Movatterモバイル変換


[0]ホーム

URL:


CN117130563A - Solid state disk capacity sharing method and device, electronic equipment and medium - Google Patents

Solid state disk capacity sharing method and device, electronic equipment and medium
Download PDF

Info

Publication number
CN117130563A
CN117130563ACN202311172022.1ACN202311172022ACN117130563ACN 117130563 ACN117130563 ACN 117130563ACN 202311172022 ACN202311172022 ACN 202311172022ACN 117130563 ACN117130563 ACN 117130563A
Authority
CN
China
Prior art keywords
storage
supply
storage space
data
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311172022.1A
Other languages
Chinese (zh)
Inventor
姜敬青
王明锋
肖海鹏
王成才
沈金良
吴礼优
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinsheng Electronic Technology Co ltd
Original Assignee
Shenzhen Jinsheng Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinsheng Electronic Technology Co ltdfiledCriticalShenzhen Jinsheng Electronic Technology Co ltd
Priority to CN202311172022.1ApriorityCriticalpatent/CN117130563A/en
Publication of CN117130563ApublicationCriticalpatent/CN117130563A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The application relates to the technical field of data processing, in particular to a solid state disk capacity sharing method, a device, electronic equipment and a medium, wherein the method comprises the steps of obtaining storage demand information, wherein the storage demand information comprises storage demand quantity and storage duration of data to be stored, and the storage demand information is sent by a demand user terminal; identifying a data identifier of data to be stored in the storage demand information, and determining the storage security level of the data to be stored according to the data identifier; acquiring a sending address of storage demand information, and matching the sending address, the storage demand information and the storage security level with characteristic values corresponding to a plurality of supply storage spaces to obtain a matching value corresponding to each supply storage space, wherein the supply storage space is provided by a supply user terminal containing an idle storage space; and determining the supply storage space with the highest matching value as a target storage space of the data to be stored. The application can improve the adaptation degree of the stored data and the storage space, thereby improving the safety of the stored data.

