CN108415922B - Database modification method and application server - Google Patents

Database modification method and application server Download PDF

Info

Publication number
CN108415922B
CN108415922B CN201710914955.1A CN201710914955A CN108415922B CN 108415922 B CN108415922 B CN 108415922B CN 201710914955 A CN201710914955 A CN 201710914955A CN 108415922 B CN108415922 B CN 108415922B
Authority
CN
China
Prior art keywords
database
target object
objects
complexity
association
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710914955.1A
Other languages
Chinese (zh)
Other versions
CN108415922A (en
Inventor
苏轶
熊星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201710914955.1A priority Critical patent/CN108415922B/en
Priority to PCT/CN2018/077679 priority patent/WO2019062022A1/en
Publication of CN108415922A publication Critical patent/CN108415922A/en
Application granted granted Critical
Publication of CN108415922B publication Critical patent/CN108415922B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating

Abstract

The invention discloses a database modification method, which comprises the following steps: analyzing a database, and acquiring an implementation program of each object in the database; calculating the complexity of each object associated with other objects through the implementation program of each object; judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database. The invention also provides an application server. The database modification method and the application server provided by the invention can not determine the complexity degree of the dependence of the object to be modified and other objects before modifying the database object, further evaluate the modification risk of the object to be modified, and finally determine whether to modify the corresponding object. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.

Description

Database modification method and application server
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a database modification method and an application server.
Background
For some items which are large in traditional size and strongly depend on the database, a plurality of business logics are written in the view and storage process of the database, so that great risks exist in modifying any database table, such as modifying, adding and deleting fields, and the influence is not known at all and where the influence is influenced. Once a blind modification is made to some objects in the database, it may eventually lead to a crash of the entire database, resulting in significant data loss.
Disclosure of Invention
In view of this, the present invention provides a database modification method and an application server, which can evaluate the risk of modification before modifying a database object and before it is clear that the dependency of the object to be modified and other objects is complex, and finally determine whether to modify the corresponding object. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
First, to achieve the above object, the present invention provides an application server, where the application server includes a memory, a processor, and a database modification program stored in the memory and executable on the processor, and the database modification program implements the following steps when executed by the processor:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database.
Optionally, the database modification program further implements the following steps when executed by the processor:
and when the complexity of the association between the target object and the other objects exceeds the preset value, outputting prompt information aiming at the preset position of the target object in the database.
Optionally, the database modification program further implements the following steps when executed by the processor:
and when the complexity of the association between the target object and the other objects exceeds the preset value, prompting the risk of the target object in the database when the target object is modified.
Optionally, the step of controlling the target object to be in a modifiable state in the database specifically includes:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the object.
Optionally, the step of calculating, by the implementation program of each object, the complexity of each object associated with other objects specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
the degree is determined as the complexity of the respective function in relation to other functions.
In addition, to achieve the above object, the present invention further provides a database modification method, which is applied to an application server, and the method includes:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database.
Optionally, the method further comprises:
and when the complexity of the association between the target object and the other objects exceeds the preset value, outputting prompt information aiming at the preset position of the target object in the database.
Optionally, the method further comprises:
and when the complexity of the association between the target object and the other objects exceeds the preset value, prompting the risk of the target object in the database when the target object is modified.
Optionally, the step of controlling the target object to be in a modifiable state in the database specifically includes:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the object.
Optionally, the step of calculating, by the implementation program of each object, the complexity of each object associated with other objects specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
the degree is determined as the complexity of the respective function in relation to other functions.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium storing a database modification program, which is executable by at least one processor to cause the at least one processor to perform the steps of the database modification method as described above.
Compared with the prior art, the application server, the database modification method and the computer-readable storage medium provided by the invention have the advantages that firstly, the database is analyzed, and the implementation program of each object in the database is obtained; secondly, calculating the complexity of each object associated with other objects through the implementation program of each object; and finally, when the complexity of the association between the target object and the other objects does not exceed a preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Drawings
FIG. 1 is a diagram of an alternative hardware architecture for an application server of the present invention;
FIG. 2 is a block diagram of a first embodiment of a database modification program of the present invention;
FIG. 3 is a block diagram of a second embodiment of a database modification program of the present invention;
FIG. 4 is a flow chart of a first embodiment of a database modification method of the present invention;
FIG. 5 is a flow chart of a second embodiment of a database modification method of the present invention;
FIG. 6 is a flow chart of a database modification method according to a third embodiment of the present invention.
Reference numerals:
Figure BDA0001425667460000041
Figure BDA0001425667460000051
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Fig. 1 is a schematic diagram of an alternative hardware architecture of the application server 1.
The application server 1 may be a rack server, a blade server, a tower server, or a rack server, and the application server 1 may be an independent server or a server cluster composed of a plurality of servers.
In this embodiment, the application server 1 may include, but is not limited to, a memory 11, a processor 12, and a network interface 13, which may be communicatively connected to each other through a system bus.
The application server 1 is connected to the network through a network interface 13 to acquire information. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global system of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), Wi-Fi, or a communication network.
It is noted that fig. 1 only shows the application server 1 with components 11-13, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 11 may be an internal storage unit of the application server 1, such as a hard disk or a memory of the application server 1. In other embodiments, the memory 11 may also be an external storage device of the application server 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like equipped in the application server 1. Of course, the memory 11 may also comprise both an internal storage unit of the application server 1 and an external storage device thereof. In this embodiment, the memory 11 is generally used for storing an operating system installed in the application server 1 and various types of application software, such as the program code of the database modification program 200. Furthermore, the memory 11 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 12 is generally used for controlling the overall operation of the application server 1, such as performing data interaction or communication related control and processing. In this embodiment, the processor 12 is configured to run the program code stored in the memory 11 or process data, for example, run the database modification program 200.
