WO2022183713A1 - 数据存储方法、装置、设备及存储介质 - Google Patents

数据存储方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2022183713A1
WO2022183713A1 PCT/CN2021/119378 CN2021119378W WO2022183713A1 WO 2022183713 A1 WO2022183713 A1 WO 2022183713A1 CN 2021119378 W CN2021119378 W CN 2021119378W WO 2022183713 A1 WO2022183713 A1 WO 2022183713A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
data
identifier
identification
target
Prior art date
Application number
PCT/CN2021/119378
Other languages
English (en)
French (fr)
Inventor
甘明明
胡吉晶
李洁
杨燕明
赵海
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Priority to US18/013,152 priority Critical patent/US20230244405A1/en
Publication of WO2022183713A1 publication Critical patent/WO2022183713A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • G06F3/0607Improving or facilitating administration, e.g. storage management by facilitating the process of upgrading existing storage systems, e.g. for improving compatibility between host and storage device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Definitions

  • the present application relates to the technical field of data storage, and in particular, to a data storage method, apparatus, device, and storage medium.
  • the user data storage solution is usually to centrally store user data in all regions on a core distributed host in a certain place, or store user data in all regions synchronously on distributed hosts in each region. It can be seen that, in the above-mentioned user data storage solution, user data in multiple regions will be stored together, which is prone to leakage of the full amount of user data, and the security is low.
  • the embodiments of the present application provide a data storage method, apparatus, device, and storage medium, which can realize subregional storage of user data and improve data storage security.
  • an embodiment of the present application provides a data storage method, and the method is applied to a data storage device, including:
  • At least two distributed hosts From the preset at least two distributed hosts, determine a first identification distributed host corresponding to the first user identification, and a first data distributed host corresponding to the first user data, wherein the first identification distributed host and the first identification distributed host are determined.
  • One data distributed host is the same or different, and at least two distributed hosts are located in different regions;
  • the first identity identifier and the first user data are sent to the first data distribution host, so that the first data distribution host associates and stores the first identity identifier and the first user data.
  • an embodiment of the present application provides a data storage device, and the device is applied to a data storage device, including:
  • an acquisition module for acquiring the first user identifier and the first user data of the first user
  • a determining module configured to determine, from the preset at least two distributed hosts, a first identification distributed host corresponding to the first user identification, and a first data distributed host corresponding to the first user data, wherein the first identification The distributed host is the same as or different from the first data distributed host, and at least two distributed hosts are located in different regions;
  • a sending module configured to send the first user identification to the first identification distributed host, so that the first identification distributed host stores the first user identification, and generates and stores the first identification corresponding to the first user identification;
  • a receiving module configured to receive the first identity identifier sent by the first identifier distributed host
  • the sending module is further configured to send the first identity identifier and the first user data to the first data distribution host, so that the first data distribution host associates and stores the first identity identifier and the first user data.
  • an embodiment of the present application provides a data storage device, the device includes: a processor and a memory storing computer program instructions; when the processor executes the computer program instructions, the data storage method described in the first aspect is implemented.
  • an embodiment of the present application provides a computer-readable storage medium, where computer program instructions are stored thereon, and when the computer program instructions are executed by a processor, the data storage method described in the first aspect is implemented.
  • the data storage device acquires the first user identifier and the first user data of the first user, and obtains the first user ID and first user data from the preset at least two distributed distributed data in different areas.
  • the first identification distributed host corresponding to the first user identification and the first data distributed host corresponding to the first user data are determined, and the first identification distributed host is sent to the first identification distributed host.
  • the first identifier distributed host stores the first user identifier, generates and stores the first identifier corresponding to the first user identifier, and sends the first identifier to the data storage device.
  • the data storage device sends the first identity identifier and the first user data to the first data distribution host.
  • the first data distribution host stores the first identity identifier in association with the first user data.
  • the user data can be stored in the corresponding distributed hosts, that is, the distributed hosts located in different regions store the corresponding user data, thereby realizing subregional storage of user data and improving the security of user data storage.
  • FIG. 1 is a schematic diagram of the architecture of the data storage system involved in the present application.
  • FIG. 2 is a schematic flowchart of an embodiment of a data storage method involved in the present application
  • FIG. 3 is a schematic structural diagram of an embodiment of a data storage device involved in the present application.
  • FIG. 4 is a schematic structural diagram of an embodiment of a data storage device involved in the present application.
  • Method 1 centralized management. Specifically, after obtaining user data, the distributed hosts in each region can send the obtained user data to the core distributed host for storage, that is, the core distributed host stores the full amount of user data, that is, user data in all regions.
  • Method 2 Synchronous management. Specifically, after obtaining user data, the distributed hosts in each region first save it locally, and then synchronize the obtained user data to distributed hosts in other regions in real time, so that the full amount of user data is deployed in each region in a distributed manner. There is storage in the mainframe.
  • inventions of the present application provide a data storage method, apparatus, device, and storage medium.
  • the data storage device acquires the first user identifier and the first user data of the first user, and determines, from the preset at least two distributed hosts located in different areas, the first identifier distributed host corresponding to the first user identifier, and the first identifier distributed host.
  • the first data distribution host corresponding to the user data sends the first user identification to the first identification distributed host.
  • the first identifier distributed host stores the first user identifier, generates and stores the first identifier corresponding to the first user identifier, and sends the first identifier to the data storage device.
  • the data storage device sends the first identity identifier and the first user data to the first data distribution host.
  • the first data distribution host stores the first identity identifier in association with the first user data.
  • the user data can be stored in the corresponding distributed hosts, that is, the distributed hosts located in different regions store the corresponding user data, thereby realizing subregional storage of user data and improving the security of user data storage.
  • the data storage method provided by the embodiment of the present application may be applied to user data storage scenarios in fields such as payment, insurance, social networking, or leasing, which is not limited in the embodiment of the present application.
  • FIG. 1 is a schematic diagram of the architecture of the data storage system involved in the present application.
  • the data storage system may include a data storage device 110 and at least two distributed hosts 120 , which is not limited herein.
  • the data storage device 110 may be a server, a network attached storage (Network Attached Storage, NAS), or a personal computer (Personal Computer, PC), and so on.
  • the data storage device 110 may also be any one of the distributed hosts 120, and may also be a module in any of the distributed hosts 120, which is not limited herein.
  • the distributed hosts 120 are hosts distributed using a distributed architecture, and any two distributed hosts 120 are located in different regions.
  • the distributed host 120 may be constituted by a cluster of hosts.
  • the data storage device 110 communicates with at least two distributed hosts 120 respectively.
  • the communication mode may be wired communication or wireless communication.
  • the data storage device 110 and the distributed host 120 use a network cable or WiFi to communicate.
  • the data storage device 110 may acquire the first user identification and the first user data of the first user.
  • the first user identifier may be used to represent the identity of the first user, which may be a mobile phone number, an ID number, a passport number, or the like.
  • the first user data may be personal data required by the first user to handle services, which may be bank card information, social security card information, or personal address, and so on. It can be understood that the first user identifier and the first user data of the first user may include multiple ones.
  • the terminal device may receive the first user identifier and the first user data input by the first user on the terminal device, and send the first user identifier and the first user data to the data storage device 110 .
  • the data storage device 110 receives the first user identifier and the first user data sent by the terminal device.
  • the data storage device 110 may determine, from the at least two distributed hosts 120, a first identification distributed host corresponding to the first user identification, and a first data distributed host corresponding to the first user data, and distribute the data to the first identification.
  • the host sends the first user identification.
  • the first identifier distributed host may be a host deployed in an area to which the first user identifier belongs.
  • the first data distribution host may be a host deployed in an area where the first user data belongs.
  • the first identification distributed host and the first data distributed host may be the same distributed host 120, or may be different distributed hosts 120.
  • the first identifier distributed host may store the first user identifier, generate and store the first identifier corresponding to the first user identifier, and then send the first identifier to the data storage device 110 .
  • the first identity identifier may be used to represent the identity of the first user.
  • the first identification distributed host may calculate a hash value of the first user identification according to a hash algorithm, and use the hash value as the first identification.
  • the first identifier distributed host may also randomly generate a universally unique identifier (Universally Unique Identifier, UUID) corresponding to the first user identifier one-to-one, and use the UUID as the first identifier.
  • UUID Universally unique Identifier
  • the data storage device 110 receives the first identity identifier sent by the first identifier distribution host, and sends the first identity identifier and the first user data to the first data distribution host.
  • the first data distribution host may store the first identity in association with the first user data.
  • the user data can be stored in the corresponding distributed hosts, that is, the distributed hosts located in different regions store the corresponding user data, thereby realizing subregional storage of user data and improving the security of user data storage.
  • the data storage method provided by the embodiments of the present application will be described in detail below. Exemplarily, the data storage method can be applied to the data storage system shown in FIG. 1 .
  • FIG. 2 is a schematic flowchart of an embodiment of a data storage method involved in the present application. As shown in Figure 2, the data storage method may include the following steps:
  • the data storage device acquires the first user identifier and the first user data of the first user.
  • the data storage device may obtain the first user identification and the first user data of the first user.
  • the first user identifier may be used to represent the identity of the first user, which may be a mobile phone number, an ID number, a passport number, or the like.
  • the first user data may be personal data required by the first user to handle services, which may be bank card information, social security card information, or personal address, and so on. It can be understood that the first user identifier and the first user data of the first user may include multiple ones.
  • the data storage device may receive the first user identifier and the first user data sent by the terminal device. Specifically, when handling a service, the first user may input the first user identifier and the first user data in the terminal device, and in response to the user input, the terminal device may send the first user identifier and the first user data to the data storage device. Correspondingly, the data storage device receives the first user identifier and the first user data sent by the terminal device.
  • the data storage method may further include: S220, the data storage device determines, from the preset at least two distributed hosts, the first identifier distributed host corresponding to the first user identifier, and the first user data The corresponding first data distribution host.
  • At least two distributed hosts are located in different areas, and the area level of the area can be set as required.
  • distributed host 1 is located in region 1
  • distributed host 2 is located in region 2
  • distributed host 3 is located in region 3.
  • region 1 is country 1
  • region 2 is country 2
  • region 3 is country 3.
  • the first identity distributed host may be a host deployed in an area to which the first user identity belongs.
  • the first data distribution host may be a host deployed in an area where the first user data belongs. It can be understood that the first identification distributed host and the first data distributed host may be the same distributed host, or may be different distributed hosts.
  • the data storage device may first determine the home area corresponding to the first user identifier, that is, the area to which the first user identifier belongs, according to the first user identifier and the preset correspondence between the user identifier and the home area, such as a mobile phone The country the number belongs to. Then, determine the first target area that is the same as the home area corresponding to the first user identifier in the area where the at least two distributed hosts are located, and take the distributed host corresponding to the first target area, that is, the distributed host deployed in the first target area as The first identifies the distributed host. In this way, the user ID can be stored in the distributed host at the home location, so that the localized storage of the user ID can be realized, which is convenient for the supervision of the local institution.
  • the data storage device may first determine the home area corresponding to the first user data, that is, the home area to which the first user data belongs, according to the user data type of the first user data and the preset correspondence between the user data type and the home area.
  • the user data type can be used to represent the category of user data, for example, the category of user data 1 is bank card information of country 1, and the category of user data 2 is social security card information of country 2.
  • the data storage method may further include: S230, the data storage device sends the first user identification to the first identification distributed host.
  • the data storage method may further include: S240, the first identification distributed host stores the first user identification, and generates and stores the first identification corresponding to the first user identification.
  • the first identifier distributed host receives and stores the first user identifier sent by the data storage device, and at the same time, generates and stores the first identifier corresponding to the first user identifier.
  • the first identification distributed host may first query whether the first identification distributed host stores the first user identification. In the case that the first user identifier is not stored in the first identifier distributed host, a first identifier corresponding to the first user identifier is generated, and a corresponding relationship between the first user identifier and the first identifier is established and stored.
  • the first identification distributed host may calculate a hash value of the first user identification according to a hash algorithm, and use the hash value as the first identification.
  • the first identification distributed host may also randomly generate a UUID corresponding to the first user identification one-to-one, and use the UUID as the first identification.
  • the data storage method may further include: S250, the first identification distributed host sends the first identification to the data storage device.
  • the data storage method may further include: S260, the data storage device sends the first identity identifier and the first user data to the first data distribution host.
  • the data storage device receives the first identity identifier sent by the first identifier distribution host, and sends the first identity identifier and the first user data to the first data distribution host.
  • the data storage method may further include: S270, the first data distribution host associates and stores the first identity identifier with the first user data.
  • the first identity distributed host receives the first identity identifier and the first user data sent by the data storage device, and stores the first identity identifier and the first user data in association.
  • the data storage device acquires the first user identifier and the first user data of the first user, and determines the first user identifier corresponding to the first user identifier from at least two preset distributed hosts located in different areas. Identifies the distributed host and the first data distributed host corresponding to the first user data, and sends the first user identification to the first identification distributed host.
  • the first identifier distributed host stores the first user identifier, generates and stores the first identifier corresponding to the first user identifier, and sends the first identifier to the data storage device.
  • the data storage device sends the first identity identifier and the first user data to the first data distribution host.
  • the first data distribution host stores the first identity identifier in association with the first user data. In this way, the user data can be stored in the corresponding distributed hosts, that is, the distributed hosts located in different regions store the corresponding user data, thereby realizing subregional storage of user data and improving the security of user data storage.
  • the maintenance of the stored user ID and user data that is, the update, deletion and addition of the user ID and user data, will be described in detail below, as follows.
