独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本申请各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所揭露的仅为本申请较佳实施例而已,当然不能以此来限定本申请之权利范围,凡按照本申请原理所作的修改,都应当理解为落入本申请的保护范围。
工业实用性
本申请实施例中提供的技术方案,会根据数据信息或第一标识确定出存储设备的存储设备标识,并获取第一验证信息,将第一验证信息发送给对应的存储设备,由存储设备在通过验证之后进行响应,从而通过验证确保了数据处理的可靠性,具有积极的工业效果。与此同时,可以通过在存储设备、接入设备及管理设备中设置相应的计算机可执行指令,就可以实现,从而在工业上的可实现性强。

Claims (28)

  1. 一种数据请求处理方法,包括:
    用户终端向接入设备发送携带有目标数据的数据信息的数据请求;
    所述接入设备获取用户终端发送的所述数据请求,解析并获取所述数据请求中携带的数据信息;
    所述接入设备查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
    所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
    所述接入设备获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
  2. 根据权利要求1所述的方法,其中,所述用户终端向接入设备发送携带有目标数据的数据信息的数据请求之前,还包括:
    接入设备获取用户终端发送的目标数据,并获取管理设备针对所述目标数据指示的存储设备标识;
    所述接入设备将所述目标数据发送至所述存储设备标识对应的存储设备中;
    所述存储设备对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
    所述接入设备获取所述管理设备同步的所述第二验证信息。
  3. 根据权利要求2所述的方法,其中,所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备,包括:
    所述存储设备查找与所述数据信息相关联的所述第二验证信息,并对 所述第一验证信息和所述第二验证信息进行匹配;
    当所述第一验证信息和所述第二验证信息匹配一致时,所述存储设备获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备。
  4. 根据权利要求2所述的方法,其中,还包括:
    当所述目标数据在所述存储设备中移除时,所述管理设备回收所述第二验证信息,并分别删除所述接入设备和所述存储设备中的所述第二验证信息。
  5. 一种数据请求处理方法,包括:
    获取用户终端发送的携带有目标数据的数据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
    查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备,以使所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
    获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
  6. 根据权利要求5所述的方法,其中,所述获取用户终端发送的携带有目标数据的数据信息的数据请求之前,还包括:
    获取用户终端发送的目标数据,并获取管理设备针对所述目标数据指示的存储设备标识;
    将所述目标数据发送至所述存储设备标识对应的存储设备中,以使所述存储设备对所述目标数据进行存储,使所述存储设备获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
    获取所述管理设备同步的所述第二验证信息。
  7. 一种数据请求处理方法,其中,包括:
    获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息,所述数据信息为所述接入设备解析用户终端发送的数据请求所获取的信息,所述第一验证信息为所述接入设备根据所述数据信息查找的相关联的信息;
    对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备,以使所述接入设备获取所述存储设备发送的所述目标数据,使所述接入设备将所述目标数据发送至所述用户终端以响应所述数据请求。
  8. 根据权利要求7所述的方法,其中,所述获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息之前,还包括:
    接收接入设备根据管理设备指示的存储设备标识发送的目标数据,所述目标数据为用户终端向所述接入设备发送的数据;
    对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息。
  9. 根据权利要求8所述的方法,其中,所述对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备,包括:
    查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;
    当所述第一验证信息和所述第二验证信息匹配一致时,获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备。
  10. 一种接入设备,包括:
    数据信息获取单元,配置为获取用户终端发送的携带有目标数据的数 据信息的数据请求,解析并获取所述数据请求中携带的数据信息;
    信息发送单元,配置为查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备,以使所述存储设备对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
    第一数据发送单元,配置为获取所述存储设备发送的所述目标数据,并将所述目标数据发送至所述用户终端以响应所述数据请求。
  11. 根据权利要求10所述的设备,其中,还包括:
    标识获取单元,配置为获取用户终端发送的目标数据,并获取管理设备针对所述目标数据指示的存储设备标识;
    第二数据发送单元,配置为将所述目标数据发送至所述存储设备标识对应的存储设备中,以使所述存储设备对所述目标数据进行存储,使所述存储设备获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
    验证信息获取单元,配置为获取所述管理设备同步的所述第二验证信息。
  12. 一种存储设备,包括:
    信息获取单元,配置为于获取接入设备发送的目标数据的数据信息以及与所述数据信息相关联的第一验证信息,所述数据信息为所述接入设备解析用户终端发送的数据请求所获取的信息,所述第一验证信息为所述接入设备根据所述数据信息查找的相关联的信息;
    数据发送单元,配置为对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备,以使所述接入设备获取所述存储设备发送的所述目标数据,使所 述接入设备将所述目标数据发送至所述用户终端以响应所述数据请求。
  13. 根据权利要求12所述的设备,其中,还包括:
    数据接收单元,配置为接收接入设备根据管理设备指示的存储设备标识发送的目标数据,所述目标数据为用户终端向所述接入设备发送的数据;
    数据存储单元,配置为对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息。
  14. 根据权利要求13所述的设备,其中,所述数据发送单元包括:
    信息匹配子单元,配置为查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;
    数据发送子单元,配置为当所述第一验证信息和所述第二验证信息匹配一致时,获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备。
  15. 一种数据请求处理系统,包括:用户终端、接入设备以及存储设备;其中,
    所述用户终端,配置为向所述接入设备发送携带有目标数据的数据信息的数据请求;
    所述接入设备,配置为获取用户终端发送的所述数据请求,解析并获取所述数据请求中携带的数据信息;
    所述接入设备,还配置为查找与所述数据信息相关联的存储设备标识和第一验证信息,并将所述第一验证信息和所述数据信息发送至所述存储设备标识对应的存储设备;
    所述存储设备,配置为对所述第一验证信息进行验证,并在验证通过后获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备;
    所述接入设备,还配置为获取所述存储设备发送的所述目标数据,并 将所述目标数据发送至所述用户终端以响应所述数据请求。
  16. 根据权利要求15所述的系统,其中,所述系统还包括管理设备,所述用户终端用于向接入设备发送携带有目标数据的数据信息的数据请求之前,还包括:
    所述接入设备,配置为获取用户终端发送的目标数据,并获取所述管理设备针对所述目标数据指示的存储设备标识;
    所述接入设备,还配置为将所述目标数据发送至所述存储设备标识对应的存储设备中;
    所述存储设备,配置为对所述目标数据进行存储,并获取所述管理设备发送的与所述目标数据相关联的第二验证信息;
    所述接入设备,还配置为获取所述管理设备同步的所述第二验证信息。
  17. 根据权利要求16所述的系统,其中,
    所述存储设备,还配置为查找与所述数据信息相关联的所述第二验证信息,并对所述第一验证信息和所述第二验证信息进行匹配;当所述第一验证信息和所述第二验证信息匹配一致时,获取所述数据信息指示的所述目标数据,将所述目标数据发送至所述接入设备。
  18. 根据权利要求16所述的系统,其中,还包括:
    所述管理设备,配置为当所述目标数据在所述存储设备中移除时,回收所述第二验证信息,并分别删除所述接入设备和所述存储设备中的所述第二验证信息。
  19. 一种数据请求处理方法,应用于接入设备中,包括:
    接收用户终端发送的携带第一标识的数据请求;其中,所述数据请求为:存储目标数据的存储请求或读取目标数据的读取请求,所述第一标识为所述用户客户端按照预设规则生成的,与所述目标数据存储相关的标识;
    对所述第一标识进行预设处理,以获得第一存储设备标识,其中,所 述第一存储设备标识为:存储所述目标数据的存储设备的设备标识;
    获取对所述接入设备进行存储验证的第一验证信息;
    根据所述第一存储设备标识,向对应的存储设备发送所述数据请求及所述第一验证信息,其中,所述第一验证信息,用于对应的存储设备对所述接入设备进行存储验证,所述数据请求,用于触发对应的存储设备在通过所述存储验证后进行数据请求响应;
    接收对应的存储设备返回的所述数据请求的处理结果;
    根据所述处理结果向所述用户终端返回所述数据请求的响应结果。
  20. 根据权利要求19所述的方法,其中,
    所述对所述第一标识进行预设处理,以获得第一存储设备标识,包括:
    对所述第一标识进行哈希处理,以获得所述第一存储设备标识。
  21. 根据权利要求19所述的方法,其中,
    所述第一验证信息包括:管理设备下发给所述接入设备的第一路由信息,其中,所述第一路由信息为:所述管理设备根据分配给所述接入设备的存储区域生成的信息。
  22. 根据权利要求19、20或21所述的方法,其中,所述方法还包括:
    根据所述第一路由信息,判断对所述第一存储设备标识是否为预设存储设备标识;其中,所述预设存储设备标识为分配给所述接入设备进行数据存储的存储设备的设备标识;
    所述根据所述第一存储设备标识,向对应的存储设备发送所述数据请求及所述第一验证信息,包括:
    当所述第一存储设备标识为所述预设存储设备标识时,向所述第一存储设备标识对应的存储设备发送所述数据请求及所述第一验证信息。
  23. 根据权利要求19、20或21所述的方法,其中,所述方法还包括:
    接收管理设备下发的针对所述接入设备的第一存储配置信息,其中, 所述第一存储配置信息至少包括:所述第一验证信息或所述第一验证信息的生成信息。
  24. 一种数据请求处理方法,应用于存储设备中,包括:
    从接入设备接收用户终端的数据请求及所述接入设备对应的第一验证信息;
    基于所述第一验证信息对所述接入设备进行存储验证;
    当基于所述第一验证信息通过所述存储验证时,响应所述数据请求,以获得处理结果;
    将所述处理结果返回给所述接入设备。
  25. 根据权利要求24所述的方法,其中,
    所述方法还包括:
    从管理设备接收针对于所述接入设备的第二存储配置信息;
    基于所述第二存储配置信息,获得第二验证信息;
    所述基于所述第一验证信息对所述接入设备进行存储验证,包括:
    将所述第一验证信息和所述第二验证信息进行匹配;
    当所述第一验证信息和所述第二验证信息一致时,确定所述存储验证通过。
  26. 根据权利要求25所述的方法,其中,
    所述基于所述第二存储配置信息,获得第二验证信息,包括:
    基于所述第二存储配置信息,获得所述接入设备对应的第二路由信息,其中,所述第二路由信息为所述存储设备根据管理设备分配给所述接入设备的存储区域生成的。
  27. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1至9及19至26任一项提供的数据请求处理方法。
  28. 一种处理设备,所述处理设备为接入设备或存储设备,包括:
    收发器,用于与其他设备进行数据交互;
    存储器,用于存储数据;
    处理器,分别与所述收发器及所述存储器连接,用于通过执行位于所述存储器上的计算机程序,实现权利要求1至9及19至27任一项提供的数据请求处理方法。
PCT/CN2017/101442 2016-09-13 2017-09-12 数据请求处理方法及其系统、接入设备、存储设备 WO2018050055A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/018,259 US11128622B2 (en) 2016-09-13 2018-06-26 Method for processing data request and system therefor, access device, and storage device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610821976.4A CN107819729B (zh) 2016-09-13 2016-09-13 一种数据请求方法及其系统、接入设备、存储设备和存储介质
CN201610821976.4 2016-09-13