The network interface 13 may comprise a wireless network interface or a wired network interface, and the network interface 13 is generally used for establishing communication connection between the application server 1 and other electronic devices.
In this embodiment, when the database modification program 200 is installed and operated in the application server 1, and when the database modification program 200 is operated, the application server 1 analyzes the database to obtain the implementation program of each object in the database; calculating the complexity of each object associated with other objects through the implementation program of each object; judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
The hardware structure and functions of the related devices of the various embodiments of the present invention have been described in detail so far. Hereinafter, various embodiments of the present invention will be proposed based on the above-described application environment and related devices.
First, the present invention provides a database modification program 200.
Referring to fig. 2, a block diagram of a database modification program 200 according to a first embodiment of the present invention is shown.
In this embodiment, the database modification program 200 includes a series of computer program instructions stored in the memory 11, which when executed by the processor 12, can implement the database modification operations of the embodiments of the present invention. In some embodiments, database modification program 200 may be divided into one or more modules based on the particular operations implemented by the portions of the computer program instructions. For example, in fig. 2, the database modification program 200 may be divided into an analysis module 201, a calculation module 202, a judgment module 203, and a control module 204. Wherein:
the analysis module 201 is configured to analyze a database, and obtain an implementation program of each object in the database. Specifically, the implementation program includes each function of the implementation object. In this embodiment, the object includes at least one of a view, a stored procedure, and a table.
The calculating module 202 is configured to calculate, by the implementation program of each object, the complexity of each object associated with other objects.
The judging module 203 is configured to judge whether the complexity of the association between the target object and the other objects exceeds a preset value.
The control module 204 is configured to control the target object to be in a modifiable state in the database when the complexity of the association between the target object and the other objects does not exceed the preset value.
Specifically, the control module 204 sets the modifiable state to a text entry state, and the database can accept user modifications to the target object when the object is in the text entry state.
Further, the control module 204 is further configured to output prompt information for a preset position of the target object in the database when the complexity of the association between the target object and the other objects exceeds the preset value.
In this embodiment, when the degree of association between the target object and another object exceeds the preset value, it indicates that the degree of dependency between the object and the other object is high, and once the object is modified, the object may be changed by another object, which may cause a change in the entire database. Or in other embodiments, for such objects whose association degree with other objects exceeds a preset value, the control module 204 controls the database to present an uneditable state to the objects, so as to actively cut off the possibility of modifying the objects by the user, or prompt the risk degree, and the user evaluates whether to modify the objects according to actual needs.
Further, the control module 204 is further configured to prompt a risk existing when the target object is modified in the database when the complexity of the association between the target object and the other objects exceeds the preset value.
Specifically, when the complexity of the association between the target object and the other objects exceeds a preset value, the object is in a high risk state or a low risk state when modified in the database. The control module 204 prompts the risk degree, and the user evaluates whether to modify the risk degree according to actual needs.
Through the program module 201 and 204, the database modification program 200 provided by the invention firstly analyzes the database to obtain the implementation program of each object in the database; secondly, calculating the complexity of each object associated with other objects through the implementation program of each object; then, judging whether the complexity of the target object and the other objects exceeds a preset value; and finally, when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Further, a second embodiment of the present invention (as shown in fig. 3) is proposed based on the above-described first embodiment of the database modification program 200 of the present invention. In this embodiment, the database modification program 200 further includes a recording module 205.
In this embodiment, the parsing module 201 is further configured to analyze a function required for implementing each object, and parse an object called by the function.
The recording module 205 is configured to record the number of times that each object is called by a function, and determine the number of times as the complexity of the corresponding function associated with other functions.
The following is a specific example:
for example, the object is a table, the implementation program for implementing the table includes at least one function, and the table is finally implemented through the invocation of such a function. Then in the function of the implementation table, 1 view is called, and 1 storage process is called; similarly, in the implementation process of the object of the storage process, the corresponding function calls a table for 3 times and a view for 2 times; in the implementation process of the view object, the corresponding function calls 4 times of tables and 3 times of storage processes. Then in the above database implementation, the storage process is called 4 times by other objects, the table is called 7 times by other objects, and the view is called 3 times by other objects. The complexity of the association of the three objects of the view, the stored procedure and the table with other objects can be determined to be 3, 4 and 7 respectively, which indicates that the table is most associated with other objects and the modification is most easy to change in the whole database. In this embodiment, the preset value may be set according to the needs of the user, or may be an average value of the complexity of all objects associated with other objects.
Through the program module 201 and 205, the database modification program 200 provided by the present invention can calculate the complexity of each object associated with other objects through the implementation program of each object.
In addition, the invention also provides a database modification method.
Fig. 4 is a flow chart showing a first embodiment of the database modification method according to the present invention. In this embodiment, the execution order of the steps in the flowchart shown in fig. 4 may be changed and some steps may be omitted according to different requirements.
