WO2021051563A1 - 目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质 - Google Patents

目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质 Download PDF

Info

Publication number
WO2021051563A1
WO2021051563A1 PCT/CN2019/117673 CN2019117673W WO2021051563A1 WO 2021051563 A1 WO2021051563 A1 WO 2021051563A1 CN 2019117673 W CN2019117673 W CN 2019117673W WO 2021051563 A1 WO2021051563 A1 WO 2021051563A1
Authority
WO
WIPO (PCT)
Prior art keywords
target data
archive
archiving
archive file
hash value
Prior art date
Application number
PCT/CN2019/117673
Other languages
English (en)
French (fr)
Inventor
张旭明
宫林涛
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021051563A1 publication Critical patent/WO2021051563A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/113Details of archiving
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Definitions

  • This application relates to the field of computer and communication technologies, and in particular to a target data archiving method, device, electronic equipment, and computer non-volatile readable storage medium.
  • the server During the operation of the server, data that needs to be stored in the server's local disk space is generated. Since the server's local disk space is limited, the server may not have enough local disk space during the process of storing data, which may cause the server to fail to operate normally. . In order to solve the above problems, the old data in the server can be archived regularly, so that the server can free up space to save the new data.
  • the inventor of the present application realizes that the implementation of the above-mentioned method of periodically archiving old data in the server may result in the transfer of the old data on the server due to network jitter or packet loss from the network card.
  • the data is damaged, which leads to the failure of data archiving, and the reliability of data archiving is low.
  • an object of the present application is to provide a target data archiving method, device, electronic equipment, and computer non-volatile readable storage medium.
  • a target data archiving method includes: obtaining an archive file from a source server, where the archive file contains target data that needs to be archived; and obtaining an archive file from the source server includes: obtaining archive files from the source server that need to be archived.
  • Target data the target data is calculated by a hash algorithm to obtain a first hash value; the target data and the first hash value are correspondingly stored and compressed as the archive file; the archive files are consistent Performance verification; said performing consistency verification on the archive file includes: performing a decompression operation on the archive file to obtain the target data and the first hash value contained in the archive file; The target data is calculated by the hash algorithm to obtain a second hash value; it is determined whether the second hash value is the same as the first hash value; if the second hash value is the same as the first hash value If the hash value is the same, it is determined that the archive file passes the consistency check; when the archive file passes the consistency check, the target data contained in the archive file is stored in the storage space of the archive server and sent to the source The server sends a deletion notification, and the deletion notification instructs the source server to delete the target data contained in the archive file.
  • a target data archiving device is characterized by comprising: an acquisition module for acquiring an archive file from a source server, the archive file contains target data that needs to be archived; the acquisition module is configured to: For the target data that needs to be archived in the source server, the target data is calculated through a hash algorithm to obtain a first hash value; the target data and the first hash value are correspondingly stored and compressed as the archive file; The verification module is configured to perform a consistency verification on the archive file; the verification module is configured to: perform a decompression operation on the archive file to obtain the target data and all data contained in the archive file The first hash value; the target data is calculated by the hash algorithm to obtain a second hash value; it is judged whether the second hash value is the same as the first hash value; if the second hash value If the hash value is the same as the first hash value, it is determined that the archive file passes the consistency check; the storage module is used for storing the contents contained in the archive file when the
  • an electronic device includes: one or more processors; a storage device for storing one or more programs, and when the one or more programs are executed by the one or more processors, The one or more processors are enabled to implement the target data archiving method as described in the foregoing embodiment.
  • a computer non-volatile readable storage medium on which a target data archiving program is stored characterized in that the target data archiving program is executed by a processor to realize the target data archiving method as described above.
  • a computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute as described in the first aspect of the embodiments of the present application Methods.
  • the archive file is obtained from the source server and the archive file is checked for consistency.
  • the target data on the source server is cleaned up only when the archive file is confirmed to be complete, thereby ensuring the reliability of the target data archive Sex.
  • Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied.
  • Fig. 2 schematically shows a flowchart of a target data archiving method.
  • Fig. 3 schematically shows a flowchart of obtaining an archive file from a source server according to an embodiment of the present application.
  • Fig. 4 schematically shows a flow chart of the consistency verification process of the archived file by the archive server according to an embodiment of the present application.
  • Fig. 5 schematically shows a flowchart of a method for obtaining a preset number of archives according to an embodiment of the present application.
  • Fig. 6 schematically shows a flowchart of a method for obtaining an estimated number of archives according to an embodiment of the present application.
  • Fig. 7 schematically shows a flowchart of a method for obtaining an estimated number of archives according to an embodiment of the present application.
  • Fig. 8 schematically shows a block diagram of a target data archiving device.
  • Fig. 9 shows a block diagram of an electronic device for implementing the above-mentioned target data archiving method according to an exemplary embodiment.
  • Fig. 10 shows a schematic diagram of a computer non-volatile readable storage medium for implementing the above-mentioned target data archiving method according to an exemplary embodiment.
  • Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application can be applied.
  • the system architecture can include terminal devices (as shown in Figure 1, one or more of the smart phone 101, the tablet computer 102, and the portable computer 103, of course, it can also be a desktop computer, etc.), a network 104 , The source server 105 and the archive server 106.
  • the network 104 is used to provide a medium of a communication link between the terminal device, the source server 105 and the archive server 106.
  • the network 104 may include various connection types, such as wired communication links, wireless communication links, and so on.
  • terminal devices network 104, source server 105, and archive server 106 in FIG. 1 are merely illustrative. According to implementation needs, there may be any number of terminal devices, networks 104, source servers 105, and archive servers 106.
  • the source server 105 may be a source server cluster composed of multiple source servers 105.
  • the source server 105 may collect target data sent through a terminal device (such as a smart phone 101, a tablet computer 102, or a portable computer 103, etc. as shown in FIG. 1), and the target data may be voice or text. , Pictures and other data that need to be archived.
  • the source server 105 can generate an archive file according to the target data, and the archive server 106 obtains the archive file from the source server 105; or the source server 105 generates the target data itself after generating the target data.
  • the target data is generated into an archive file.
  • the archive server 106 performs a consistency check on the archive file; when the archive file passes the consistency check, the target data contained in the archive file is stored in the storage space of the archive server 106, and the target contained in the archive file in the source server 105 is deleted data. It can be seen that, because the technical solution of the embodiment of the present application deletes the target data contained in the archive file in the source server 105 after the archive is completed, the space for storing the target data in the source server 105 is released, and the target data in the archive file is stored in the target data. The data has been checked for consistency, thus ensuring the reliability of the archived files.
  • the target data archiving method provided by the embodiment of the present application is generally executed by the archiving server 106, and accordingly, the target data archiving device is generally set in the archiving server 106.
  • the source server 105 and the archive server 106 may exist in one server at the same time, or the server cluster includes the source server 105 and the archive server 106.
  • the terminal device may also have a similar function to the source server 105, or the device terminal may have the function of the archive server 106, so as to execute the target data archiving method provided by the embodiment of the present application.
  • FIG. 2 schematically shows a flowchart of a target data archiving method according to an embodiment of the present application
  • the target data archiving method includes at least step S210 to step S230, which are described in detail as follows:
  • step S210 an archive file is obtained from the source server, and the archive file contains target data that needs to be archived.
  • the source server can be understood as a server that specifically implements several functions.
  • the source server can generate data during operation, or receive data generated by a mobile terminal, and store the generated data in the source server. In the storage space.
  • the target data is data that needs to be archived, which can be text files such as user information, user agreement, or a part of these text files, and the target data can also be picture files such as user facial images and fingerprint images. Either it is a part of these picture files, or a voice file such as a user's voice, or a part of a voice file.
  • the archive server can be understood as a server that specifically implements several functions, or the archive server can be understood as a server only used to store data, or the archive server can be understood as an element with a storage function in the source server .
  • the frequency at which the source server generates archive files may be fixed, and the archive server may also obtain archive files from the source server according to the frequency at which the source server generates archive files, so that the target data is archived in time, or as a
  • the source server will generate one or more archive files for one or more target data of the total amount of memory occupied, and the archive server can obtain the archives in the order in which the target data is generated File to facilitate further processing of the target data.
  • the frequency at which the source server generates the archive file is related to the size of the target data.
  • the source server generates the archive file for the target data whose size reaches the set value, but not for the target data that does not reach the set value. Archiving can reduce the interference to the data in the source server while clearing the source server space in time.