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/018,259 Continuation US11128622B2 (en) 2016-09-13 2018-06-26 Method for processing data request and system therefor, access device, and storage device

Publications (1)

Publication Number Publication Date
WO2018050055A1 true WO2018050055A1 (zh) 2018-03-22

Family

ID=61601054

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/101442 WO2018050055A1 (zh) 2016-09-13 2017-09-12 数据请求处理方法及其系统、接入设备、存储设备

Country Status (3)

Country Link
US (1) US11128622B2 (zh)
CN (1) CN107819729B (zh)
WO (1) WO2018050055A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371818B (zh) * 2018-12-25 2022-05-24 阿里巴巴集团控股有限公司 一种数据请求的验证方法、装置及设备
US11841961B2 (en) * 2020-07-02 2023-12-12 International Business Machines Corporation Management of computing secrets
CN115277850B (zh) * 2022-09-23 2023-01-03 联通智网科技股份有限公司 数据处理方法、装置、设备及存储介质

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764839A (zh) * 2009-12-23 2010-06-30 成都市华为赛门铁克科技有限公司 一种数据访问方法以及统一资源定位符服务器
CN102204267A (zh) * 2008-07-10 2011-09-28 丛林网络公司 分布式数据存储和接入系统
US20130219061A1 (en) * 2012-02-20 2013-08-22 Hon Hai Precision Industry Co., Ltd. Cloud computing device and distributed data management method
US20140101116A1 (en) * 2012-10-08 2014-04-10 Cleversafe, Inc. Robust transmission of data utilizing encoded data slices
CN103870202A (zh) * 2012-12-10 2014-06-18 上海优刻得信息科技有限公司 一种块设备的分布式存储方法和系统
CN104272274A (zh) * 2013-12-31 2015-01-07 华为技术有限公司 一种分布式文件存储系统中的数据处理方法及设备
US20150278243A1 (en) * 2014-03-31 2015-10-01 Amazon Technologies, Inc. Scalable file storage service
US20150381729A1 (en) * 2014-06-30 2015-12-31 Sandisk Enterprise Ip Llc Data Storage Verification in Distributed Storage System

