Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of virtual identity management system copy based on different data organization methods

A technology for virtual identity and data organization, applied in the Internet field, can solve the problems of complex algorithms, unreasonable use of copies, large storage space, etc., to maximize system efficiency, reduce network transmission costs, and reduce query time.

Active Publication Date: 2019-08-23
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is to improve query efficiency by establishing a large number of external indexes, which requires a large storage space and a relatively complicated algorithm; on the issue of replicas, the replica strategy that comes with the Cassandra database is followed, and replicas are only regarded as storage redundancy. , and does not make reasonable use of the role of the copy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of virtual identity management system copy based on different data organization methods
  • A method of virtual identity management system copy based on different data organization methods
  • A method of virtual identity management system copy based on different data organization methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] (1) Virtual identity data division: In the domain space, users register accounts on different application platforms according to their needs. These application platforms include e-commerce, social networks, and online games. The virtual identity management system unifies this information through eID. A user has a unique eID identification, and he has different virtual accounts under different application platforms. These data units have different structures, different sizes, and huge amounts of data. Apply the Cassandra column database data model to virtual identity data, as shown in Table 1:

[0053] Table 1 Virtual identity data model

[0054]

[0055] According to the above storage model, the present invention divides the virtual identity data horizontally and vertically. The horizontal direction is divided according to eID, and the vertical direction is divided according to the application program. When the hash value of the data object is calculated by the consistent ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual identity management system replication strategy based on different data organization modes. The virtual identity management system replication strategy mainly comprises virtual identity data partitioning, data organization of a duplicate 1, data organization of a duplicate 2, duplicate distribution and data inquiry. According to the virtual identity management system replication strategy based on different data organization modes, the replication strategy of a Cassandra database is improved; 2 duplicates are set; after the Cassandra database partitions virtual identity data with the consistent hash algorithm, the duplicates of the data are reorganized; the virtual identity data are repartitioned by selecting a partitioning method favorable for inquiry; the duplicates are placed according to the principle that the same data duplicates are not positioned in the same physical machine. Due to different duplicates, different data organization modes are used to process different inquiry requests, so that the inquiry time is shortened, the network transmission cost is reduced, and the system efficiency is maximized; the virtual identity management system replication strategy is applicable to solving of the placement problem of the data of a virtual identity management system.

Description

Technical field [0001] The invention belongs to the field of Internet technology, and specifically relates to a method for virtual identity management system copies based on different data organization modes. Background technique [0002] The full name of eID (electronic IDentity) is the citizen network electronic identity. elD is an authoritative electronic information file that remotely proves the true identity of an individual on the Internet. When eID is used remotely on the network, it uses the public security population database and elD service platform to complete the real identity verification, which can realize the authenticity and validity of the personal identity while protecting the privacy of the citizen’s identity. It is authoritative, safe, and secure. It is traceable, convenient and easy to use. In the Internet, there is a one-to-many relationship between users and virtual identities under various applications and platforms. In an eID-based network environment, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/332G06F21/62G06F21/31
Inventor 傅翔朱伟辉贾焰韩伟红李树栋李爱平周斌杨树强黄九鸣全拥邓璐刘斐
Owner NAT UNIV OF DEFENSE TECH