Step S401, analyzing the database, and acquiring the implementation program of each object in the database. Specifically, the implementation program includes each function of the implementation object. In this embodiment, the object includes at least one of a view, a stored procedure, and a table.
Step S402, calculating the complexity of each object associated with other objects by the implementation program of each object. Specifically, the specific steps of calculating the complexity of each object associated with other objects through the implementation program of each object will be described in detail in a third embodiment (see fig. 6) of the database modification method according to the present invention.
Step S403, determining whether the complexity of the target object associated with the other objects exceeds a preset value. And executing step S404 when the complexity of the association between the target object and the other objects does not exceed the preset value, and otherwise executing step S405 when the complexity of the association between the target object and the other objects exceeds the preset value.
Step S404, controlling the target object to be in a modifiable state in the database.
Specifically, the application server 1 sets the modifiable state as a text input state, and when the object is in the text input state, the database can accept the modification of the target object by the user.
Step S405, outputting prompt information aiming at the preset position of the target object in the database.
In this embodiment, when the degree of association between the target object and another object exceeds the preset value, it indicates that the degree of dependency between the object and the other object is high, and once the object is modified, the object may be changed by another object, which may cause a change in the entire database. Or in other embodiments, for such objects whose association degree with other objects exceeds a preset value, the application server 1 controls the database to present an uneditable state to the objects, so as to actively cut off the possibility of modifying the objects by the user, or prompt the risk degree, and the user evaluates whether to modify the objects according to actual needs.
Through the steps S401-405, the database modification method provided by the invention comprises the steps of firstly analyzing the database and acquiring the implementation program of each object in the database; secondly, calculating the complexity of each object associated with other objects through the implementation program of each object; and finally, when the complexity of the association between the target object and the other objects does not exceed a preset value, controlling the target object to be in a modifiable state in the database. Therefore, the defect that the whole database is crashed to cause serious data loss due to the fact that certain objects in the database are modified blindly can be avoided, the complexity degree of the dependency of the objects to be modified and other objects can not be determined before the objects of the database are modified, the modification risk of the objects can be further evaluated, and whether the corresponding objects are modified or not can be finally determined. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Fig. 5 is a flow chart of a second embodiment of the database modification method according to the present invention. In this embodiment, the execution order of the steps in the flowchart shown in fig. 5 may be changed and some steps may be omitted according to different requirements.
Step S501, analyzing a database, and acquiring an implementation program of each object in the database. Specifically, the implementation program includes each function of the implementation object. In this embodiment, the object includes at least one of a view, a stored procedure, and a table.
Step S502, calculating the complexity of each object associated with other objects by the implementation program of each object.
Step S503, determining whether the complexity of the target object associated with the other objects exceeds a preset value. And executing step S504 when the complexity of the association between the target object and the other objects does not exceed the preset value, and otherwise executing step S505 when the complexity of the association between the target object and the other objects exceeds the preset value.
Step S504, controlling the target object to be in a modifiable state in the database.
And step S505, prompting the risk of the target object when the target object is modified in the database.
Specifically, when the complexity of the association between the target object and the other objects exceeds a preset value, the object is in a high risk state or a low risk state when modified in the database. The application server 1 prompts the risk degree, and the user evaluates whether to modify the risk degree according to actual needs.
Through the steps S501 to S505, the database modification method provided by the present invention can evaluate the risk of modification without determining the complexity of the dependency between the object to be modified and other objects, and finally determine whether to modify the corresponding object. Therefore, the safety of the database is ensured, and the ordinary maintenance process of the database is simplified.
Fig. 6 is a flow chart of a third embodiment of the database modification method according to the present invention. In this embodiment, the step of calculating the complexity associated with each object and other objects through the implementation program of each object specifically includes:
step S601, analyzing a function required for implementing each object, and analyzing an object called by the function.
Step S602, records the number of times each object is called by the function.
Step S603, determining the number of times as the complexity of the corresponding function associated with other functions.
The following is a specific example:
for example, the object is a table, the implementation program for implementing the table includes at least one function, and the table is finally implemented through the invocation of such a function. Then in the function of the implementation table, 1 view is called, and 1 storage process is called; similarly, in the implementation process of the object of the storage process, the corresponding function calls a table for 3 times and a view for 2 times; in the implementation process of the view object, the corresponding function calls 4 times of tables and 3 times of storage processes. Then in the above database implementation, the storage process is called 4 times by other objects, the table is called 7 times by other objects, and the view is called 3 times by other objects. The complexity of the association of the three objects of the view, the stored procedure and the table with other objects can be determined to be 3, 4 and 7 respectively, which indicates that the table is most associated with other objects and the modification is most easy to change in the whole database. In this embodiment, the preset value may be set according to the needs of the user, or may be an average value of the complexity of all objects associated with other objects.
Through the steps S601 to S603, the database modification method provided by the present invention can calculate the complexity of each object associated with other objects through the implementation program of each object.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (6)

