Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data synchronization method and system

A data synchronization and key technology, applied in the computer field, can solve problems such as difficult private key update, achieve the effect of improving the reliability of key synchronization, reducing the probability of error, and ensuring reliability

Active Publication Date: 2018-01-16
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this update synchronization method is difficult to ensure that the private key is updated to the target machine under factors such as network instability. The target machine is a business machine that needs to update the private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data synchronization method and system
  • Data synchronization method and system
  • Data synchronization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0053] In the existing synchronous update process, the central server synchronously updates the private key to each business machine in the form of a file, and the active push method is adopted, and the update reliability is low.

[0054] One of the core ideas of the embodiment of the present invention is that the central server can no longer update the keys synchronously in the form of files to each business machine, but by independent synchronization server (RsyncServer) and synchronization client (RsyncClient) to be responsible for all related Key-related management to improve the reliability of key synchronization updates.

[0055]As an application of the present invention, a data synchronization system can be formed based on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data synchronization method and system, and relates to the technical field of computer. The data synchronization method is applied to a synchronization client running in a server, and includes the steps: receiving a key request sent from the synchronization client which is arranged in a service machine; according to the key request, acquiring a first keyof the server; and sending the first key to the synchronization client, wherein the synchronization client is used for providing a second key for the service machine according to the first key. For the data synchronization method, after the synchronization client is started, the latest key in the server can be actively obtained from the synchronization service terminal, so that the data synchronization method solves the problem that the key of the server is not consistent with the key of the service machine because the server fails to actively push the key, and can guarantee the reliability ofsynchronous updating of the key.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a data synchronization method and a data synchronization system. Background technique [0002] In World Wide Web (Web) applications, in order to identify normal user requests and hotlinking behaviors, generally the requester will attach token (token) information to the request. Take the token obtained by using the fifth edition of the Message Digest Algorithm (Message Digest Algorithm MD5) encryption method as an example, and the token can include specification agreed parameter items and a private key. Specifically, the requester can use the MD5 method to obtain a token information token, and can add the token information token to the request and send it to the server. After receiving the request, the server can use the same MD5 encryption method to obtain a new token information new_token, and can judge whether the new token information new_token is equal to the token in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/12H04L9/08
Inventor 张海
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products