Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and device

An access control and data access technology, applied in the network field, can solve problems affecting business execution efficiency and low database performance, and achieve the effect of improving business processing efficiency

Inactive Publication Date: 2015-04-01
XIAOMI INC
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In related technologies, the lock is usually set in the database where the resource is located, that is, the database provides the lock mechanism. However, in this way, when the database locks a certain resource (such as a table item), it directly locks the database resource. At the same time, other non-related businesses will be denied access to this resource, which will affect the efficiency of business execution and make the database performance low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0031] figure 1 is an application scenario diagram of an access control method shown according to an exemplary embodiment, such as figure 1 As shown, this scenario takes registration on a website as an example. Assume that a user uses his laptop computer to register on a website, and the registered user name submitted is, for example, "youyou", and the user's computer can be called the first cl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method and an access control device. The access control method comprises the following steps: receiving a first lock acquisition request sent by a first client, wherein the first lock acquisition request comprises a first lock element and a second lock element which correspond to the first client; establishing a first lock which corresponds to the first client and comprises the first element and the second lock element which have a corresponding reaction, and returning a lock acquisition success response to the first client so that the first client accesses resources of a database; receiving a second lock acquisition request sent by a second client, wherein the second lock acquisition request comprises a first lock element and a second lock element which correspond to the second client; if the first lock element in the second lock acquisition request is the same as that in the first lock acquisition request, indicating that data access conflict happens and returning a lock acquisition failure response to the second client, so that the second client side stops accessing the resources of the database. According to the technical scheme provided by the embodiments disclosed by the invention, the business processing efficiency is improved.

Description

technical field [0001] The present disclosure relates to network technology, in particular to an access control method and device. Background technique [0002] When a resource is shared between different systems or different hosts of the same system, it is necessary to prevent the above-mentioned different systems or hosts from accessing the resource at the same time, resulting in inconsistent data in the resource. At this time, the resource needs to be locked. The role of the lock That is, for example, when a host accesses a resource, the simultaneous access of another host is denied. In related technologies, the lock is usually set in the database where the resource is located, that is, the database provides the lock mechanism. However, in this way, when the database locks a certain resource (such as a table item), it directly locks the database resource. At the same time, other non-related businesses will be denied access to this resource, which will affect the efficien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10
Inventor 谭国斌沈建荣马哲
Owner XIAOMI INC