  • one archive server can obtain archive files from multiple source servers, so that the target data sent by multiple source servers can be stored in one archive server, which facilitates the summary processing of the target data.
  • one archive server may only obtain archive files from one source server, and the archive server corresponds to the source server one-to-one, so that the target data can be archived more accurately.
  • Multiple archive servers can also be used to obtain different archive files of a source server.
  • Each archive server is used to obtain archive files formed by different target data in the source server.
  • the corresponding relationship between different data and the archive server is preset in advance, so that the source server Or multiple archive servers are used to obtain archive files from multiple source servers, each archive server obtains the same type of data from multiple source servers, and stores the same type of data from different source servers in one In the archive server, the same type of data is aggregated together to facilitate the next step of processing.
  • the process of obtaining archive files from the source server in step S210 may include the following steps:
  • Step S310 Obtain target data that needs to be archived in the source server, and calculate the target data through a hash algorithm to obtain a first hash value;
  • the hash algorithm includes multiple algorithms.
  • the target data is calculated by MD5 (Message Digest Algorithm 5, Message Digest Algorithm 5) to obtain the first hash value, and MD5 treats the entire file as one Large text information, through its irreversible string transformation algorithm, generates a unique MD5 value as the first hash value.
  • MD5 Message Digest Algorithm 5, Message Digest Algorithm 5
  • step S320 the target data and the first hash value are correspondingly stored and compressed as an archive file.
  • the target data and the first hash value are correspondingly stored and then transferred to the archive server.
  • the archive server can verify the target data according to the first hash value.
  • the first hash value may be The value is compared with the pre-stored hash value generated by the same target data pre-stored in the archive server. If the first hash value is consistent with the pre-stored hash value, the target data can be considered to be the correct target data that needs to be archived. Incorrect target data archive.
  • comparing the hash value is faster than directly comparing the target data, which improves the efficiency of target data archiving.
  • Compress the archive file and send it which speeds up the file transfer between the source server and the archive server, speeds up the processing of the target data, and also improves the security of the archive file in the transmission process.
  • the archive server can directly store the archive compressed package, so that the archive file occupies less space during storage.
  • the archive server may directly decompress the compressed package before storing.
  • the decompressed content can be further processed and stored after feature extraction.
  • the archive compressed package can be encrypted with a public key.
  • the archive server uses the pre-stored one corresponding to the marked feature of the archive compressed package according to the marking characteristics of the archive compressed package.
  • the private key is decrypted to prevent the wrong archiving of the target data when the archive file is transferred to the wrong archive server. It also prevents the archive file from being stolen during the process of obtaining the archive file from the source server by the archive server, which further increases the archive file transmission. Security in the process.
  • step S220 a consistency check is performed on the archive file.
  • the consistency check can be understood as checking whether the target data contained in the archive file is complete and undamaged.
  • the archive file that needs to be verified can be compared with the complete archive file generated by the preset target data of the archive file, the size of the archive file that needs to be verified and the preset archive file can be compared, or the archive that needs verification can be compared Other parameters of the file and the preset archive file, or extract the keywords of the archive file to be verified and the preset archive file, and compare whether the keywords are consistent.
  • the consistency check can be understood as checking whether the key target data contained in the archive file is complete and undamaged. Before verification, first identify the key archive files generated by the key target data in the archive files, and identify the key archive files in the archive files based on preset conditions, and then combine the key archive files and the pre-stored key target data to generate the pre- Set the key archive file for comparison, you can compare the size of the key archive file and the preset key archive file, or compare other parameters of the key archive file and the preset key archive file, or extract the keywords of the key archive file and the preset key archive file To compare whether the keywords are consistent.
  • the consistency check can be understood as checking whether the integrity of the target data contained in the archive file reaches the set value, and the integrity of the target data contained in the archive file reaches the set value. Comply with the consistency check.
  • the standard of completeness can be set as required. You can compare multiple parameters or keywords of the archive file to be verified and the preset archive file. When the archive file to be verified and the preset archive file have multiple parameters or multiple keywords that are consistent with the parameters or key When the number of words reaches the set number, the archive file that needs to be verified can be deemed to meet the consistency verification.
  • the process of the archive server checking the consistency of the archived file in step S220 may include the following steps:
  • Step S410 Perform a decompression operation on the archive file to obtain the target data and the first hash value contained in the archive file;
  • Step S420 calculating the target data through a hash algorithm to obtain a second hash value
  • Step S430 judging whether the second hash value is the same as the first hash value
  • step S440 if the second hash value is the same as the first hash value, it is determined that the archive file passes the consistency check.
  • the second hash value is generated by the target data obtained by the archive server from the source server, the second hash value is generated in the same way as the first hash value, and both are calculated through MD5.
  • the second hash value is the same as the first hash value, it can be verified whether the target data that generates the first hash value in the source server is the same as the target data after the successful transmission, which ensures that the consistency check is passed.
  • the accuracy of the archived files since the second hash value is generated by the target data obtained by the archive server from the source server, the second hash value is generated in the same way as the first hash value, and both are calculated through MD5.
  • comparing hash values is faster than comparing target data, and each target data corresponds to a unique hash value, comparing hash values improves the verification efficiency and also makes the comparison result very reliable.
  • step S430 after determining whether the second hash value is the same as the first hash value in step S430, if the second hash value is different from the first hash value, perform the following steps :
  • step S450 the number of archiving times of the archived file is obtained, and the number of archiving times is compared with the preset number of archiving times.
  • the number of times to obtain the archived file is specifically that each time the archived file is archived, the number of times to archive the archived file is increased by one.
  • the number of archiving times is calculated separately for different archived files, so that more preset archiving times can be set for important archived files, so as to ensure the reliability of archiving.
  • step S460 if the number of archiving times is greater than the preset number of archiving times, a command to stop automatic archiving is sent to the source server, and an administrator manual archiving prompt is sent to the source server.
  • the source server In the archive operation, after detecting that the number of archives is greater than the preset number of archives, and the target data has not been archived successfully, the source server is notified not to perform the archive operation again, and the user is notified to archive manually, saving the source server and the archive server's calculation workload .
  • the preset number of archiving times in step S450 can be obtained through the following steps:
  • Step S510 Obtain the number of target data contained in the archive file
  • step S520 for each target data, the data type of the target data is determined, and the preset data type and the maximum archiving times comparison table is searched according to the data type, and the maximum tolerable archiving times of the data type is obtained;
  • Step S530 Obtain the ratio of the sum of the maximum tolerable archiving times of all target data in the target data to the number of target data;
  • Step S540 Perform a rounding operation on the ratio to obtain the preset number of archives of the archived file.
  • Each type of target data corresponds to a maximum tolerable archiving times, and the maximum tolerable archiving times for each target data type is set according to needs. For example, user identity information is very important, and it may take multiple attempts (such as 10 times) before giving up; but the format segment in the document is very unimportant, and it can be given up after a few failed transmissions (such as 2 times). However, the target data in the archive file is often not transmitted separately. At this time, it is necessary to look at the corresponding maximum number of archives according to the importance of each part in the archive file, and finally calculate the average tolerable archive as a whole. The number of times is the preset number of archives.
  • the maximum tolerable archiving times of each data type can be determined according to the average number of archiving of the target data in the past, considering that the average archiving times in the historical archiving operation is more suitable for the actual use, and the target data is improved. The efficiency of archiving operations.
  • the weight of the maximum tolerable archive times of each data type needs to be considered.
  • the weight can be set as needed, and the weight can also be determined based on historical data.
  • the preset number of archiving times in step S450 can be obtained through the following steps:
  • Step S610 detecting the current network communication state between the source server and the archive server
  • Step S620 Look up a preset comparison table between the current network communication state of the source server and the archive server and the preset filing times, and obtain the preset filing times matching the current network communication state.
  • the appropriate preset archive times can be determined according to the current network communication state of the source server and the archive server, and the determination method may be that the better the current network communication state, the smaller the preset archive times; the current network communication The worse the status, the greater the preset number of archives.
  • the interference of network factors on target data archiving is reduced, and the target data archiving is more reliable.
  • the preset number of archiving times in step S450 can be obtained through the following steps:
  • Step S710 detecting the current network communication state between the source server and the archive server
  • Step S720 if the current network communication status is communication disconnection, send an administrator manual filing prompt to the source server.