  • the method may further include:
  • the data storage device sends a first identification update request to the first identification distributed host.
  • the first identity update request includes the first user identity and the second user identity of the first user.
  • the second user identification is used to replace the first user identification, and the second user identification and the home area of the first user identification are the same.
  • the first user identification may be the mobile phone number 1 belonging to country 1 that is no longer used by the user, and the second user identification may be the mobile phone number 2 belonging to country 1 newly changed by the user.
  • the first user when the first user wants to update the stored first user identification, the first user may input the first user identification and the second user identification into the terminal device.
  • the terminal device In response to the user input, the terminal device sends a first identity update request including the first user identity and the second user identity to the data storage device, and then the data storage device sends the first identity update request to the first identity distributed host.
  • the first identifier distributed host receives and responds to the first identifier update request sent by the data storage device, and updates the stored first user identifier to the second user identifier, thereby realizing flexible update of user identifiers belonging to the same area.
  • the method may further include:
  • the data storage device acquires the third user identification of the first user.
  • the third user identifier is used to replace the first user identifier, and the home area of the first user identifier and the third user identifier is different.
  • the first user identifier may be a mobile phone number 1 belonging to country 1 that is no longer used by the user
  • the third user identity may be the mobile phone number 2 belonging to country 2 newly changed by the user.
  • a distributed host with a second identification corresponding to the third user identification is determined. The specific details are similar to those of S220, and are not repeated here.
  • a second identification update request is sent to the second identification distributed host.
  • the second identity update request includes the first identity identity and the third user identity.
  • the second identifier distributed host receives and stores the first identifier and the third user identifier in association in response to the second identifier update request sent by the data storage device. At the same time, a first identification deletion request is sent to the first identification distributed host. Wherein, the first identifier deletion request includes the first user identifier.
  • the first identification distributed host receives and responds to the first identification deletion request sent by the second identification distributed host, and deletes the stored first user identification and first identification. In this way, flexible updating of user identities belonging to different regions can be realized.
  • the method may further include:
  • the data storage device sends a second identification deletion request to the first identification distributed host.
  • the second identifier deletion request includes the first user identifier.
  • the first user may input the first user identification into the terminal device.
  • the terminal device sends a second identifier deletion request including the first user identifier to the data storage device, and the data storage device sends a second identifier deletion request to the first identifier distributed host.
  • the first identification distributed host receives and responds to the second identification deletion request sent by the data storage device, and deletes the stored first user identification and the first identification, so as to realize the rapid deletion of the user identification.
  • the method may further include:
  • the data storage device sends a data update request to the first data distribution host.
  • the data update request includes the first identity identifier and the second user data of the first user.
  • the second user data is used to replace the first user data, and the user data type of the first user data is the same as the user data type of the second user data.
  • the first user data and the second user data are both bank card information of the same country.
  • the first user when the first user wants to update the stored first user data, the first user may input the first user identification and the second user data into the terminal device.
  • the terminal device transmits the first user identification and the second user data to the data storage device.
  • the data storage device obtains the first identity from the first identity distribution host according to the first user identity, and then sends a data update request including the first identity and second user data to the first data distribution host.
  • the first data distribution host receives and responds to the data update request sent by the data storage device, queries the first user data stored in association with the first identity identifier, and updates the first user data to the second user data, thereby realizing the flexibility of the user data. renew.
  • the method may further include:
  • the data storage device sends a data deletion request to the first data distribution host.
  • the data deletion request includes the first identity identifier.
  • the first user may input the first user identification into the terminal device.
  • the terminal device sends the first user identification to the data storage device.
  • the data storage device obtains the first identity identifier from the first identity distribution host according to the first user identity, and then sends a data deletion request including the first identity identifier to the first data distribution host.
  • the first data distribution host receives and responds to the data deletion request sent by the data storage device, queries the first user data stored in association with the first identity identifier, deletes the first user data, and realizes rapid deletion of the user data.
  • the method may further include:
  • the data storage device acquires the fourth user identification and fourth user data of the first user.
  • the fourth user identifier is an identifier that the first user wants to add
  • the fourth user data is data that the first user wants to add. Then, from the at least two distributed hosts, determine the fourth identification distributed host corresponding to the fourth user identification and the fourth identification distributed host corresponding to the fourth user data, and send the fourth identification distributed host to the fourth identification distributed host logo.
  • the fourth identification distributed host receives and stores the fourth user identification sent by the data storage device, and generates and stores a fourth identification corresponding to the fourth user identification. Further, the fourth identity identifier is sent to the data storage device.
  • the data storage device receives and responds to the fourth identification sent by the fourth identification distribution host, and sends the fourth identification and fourth user data to the fourth data distribution host.
  • the fourth data distribution host stores the fourth identity identifier in association with the fourth user data, so as to realize the rapid addition of the user identifier and the user data.
  • the method may further include:
  • the data storage device first obtains the target user identifier of the target user.
  • the target user is a user who has handled the business before
  • the target user ID is a user ID that has been stored before. Then, from the at least two distributed hosts, determine the target identification distributed host corresponding to the target user identification, that is, the distributed host storing the target user identification, and send the target identification distributed host to the target identification distributed host.
  • the target user when the target user wants to use the stored user data, the target user can input the target user identification into the terminal device.
  • the terminal device transmits the target user identification to the data storage device.
  • the data storage device sends the target user identification to the target identification distributed host.
  • the target identifier distributed host receives the target user identifier sent by the data storage device, queries the target identifier corresponding to the target user identifier, and then sends the target identifier to the data storage device.
  • the data storage device receives the target identifier sent by the target identifier distributed host, and sends the target identifier to at least two distributed hosts respectively, so that the at least two distributed hosts respectively query the target user data associated with the target identifier, That is, query whether the user data of the target user is stored in itself. If the target user data is queried, it can be sent to the data storage device.
  • the data storage device receives the target user data sent by the distributed host that has queried the target user data, and can then apply the data to a corresponding scenario such as a payment scenario. In this way, the complete user data of the user can be obtained from the distributed hosts in different regions during the use of the user data, and the security of the use of the user data can be improved.
  • the method may further include:
  • the data storage device first acquires the target user identifier of the target user and the home area corresponding to the target user data of the target user.
  • the home region corresponding to the target user data is the region to which the target user data belongs. Then, from the at least two distributed hosts, determine the target identification distributed host corresponding to the target user ID, and the target data distributed host corresponding to the home area corresponding to the target user data, that is, the distributed host storing the target user data, and send it to the target user data.
  • the target ID distributed host sends the target user ID.
  • the target user when the target user wants to use the stored user data, the target user can input the target user identification and the user data type of the target user data into the terminal device.
  • the terminal device sends the target user identifier and the user data type to the data storage device, and the data storage device determines the home area corresponding to the target user data according to the user data type.
  • the target identifier distributed host receives the target user identifier sent by the data storage device, queries the target identifier corresponding to the target user identifier, and then sends the target identifier to the data storage device.
  • the data storage device receives the target ID sent by the target ID distributed host, and sends the target ID to the target data distributed host, so that the target data distributed host can query the target user data associated with the target ID, and then send the target ID to the data storage device. device sends.
  • the data storage device receives the target user data sent by the target data distribution host. The data can then be applied to corresponding scenarios such as payment scenarios. In this way, the user data that the user wants to use can be flexibly obtained during the use of the user data, and the user experience can be improved.
  • the data storage device may be any one of at least two distributed hosts, which is referred to as a data storage host.
  • a data storage host any one of at least two distributed hosts, which is referred to as a data storage host.
  • Administrators can deploy at least two distributed hosts in different regions.
  • the user ID can be used as the user ID primary key in the user ID label, and the user ID label can also include primary key auxiliary information corresponding to the user ID primary key one-to-one, and the type of the user ID label corresponds to the user ID type of the user ID primary key.
  • the administrator can set the user information deployment strategy, that is, based on the user ID primary key in the user ID tag, establish the corresponding relationship between the user ID type of the user ID primary key and the home zone, that is, the corresponding relationship between the user ID and the home zone.
  • User data can be used as the core content of the user data tag, and the type of the user data tag corresponds to the user data type of the user data.
  • the administrator can set the user data deployment strategy, that is, based on the user data type of the user data, establish the corresponding relationship between the user data type and the home area.
  • distributed hosts A, B, and C which are deployed in country A, country B, and country C, as shown in Table 1.
  • user identity label A user identity label A
  • user identity label B user identity label B
  • user identity label C user identity label C
  • the user identity label A, the user identity label B and the user identity label C all include the user identity primary key and primary key auxiliary information
  • the user identity type of the user identity primary key in the user identity label A is the country A mobile phone number
  • the user ID type of the user ID primary key in B is the country B mobile phone number
  • the user ID type of the user ID primary key in the user ID label C is the country C mobile phone number
  • the information type of the primary key auxiliary information is the mailbox number.
  • user data label A user data label A
  • user data label B user data label B
  • user data label C user data label C
  • the user data types of the user data in the user data tag A, user data tag B and user data tag C are country A bank card information, country B bank card information and country C bank card information respectively.
  • the administrator can establish the corresponding relationship between the user identification type and the home area according to Table 2, as shown in Table 4 in detail.
  • the administrator can establish the corresponding relationship between the user data type and the home area according to Table 1 and Table 3, as shown in Table 5.
  • the first user After setting the corresponding relationship between the user identification type and the home area and the corresponding relationship between the user data type and the home area, the first user can input the first user identification primary key, that is, the first user ID, the first primary key auxiliary information and the first user ID, on the terminal device. a user data.
  • the terminal device may send the first user identification primary key, the first primary key attachment information, and the first user data to the data storage host.
  • the data storage host may determine the home area corresponding to the first user identifier primary key according to the correspondence between the first user identifier primary key and the user identifier type and the home area. Then, determine the first target area that is the same as the home area corresponding to the primary key of the first user identifier in the areas where the at least two distributed hosts are located, and use the distributed hosts deployed in the first target area as the first identifier distributed host. Meanwhile, the home area corresponding to the first user data may be determined according to the user data type of the first user data and the corresponding relationship between the user data type and the home area.
  • the data storage host may first inquire whether it stores the first user identification primary key. If the first user ID primary key is not stored, the first user ID primary key and the first primary key auxiliary information are stored in the form of user ID tags, and the first ID corresponding to the first user ID primary key is generated and stored. The first identity is then broadcast to other distributed hosts. Other distributed hosts store the first identity as a non-local identity. Then, the data storage host may store the first identification in association with the first user data, wherein the first user data is stored in association with the first identification in the form of a user data tag.
  • the data storage host may first query whether it stores the first user identifier primary key. If the first user ID primary key is not stored, the first user ID primary key and the first primary key auxiliary information are stored in the form of user ID tags, and the first ID corresponding to the first user ID primary key is generated and stored. Then, the first identity identifier is broadcast to other distributed hosts, so that other distributed hosts can store the first identity identifier as a non-local identity identifier. The data storage host may send the first identity identifier and the first user data to the first data distribution host. The first identity distributed host stores the first identity in association with the first user data.
  • the data storage host may send the first user identification primary key to the first identification distributed host.
  • the first identifier distributed host may first inquire whether it stores the primary key of the first user identifier. If the first user ID primary key is not stored, the first user ID primary key and the first primary key auxiliary information are stored in the form of user ID tags, and the first ID corresponding to the first user ID primary key is generated and stored. Then, the first identity identifier is broadcast to other distributed hosts including the data storage host, so that the other distributed hosts can store the first identity identifier as a non-local identity identifier. The data storage host stores the first identity identifier in association with the first user data.
  • the data storage host may send the first user identification primary key to the first identification distributed host.
  • the first identifier distributed host may first inquire whether it stores the primary key of the first user identifier. If the first user ID primary key is not stored, the first user ID primary key and the first primary key auxiliary information are stored in the form of user ID tags, and the first ID corresponding to the first user ID primary key is generated and stored. Then, the first identity identifier is broadcast to other distributed hosts including the data storage host, so that the other distributed hosts can store the first identity identifier as a non-local identity identifier.
  • the data storage host may send the first identity identifier and the first user data to the first data distribution host.
  • the first identity distributed host stores the first identity in association with the first user data.
  • the first user When the first user wants to update the stored first user identification primary key, the first user can input the first user identification primary key and the second user identification primary key into the terminal device. In response to the user input, the terminal device sends a first identity update request including the first user identity primary key and the second user identity primary key to the data storage host.
  • the data storage host may update the stored first user identifier primary key to the second user identifier primary key in response to the first identifier update request.
  • the data storage host may send a first identification update request to the first identification distributed host.
  • the first identifier distributed host updates the stored first user identifier primary key to the second user identifier primary key in response to the first identifier update request.
  • the first identity update request may further include the first primary key attachment information and the second primary key attachment information, so that the stored primary key attachment information may be updated.
  • the first user may input the first user identification primary key into the terminal device.
  • the terminal device sends a second identification deletion request including the first user identification primary key to the data storage host.
