A digital id generation method for distributed systems
A distributed system, digital technology, applied in database management systems, database distribution/replication, database indexing, etc., can solve the problems of inability to guarantee the incremental trend, low query efficiency, inability to deal with multiple concurrency situations, etc., to ensure efficient generation, The effect of ensuring uniqueness and reducing the amount of reading and writing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] like figure 1 As shown in the present embodiment, a method for generating a digital ID for a distributed system includes the following contents:
[0035] The data table creation step is to create an ID data table in the database;
[0036] Data table creation steps include:
[0037] Step 1: create N ID data tables in the database; the database can be a single database or multiple databases, and in this embodiment, there are 3 databases;
[0038] Step 2: Create an ID field and a memo field in each ID data table;
[0039] Step 3: Set the ID field to the auto-increment type, and the data type to the bigint type, set the auto-increment step size to N, and increase the starting value of the ID field of the N ID data tables by one in turn.
[0040] The application routing step distributes the invocation request to different applications according to the content of the invocation request and routing rules.
[0041] In the data table routing step, the application randomly se...
Embodiment 2
[0058] The difference between this embodiment and Embodiment 1 is that in this embodiment, the application generates the values of P and Q according to the content of the call request, the call request includes a confidential call request and a common call request, and the confidential call request includes a confidentiality level , the confidential invocation request and the ordinary invocation request both include equipment batches. The higher the security level, the larger the P, the newer the equipment batch, and the larger the Q. The database selection step is used for random selection in the existing database. Select P databases, the data table selection step is used to randomly select Q ID data tables from the P databases, and in the ID generation step, the Q ID field values obtained from the Q ID data tables will be spliced as generated. The ID is returned to the calling program. The larger the P is, the more databases are selected, and the more random the Q ID da...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