  • the archive server cannot obtain archive files from the source server. At this time, the user is directly prompted to archive manually, which saves the source server and the archive server's computational effort.
  • step S230 when the archive file passes the consistency check, the target data contained in the archive file is stored in the storage space of the archive server, and a deletion notification is sent to the source server.
  • the deletion notification indicates the source The server deletes the target data contained in the archive file.
  • the target data in the archive file is sequentially stored according to the set priority, and the priority may be related to the type of the target data.
  • the target data can be encrypted before storage, which improves the security of target data archiving.
  • the target data can be feature extracted and then stored, or the target data can be compressed and stored to reduce the space of the archive server occupied by the target data.
  • the target data in the archive file is classified and archived according to the set type, which facilitates the reprocessing of the target data.
  • a deletion notification is sent to the source server, thereby avoiding the accidental deletion of the target data that the user needs to use.
  • an archive prompt and a deletion notification are sent to the source server, so as to reduce the user's operation steps.
  • the archive file contains the target data that needs to be archived by obtaining the archive file from the source server; the consistency check is performed on the archive file; when the archive file passes the consistency check, The target data contained in the archive file is stored in the storage space of the archive server, and a deletion notice is sent to the source server.
  • the deletion notice instructs the source server to delete the target data contained in the archive file. Because this solution checks the consistency of the archived files, the target data on the source server is cleaned up only when the archived files are confirmed to be complete, thereby ensuring the reliability of the target data archive.
  • Fig. 8 schematically shows a block diagram of a target data archiving device according to an embodiment of the present application.
  • a target data archiving device 800 includes: an acquisition module 801, a verification module 802, a storage module 803, and a notification module 804.
  • the obtaining module 801 is used to obtain archive files from the source server, and the archive files contain the target data that needs to be archived;
  • the verification module 802 is used to perform consistency verification on the archive files;
  • the storage module 803 is used when the archive files pass the consistency verification During verification, the target data contained in the archive file is stored in the storage space of the archive server;
  • the notification module 804 is configured to send a deletion notification to the source server, and the deletion notification instructs the source server to delete the target data contained in the archive file.
  • the acquisition module 801 is configured to: acquire the target data that needs to be archived in the source server, calculate the target data through a hash algorithm to obtain the first hash value; and combine the target data with the first hash value.
  • the hash value is stored and compressed as an archive file.
  • the verification module 802 is configured to: perform a decompression operation on the archive file to obtain the target data and the first hash value contained in the archive file; and pass the target data through a hash algorithm
  • the second hash value is calculated; it is determined whether the second hash value is the same as the first hash value; if the second hash value is the same as the first hash value, it is determined that the archive file passes the consistency check.
  • the verification module 802 is configured to: if the second hash value is different from the first hash value, obtain the number of times the archived file has been archived, and compare the number of archives with the preset number of archives ; If the number of archiving times is greater than the preset number of archiving times, send a stop automatic archiving command to the source server, and send an administrator manual archiving prompt to the source server.
  • the verification module 802 is configured to: obtain the number of target data contained in the archive file; for each target data, determine the data type of the target data, and search for the target data according to the data type. Set the data type and the maximum archiving times comparison table to obtain the maximum tolerable archiving times of the data type; obtain the ratio of the sum of the maximum tolerable archiving times of all target data in the target data to the number of target data; round up the ratio to get The preset number of archives for archived files.
  • the verification module 802 is further configured to: detect the current network communication status of the source server and the archive server; find the preset current network communication status and presets of the source server and the archive server The archiving times comparison table obtains the preset archiving times matching the current network communication state.
  • the verification module 802 is further configured to: after detecting the current network communication status of the source server and the archive server, if the current network communication status is that the communication is disconnected, send the management to the source server The operator manually filed the prompts.
  • the computer device 90 according to this embodiment of the present application will be described below with reference to FIG. 9.
  • the computer device 90 shown in FIG. 9 is only an example, and should not bring any limitation to the function and scope of use of the embodiments of the present application.
  • the computer device 90 is represented in the form of a general-purpose computing device.
  • the components of the computer device 90 may include, but are not limited to: the aforementioned at least one processing unit 91, the aforementioned at least one storage unit 92, a bus 93 connecting different system components (including the storage unit 92 and the processing unit 91), and a display unit 94.
  • the storage unit stores program code, and the program code can be executed by the processing unit 91, so that the processing unit 91 executes the various exemplary methods described in the above-mentioned “Methods of Embodiments” section of this specification. Steps of implementation.
  • the storage unit 92 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 921 and/or a cache storage unit 922, and may further include a read-only storage unit (ROM) 923.
  • RAM random access storage unit
  • ROM read-only storage unit
  • the storage unit 92 may also include a program/utility tool 924 having a set of (at least one) program module 925.
  • program module 925 includes but is not limited to: an operating system, one or more application programs, other program modules, and program data. Each of these examples or some combination may include the implementation of a network environment.
  • the bus 93 may represent one or more of several types of bus structures, including a storage unit bus or a storage unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or a local area that uses any of a variety of bus structures. bus.
  • the computer device 90 may also communicate with one or more external devices (such as keyboards, pointing devices, Bluetooth devices, etc.), and may also communicate with one or more devices that enable the user to interact with the computer device 90, and/or communicate with
  • the computer device 90 can communicate with any device (such as a router, modem, etc.) that communicates with one or more other computing devices. This communication can be performed through an input/output (I/O) interface 95.
  • the computer device 90 may also communicate with one or more networks (for example, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through the network adapter 96. As shown in the figure, the network adapter 96 communicates with other modules of the computer device 90 through the bus 93.
  • LAN local area network
  • WAN wide area network
  • public network such as the Internet
  • the example embodiments described here can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which can be a personal computer, a server, a terminal device, or a network device, etc.) execute the method according to the embodiment of the present application.
  • a computing device which can be a personal computer, a server, a terminal device, or a network device, etc.
  • a computer-readable storage medium on which is stored a program product capable of implementing the above-mentioned method in this specification.
  • various aspects of the present application can also be implemented in the form of a program product, which includes program code.
  • the program product runs on a terminal device, the program code is used to make the The terminal device executes the steps according to various exemplary embodiments of the present application described in the above-mentioned "Exemplary Method" section of this specification.
  • a program product 100 for implementing the above method according to an embodiment of the present application is described. It can adopt a portable compact disk read-only memory (CD-ROM) and include program code, and can be installed in a terminal device, For example, running on a personal computer.
  • CD-ROM compact disk read-only memory
  • the program product of this application is not limited to this.
  • the readable storage medium can be any tangible medium that contains or stores a program, and the program can be used by or in combination with an instruction execution system, device, or device.
  • the program product can use any combination of one or more readable media.
  • the readable medium may be a readable signal medium or a readable storage medium.
  • the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above. More specific examples (non-exhaustive list) of readable storage media include: electrical connections with one or more wires, portable disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Type programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • the computer-readable signal medium may include a data signal propagated in baseband or as a part of a carrier wave, and readable program code is carried therein. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the readable signal medium may also be any readable medium other than a readable storage medium, and the readable medium may send, propagate, or transmit a program for use by or in combination with the instruction execution system, apparatus, or device.
  • the program code contained on the readable medium can be transmitted by any suitable medium, including but not limited to wireless, wired, optical cable, RF, etc., or any suitable combination of the above.
  • the program code used to perform the operations of the present application can be written in any combination of one or more programming languages.
  • the programming languages include object-oriented programming languages—such as Java, C++, etc., as well as conventional procedural programming languages. Programming language-such as "C" language or similar programming language.
  • the program code can be executed entirely on the user's computing device, partly on the user's device, executed as an independent software package, partly on the user's computing device and partly executed on the remote computing device, or entirely on the remote computing device or server Executed on.
  • the remote computing device can be connected to a user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computing device (for example, using Internet service providers). Business to connect via the Internet).
  • LAN local area network
  • WAN wide area network
  • Internet service providers for example, using Internet service providers.
  • a computer program product includes a non-transitory computer-readable storage medium storing a computer program.
  • the computer program is operable to cause a computer to execute the Target data archiving method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