1. A database modification method applied to an application server is characterized by comprising the following steps:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database, and the step of calculating the complexity of the association between each object and the other objects through the implementation program of each object specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
determining the degree of time as a complexity of the respective function in association with other functions, the method further comprising:
when the complexity of the target object and the other objects exceeds the preset value, prompting the risk of the target object when the target object is modified in the database, and prompting that the target object is in a high risk state or a low risk state when the target object is modified in the database.
2. A database modification method as claimed in claim 1, characterized in that the method further comprises:
and when the complexity of the association between the target object and the other objects exceeds the preset value, outputting prompt information aiming at the preset position of the target object in the database.
3. The database modification method according to claim 1, wherein the step of controlling the target object to be in a modifiable state in the database specifically comprises:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the target object.
4. An application server comprising a memory, a processor, and a database modification program stored on the memory and executable on the processor, the database modification program when executed by the processor implementing the steps of:
analyzing a database, and acquiring an implementation program of each object in the database;
calculating the complexity of each object associated with other objects through the implementation program of each object;
judging whether the complexity of the association between the target object and the other objects exceeds a preset value or not; and
when the complexity of the association between the target object and the other objects does not exceed the preset value, controlling the target object to be in a modifiable state in the database, and the step of calculating the complexity of the association between each object and the other objects through the implementation program of each object specifically includes:
analyzing a function required for realizing each object, and analyzing an object called by the function;
recording the times of calling each object by the function; and
determining the degree of time as the complexity of the corresponding function in relation to other functions, further comprising:
when the complexity of the target object and the other objects exceeds the preset value, prompting the risk of the target object when the target object is modified in the database, and prompting that the target object is in a high risk state or a low risk state when the target object is modified in the database.
5. The application server according to claim 4, wherein the step of controlling the target object to be in a modifiable state in the database specifically comprises:
setting the modifiable state to a text entry state, an
When the object is in the text entry state, the database may accept user modifications to the target object.
6. A computer-readable storage medium storing a database modification program executable by at least one processor to cause the at least one processor to perform the steps of the database modification method of any one of claims 1-3.
CN201710914955.1A 2017-09-30 2017-09-30 Database modification method and application server Active CN108415922B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710914955.1A CN108415922B (en) 2017-09-30 2017-09-30 Database modification method and application server
PCT/CN2018/077679 WO2019062022A1 (en) 2017-09-30 2018-02-28 Database modification method and application server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710914955.1A CN108415922B (en) 2017-09-30 2017-09-30 Database modification method and application server