Description

Solid state disk capacity sharing method and device, electronic equipment and medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method and apparatus for sharing capacity of a solid state disk, an electronic device, and a medium.
Background
The solid state disk stores data through the flash memory chip, can read and write data rapidly, and has a faster read-write speed compared with the traditional mechanical hard disk. With the increase of digital content such as high-definition video, high-resolution photos and music, people often face the situation that the available storage space is insufficient.
When the available storage space is insufficient, people generally choose to upload data to the cloud storage platform for storage, in the related technology, the idle cloud storage space is generally selected from the cloud storage platform through the data quantity to be stored, and then the data to be stored is written into the determined idle cloud storage space, however, because the requirements of different data to be stored on the storage space are different, the selected idle cloud storage space and the data to be stored may have the condition of being not adapted, and therefore the condition that the data to be stored is lost or stolen during storage may be increased.
Disclosure of Invention
In order to improve the adaptation degree of storage data and storage space and improve the safety of the storage data, the application provides a solid state disk capacity sharing method, a solid state disk capacity sharing device, electronic equipment and a medium.
In a first aspect, the present application provides a method for sharing capacity of a solid state disk, which adopts the following technical scheme:
a solid state disk capacity sharing method comprises the following steps:
acquiring storage demand information, wherein the storage demand information comprises storage demand quantity and storage duration of data to be stored, and the storage demand quantity and the storage duration are sent by a demand user terminal;
identifying a data identifier of data to be stored in the storage demand information, and determining the storage security level of the data to be stored according to the data identifier;
acquiring a sending address of the storage demand information, and matching the sending address, the storage demand information and the storage security level with characteristic values corresponding to a plurality of supply storage spaces to obtain a matching value corresponding to each supply storage space, wherein the supply storage space is provided by a supply user terminal containing an idle storage space;
and determining the supply storage space with the highest matching value as the target storage space of the data to be stored.
By adopting the technical scheme, the target storage space is determined together through the storage demand, the storage duration, the sending address and the storage security level of the data to be stored, instead of randomly selecting the target storage space according to the storage data quantity, the accuracy in determining the target storage space is facilitated to be improved by increasing the selection conditions, and the free storage space is provided by the supply user terminal, namely, the data to be stored is finally stored in the free storage space in the supply user terminal, instead of directly storing the data to be stored in the cloud storage space, because the cloud storage space is often used as an attack target, the free storage space in the supply user terminal is facilitated to be improved in the security of the data to be stored in the storage process.
In one possible implementation, determining the provisioning storage space includes:
acquiring supply information sent by each supply user terminal, wherein each supply information comprises a time period to be supplied and a space to be supplied;
determining supply information of which the time period to be supplied is not less than a preset time period and the space to be supplied is not less than a preset space as initial supply information, and determining a storage space corresponding to the initial supply information as initial supply storage space;
obtaining the corresponding access attack times and fault rates of each initial supply storage space in a preset time period, and determining the credit level of each initial supply storage space according to the access attack times and the fault rates;
the offer storage space is determined based on the reputation level of each initial offer storage space.
By adopting the technical scheme, when the user terminal is supplied to provide the idle supply storage space for the electronic equipment, the storage space provided by each user terminal is not used as the supply storage space, but is primarily screened according to the idle time length and the idle space of each idle storage space, and because the storage space is smaller, the probability that the storage space with the shorter idle time length is generally written with data is smaller, the resources of the electronic equipment can be reduced by eliminating the smaller spaces, and finally, the secondary screening is carried out on the initial supply storage space through the reputation level, so that the idle storage space with the lower reputation level in the initial supply storage space is conveniently removed, and the safety during writing the stored data can be improved.
In one possible implementation manner, the matching, according to the sending address, the storage requirement information and the storage security level, the characteristic values corresponding to the plurality of supply storage spaces to obtain the matching value corresponding to each supply storage space includes:
selecting at least one adjacent supply storage space from a plurality of supply storage spaces according to the transmission address;
acquiring adjacent idle time lengths corresponding to each adjacent supply storage space, and matching each adjacent idle time length with the storage time length corresponding to the data to be stored to obtain a time length matching value corresponding to each adjacent supply storage space;
acquiring adjacent storage security levels corresponding to each adjacent storage space, and matching each adjacent storage security level with the storage security level corresponding to the data to be stored to obtain a security level matching value corresponding to each adjacent storage space;
and determining the matching value corresponding to each adjacent supply storage space according to the duration matching value and the security level matching value corresponding to each adjacent supply storage space.
By adopting the technical scheme, the destination adjacent storage space of the data to be stored is selected through the sending address, so that the transmission path length of the data to be stored is reduced conveniently, the probability of data loss of the data to be stored in the transmission process is reduced conveniently, and finally, the target storage space is selected from the adjacent supply storage spaces through feature matching, so that the accuracy in determining the target storage space is improved conveniently.
In one possible implementation, the method further includes:
acquiring the storage residual quantity of each supply storage space, and generating a supply storage chain based on each storage residual quantity, wherein the supply storage chain comprises a plurality of nodes, and each node corresponds to one supply storage space;
acquiring the use information of each supply storage space in the supply storage chain in real time, wherein the use information is the time and the data volume of writing data into or taking data out of the supply storage space;
and updating the supply storage chain according to the use information of each supply storage space, and feeding back the updated supply storage chain.
Through adopting above-mentioned technical scheme, through carrying out real-time supervision to every service condition that supplies with storage space to confirm the storage surplus of every and supply with storage space, and select and demonstrate the storage surplus of all supplying with storage space through the memory chain, the resource service condition of each supplying with storage space of the more audio-visual understanding of relevant technicians of being convenient for.
In one possible implementation manner, after the generating the supply storage chain based on each storage margin, the method further includes:
acquiring the borrowing information corresponding to each node, and generating a borrowing list according to the borrowing information corresponding to each node, wherein the borrowing information is used for representing the borrowing time period and the borrowing space of each supply storage space;
A inventory of each node is added to the supply chain.
Through adopting above-mentioned technical scheme, through the lending the case of every node of interpolation in the supply storage chain to show the knot condition in the form of information list in the supply storage chain, so that the relevant staff more intuitively look over the lending the case of every supply storage space, be convenient for relevant staff to see whether there is conflict to borrow through borrowing the information and deposit, be convenient for reduce the condition that takes place the packet loss in the data storage process through reducing the storage conflict.
In one possible implementation, the method further includes:
when the target storage space does not exist, sequencing the plurality of the supply storage spaces according to the matching value corresponding to each supply storage space to obtain a supply sequence;
determining at least one combined storage space according to the supply sequence, wherein the number of the supply storage spaces contained in each combined storage space is not higher than the number of preset spaces;
acquiring a historical communication record of each supply storage space in the supply sequence, and determining the corresponding credibility of each combined storage space according to the historical communication record of each supply storage space;
and determining the merging storage space with the reliability higher than the preset reliability as a target merging storage space, and determining the target merging storage space as the target storage space of the data to be stored.
By adopting the technical scheme, when the target storage space capable of writing the data to be stored at one time does not exist, the data to be stored can be written into the plurality of supply storage spaces, the merging storage space is selected from the plurality of supply storage spaces according to the residual storage capacity of each supply storage space, so that the number of the supply storage spaces in the merging storage space is conveniently reduced, the writing rate of the data to be stored is conveniently improved, and whether different supply storage spaces can be merged or not is judged through the credibility among the supply storage spaces in the merging storage space, so that the safety of writing the data to be stored into the merging storage space is conveniently improved.
In one possible implementation, the method further includes:
when the supply user terminal corresponding to the target storage space is abnormally powered off, determining a borrowing terminal corresponding to the abnormal supply user terminal according to the supply storage chain, wherein the borrowing terminal is a demand user terminal for writing data to be stored into the target storage space corresponding to the abnormal supply user terminal;
acquiring a storage state of each borrowing terminal, wherein the storage state comprises storage and storage completion;
Pushing a data verification instruction to the borrowing and storing terminal with the storage state being stored so as to remind relevant staff to verify the data written into the abnormally supplied user terminal.
Through adopting above-mentioned technical scheme, when abnormal power failure occurs, data in the storage probably can take place data loss, and the data that is likely to have the abnormality is verified to the data that is convenient for remind relevant technical personnel to carry out the verification through data verification instruction this moment to reduce the data and lose because of abnormal power failure probability, thereby be convenient for improve data integrity.
In a second aspect, the present application provides a solid state disk capacity sharing device, which adopts the following technical scheme:
a solid state disk capacity sharing device comprises:
the storage demand information comprises the storage demand quantity and the storage duration of data to be stored, and the storage demand quantity and the storage duration are sent by a demand user terminal;
the storage security level determining module is used for identifying a data identifier of the data to be stored in the storage demand information and determining the storage security level of the data to be stored according to the data identifier;
the matching value determining module is used for acquiring a sending address of the storage demand information, and matching the sending address, the storage demand information and the storage security level with characteristic values corresponding to a plurality of supply storage spaces to obtain a matching value corresponding to each supply storage space, wherein the supply storage space is provided by a supply user terminal containing an idle storage space;
And the target storage space determining module is used for determining the supply storage space with the highest matching value as the target storage space of the data to be stored.
By adopting the technical scheme, the target storage space is determined together through the storage demand, the storage duration, the sending address and the storage security level of the data to be stored, instead of randomly selecting the target storage space according to the storage data quantity, the accuracy in determining the target storage space is facilitated to be improved by increasing the selection conditions, and the free storage space is provided by the supply user terminal, namely, the data to be stored is finally stored in the free storage space in the supply user terminal, instead of directly storing the data to be stored in the cloud storage space, because the cloud storage space is often used as an attack target, the free storage space in the supply user terminal is facilitated to be improved in the security of the data to be stored in the storage process.
In one possible implementation, the module for determining a matching value is specifically configured to, when determining the provisioning storage space:
acquiring supply information sent by each supply user terminal, wherein each supply information comprises a time period to be supplied and a space to be supplied;
Determining supply information of which the time period to be supplied is not less than a preset time period and the space to be supplied is not less than a preset space as initial supply information, and determining a storage space corresponding to the initial supply information as initial supply storage space;
obtaining the corresponding access attack times and fault rates of each initial supply storage space in a preset time period, and determining the credit level of each initial supply storage space according to the access attack times and the fault rates;
the offer storage space is determined based on the reputation level of each initial offer storage space.
In one possible implementation manner, the matching value determining module is specifically configured to, when matching the characteristic values corresponding to the plurality of supply storage spaces according to the sending address, the storage requirement information and the storage security level, obtain a matching value corresponding to each supply storage space:
selecting at least one adjacent supply storage space from a plurality of supply storage spaces according to the transmission address;
acquiring adjacent idle time lengths corresponding to each adjacent supply storage space, and matching each adjacent idle time length with the storage time length corresponding to the data to be stored to obtain a time length matching value corresponding to each adjacent supply storage space;
Acquiring adjacent storage security levels corresponding to each adjacent storage space, and matching each adjacent storage security level with the storage security level corresponding to the data to be stored to obtain a security level matching value corresponding to each adjacent storage space;
and determining the matching value corresponding to each adjacent supply storage space according to the duration matching value and the security level matching value corresponding to each adjacent supply storage space.
In one possible implementation, the apparatus further includes:
the system comprises a supply storage chain generation module, a storage chain generation module and a storage chain generation module, wherein the supply storage chain generation module is used for acquiring the storage residual quantity of each supply storage space and generating a supply storage chain based on each storage residual quantity, the supply storage chain comprises a plurality of nodes, and each node corresponds to one supply storage space;
the real-time information acquisition module is used for acquiring the use information of each supply storage space in the supply storage chain in real time, wherein the use information is the time and the data volume of writing data into or taking out data from the supply storage space;
and the updating storage chain module is used for updating the supply storage chain according to the use information of each supply storage space and feeding back the updated supply storage chain.
In one possible implementation, the apparatus further includes:
the system comprises a storage list generation module, a storage management module and a storage management module, wherein the storage list generation module is used for acquiring storage information corresponding to each node, generating a storage list according to the storage information corresponding to each node, and the storage information is used for representing the storage time period and the storage space of each supply storage space;
and the adding list module is used for adding the lending list of each node into the supply storage chain.
In one possible implementation, the apparatus further includes:
the supply sequence determining module is used for sequencing the plurality of supply storage spaces according to the matching value corresponding to each supply storage space when the target storage space does not exist, so as to obtain a supply sequence;
the combined storage space determining module is used for determining at least one combined storage space according to the supply sequence, and the number of the supply storage spaces contained in each combined storage space is not higher than the number of the preset spaces;
the credibility determining module is used for acquiring the historical communication record of each supply storage space in the supply sequence and determining the credibility corresponding to each combined storage space according to the historical communication record of each supply storage space;
and the target merging storage space determining module is used for determining a merging storage space with the reliability higher than the preset reliability as a target merging storage space and determining the target merging storage space as the target storage space of the data to be stored.
In one possible implementation, the apparatus further includes:
the abnormal lending and storing terminal module is used for determining the lending and storing terminal corresponding to the abnormal supply user terminal according to the supply storage chain when the supply user terminal corresponding to the target storage space is abnormally powered off, wherein the lending and storing terminal is a user terminal required to write data to be stored into the target storage space corresponding to the abnormal supply user terminal;
the storage state acquisition module is used for acquiring the storage state of each borrowing terminal, wherein the storage state comprises the storage state and the storage completion;
the pushing module is used for pushing a data verification instruction to the borrowing and storing terminal with the storage state being in storage so as to remind relevant staff to verify the data written into the abnormally supplied user terminal.
In a third aspect, the present application provides an electronic device, which adopts the following technical scheme:
an electronic device, the electronic device comprising:
at least one processor;
a memory;
at least one application, wherein the at least one application is stored in memory and configured to be executed by at least one processor, the at least one application configured to: and executing the solid state disk capacity sharing method.
In a fourth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer-readable storage medium, comprising: the computer program capable of being loaded by the processor and executing the solid state disk capacity sharing method is stored.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the target storage space is determined together through the storage demand, the storage duration, the sending address and the storage security level of the data to be stored, instead of randomly selecting the target storage space according to the storage data amount, the accuracy in determining the target storage space is facilitated to be improved by increasing the selection conditions, and the free storage space is provided by the supply user terminal, namely, the data to be stored is finally stored in the free storage space in the supply user terminal, instead of directly storing the data to be stored in the cloud storage space, because the cloud storage space is often used as an attack target, the storage of the data to be stored in the free storage space in the supply user terminal is facilitated to improve the security of the data to be stored in the storage process.
2. When there is no target storage space capable of writing data to be stored at one time, the data to be stored can be written into a plurality of supply storage spaces, a merging storage space is selected from the plurality of supply storage spaces according to the residual storage capacity of each supply storage space, so that the number of the supply storage spaces in the merging storage space is conveniently reduced, the writing rate of the data to be stored is conveniently improved, and whether different supply storage spaces can be merged or not is judged through the credibility among the supply storage spaces in the merging storage space, so that the safety of writing the data to be stored into the merging storage space is conveniently improved.
Drawings
FIG. 1 is a schematic diagram of a data transmission frame according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a method for partitioning capacity of a solid state disk according to an embodiment of the present application;