一种目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质,属于计算机及通信技术领域,该方法包括:从源服务器获取归档文件,归档文件包含需要归档的目标数据(S210);对归档文件进行一致性校验(S220);当归档文件通过一致性校验时,将归档文件中包含的目标数据存储至归档服务器的存储空间,并向源服务器发送删除通知,删除通知指示源服务器删除归档文件包含的目标数据(S230)。该方法由于通过归档服务器对归档文件进行一致性校验后,再将归档文件中包含的目标数据存储至归档服务器的存储空间,并删除源服务器中归档文件包含的目标数据,提高了数据归档的可靠性。

Description

目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质 技术领域
本申请要求2019年09月17日递交、发明名称为“目标数据归档方法、装置、介质及电子设备”的中国专利申请201910878006.1的优先权,在此通过引用将其全部内容合并于此。
本申请涉及计算机及通信技术领域,尤其涉及一种目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质。
背景技术
服务器在运行过程中会产生需要存储至服务器本地磁盘空间的数据,由于服务器的本地磁盘空间是有限的,因此服务器在存储数据的过程中可能会出现本地磁盘空间不足的情况,导致服务器无法正常运行。为了解决上述问题,可以定期将服务器中旧的数据进行归档,以使服务器可以腾出空间保存新的数据。
技术问题
然而,本申请的发明人意识到,执行上述定期将服务器中旧的数据进行归档的方法,可能在将服务器上旧的数据进行转移的过程中,由于网络抖动或者网卡丢包等原因导致转移中的数据损坏,从而导致数据归档失败,数据归档的可靠性较低。
技术解决方案
为了解决上述技术问题,本申请的一个目的在于提供一种目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质。
其中,本申请所采用的技术方案为:
第一方面,一种目标数据归档方法,包括:从源服务器获取归档文件,所述归档文件包含需要归档的目标数据;所述从源服务器获取归档文件包括:获取所述源服务器中需要归档的目标数据,将所述目标数据通过散列算法计算得到第一散列值;将所述目标数据和所述第一散列值对应存储后压缩作为所述归档文件;对所述归档文件进行一致性校验;所述对所述归档文件进行一致性校验包括:对所述归档文件进行解压缩操作,得到所述归档文件中包含的所述目标数据和所述第一散列值;将所述目标数据通过所述散列算法计算得到第二散列值;判断所述第二散列值是否与所述第一散列值相同;若所述第二散列值与所述第一散列值相同,则确定所述归档文件通过一致性校验;当所述归档文件通过一致性校验时,将所述归档文件中包含的目标数据存储至归档服务器的存储空间,并向源服务器发送删除通知,所述删除通知指示所述源服务器删除所述归档文件包含的目标数据。
第二方面,一种目标数据归档装置,其特征在于,包括:获取模块,用于从源服务器获取归档文件,所述归档文件包含需要归档的目标数据;所述获取模块被配置为:获取所述源服务器中需要归档的目标数据,将所述目标数据通过散列算法计算得到第一散列值;将所述目标数据和所述第一散列值对应存储后压缩作为所述归档文件;校验模块,配置为对所述归档文件进行一致性校验;所述校验模块被配置为:对所述归档文件进行解压缩操作,得到所述归档文件中包含的所述目标数据和所述第一散列值;将所述目标数据通过所述散列算法计算得到第二散列值;判断所述第二散列值是否与所述第一散列值相同;若所述第二散列值与所述第一散列值相同,则确定所述归档文件通过一致性校验;存储模块,用于当所述归档文件通过一致性校验时,将所述归档文件中包含的目标数据存储至归档服务器的存储空间;通知模块,用于向源服务器发送删除通知,所述删除通知指示所述源服务器删除所述归档文件包含的目标数据。
第三方面,一种电子设备,包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如上述实施例中所述的目标数据归档方法。
第四方面,一种计算机非易失性可读存储介质,其上存储有目标数据归档程序,其特征在于,所述目标数据归档程序被处理器执行时实现如上所述的目标数据归档方法。
第五方面,一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如本申请实施例第一方面所述的方法。
有益效果
在上述技术方案中,通过从源服务器获取归档文件,对归档文件进行一致性校验,在确认归档文件是完整的情况下才会清理源服务器上的目标数据,从而保证了目标数据归档的可靠性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并于说明书一起用于解释本申请的原理。
图1示出了可以应用本申请实施例的技术方案的示例性系统架构的示意图。
图2示意性示出一种目标数据归档方法的流程图。
图3示意性示出了根据本申请的一个实施例的从源服务器获取归档文件的流程图。
图4示意性示出了根据本申请的一个实施例的归档服务器对归档文件进行一致性校验过程的流程图。
图5示意性示出了根据本申请的一个实施例的获得预设归档次数方法的流程图。
图6示意性示出了根据本申请的一个实施例的获得预计归档次数方法的流程图。
图7示意性示出了根据本申请的一个实施例的获得预计归档次数方法的流程图。
图8示意性示出一种目标数据归档装置的方框图。
图9示出根据示例性实施例的用于实现上述目标数据归档方法的电子设备的框图。
图10示出根据示例性实施例的用于实现上述目标数据归档方法的计算机非易失性可读存储介质的示意图。
通过上述附图,已示出本申请明确的实施例,后文中将有更详细的描述,这些附图和文字描述并不是为了通过任何方式限制本申请构思的范围,而是通过参考特定实施例为本领域技术人员说明本申请的概念。
本发明的实施方式
现在将参考附图更全面地描述示例实施方式。然而,示例实施方式能够以多种形式实施,且不应被理解为限于在此阐述的范例;相反,提供这些实施方式使得本申请将更加全面和完整,并将示例实施方式的构思全面地传达给本领域的技术人员。
此外,所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多实施例中。在下面的描述中,提供许多具体细节从而给出对本申请的实施例的充分理解。然而,本领域技术人员将意识到,可以实践本申请的技术方案而没有特定细节中的一个或更多,或者可以采用其它的方法、组元、装置、步骤等。在其它情况下,不详细示出或描述公知方法、装置、实现或者操作以避免模糊本申请的各方面。
附图中所示的方框图仅仅是功能实体,不一定必须与物理上独立的实体相对应。即,可以采用软件形式来实现这些功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络和/或处理器装置和/或微控制器装置中实现这些功能实体。
附图中所示的流程图仅是示例性说明,不是必须包括所有的内容和操作/步骤,也不是必须按所描述的顺序执行。例如,有的操作/步骤还可以分解,而有的操作/步骤可以合并或部分合并,因此实际执行的顺序有可能根据实际情况改变。
图1示出了可以应用本申请实施例的技术方案的示例性系统架构的示意图。
如图1所示,系统架构可以包括终端设备(如图1中所示智能手机101、平板电脑102和便携式计算机103中的一种或多种,当然也可以是台式计算机等等)、网络104、源服务器105和归档服务器106。网络104用以在终端设备、源服务器105和归档服务器106之间提供通信链路的介质。网络104可以包括各种连接类型,例如有线通信链路、无线通信链路等等。
应该理解,图1中的终端设备、网络104、源服务器105和归档服务器106的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络104、源服务器105和归档服务器106。比如源服务器105可以是多个源服务器105组成的源服务器集群等。
在本申请的一个实施例中,源服务器105可以收集通过终端设备(如图1中所示的智能手机101、平板电脑102或便携式计算机103等)发送的目标数据,目标数据可以是语音、文本、图片等需要归档的数据。当源服务器105收集到终端设备发送的目标数据之后,源服务器105可以根据目标数据生成归档文件,归档服务器106从源服务器105中获取归档文件;或者源服务器105自身产生目标数据后将自身产生的目标数据生成归档文件。归档服务器106对归档文件进行一致性校验;当归档文件通过一致性校验时,将归档文件中包含的目标数据存储至归档服务器106的存储空间,并删除源服务器105中归档文件包含的目标数据。可见,由于本申请实施例的技术方案在归档完成后删除源服务器105中归档文件包含的目标数据,释放了源服务器105中存储目标数据的空间,并且在存储归档文件中的目标数据时对目标数据进行了一致性校验,从而保证了归档文件的可靠性。
需要说明的是,本申请实施例所提供的目标数据归档方法一般由归档服务器106执行,相应地,目标数据归档装置一般设置于归档服务器106中。源服务器105和归档服务器106可以同时存在与一个服务器中,或者服务器集群中包括源服务器105和归档服务器106。但是,在本申请的其它实施例中,终端设备也可以与源服务器105具有相似的功能,或者设备终端具有归档服务器106的功能,从而执行本申请实施例所提供的目标数据归档方法。
