Method and system for preventing cache penetration by customizing hash
A self-defining and caching technology, applied in the field of computer communication, can solve the problems of waste of resources, large storage, etc., and achieve the effect of solving traffic pressure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The present invention will be further described below in conjunction with the accompanying drawings.
[0032] see figure 1 Shown, a kind of self-defined hash of the present invention prevents the method of cache penetration, and described method comprises the following steps:
[0033] Step S1, prepare a plurality of different hash functions, and generate a plurality of different hash values to identify commodities;
[0034] Step S2. According to the product code of the product, the number n of required hash functions is obtained;
[0035] Step S3, cyclically execute the hash function n times to obtain the corresponding n hash values;
[0036] Step S4, judging whether n hash values exist in the bigset binary array;
[0037] Step S5, read commodity redis cache;
[0038] Step S6, reading the commodity database;
[0039] Step S7, storing the commodity data in the commodity database into the redis cache;
[0040] Step S8, return product data information to the user...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


