CN102096614A - Data restoration method of application system - Google Patents
Data restoration method of application system Download PDFInfo
- Publication number
- CN102096614A CN102096614A CN 201110025862 CN201110025862A CN102096614A CN 102096614 A CN102096614 A CN 102096614A CN 201110025862 CN201110025862 CN 201110025862 CN 201110025862 A CN201110025862 A CN 201110025862A CN 102096614 A CN102096614 A CN 102096614A
- Authority
- CN
- China
- Prior art keywords
- data
- deletion
- database table
- record
- name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to a data restoration method, and in particular relates to a data restoration method of an application system. The data restoration method of the application system comprises a data deleting step and a data restoration step. The data deleting step comprises: (1) selecting data, and carrying out data deleting operation by a user; (2) acquiring the information of the data to be deleted; (3) deleting the target data to be deleted from a database list; and (4) recording a data deleting log in the database list. The data restoration step comprises: looking for the target data to be restored in the recycle bin by a system manager; analyzing the data from a value corresponding to the field in which the name and the value of all of sheet fields are recorded in the recycle bin list, and restoring the data to a record of a database list of which the name filed value is the list name; inserting the record in the list; and deleting the record in the recycle bin list. The data restoration method of the application system can properly restore the data that are deleted abnormally so as to obviate the data loss caused by error deleting.
Description
Technical field
The present invention relates to a kind of reduction of data method, particularly a kind of reduction of data method of application system.
Background technology
More and more enterprises begins to carry out the informatization of enterprise at present, development and utilization by information resources, improve constantly the efficient and the level of production, operation, management, decision-making, and then improving the effectiveness of operation and the Enterprises'Competitiveness of enterprise, IT application in enterprises comprises the informationization of product design, the informationization of production run, informationization, operation and management informationization and the decision informationization that products ﹠ services are sold.
Based on the high request of enterprise-level application, ensureing that secure data area service provider can provide usually: data timed backup, disaster-tolerant backup to data safety; Technology such as transmission encryption technology SSL, server numeral safety certificate ensure client's data security.
But, present enterprise application system, for because maloperation, the data of improper deletions such as malice deletion, system can handle by normal deleted data, and improper deleted data can't properly recover, can bring unavoidable loss to enterprise, so aspect the guarantee data security, how properly to recover the data of improper deletion, become problem demanding prompt solution.
Summary of the invention
The object of the present invention is to provide a kind of method of reducing of application system data, can properly recover the data of improper deletion, the loss of avoiding the data mistake to delete.
A kind of reduction of data method of application system comprises data deletion step and reduction of data step, and described data deletion step comprises:
The first step, the user-selected number certificate is carried out deletion data operation.
In second step, obtain the information of wanting deleted data.Information comprises the database table under the data, and each the literary name section of the database table of data correspondence and the value of each literary name section correspondence are packaged in the recycle bin database table.Described recycle bin database table also comprises " major key ID ", " deletion person ", " deletion time ", " database table name " four fields.
In the 3rd step, will delete target data and from database table, delete.
In the 4th step, record data deletion day aims in the database table.
Described reduction of data step comprises:
The first step, the system manager enters recycle bin, according to " the deletion person " of recycle bin table, " deletion time ", and " database table name " field, the binding operation daily record finds the target data that will reduce.
Second step, the corresponding value resolution data of depositing from all the literary name name sections of recycle bin table record and value packing of field, being reduced into database table name segment value is a record of the database table of table name, inserts this record toward this table, deletes the record in the recycle bin table simultaneously.
Described data deletion step also comprises the authority determining step, and described authority determining step carries out after the deletion data operation in the user-selected number certificate,
Have erase right then carry out next step if judge the user,, and stop if do not have authority then notify lack of competence.
The present invention has following beneficial effect: application system reduction of data method of the present invention, can properly recover the data of improper deletion, the loss of avoiding the data mistake to delete.Adopt technical solution of the present invention, data deletion all has vestige to seek, and improper deleted data can recover from recycle bin, has better guaranteed the security of business data.
Description of drawings
The invention will be further described below in conjunction with the drawings and specific embodiments.
The reduction of data method schematic diagram of Fig. 1 application system of the present invention
The process flow diagram of the reduction of data method data deletion step of Fig. 2 application system of the present invention.
The process flow diagram of the reduction of data method reduction of data step of Fig. 3 application system of the present invention
Embodiment
As shown in Figure 1, the reduction of data method of application system comprises data deletion step and reduction of data step.
As Fig. 2, the data deletion step comprises:
S3-1: the user-selected number certificate, carry out deletion data operation.Essence is to select a database table, one or more data-base recording in the delete list.
S3-2: carry out authority and judge, if the data deletion authority is arranged, execution in step S3-3 then; Otherwise execution in step S3-4.
S3-3: data deletion is divided into S3-3-1, S3-3-2, three steps of S3-3-3.
S3-3-1: obtain the information of wanting deleted data.Information comprises database table, each literary name section of the database table of data correspondence and the value of each literary name section correspondence under the data.Deposit in the recycle bin database table (Trash).
The design of Trash table is as shown in table 1 below: the database table name at the target data place of deleting leaves the tablename field of Trash table in, all the literary name sections of target data and the value of literary name section are with " literary name name section "=" literary name segment value ", and between each field with "; " separate, be packaged in the datainfo field that deposits the Trash table together in.Deletion person (oper), the deletion time (date) is storage simultaneously also.
Table 1 data recycle bin database table (Trash)
S3-3-2: will delete target data and from database table, delete.
S3-3-3: record data deletion day aims in the database table (Loginfo), for reduction of data provides certain foundation.
S3-4: provide the prompting that does not have erase right.
S3-5: data deletion EO.
As Fig. 3, the reduction of data step comprises:
S4-1: by the system manager, enter recycle bin, according to " the deletion person " of recycle bin (Trash) table, " deletion date ", and fields such as " delete lists ", the binding operation daily record finds the target data that will reduce.
S4-2: from the value resolution data of the datainfo field correspondence of recycle bin (Trash) table record, being reduced into the tablename field value is a record of the database table of table name, inserts this record toward this table, deletes the record in the recycle bin table (Trash) simultaneously.
S4-3: reduction of data success
The data deletion step: mainly be responsible for the data deletion operation of process user, the target data that the deletion user selects, the record deletion daily record, and a data message of deletion is packaged in the recycle bin.
Reduction of data step: mainly be the restoring operation that the system manager handles improper deleted data, from recycle bin, find the data of improper deletion to reduce.
In sum, by adopting technical solution of the present invention, data deletion all has vestige to seek, and improper deleted data can recover from recycle bin, has better guaranteed the security of business data.
Claims (2)
1. the reduction of data method of an application system comprises data deletion step and reduction of data step, it is characterized in that, described data deletion step comprises,
The first step, the user-selected number certificate is carried out deletion data operation;
Second step, obtain the information of wanting deleted data, database table under the data, each the literary name section of the database table of data correspondence and the value of each literary name section correspondence are packaged in the recycle bin database table, described recycle bin database table also comprises " major key ID ", " deletion person ", " deletion time ", " database table name " four fields;
In the 3rd step, will delete target data and from database table, delete;
In the 4th step, record data deletion day aims in the database table;
Described reduction of data step comprises,
The first step, the system manager enters recycle bin, according to " the deletion person " of recycle bin table, " deletion time ", and " database table name " field, the binding operation daily record finds the target data that will reduce;
Second step, the corresponding value resolution data of depositing from all the literary name name sections of recycle bin table record and value packing of field, being reduced into database table name segment value is a record of the database table of table name, inserts this record toward this table, deletes the record in the recycle bin table simultaneously.
2. the reduction of data method of application system as claimed in claim 1 is characterized in that, described data deletion step also comprises the authority determining step, and described authority determining step carries out after the deletion data operation in the user-selected number certificate,
Have erase right then carry out next step if judge the user,, and stop if do not have authority then notify lack of competence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110025862 CN102096614A (en) | 2011-01-24 | 2011-01-24 | Data restoration method of application system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110025862 CN102096614A (en) | 2011-01-24 | 2011-01-24 | Data restoration method of application system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102096614A true CN102096614A (en) | 2011-06-15 |
Family
ID=44129718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201110025862 Pending CN102096614A (en) | 2011-01-24 | 2011-01-24 | Data restoration method of application system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102096614A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360476A (en) * | 2011-10-28 | 2012-02-22 | 中国舰船研究设计中心 | Method for synchronously processing cascade secret-level setting information |
CN103019891A (en) * | 2012-12-24 | 2013-04-03 | 珠海金山办公软件有限公司 | Method and system for restoring deleted file |
CN103164514A (en) * | 2013-02-25 | 2013-06-19 | 用友软件股份有限公司 | Detection device and detection method for data reference relationship |
CN104423957A (en) * | 2013-09-07 | 2015-03-18 | 镇江金软计算机科技有限责任公司 | Portal website information recycling and recovery method based on B/S (Browser/System) structure |
CN105868057A (en) * | 2016-06-20 | 2016-08-17 | 珠海市魅族科技有限公司 | Data processing method and device as well as mobile terminal |
CN106599115A (en) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | Data protection method and device and terminal |
CN103942126B (en) * | 2014-05-12 | 2018-07-06 | 联想(北京)有限公司 | Electronic equipment and its data back up method |
CN109063070A (en) * | 2018-07-23 | 2018-12-21 | 郑州云海信息技术有限公司 | A kind of operating method and database server of database |
CN109241001A (en) * | 2018-08-30 | 2019-01-18 | 新华三大数据技术有限公司 | Data processing method and device |
CN110597781A (en) * | 2019-08-09 | 2019-12-20 | 北京人大金仓信息技术股份有限公司 | Flashback deletion method and system for database |
CN110781036A (en) * | 2019-10-31 | 2020-02-11 | 北京东软望海科技有限公司 | Data recovery method and device, computer equipment and storage medium |
CN112631576A (en) * | 2020-12-31 | 2021-04-09 | 杭州天宽科技有限公司 | Java universal code generation optimization method and system |
CN112632043A (en) * | 2021-01-26 | 2021-04-09 | 浙江争游网络科技有限公司 | Data warehouse optimization method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030212687A1 (en) * | 2002-05-07 | 2003-11-13 | Gonos Dan G. | Data archive recovery |
US20050165863A1 (en) * | 2004-01-23 | 2005-07-28 | Atul Mukker | File recovery under Linux operating system |
CN101004703A (en) * | 2006-12-22 | 2007-07-25 | 清华大学 | Fast restore method for computer system |
CN101341480A (en) * | 2005-12-20 | 2009-01-07 | 微软公司 | Web site multi-stage recycling |
-
2011
- 2011-01-24 CN CN 201110025862 patent/CN102096614A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030212687A1 (en) * | 2002-05-07 | 2003-11-13 | Gonos Dan G. | Data archive recovery |
US20050165863A1 (en) * | 2004-01-23 | 2005-07-28 | Atul Mukker | File recovery under Linux operating system |
CN101341480A (en) * | 2005-12-20 | 2009-01-07 | 微软公司 | Web site multi-stage recycling |
CN101004703A (en) * | 2006-12-22 | 2007-07-25 | 清华大学 | Fast restore method for computer system |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360476B (en) * | 2011-10-28 | 2013-09-11 | 中国舰船研究设计中心 | Method for synchronously processing cascade secret-level setting information |
CN102360476A (en) * | 2011-10-28 | 2012-02-22 | 中国舰船研究设计中心 | Method for synchronously processing cascade secret-level setting information |
CN103019891A (en) * | 2012-12-24 | 2013-04-03 | 珠海金山办公软件有限公司 | Method and system for restoring deleted file |
CN103164514A (en) * | 2013-02-25 | 2013-06-19 | 用友软件股份有限公司 | Detection device and detection method for data reference relationship |
CN104423957A (en) * | 2013-09-07 | 2015-03-18 | 镇江金软计算机科技有限责任公司 | Portal website information recycling and recovery method based on B/S (Browser/System) structure |
CN103942126B (en) * | 2014-05-12 | 2018-07-06 | 联想(北京)有限公司 | Electronic equipment and its data back up method |
CN105868057B (en) * | 2016-06-20 | 2018-09-25 | 珠海市魅族科技有限公司 | A kind of method, apparatus and mobile terminal of data processing |
CN105868057A (en) * | 2016-06-20 | 2016-08-17 | 珠海市魅族科技有限公司 | Data processing method and device as well as mobile terminal |
CN106599115A (en) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | Data protection method and device and terminal |
CN106599115B (en) * | 2016-11-30 | 2022-12-20 | Oppo广东移动通信有限公司 | Data protection method, device and terminal |
CN109063070A (en) * | 2018-07-23 | 2018-12-21 | 郑州云海信息技术有限公司 | A kind of operating method and database server of database |
CN109063070B (en) * | 2018-07-23 | 2022-03-25 | 郑州云海信息技术有限公司 | Database operation method and database server |
CN109241001A (en) * | 2018-08-30 | 2019-01-18 | 新华三大数据技术有限公司 | Data processing method and device |
CN110597781A (en) * | 2019-08-09 | 2019-12-20 | 北京人大金仓信息技术股份有限公司 | Flashback deletion method and system for database |
CN110597781B (en) * | 2019-08-09 | 2023-05-05 | 北京人大金仓信息技术股份有限公司 | Flash deleting method and system for database |
CN110781036A (en) * | 2019-10-31 | 2020-02-11 | 北京东软望海科技有限公司 | Data recovery method and device, computer equipment and storage medium |
CN112631576A (en) * | 2020-12-31 | 2021-04-09 | 杭州天宽科技有限公司 | Java universal code generation optimization method and system |
CN112631576B (en) * | 2020-12-31 | 2022-09-27 | 杭州天宽科技有限公司 | Java universal code generation optimization method and system |
CN112632043A (en) * | 2021-01-26 | 2021-04-09 | 浙江争游网络科技有限公司 | Data warehouse optimization method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102096614A (en) | Data restoration method of application system | |
CN110765337B (en) | Service providing method based on internet big data | |
Yang et al. | Privacy concerns in China's smart city campaign: The deficit of China's Cybersecurity Law | |
Chou et al. | Collection and analysis of critical infrastructure interdependency relationships | |
CN102682024B (en) | Method for recombining incomplete JPEG file fragmentation | |
CN110197085A (en) | A kind of document tamper resistant method based on fabric alliance chain | |
CN102508833A (en) | Data monitoring device and data monitoring method | |
CN112036995A (en) | Large-scale enterprise financial data management method and system based on block chain and readable storage medium | |
US20150180747A1 (en) | Determining Events by Analyzing Stored Electronic Communications | |
CN106528794A (en) | Electronic document filing method based on archive management system | |
CN113032735A (en) | Digital asset evidence and infringement monitoring system and method based on block chain technology | |
CN104636337A (en) | Data cleaning storage method for added value tax | |
CN115859362A (en) | Data storage system, method, device and medium based on block chain side chain | |
CN109544014A (en) | Anti- fraud method and device based on historical data playback | |
CN107203713A (en) | Verification code generation method and device | |
CN102750198B (en) | A kind of backup method of social network sites content and system | |
CN104104724A (en) | Method for pushing operating mode of client side and communication system | |
Foley | Seasonal adjustment of Irish official statistics during the COVID-19 crisis | |
CN108777621A (en) | A method of obtaining means of payment Alipay transaction record | |
Nugroho et al. | Recommendations for improving data management process in government of bandung regency using COBIT 4.1 framework | |
Sokolov et al. | Technique for improvement of backup and restore strategy based on blockchain | |
CN115114237A (en) | Smart file big data platform system | |
CN113222430A (en) | Water resource certification management system | |
CN111274323A (en) | Intelligent automatic monitoring method based on periodicity | |
CN116668451B (en) | Data storage method, equipment and medium for securities business |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110615 |