Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data access method and device

A data access and database technology, applied in the client application field, can solve the problems of low efficiency of data processing scheme, inability to manage data clearly and efficiently, and achieve the effect of simple and clear data access and management, simple and flexible editing operation

Active Publication Date: 2018-06-29
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a data access method and device to solve the problem that the existing data processing scheme is inefficient and cannot manage data clearly and efficiently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method and device
  • Data access method and device
  • Data access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] refer to figure 2 , shows a flow chart of steps of a data access method according to Embodiment 1 of the present invention.

[0034] The data access method of the present embodiment includes the following steps:

[0035] Step S102: Obtain keywords of user data according to the data definition.

[0036] Among them, the data definition defines (also can be understood as setting) the keywords corresponding to the user data of a certain service and the keywords corresponding to the configuration file of the service, wherein the keywords corresponding to the user data of the same service are the same as the keywords of the service The corresponding keywords in the configuration file are the same.

[0037] Business usually refers to each specific function of the software, such as: automatic reply function in instant messaging software, security domain name checking function, interface skin changing function; user data of a business may include the automatic reply content e...

Embodiment 2

[0043] refer to image 3 , shows a flow chart of steps of a data access method according to Embodiment 2 of the present invention.

[0044] The data access method of the present embodiment includes the following steps:

[0045] Step S202: Perform data definition.

[0046] In this step, the data definition defines the keywords corresponding to the user data of each service and the keywords corresponding to the configuration files of each service, wherein the keywords corresponding to the user data of the same service are the same as the keywords corresponding to the configuration files of this service . The keywords corresponding to the user data of a certain business defined by the data definition and the keywords corresponding to the configuration file of the business are as follows:

[0047]

[0048] Among them, DefinedConfigSources defines the location and format of the data, and DefinedConfigFileKeys defines the KEY for the configuration file.

[0049] When defining...

Embodiment 3

[0076] refer to Figure 4 , shows a flow chart of steps of a data reading method according to Embodiment 3 of the present invention.

[0077] This embodiment describes the data access scheme of the present invention from the aspect of data reading, and the data reading method of this embodiment includes the following steps:

[0078] Step S302: Obtain the KEY (keyword) corresponding to the user data to be accessed and the configuration file according to the data definition.

[0079] Step S304: Obtain all user data according to the KEY of the user data.

[0080] Step S306: parse the KEY of the user data into a parent KEY and multiple child KEYs according to separators such as "|".

[0081] This embodiment takes a multi-level KEY as an example, but those skilled in the art should understand that in some cases, there may be only a parent KEY.

[0082] Step S308: Generate a user data tree from the user data according to the parsed parent KEY and multiple child KEYs.

[0083] St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data access method and device. The data access method comprises the steps that a keyword of user data is obtained according to a data definition, wherein the data definition defines the keyword corresponding to the user data of a certain service and a keyword corresponding to a configuration file of the service, and the keywords corresponding to the user data and the configuration file of the same service are the same; the user data are obtained according to the keyword of the user data, and a user data tree is generated; access to the user data tree and / or the configuration file is conducted according to the keywords. By the adoption of the data access method and device, uniform access and management of the user data and configuration data are achieved.

Description

technical field [0001] The present invention relates to the technical field of client applications, in particular to a data access method and device. Background technique [0002] The client application is the software deployed on the client to implement specific functions, such as Ali Wangwang, QQ, anti-virus software, and so on. Client applications are generally composed of various complex services. For example, the process of changing the appearance of the software interface includes: accessing relevant servers, providing various appearances, pushing relevant appearance data according to user selections, recording user selections, and so on. [0003] Each business of the client application depends on the configuration data and the generation of user data. Currently, the processing methods for configuration data and user data mainly include: Method 1. The configuration data is stored in the configuration file of each business, and each business Access and analyze data by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
CPCG06F16/22
Inventor 罗晓霞
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products