以下对本申请实施例的技术方案的实现细节进行详细阐述:
图2示意性示出了根据本申请的一个实施例的目标数据归档方法的流程图;
参照图2所示,该目标数据归档方法至少包括步骤S210至步骤S230,详细介绍如下:
在步骤S210中,从源服务器获取归档文件,归档文件包含需要归档的目标数据。
在本申请的一个实施例中,源服务器可以理解为具体实现若干功能的服务器,源服务器中可以在运行过程中产生数据,或者接收移动终端产生的数据,并将产生的数据存储至源服务器当前的存储空间中。
在本申请的一个实施例中,目标数据为需要归档的数据,可以是用户资料、用户协议等文本文件或者是这些文本文件中的一部分,目标数据也可以是用户面部图像、指纹图像等图片文件或者是这些图片文件的一部分,或者是用户语音等语音文件或者是语音文件的一部分。
在本申请的一个实施例中,归档服务器可以理解为具体实现若干功能的服务器,或者归档服务器可以理解为只用于存储数据的服务器,或者归档服务器可以理解为在源服务器中具有存储功能的元件。
在本申请的一个实施例中,源服务器生成归档文件的频率可以是固定的,归档服务器也可以根据源服务器生成归档文件的频率从源服务器中获取归档文件,使目标数据及时归档,或者当一个或多个目标数据占用的内存总量达到设定值时,源服务器将达到占用内存总量的一个或多个目标数据生成一个或多个归档文件,归档服务器可以按照生成目标数据的顺序获取归档文件,方便对目标数据进一步处理。
在本申请的其他实施例中,源服务器生成归档文件的频率与目标数据的大小有关,源服务器将大小达到设定值的目标数据生成归档文件,而对于未达到设定值的目标数据暂不归档,可以在及时清理源服务器空间的同时减小对源服务器中数据的干扰。
在本申请的一个实施例中,一个归档服务器中可以从多个源服务器中获取归档文件,使得多个源服务器发送的目标数据都能存储到一个归档服务器中,方便对目标数据进行汇总处理。
在本申请的其他实施例中,一个归档服务器可以只从一个源服务器中获取归档文件,归档服务器与源服务器一一对应,使目标数据能够更准确的归档。也可以用多个归档服务器获取一个源服务器的不同归档文件,每个归档服务器用来获取源服务器中的不同目标数据形成的归档文件,不同数据与归档服务器提前预设对应关系,从而使源服务器中的数据分类归档;或者多个归档服务器用来获取多个源服务器的归档文件,每个归档服务器从多个源服务器中获取相同类型的数据,将不同源服务器中的相同类型数据存储到一个归档服务器中,使相同类型的数据汇总到一起,方便进行下一步处理。
在本申请的一个实施例中,如图3所示,在步骤S210中从源服务器获取归档文件的过程,可以包括如下步骤:
步骤S310,获取源服务器中需要归档的目标数据,将目标数据通过散列算法计算得到第一散列值;
散列算法中包含多种算法,在本申请的一个实施例中,目标数据通过MD5(Message Digest Algorithm 5,消息摘要算法第五版)计算得到第一散列值,MD5将整个文件当作一个大文本信息,通过其不可逆的字符串变换算法,产生了唯一的MD5值作为第一散列值。
步骤S320,将目标数据和第一散列值对应存储后压缩作为归档文件。
将目标数据和第一散列值对应存储后一起传递到归档服务器中,归档服务器可以根据第一散列值对目标数据进行校验,在本申请的一个实施例中,可以将第一散列值与归档服务器中预先存储的由相同目标数据生成的预存散列值进行比较,若第一散列值与预存散列值一致,则可以认为目标数据是正确的需要归档的目标数据,避免将不正确的目标数据归档。同时由于散列值比目标数据小,比较散列值比直接比较目标数据更加快速,提高了目标数据归档的效率。
将归档文件压缩之后发送,加快了源服务器和归档服务器传递文件的速度,加快了目标数据的处理进程,也提高了归档文件在传输过程中的安全性。
在本申请的一个实施例中,归档服务器可以直接存储归档压缩包,使归档文件在存储时占用更少的空间。
在本申请的一个实施例中,归档服务器可以直接将压缩包解压后再进行存储。可以对解压后的内容进行特征提取等进一步加工后存储。
在本申请的一个实施例中,归档压缩包可以用公钥进行加密,当归档服务器收到该归档压缩包后,根据归档压缩包的标记特征,使用预存的与该归档压缩包的标记特征对应的私钥进行解密,防止将归档文件传递到错误的归档服务器中时目标数据的错误归档,也防止在归档服务器从源服务器中获取归档文件的过程中归档文件被窃取,进一步增加了归档文件传输过程中的安全性。
继续参照图2所示,在步骤S220中,对归档文件进行一致性校验。
在本申请的一个实施例中,一致性校验可以理解为校验归档文件中包含的目标数据是否完整未被损坏。可以将需要校验的归档文件与预设的生成该归档文件的目标数据生成的完整归档文件进行比较,可以比较需要校验的归档文件与预设归档文件的大小,或者比较需要校验的归档文件与预设归档文件的其他参数,或者提取需要校验的归档文件与预设归档文件的关键字,比较关键字是否一致。
在本申请的一个实施例中,一致性校验可以理解为校验归档文件中包含的关键目标数据是否完整未被损坏。在校验之前,先识别归档文件中的关键目标数据生成的关键归档文件,可以根据需要预设条件识别归档文件中的关键归档文件,再将关键归档文件和预先存储的关键目标数据生成的预设关键归档文件进行比较,可以比较关键归档文件与预设关键归档文件的大小,或者比较关键归档文件与预设关键归档文件的其他参数,或者提取关键归档文件与预设关键归档文件的关键字,比较关键字是否一致。
在本申请的一个实施例中,一致性校验可以理解为校验归档文件中包含的目标数据的完整程度是否达到设定值,归档文件包含的目标数据的完整程度达到设定值即可认为符合一致性校验。完整程度的标准可以根据需要设定。可以比较需要校验的归档文件与预设归档文件的多个参数或多个关键字,当需要校验的归档文件与预设归档文件的多个参数或多个关键字中一致的参数或关键字达到设定数量,即可认为需要校验的归档文件符合一致性校验。
在本申请的一个实施例中,如图4所示,步骤S220中归档服务器对归档文件进行一致性校验的过程,可以包括如下步骤:
步骤S410,对归档文件进行解压缩操作,得到归档文件中包含的目标数据和第一散列值;
步骤S420,将目标数据通过散列算法计算得到第二散列值;
步骤S430,判断第二散列值是否与第一散列值相同;
步骤S440,若第二散列值与第一散列值相同,则确定归档文件通过一致性校验。
在上述步骤中,由于第二散列值是由归档服务器从源服务器中获取的目标数据生成的,第二散列值与第一散列值的生成方式相同,都是通过MD5计算得到的,比较第二散列值是否与第一散列值相同,就可以校验出在源服务器中生成第一散列值的目标数据与发送成功后的目标数据是否相同,保证了通过一致性校验的归档文件的准确性。
同时,由于比较散列值比比较目标数据更加快速,并且每个目标数据对应唯一的散列值,比较散列值使提高校验效率的同时也使比较结果十分可靠。
在本申请的一个实施例中,继续参照图4,步骤S430中判断第二散列值是否与第一散列值相同后,若第二散列值与第一散列值不同,执行以下步骤:
在步骤S450中,获取归档文件的归档次数,比较归档次数与预设归档次数。
在本申请的一个实施例中,获取归档文件的归档次数具体为,归档文件每进行一次归档操作,归档文件的归档次数增加一次。其中,对于不同的归档文件分别计算归档次数,从而对于重要的归档文件可以设置更多的预设归档次数,从而保证归档的可靠性。
在步骤S460中,若归档次数大于预设归档次数,向源服务器发送停止自动归档命令,并向源服务器发送管理员手动归档提示。
在归档操作中可以在检测到归档次数大于预设归档次数后,目标数据还没有归档成功时,通知源服务器不要再次执行归档的操作,通知用户手动归档,节省了源服务器和归档服务器的运算量。
在本申请的一个实施例中,如图5所示,步骤S450中预设归档次数可以通过以下步骤获得:
步骤S510, 获取归档文件中包含的目标数据的数量;
步骤S520,对于每个目标数据,确定该目标数据的数据类型,根据数据类型查找预设的数据类型与最大归档次数对照表,获得数据类型的最大容忍归档次数;
步骤S530,获得目标数据中所有目标数据的最大容忍归档次数的和与目标数据的数量的比值;
步骤S540,将该比值进行取整运算得到归档文件的预设归档次数。
目标数据的每一种类型,都对应一个最大容忍归档次数的,每种目标数据类型的最大容忍归档次数根据需要设定。例如,用户身份信息非常重要,可能需要尝试多次(如10次)后失败才放弃;但文档中的格式段非常不重要,传送较少次(如2次)失败后就可以放弃。但归档文件中的目标数据往往是不能分开传的,这时就需要根据归档文件中每个部分的重要性,看其对应的最大容纳归档次数,最后计算出作为一个整体,平均能够忍耐的归档次数作为预设归档次数。
在本申请的一个实施例中,每种数据类型的最大容忍归档次数可以根据以往的目标数据的归档的平均次数确定,考虑历史归档操作中的平均归档次数更加贴合使用实际,提高了目标数据归档操作的效率。
在本申请的一个实施例中,预设归档次数的计算中,需要考虑每种数据类型的最大容忍归档次数的权重,权重可以根据需要设定,权重也可以根据历史数据确定。
在本申请的一个实施例中,如图6所示,步骤S450中预设归档次数可以通过以下步骤获得:
步骤S610,检测源服务器与归档服务器的当前网络通信状态;
步骤S620,查找预设的源服务器与归档服务器的当前网络通信状态与预设归档次数对照表,获得与该当前网络通信状态匹配的预设归档次数。