  • the data storage host may delete the user identity label and the first identity identifier corresponding to the first user identifier primary key in response to the second identifier deletion request.
  • a notification for deleting the first identity identifier is broadcast to other distributed hosts, so that other distributed hosts can delete the stored first identity identifier.
  • the data storage host may send a second identification deletion request to the first identification distributed host.
  • the first identifier distributed host deletes the user identity label and the first identity identifier corresponding to the primary key of the first user identifier in response to the second identifier deletion request.
  • a notification of deleting the first identity identifier is broadcast to other distributed hosts including the data storage host, so that the other distributed hosts can delete the stored first identity identifier.
  • the first user can input the first user identification primary key and the second user data into the terminal device.
  • the terminal device sends the first user identification primary key and the second user data to the data storage host.
  • the data storage host can obtain the stored first identity according to the first user identifier primary key identifier, query the first user data stored in association with the first identity identifier, and update the first user data to the second user data.
  • the data storage host can obtain the stored data according to the first user identifier primary key. the first identity identifier, and send a data update request including the first identity identifier and the second user data to the first data distribution host.
  • the first data distribution host queries the first user data stored in association with the first identity identifier, and updates the first user data to the second user data.
  • the data storage host may send the first identification distributed host to the first identification distributed host.
  • a user ID primary key The first identification distributed host acquires the stored first identification according to the primary key of the first user identification, and sends the first identification to the data storage host.
  • the data storage host queries the first user data stored in association with the first identity identifier, and updates the first user data to the second user data.
  • the data storage host may send the first user identifier to the first identifier distributed host primary key.
  • the first identification distributed host acquires the stored first identification according to the primary key of the first user identification, and sends the first identification to the data storage host.
  • the data storage host sends a data update request including the first identity identifier and the second user data to the first data distribution host.
  • the first data distribution host queries the first user data stored in association with the first identity identifier, and updates the first user data to the second user data.
  • the first user may input the first user identification primary key into the terminal device.
  • the terminal device sends the first user identification primary key to the data storage host.
  • the data storage host can obtain the stored first identity according to the first user identifier primary key identifier, query the first user data stored in association with the first identity identifier, and delete the first user data.
  • the data storage host can obtain the stored data according to the first user identifier primary key. the first identity identifier, and send a data deletion request including the first identity identifier to the first data distribution host.
  • the first data distribution host queries the first user data stored in association with the first identity identifier, and deletes the first user data.
  • the data storage host may send the first identification distributed host to the first identification distributed host.
  • a user ID primary key The first identification distributed host acquires the stored first identification according to the primary key of the first user identification, and sends the first identification to the data storage host.
  • the data storage host queries the first user data stored in association with the first identity identifier, and deletes the first user data.
  • the data storage host may send the first user identifier to the first identifier distributed host primary key.
  • the first identification distributed host acquires the stored first identification according to the primary key of the first user identification, and sends the first identification to the data storage host.
  • the data storage host sends a data deletion request including the first identity identifier to the first data distribution host.
  • the first data distribution host queries the first user data stored in association with the first identity identifier, and deletes the first user data.
  • the target user can input the target user identification and the user data type of the target user data into the terminal device.
  • the terminal device sends the target user identifier and the user data type to the data storage host, and the data storage host determines the home area corresponding to the target user data according to the user data type. Then, from the at least two distributed hosts, the target identification distributed host corresponding to the target user identification and the target data distributed host corresponding to the home area corresponding to the target user data are determined.
  • both the target ID distributed host and the target data distributed host are data storage hosts
  • the data storage host can query the target ID corresponding to the target user ID, and query the target user data stored in association with the target ID. The data can then be applied to corresponding scenarios such as payment scenarios.
  • the data storage host can query the target ID corresponding to the target user ID, and send the target ID to the target data distributed host.
  • the target data distribution host queries the target user data associated with the target identity, and then sends it to the data storage host.
  • the data storage host can apply the data to corresponding scenarios such as payment scenarios.
  • the data storage host may send the target user identification to the target identification distributed host.
  • the target ID distributed host queries the target ID corresponding to the target user ID, and then sends the target ID to the data storage host.
  • the data store host queries the target user data stored in association with the target identity. The data can then be applied to corresponding scenarios such as payment scenarios.
  • the data storage host may send the target user identification to the target identification distributed host.
  • the target ID distributed host queries the target ID corresponding to the target user ID, and then sends the target ID to the data storage host.
  • the data storage device sends the target identity to the target data distribution host.
  • the target data distribution host queries the target user data associated with the target ID, and then sends the data to the data storage device.
  • the data storage device can apply the data to corresponding scenarios such as payment scenarios.
  • a user when a user initiates payment for shopping on a global e-commerce platform, he or she can select any bank card under the card-bound payment tool for payment, regardless of the region where the card is issued.
  • user X lives in country A, but he is a citizen of country B and has a bank card belonging to country C. His personal address should be stored in the distributed host deployed in country A, and his identity information should be stored in country B. The distributed host, the national bank card information should be stored in the distributed host deployed in country C.
  • the information of these distributed hosts stored in different regions can be obtained in time.
  • the embodiment of the present application further provides a data storage device, and the data storage device is applied to a data storage device.
  • the data storage device 300 may include: an acquisition module 310 , a determination module 320 , a transmission module 330 , and a reception module 340 .
  • the obtaining module 310 is configured to obtain the first user identifier and the first user data of the first user.
  • the determining module 320 is configured to determine, from the preset at least two distributed hosts, a first identification distributed host corresponding to the first user identification, and a first data distributed host corresponding to the first user data, wherein the first identification The distributed host is the same as or different from the first data distributed host, and at least two distributed hosts are located in different regions.
  • the sending module 330 is configured to send the first user identification to the first identification distributed host, so that the first identification distributed host stores the first user identification, and generates and stores the first identification corresponding to the first user identification.
  • the receiving module 340 is configured to receive the first identity identifier sent by the first identifier distributed host.
  • the sending module 330 is further configured to send the first identity identifier and the first user data to the first data distribution host, so that the first data distribution host associates and stores the first identity identifier and the first user data.
  • determining the module 320 specifically includes:
  • a first determining unit configured to determine the home area corresponding to the first user identifier according to the first user identifier and the preset correspondence between the user identifier and the home area;
  • the first determining unit is further configured to determine a first target area that is the same as the home area corresponding to the first user identifier in the area where the at least two distributed hosts are located, and distribute the distributed hosts corresponding to the first target area as the first identifier. type host.
  • the determining module 320 specifically includes:
  • a second determining unit configured to determine the home area corresponding to the first user data according to the user data type of the first user data and the preset correspondence between the user data type and the home area;
  • the second determining unit is further configured to determine a second target area that is the same as the home area corresponding to the first user data in the areas where the at least two distributed hosts are located, and use the distributed hosts corresponding to the second target area as the first data distribution type host.
  • the sending module 330 is further configured to send a first identity update request to the first identity distributed host, where the first identity update request includes the first user identity and the second user identity of the first user, and the first identity update request includes the first user identity and the second user identity of the first user.
  • the user identification is the same as the home area of the second user identification, and is used for the first identification distributed host to update the stored first user identification to the second user identification in response to the first identification update request.
  • the obtaining module 310 is further configured to obtain a third user identity of the first user, wherein the home region of the first user identity and the third user identity is different.
  • the determining module 320 may also be configured to determine, from the at least two distributed hosts, a distributed host with a second identification corresponding to the third user identification.
  • the sending module 330 may also be configured to send a second identification update request to the second identification distributed host, wherein the second identification update request includes the first identification and the third user identification, so that the second identification distributed host responds to the first identification.
  • the second identity update request is to associate and store the first identity identity and the third user identity.
  • the sending module 330 is further configured to send a first identification deletion request to the first identification distributed host, wherein the first identification deletion request includes the first user identification, for the first identification distributed host to delete in response to the first identification request to delete the stored first user ID and first ID.
  • the sending module 330 is further configured to send a second identification deletion request to the first identification distributed host, wherein the second identification deletion request includes the first user identification, for the first identification distributed host to respond to The second identification deletion request deletes the stored first user identification and first identification.
  • the sending module 330 is further configured to send a data update request to the first data distribution host, wherein the data update request includes the first identity identifier and the second user data of the first user, the user of the first user data
  • the data type is the same as the user data type of the second user data, so that the first data distribution host updates the first user data stored in association with the first identity identifier to the second user data in response to the data update request.
  • the sending module 330 is further configured to send a data deletion request to the first data distribution host, wherein the data deletion request includes a first identity, so that the first data distribution host responds to the data deletion request, Delete the first user data stored in association with the first identity identifier.
  • the obtaining module 310 is further configured to obtain the target user identifier of the target user.
  • the determining module may also be configured to determine, from the at least two distributed hosts, a target identification distributed host corresponding to the target user identification.
  • the sending module can also be configured to send the target user identifier to the target identifier distributed host, so that the target identifier distributed host can query the target identifier corresponding to the target user identifier.
  • the receiving module can also be used for receiving the target ID sent by the target ID distributed host.
  • the sending module can also be configured to send the target identifiers to the at least two distributed hosts respectively, so that the at least two distributed hosts respectively query the target user data associated with the target identifiers.
  • the receiving module can also be used to receive the target user data sent by the distributed host querying the target user data.
  • the obtaining module 310 is further configured to obtain the target user identifier of the target user and the home area corresponding to the target user data of the target user.
  • the determining module may also be configured to determine, from the at least two distributed hosts, a target identification distributed host corresponding to the target user identification, and a target data distributed host corresponding to the home area corresponding to the target user data.
  • the sending module can also be configured to send the target user identifier to the target identifier distributed host, so that the target identifier distributed host can query the target identifier corresponding to the target user identifier.
  • the receiving module can also be used for receiving the target ID sent by the target ID distributed host.
  • the sending module can also be used for sending the target identification to the target data distributed host, so that the target data distributed host can query the target user data associated with the target identification.
  • the receiving module can also be used to receive target user data sent by the target data distributed host.
  • each module/unit in the data storage device 300 shown in FIG. 3 has the function of realizing each step performed by the data storage device in FIG. 2 and can achieve its corresponding technical effect. Repeat.
  • FIG. 4 is a schematic structural diagram of an embodiment of a data storage device involved in the present application.
  • the data storage device 400 in this embodiment includes an input device 401 , an input interface 402 , a central processing unit 403 , a memory 404 , an output interface 405 , and an output device 406 .
  • the input interface 402, the central processing unit 403, the memory 404, and the output interface 405 are connected to each other through the bus 410, and the input device 401 and the output device 406 are respectively connected to the bus 410 through the input interface 402 and the output interface 405, and then to the data storage device. 400 other components are connected.
  • the input device 401 receives input information from the outside, and transmits the input information to the central processing unit 403 through the input interface 402; the central processing unit 403 processes the input information based on the computer-executable instructions stored in the memory 404 to generate output information, temporarily or permanently store the output information in the memory 404, and then transmit the output information to the output device 406 through the output interface 405; the output device 406 outputs the output information to the outside of the data storage device 400 for the user to use.
  • the data storage device 400 shown in FIG. 4 includes: a memory 404 for storing a program; and a processor 403 for running a program stored in the memory to implement the data storage method provided by the embodiment of the present application.
  • Embodiments of the present application further provide a computer-readable storage medium, where computer program instructions are stored thereon; when the computer program instructions are executed by a processor, the data storage method provided by the embodiments of the present application is implemented.
  • Examples of computer-readable storage media include non-transitory computer-readable storage media, such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, and the like.
  • the functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof.
  • it can be, for example, an electronic circuit, an application specific integrated circuit (ASIC), suitable firmware, a plug-in, a function card, and the like.
  • ASIC application specific integrated circuit
  • elements of the present application are programs or code segments used to perform the required tasks.
  • the program or code segments may be stored in a machine-readable medium or transmitted over a transmission medium or communication link by a data signal carried in a carrier wave.
  • a "machine-readable medium” may include any medium that can store or transmit information.
  • machine-readable media examples include electronic circuits, semiconductor memory devices, Read-Only Memory (ROM), flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio frequency (Radio Frequency, RF) link, etc.
  • the code segments may be downloaded via a computer network such as the Internet, an intranet, or the like.
  • processors may be, but are not limited to, general purpose processors, special purpose processors, application specific processors, or field programmable logic circuits. It will also be understood that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can also be implemented by special purpose hardware for performing the specified functions or actions, or by special purpose hardware and/or A combination of computer instructions is implemented.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本申请实施例提供一种数据存储方法、装置、设备及存储介质。该方法应用于数据存储设备,包括:获取第一用户的第一用户标识和第一用户数据;从预设的位于不同区域的至少两个分布式主机中,确定第一用户标识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机,第一标识分布式主机与第一数据分布式主机相同或不同;向第一标识分布式主机发送第一用户标识,以用于第一标识分布式主机存储第一用户标识,生成并存储与第一用户标识对应的第一身份标识;接收第一标识分布式主机发送的第一身份标识;向第一数据分布式主机发送第一身份标识和第一用户数据,以用于第一数据分布式主机将两者关联存储。