FIG. 3 is an exemplary diagram of a method for determining a match value in an embodiment of the application;
FIG. 4 is a schematic diagram of a supply storage chain according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a solid state disk capacity division device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to fig. 1-6.
Modifications of the embodiments which do not creatively contribute to the application may be made by those skilled in the art after reading the present specification, but are protected by patent laws within the scope of the claims of the present application.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
For easy understanding, a data transmission frame applicable to the embodiment of the present application is shown in fig. 1, where fig. 1 includes a demand user terminal, a supply user terminal and an electronic device, where the demand user terminal may communicate with the electronic device, the supply user terminal may communicate with the electronic device, and the demand user terminal and the supply user terminal may communicate with the electronic device through wireless communication or wired communication, and a specific communication manner is not limited in the embodiment of the present application.
Specifically, the embodiment of the application provides a solid state disk capacity sharing method, which is executed by electronic equipment, wherein the electronic equipment can be a server or terminal equipment, and the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server for providing cloud computing service. The terminal device may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., but is not limited thereto, and the terminal device and the server may be directly or indirectly connected through a wired or wireless communication manner, which is not limited herein.
Referring to fig. 1, fig. 2 is a flow chart of a method for partitioning capacity of a solid state disk according to an embodiment of the present application, where the method includes steps S210 to S240, where:
step S210: and acquiring storage requirement information.
The storage demand information comprises storage demand quantity and storage duration of data to be stored, and the storage demand quantity and the storage duration are sent by a demand user terminal.
Specifically, the user terminal is a user terminal that needs other free storage space, the data to be stored included in the storage requirement information is data that needs to be saved to storage space of other space, where the storage requirement is used to represent data volume of the data to be stored, that is, data volume that needs to be written into other storage space, and the other storage space is space that needs to be saved by the user terminal, where the storage volume corresponding to the other storage space should not be smaller than the storage requirement, the data volume of the data to be stored can be determined by counting the number of rows, the number of columns, the number of characters, the number of words, and the like in the data to be stored, and the data volume of the data to be stored can also be estimated by a compression algorithm, where the compression algorithm can compress the data to be stored into a smaller volume, and the data volume of the data to be stored is estimated by a ratio before and after compression, so that the data volume of the data to be stored is determined is not specifically limited in the embodiment of the application, as long as the corresponding data volume can be identified.
The storage duration is the duration that the data to be stored needs to be stored in other storage spaces, the specific duration is not specifically limited in the embodiment of the application, the specific duration can be determined by a demand user according to actual conditions, the demand user terminal can establish contact with the electronic equipment through wireless communication or wired communication so as to send the storage demand information to the electronic equipment, and the specific communication mode is not specifically limited in the embodiment of the application, so long as the information transmission can be performed.
Step S220: and identifying the data identification of the data to be stored in the storage demand information, and determining the storage security level of the data to be stored according to the data identification.
Specifically, the data identifier of the data to be stored is an identifier or a tag used for uniquely representing or identifying the data to be stored, and may be a name of the data to be stored, such as a file name, a column name or a variable name; a unique identifier, such as a UUID universally unique identifier; metadata such as data type, size, creation date, etc.; indexing, using a data indexing system to identify data, and quickly searching and identifying the data through the indexing; a tag, which identifies data by adding tags or keywords to the data to facilitate searching and classification; based on the context and relation of the data to be stored, for example, the main key and the external key are used for establishing the association between the data, and the data to be stored is conveniently stored, retrieved and managed through the data identification of the data to be stored. When the data identification of the data to be stored is identified, the data to be stored can be imported into a preset identification model to identify the data identification contained in the data to be stored, wherein the preset identification model is obtained by training a large amount of sampling data information, and the sampling data information contains sampling data and data identification labels contained in each sampling data. The storage security levels corresponding to different data identifiers are different, and when the storage security level corresponding to the data to be stored is determined, the determination can be performed according to the corresponding relation between the data identifiers and the storage security level, wherein the corresponding relation between the data identifiers and the storage security level is not particularly limited in the embodiment of the application, and can be set by related technicians.
Step S230: and acquiring a sending address of the storage demand information, and matching the sending address, the storage demand information and the storage security level with characteristic values corresponding to a plurality of supply storage spaces to obtain a matching value corresponding to each supply storage space, wherein the supply storage space is provided by a supply user terminal containing an idle storage space.
Specifically, the sending address of the requirement information, that is, the IP address of the requirement user terminal is stored, where the sending address of the requirement user terminal is to be obtained in the following ways:
the server side obtains the IP address of the user terminal through the X-Forwarded-For or remote_addr field in the headers of the HTTP request in a common mode;
in the second mode, javaScript obtains the hostname of the requiring user terminal by using the hostname attribute of the window location object, and obtains the complete resource address by using the href attribute of the window location object.
The specific manner of acquiring the transmission address of the requiring user terminal is not specifically limited in the embodiment of the present application, as long as the transmission address of the requiring user terminal can be acquired.
The supply storage space is a corresponding free storage space in the supply user terminal, wherein the supply user terminal can establish communication with the electronic device in a wireless communication or wired communication mode, the supply information of the corresponding free storage space in the supply user terminal can be fed back through the communication, and after the electronic device is accessed by a demand user, data to be stored can be stored in the corresponding free storage space of the supply user terminal through the electronic device.
Wherein when determining the supply storage space, the method comprises the following steps:
acquiring supply information sent by each supply user terminal, wherein the supply information comprises a time period to be supplied and a space to be supplied; determining supply information of which the time period to be supplied is not less than a preset time period and the space to be supplied is not less than a preset space as initial supply information, and determining a storage space corresponding to the initial supply information as initial supply storage space; obtaining the corresponding access attack times and fault rates of each initial supply storage space in a preset time period, and determining the credit level of each initial supply storage space according to the access attack times and the fault rates; the offer storage space is determined based on the reputation level of each initial offer storage space.
Specifically, the period to be supplied is a borrowable period of the free storage space in the supply user terminal, for example, the solid state disk capacity of the supply user terminal a is 3TB, and the use ratio of the solid state disk can be predicted to be 50% during the first project, so that in the first project process, the remaining 50% of the solid state disk capacity can be used as the free storage space, that is, the demand user terminal can borrow the remaining 50% of the solid state disk storage space, the period corresponding to the period from the completion of the first project to the beginning of the second project is the period to be supplied, and in order to reduce the number of times of data transfer, the period to be supplied is limited by the minimum duration limit, that is, the period to be supplied corresponding to the supply storage space is not less than the preset duration, the preset duration can be 5 days, and the specific preset duration is not specifically limited in the implementation of the application, and can be set by related technicians. Because the usage ratio of the solid state disk may affect the data processing rate, when determining the free storage space, the determination needs to be performed according to the reserved storage space, for example, the usage ratio of the solid state disk for completing the current project may reach 40% of the solid state disk capacity, and if the reserved storage space is 10% of the solid state disk capacity, the 50% of the solid state disk capacity is taken as the free storage space. The space to be supplied is an idle storage space which can be provided by the user terminal, the preset space can be 500GB or 400GB, and the specific preset space is not particularly limited in the embodiment of the application and can be set by related technicians.
