CN108415922B - Database modification method and application server - Google Patents
Database modification method and application server Download PDFInfo
- Publication number
- CN108415922B CN108415922B CN201710914955.1A CN201710914955A CN108415922B CN 108415922 B CN108415922 B CN 108415922B CN 201710914955 A CN201710914955 A CN 201710914955A CN 108415922 B CN108415922 B CN 108415922B
- Authority
- CN
- China
- Prior art keywords
- database
- target object
- objects
- complexity
- association
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
Abstract
The invention discloses a database modification method, which comprises the following steps: analyzing a database, and acquiring an implementation program of each object in the database; calculating the complexity of each object associated with other objects through the implementation program of each object; judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database. The invention also provides an application server. The database modification method and the application server provided by the invention can not determine the complexity degree of the dependence of the object to be modified and other objects before modifying the database object, further evaluate the modification risk of the object to be modified, and finally determine whether to modify the corresponding object. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a database modification method and an application server.
Background
For some items which are large in traditional size and strongly depend on the database, a plurality of business logics are written in the view and storage process of the database, so that great risks exist in modifying any database table, such as modifying, adding and deleting fields, and the influence is not known at all and where the influence is influenced. Once a blind modification is made to some objects in the database, it may eventually lead to a crash of the entire database, resulting in significant data loss.
Disclosure of Invention
In view of this, the present invention provides a database modification method and an application server, which can evaluate the risk of modification before modifying a database object and before it is clear that the dependency of the object to be modified and other objects is complex, and finally determine whether to modify the corresponding object. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
First, to achieve the above object, the present invention provides an application server, where the application server includes a memory, a processor, and a database modification program stored in the memory and executable on the processor, and the database modification program implements the following steps when executed by the processor:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database.
Optionally, the database modification program further implements the following steps when executed by the processor:
and when the complexity of the association between the target object and the other objects exceeds the preset value, outputting prompt information aiming at the preset position of the target object in the database.
Optionally, the database modification program further implements the following steps when executed by the processor:
and when the complexity of the association between the target object and the other objects exceeds the preset value, prompting the risk of the target object in the database when the target object is modified.
Optionally, the step of controlling the target object to be in a modifiable state in the database specifically includes:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the object.
Optionally, the step of calculating, by the implementation program of each object, the complexity of each object associated with other objects specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
the degree is determined as the complexity of the respective function in relation to other functions.
In addition, to achieve the above object, the present invention further provides a database modification method, which is applied to an application server, and the method includes:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database.
Optionally, the method further comprises:
and when the complexity of the association between the target object and the other objects exceeds the preset value, outputting prompt information aiming at the preset position of the target object in the database.
Optionally, the method further comprises:
and when the complexity of the association between the target object and the other objects exceeds the preset value, prompting the risk of the target object in the database when the target object is modified.
Optionally, the step of controlling the target object to be in a modifiable state in the database specifically includes:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the object.
Optionally, the step of calculating, by the implementation program of each object, the complexity of each object associated with other objects specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
the degree is determined as the complexity of the respective function in relation to other functions.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium storing a database modification program, which is executable by at least one processor to cause the at least one processor to perform the steps of the database modification method as described above.
Compared with the prior art, the application server, the database modification method and the computer-readable storage medium provided by the invention have the advantages that firstly, the database is analyzed, and the implementation program of each object in the database is obtained; secondly, calculating the complexity of each object associated with other objects through the implementation program of each object; and finally, when the complexity of the association between the target object and the other objects does not exceed a preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Drawings
FIG. 1 is a diagram of an alternative hardware architecture for an application server of the present invention;
FIG. 2 is a block diagram of a first embodiment of a database modification program of the present invention;
FIG. 3 is a block diagram of a second embodiment of a database modification program of the present invention;
FIG. 4 is a flow chart of a first embodiment of a database modification method of the present invention;
FIG. 5 is a flow chart of a second embodiment of a database modification method of the present invention;
FIG. 6 is a flow chart of a database modification method according to a third embodiment of the present invention.
Reference numerals:
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Fig. 1 is a schematic diagram of an alternative hardware architecture of the application server 1.
The application server 1 may be a rack server, a blade server, a tower server, or a rack server, and the application server 1 may be an independent server or a server cluster composed of a plurality of servers.
In this embodiment, the application server 1 may include, but is not limited to, a memory 11, a processor 12, and a network interface 13, which may be communicatively connected to each other through a system bus.
The application server 1 is connected to the network through a network interface 13 to acquire information. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global system of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), Wi-Fi, or a communication network.
It is noted that fig. 1 only shows the application server 1 with components 11-13, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 11 may be an internal storage unit of the application server 1, such as a hard disk or a memory of the application server 1. In other embodiments, the memory 11 may also be an external storage device of the application server 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like equipped in the application server 1. Of course, the memory 11 may also comprise both an internal storage unit of the application server 1 and an external storage device thereof. In this embodiment, the memory 11 is generally used for storing an operating system installed in the application server 1 and various types of application software, such as the program code of the database modification program 200. Furthermore, the memory 11 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 12 is generally used for controlling the overall operation of the application server 1, such as performing data interaction or communication related control and processing. In this embodiment, the processor 12 is configured to run the program code stored in the memory 11 or process data, for example, run the database modification program 200.
The network interface 13 may comprise a wireless network interface or a wired network interface, and the network interface 13 is generally used for establishing communication connection between the application server 1 and other electronic devices.
In this embodiment, when the database modification program 200 is installed and operated in the application server 1, and when the database modification program 200 is operated, the application server 1 analyzes the database to obtain the implementation program of each object in the database; calculating the complexity of each object associated with other objects through the implementation program of each object; judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
The hardware structure and functions of the related devices of the various embodiments of the present invention have been described in detail so far. Hereinafter, various embodiments of the present invention will be proposed based on the above-described application environment and related devices.
First, the present invention provides a database modification program 200.
Referring to fig. 2, a block diagram of a database modification program 200 according to a first embodiment of the present invention is shown.
In this embodiment, the database modification program 200 includes a series of computer program instructions stored in the memory 11, which when executed by the processor 12, can implement the database modification operations of the embodiments of the present invention. In some embodiments, database modification program 200 may be divided into one or more modules based on the particular operations implemented by the portions of the computer program instructions. For example, in fig. 2, the database modification program 200 may be divided into an analysis module 201, a calculation module 202, a judgment module 203, and a control module 204. Wherein:
the analysis module 201 is configured to analyze a database, and obtain an implementation program of each object in the database. Specifically, the implementation program includes each function of the implementation object. In this embodiment, the object includes at least one of a view, a stored procedure, and a table.
The calculating module 202 is configured to calculate, by the implementation program of each object, the complexity of each object associated with other objects.
The judging module 203 is configured to judge whether the complexity of the association between the target object and the other objects exceeds a preset value.
The control module 204 is configured to control the target object to be in a modifiable state in the database when the complexity of the association between the target object and the other objects does not exceed the preset value.
Specifically, the control module 204 sets the modifiable state to a text entry state, and the database can accept user modifications to the target object when the object is in the text entry state.
Further, the control module 204 is further configured to output prompt information for a preset position of the target object in the database when the complexity of the association between the target object and the other objects exceeds the preset value.
In this embodiment, when the degree of association between the target object and another object exceeds the preset value, it indicates that the degree of dependency between the object and the other object is high, and once the object is modified, the object may be changed by another object, which may cause a change in the entire database. Or in other embodiments, for such objects whose association degree with other objects exceeds a preset value, the control module 204 controls the database to present an uneditable state to the objects, so as to actively cut off the possibility of modifying the objects by the user, or prompt the risk degree, and the user evaluates whether to modify the objects according to actual needs.
Further, the control module 204 is further configured to prompt a risk existing when the target object is modified in the database when the complexity of the association between the target object and the other objects exceeds the preset value.
Specifically, when the complexity of the association between the target object and the other objects exceeds a preset value, the object is in a high risk state or a low risk state when modified in the database. The control module 204 prompts the risk degree, and the user evaluates whether to modify the risk degree according to actual needs.
Through the program module 201 and 204, the database modification program 200 provided by the invention firstly analyzes the database to obtain the implementation program of each object in the database; secondly, calculating the complexity of each object associated with other objects through the implementation program of each object; then, judging whether the complexity of the target object and the other objects exceeds a preset value; and finally, when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Further, a second embodiment of the present invention (as shown in fig. 3) is proposed based on the above-described first embodiment of the database modification program 200 of the present invention. In this embodiment, the database modification program 200 further includes a recording module 205.
In this embodiment, the parsing module 201 is further configured to analyze a function required for implementing each object, and parse an object called by the function.
The recording module 205 is configured to record the number of times that each object is called by a function, and determine the number of times as the complexity of the corresponding function associated with other functions.
The following is a specific example:
for example, the object is a table, the implementation program for implementing the table includes at least one function, and the table is finally implemented through the invocation of such a function. Then in the function of the implementation table, 1 view is called, and 1 storage process is called; similarly, in the implementation process of the object of the storage process, the corresponding function calls a table for 3 times and a view for 2 times; in the implementation process of the view object, the corresponding function calls 4 times of tables and 3 times of storage processes. Then in the above database implementation, the storage process is called 4 times by other objects, the table is called 7 times by other objects, and the view is called 3 times by other objects. The complexity of the association of the three objects of the view, the stored procedure and the table with other objects can be determined to be 3, 4 and 7 respectively, which indicates that the table is most associated with other objects and the modification is most easy to change in the whole database. In this embodiment, the preset value may be set according to the needs of the user, or may be an average value of the complexity of all objects associated with other objects.
Through the program module 201 and 205, the database modification program 200 provided by the present invention can calculate the complexity of each object associated with other objects through the implementation program of each object.
In addition, the invention also provides a database modification method.
Fig. 4 is a flow chart showing a first embodiment of the database modification method according to the present invention. In this embodiment, the execution order of the steps in the flowchart shown in fig. 4 may be changed and some steps may be omitted according to different requirements.
Step S401, analyzing the database, and acquiring the implementation program of each object in the database. Specifically, the implementation program includes each function of the implementation object. In this embodiment, the object includes at least one of a view, a stored procedure, and a table.
Step S402, calculating the complexity of each object associated with other objects by the implementation program of each object. Specifically, the specific steps of calculating the complexity of each object associated with other objects through the implementation program of each object will be described in detail in a third embodiment (see fig. 6) of the database modification method according to the present invention.
Step S403, determining whether the complexity of the target object associated with the other objects exceeds a preset value. And executing step S404 when the complexity of the association between the target object and the other objects does not exceed the preset value, and otherwise executing step S405 when the complexity of the association between the target object and the other objects exceeds the preset value.
Step S404, controlling the target object to be in a modifiable state in the database.
Specifically, the application server 1 sets the modifiable state as a text input state, and when the object is in the text input state, the database can accept the modification of the target object by the user.
Step S405, outputting prompt information aiming at the preset position of the target object in the database.
In this embodiment, when the degree of association between the target object and another object exceeds the preset value, it indicates that the degree of dependency between the object and the other object is high, and once the object is modified, the object may be changed by another object, which may cause a change in the entire database. Or in other embodiments, for such objects whose association degree with other objects exceeds a preset value, the application server 1 controls the database to present an uneditable state to the objects, so as to actively cut off the possibility of modifying the objects by the user, or prompt the risk degree, and the user evaluates whether to modify the objects according to actual needs.
Through the steps S401-405, the database modification method provided by the invention comprises the steps of firstly analyzing the database and acquiring the implementation program of each object in the database; secondly, calculating the complexity of each object associated with other objects through the implementation program of each object; and finally, when the complexity of the association between the target object and the other objects does not exceed a preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Fig. 5 is a flow chart of a second embodiment of the database modification method according to the present invention. In this embodiment, the execution order of the steps in the flowchart shown in fig. 5 may be changed and some steps may be omitted according to different requirements.
Step S501, analyzing a database, and acquiring an implementation program of each object in the database. Specifically, the implementation program includes each function of the implementation object. In this embodiment, the object includes at least one of a view, a stored procedure, and a table.
Step S502, calculating the complexity of each object associated with other objects by the implementation program of each object.
Step S503, determining whether the complexity of the target object associated with the other objects exceeds a preset value. And executing step S504 when the complexity of the association between the target object and the other objects does not exceed the preset value, and otherwise executing step S505 when the complexity of the association between the target object and the other objects exceeds the preset value.
Step S504, controlling the target object to be in a modifiable state in the database.
And step S505, prompting the risk of the target object when the target object is modified in the database.
Specifically, when the complexity of the association between the target object and the other objects exceeds a preset value, the object is in a high risk state or a low risk state when modified in the database. The application server 1 prompts the risk degree, and the user evaluates whether to modify the risk degree according to actual needs.
Through the steps S501 to S505, the database modification method provided by the present invention can evaluate the risk of modification without determining the complexity of the dependency between the object to be modified and other objects, and finally determine whether to modify the corresponding object. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Fig. 6 is a flow chart of a third embodiment of the database modification method according to the present invention. In this embodiment, the step of calculating the complexity associated with each object and other objects through the implementation program of each object specifically includes:
step S601, analyzing a function required for implementing each object, and analyzing an object called by the function.
Step S602, records the number of times each object is called by the function.
Step S603, determining the number of times as the complexity of the corresponding function associated with other functions.
The following is a specific example:
for example, the object is a table, the implementation program for implementing the table includes at least one function, and the table is finally implemented through the invocation of such a function. Then in the function of the implementation table, 1 view is called, and 1 storage process is called; similarly, in the implementation process of the object of the storage process, the corresponding function calls a table for 3 times and a view for 2 times; in the implementation process of the view object, the corresponding function calls 4 times of tables and 3 times of storage processes. Then in the above database implementation, the storage process is called 4 times by other objects, the table is called 7 times by other objects, and the view is called 3 times by other objects. The complexity of the association of the three objects of the view, the stored procedure and the table with other objects can be determined to be 3, 4 and 7 respectively, which indicates that the table is most associated with other objects and the modification is most easy to change in the whole database. In this embodiment, the preset value may be set according to the needs of the user, or may be an average value of the complexity of all objects associated with other objects.
Through the steps S601 to S603, the database modification method provided by the present invention can calculate the complexity of each object associated with other objects through the implementation program of each object.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (6)
1. A database modification method applied to an application server is characterized by comprising the following steps:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database, and the step of calculating the complexity of the association between each object and the other objects through the implementation program of each object specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
determining the degree of time as a complexity of the respective function in association with other functions, the method further comprising:
when the complexity of the target object and the other objects exceeds the preset value, prompting the risk of the target object when the target object is modified in the database, and prompting that the target object is in a high risk state or a low risk state when the target object is modified in the database.
2. A database modification method as claimed in claim 1, characterized in that the method further comprises:
and when the complexity of the association between the target object and the other objects exceeds the preset value, outputting prompt information aiming at the preset position of the target object in the database.
3. The database modification method according to claim 1, wherein the step of controlling the target object to be in a modifiable state in the database specifically comprises:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the target object.
4. An application server comprising a memory, a processor, and a database modification program stored on the memory and executable on the processor, the database modification program when executed by the processor implementing the steps of:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database, and the step of calculating the complexity of the association between each object and the other objects through the implementation program of each object specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
determining the degree of time as the complexity of the corresponding function in relation to other functions, further comprising:
when the complexity of the target object and the other objects exceeds the preset value, prompting the risk of the target object when the target object is modified in the database, and prompting that the target object is in a high risk state or a low risk state when the target object is modified in the database.
5. The application server according to claim 4, wherein the step of controlling the target object to be in a modifiable state in the database specifically comprises:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the target object.
6. A computer-readable storage medium storing a database modification program executable by at least one processor to cause the at least one processor to perform the steps of the database modification method of any one of claims 1-3.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710914955.1A CN108415922B (en) | 2017-09-30 | 2017-09-30 | Database modification method and application server |
PCT/CN2018/077679 WO2019062022A1 (en) | 2017-09-30 | 2018-02-28 | Database modification method and application server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710914955.1A CN108415922B (en) | 2017-09-30 | 2017-09-30 | Database modification method and application server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108415922A CN108415922A (en) | 2018-08-17 |
CN108415922B true CN108415922B (en) | 2021-10-22 |
Family
ID=63125172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710914955.1A Active CN108415922B (en) | 2017-09-30 | 2017-09-30 | Database modification method and application server |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108415922B (en) |
WO (1) | WO2019062022A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114691640A (en) * | 2020-12-28 | 2022-07-01 | 网联清算有限公司 | Database survival detection method and device |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1619443A (en) * | 2003-09-05 | 2005-05-25 | 费舍-柔斯芒特系统股份有限公司 | State machine function block with a user modifiable output configuration database |
CN101188013A (en) * | 2006-11-16 | 2008-05-28 | 中国银联股份有限公司 | A framework system for cleaning data and its application method |
CN101427243A (en) * | 2006-04-21 | 2009-05-06 | 微软公司 | Localising unstructured resources |
CN102521259A (en) * | 2011-11-18 | 2012-06-27 | 陈晓亮 | User resource information on-line supply system and method |
CN102737083A (en) * | 2011-09-28 | 2012-10-17 | 新奥特(北京)视频技术有限公司 | Instant competition information editing method and system |
CN102902544A (en) * | 2012-09-29 | 2013-01-30 | 福建升腾资讯有限公司 | Implementation method of phone payment terminal software platform |
CN102968457A (en) * | 2012-10-30 | 2013-03-13 | 北京奇虎科技有限公司 | Switching method and system between databases |
CN103226675A (en) * | 2013-03-20 | 2013-07-31 | 华中科技大学 | Traceability system and traceability method for analyzing intrusion behavior |
CN103455516A (en) * | 2012-06-01 | 2013-12-18 | 腾讯科技(北京)有限公司 | Operation platform and maintaining method for database |
CN103562905A (en) * | 2011-03-23 | 2014-02-05 | 新比斯安全卢森堡有限公司 | Improved data visualization configuration system and method |
CN103617131A (en) * | 2013-11-26 | 2014-03-05 | 曙光信息产业股份有限公司 | Data caching achieving method |
CN103955358A (en) * | 2012-09-18 | 2014-07-30 | 马维尔国际贸易有限公司 | Modifiable contextual help content provided in-line within an application |
CN104317974A (en) * | 2014-11-21 | 2015-01-28 | 武汉理工大学 | Reconfigurable multi-source data importing method in ERP system |
CN105354190A (en) * | 2014-08-18 | 2016-02-24 | 阿里巴巴集团控股有限公司 | Numerical information transfer method and apparatus |
CN105592314A (en) * | 2015-12-17 | 2016-05-18 | 清华大学 | Parallel decoding method and device |
CN105872094A (en) * | 2016-05-31 | 2016-08-17 | 山东大学 | Service robot cloud platform interface system based on SOA and working method thereof |
CN105912460A (en) * | 2016-04-05 | 2016-08-31 | 浪潮电子信息产业股份有限公司 | Software test method and system based on QTP |
CN106022706A (en) * | 2016-05-06 | 2016-10-12 | 米励(北京)信息技术有限公司 | Holographic presentation system of E-contract main body and correlation execution process information |
CN106815219A (en) * | 2015-11-27 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The edit methods and device of database engine |
CN106933733A (en) * | 2015-12-30 | 2017-07-07 | 华为技术有限公司 | A kind of method and apparatus for determining RAM leakage position |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1547009A1 (en) * | 2002-09-20 | 2005-06-29 | Board Of Regents The University Of Texas System | Computer program products, systems and methods for information discovery and relational analyses |
JP2006072769A (en) * | 2004-09-02 | 2006-03-16 | Fujitsu Ltd | Circuit diagram display device, circuit diagram display method and circuit diagram display program |
US20060200450A1 (en) * | 2005-03-04 | 2006-09-07 | Microsoft Corporation | Monitoring health of actively executing computer applications |
US9135283B2 (en) * | 2009-10-07 | 2015-09-15 | Amazon Technologies, Inc. | Self-service configuration for data environment |
CN102063449A (en) * | 2009-11-12 | 2011-05-18 | 中国移动通信集团浙江有限公司 | Method and device for improving reliability of statistic information of data object in database |
CN103473499A (en) * | 2013-09-16 | 2013-12-25 | 笔笔发信息技术(上海)有限公司 | Acquisition device and data authorization method thereof |
CN104462106A (en) * | 2013-09-17 | 2015-03-25 | 鸿富锦精密工业(深圳)有限公司 | Data updating method and system |
CN104639521A (en) * | 2013-11-15 | 2015-05-20 | 腾讯科技(深圳)有限公司 | Application safety verification method and system, application server and application client |
US9391902B2 (en) * | 2013-12-13 | 2016-07-12 | Red Hat, Inc. | System and method for dynamic collaboration during query processing |
US9753971B2 (en) * | 2014-09-15 | 2017-09-05 | Sap Se | Hot deployment of embedded database procedures |
-
2017
- 2017-09-30 CN CN201710914955.1A patent/CN108415922B/en active Active
-
2018
- 2018-02-28 WO PCT/CN2018/077679 patent/WO2019062022A1/en active Application Filing
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1619443A (en) * | 2003-09-05 | 2005-05-25 | 费舍-柔斯芒特系统股份有限公司 | State machine function block with a user modifiable output configuration database |
CN101427243A (en) * | 2006-04-21 | 2009-05-06 | 微软公司 | Localising unstructured resources |
CN101188013A (en) * | 2006-11-16 | 2008-05-28 | 中国银联股份有限公司 | A framework system for cleaning data and its application method |
CN103562905A (en) * | 2011-03-23 | 2014-02-05 | 新比斯安全卢森堡有限公司 | Improved data visualization configuration system and method |
CN102737083A (en) * | 2011-09-28 | 2012-10-17 | 新奥特(北京)视频技术有限公司 | Instant competition information editing method and system |
CN102521259A (en) * | 2011-11-18 | 2012-06-27 | 陈晓亮 | User resource information on-line supply system and method |
CN103455516A (en) * | 2012-06-01 | 2013-12-18 | 腾讯科技(北京)有限公司 | Operation platform and maintaining method for database |
CN103955358A (en) * | 2012-09-18 | 2014-07-30 | 马维尔国际贸易有限公司 | Modifiable contextual help content provided in-line within an application |
CN102902544A (en) * | 2012-09-29 | 2013-01-30 | 福建升腾资讯有限公司 | Implementation method of phone payment terminal software platform |
CN102968457A (en) * | 2012-10-30 | 2013-03-13 | 北京奇虎科技有限公司 | Switching method and system between databases |
CN103226675A (en) * | 2013-03-20 | 2013-07-31 | 华中科技大学 | Traceability system and traceability method for analyzing intrusion behavior |
CN103617131A (en) * | 2013-11-26 | 2014-03-05 | 曙光信息产业股份有限公司 | Data caching achieving method |
CN105354190A (en) * | 2014-08-18 | 2016-02-24 | 阿里巴巴集团控股有限公司 | Numerical information transfer method and apparatus |
CN104317974A (en) * | 2014-11-21 | 2015-01-28 | 武汉理工大学 | Reconfigurable multi-source data importing method in ERP system |
CN106815219A (en) * | 2015-11-27 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The edit methods and device of database engine |
CN105592314A (en) * | 2015-12-17 | 2016-05-18 | 清华大学 | Parallel decoding method and device |
CN106933733A (en) * | 2015-12-30 | 2017-07-07 | 华为技术有限公司 | A kind of method and apparatus for determining RAM leakage position |
CN105912460A (en) * | 2016-04-05 | 2016-08-31 | 浪潮电子信息产业股份有限公司 | Software test method and system based on QTP |
CN106022706A (en) * | 2016-05-06 | 2016-10-12 | 米励(北京)信息技术有限公司 | Holographic presentation system of E-contract main body and correlation execution process information |
CN105872094A (en) * | 2016-05-31 | 2016-08-17 | 山东大学 | Service robot cloud platform interface system based on SOA and working method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN108415922A (en) | 2018-08-17 |
WO2019062022A1 (en) | 2019-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107844634B (en) | Modeling method of multivariate general model platform, electronic equipment and computer readable storage medium | |
CN108388598B (en) | Electronic device, data storage method, and storage medium | |
CN110309125B (en) | Data verification method, electronic device and storage medium | |
CN107689982B (en) | Multi-data source data synchronization method, application server and computer readable storage medium | |
CN108416485B (en) | User identity recognition method, electronic device and computer readable storage medium | |
CN111723079A (en) | Data migration method and device, computer equipment and storage medium | |
CN107832676B (en) | Table information line feed recognition method, electronic device and computer readable storage medium | |
CN110704521A (en) | Interface data access method and system | |
CN108416679B (en) | Device and method for issuing orders of multiple insurance products and computer readable storage medium | |
CN110308880B (en) | Log printing method, system, computer device and computer readable storage medium | |
CN108241529B (en) | Salary calculation method, application server and computer readable storage medium | |
CN107682426B (en) | Interface proxy method and application server | |
CN108491304B (en) | electronic device, business system risk control method and storage medium | |
CN110780883A (en) | Method call chain tracking method, electronic device, and computer-readable storage medium | |
CN110046181B (en) | Data routing method and device based on database distributed storage | |
CN108415922B (en) | Database modification method and application server | |
CN110708197A (en) | Monitoring device, method for setting monitoring policy of monitoring device, and storage medium | |
CN113886590A (en) | Data summarizing method and device, computer equipment and storage medium | |
CN112685077A (en) | Data modification method, system, computer device and computer readable storage medium | |
CN112001707A (en) | Business workflow generation method and system based on business data | |
CN111984674A (en) | Method and system for generating structured query language | |
CN112416648A (en) | Data verification method and device | |
CN110837500A (en) | Data screening method and device based on local embedded window and computer equipment | |
CN113535206B (en) | Multi-version code upgrading method and system | |
CN113595762B (en) | Network card configuration storage method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |