Supercharge Your Innovation With Domain-Expert AI Agents!

Quick and safe real-time database access method

A database and security technology, applied in the direction of electrical digital data processing, special data processing applications, instruments, etc., can solve the problems of reducing write operation efficiency and low efficiency, and achieve the effect of fast access and improved access efficiency

Active Publication Date: 2008-10-22
北京和利时系统集成有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since each read and write of the real-time database requires a semaphore operation and a system call, the efficiency is relatively low
At the same time, due to the mutual exclusion of the write application operations that write two different records respectively, the efficiency of the write operation is reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quick and safe real-time database access method
  • Quick and safe real-time database access method
  • Quick and safe real-time database access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Through the analysis of real-time database access behavior, it is found that there are three main operations on real-time database: read, write and update. in:

[0028] The read operation refers to reading the data in the real-time database, which will not have any impact on the real-time database, but it is necessary to stop all read operations on the real-time database when the real-time database is updated;

[0029] The write operation refers to the modification of the data value in the real-time database, which does not affect the read operation of the real-time database, but the write operations to the same record are mutually exclusive, that is, the same record cannot be written at the same time. And when the real-time database is updated, it is necessary to stop all write operations to the real-time database;

[0030] The update operation refers to the update of the entire real-time database data. It needs to reload the data to the memory, which affects all oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for accessing database in real-time. The invention safely and quickly accesses real-time database by combining sharing sign area with signals, and sets a record in every application program that needs to access real-time database, the record comprises two items: identifier of allowing access real-time database and new real-time database identifier; each one (or each group) record in real-time database is provided with a write signal. When needs to write real-time database, write application program performs write operation on record only if it acquires the write signal of the record to avoid conflicts between each application programs.

Description

technical field [0001] The invention relates to the field of automatic control, in particular to a memory-based real-time database access method. Background technique [0002] In the field of automatic control, a memory-based real-time database is usually used. All tasks in the server share this memory real-time database for fast access. At present, the following methods are usually used to ensure safe access to shared access based on memory real-time database. [0003] The first one is that an application program monopolizes the real-time database, all access requests to the real-time database need to be sent to the application program, and the application program completes the actual access operation, and then returns the access results to the requesting application program. This method ensures safe access to the real-time database, but the application also becomes the bottleneck of the system, resulting in low efficiency of real-time database access. [0004] The secon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
Inventor 董阳贺学文胡雁
Owner 北京和利时系统集成有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More