According to the preset duration and the preset space, the storage space with shorter duration to be supplied and smaller space to be supplied can be removed to obtain an initial supply storage space, wherein the number of the initial supply storage spaces can be one or more, or can be 0, and the embodiment of the application is not particularly limited, and when the number of the initial storage spaces is 1, the initial storage space is directly determined to be the supply storage space; when the initial storage space is multiple, screening and rejecting can be performed according to the number of times the initial storage space is attacked and the frequency of faults in a preset time period, wherein the number of times of access attack is the number of times the initial storage space is attacked, the attack type can be DoS or DDoS attack, doS (Denial of Service ), namely, single DoS attack generally adopts a one-to-one mode, and network congestion to an attacked host is caused by manufacturing and sending large-flow useless data, service resources of the attacked host are exhausted, and the attacked host cannot normally communicate with the outside; ddos (Distributed Denial of Service, distributed denial of service attack), i.e. an attacker can forge an IP address, indirectly increase attack traffic, and through forging a source IP address, consume network bandwidth and system resources, so that a legitimate user cannot obtain normal service. The attack type is not particularly limited in the embodiment of the application, and the number of times of access attack is recorded once only if the attack identifier is monitored.
The failure rate is the frequency of occurrence of failure, which is different from the access attack, and in the embodiment of the application, the failure rate mainly refers to the number of abnormal power failure in a preset time period. When determining the reputation level of each initial supply storage space, determining an attack reputation score corresponding to each initial supply storage space according to the access attack times and a first corresponding relation in a preset time period, wherein the first corresponding relation is a corresponding relation between the attack times and the first reputation score, determining a fault reputation score corresponding to each initial supply storage space according to a fault rate and a second corresponding relation in the preset time period, wherein the second corresponding relation is a corresponding relation between the fault rate and the second reputation score, determining a total reputation score corresponding to each initial supply storage space according to the attack reputation score and the fault reputation score of each initial supply storage space, determining a reputation level corresponding to each initial supply storage space according to the total reputation and a third corresponding relation, and the third corresponding relation is a corresponding relation between the reputation level and the third reputation score, wherein specific contents of the first corresponding relation, the second corresponding relation and the third corresponding relation are not particularly limited in the embodiment of the application, and can be set by related technicians. And rejecting the supply storage space with the reputation level lower than the preset reputation level to obtain the supply storage space, wherein the preset reputation level can be the first reputation level or the second reputation level and can be set by related technicians.
The matching is performed according to the sending address, the storage requirement information and the storage security level, and the feature values corresponding to the plurality of supply storage spaces, so as to obtain a matching value corresponding to each supply storage space, which specifically includes steps S2301-S2304, as shown in fig. 3, wherein:
step S2301: at least one adjacent supply storage space is selected from the plurality of supply storage spaces according to the transmission address.
Specifically, since the sending address is an IP address corresponding to the requiring user terminal, the login position of the requiring user terminal can be located through the IP address, and then the login position corresponding to each supplying user terminal is determined in the same manner, if the interval distance between the login position of the requiring user terminal and the login position of the supplying user terminal is smaller than the preset interval distance, the supplying user terminal is determined to be an adjacent supplying user terminal of the requiring user terminal, wherein the specific preset interval distance is not specifically limited in the embodiment of the present application, and can be set by related technicians. The number of adjacent supply storage spaces of the requiring user terminal may be one or more, and the specific number is not specifically limited in the embodiment of the present application.
When the login position of the user terminal required or the login position of the user terminal supplied can be positioned according to the IP address, the geographic position of the IP address can be predicted by inquiring a preset database, wherein the preset database comprises a plurality of mapping relations between the IP addresses and the geographic positions; the method can also infer approximate geographical position information by tracking the routing path of the network data packet sent by the IP address, and the method needs to analyze the mapping relation between the network routing and the geographical position information; the GPS or Wi-Fi positioning can be also used for acquiring more accurate positioning information by using a global positioning system or Wi-Fi signal of the requiring user terminal or the supplying user terminal when the requiring user terminal or the supplying user terminal is connected with a network, and the method requires the requiring user terminal or the supplying user terminal to have a positioning function and be used after the authorization of a user. The specific manner of determining the login location is not particularly limited in the embodiment of the present application, and may be selected by a person skilled in the relevant arts.
Step S2302: and acquiring adjacent idle time lengths corresponding to each adjacent supply storage space, and matching each adjacent idle time length with the storage time length corresponding to the data to be stored to obtain a time length matching value corresponding to each adjacent supply storage space.
Specifically, the adjacent idle time length is too long or too short, and the corresponding time length matching values are low, for example, the storage time length corresponding to the data to be stored is 5 days, the adjacent idle time length is 1 day, and the time length matching values corresponding to the adjacent idle time length is 9 days are consistent. When the time length matching value corresponding to each adjacent storage space is determined, the interval time length between the adjacent idle time length and the storage time length can be determined first, then the time length matching value corresponding to each adjacent storage space is determined according to the corresponding relation between the interval time length and the first matching value, and the corresponding relation between the interval time length and the first matching value can be that when the interval time length is lower than 2 days, the corresponding first matching value is 100%; for intervals longer than 2 days, and shorter than 5 days, the corresponding first matching value is 80%; when the interval is longer than 5 days and shorter than 10 days, the corresponding first matching value is 60%; when the interval time length is longer than 10 days, the corresponding first matching value is 40%, and the specific corresponding relation between the interval time length and the first matching value is not particularly limited in the embodiment of the application, and can be modified and set by related technicians.
Step S2303: and acquiring adjacent storage security levels corresponding to each adjacent supply storage space, and matching each adjacent storage security level with the storage security level corresponding to the data to be stored to obtain a security level matching value corresponding to each adjacent storage space.
Specifically, the adjacent storage security level is a storage security level corresponding to the adjacent supply user terminal, and the manner of determining the storage security level corresponding to the adjacent supply user terminal may refer to the embodiment corresponding to step S210 described above, which is not described herein. When the adjacent storage security level is matched with the storage security level corresponding to the data to be stored, the security level difference value between the two can be determined first, and then the security level matching value corresponding to each adjacent storage space is determined according to the security level difference value and the security level corresponding relation, wherein the security level corresponding relation is the corresponding relation between the level difference value and the level matching value, for example, in the corresponding relation between the level difference value and the level matching value, the security level matching value corresponding to the first level difference value is 80%, the security level matching value corresponding to the second level difference value is 60%, the security level matching value corresponding to the third level difference value is 40%, and if the storage security level corresponding to the data to be stored is the third security level, the adjacent storage security level corresponding to the first adjacent storage space is the first security level, the adjacent storage security level corresponding to the second adjacent storage space is the second security level, then the security level matching value corresponding to the first adjacent storage space is 60%, and the corresponding relation between the level difference value and the level matching value is 80%, which is not limited by the specific personnel in the embodiment of the application.
Step S2304: and determining the matching value corresponding to each adjacent supply storage space according to the duration matching value and the security level matching value corresponding to each adjacent supply storage space.
Specifically, the duration matching value and the security level matching value corresponding to each adjacent supply storage space are added to obtain the matching value corresponding to each adjacent supply storage space. The destination adjacent storage space of the data to be stored is selected through the sending address, so that the length of a transmission path of the data to be stored is reduced, the probability of data loss of the data to be stored in the transmission process is reduced, and finally, the target storage space is selected from the adjacent supply storage spaces through feature matching, so that the accuracy in determining the target storage space is improved.
Step S240: and determining the supply storage space with the highest matching value as a target storage space of the data to be stored.
Specifically, after determining the matching value corresponding to each supply storage space, the highest matching value may be determined after all the supply storage spaces are sorted according to the bubbling sorting method, or the matching values of all the supply storage spaces may be traversed and compared with the maximum matching value recorded currently, if a larger matching value is found, the maximum matching value is updated, and the specific manner of determining the maximum matching value is not specifically limited in the embodiment of the present application, as long as the target storage space with the highest matching value can be determined from a plurality of supply storage spaces.
