Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Concurrent access control method and device

An access control and access lock technology, applied in the network field, can solve problems such as increased database burden and deadlock, and achieve the effects of reducing load, reducing deadlock, and improving time

Active Publication Date: 2009-02-11
KINGDEE SOFTWARE(CHINA) CO LTD
View PDF0 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a concurrent access control method and device to solve the problem of heavy database burden and easy deadlock in the current database lock mechanism. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Concurrent access control method and device
  • Concurrent access control method and device
  • Concurrent access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] refer to figure 1 , is a flowchart of a concurrent access control method described in the embodiment. Wherein, the server side in the following process refers to the application server side.

[0039] S101, the client sends an access request to the server, and the server receives the request;

[0040] S102, the server side confirms whether the request needs to apply for an access lock, if yes, proceed to S103 to apply for an access lock; if not, execute the request according to the general processing flow;

[0041] The confirmation process refers to confirming whether the data currently requested to be accessed is data that needs to be prevented from concurrent access, or whether the function currently requested to be executed is a function that needs to be prevented from concurrent access (this function may need to access a batch of data). During the process of the server processing business, some data or functions can be accessed or executed concurrently, while some ...

Embodiment 2

[0050] refer to figure 2 , is a flowchart of a concurrent access control method described in Embodiment 2.

[0051] S201, the client sends an access request to the application server, and the application server receives the request;

[0052] S202, the application server confirms whether the request needs to apply for an access lock according to the configuration information, if yes, proceed to S203 to apply for an access lock; if not, execute the request according to the general processing flow;

[0053] This embodiment provides a configurable way to perform concurrency control. Through business analysis, for each data or function that needs to be prevented from concurrent access, it is pre-registered in the configuration information of the application server, thereby determining the concurrent objects that need to be locked. Every time there is concurrent access, first check whether there is an object currently requested to be accessed in the configuration information, if ye...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a concurrent access control method and a device which solve the problem that a database has heavier burdens and is easy to cause deadlocks in the prior database locking mechanism. The concurrent access control method comprises: a server receives an access request; confirming whether the request needs to apply for an access lock, if necessary, the access lock is visited; if the application for the access lock is approved, the request is performed via an access database; after the request is performed, the access lock is released. The concurrent access control method and the device provide a set of locking mechanisms at the application level. The locking mechanism can control the concurrent access to the server, so requests are filtered by the application server before arriving at the database, namely, the concurrent requests are filtered. Therefore, under the condition of multi-user and concurrent access, the concurrent access control method and the device can effectively control the concurrent access and modification of data, relieve the burdens of the database, and effectively reduce the abnormal situations of a database, such as deadlocks, waiting, etc.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a concurrent access control method and device. Background technique [0002] In many Internet applications (or application systems), concurrent access to data is involved. Concurrent access means that the same data is accessed by multiple operations at the same time. At this time, it needs to be solved by concurrent access control technology, so as to prevent multiple operations from affecting each other. For example, a piece of data can be maintained by multiple users, and when one user modifies the data, other users cannot modify it; or, when a function is in progress, a batch of data used by the function cannot be modified by other users. function used, ie other certain functions will not be allowed to run concurrently. In this way, there will be no data disorder caused by a piece of data being modified by multiple operations at the same time. [0003] At present, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 刘习红
Owner KINGDEE SOFTWARE(CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products