Description

数据存储方法、装置、设备及存储介质
相关申请的交叉引用
本申请要求享有于2021年03月02日提交的名称为“数据存储方法、装置、设备及存储介质”的中国专利申请202110230060.2的优先权,该申请的全部内容通过引用并入本文中。
技术领域
本申请涉及数据存储技术领域,尤其涉及一种数据存储方法、装置、设备及存储介质。
背景技术
目前,用户数据存储方案通常是将所有区域的用户数据均集中存储至某地的核心分布式主机,或者,将所有区域的用户数据同步存储至位于每个区域的分布式主机。可知,上述用户数据存储方案中会将多个区域的用户数据存储在一起,容易出现全量用户数据的泄露,安全性较低。
发明内容
本申请实施例提供了一种数据存储方法、装置、设备及存储介质,能够实现用户数据的分区域存储,提高数据存储安全性。
第一方面,本申请实施例提供一种数据存储方法,该方法应用于数据存储设备,包括:
获取第一用户的第一用户标识和第一用户数据;
从预设的至少两个分布式主机中,确定第一用户标识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机,其中,第一标识分布式主机与第一数据分布式主机相同或不同,至少两个分布式主机位于不同的区域;
向第一标识分布式主机发送第一用户标识,以用于第一标识分布式主机存储第一用户标识,且生成并存储与第一用户标识对应的第一身份标识;
接收第一标识分布式主机发送的第一身份标识;
向第一数据分布式主机发送第一身份标识和第一用户数据,以用于第一数据分布式主机将第一身份标识与第一用户数据关联存储。
第二方面,本申请实施例提供一种数据存储装置,该装置应用于数据存储设备,包括:
获取模块,用于获取第一用户的第一用户标识和第一用户数据;
确定模块,用于从预设的至少两个分布式主机中,确定第一用户标识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机,其中,第一标识分布式主机与第一数据分布式主机相同或不同,至少两个分布式主机位于不同的区域;
发送模块,用于向第一标识分布式主机发送第一用户标识,以用于第一标识分布式主机存储第一用户标识,且生成并存储与第一用户标识对应的第一身份标识;
接收模块,用于接收第一标识分布式主机发送的第一身份标识;
发送模块,还用于向第一数据分布式主机发送第一身份标识和第一用户数据,以用于第一数据分布式主机将第一身份标识与第一用户数据关联存储。
第三方面,本申请实施例提供一种数据存储设备,该设备包括:处理器以及存储有计算机程序指令的存储器;处理器执行计算机程序指令时实现第一方面所述的数据存储方法。
第四方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序指令,计算机程序指令被处理器执行时实现第一方面所述的数据存储方法。
本申请实施例提供的一种数据存储方法、装置、设备及存储介质,数据存储设备获取第一用户的第一用户标识和第一用户数据,从预设的位于不同区域的至少两个分布式主机中,确定第一用户标识对应的第一标识分 布式主机,以及第一用户数据对应的第一数据分布式主机,并向第一标识分布式主机发送第一用户标识。第一标识分布式主机存储第一用户标识,且生成并存储与第一用户标识对应的第一身份标识,并向数据存储设备发送第一身份标识。数据存储设备向第一数据分布式主机发送第一身份标识和第一用户数据。第一数据分布式主机将第一身份标识与第一用户数据关联存储。如此可以使用户数据存储在与其对应的分布式主机中,即位于不同区域的分布式主机存储与其对应的用户数据,从而实现用户数据分区域存储,提高用户数据存储的安全性。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例中所需要使用的附图作简单地介绍,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请涉及的数据存储系统的架构示意图;
图2是本申请涉及的数据存储方法的实施例的流程示意图;
图3是本申请涉及的数据存储装置的实施例的结构示意图;
图4是本申请涉及的数据存储设备的实施例的结构示意图。
具体实施方式
下面将详细描述本申请的各个方面的特征和示例性实施例,为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细描述。应理解,此处所描述的具体实施例仅解释本申请,而不是限定本申请。对于本领域技术人员来说,本申请可以在不需要这些具体细节中的一些细节的情况下实施。下面对实施例的描述仅仅是为了通过示出本申请的示例来提供对本申请更好的理解。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而 使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
目前,用户数据存储方案通常有两种方式,分别如下:
方式一:集中管理。具体地,每个区域的分布式主机在获取用户数据后,可以将获取的用户数据发送至核心分布式主机进行存储,也即核心分布式主机存储有全量用户数据即所有区域的用户数据。
方式二:同步管理。具体地,每个区域的分布式主机在获取用户数据后,首先保存在本地,然后以实时地将获取的用户数据同步给其他区域的分布式主机,使得全量用户数据在各个区域部署的分布式主机内均有存储。
可知,采用上述两种方式存储用户数据,会将多个区域的用户数据存储在一起,容易出现全量用户数据的泄露,安全性较低。
为了解决上述技术问题,本申请实施例提供了一种数据存储方法、装置、设备及存储介质。数据存储设备获取第一用户的第一用户标识和第一用户数据,从预设的位于不同区域的至少两个分布式主机中,确定第一用户标识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机,并向第一标识分布式主机发送第一用户标识。第一标识分布式主机存储第一用户标识,且生成并存储与第一用户标识对应的第一身份标识,并向数据存储设备发送第一身份标识。数据存储设备向第一数据分布式主机发送第一身份标识和第一用户数据。第一数据分布式主机将第一身份标识与第一用户数据关联存储。如此可以使用户数据存储在与其对应的分布式主机中,即位于不同区域的分布式主机存储与其对应的用户数据,从而实现用户数据分区域存储,提高用户数据存储的安全性。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的数据存储方法、装置、设备和存储介质进行详细地说明。
本申请实施例提供的数据存储方法可以应用于支付、保险、社交或租 赁等领域的用户数据存储场景,本申请实施例在此不做限制。
图1是本申请涉及的数据存储系统的架构示意图。如图1所示,该数据存储系统可以包括数据存储设备110和至少两个分布式主机120,在此不做限制。
数据存储设备110可以是服务器、网络附属存储器(Network Attached Storage,NAS)或者个人计算机(Personal Computer,PC)等等。数据存储设备110也可以是分布式主机120中的任意一个,也可以是任意一个分布式主机120中的模块,在此不做限制。
分布式主机120是采用分布式架构分布的主机,任意两个分布式主机120位于不同的区域。可选地,分布式主机120可以由主机集群构成。
如图1所示,数据存储设备110分别与至少两个分布式主机120进行通信,可选地,通信方式可以是有线通信或无线通信,例如数据存储设备110与分布式主机120采用网线或者WiFi进行通信。
作为一个示例,数据存储设备110可以获取第一用户的第一用户标识和第一用户数据。其中,第一用户标识可以用于表示第一用户的身份,其可以是手机号码、身份证号或者护照号码等等。第一用户数据可以是第一用户办理业务所需的个人数据,其可以是银行卡信息、社保卡信息或者个人地址等等。可以理解,第一用户的第一用户标识和第一用户数据可以包括多个。
示例性地,终端设备可以接收第一用户在终端设备输入的第一用户标识和第一用户数据,并向数据存储设备110发送第一用户标识和第一用户数据。相应地,数据存储设备110接收终端设备发送的第一用户标识和第一用户数据。
然后数据存储设备110可以从至少两个分布式主机120中,确定第一用户标识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机,并向第一标识分布式主机发送第一用户标识。其中,第一标识分布式主机可以是在第一用户标识归属的区域中部署的主机。第一数据分布式主机可以是在第一用户数据归属的区域中部署的主机。第一标识分布式主机与第一数据分布式主机可以是同一个分布式主机120,也可以是 不同的分布式主机120。
第一标识分布式主机可以存储第一用户标识,以及生成并存储与第一用户标识对应的第一身份标识,然后向数据存储设备110发送第一身份标识。其中,第一身份标识可以用于表示第一用户的身份。可选地,第一标识分布式主机可以根据哈希算法计算第一用户标识的哈希值,并将该哈希值作为第一身份标识。第一标识分布式主机也可以随机生成与第一用户标识一一对应的通用唯一识别码(Universally Unique Identifier,UUID),并将该UUID作为第一身份标识。
数据存储设备110接收第一标识分布式主机发送的第一身份标识,并向第一数据分布式主机发送第一身份标识和第一用户数据。
第一数据分布式主机可以将第一身份标识与第一用户数据关联存储。
如此可以使用户数据存储在与其对应的分布式主机中,即位于不同区域的分布式主机存储与其对应的用户数据,从而实现用户数据分区域存储,提高用户数据存储的安全性。
下面将详细介绍本申请实施例提供的数据存储方法。示例性地,该数据存储方法可以应用于图1所示的数据存储系统。
图2是本申请涉及的数据存储方法的实施例的流程示意图。如图2所示,该数据存储方法可以包括以下步骤:
S210,数据存储设备获取第一用户的第一用户标识和第一用户数据。
在一个实施例中,数据存储设备可以获取第一用户的第一用户标识和第一用户数据。其中,第一用户标识可以用于表示第一用户的身份,其可以是手机号码、身份证号或者护照号码等等。第一用户数据可以是第一用户办理业务所需的个人数据,其可以是银行卡信息、社保卡信息或者个人地址等等。可以理解,第一用户的第一用户标识和第一用户数据可以包括多个。
示例性地,数据存储设备可以接收终端设备发送的第一用户标识和第一用户数据。具体地,在办理业务时,第一用户可以在终端设备输入第一用户标识和第一用户数据,响应于用户输入,终端设备可以向数据存储设备发送第一用户标识和第一用户数据。相应地,数据存储设备接收终端设 备发送的第一用户标识和第一用户数据。
如图2所示,该数据存储方法还可以包括:S220,数据存储设备从预设的至少两个分布式主机中,确定第一用户标识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机。
其中,至少两个分布式主机位于不同的区域,区域的区域等级可以根据需要进行设定。例如,存在三台分布式主机,分别为分布式主机1、分布式主机2和分布式主机3。这里,分布式主机1位于区域1,分布式主机2位于区域2,分布式主机3位于区域3。可选地,区域1为国家1,区域2为国家2,区域3为国家3。
示例性地,第一标识分布式主机可以是在第一用户标识归属的区域中部署的主机。第一数据分布式主机可以是在第一用户数据归属的区域中部署的主机。可以理解,第一标识分布式主机与第一数据分布式主机可以是同一个分布式主机,也可以是不同的分布式主机。
在一个实施例中,数据存储设备可以先根据第一用户标识和预设的用户标识与归属区域的对应关系,确定第一用户标识对应的归属区域,即第一用户标识所属的区域,例如手机号码所属的国家。然后确定至少两个分布式主机所在的区域中与第一用户标识对应的归属区域相同的第一目标区域,将第一目标区域对应的分布式主机即第一目标区域中部署的分布式主机作为第一标识分布式主机。如此可以将用户标识存储在其归属地的分布式主机中,实现用户标识本地化存储,便于本地机构监管。
在一个实施例中,数据存储设备可以先根据第一用户数据的用户数据类型和预设的用户数据类型与归属区域的对应关系,确定第一用户数据对应的归属区域,即第一用户数据所属的区域。其中,用户数据类型可以用于表征用户数据的类别,例如用户数据1的类别为国家1的银行卡信息,用户数据2的类别为国家2的社保卡信息。然后确定至少两个分布式主机所在的区域中与第一用户数据对应的归属区域相同的第二目标区域,将第二目标区域对应的分布式主机即第二目标区域中部署的分布式主机作为第一数据分布式主机。如此可以将用户数据存储在其归属地的分布式主机中,实现用户数据本地化存储,便于本地机构监管。
如图2所示,该数据存储方法还可以包括:S230,数据存储设备向第一标识分布式主机发送第一用户标识。
如图2所示,该数据存储方法还可以包括:S240,第一标识分布式主机存储第一用户标识,且生成并存储与第一用户标识对应的第一身份标识。
具体地,第一标识分布式主机接收并存储数据存储设备发送的第一用户标识,与此同时,生成并存储与第一用户标识对应的第一身份标识。示例性地,第一标识分布式主机可以先查询第一标识分布式主机中是否存储第一用户标识。在第一标识分布式主机中未存储第一用户标识的情况下,生成与第一用户标识对应的第一身份标识,建立并存储第一用户标识与第一身份标识的对应关系。
可选地,第一标识分布式主机可以根据哈希算法计算第一用户标识的哈希值,并将该哈希值作为第一身份标识。第一标识分布式主机也可以随机生成与第一用户标识一一对应的UUID,并将该UUID作为第一身份标识。
如图2所示,该数据存储方法还可以包括:S250,第一标识分布式主机向数据存储设备发送第一身份标识。
如图2所示,该数据存储方法还可以包括:S260,数据存储设备向第一数据分布式主机发送第一身份标识和第一用户数据。
具体地,数据存储设备接收第一标识分布式主机发送的第一身份标识,并向第一数据分布式主机发送第一身份标识和第一用户数据。
如图2所示,该数据存储方法还可以包括:S270,第一数据分布式主机将第一身份标识与第一用户数据关联存储。
具体地,第一身份分布式主机接收数据存储设备发送的第一身份标识和第一用户数据,并将第一身份标识与第一用户数据关联存储。
在本申请实施例中,数据存储设备获取第一用户的第一用户标识和第一用户数据,从预设的位于不同区域的至少两个分布式主机中,确定第一用户标识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机,并向第一标识分布式主机发送第一用户标识。第一标识分布 式主机存储第一用户标识,且生成并存储与第一用户标识对应的第一身份标识,并向数据存储设备发送第一身份标识。数据存储设备向第一数据分布式主机发送第一身份标识和第一用户数据。第一数据分布式主机将第一身份标识与第一用户数据关联存储。如此可以使用户数据存储在与其对应的分布式主机中,即位于不同区域的分布式主机存储与其对应的用户数据,从而实现用户数据分区域存储,提高用户数据存储的安全性。
下面将详细介绍下已存储的用户标识与用户数据的维护,即用户标识与用户数据的更新、删除和新增,具体如下。
在一个实施例中,该方法还可以包括:
数据存储设备向第一标识分布式主机发送第一标识更新请求。其中,第一标识更新请求包括第一用户标识和第一用户的第二用户标识。第二用户标识用于替换第一用户标识,且第二用户标识与第一用户标识的归属区域相同。例如,第一用户标识可以是用户不再使用的归属于国家1的手机号码1,第二用户标识可以是用户新换的归属于国家1的手机号码2。
示例性地,在第一用户想要更新已存储的第一用户标识的情况下,第一用户可以向终端设备输入第一用户标识和第二用户标识。响应于用户输入,终端设备向数据存储设备发送包括第一用户标识和第二用户标识的第一标识更新请求,进而数据存储设备向第一标识分布式主机发送第一标识更新请求。
第一标识分布式主机接收并响应于数据存储设备发送的第一标识更新请求,将存储的第一用户标识更新为第二用户标识,实现归属于相同区域的用户标识的灵活更新。
在一个实施例中,该方法还可以包括:
数据存储设备获取第一用户的第三用户标识。其中,第三用户标识用于替换第一用户标识,且第一用户标识与第三用户标识的归属区域不同,例如,第一用户标识可以是用户不再使用的归属于国家1的手机号码1,第三用户标识可以是用户新换的归属于国家2的手机号码2。然后从至少两个分布式主机中,确定第三用户标识对应的第二标识分布式主机。其中,具体细节与S220类似,在此不做赘述。接着向第二标识分布式主机发 送第二标识更新请求。其中,第二标识更新请求包括第一身份标识和第三用户标识。
第二标识分布式主机接收并响应于数据存储设备发送的第二标识更新请求,将第一身份标识和第三用户标识关联存储。同时向第一标识分布式主机发送第一标识删除请求。其中,第一标识删除请求包括第一用户标识。
第一标识分布式主机接收并响应于第二标识分布式主机发送的第一标识删除请求,将存储的第一用户标识和第一身份标识删除。如此可以实现归属于不同区域的用户标识的灵活更新。
在一个实施例中,该方法还可以包括:
数据存储设备向第一标识分布式主机发送第二标识删除请求。其中,第二标识删除请求包括第一用户标识。
示例性地,在第一用户想要删除已存储的第一用户标识的情况下,第一用户可以向终端设备输入第一用户标识。响应于用户输入,终端设备向数据存储设备发送包括第一用户标识的第二标识删除请求,进而数据存储设备向第一标识分布式主机发送第二标识删除请求。
第一标识分布式主机接收并响应于数据存储设备发送的第二标识删除请求,将存储的第一用户标识和第一身份标识删除,实现用户标识的快速删除。
在一个实施例中,该方法还可以包括:
数据存储设备向第一数据分布式主机发送数据更新请求。其中,数据更新请求包括第一身份标识和第一用户的第二用户数据。第二用户数据用于替换第一用户数据,且第一用户数据的用户数据类型与第二用户数据的用户数据类型相同。例如第一用户数据与第二用户数据都是同一国家的银行卡信息。
示例性地,在第一用户想要更新已存储的第一用户数据的情况下,第一用户可以向终端设备输入第一用户标识和第二用户数据。响应于用户输入,终端设备向数据存储设备发送第一用户标识和第二用户数据。数据存储设备根据第一用户标识从第一标识分布式主机中获取第一身份标识,进 而向第一数据分布式主机发送包括第一身份标识和第二用户数据的数据更新请求。
第一数据分布式主机接收并响应于数据存储设备发送的数据更新请求,查询与第一身份标识关联存储的第一用户数据,将第一用户数据更新为第二用户数据,实现用户数据的灵活更新。
在一个实施例中,该方法还可以包括:
数据存储设备向第一数据分布式主机发送数据删除请求。其中,数据删除请求包括第一身份标识。
示例性地,在第一用户想要删除已存储的第一用户数据的情况下,第一用户可以向终端设备输入第一用户标识。响应于用户输入,终端设备向数据存储设备发送第一用户标识。数据存储设备根据第一用户标识从第一标识分布式主机中获取第一身份标识,进而向第一数据分布式主机发送包括第一身份标识的数据删除请求。
第一数据分布式主机接收并响应于数据存储设备发送的数据删除请求,查询与第一身份标识关联存储的第一用户数据,将第一用户数据删除,实现用户数据的快速删除。
在一个实施例中,该方法还可以包括:
数据存储设备获取第一用户的第四用户标识和第四用户数据。其中,第四用户标识是第一用户想要新增的标识,第四用户数据是第一用户想要新增的数据。然后从至少两个分布式主机中,确定第四用户标识对应的第四标识分布式主机,以及第四用户数据对应的第四标识分布式主机,并向第四标识分布式主机发送第四用户标识。
第四标识分布式主机接收并存储数据存储设备发送的第四用户标识,且生成并存储与第四用户标识对应的第四身份标识。进而向数据存储设备发送第四身份标识。
数据存储设备接收并响应于第四标识分布式主机发送的第四身份标识,向第四数据分布式主机发送第四身份标识和第四用户数据。
第四数据分布式主机将第四身份标识与第四用户数据关联存储,实现用户标识与用户数据的快速新增。
下面将详细介绍下已存储的用户标识与用户数据的查询与使用,具体如下所述。
在一个实施例中,该方法还可以包括:
数据存储设备先获取目标用户的目标用户标识。其中,目标用户是之前办理过业务的用户,目标用户标识是之前已存储的用户标识。然后从至少两个分布式主机中,确定目标用户标识对应的目标标识分布式主机,即存储目标用户标识的分布式主机,并向目标标识分布式主机发送目标用户标识。
示例性地,在目标用户想要使用已存储的用户数据的情况下,目标用户可以向终端设备输入目标用户标识。响应于用户输入,终端设备向数据存储设备发送目标用户标识。数据存储设备向目标标识分布式主机发送目标用户标识。
目标标识分布式主机接收数据存储设备发送的目标用户标识,并查询与目标用户标识对应的目标身份标识,进而向数据存储设备发送目标身份标识。
数据存储设备接收目标标识分布式主机发送的目标身份标识,并分别向至少两个分布式主机发送目标身份标识,以用于至少两个分布式主机分别查询与目标身份标识关联的目标用户数据,即查询自身内部是否存储目标用户的用户数据。若查询到目标用户数据,则可以向数据存储设备发送。数据存储设备接收查询到目标用户数据的分布式主机发送的目标用户数据,进而可以将该数据应用于相应的场景例如支付场景。如此可以在用户数据使用过程中,从不同区域的分布式主机中获取用户完整的用户数据,提高用户数据使用的安全性。
在一个实施例中,该方法还可以包括:
数据存储设备先获取目标用户的目标用户标识和目标用户的目标用户数据对应的归属区域。其中,目标用户数据对应的归属区域是目标用户数据所属的区域。然后从至少两个分布式主机中,确定目标用户标识对应的目标标识分布式主机,以及目标用户数据对应的归属区域对应的目标数据分布式主机,即存储目标用户数据的分布式主机,并向目标标识分布式主 机发送目标用户标识。
示例性地,在目标用户想要使用已存储的用户数据的情况下,目标用户可以向终端设备输入目标用户标识和目标用户数据的用户数据类型。响应于用户输入,终端设备向数据存储设备发送目标用户标识和用户数据类型,数据存储设备根据该用户数据类型确定目标用户数据对应的归属区域。
目标标识分布式主机接收数据存储设备发送的目标用户标识,并查询与目标用户标识对应的目标身份标识,进而向数据存储设备发送目标身份标识。
数据存储设备接收目标标识分布式主机发送的目标身份标识,并向目标数据分布式主机发送目标身份标识,以用于目标数据分布式主机查询与目标身份标识关联的目标用户数据,进而向数据存储设备发送。数据存储设备接收目标数据分布式主机发送的目标用户数据。进而可以将该数据应用于相应的场景例如支付场景。如此可以在用户数据使用过程中,灵活获取用户想要使用的用户数据,提高用户使用体验。
在一个实施例中,数据存储设备可以为至少两个分布式中的任意一个分布式主机,记为数据存储主机。下面结合一个具体的示例对本申请实施例提供的数据存储方法进行详细介绍,具体如下所述。
管理人员可以将至少两个分布式主机分别部署在不同的区域。
用户标识可以作为用户身份标签中的用户标识主键,用户身份标签还可以包括与用户标识主键一一对应的主键附属信息,用户身份标签的类型与用户标识主键的用户标识类型对应。管理人员可以设定用户信息部署策略,即基于用户身份标签中的用户标识主键,建立用户标识主键的用户标识类型与归属区域的对应关系也即用户标识与归属区域的对应关系。
用户数据可以作为用户数据标签的核心内容,用户数据标签的类型与用户数据的用户数据类型对应。管理人员可以设定用户数据部署策略,即基于用户数据的用户数据类型,建立用户数据类型与归属区域的对应关系。
例如,存在3个分布式主机,分别为分布式主机A、B、C,部署在国 家A、国家B、国家C,具体如表1所示。
表1
区域 国家A 国家B 国家C
分布式主机 分布式主机A 分布式主机B 分布式主机C
同时,设置3类用户身份标签,分别为用户身份标签A、用户身份标签B和用户身份标签C,具体如表2所示。
表2
用户身份标签 用户身份标签A 用户身份标签B 用户身份标签C
用户标识主键 国家A手机号码 国家B手机号码 国家C手机号码
主键附属信息 邮箱号码 邮箱号码 邮箱号码
其中,用户身份标签A、用户身份标签B和用户身份标签C都包括用户标识主键和主键附属信息,且用户身份标签A中的用户标识主键的用户标识类型为国家A手机号码,且用户身份标签B中的用户标识主键的用户标识类型为国家B手机号码,且用户身份标签C中的用户标识主键的用户标识类型为国家C手机号码,主键附属信息的信息类型都是邮箱号码。
同时,设置3类用户数据标签,分别为用户数据标签A、用户数据标签B和用户数据标签C,具体结构如表3所示。
表3
Figure PCTCN2021119378-appb-000001
其中,用户数据标签A、用户数据标签B和用户数据标签C中的用户数据的用户数据类型分别为国家A银行卡信息、国家B银行卡信息和国家C银行卡信息。
接着管理人员可以根据表2建立用户标识类型与归属区域的对应关系,具体如表4所示。
表4
归属区域 国家A 国家B 国家C
用户标识 国家A手机号码 国家B手机号码 国家C手机号码
同时,管理人员可以根据表1和表3建立用户数据类型与归属区域的对应关系,具体如表5所示。
表5
Figure PCTCN2021119378-appb-000002
在设置好用户标识类型与归属区域的对应关系以及用户数据类型与归属区域的对应关系之后,第一用户可以在终端设备输入第一用户标识主键即第一用户标识、第一主键附属信息和第一用户数据。响应于用户输入,终端设备可以向数据存储主机发送第一用户标识主键、第一主键附属信息和第一用户数据。
数据存储主机可以根据第一用户标识主键和用户标识类型与归属区域的对应关系,确定第一用户标识主键对应的归属区域。然后确定至少两个分布式主机所在的区域中与第一用户标识主键对应的归属区域相同的第一目标区域,将第一目标区域中部署的分布式主机作为第一标识分布式主机。同时,可以根据第一用户数据的用户数据类型和用户数据类型与归属区域的对应关系,确定第一用户数据对应的归属区域。然后确定至少两个分布式主机所在的区域中与第一用户数据对应的归属区域相同的第二目标区域,将第二目标区域对应的分布式主机即第二目标区域中部署的分布式主机作为第一数据分布式主机。
若第一标识分布式主机和第一数据分布式主机皆是数据存储主机,则数据存储主机可以先查询自身是否存储第一用户标识主键。若未存储第一用户标识主键,以用户身份标签的形式存储第一用户标识主键和第一主键附属信息,生成并存储与第一用户标识主键对应的第一身份标识。然后向其他分布式主机广播第一身份标识。其他分布式主机存储第一身份标识,作为非本地身份标识。接着数据存储主机可以将第一身份标识与第一用户数据关联存储,其中,第一用户数据以用户数据标签形式与第一身份标识关联存储。
若第一标识分布式主机是数据存储主机,第一数据分布式主机不是数据存储主机,则数据存储主机可以先查询自身是否存储第一用户标识主键。若未存储第一用户标识主键,以用户身份标签的形式存储第一用户标识主键和第一主键附属信息,生成并存储与第一用户标识主键对应的第一身份标识。然后向其他分布式主机广播第一身份标识,以用于其他分布式主机存储第一身份标识,作为非本地身份标识。数据存储主机可以向第一数据分布式主机发送第一身份标识和第一用户数据。第一身份分布式主机将第一身份标识与第一用户数据关联存储。
若第一标识分布式主机不是数据存储主机,第一数据分布式主机是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第一用户标识主键。第一标识分布式主机可以先查询自身是否存储第一用户标识主键。若未存储第一用户标识主键,以用户身份标签的形式存储第一用户标识主键和第一主键附属信息,生成并存储与第一用户标识主键对应的第一身份标识。然后向包括数据存储主机的其他分布式主机广播第一身份标识,以用于其他分布式主机存储第一身份标识,作为非本地身份标识。数据存储主机将第一身份标识与第一用户数据关联存储。
若第一标识分布式主机和第一数据分布式主机都不是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第一用户标识主键。第一标识分布式主机可以先查询自身是否存储第一用户标识主键。若未存储第一用户标识主键,以用户身份标签的形式存储第一用户标识主键和第一主键附属信息,生成并存储与第一用户标识主键对应的第一身份标识。然后向包括数据存储主机的其他分布式主机广播第一身份标识,以用于其他分布式主机存储第一身份标识,作为非本地身份标识。数据存储主机可以向第一数据分布式主机发送第一身份标识和第一用户数据。第一身份分布式主机将第一身份标识与第一用户数据关联存储。
在第一用户想要更新已存储的第一用户标识主键的情况下,第一用户可以向终端设备输入第一用户标识主键和第二用户标识主键。响应于用户输入,终端设备向数据存储主机发送包括第一用户标识主键和第二用户标识主键的第一标识更新请求。
若第一用户标识主键对应的第一标识分布式主机是数据存储主机,则数据存储主机可以响应于第一标识更新请求,将存储的第一用户标识主键更新为第二用户标识主键。
若第一用户标识主键对应的第一标识分布式主机不是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第一标识更新请求。第一标识分布式主机响应于第一标识更新请求,将存储的第一用户标识主键更新为第二用户标识主键。
可选地,第一标识更新请求还可以包括第一主键附属信息和第二主键附属信息,进而可以更新已存储的主键附属信息。
在第一用户想要删除已存储的第一用户标识主键的情况下,第一用户可以向终端设备输入第一用户标识主键。响应于用户输入,终端设备向数据存储主机发送包括第一用户标识主键的第二标识删除请求。
若第一用户标识主键对应的第一标识分布式主机是数据存储主机,则数据存储主机可以响应于第二标识删除请求,将第一用户标识主键对应的用户身份标签和第一身份标识删除。同时向其他分布式主机广播用于删除第一身份标识的通知,以用于其他分布式主机删除存储的第一身份标识。
若第一用户标识主键对应的第一标识分布式主机不是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第二标识删除请求。第一标识分布式主机响应于第二标识删除请求,将第一用户标识主键对应的用户身份标签和第一身份标识删除。同时向包括数据存储主机的其他分布式主机广播删除第一身份标识的通知,以用于其他分布式主机删除存储的第一身份标识。
在第一用户想要更新已存储的第一用户数据的情况下,第一用户可以向终端设备输入第一用户标识主键和第二用户数据。响应于用户输入,终端设备向数据存储主机发送第一用户标识主键和第二用户数据。