For the embodiment of the application, the target storage space is determined together through the demand quantity, the storage duration and the storage security level of the data to be stored, instead of randomly selecting the target storage space according to the storage data quantity, the matching degree of the target storage space and the data to be stored is conveniently improved and determined by increasing the selection condition, and the free storage space is provided by the supply user terminal, namely, the data to be stored is finally stored in the free storage space in the supply user terminal, instead of directly storing the data to be stored in the cloud space, and the cloud space is often used as an attack target, so that the storage of the data to be stored in the free storage space in the supply user terminal is convenient for improving the security of the data to be stored in the storage process.
Further, in order to facilitate the relevant technicians to more intuitively understand the resource usage situation of each supply storage space, the method provided by the embodiment of the application further includes:
acquiring the storage residual quantity of each supply storage space, and generating a supply storage chain based on each storage residual quantity, wherein the supply storage chain comprises a plurality of nodes, and each node corresponds to one supply storage space; acquiring the use information of each supply storage space in the supply storage chain in real time, wherein the use information is the time and the data volume of writing data into or taking out data from the supply storage space; and updating the supply storage chain according to the use information of each supply storage space, and feeding back the updated supply storage chain.
Specifically, the storage remaining amount of each of the supply storage spaces is a free capacity of the supply storage spaces, and since the data processing operation corresponding to each of the supply storage spaces at different times is different, data may be written or data may be released, and thus the storage remaining amount of each of the supply storage spaces may change with time. The adjacent nodes in the supply storage chain have no upper-lower corresponding relation, can be ordered according to the time when different supply user terminals provide idle storage space for the electronic equipment, can also be randomly ordered, and is not limited in the embodiment of the application. Typically, one feed user terminal corresponds to one feed storage space, and thus, each node in the feed storage chain corresponds to one feed user terminal.
The usage information of the supply storage space may be recorded by a log corresponding to the supply terminal device and uploaded to the electronic device, or the electronic device may directly record the time and the data amount of writing data or taking out data corresponding to the supply terminal device, which is not particularly limited in the embodiment of the present application. The supply memory chain is updated according to the usage information of each supply memory space, that is, the storage remaining amount of the corresponding supply memory space in the supply memory chain is updated according to the time of writing data or taking out data of each supply memory space and the data amount, and the supply memory chain may be updated in real time or periodically, for example, may be updated every 20 hours, and the specific updating mode is not particularly limited in the implementation of the present application.
When the updated supply storage chain is fed back, the updated supply storage chain can be directly fed back to a display interface of the electronic equipment, and the storage residual quantity corresponding to each node in the updated supply storage chain can be fed back after being tidied in a text description mode, and the specific feedback mode is not particularly limited in the embodiment of the application, so long as the application can be conveniently referred to by related technicians.
Further, in order to reduce the packet loss in the data storage process, the method provided by the embodiment of the application further comprises the following steps:
acquiring the borrowing information corresponding to each node, and generating a borrowing list according to the borrowing information corresponding to each node, wherein the borrowing information is used for representing the borrowing time period and the borrowing space of each supply storage space; the inventory of each node is added to the supply chain.
Specifically, if different data to be stored are written into the same supply storage space at the same time, the data may be written abnormally due to the writing conflict, so that the data is lost or covered in the writing process, and the use condition of the supply storage space corresponding to each node is more intuitively shown by generating a borrowing list, as shown in fig. 4, each borrowing list further comprises a corresponding use state besides the storage residual quantity of the supply storage space, wherein the supply storage space can be determined to be in a writing state or an idle state according to the borrowing time period. When the borrowing time period comprises the current time, the working state corresponding to the borrowing time period is represented as a writing state; and when the borrowing time period does not contain the current time, representing that the working state corresponding to the borrowing time period is an idle state.
The lending condition of each node is added in the supply storage chain, and the balance condition is displayed in the supply storage chain in the form of an information list, so that relevant staff can more intuitively check the lending condition of each supply storage space, and can check whether conflict lending exists or not through the lending information, and the situation of packet loss in the data storage process can be reduced through reduction of storage conflicts.
Further, when the number of the initially supplied storage spaces is 0, it may be necessary to write the data to be stored in a manner of merging the supplied storage spaces, and in order to facilitate the improvement of the security when the data to be stored is written into the merged storage spaces, the method provided by the embodiment of the present application further includes:
when the target storage space does not exist, sequencing the plurality of the supply storage spaces according to the matching value corresponding to each supply storage space to obtain a supply sequence; determining at least one combined storage space according to the supply sequence, wherein the number of the supply storage spaces contained in each combined storage space is not higher than the number of the preset spaces; acquiring a historical communication record of each supply storage space in the supply sequence, and determining the corresponding credibility of each combined storage space according to the historical communication record of each supply storage space; and determining the combined storage space with the reliability higher than the preset reliability as a target combined storage space, and determining the target combined storage space as a target storage space of the data to be stored.
Specifically, when determining the supply sequence according to the matching value corresponding to each supply storage space, the specific ordering manner may be not specifically limited in the embodiment of the present application, as long as the supply sequence can be obtained, when using the bubbling ordering, an initial sequence may be randomly generated first, then the matching values corresponding to two adjacent supply storage spaces in the initial sequence may be compared, if the order is not right, the positions are exchanged, and the process is repeated until the whole initial sequence is ordered.
When determining the merging storage space, selecting according to the sequence from small to large of the matching value, for example, the feeding sequence contains 5 feeding storage spaces, namely A, B, C, D and E, wherein the merging storage space can be AB, AC, AD, ABC, the number of preset spaces can be 3 or 4, when the number of preset spaces is 3, the maximum of 3 feeding storage spaces can be represented in the merging storage space, and the number of the feeding storage spaces in the merging storage space is limited due to the fact that data can be lost in the writing process, so that the data writing times are reduced, and the integrity of the data is improved conveniently.
The history communication record of the supply storage space is a record that the supply user terminal corresponding to the supply storage space communicates with other supply user terminals in a history period, and the history period may be one week in the past or one month in the past, and is not particularly limited in the embodiment of the present application, and may be set by a related technician. The more the number of historical communications corresponding to two supply user terminals in the historical time period, the higher the credibility between the two supply user terminals is represented, when the credibility between the two supply user terminals is determined, the determination can be performed according to the corresponding relation between the number of communications and the credibility, for example, when the number of communications in the historical time period is less than 5 times, the corresponding credibility is 20%; when the communication times in the historical time period are 5-10, the corresponding reliability is 30%; when the number of communications in the historical time period is more than 10, the corresponding reliability is 50%, and the correspondence between the number of communications and the reliability is not particularly limited in the embodiment of the present application, and may be set by a related technician. The preset credibility may be 85% or 90%, and the specific preset credibility is not specifically limited in the embodiment of the present application, and whether different supply storage spaces can be combined or not is determined by the credibility between the supply storage spaces in the combined storage space, so that the security when the data to be stored is written into the combined storage space is improved conveniently.
Further, in order to facilitate improving data integrity, the method provided by the embodiment of the application further includes:
when the supply user terminal corresponding to the target storage space is abnormally powered off, determining a borrowing terminal corresponding to the abnormally supplied user terminal according to the supply storage chain, wherein the borrowing terminal is a demand user terminal for writing data to be stored into the target storage space corresponding to the abnormally supplied user terminal; acquiring a storage state of each borrowing terminal, wherein the storage state comprises storage and storage completion; pushing a data verification instruction to the borrowing and storing terminal with the storage state being stored so as to remind relevant staff to verify the data which is abnormally written and supplied to the user terminal.
Specifically, when the supply user terminal corresponding to the target storage space fails abnormally, the data to be stored in the target storage space may be lost, and at this time, the user terminal needs to be reminded of relevant requirements to detect the integrity of the data to be stored in the target storage space. Different requiring user terminals can write data to be stored in the free storage space provided by the same supplying user terminal, for example, the supplying user terminal A provides 50% of solid state disk capacity, at this time, the requiring user terminal A and the requiring user terminal B both write data to be stored to the supplying user terminal A at different moments, the requiring user terminal A and the requiring user terminal B are borrowing terminals of the supplying user terminal A, and the number of the requiring user terminals in the borrowing terminals may be one or multiple.