在本申请的一个实施例中,可以根据源服务器与归档服务器的当前网络通信状态确定适合的预设归档次数,确定方式可以为当前网络通信状态越好,预设归档次数越小;当前网络通信状态越差,预设归档次数越大。减小了网络因素对目标数据归档的干扰,使目标数据归档更加可靠。
在本申请的一个实施例中,如图7所示,步骤S450中预设归档次数可以通过以下步骤获得:
步骤S710,检测源服务器与归档服务器的当前网络通信状态;
步骤S720,若当前网络通信状态为通信断开,向源服务器发送管理员手动归档提示。
当前网络通信状态为通信断开时,归档服务器不能从源服务器中获得归档文件,此时直接提示用户手动归档,节省了源服务器和归档服务器的运算量。
继续参照图2所示,在步骤S230中,当归档文件通过一致性校验时,将归档文件中包含的目标数据存储至归档服务器的存储空间,并向源服务器发送删除通知,删除通知指示源服务器删除归档文件包含的目标数据。
在本申请的一个实施例中,归档文件中的目标数据按照设定的优先级依次进行存储,优先级可以与目标数据的类型有关。目标数据可以进行加密后再存储,提高目标数据归档的安全性。目标数据可以进行特征提取后将特征进行存储,或者目标数据可以压缩后存储,减少目标数据占用的归档服务器的空间。
在本申请的一个实施例中,归档文件中的目标数据按照设定类型分类存档,方便对目标数据进行再处理。
在本申请的一个实施例中,将归档文件中包含的目标数据存储至归档服务器的存储空间后,查找源服务器中要删除的目标数据,查找要删除的目标数据的使用情况,当确认目标数据不被占用时,向源服务器发送删除通知,从而避免了将用户需要使用的目标数据误删。
在本申请的一个实施例中,在将目标数据生成归档文件之前,向源服务器发送归档提示和删除通知,减少用户的操作步骤。
在本申请的一些实施例所提供的技术方案中,通过从源服务器获取归档文件,归档文件包含需要归档的目标数据;对归档文件进行一致性校验;当归档文件通过一致性校验时,将归档文件中包含的目标数据存储至归档服务器的存储空间,并向源服务器发送删除通知,删除通知指示源服务器删除归档文件包含的目标数据。由于该方案会对归档文件进行一致性校验,在确认归档文件是完整的情况下才会清理源服务器上的目标数据,从而保证了目标数据归档的可靠性。
以下介绍本申请的装置实施例,可以用于执行本申请上述实施例中的目标数据归档方法。对于本申请装置实施例中未披露的细节,请参照本申请上述的目标数据归档方法的实施例。
图8示意性示出了根据本申请的一个实施例的目标数据归档装置的框图。
参照图8所示,根据本申请的一个实施例的目标数据归档装置800,包括:获取模块801、校验模块802、存储模块803和通知模块804。
其中,获取模块801用于从源服务器获取归档文件,归档文件包含需要归档的目标数据;校验模块802用于对归档文件进行一致性校验;存储模块803用于当归档文件通过一致性校验时,将归档文件中包含的目标数据存储至归档服务器的存储空间;通知模块804用于向源服务器发送删除通知,删除通知指示源服务器删除归档文件包含的目标数据。
在本申请的一些实施例中,基于前述方案,获取模块801配置为:获取源服务器中需要归档的目标数据,将目标数据通过散列算法计算得到第一散列值;将目标数据和第一散列值对应存储后压缩作为归档文件。
在本申请的一些实施例中,基于前述方案,校验模块802配置为:对归档文件进行解压缩操作,得到归档文件中包含的目标数据和第一散列值;将目标数据通过散列算法计算得到第二散列值;判断第二散列值是否与第一散列值相同;若第二散列值与第一散列值相同,则确定归档文件通过一致性校验。
在本申请的一些实施例中,基于前述方案,校验模块802配置为:若第二散列值与第一散列值不同,则获取归档文件的归档次数,比较归档次数与预设归档次数;若归档次数大于预设归档次数,向源服务器发送停止自动归档命令,并向源服务器发送管理员手动归档提示。
在本申请的一些实施例中,基于前述方案,校验模块802配置为:获取归档文件中包含的目标数据的数量;对于每个目标数据,确定该目标数据的数据类型,根据数据类型查找预设的数据类型与最大归档次数对照表,获得数据类型的最大容忍归档次数;获得目标数据中所有目标数据的最大容忍归档次数的和与目标数据的数量的比值;将该比值进行取整运算得到归档文件的预设归档次数。
在本申请的一些实施例中,基于前述方案,校验模块802还配置为:检测源服务器与归档服务器的当前网络通信状态;查找预设的源服务器与归档服务器的当前网络通信状态与预设归档次数对照表,获得与该当前网络通信状态匹配的预设归档次数。
在本申请的一些实施例中,基于前述方案,校验模块802还配置为:在检测源服务器与归档服务器的当前网络通信状态后,若当前网络通信状态为通信断开,向源服务器发送管理员手动归档提示。
所属技术领域的技术人员能够理解,本申请的各个方面可以实现为系统、方法或程序产品。因此,本申请的各个方面可以具体实现为以下形式,即:完全的硬件实施方式、完全的软件实施方式(包括固件、微代码等),或硬件和软件方面结合的实施方式,这里可以统称为“电路”、“模块”或“系统”。
下面参照图9来描述根据本申请的这种实施方式的计算机设备90。图9显示的计算机设备90仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图9所示,计算机设备90以通用计算设备的形式表现。计算机设备90的组件可以包括但不限于:上述至少一个处理单元91、上述至少一个存储单元92、连接不同系统组件(包括存储单元92和处理单元91)的总线93、显示单元94。
其中,所述存储单元存储有程序代码,所述程序代码可以被所述处理单元91执行,使得所述处理单元91执行本说明书上述“实施例方法”部分中描述的根据本申请各种示例性实施方式的步骤。
存储单元92可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)921和/或高速缓存存储单元922,还可以进一步包括只读存储单元(ROM)923。
存储单元92还可以包括具有一组(至少一个)程序模块925的程序/实用工具924,这样的程序模块925包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。
总线93可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。
计算机设备90也可以与一个或多个外部设备(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该计算机设备90交互的设备通信,和/或与使得该计算机设备90能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口95进行。并且,计算机设备90还可以通过网络适配器96与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图所示,网络适配器96通过总线93与计算机设备90的其它模块通信。应当明白,尽管图中未示出,可以结合计算机设备90使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本申请实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、终端装置、或者网络设备等)执行根据本申请实施方式的方法。
根据本申请一个实施例,还提供了一种计算机可读存储介质,其上存储有能够实现本说明书上述方法的程序产品。在一些可能的实施方式中,本申请的各个方面还可以实现为一种程序产品的形式,其包括程序代码,当所述程序产品在终端设备上运行时,所述程序代码用于使所述终端设备执行本说明书上述“示例性方法”部分中描述的根据本申请各种示例性实施方式的步骤。
参考图10所示,描述了根据本申请的实施方式的用于实现上述方法的程序产品100,其可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在终端设备,例如个人电脑上运行。然而,本申请的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
所述程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。
计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读信号介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言的任意组合来编写用于执行本申请操作的程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如Java、C++等,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。
根据本申请一个实施例,还提供了一种计算机程序产品,计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,计算机程序可操作来使计算机执行如本申请上述实施例中的目标数据归档方法。
本领域技术人员在考虑说明书及实践这里申请的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未申请的本技术领域中的公知常识或惯用技术手段。
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。

Claims (22)

  1. 一种目标数据归档方法,包括:
    从源服务器获取归档文件,所述归档文件包含需要归档的目标数据;
    所述从源服务器获取归档文件包括:获取所述源服务器中需要归档的目标数据,将所述目标数据通过散列算法计算得到第一散列值;将所述目标数据和所述第一散列值对应存储后压缩作为所述归档文件;
    对所述归档文件进行一致性校验;
    所述对所述归档文件进行一致性校验包括:对所述归档文件进行解压缩操作,得到所述归档文件中包含的所述目标数据和所述第一散列值;将所述目标数据通过所述散列算法计算得到第二散列值;判断所述第二散列值是否与所述第一散列值相同;若所述第二散列值与所述第一散列值相同,则确定所述归档文件通过一致性校验;
    当所述归档文件通过一致性校验时,将所述归档文件中包含的目标数据存储至归档服务器的存储空间,并向源服务器发送删除通知,所述删除通知指示所述源服务器删除所述归档文件包含的目标数据。
  2. 根据权利要求1所述的目标数据归档方法,其中,对所述归档文件进行一致性校验还包括:
    若所述第二散列值与所述第一散列值不同,则获取所述归档文件的归档次数,比较所述归档次数与预设归档次数;
    若所述归档次数大于所述预设归档次数,向所述源服务器发送停止自动归档命令,并向所述源服务器发送管理员手动归档提示。
  3. 根据权利要求2所述的目标数据归档方法,其中,在比较所述归档次数与预设归档次数之前,所述方法还包括:
    获取所述归档文件中包含的所述目标数据的数量;
    对于每个目标数据,确定该目标数据的数据类型,根据所述数据类型查找预设的所述数据类型与最大归档次数对照表,获得所述数据类型的最大容忍归档次数;
    获得所述目标数据中所有目标数据的最大容忍归档次数的和与所述目标数据的数量的比值;
    将该比值进行取整运算得到所述归档文件的预设归档次数。
  4. 根据权利要求2所述的目标数据归档方法,其中,在比较所述归档次数与预设归档次数之前,所述方法还包括:
    检测源服务器与归档服务器的当前网络通信状态;
    查找预设的所述源服务器与归档服务器的当前网络通信状态与所述预设归档次数对照表,获得与该当前网络通信状态匹配的预设归档次数。
  5. 根据权利要求2所述的目标数据归档方法,其中,在所述检测源服务器与归档服务器的当前网络通信状态后,
    若所述当前网络通信状态为通信断开,向源服务器发送管理员手动归档提示。
  6. 一种目标数据归档装置,包括:
    获取模块,配置为从源服务器获取归档文件,所述归档文件包含需要归档的目标数据;
    所述获取模块被配置为:获取所述源服务器中需要归档的目标数据,将所述目标数据通过散列算法计算得到第一散列值;将所述目标数据和所述第一散列值对应存储后压缩作为所述归档文件;
    校验模块,配置为对所述归档文件进行一致性校验;
    所述校验模块被配置为:对所述归档文件进行解压缩操作,得到所述归档文件中包含的所述目标数据和所述第一散列值;将所述目标数据通过所述散列算法计算得到第二散列值;判断所述第二散列值是否与所述第一散列值相同;若所述第二散列值与所述第一散列值相同,则确定所述归档文件通过一致性校验;
    存储模块,配置为当所述归档文件通过一致性校验时,将所述归档文件中包含的目标数据存储至归档服务器的存储空间;
    通知模块,配置为向源服务器发送删除通知,所述删除通知指示所述源服务器删除所述归档文件包含的目标数据。
  7. 根据权利要求6所述的装置,所述校验模块被配置为:
    若所述第二散列值与所述第一散列值不同,则获取所述归档文件的归档次数,比较所述归档次数与预设归档次数;
    若所述归档次数大于所述预设归档次数,向所述源服务器发送停止自动归档命令,并向所述源服务器发送管理员手动归档提示。
  8. 根据权利要求6所述的装置,所述校验模块被配置为:
    获取所述归档文件中包含的所述目标数据的数量;
    对于每个目标数据,确定该目标数据的数据类型,根据所述数据类型查找预设的所述数据类型与最大归档次数对照表,获得所述数据类型的最大容忍归档次数;
    获得所述目标数据中所有目标数据的最大容忍归档次数的和与所述目标数据的数量的比值;
    将该比值进行取整运算得到所述归档文件的预设归档次数。
  9. 根据权利要求6所述的装置,所述校验模块被配置为:
    检测源服务器与归档服务器的当前网络通信状态;
    查找预设的所述源服务器与归档服务器的当前网络通信状态与所述预设归档次数对照表,获得与该当前网络通信状态匹配的预设归档次数。
  10. 根据权利要求6所述的装置,所述校验模块被配置为:
    在所述检测源服务器与归档服务器的当前网络通信状态后,
    若所述当前网络通信状态为通信断开,向源服务器发送管理员手动归档提示。
  11. 一种电子设备,包括:处理器;以及存储器,用于存储所述处理器的用户特征群中用户特征寻优程序;其中,所述处理器配置为经由执行所述用户特征群中用户特征寻优程序来执行以下处理:
    从源服务器获取归档文件,所述归档文件包含需要归档的目标数据;
    所述从源服务器获取归档文件包括:获取所述源服务器中需要归档的目标数据,将所述目标数据通过散列算法计算得到第一散列值;将所述目标数据和所述第一散列值对应存储后压缩作为所述归档文件;
    对所述归档文件进行一致性校验;
    所述对所述归档文件进行一致性校验包括:对所述归档文件进行解压缩操作,得到所述归档文件中包含的所述目标数据和所述第一散列值;将所述目标数据通过所述散列算法计算得到第二散列值;判断所述第二散列值是否与所述第一散列值相同;若所述第二散列值与所述第一散列值相同,则确定所述归档文件通过一致性校验;
    当所述归档文件通过一致性校验时,将所述归档文件中包含的目标数据存储至归档服务器的存储空间,并向源服务器发送删除通知,所述删除通知指示所述源服务器删除所述归档文件包含的目标数据。
  12. 根据权利要求11所述的电子设备,其中,所述从源服务器获取归档文件包括:
    获取所述源服务器中需要归档的目标数据,将所述目标数据通过散列算法计算得到第一散列值;
    将所述目标数据和所述第一散列值对应存储后压缩作为所述归档文件。
  13. 根据权利要求11所述的电子设备,其中,所述对所述归档文件进行一致性校验包括:
    对所述归档文件进行解压缩操作,得到所述归档文件中包含的所述目标数据和所述第一散列值;
    将所述目标数据通过所述散列算法计算得到第二散列值;
    判断所述第二散列值是否与所述第一散列值相同;
    若所述第二散列值与所述第一散列值相同,则确定所述归档文件通过一致性校验。
  14. 根据权利要求11所述的电子设备,其中,对所述归档文件进行一致性校验还包括:
    若所述第二散列值与所述第一散列值不同,则获取所述归档文件的归档次数,比较所述归档次数与预设归档次数;
    若所述归档次数大于所述预设归档次数,向所述源服务器发送停止自动归档命令,并向所述源服务器发送管理员手动归档提示。
  15. 根据权利要求11所述的电子设备,其中,在比较所述归档次数与预设归档次数之前,所述方法还包括:
    获取所述归档文件中包含的所述目标数据的数量;
    对于每个目标数据,确定该目标数据的数据类型,根据所述数据类型查找预设的所述数据类型与最大归档次数对照表,获得所述数据类型的最大容忍归档次数;
    获得所述目标数据中所有目标数据的最大容忍归档次数的和与所述目标数据的数量的比值;
    将该比值进行取整运算得到所述归档文件的预设归档次数。
  16. 根据权利要求11所述的电子设备,其中,在比较所述归档次数与预设归档次数之前,所述方法还包括:
    检测源服务器与归档服务器的当前网络通信状态;
    查找预设的所述源服务器与归档服务器的当前网络通信状态与所述预设归档次数对照表,获得与该当前网络通信状态匹配的预设归档次数。
  17. 根据权利要求11所述的电子设备,其中,在所述检测源服务器与归档服务器的当前网络通信状态后,
    若所述当前网络通信状态为通信断开,向源服务器发送管理员手动归档提示。
  18. 一种计算机非易失性可读存储介质,其上存储有目标数据归档程序,所述目标数据归档程序被处理器执行时实现以下处理:
    从源服务器获取归档文件,所述归档文件包含需要归档的目标数据;
    所述从源服务器获取归档文件包括:获取所述源服务器中需要归档的目标数据,将所述目标数据通过散列算法计算得到第一散列值;将所述目标数据和所述第一散列值对应存储后压缩作为所述归档文件;
    对所述归档文件进行一致性校验;
    所述对所述归档文件进行一致性校验包括:对所述归档文件进行解压缩操作,得到所述归档文件中包含的所述目标数据和所述第一散列值;将所述目标数据通过所述散列算法计算得到第二散列值;判断所述第二散列值是否与所述第一散列值相同;若所述第二散列值与所述第一散列值相同,则确定所述归档文件通过一致性校验;
    当所述归档文件通过一致性校验时,将所述归档文件中包含的目标数据存储至归档服务器的存储空间,并向源服务器发送删除通知,所述删除通知指示所述源服务器删除所述归档文件包含的目标数据。
  19. 根据权利要求18所述的计算机非易失性可读存储介质,其中,对所述归档文件进行一致性校验还包括:
    若所述第二散列值与所述第一散列值不同,则获取所述归档文件的归档次数,比较所述归档次数与预设归档次数;
    若所述归档次数大于所述预设归档次数,向所述源服务器发送停止自动归档命令,并向所述源服务器发送管理员手动归档提示。
  20. 根据权利要求18所述的计算机非易失性可读存储介质,其中,在比较所述归档次数与预设归档次数之前,所述方法还包括:
    获取所述归档文件中包含的所述目标数据的数量;
    对于每个目标数据,确定该目标数据的数据类型,根据所述数据类型查找预设的所述数据类型与最大归档次数对照表,获得所述数据类型的最大容忍归档次数;
    获得所述目标数据中所有目标数据的最大容忍归档次数的和与所述目标数据的数量的比值;
    将该比值进行取整运算得到所述归档文件的预设归档次数。
  21. 根据权利要求18所述的计算机非易失性可读存储介质,其中,在比较所述归档次数与预设归档次数之前,所述方法还包括:
    检测源服务器与归档服务器的当前网络通信状态;
    查找预设的所述源服务器与归档服务器的当前网络通信状态与所述预设归档次数对照表,获得与该当前网络通信状态匹配的预设归档次数。
  22. 根据权利要求18所述的计算机非易失性可读存储介质,其中,在所述检测源服务器与归档服务器的当前网络通信状态后,
    若所述当前网络通信状态为通信断开,向源服务器发送管理员手动归档提示。
PCT/CN2019/117673 2019-09-17 2019-11-12 目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质 WO2021051563A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910878006.1 2019-09-17
CN201910878006.1A CN110716895B (zh) 2019-09-17 2019-09-17 目标数据归档方法、装置、计算机设备及介质