若第一用户标识主键对应的第一标识分布式主机和第二用户数据对应的第一数据分布式主机皆是数据存储主机,则数据存储主机可以根据第一用户标识主键获取存储的第一身份标识,查询与第一身份标识关联存储的第一用户数据,将第一用户数据更新为第二用户数据。
若第一用户标识主键对应的第一标识分布式主机是数据存储主机,第二用户数据对应的第一数据分布式主机不是数据存储主机,则数据存储主机可以根据第一用户标识主键获取存储的第一身份标识,并向第一数据分布式主机发送包括第一身份标识和第二用户数据的数据更新请求。第一数据分布式主机响应于数据更新请求,查询与第一身份标识关联存储的第一用户数据,将第一用户数据更新为第二用户数据。
若第一用户标识主键对应的第一标识分布式主机不是数据存储主机,第二用户数据对应的第一数据分布式主机是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第一用户标识主键。第一标识分布式主机根据第一用户标识主键获取存储的第一身份标识,并向数据存储主机发送第一身份标识。数据存储主机查询与第一身份标识关联存储的第一用户数据,将第一用户数据更新为第二用户数据。
若第一用户标识主键对应的第一标识分布式主机和第二用户数据对应的第一数据分布式主机都不是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第一用户标识主键。第一标识分布式主机根据第一用户标识主键获取存储的第一身份标识,并向数据存储主机发送第一身份标识。数据存储主机向第一数据分布式主机发送包括第一身份标识和第二用户数据的数据更新请求。第一数据分布式主机响应于数据更新请求,查询与第一身份标识关联存储的第一用户数据,将第一用户数据更新为第二用户数据。
在第一用户想要删除已存储的第一用户数据的情况下,第一用户可以向终端设备输入第一用户标识主键。响应于用户输入,终端设备向数据存储主机发送第一用户标识主键。
若第一用户标识主键对应的第一标识分布式主机和第二用户数据对应的第一数据分布式主机皆是数据存储主机,则数据存储主机可以根据第一用户标识主键获取存储的第一身份标识,查询与第一身份标识关联存储的第一用户数据,将第一用户数据删除。
若第一用户标识主键对应的第一标识分布式主机是数据存储主机,第二用户数据对应的第一数据分布式主机不是数据存储主机,则数据存储主 机可以根据第一用户标识主键获取存储的第一身份标识,并向第一数据分布式主机发送包括第一身份标识的数据删除请求。第一数据分布式主机响应于数据删除请求,查询与第一身份标识关联存储的第一用户数据,将第一用户数据删除。
若第一用户标识主键对应的第一标识分布式主机不是数据存储主机,第二用户数据对应的第一数据分布式主机是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第一用户标识主键。第一标识分布式主机根据第一用户标识主键获取存储的第一身份标识,并向数据存储主机发送第一身份标识。数据存储主机查询与第一身份标识关联存储的第一用户数据,将第一用户数据删除。
若第一用户标识主键对应的第一标识分布式主机和第二用户数据对应的第一数据分布式主机都不是数据存储主机,则数据存储主机可以向第一标识分布式主机发送第一用户标识主键。第一标识分布式主机根据第一用户标识主键获取存储的第一身份标识,并向数据存储主机发送第一身份标识。数据存储主机向第一数据分布式主机发送包括第一身份标识的数据删除请求。第一数据分布式主机响应于数据删除请求,查询与第一身份标识关联存储的第一用户数据,将第一用户数据删除。
在目标用户想要使用已存储的用户数据的情况下,目标用户可以向终端设备输入目标用户标识和目标用户数据的用户数据类型。响应于用户输入,终端设备向数据存储主机发送目标用户标识和用户数据类型,数据存储主机根据该用户数据类型确定目标用户数据对应的归属区域。然后从至少两个分布式主机中,确定目标用户标识对应的目标标识分布式主机,以及目标用户数据对应的归属区域对应的目标数据分布式主机。
若目标标识分布式主机和目标数据分布式主机皆是数据存储主机,则数据存储主机可以查询与目标用户标识对应的目标身份标识,查询与目标身份标识关联存储的目标用户数据。进而可以将该数据应用于相应的场景例如支付场景。
若目标标识分布式主机是数据存储主机,目标数据分布式主机不是数据存储主机,则数据存储主机可以查询与目标用户标识对应的目标身份标 识,并向目标数据分布式主机发送目标身份标识。目标数据分布式主机查询与目标身份标识关联的目标用户数据,进而向数据存储主机发送。数据存储主机可以将该数据应用于相应的场景例如支付场景。
若目标标识分布式主机不是数据存储主机,目标数据分布式主机是数据存储主机,则数据存储主机可以向目标标识分布式主机发送目标用户标识。目标标识分布式主机查询与目标用户标识对应的目标身份标识,进而向数据存储主机发送目标身份标识。数据存储主机查询与目标身份标识关联存储的目标用户数据。进而可以将该数据应用于相应的场景例如支付场景。
若目标标识分布式主机和目标数据分布式主机都不是数据存储主机,则数据存储主机可以向目标标识分布式主机发送目标用户标识。目标标识分布式主机查询与目标用户标识对应的目标身份标识,进而向数据存储主机发送目标身份标识。数据存储设备向目标数据分布式主机发送目标身份标识。目标数据分布式主机查询与目标身份标识关联的目标用户数据,进而向数据存储设备发送。数据存储设备可以将该数据应用于相应的场景例如支付场景。
作为一个具体的示例,当用户在某全球性电商平台购物发起支付时,可以通过已绑卡的某支付工具选择名下的任何一张银行卡进行支付,而不受限于发卡的地区。例如,用户X生活在国家A,但其是国家B的公民,拥有一张归属于国家C的银行卡,其个人地址应存储在国家A部署的分布式主机,身份信息应存储在国家B部署的分布式主机,国家银行卡信息应存储在国家C部署的分布式主机。当用户X进行支付时,可以及时获取这些存储在不同地区的分布式主机的信息。
基于本申请实施例提供的数据存储方法,本申请实施例还提供了一种数据存储装置,该数据存储装置应用于数据存储设备。如图3所示,数据存储装置300可以包括:获取模块310、确定模块320、发送模块330,接收模块340。
获取模块310用于获取第一用户的第一用户标识和第一用户数据。
确定模块320用于从预设的至少两个分布式主机中,确定第一用户标 识对应的第一标识分布式主机,以及第一用户数据对应的第一数据分布式主机,其中,第一标识分布式主机与第一数据分布式主机相同或不同,至少两个分布式主机位于不同的区域。
发送模块330用于向第一标识分布式主机发送第一用户标识,以用于第一标识分布式主机存储第一用户标识,且生成并存储与第一用户标识对应的第一身份标识。
接收模块340用于接收第一标识分布式主机发送的第一身份标识。
发送模块330还用于向第一数据分布式主机发送第一身份标识和第一用户数据,以用于第一数据分布式主机将第一身份标识与第一用户数据关联存储。
在一个实施例中,确定模320块具体包括:
第一确定单元,用于根据第一用户标识和预设的用户标识与归属区域的对应关系,确定第一用户标识对应的归属区域;
第一确定单元,还用于确定至少两个分布式主机所在的区域中与第一用户标识对应的归属区域相同的第一目标区域,将第一目标区域对应的分布式主机作为第一标识分布式主机。
在一个实施例中,确定模块320具体包括:
第二确定单元,用于根据第一用户数据的用户数据类型和预设的用户数据类型与归属区域的对应关系,确定第一用户数据对应的归属区域;
第二确定单元,还用于确定至少两个分布式主机所在的区域中与第一用户数据对应的归属区域相同的第二目标区域,将第二目标区域对应的分布式主机作为第一数据分布式主机。
在一个实施例中,发送模块330还用于向第一标识分布式主机发送第一标识更新请求,其中,第一标识更新请求包括第一用户标识和第一用户的第二用户标识,第一用户标识与第二用户标识的归属区域相同,以用于第一标识分布式主机响应于第一标识更新请求,将存储的第一用户标识更新为第二用户标识。
在一个实施例中,获取模块310还用于获取第一用户的第三用户标识,其中,第一用户标识与第三用户标识的归属区域不同。
确定模块320还可用于从至少两个分布式主机中,确定第三用户标识对应的第二标识分布式主机。
发送模块330还可用于向第二标识分布式主机发送第二标识更新请求,其中,第二标识更新请求包括第一身份标识和第三用户标识,以用于第二标识分布式主机响应于第二标识更新请求,将第一身份标识和第三用户标识关联存储。
发送模块330还可用于向第一标识分布式主机发送第一标识删除请求,其中,第一标识删除请求包括所述第一用户标识,以用于第一标识分布式主机响应于第一标识删除请求,将存储的第一用户标识和第一身份标识删除。
在一个实施例中,发送模块330还用于向第一标识分布式主机发送第二标识删除请求,其中,第二标识删除请求包括第一用户标识,以用于第一标识分布式主机响应于第二标识删除请求,将存储的第一用户标识和第一身份标识删除。
在一个实施例中,发送模块330还用于向第一数据分布式主机发送数据更新请求,其中,数据更新请求包括第一身份标识和第一用户的第二用户数据,第一用户数据的用户数据类型与第二用户数据的用户数据类型相同,以用于第一数据分布式主机响应于数据更新请求,将与第一身份标识关联存储的第一用户数据更新为第二用户数据。
在一个实施例中,发送模块330还用于向第一数据分布式主机发送数据删除请求,其中,数据删除请求包括第一身份标识,以用于第一数据分布式主机响应于数据删除请求,将与第一身份标识关联存储的第一用户数据删除。
在一个实施例中,获取模块310还用于获取目标用户的目标用户标识。
确定模块还可用于从至少两个分布式主机中,确定目标用户标识对应的目标标识分布式主机。
发送模块还可用于向目标标识分布式主机发送目标用户标识,以用于目标标识分布式主机查询与目标用户标识对应的目标身份标识。
接收模块还可用于接收目标标识分布式主机发送的目标身份标识。
发送模块还可用于分别向至少两个分布式主机发送目标身份标识,以用于至少两个分布式主机分别查询与目标身份标识关联的目标用户数据。
接收模块还可用于接收查询到目标用户数据的分布式主机发送的目标用户数据。
在一个实施例中,获取模块310还用于获取目标用户的目标用户标识和目标用户的目标用户数据对应的归属区域。
确定模块还可用于从至少两个分布式主机中,确定目标用户标识对应的目标标识分布式主机,以及目标用户数据对应的归属区域对应的目标数据分布式主机。
发送模块还可用于向目标标识分布式主机发送目标用户标识,以用于目标标识分布式主机查询与目标用户标识对应的目标身份标识。
接收模块还可用于接收目标标识分布式主机发送的目标身份标识。
发送模块还可用于向目标数据分布式主机发送目标身份标识,以用于目标数据分布式主机查询与目标身份标识关联的目标用户数据。
接收模块还可用于接收目标数据分布式主机发送的目标用户数据。
可以理解的是,图3所示数据存储装置300中的各个模块/单元具有实现图2中数据存储设备所执行的各个步骤的功能,并能达到其相应的技术效果,为了简洁,在此不再赘述。
图4是本申请涉及的数据存储设备的实施例的结构示意图。
如图4所示,本实施例中的数据存储设备400包括输入设备401、输入接口402、中央处理器403、存储器404、输出接口405、以及输出设备406。其中,输入接口402、中央处理器403、存储器404、以及输出接口405通过总线410相互连接,输入设备401和输出设备406分别通过输入接口402和输出接口405与总线410连接,进而与数据存储设备400的其他组件连接。
具体地,输入设备401接收来自外部的输入信息,并通过输入接口402将输入信息传送到中央处理器403;中央处理器403基于存储器404中存储的计算机可执行指令对输入信息进行处理以生成输出信息,将输出信息临 时或者永久地存储在存储器404中,然后通过输出接口405将输出信息传送到输出设备406;输出设备406将输出信息输出到数据存储设备400的外部供用户使用。
在一个实施例中,图4所示的数据存储设备400包括:存储器404,用于存储程序;处理器403,用于运行存储器中存储的程序,以实现本申请实施例提供的数据存储方法。
本申请实施例还提供一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序指令;该计算机程序指令被处理器执行时实现本申请实施例提供的数据存储方法。计算机可读存储介质的示例包括非暂态计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。
需要明确的是,本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同或相似的部分互相参见即可,为了简洁,不再赘述。本申请并不局限于上文所描述并在图中示出的特定配置和处理。为了简明起见,这里省略了对已知方法的详细描述。在上述实施例中,描述和示出了若干具体的步骤作为示例。但是,本申请的方法过程并不限于所描述和示出的具体步骤,本领域的技术人员可以在领会本申请的精神后,做出各种改变、修改和添加,或者改变步骤之间的顺序。
以上所述的结构框图中所示的功能块可以实现为硬件、软件、固件或者它们的组合。当以硬件方式实现时,其可以例如是电子电路、专用集成电路(Application Specific Integrated Circuit,ASIC)、适当的固件、插件、功能卡等等。当以软件方式实现时,本申请的元素是被用于执行所需任务的程序或者代码段。程序或者代码段可以存储在机器可读介质中,或者通过载波中携带的数据信号在传输介质或者通信链路上传送。“机器可读介质”可以包括能够存储或传输信息的任何介质。机器可读介质的例子包括电子电路、半导体存储器设备、只读存储器(Read-Only Memory,ROM)、闪存、可擦除ROM(EROM)、软盘、CD-ROM、光盘、硬盘、光纤介质、射频(Radio Frequency,RF)链路,等等。代码段可以经 由诸如因特网、内联网等的计算机网络被下载。
还需要说明的是,本申请中提及的示例性实施例,基于一系列的步骤或者装置描述一些方法或系统。但是,本申请不局限于上述步骤的顺序,也就是说,可以按照实施例中提及的顺序执行步骤,也可以不同于实施例中的顺序,或者若干步骤同时执行。
上面参考根据本公开的实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本公开的各方面。应当理解,流程图和/或框图中的每个方框以及流程图和/或框图中各方框的组合可以由计算机程序指令实现。这些计算机程序指令可被提供给通用计算机、专用计算机、或其它可编程数据处理装置的处理器,以产生一种机器,使得经由计算机或其它可编程数据处理装置的处理器执行的这些指令使能对流程图和/或框图的一个或多个方框中指定的功能/动作的实现。这种处理器可以是但不限于是通用处理器、专用处理器、特殊应用处理器或者现场可编程逻辑电路。还可理解,框图和/或流程图中的每个方框以及框图和/或流程图中的方框的组合,也可以由执行指定的功能或动作的专用硬件来实现,或可由专用硬件和计算机指令的组合来实现。
以上所述,仅为本申请的具体实施方式,所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、模块和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。应理解,本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。