When the storage state of each borrowing terminal is determined, the corresponding writing data quantity of each borrowing terminal can be determined through the work log of the electronic equipment, and if the writing data quantity is consistent with the storage demand quantity of the corresponding data to be stored, the storage state of the borrowing terminal is characterized as storage completion; and if the written data quantity is lower than the storage demand quantity of the corresponding data to be stored, characterizing that the storage state of the borrowing and storing terminal is in storage. When a data verification instruction is pushed to the borrowing terminal in a storage state, the communication address of each borrowing terminal can be acquired first, then pushing is carried out based on the communication address of each borrowing terminal, and related technicians are conveniently reminded of verifying data which possibly have abnormality through the data verification instruction, so that the probability of losing the data due to abnormal power failure is reduced.
The above embodiments introduce a method for sharing capacity of a solid state disk from a method flow, and the following embodiments introduce a device for sharing capacity of a solid state disk from a virtual module or a virtual unit, which are specifically described in the following embodiments.
The embodiment of the application provides a solid state disk capacity sharing device, as shown in fig. 5, which specifically may include a module 510 for obtaining requirement information, a module 520 for determining storage security level, a module 530 for determining matching value, and a module 540 for determining target storage space, wherein:
The storage requirement information obtaining module 510 is configured to obtain storage requirement information, where the storage requirement information includes a storage requirement amount and a storage duration of data to be stored, and the storage requirement amount and the storage duration are sent by a requirement user terminal;
the storage security level determining module 520 is configured to identify a data identifier of data to be stored in the storage requirement information, and determine a storage security level of the data to be stored according to the data identifier;
a match value determining module 530, configured to obtain a sending address of the storage requirement information, and match the sending address, the storage requirement information, and the storage security level with feature values corresponding to a plurality of supply storage spaces, to obtain a match value corresponding to each supply storage space, where the supply storage space is provided by a supply user terminal that includes an idle storage space;
the target storage space determining module 540 is configured to determine a supply storage space with the highest matching value as a target storage space of data to be stored.
In one possible implementation, the match value determining module 530 is specifically configured to, when determining the provisioning storage space:
acquiring supply information sent by each supply user terminal, wherein each supply information comprises a time period to be supplied and a space to be supplied;
Determining supply information of which the time period to be supplied is not less than a preset time period and the space to be supplied is not less than a preset space as initial supply information, and determining a storage space corresponding to the initial supply information as initial supply storage space;
obtaining the corresponding access attack times and fault rates of each initial supply storage space in a preset time period, and determining the credit level of each initial supply storage space according to the access attack times and the fault rates;
the offer storage space is determined based on the reputation level of each initial offer storage space.
In one possible implementation manner, the matching value determining module 530 is specifically configured to, when matching the feature values corresponding to the plurality of supply storage spaces according to the sending address, the storage requirement information, and the storage security level, obtain a matching value corresponding to each supply storage space:
selecting at least one adjacent supply storage space from the plurality of supply storage spaces according to the transmission address;
acquiring adjacent idle time lengths corresponding to each adjacent supply storage space, and matching each adjacent idle time length with a storage time length corresponding to data to be stored to obtain a time length matching value corresponding to each adjacent supply storage space;
Acquiring adjacent storage security levels corresponding to each adjacent storage space, and matching each adjacent storage security level with the storage security level corresponding to the data to be stored to obtain a security level matching value corresponding to each adjacent storage space;
and determining the matching value corresponding to each adjacent supply storage space according to the duration matching value and the security level matching value corresponding to each adjacent supply storage space.
In one possible implementation, the apparatus further includes:
the system comprises a supply storage chain generation module, a storage chain generation module and a storage chain generation module, wherein the supply storage chain generation module is used for acquiring the storage residual quantity of each supply storage space and generating a supply storage chain based on each storage residual quantity, the supply storage chain comprises a plurality of nodes, and each node corresponds to one supply storage space;
the real-time information acquisition module is used for acquiring the use information of each supply storage space in the supply storage chain in real time, wherein the use information is the time and the data volume of writing data into or taking out data from the supply storage space;
and the updating storage chain module is used for updating the supply storage chain according to the use information of each supply storage space and feeding back the updated supply storage chain.
In one possible implementation, the apparatus further includes:
The storage list generation module is used for acquiring storage information corresponding to each node, generating a storage list according to the storage information corresponding to each node, and the storage information is used for representing the storage time period and the storage space of each supply storage space;
and the adding list module is used for adding the lending list of each node to the supply storage chain.
In one possible implementation, the apparatus further includes:
the supply sequence determining module is used for sequencing the plurality of supply storage spaces according to the matching value corresponding to each supply storage space when the target storage space does not exist, so as to obtain a supply sequence;
the combined storage space determining module is used for determining at least one combined storage space according to the supply sequence, wherein the number of the supply storage spaces contained in each combined storage space is not higher than the number of the preset spaces;
the credibility determining module is used for acquiring the historical communication record of each supply storage space in the supply sequence and determining the credibility corresponding to each combined storage space according to the historical communication record of each supply storage space;
and the target merging storage space determining module is used for determining the merging storage space with the reliability higher than the preset reliability as a target merging storage space and determining the target merging storage space as a target storage space of data to be stored.
In one possible implementation, the apparatus further includes:
the abnormal borrowing terminal module is used for determining a borrowing terminal corresponding to the abnormal supply user terminal according to the supply storage chain when the supply user terminal corresponding to the target storage space is abnormally powered off, wherein the borrowing terminal is a demand user terminal for writing data to be stored into the target storage space corresponding to the abnormal supply user terminal;
the storage state acquisition module is used for acquiring the storage state of each borrowing terminal, wherein the storage state comprises the storage state and the storage completion;
the pushing module is used for pushing a data verification instruction to the borrowing and storing terminal with the storage state being in storage so as to remind relevant staff of verifying the data which is abnormally written and supplied to the user terminal.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the solid state disk capacity sharing device described above may refer to the corresponding process in the foregoing method embodiment, and will not be described herein again.
In an embodiment of the present application, as shown in fig. 6, an electronic device 600 shown in fig. 6 includes: a processor 601 and a memory 603. The processor 601 is coupled to a memory 603, such as via a bus 602. Optionally, the electronic device 600 may also include a transceiver 604. It should be noted that, in practical applications, the transceiver 604 is not limited to one, and the structure of the electronic device 600 is not limited to the embodiment of the present application.
The processor 601 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmable Gate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. The processor 601 may also be a combination that performs computing functions, such as including one or more microprocessors, a combination of a DSP and a microprocessor, and the like.
Bus 602 may include a path to transfer information between the components. Bus 602 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect Standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. The bus 602 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 6, but not only one bus or one type of bus.
The Memory 603 may be, but is not limited to, ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, EEPROM (Electrically Erasable Programmable Read Only Memory ), CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 603 is used for storing application program codes for executing the inventive arrangements and is controlled to be executed by the processor 601. The processor 601 is arranged to execute application code stored in the memory 603 for implementing what is shown in the foregoing method embodiments.
Among them, electronic devices include, but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. But may also be a server or the like. The electronic device shown in fig. 6 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the application.
Embodiments of the present application provide a computer-readable storage medium having a computer program stored thereon, which when run on a computer, causes the computer to perform the corresponding method embodiments described above.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present application, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations are intended to be comprehended within the scope of the present application.

Claims (10)

CN202311172022.1A2023-09-122023-09-12Solid state disk capacity sharing method and device, electronic equipment and mediumPendingCN117130563A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202311172022.1ACN117130563A (en)2023-09-122023-09-12Solid state disk capacity sharing method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202311172022.1ACN117130563A (en)2023-09-122023-09-12Solid state disk capacity sharing method and device, electronic equipment and medium

Publications (1)

Publication NumberPublication Date
CN117130563Atrue CN117130563A (en)2023-11-28

Family

ID=88859916

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202311172022.1APendingCN117130563A (en)2023-09-122023-09-12Solid state disk capacity sharing method and device, electronic equipment and medium

Country Status (1)

CountryLink
CN (1)CN117130563A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN119806392A (en)*2024-11-262025-04-11天翼云科技有限公司 Distributed object storage demand assessment method, device, electronic device, storage medium and program product

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN119806392A (en)*2024-11-262025-04-11天翼云科技有限公司 Distributed object storage demand assessment method, device, electronic device, storage medium and program product

Similar Documents

PublicationPublication DateTitle
CN110113393B (en)Message pushing method and device, electronic equipment and medium
US20100312749A1 (en)Scalable lookup service for distributed database
CN112819617B (en)Data uplink method and device, electronic equipment and storage medium
CN111523890A (en)Data processing method and device based on block chain, storage medium and equipment
CN113364753A (en)Anti-crawler method and device, electronic equipment and computer readable storage medium
CN106033461A (en)Sensitive information query method and apparatus
CN108366012B (en)Social relationship establishing method and device and electronic equipment
CN108399175A (en)A kind of storage of data, querying method and its device
CN103490978A (en)Terminal, server and message monitoring method
CN117130563A (en)Solid state disk capacity sharing method and device, electronic equipment and medium
US20170103219A1 (en)Restricting network spidering
CN116842012A (en)Method, device, equipment and storage medium for storing Redis cluster in fragments
CN108810947A (en)The IP address-based server for differentiating real traffic
CN107797758A (en)Date storage method, data access method and device
CN114070847B (en)Method, device, equipment and storage medium for limiting current of server
CN108886631B (en)Electronic data inspection system, electronic data inspection method, and storage medium
CN106469166A (en)A kind of information processing method and device
CN116016144A (en)Fault identification method and device based on block chain and big data
CN113449196B (en)Information generation method and device, electronic equipment and readable storage medium
CN110866380A (en) A method and terminal for filling in content of information field
CN104239307A (en) User information storage method and system
CN112491939B (en)Multimedia resource scheduling method and system
CN110209666B (en)data storage method and terminal equipment
CN114090588A (en) Blockchain presence verification method, device, computer equipment and storage medium
CN113110973B (en)Host log association and prediction method and device, electronic equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp