Invalidating cached data using secondary keys
First Claim
1. A method of using a secondary key to facilitate invalidation of cached data, comprising:
- at a first data source;
associating a URL (Uniform Resource Locator) with a first data object;
forwarding the first data object to a cache, along with;
a primary key comprising the URL; and
a secondary key configured to identify the first data source;
caching the first data object at the cache;
issuing an invalidation message from the first data source to the cache, wherein said invalidation message comprises the identifier; and
at the cache, using the identifier to identify one or more data objects for invalidation, including the first data object.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for facilitating the invalidation of cached data, in which the data to be invalidated are identified using information other than a primary key. The primary key for a cached data object, such as a web page, may be a Uniform Resource Locator (URL). Instead of using an object'"'"'s URL to identify to a cache the data to be invalidated, a secondary key is used, such as the object'"'"'s data source or a template from which the object was created. An application communicates the secondary key to a cache, and the cache identifies cached objects that match the secondary key. Those data objects are then invalidated without having to issue multiple invalidation messages from the application.
129 Citations
32 Claims
-
1. A method of using a secondary key to facilitate invalidation of cached data, comprising:
-
at a first data source;
associating a URL (Uniform Resource Locator) with a first data object;
forwarding the first data object to a cache, along with;
a primary key comprising the URL; and
a secondary key configured to identify the first data source;
caching the first data object at the cache;
issuing an invalidation message from the first data source to the cache, wherein said invalidation message comprises the identifier; and
at the cache, using the identifier to identify one or more data objects for invalidation, including the first data object. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer readable medium storing instructions that, when executed by a computer, cause the computer to perform a method of using a secondary key to facilitate invalidation of cached data,- the method comprising:
-
at a first data source;
associating a URL (Uniform Resource Locator) with a first data object;
forwarding the first data object to a cache, along with;
a primary key comprising the URL; and
a secondary key configured to identify the first data source;
caching the first data object at the cache;
issuing an invalidation message from the first data source to the cache, wherein said invalidation message comprises the identifier; and
at the cache, using the identifier to identify one or more data objects for invalidation, including the first data object.
-
-
7. A computer-implemented method of facilitating invalidation of cached data using a secondary key, the method comprising:
-
at an application configured to produce cacheable data objects, associating with a first data object;
a first primary key configured to uniquely identify the first data object within a collection of computer systems; and
a first secondary key configured to identify multiple data objects having a common attribute;
when the first data object is provided to a cache to be cached, providing said first secondary key; and
issuing an invalidation message from the application to the cache to invalidate the multiple data objects, wherein the invalidation message includes said first secondary key. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable medium storing instructions that, when executed by a computer, cause the computer to perform a method of facilitating invalidation of cached data using a secondary key, the method comprising:
-
at an application configured to produce cacheable data objects, associating with a first data object;
a first primary key configured to uniquely identify the first data object within a collection of computer systems; and
a first secondary key configured to identify multiple data objects having a common attribute;
when the first data object is provided to a cache to be cached, providing said first secondary key; and
issuing an invalidation message from the application to the cache to invalidate the multiple data objects, wherein the invalidation message includes said first secondary key.
-
-
20. A computer-implemented method of facilitating invalidation of cached data using a secondary key, the method comprising:
-
receiving at a cache a first data object to be cached, wherein the first data object is accompanied by;
a first primary key configured to uniquely identify the first data object within a network; and
a first secondary key comprising information common to multiple data objects in the network, including the first data object;
maintaining at the cache a mapping between said first secondary key and primary keys of the multiple data objects; and
in response to receipt at the cache of an invalidation message identifying said first secondary key;
identifying the primary keys of the multiple data objects; and
invalidating the multiple data objects. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer readable medium storing instructions that, when executed by a computer, cause the computer to perform a method of facilitating invalidation of cached data using a secondary key, the method comprising:
-
receiving at a cache a first data object to be cached, wherein the first data object is accompanied by;
a first primary key configured to uniquely identify the first data object within a network; and
a first secondary key comprising information common to multiple data objects in the network, including the first data object;
maintaining at the cache a mapping between said first secondary key and primary keys of the multiple data objects; and
in response to receipt at the cache of an invalidation message identifying said first secondary key;
identifying the primary keys of the multiple data objects; and
invalidating the multiple data objects.
-
-
29. A system for facilitating invalidation of cached data objects, comprising:
-
a first cache configured to cache data objects for serving to clients; and
a data source, coupled to the first cache via a network, wherein the data source is configured to;
produce data objects for caching in the cache;
associate with each data object a primary key configured to uniquely identify the data object within the network;
associate with each data object a secondary key, wherein each secondary key is associated with a set of data objects having a common attribute; and
issue to the cache an invalidation message comprising a first secondary key to facilitate the invalidation of a first set of data objects. - View Dependent Claims (30, 31, 32)
-
Specification