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5560008A (en) * 1989-05-15 1996-09-24 International Business Machines Corporation Remote authentication and authorization in a distributed data processing system
US6954854B1 (en) * 1999-06-21 2005-10-11 Hitachi, Ltd. Electronic authentication method, electronic authentication apparatus and electronic authentication storage medium
US7587428B2 (en) * 2000-10-13 2009-09-08 Microsoft Corporation Maintaining a relationship between two different items of data
JP2005157553A (ja) * 2003-11-21 2005-06-16 Canon Inc 画像形成システム、画像形成装置、それらの制御方法、及びプログラム
CN1852094B (zh) * 2005-12-13 2010-09-29 华为技术有限公司 网络业务应用账户的保护方法和系统
US20120303962A1 (en) * 2007-03-16 2012-11-29 Rod Ghani System and method for embedding a written signature into a secure electronic document
JP5014847B2 (ja) * 2007-03-19 2012-08-29 株式会社リコー 情報処理装置及び情報処理方法
JP5050627B2 (ja) * 2007-04-26 2012-10-17 日本電気株式会社 リソース割当システム、リソース割当方法及びリソース割当プログラム
EP2202921B1 (en) * 2007-11-22 2013-03-27 China Mobile Communications Corporation A data storage method, a management server, a storage equipment and system
US10372924B2 (en) * 2008-05-12 2019-08-06 George Madathilparambil George Master device for controlling application security environments
US8954976B2 (en) 2008-07-10 2015-02-10 Juniper Networks, Inc. Data storage in distributed resources of a network based on provisioning attributes
US8799322B2 (en) * 2009-07-24 2014-08-05 Cisco Technology, Inc. Policy driven cloud storage management and cloud storage policy router
US8850516B1 (en) * 2011-06-22 2014-09-30 Emc Corporation Virtual private cloud that provides enterprise grade functionality and compliance
JP2013058101A (ja) * 2011-09-08 2013-03-28 Interlink:Kk クラウドコンピューティングシステム
US9401904B1 (en) * 2012-03-15 2016-07-26 Motio, Inc. Security migration in a business intelligence environment
JP2013198123A (ja) * 2012-03-22 2013-09-30 Toshiba Corp アクセス制御システム
US9710626B2 (en) * 2012-07-06 2017-07-18 International Business Machines Corporation Security model for network information service
US9189644B2 (en) * 2012-12-20 2015-11-17 Bank Of America Corporation Access requests at IAM system implementing IAM data model
WO2014138882A1 (en) * 2013-03-13 2014-09-18 Jumpto Media Inc. Encrypted network storage space
GB2520489A (en) * 2013-11-20 2015-05-27 Ibm Deletion of content in digital storage systems
US20150180872A1 (en) * 2013-12-20 2015-06-25 Cube, Co. System and method for hierarchical resource permissions and role management in a multitenant environment
US9509694B2 (en) * 2013-12-31 2016-11-29 EMC IP Holding Company LLC Parallel on-premises and cloud-based authentication
US9800650B2 (en) * 2014-03-10 2017-10-24 Vmware, Inc. Resource management for multiple desktop configurations for supporting virtual desktops of different user classes
US10262151B2 (en) * 2014-03-17 2019-04-16 Citrix Systems, Inc. User-agnostic backend storage for cloud-based applications
US9471803B2 (en) * 2014-08-07 2016-10-18 Emc Corporation System and method for secure multi-tenancy in an operating system of a storage system
US9721117B2 (en) * 2014-09-19 2017-08-01 Oracle International Corporation Shared identity management (IDM) integration in a multi-tenant computing environment
CN105516055B (zh) * 2014-09-23 2020-07-14 腾讯科技(深圳)有限公司 数据访问方法、访问设备、目标设备及管理服务器
US10296163B2 (en) * 2014-09-25 2019-05-21 Oracle International Corporation Electronic presentation repository and interface
US9660987B2 (en) * 2015-07-30 2017-05-23 Oracle International Corporation Storage isolation using I/O authentication
US9917784B2 (en) * 2015-07-31 2018-03-13 Netapp Inc. Dynamic resource allocation based upon network flow control
CN105353976B (zh) * 2015-10-21 2018-09-07 百度在线网络技术(北京)有限公司 一种获取缓存数据的方法和装置
US10452766B2 (en) * 2015-11-25 2019-10-22 Box, Inc. Creating shared content in a device-independent content editor using a native operating system interface
US10038694B1 (en) * 2016-03-30 2018-07-31 EMC IP Holding Company LLC System and method for security mode-based authorization for data management operations in a multi-tenant protection storage system
US10778762B2 (en) * 2016-04-18 2020-09-15 Rancher Labs, Inc. Cloud computing service architecture

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102204267A (zh) * 2008-07-10 2011-09-28 丛林网络公司 分布式数据存储和接入系统
CN101764839A (zh) * 2009-12-23 2010-06-30 成都市华为赛门铁克科技有限公司 一种数据访问方法以及统一资源定位符服务器
US20130219061A1 (en) * 2012-02-20 2013-08-22 Hon Hai Precision Industry Co., Ltd. Cloud computing device and distributed data management method
US20140101116A1 (en) * 2012-10-08 2014-04-10 Cleversafe, Inc. Robust transmission of data utilizing encoded data slices
CN103870202A (zh) * 2012-12-10 2014-06-18 上海优刻得信息科技有限公司 一种块设备的分布式存储方法和系统
CN104272274A (zh) * 2013-12-31 2015-01-07 华为技术有限公司 一种分布式文件存储系统中的数据处理方法及设备
US20150278243A1 (en) * 2014-03-31 2015-10-01 Amazon Technologies, Inc. Scalable file storage service
US20150381729A1 (en) * 2014-06-30 2015-12-31 Sandisk Enterprise Ip Llc Data Storage Verification in Distributed Storage System

Also Published As

Publication number Publication date
US20180302404A1 (en) 2018-10-18
US11128622B2 (en) 2021-09-21
CN107819729A (zh) 2018-03-20
CN107819729B (zh) 2021-06-25

Similar Documents

Publication Publication Date Title
US10826817B2 (en) Routing table synchronization method, apparatus, and system
JP5989807B2 (ja) ソフトウェアのインストール方法、デバイスおよびシステム
CN108093094B (zh) 数据库实例访问方法、装置、系统、存储介质和设备
US9524327B2 (en) Method and system for data synchronization, and apparatus thereof
JP5727020B2 (ja) クラウドコンピューティングシステム及びそのデータ同期化方法
TWI659300B (zh) 一種設備標識提供方法及裝置
US10999721B2 (en) Communication identifier binding processing method and terminal
CN109684414B (zh) 区块数据的同步方法、装置、设备及存储介质
WO2018050055A1 (zh) 数据请求处理方法及其系统、接入设备、存储设备
JP2016533059A (ja) ブルートゥース通信方法及びブルートゥース通信設備
CN110046062B (zh) 分布式数据处理方法及系统
JP2019502186A (ja) グローバル情報を取得、処理および更新するためのシステムおよび方法
US9930063B2 (en) Random identifier generation for offline database
WO2017097106A1 (zh) 一种文件差量的传输方法以及装置
WO2018000653A1 (zh) M2m应用的信息方法、cse及ae
WO2017101382A1 (zh) 终端连接服务器的方法、终端及域名服务器
JP6251927B2 (ja) 環境コンテキストを共有するための方法及び装置
JP2016212656A (ja) 情報処理装置、端末、情報処理装置と端末を有するシステム、情報処理方法及びプログラム
CN113395340A (zh) 一种信息更新方法、装置、设备、系统和可读存储介质
KR101663526B1 (ko) 파일 시스템을 이용한 저장공간 통합 방법 및 시스템
CN113486060A (zh) 数据访问处理方法和装置、存储介质及电子设备
CN110798358B (zh) 分布式服务标识方法、装置、计算机可读介质及电子设备
KR20210044281A (ko) 클라우드 저하 모드에서 지속적인 디바이스 동작 안정성을 보장하기 위한 방법 및 장치
JP2019509579A (ja) 情報処理システム
CN109325057B (zh) 中间件管理方法、装置、计算机设备以及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17850257

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17850257

Country of ref document: EP

Kind code of ref document: A1