Unlock instant, AI-driven research and patent intelligence for your innovation.

Key value pair management verification method and device, equipment and storage medium

A verification method and a verification device technology, which are applied in the database field, can solve problems such as naming conflicts, abuse and misuse, and failure to audit key-value pairs, and achieve the effects of improving stability, avoiding abuse, and reducing abuse

Pending Publication Date: 2021-03-30
BEIJING GRIDSUM TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the embodiments of the present invention is to provide a key-value pair management verification method, a key-value pair management verification device, a key-value pair management verification device, and a storage medium to solve existing problems. During the use of key-value databases, key-value pairs cannot be managed uniformly and created key-value pairs cannot be audited, which can easily lead to system problems caused by naming conflicts, abuse and misuse of key-value pairs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key value pair management verification method and device, equipment and storage medium
  • Key value pair management verification method and device, equipment and storage medium
  • Key value pair management verification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0050]In the embodiments of the present invention, the term "comprising", "comprising" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, commodity or apparatus comprising a series of elements includes not only those elements, but also Include other elements not expressly listed, or also include elements inherent in such process, method, commodity or apparatus. Without further limitations, an element defined by the phrase "comprising a ..." does not preclude the presence of additional identical elements in the process, method, article, or apparatus that includes the element.

[0051] Such as figure 1 As s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a key value pair management verification method and device, equipment and a storage medium, and belongs to the technical field of databases, and the method comprises the steps: carrying out the inspection of all key value pairs in a database, judging whether there is an illegal key value pair in the database or not, and deleting the illegal key value pair when there is the illegal key value pair in the database. The key value pairs in the database are automatically inspected, so that standardization and unification of the key value pairs in the databaseare effectively guaranteed, illegal key value pairs existing in the database are avoided, the problems of abuse and misuse caused by non-standardization of the key value pairs when the key value pairs are used are effectively reduced, and the service life of the key value pairs is prolonged. Therefore, the system problem caused by abuse and misuse of the key value pair is avoided, and the stability of the system is improved.

Description

technical field [0001] The invention relates to the technical field of databases, in particular to a method for managing and verifying key-value pairs, a device for managing and verifying key-value pairs, a device for managing and verifying key-value pairs, and a storage medium. Background technique [0002] A key-value database is a non-relational database that uses a simple key-value method to store data. A key-value database stores data as a collection of key-value pairs, where the key acts as a unique identifier. Both the key and the value can be anything from simple objects to Anything from complex composite objects, key-value databases are highly partitionable and allow horizontal scaling at scales not possible with other types of databases. Take Redis as an example. Redis is an open source written in ANSI C language, supports network, can be memory-based or persistent log type, Key-Value database, and provides APIs in multiple languages. Similar to Memcached, it suppo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/21G06F16/22
CPCG06F16/21G06F16/22
Inventor 吴财
Owner BEIJING GRIDSUM TECH CO LTD