Publications (1)

Publication Number Publication Date
WO2021051563A1 true WO2021051563A1 (zh) 2021-03-25

Family

ID=69209904

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/117673 WO2021051563A1 (zh) 2019-09-17 2019-11-12 目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质

Country Status (2)

Country Link
CN (1) CN110716895B (zh)
WO (1) WO2021051563A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113296699A (zh) * 2021-03-30 2021-08-24 阿里巴巴新加坡控股有限公司 数据处理方法及装置
CN113703863A (zh) * 2021-07-30 2021-11-26 济南浪潮数据技术有限公司 一种集群信息归档方法、系统、存储介质及设备
CN113778956A (zh) * 2021-09-15 2021-12-10 京东科技信息技术有限公司 资源处理方法、装置、电子设备和计算机可读介质
CN115334085A (zh) * 2022-07-28 2022-11-11 中山金色医疗科技发展有限公司 业务数据获取方法、装置、系统及计算机可读存储介质

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111538699A (zh) * 2020-03-31 2020-08-14 首钢京唐钢铁联合有限责任公司 一种数据归档方法及装置
CN111611211A (zh) * 2020-04-27 2020-09-01 深圳壹账通智能科技有限公司 文件导入归档方法、电子设备及存储介质
CN113742786B (zh) * 2020-05-29 2024-02-20 北京金山云网络技术有限公司 区块链中归档数据校验方法及装置
CN111784115B (zh) * 2020-06-09 2024-06-11 岭东核电有限公司 核电站化学品信息管理方法、系统、设备及存储介质
CN112148687A (zh) * 2020-09-27 2020-12-29 上海七牛信息技术有限公司 一种对象存储中文件删除或归档的方法以及系统
CN112181945B (zh) * 2020-09-28 2023-11-21 中国平安人寿保险股份有限公司 数据归档处理方法、装置、计算机设备及存储介质
CN112540733A (zh) * 2020-12-23 2021-03-23 华录光存储研究院(大连)有限公司 一种数据管理方法、装置、电子设备及存储介质
CN112632009A (zh) * 2020-12-29 2021-04-09 航天信息股份有限公司 电子档案的处理方法、装置、存储介质及电子设备
CN113194026A (zh) * 2021-04-20 2021-07-30 北京异乡旅行网络科技有限公司 消息处理方法及装置
CN113220635B (zh) * 2021-05-11 2022-02-15 深圳市星火数控技术有限公司 文件归档方法、装置、设备与计算机可读存储介质
CN113360456B (zh) * 2021-08-11 2021-10-29 腾讯科技(深圳)有限公司 数据归档方法、装置、设备以及存储介质
CN116257488B (zh) * 2023-02-21 2023-08-25 深圳市勘察测绘院(集团)有限公司 岩土工程勘察大数据归档方法、装置、电子设备及介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034049A (zh) * 2010-12-30 2011-04-27 华中科技大学 海量数据压缩加密存储及检索系统及其使用方法
CN102103524A (zh) * 2010-12-23 2011-06-22 北京航空航天大学 一种面向内存冗余的虚拟机迁移装置及其方法
CN107423436A (zh) * 2017-08-04 2017-12-01 郑州云海信息技术有限公司 一种用于不同类型数据库间在线数据迁移的方法
CN109634912A (zh) * 2018-12-10 2019-04-16 苏州思必驰信息科技有限公司 数据迁移方法及系统
US20190146946A1 (en) * 2017-08-02 2019-05-16 Zhongan Information Technology Service Co., Ltd. Method and device for archiving block data of blockchain and method and device for querying the same
CN109857723A (zh) * 2019-01-31 2019-06-07 深圳市迷你玩科技有限公司 基于可扩容数据库集群的动态数据迁移方法及相关设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1853181A (zh) * 2003-09-15 2006-10-25 Ab开元软件公司 数据归档
US7082447B2 (en) * 2004-06-16 2006-07-25 Hitachi, Ltd. Method and apparatus for archive data validation in an archive system
JP2007235771A (ja) * 2006-03-03 2007-09-13 Murata Mach Ltd 通信端末装置と通信方法及び通信プログラム
CN109710614A (zh) * 2018-12-28 2019-05-03 深圳市同行者科技有限公司 一种实时数据存储与查询的方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102103524A (zh) * 2010-12-23 2011-06-22 北京航空航天大学 一种面向内存冗余的虚拟机迁移装置及其方法
CN102034049A (zh) * 2010-12-30 2011-04-27 华中科技大学 海量数据压缩加密存储及检索系统及其使用方法
US20190146946A1 (en) * 2017-08-02 2019-05-16 Zhongan Information Technology Service Co., Ltd. Method and device for archiving block data of blockchain and method and device for querying the same
CN107423436A (zh) * 2017-08-04 2017-12-01 郑州云海信息技术有限公司 一种用于不同类型数据库间在线数据迁移的方法
CN109634912A (zh) * 2018-12-10 2019-04-16 苏州思必驰信息科技有限公司 数据迁移方法及系统
CN109857723A (zh) * 2019-01-31 2019-06-07 深圳市迷你玩科技有限公司 基于可扩容数据库集群的动态数据迁移方法及相关设备

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113296699A (zh) * 2021-03-30 2021-08-24 阿里巴巴新加坡控股有限公司 数据处理方法及装置
CN113703863A (zh) * 2021-07-30 2021-11-26 济南浪潮数据技术有限公司 一种集群信息归档方法、系统、存储介质及设备
CN113703863B (zh) * 2021-07-30 2023-12-22 济南浪潮数据技术有限公司 一种集群信息归档方法、系统、存储介质及设备
CN113778956A (zh) * 2021-09-15 2021-12-10 京东科技信息技术有限公司 资源处理方法、装置、电子设备和计算机可读介质
CN115334085A (zh) * 2022-07-28 2022-11-11 中山金色医疗科技发展有限公司 业务数据获取方法、装置、系统及计算机可读存储介质

Also Published As

Publication number Publication date
CN110716895B (zh) 2023-05-26
CN110716895A (zh) 2020-01-21

Similar Documents

Publication Publication Date Title
WO2021051563A1 (zh) 目标数据归档方法、装置、电子设备及计算机非易失性可读存储介质
WO2021164178A1 (zh) 基于云技术的文件分片上传方法、装置、设备及存储介质
CN108234539B (zh) 一种文件上传、下载、传输方法及装置
US8108536B1 (en) Systems and methods for determining the trustworthiness of a server in a streaming environment
WO2021139238A1 (zh) 云业务应用升级方法、装置、电子设备和存储介质
US10965732B2 (en) Streaming zip
CN112948340A (zh) 数据同步方法、装置、电子设备及可读存储介质
WO2021139224A1 (zh) 云场景下的文件备份方法、装置、介质、电子设备
CN109391673A (zh) 一种管理更新文件的方法、系统及终端设备
WO2021190659A1 (zh) 系统的数据获取方法、装置、介质及电子设备
US20170220424A1 (en) Recovery point objectives in replication envrionments
WO2021155683A1 (zh) 日志打印方法、装置、电子设备和存储介质
US20200401317A1 (en) Method, device, and computer program product for managing data placement
US10572433B2 (en) Accessing data in accordance with an execution deadline
WO2021012741A1 (zh) 基于经验库的异常前端操作提醒的方法及相关设备
CN110134419B (zh) 一种双面柜的系统升级方法、装置、设备及存储介质
CN115297104B (zh) 文件上传方法、装置、电子设备和存储介质
CN114598556B (zh) It基础设施配置完整性保护方法及保护系统
US10091298B2 (en) Enhancing performance of data storage in a dispersed storage network
CN114172894A (zh) 数据传输方法、装置、服务器和计算机设备
US10649869B2 (en) Burn process data retrieval and notification
CN111723153A (zh) 一种数据同步处理方法、装置、设备及存储介质
CN112732728A (zh) 一种数据同步方法和系统
CN112114739A (zh) 用于管理数据对象的方法、设备和计算机程序产品
TW201337627A (zh) 封包資料提取裝置、封包資料提取裝置之控制方法、控制程式及電腦可讀取之儲存媒體

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19945938

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19945938

Country of ref document: EP

Kind code of ref document: A1