Claims (22)

  1. 一种数据存储方法,所述方法应用于数据存储设备,包括:
    获取第一用户的第一用户标识和第一用户数据;
    从预设的至少两个分布式主机中,确定所述第一用户标识对应的第一标识分布式主机,以及所述第一用户数据对应的第一数据分布式主机,其中,所述第一标识分布式主机与所述第一数据分布式主机相同或不同,所述至少两个分布式主机位于不同的区域;
    向所述第一标识分布式主机发送所述第一用户标识,以用于所述第一标识分布式主机存储所述第一用户标识,且生成并存储与所述第一用户标识对应的第一身份标识;
    接收所述第一标识分布式主机发送的所述第一身份标识;
    向所述第一数据分布式主机发送所述第一身份标识和所述第一用户数据,以用于所述第一数据分布式主机将所述第一身份标识与所述第一用户数据关联存储。
  2. 根据权利要求1所述的方法,其中,所述从预设的至少两个分布式主机中,确定所述第一用户标识对应的第一标识分布式主机,包括:
    根据所述第一用户标识和预设的用户标识与归属区域的对应关系,确定所述第一用户标识对应的归属区域;
    确定所述至少两个分布式主机所在的区域中与所述第一用户标识对应的归属区域相同的第一目标区域,将所述第一目标区域对应的分布式主机作为所述第一标识分布式主机。
  3. 根据权利要求1所述的方法,其中,从预设的至少两个分布式主机中,确定所述第一用户数据对应的第一数据分布式主机,包括:
    根据所述第一用户数据的用户数据类型和预设的用户数据类型与归属区域的对应关系,确定所述第一用户数据对应的归属区域;
    确定所述至少两个分布式主机所在的区域中与所述第一用户数据对应的归属区域相同的第二目标区域,将所述第二目标区域对应的分布式主机作为第一数据分布式主机。
  4. 根据权利要求1-3任意一项所述的方法,还包括:
    向所述第一标识分布式主机发送第一标识更新请求,其中,所述第一标识更新请求包括所述第一用户标识和所述第一用户的第二用户标识,所述第一用户标识与所述第二用户标识的归属区域相同,以用于所述第一标识分布式主机响应于所述第一标识更新请求,将存储的所述第一用户标识更新为所述第二用户标识。
  5. 根据权利要求1-3任意一项所述的方法,还包括:
    获取所述第一用户的第三用户标识,其中,所述第一用户标识与所述第三用户标识的归属区域不同;
    从所述至少两个分布式主机中,确定所述第三用户标识对应的第二标识分布式主机;
    向所述第二标识分布式主机发送第二标识更新请求,其中,所述第二标识更新请求包括所述第一身份标识和所述第三用户标识,以用于所述第二标识分布式主机响应于所述第二标识更新请求,将所述第一身份标识和所述第三用户标识关联存储;
    向所述第一标识分布式主机发送第一标识删除请求,其中,所述第一标识删除请求包括所述第一用户标识,以用于所述第一标识分布式主机响应于所述第一标识删除请求,将存储的所述第一用户标识和所述第一身份标识删除。
  6. 根据权利要求1-3任意一项所述的方法,还包括:
    向所述第一标识分布式主机发送第二标识删除请求,其中,所述第二标识删除请求包括所述第一用户标识,以用于所述第一标识分布式主机响应于所述第二标识删除请求,将存储的所述第一用户标识和所述第一身份标识删除。
  7. 根据权利要求1-3任意一项所述的方法,还包括:
    向所述第一数据分布式主机发送数据更新请求,其中,所述数据更新请求包括所述第一身份标识和所述第一用户的第二用户数据,所述第一用户数据的用户数据类型与所述第二用户数据的用户数据类型相同,以用于所述第一数据分布式主机响应于所述数据更新请求,将与所述第一身份标 识关联存储的所述第一用户数据更新为所述第二用户数据。
  8. 根据权利要求1-3任意一项所述的方法,还包括:
    向所述第一数据分布式主机发送数据删除请求,其中,所述数据删除请求包括所述第一身份标识,以用于所述第一数据分布式主机响应于所述数据删除请求,将与所述第一身份标识关联存储的所述第一用户数据删除。
  9. 根据权利要求1-3任意一项所述的方法,还包括:
    获取目标用户的目标用户标识;
    从所述至少两个分布式主机中,确定所述目标用户标识对应的目标标识分布式主机;
    向所述目标标识分布式主机发送所述目标用户标识,以用于所述目标标识分布式主机查询与所述目标用户标识对应的目标身份标识;
    接收所述目标标识分布式主机发送的所述目标身份标识;
    分别向所述至少两个分布式主机发送所述目标身份标识,以用于所述至少两个分布式主机分别查询与所述目标身份标识关联存储的目标用户数据;
    接收查询到所述目标用户数据的分布式主机发送的所述目标用户数据。
  10. 根据权利要求3所述的方法,还包括:
    获取目标用户的目标用户标识和所述目标用户的目标用户数据对应的归属区域;
    从所述至少两个分布式主机中,确定所述目标用户标识对应的目标标识分布式主机,以及所述目标用户数据对应的归属区域对应的目标数据分布式主机;
    向所述目标标识分布式主机发送所述目标用户标识,以用于所述目标标识分布式主机查询与所述目标用户标识对应的目标身份标识;
    接收所述目标标识分布式主机发送的所述目标身份标识;
    向所述目标数据分布式主机发送目标身份标识,以用于所述目标数据分布式主机查询与所述目标身份标识关联存储的目标用户数据;
    接收所述目标数据分布式主机发送的目标用户数据。
  11. 一种数据存储装置,所述装置应用于数据存储设备,包括:
    获取模块,用于获取第一用户的第一用户标识和第一用户数据;
    确定模块,用于从预设的至少两个分布式主机中,确定所述第一用户标识对应的第一标识分布式主机,以及所述第一用户数据对应的第一数据分布式主机,其中,所述第一标识分布式主机与所述第一数据分布式主机相同或不同,所述至少两个分布式主机位于不同的区域;
    发送模块,用于向所述第一标识分布式主机发送所述第一用户标识,以用于所述第一标识分布式主机存储所述第一用户标识,且生成并存储与所述第一用户标识对应的第一身份标识;
    接收模块,用于接收所述第一标识分布式主机发送的所述第一身份标识;
    所述发送模块,还用于向所述第一数据分布式主机发送所述第一身份标识和所述第一用户数据,以用于所述第一数据分布式主机将所述第一身份标识与所述第一用户数据关联存储。
  12. 根据权利要求11所述的装置,其中,所述确定模块具体包括:
    第一确定单元,用于根据所述第一用户标识和预设的用户标识与归属区域的对应关系,确定所述第一用户标识对应的归属区域;以及
    还用于确定所述至少两个分布式主机所在的区域中与所述第一用户标识对应的归属区域相同的第一目标区域,将所述第一目标区域对应的分布式主机作为所述第一标识分布式主机。
  13. 根据权利要求11所述的装置,其中,所述确定模块具体包括:
    第二确定单元,用于根据所述第一用户数据的用户数据类型和预设的用户数据类型与归属区域的对应关系,确定所述第一用户数据对应的归属区域;以及还用于确定所述至少两个分布式主机所在的区域中与所述第一用户数据对应的归属区域相同的第二目标区域,将所述第二目标区域对应的分布式主机作为第一数据分布式主机。
  14. 根据权利要求11-13任意一项所述的装置,其中,所述发送模块还用于向所述第一标识分布式主机发送第一标识更新请求,其中,所述第一 标识更新请求包括所述第一用户标识和所述第一用户的第二用户标识,所述第一用户标识与所述第二用户标识的归属区域相同,以用于所述第一标识分布式主机响应于所述第一标识更新请求,将存储的所述第一用户标识更新为所述第二用户标识。
  15. 根据权利要求11-13任意一项所述的装置,其中,所述获取模块还用于获取所述第一用户的第三用户标识,其中,所述第一用户标识与所述第三用户标识的归属区域不同;
    所述确定模块还用于从所述至少两个分布式主机中,确定所述第三用户标识对应的第二标识分布式主机;
    所述发送模块还用于向所述第二标识分布式主机发送第二标识更新请求,其中,所述第二标识更新请求包括所述第一身份标识和所述第三用户标识,以用于所述第二标识分布式主机响应于所述第二标识更新请求,将所述第一身份标识和所述第三用户标识关联存储;
    所述发送模块还用于向所述第一标识分布式主机发送第一标识删除请求,其中,所述第一标识删除请求包括所述第一用户标识,以用于所述第一标识分布式主机响应于所述第一标识删除请求,将存储的所述第一用户标识和所述第一身份标识删除。
  16. 根据权利要求11-13任意一项所述的装置,其中,所述发送模块还用于向所述第一标识分布式主机发送第二标识删除请求,其中,所述第二标识删除请求包括所述第一用户标识,以用于所述第一标识分布式主机响应于所述第二标识删除请求,将存储的所述第一用户标识和所述第一身份标识删除。
  17. 根据权利要求11-13任意一项所述的装置,其中,所述发送模块还用于向所述第一数据分布式主机发送数据更新请求,其中,所述数据更新请求包括所述第一身份标识和所述第一用户的第二用户数据,所述第一用户数据的用户数据类型与所述第二用户数据的用户数据类型相同,以用于所述第一数据分布式主机响应于所述数据更新请求,将与所述第一身份标识关联存储的所述第一用户数据更新为所述第二用户数据。
  18. 根据权利要求11-13任意一项所述的装置,其中,所述发送模块还 用于向所述第一数据分布式主机发送数据删除请求,其中,所述数据删除请求包括所述第一身份标识,以用于所述第一数据分布式主机响应于所述数据删除请求,将与所述第一身份标识关联存储的所述第一用户数据删除。
  19. 根据权利要求11-13任意一项所述的装置,其中,所述获取模块还用于获取目标用户的目标用户标识;
    所述确定模块还用于从所述至少两个分布式主机中,确定所述目标用户标识对应的目标标识分布式主机;
    所述发送模块还用于向所述目标标识分布式主机发送所述目标用户标识,以用于所述目标标识分布式主机查询与所述目标用户标识对应的目标身份标识;
    所述接收模块还用于接收所述目标标识分布式主机发送的所述目标身份标识;
    所述发送模块还用于分别向所述至少两个分布式主机发送所述目标身份标识,以用于所述至少两个分布式主机分别查询与所述目标身份标识关联存储的目标用户数据;
    所述接收模块还用于接收查询到所述目标用户数据的分布式主机发送的所述目标用户数据。
  20. 根据权利要求13所述的装置,其中,所述获取模块还用于获取目标用户的目标用户标识和所述目标用户的目标用户数据对应的归属区域;
    所述确定模块还用于从所述至少两个分布式主机中,确定所述目标用户标识对应的目标标识分布式主机,以及所述目标用户数据对应的归属区域对应的目标数据分布式主机;
    所述发送模块还用于向所述目标标识分布式主机发送所述目标用户标识,以用于所述目标标识分布式主机查询与所述目标用户标识对应的目标身份标识;
    所述接收模块还用于接收所述目标标识分布式主机发送的所述目标身份标识;
    所述发送模块还用于向所述目标数据分布式主机发送目标身份标识, 以用于所述目标数据分布式主机查询与所述目标身份标识关联存储的目标用户数据;
    所述接收模块还用于接收所述目标数据分布式主机发送的目标用户数据。
  21. 一种数据存储设备,所述设备包括:处理器以及存储有计算机程序指令的存储器;所述处理器执行所述计算机程序指令时实现如权利要求1-10任意一项所述的数据存储方法的步骤。
  22. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现如权利要求1-10任意一项所述的数据存储方法的步骤。
PCT/CN2021/119378 2021-03-02 2021-09-18 数据存储方法、装置、设备及存储介质 WO2022183713A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/013,152 US20230244405A1 (en) 2021-03-02 2021-09-18 Data storage method, apparatus, device and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110230060.2A CN112966312B (zh) 2021-03-02 2021-03-02 数据存储方法、装置、设备及存储介质
CN202110230060.2 2021-03-02

Publications (1)

Publication Number Publication Date
WO2022183713A1 true WO2022183713A1 (zh) 2022-09-09

Family

ID=76276364

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/119378 WO2022183713A1 (zh) 2021-03-02 2021-09-18 数据存储方法、装置、设备及存储介质

Country Status (4)

Country Link
US (1) US20230244405A1 (zh)
CN (1) CN112966312B (zh)
TW (1) TWI800985B (zh)
WO (1) WO2022183713A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966312B (zh) * 2021-03-02 2024-05-17 中国银联股份有限公司 数据存储方法、装置、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180121033A1 (en) * 2016-10-31 2018-05-03 Ca, Inc. Rendering time series metric data associated with multi-dimensional element id information
CN111159134A (zh) * 2019-12-17 2020-05-15 复旦大学 面向多租户的分布式文件系统安全访问控制方法及系统
CN112395469A (zh) * 2020-11-27 2021-02-23 中国银联股份有限公司 生物特征存储方法、装置、设备及存储介质
CN112966312A (zh) * 2021-03-02 2021-06-15 中国银联股份有限公司 数据存储方法、装置、设备及存储介质

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5544347A (en) * 1990-09-24 1996-08-06 Emc Corporation Data storage system controlled remote data mirroring with respectively maintained data indices
US7290288B2 (en) * 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
US7426642B2 (en) * 2002-11-14 2008-09-16 International Business Machines Corporation Integrating legacy application/data access with single sign-on in a distributed computing environment
GB2440561B (en) * 2006-07-28 2011-03-30 Hewlett Packard Development Co Data storage system
US8793379B2 (en) * 2011-11-01 2014-07-29 Lsi Corporation System or method to automatically provision a storage volume by having an app-aware based appliance in a storage cloud environment
US10509801B2 (en) * 2013-01-28 2019-12-17 Arris Enterprises Llc Selective data synchronization and transfer to remote distributed database servers
US10078754B1 (en) * 2013-09-24 2018-09-18 Amazon Technologies, Inc. Volume cryptographic key management
KR20160118602A (ko) * 2015-04-02 2016-10-12 삼성전자주식회사 데이터 저장 장치와 이를 포함하는 장치들
US10033702B2 (en) * 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
US10331710B2 (en) * 2015-10-01 2019-06-25 Microsoft Technology Licensing, Llc Partitioning of geographic data
WO2017065209A1 (ja) * 2015-10-16 2017-04-20 国立大学法人東北大学 情報処理システム、情報処理装置、情報処理方法、及び、プログラム
US10156991B2 (en) * 2015-10-19 2018-12-18 International Business Machines Corporation User interface for host port assignment
CN105491149B (zh) * 2015-12-26 2019-04-23 深圳市金立通信设备有限公司 一种数据存储方法及终端
US20180088846A1 (en) * 2016-09-27 2018-03-29 Seagate Technology Llc Multi-user dynamic storage allocation and encryption
CN106528793B (zh) * 2016-12-14 2019-12-24 自然资源部国土卫星遥感应用中心 一种分布式空间数据库的时空分片存储方法
CN108701004B (zh) * 2017-01-25 2024-06-14 华为技术有限公司 一种数据处理的系统、方法及对应装置
CN106980647B (zh) * 2017-02-24 2021-04-23 北京同有飞骥科技股份有限公司 一种分布式文件系统数据分布方法及装置
US10620866B1 (en) * 2018-02-22 2020-04-14 Amazon Technologies, Inc. Representation-based partitioning of distributed computing environments
CN108920099B (zh) * 2018-06-22 2021-11-16 中国人民解放军战略支援部队信息工程大学 基于多种分片方式的数据动态存储系统及方法
US11294865B2 (en) * 2018-08-13 2022-04-05 Citrix Systems, Inc. Using a scan data ledger for distributed security analysis of shared content
US11036400B2 (en) * 2019-04-26 2021-06-15 EMC IP Holding Company LLC System and method for limiting restoration access

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180121033A1 (en) * 2016-10-31 2018-05-03 Ca, Inc. Rendering time series metric data associated with multi-dimensional element id information
CN111159134A (zh) * 2019-12-17 2020-05-15 复旦大学 面向多租户的分布式文件系统安全访问控制方法及系统
CN112395469A (zh) * 2020-11-27 2021-02-23 中国银联股份有限公司 生物特征存储方法、装置、设备及存储介质
CN112966312A (zh) * 2021-03-02 2021-06-15 中国银联股份有限公司 数据存储方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN112966312A (zh) 2021-06-15
TW202236136A (zh) 2022-09-16
US20230244405A1 (en) 2023-08-03
TWI800985B (zh) 2023-05-01
CN112966312B (zh) 2024-05-17

Similar Documents

Publication Publication Date Title
CN106878262B (zh) 报文检测方法及装置、建立本地威胁情报库的方法及装置
CN110856126B (zh) 信息上报、接收方法、终端设备及存储介质
WO2016045545A1 (zh) 数据交互方法和系统以及服务器
US10051552B2 (en) Method for realizing resource attribute notification, and common service entity
WO2022183713A1 (zh) 数据存储方法、装置、设备及存储介质
CN112860953A (zh) 图数据库的数据导入方法、装置、设备及存储介质
CN106302110A (zh) 一种基于隐私保护的社交网络位置共享方法
CN111353136B (zh) 一种操作请求的处理方法和装置
CN106535156B (zh) 虚拟用户识别模块卡的迁移方法、终端、服务器、系统
CN114401319B (zh) 一种请求处理方法、装置、服务器及存储介质
CN104424316B (zh) 一种数据存储方法、数据查询方法、相关装置和系统
CN111008220A (zh) 数据源的动态识别方法及装置、存储介质和电子装置
US20200349286A1 (en) Ascertaining network devices used with anonymous identifiers
US20160150010A1 (en) Information processing apparatus, data save method, and information processing system
CN109842482B (zh) 一种信息同步方法、系统及终端设备
WO2023160551A1 (zh) 请求处理方法及设备
CN109413677B (zh) 小区参数配置方法、装置及基站、参数管理系统
CN111143426A (zh) 多系统用户信息关联方法和装置
WO2022252880A1 (zh) 数据处理方法及其装置、系统、存储介质
WO2021082538A1 (zh) 会话控制处理方法、装置、设备及介质
CN108574592A (zh) 一种基于电信云的资源管理方法及装置
CN111092949A (zh) 用于注册设备的方法及装置
CN105991450A (zh) Mac地址表更新方法及装置
CN117710027B (zh) 基于区块链的积分交易结算方法、装置、设备及介质
CN115134118B (zh) 用于验证互联网注册用户身份的方法及装置、服务器、存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21928788

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21928788

Country of ref document: EP

Kind code of ref document: A1