CN102096614A - Data restoration method of application system - Google Patents

Data restoration method of application system Download PDF

Info

Publication number
CN102096614A
CN102096614A CN 201110025862 CN201110025862A CN102096614A CN 102096614 A CN102096614 A CN 102096614A CN 201110025862 CN201110025862 CN 201110025862 CN 201110025862 A CN201110025862 A CN 201110025862A CN 102096614 A CN102096614 A CN 102096614A
Authority
CN
China
Prior art keywords
data
deletion
database table
record
name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110025862
Other languages
Chinese (zh)
Inventor
严洪涛
沈亦可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI YINXINGJIE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI YINXINGJIE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI YINXINGJIE INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI YINXINGJIE INFORMATION TECHNOLOGY Co Ltd
Priority to CN 201110025862 priority Critical patent/CN102096614A/en
Publication of CN102096614A publication Critical patent/CN102096614A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a data restoration method, and in particular relates to a data restoration method of an application system. The data restoration method of the application system comprises a data deleting step and a data restoration step. The data deleting step comprises: (1) selecting data, and carrying out data deleting operation by a user; (2) acquiring the information of the data to be deleted; (3) deleting the target data to be deleted from a database list; and (4) recording a data deleting log in the database list. The data restoration step comprises: looking for the target data to be restored in the recycle bin by a system manager; analyzing the data from a value corresponding to the field in which the name and the value of all of sheet fields are recorded in the recycle bin list, and restoring the data to a record of a database list of which the name filed value is the list name; inserting the record in the list; and deleting the record in the recycle bin list. The data restoration method of the application system can properly restore the data that are deleted abnormally so as to obviate the data loss caused by error deleting.

Description

The reduction of data method of application system
Technical field
The present invention relates to a kind of reduction of data method, particularly a kind of reduction of data method of application system.
Background technology
More and more enterprises begins to carry out the informatization of enterprise at present, development and utilization by information resources, improve constantly the efficient and the level of production, operation, management, decision-making, and then improving the effectiveness of operation and the Enterprises'Competitiveness of enterprise, IT application in enterprises comprises the informationization of product design, the informationization of production run, informationization, operation and management informationization and the decision informationization that products ﹠ services are sold.
Based on the high request of enterprise-level application, ensureing that secure data area service provider can provide usually: data timed backup, disaster-tolerant backup to data safety; Technology such as transmission encryption technology SSL, server numeral safety certificate ensure client's data security.
But, present enterprise application system, for because maloperation, the data of improper deletions such as malice deletion, system can handle by normal deleted data, and improper deleted data can't properly recover, can bring unavoidable loss to enterprise, so aspect the guarantee data security, how properly to recover the data of improper deletion, become problem demanding prompt solution.
Summary of the invention
The object of the present invention is to provide a kind of method of reducing of application system data, can properly recover the data of improper deletion, the loss of avoiding the data mistake to delete.
A kind of reduction of data method of application system comprises data deletion step and reduction of data step, and described data deletion step comprises:
The first step, the user-selected number certificate is carried out deletion data operation.
In second step, obtain the information of wanting deleted data.Information comprises the database table under the data, and each the literary name section of the database table of data correspondence and the value of each literary name section correspondence are packaged in the recycle bin database table.Described recycle bin database table also comprises " major key ID ", " deletion person ", " deletion time ", " database table name " four fields.
In the 3rd step, will delete target data and from database table, delete.
In the 4th step, record data deletion day aims in the database table.
Described reduction of data step comprises:
The first step, the system manager enters recycle bin, according to " the deletion person " of recycle bin table, " deletion time ", and " database table name " field, the binding operation daily record finds the target data that will reduce.
Second step, the corresponding value resolution data of depositing from all the literary name name sections of recycle bin table record and value packing of field, being reduced into database table name segment value is a record of the database table of table name, inserts this record toward this table, deletes the record in the recycle bin table simultaneously.
Described data deletion step also comprises the authority determining step, and described authority determining step carries out after the deletion data operation in the user-selected number certificate,
Have erase right then carry out next step if judge the user,, and stop if do not have authority then notify lack of competence.
The present invention has following beneficial effect: application system reduction of data method of the present invention, can properly recover the data of improper deletion, the loss of avoiding the data mistake to delete.Adopt technical solution of the present invention, data deletion all has vestige to seek, and improper deleted data can recover from recycle bin, has better guaranteed the security of business data.
Description of drawings
The invention will be further described below in conjunction with the drawings and specific embodiments.
The reduction of data method schematic diagram of Fig. 1 application system of the present invention
The process flow diagram of the reduction of data method data deletion step of Fig. 2 application system of the present invention.
The process flow diagram of the reduction of data method reduction of data step of Fig. 3 application system of the present invention
Embodiment
As shown in Figure 1, the reduction of data method of application system comprises data deletion step and reduction of data step.
As Fig. 2, the data deletion step comprises:
S3-1: the user-selected number certificate, carry out deletion data operation.Essence is to select a database table, one or more data-base recording in the delete list.
S3-2: carry out authority and judge, if the data deletion authority is arranged, execution in step S3-3 then; Otherwise execution in step S3-4.
S3-3: data deletion is divided into S3-3-1, S3-3-2, three steps of S3-3-3.
S3-3-1: obtain the information of wanting deleted data.Information comprises database table, each literary name section of the database table of data correspondence and the value of each literary name section correspondence under the data.Deposit in the recycle bin database table (Trash).
The design of Trash table is as shown in table 1 below: the database table name at the target data place of deleting leaves the tablename field of Trash table in, all the literary name sections of target data and the value of literary name section are with " literary name name section "=" literary name segment value ", and between each field with "; " separate, be packaged in the datainfo field that deposits the Trash table together in.Deletion person (oper), the deletion time (date) is storage simultaneously also.
Table 1 data recycle bin database table (Trash)
Figure BSA00000425334900031
S3-3-2: will delete target data and from database table, delete.
S3-3-3: record data deletion day aims in the database table (Loginfo), for reduction of data provides certain foundation.
S3-4: provide the prompting that does not have erase right.
S3-5: data deletion EO.
As Fig. 3, the reduction of data step comprises:
S4-1: by the system manager, enter recycle bin, according to " the deletion person " of recycle bin (Trash) table, " deletion date ", and fields such as " delete lists ", the binding operation daily record finds the target data that will reduce.
S4-2: from the value resolution data of the datainfo field correspondence of recycle bin (Trash) table record, being reduced into the tablename field value is a record of the database table of table name, inserts this record toward this table, deletes the record in the recycle bin table (Trash) simultaneously.
S4-3: reduction of data success
The data deletion step: mainly be responsible for the data deletion operation of process user, the target data that the deletion user selects, the record deletion daily record, and a data message of deletion is packaged in the recycle bin.
Reduction of data step: mainly be the restoring operation that the system manager handles improper deleted data, from recycle bin, find the data of improper deletion to reduce.
In sum, by adopting technical solution of the present invention, data deletion all has vestige to seek, and improper deleted data can recover from recycle bin, has better guaranteed the security of business data.

Claims (2)

1. the reduction of data method of an application system comprises data deletion step and reduction of data step, it is characterized in that, described data deletion step comprises,
The first step, the user-selected number certificate is carried out deletion data operation;
Second step, obtain the information of wanting deleted data, database table under the data, each the literary name section of the database table of data correspondence and the value of each literary name section correspondence are packaged in the recycle bin database table, described recycle bin database table also comprises " major key ID ", " deletion person ", " deletion time ", " database table name " four fields;
In the 3rd step, will delete target data and from database table, delete;
In the 4th step, record data deletion day aims in the database table;
Described reduction of data step comprises,
The first step, the system manager enters recycle bin, according to " the deletion person " of recycle bin table, " deletion time ", and " database table name " field, the binding operation daily record finds the target data that will reduce;
Second step, the corresponding value resolution data of depositing from all the literary name name sections of recycle bin table record and value packing of field, being reduced into database table name segment value is a record of the database table of table name, inserts this record toward this table, deletes the record in the recycle bin table simultaneously.
2. the reduction of data method of application system as claimed in claim 1 is characterized in that, described data deletion step also comprises the authority determining step, and described authority determining step carries out after the deletion data operation in the user-selected number certificate,
Have erase right then carry out next step if judge the user,, and stop if do not have authority then notify lack of competence.
CN 201110025862 2011-01-24 2011-01-24 Data restoration method of application system Pending CN102096614A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110025862 CN102096614A (en) 2011-01-24 2011-01-24 Data restoration method of application system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110025862 CN102096614A (en) 2011-01-24 2011-01-24 Data restoration method of application system

Publications (1)

Publication Number Publication Date
CN102096614A true CN102096614A (en) 2011-06-15

Family

ID=44129718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110025862 Pending CN102096614A (en) 2011-01-24 2011-01-24 Data restoration method of application system

Country Status (1)

Country Link
CN (1) CN102096614A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360476A (en) * 2011-10-28 2012-02-22 中国舰船研究设计中心 Method for synchronously processing cascade secret-level setting information
CN103019891A (en) * 2012-12-24 2013-04-03 珠海金山办公软件有限公司 Method and system for restoring deleted file
CN103164514A (en) * 2013-02-25 2013-06-19 用友软件股份有限公司 Detection device and detection method for data reference relationship
CN104423957A (en) * 2013-09-07 2015-03-18 镇江金软计算机科技有限责任公司 Portal website information recycling and recovery method based on B/S (Browser/System) structure
CN105868057A (en) * 2016-06-20 2016-08-17 珠海市魅族科技有限公司 Data processing method and device as well as mobile terminal
CN106599115A (en) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 Data protection method and device and terminal
CN103942126B (en) * 2014-05-12 2018-07-06 联想(北京)有限公司 Electronic equipment and its data back up method
CN109063070A (en) * 2018-07-23 2018-12-21 郑州云海信息技术有限公司 A kind of operating method and database server of database
CN109241001A (en) * 2018-08-30 2019-01-18 新华三大数据技术有限公司 Data processing method and device
CN110597781A (en) * 2019-08-09 2019-12-20 北京人大金仓信息技术股份有限公司 Flashback deletion method and system for database
CN110781036A (en) * 2019-10-31 2020-02-11 北京东软望海科技有限公司 Data recovery method and device, computer equipment and storage medium
CN112631576A (en) * 2020-12-31 2021-04-09 杭州天宽科技有限公司 Java universal code generation optimization method and system
CN112632043A (en) * 2021-01-26 2021-04-09 浙江争游网络科技有限公司 Data warehouse optimization method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212687A1 (en) * 2002-05-07 2003-11-13 Gonos Dan G. Data archive recovery
US20050165863A1 (en) * 2004-01-23 2005-07-28 Atul Mukker File recovery under Linux operating system
CN101004703A (en) * 2006-12-22 2007-07-25 清华大学 Fast restore method for computer system
CN101341480A (en) * 2005-12-20 2009-01-07 微软公司 Web site multi-stage recycling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030212687A1 (en) * 2002-05-07 2003-11-13 Gonos Dan G. Data archive recovery
US20050165863A1 (en) * 2004-01-23 2005-07-28 Atul Mukker File recovery under Linux operating system
CN101341480A (en) * 2005-12-20 2009-01-07 微软公司 Web site multi-stage recycling
CN101004703A (en) * 2006-12-22 2007-07-25 清华大学 Fast restore method for computer system

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360476B (en) * 2011-10-28 2013-09-11 中国舰船研究设计中心 Method for synchronously processing cascade secret-level setting information
CN102360476A (en) * 2011-10-28 2012-02-22 中国舰船研究设计中心 Method for synchronously processing cascade secret-level setting information
CN103019891A (en) * 2012-12-24 2013-04-03 珠海金山办公软件有限公司 Method and system for restoring deleted file
CN103164514A (en) * 2013-02-25 2013-06-19 用友软件股份有限公司 Detection device and detection method for data reference relationship
CN104423957A (en) * 2013-09-07 2015-03-18 镇江金软计算机科技有限责任公司 Portal website information recycling and recovery method based on B/S (Browser/System) structure
CN103942126B (en) * 2014-05-12 2018-07-06 联想(北京)有限公司 Electronic equipment and its data back up method
CN105868057B (en) * 2016-06-20 2018-09-25 珠海市魅族科技有限公司 A kind of method, apparatus and mobile terminal of data processing
CN105868057A (en) * 2016-06-20 2016-08-17 珠海市魅族科技有限公司 Data processing method and device as well as mobile terminal
CN106599115A (en) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 Data protection method and device and terminal
CN106599115B (en) * 2016-11-30 2022-12-20 Oppo广东移动通信有限公司 Data protection method, device and terminal
CN109063070A (en) * 2018-07-23 2018-12-21 郑州云海信息技术有限公司 A kind of operating method and database server of database
CN109063070B (en) * 2018-07-23 2022-03-25 郑州云海信息技术有限公司 Database operation method and database server
CN109241001A (en) * 2018-08-30 2019-01-18 新华三大数据技术有限公司 Data processing method and device
CN110597781A (en) * 2019-08-09 2019-12-20 北京人大金仓信息技术股份有限公司 Flashback deletion method and system for database
CN110597781B (en) * 2019-08-09 2023-05-05 北京人大金仓信息技术股份有限公司 Flash deleting method and system for database
CN110781036A (en) * 2019-10-31 2020-02-11 北京东软望海科技有限公司 Data recovery method and device, computer equipment and storage medium
CN112631576A (en) * 2020-12-31 2021-04-09 杭州天宽科技有限公司 Java universal code generation optimization method and system
CN112631576B (en) * 2020-12-31 2022-09-27 杭州天宽科技有限公司 Java universal code generation optimization method and system
CN112632043A (en) * 2021-01-26 2021-04-09 浙江争游网络科技有限公司 Data warehouse optimization method and device

Similar Documents

Publication Publication Date Title
CN102096614A (en) Data restoration method of application system
CN110765337B (en) Service providing method based on internet big data
Yang et al. Privacy concerns in China's smart city campaign: The deficit of China's Cybersecurity Law
Chou et al. Collection and analysis of critical infrastructure interdependency relationships
CN102682024B (en) Method for recombining incomplete JPEG file fragmentation
CN110197085A (en) A kind of document tamper resistant method based on fabric alliance chain
CN102508833A (en) Data monitoring device and data monitoring method
CN112036995A (en) Large-scale enterprise financial data management method and system based on block chain and readable storage medium
US20150180747A1 (en) Determining Events by Analyzing Stored Electronic Communications
CN106528794A (en) Electronic document filing method based on archive management system
CN113032735A (en) Digital asset evidence and infringement monitoring system and method based on block chain technology
CN104636337A (en) Data cleaning storage method for added value tax
CN115859362A (en) Data storage system, method, device and medium based on block chain side chain
CN109544014A (en) Anti- fraud method and device based on historical data playback
CN107203713A (en) Verification code generation method and device
CN102750198B (en) A kind of backup method of social network sites content and system
CN104104724A (en) Method for pushing operating mode of client side and communication system
Foley Seasonal adjustment of Irish official statistics during the COVID-19 crisis
CN108777621A (en) A method of obtaining means of payment Alipay transaction record
Nugroho et al. Recommendations for improving data management process in government of bandung regency using COBIT 4.1 framework
Sokolov et al. Technique for improvement of backup and restore strategy based on blockchain
CN115114237A (en) Smart file big data platform system
CN113222430A (en) Water resource certification management system
CN111274323A (en) Intelligent automatic monitoring method based on periodicity
CN116668451B (en) Data storage method, equipment and medium for securities business

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110615