Publications (2)

Publication Number Publication Date
CN108415922A CN108415922A (en) 2018-08-17
CN108415922B true CN108415922B (en) 2021-10-22

Family

ID=63125172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710914955.1A Active CN108415922B (en) 2017-09-30 2017-09-30 Database modification method and application server

Country Status (2)

Country Link
CN (1) CN108415922B (en)
WO (1) WO2019062022A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114691640A (en) * 2020-12-28 2022-07-01 网联清算有限公司 Database survival detection method and device

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1619443A (en) * 2003-09-05 2005-05-25 费舍-柔斯芒特系统股份有限公司 State machine function block with a user modifiable output configuration database
CN101188013A (en) * 2006-11-16 2008-05-28 中国银联股份有限公司 A framework system for cleaning data and its application method
CN101427243A (en) * 2006-04-21 2009-05-06 微软公司 Localising unstructured resources
CN102521259A (en) * 2011-11-18 2012-06-27 陈晓亮 User resource information on-line supply system and method
CN102737083A (en) * 2011-09-28 2012-10-17 新奥特(北京)视频技术有限公司 Instant competition information editing method and system
CN102902544A (en) * 2012-09-29 2013-01-30 福建升腾资讯有限公司 Implementation method of phone payment terminal software platform
CN102968457A (en) * 2012-10-30 2013-03-13 北京奇虎科技有限公司 Switching method and system between databases
CN103226675A (en) * 2013-03-20 2013-07-31 华中科技大学 Traceability system and traceability method for analyzing intrusion behavior
CN103455516A (en) * 2012-06-01 2013-12-18 腾讯科技(北京)有限公司 Operation platform and maintaining method for database
CN103562905A (en) * 2011-03-23 2014-02-05 新比斯安全卢森堡有限公司 Improved data visualization configuration system and method
CN103617131A (en) * 2013-11-26 2014-03-05 曙光信息产业股份有限公司 Data caching achieving method
CN103955358A (en) * 2012-09-18 2014-07-30 马维尔国际贸易有限公司 Modifiable contextual help content provided in-line within an application
CN104317974A (en) * 2014-11-21 2015-01-28 武汉理工大学 Reconfigurable multi-source data importing method in ERP system
CN105354190A (en) * 2014-08-18 2016-02-24 阿里巴巴集团控股有限公司 Numerical information transfer method and apparatus
CN105592314A (en) * 2015-12-17 2016-05-18 清华大学 Parallel decoding method and device
CN105872094A (en) * 2016-05-31 2016-08-17 山东大学 Service robot cloud platform interface system based on SOA and working method thereof
CN105912460A (en) * 2016-04-05 2016-08-31 浪潮电子信息产业股份有限公司 Software test method and system based on QTP
CN106022706A (en) * 2016-05-06 2016-10-12 米励(北京)信息技术有限公司 Holographic presentation system of E-contract main body and correlation execution process information
CN106815219A (en) * 2015-11-27 2017-06-09 阿里巴巴集团控股有限公司 The edit methods and device of database engine
CN106933733A (en) * 2015-12-30 2017-07-07 华为技术有限公司 A kind of method and apparatus for determining RAM leakage position

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1547009A1 (en) * 2002-09-20 2005-06-29 Board Of Regents The University Of Texas System Computer program products, systems and methods for information discovery and relational analyses
JP2006072769A (en) * 2004-09-02 2006-03-16 Fujitsu Ltd Circuit diagram display device, circuit diagram display method and circuit diagram display program
US20060200450A1 (en) * 2005-03-04 2006-09-07 Microsoft Corporation Monitoring health of actively executing computer applications
US9135283B2 (en) * 2009-10-07 2015-09-15 Amazon Technologies, Inc. Self-service configuration for data environment
CN102063449A (en) * 2009-11-12 2011-05-18 中国移动通信集团浙江有限公司 Method and device for improving reliability of statistic information of data object in database
CN103473499A (en) * 2013-09-16 2013-12-25 笔笔发信息技术(上海)有限公司 Acquisition device and data authorization method thereof
CN104462106A (en) * 2013-09-17 2015-03-25 鸿富锦精密工业(深圳)有限公司 Data updating method and system
CN104639521A (en) * 2013-11-15 2015-05-20 腾讯科技(深圳)有限公司 Application safety verification method and system, application server and application client
US9391902B2 (en) * 2013-12-13 2016-07-12 Red Hat, Inc. System and method for dynamic collaboration during query processing
US9753971B2 (en) * 2014-09-15 2017-09-05 Sap Se Hot deployment of embedded database procedures

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1619443A (en) * 2003-09-05 2005-05-25 费舍-柔斯芒特系统股份有限公司 State machine function block with a user modifiable output configuration database
CN101427243A (en) * 2006-04-21 2009-05-06 微软公司 Localising unstructured resources
CN101188013A (en) * 2006-11-16 2008-05-28 中国银联股份有限公司 A framework system for cleaning data and its application method
CN103562905A (en) * 2011-03-23 2014-02-05 新比斯安全卢森堡有限公司 Improved data visualization configuration system and method
CN102737083A (en) * 2011-09-28 2012-10-17 新奥特(北京)视频技术有限公司 Instant competition information editing method and system
CN102521259A (en) * 2011-11-18 2012-06-27 陈晓亮 User resource information on-line supply system and method
CN103455516A (en) * 2012-06-01 2013-12-18 腾讯科技(北京)有限公司 Operation platform and maintaining method for database
CN103955358A (en) * 2012-09-18 2014-07-30 马维尔国际贸易有限公司 Modifiable contextual help content provided in-line within an application
CN102902544A (en) * 2012-09-29 2013-01-30 福建升腾资讯有限公司 Implementation method of phone payment terminal software platform
CN102968457A (en) * 2012-10-30 2013-03-13 北京奇虎科技有限公司 Switching method and system between databases
CN103226675A (en) * 2013-03-20 2013-07-31 华中科技大学 Traceability system and traceability method for analyzing intrusion behavior
CN103617131A (en) * 2013-11-26 2014-03-05 曙光信息产业股份有限公司 Data caching achieving method
CN105354190A (en) * 2014-08-18 2016-02-24 阿里巴巴集团控股有限公司 Numerical information transfer method and apparatus
CN104317974A (en) * 2014-11-21 2015-01-28 武汉理工大学 Reconfigurable multi-source data importing method in ERP system
CN106815219A (en) * 2015-11-27 2017-06-09 阿里巴巴集团控股有限公司 The edit methods and device of database engine
CN105592314A (en) * 2015-12-17 2016-05-18 清华大学 Parallel decoding method and device
CN106933733A (en) * 2015-12-30 2017-07-07 华为技术有限公司 A kind of method and apparatus for determining RAM leakage position
CN105912460A (en) * 2016-04-05 2016-08-31 浪潮电子信息产业股份有限公司 Software test method and system based on QTP
CN106022706A (en) * 2016-05-06 2016-10-12 米励(北京)信息技术有限公司 Holographic presentation system of E-contract main body and correlation execution process information
CN105872094A (en) * 2016-05-31 2016-08-17 山东大学 Service robot cloud platform interface system based on SOA and working method thereof

Also Published As

Publication number Publication date
CN108415922A (en) 2018-08-17
WO2019062022A1 (en) 2019-04-04

Similar Documents

Publication Publication Date Title
CN107844634B (en) Modeling method of multivariate general model platform, electronic equipment and computer readable storage medium
CN108388598B (en) Electronic device, data storage method, and storage medium
CN110309125B (en) Data verification method, electronic device and storage medium
CN107689982B (en) Multi-data source data synchronization method, application server and computer readable storage medium
CN108416485B (en) User identity recognition method, electronic device and computer readable storage medium
CN111723079A (en) Data migration method and device, computer equipment and storage medium
CN107832676B (en) Table information line feed recognition method, electronic device and computer readable storage medium
CN110704521A (en) Interface data access method and system
CN108416679B (en) Device and method for issuing orders of multiple insurance products and computer readable storage medium
CN110308880B (en) Log printing method, system, computer device and computer readable storage medium
CN108241529B (en) Salary calculation method, application server and computer readable storage medium
CN107682426B (en) Interface proxy method and application server
CN108491304B (en) electronic device, business system risk control method and storage medium
CN110780883A (en) Method call chain tracking method, electronic device, and computer-readable storage medium
CN110046181B (en) Data routing method and device based on database distributed storage
CN108415922B (en) Database modification method and application server
CN110708197A (en) Monitoring device, method for setting monitoring policy of monitoring device, and storage medium
CN113886590A (en) Data summarizing method and device, computer equipment and storage medium
CN112685077A (en) Data modification method, system, computer device and computer readable storage medium
CN112001707A (en) Business workflow generation method and system based on business data
CN111984674A (en) Method and system for generating structured query language
CN112416648A (en) Data verification method and device
CN110837500A (en) Data screening method and device based on local embedded window and computer equipment
CN113535206B (en) Multi-version code upgrading method and system
CN113595762B (en) Network card configuration storage method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant