CN111209592A - Method and system for controlling data authority based on spliced SQL (structured query language) statement - Google Patents

Method and system for controlling data authority based on spliced SQL (structured query language) statement Download PDF

Info

Publication number
CN111209592A
CN111209592A CN202010002125.3A CN202010002125A CN111209592A CN 111209592 A CN111209592 A CN 111209592A CN 202010002125 A CN202010002125 A CN 202010002125A CN 111209592 A CN111209592 A CN 111209592A
Authority
CN
China
Prior art keywords
sql
statement
data
permission
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010002125.3A
Other languages
Chinese (zh)
Inventor
麦锦超
谭亮亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Kamfu Technology Co ltd
Original Assignee
Guangdong Kamfu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Kamfu Technology Co ltd filed Critical Guangdong Kamfu Technology Co ltd
Priority to CN202010002125.3A priority Critical patent/CN111209592A/en
Publication of CN111209592A publication Critical patent/CN111209592A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • G06F16/2448Query languages for particular applications; for extensibility, e.g. user defined types
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Automation & Control Theory (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a method and a system for controlling data authority based on a spliced SQL statement, wherein the method comprises the following steps: acquiring an original SQL query statement of a user; determining a permission SQL statement fragment according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and acquiring data after controlling the data authority based on the spliced SQL query statement. According to the method provided by the invention, after the original SQL query statement of the user is obtained, the permission SQL statement fragment is determined according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.

Description

Method and system for controlling data authority based on spliced SQL (structured query language) statement
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for controlling data permission based on a spliced SQL statement.
Background
The background management system generally has authority management, the authority is divided into data authority and function authority, and the current authority setting is function authority, which is specifically shown in that the user can not see the menu and the user can not see the function button.
Most background management also only has functional authority, and the requirement that a user can only access data in a fixed area exists in the government affairs field, so that the data protection is increased, and the current authority management cannot meet the requirement that the user flexibly manages the data access authority.
Disclosure of Invention
Technical problem to be solved
In order to solve the above problems in the prior art, the present invention provides a method and a system for controlling data permissions based on a spliced SQL statement.
(II) technical scheme
In order to achieve the purpose, the invention adopts the main technical scheme that:
a method for controlling data permissions based on a spliced SQL statement, the method comprising:
s101, acquiring an original SQL query statement of a user;
s102, determining a permission SQL statement fragment according to the identity information of the user;
s103, splicing the permission SQL statement fragment and the original SQL query statement;
and S104, acquiring data after controlling the data authority based on the spliced SQL query statement.
Optionally, the permission SQL statement segment includes a row SQL statement segment and a column SQL statement segment;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
Optionally, the row SQL statement segment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
Optionally, the original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form;
the S103 specifically includes:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
In order to achieve the above purpose, the main technical solution adopted by the present invention further comprises:
a system for controlling data permissions based on concatenated SQL statements, the system comprising: the management service module and the authority service module;
the management service module is connected with the authority service module;
the authority service module is used for storing the corresponding relation between the user identity information and the data authority;
the management service module is used for acquiring an original SQL query statement of a user, determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
Optionally, the management service module includes: a service processing layer and a data query layer;
the service processing layer is connected with the data query layer;
the data query layer is connected with the authority service module;
the data query layer is connected with a database;
the business processing layer is used for acquiring an original SQL query statement of a user;
the data query layer is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement;
and the service processing layer is also used for displaying the data after controlling the data authority.
Optionally, the data query layer includes: an interceptor and an inquirer;
the interceptor is connected with the querier;
the interceptor is connected with the authority service module;
the interceptor is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, and splicing the permission SQL statement fragment and the original SQL query statement;
and the querier is used for acquiring the data after controlling the data authority based on the spliced SQL query statement.
Optionally, the permission SQL statement segment includes a row SQL statement segment and a column SQL statement segment;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
Optionally, the row SQL statement segment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
Optionally, the original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form;
the splicing the permission SQL statement fragment and the original SQL query statement comprises the following steps:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
(III) advantageous effects
The invention has the beneficial effects that: after an original SQL query statement of a user is obtained, determining an authority SQL statement fragment according to identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.
Drawings
Fig. 1 is a schematic flowchart of a method for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a system for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another method for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application;
fig. 4 is a schematic application interface diagram of another method for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application.
Detailed Description
For the purpose of better explaining the present invention and to facilitate understanding, the present invention will be described in detail by way of specific embodiments with reference to the accompanying drawings.
The background management system generally has authority management, the authority is divided into data authority and function authority, and the current authority setting is function authority, which is specifically shown in that the user can not see the menu and the user can not see the function button.
Most background management also only has functional authority, and the requirement that a user can only access data in a fixed area exists in the government affairs field, so that the data protection is increased, and the current authority management cannot meet the requirement that the user flexibly manages the data access authority.
Based on the method and the system, after the original SQL query statement of the user is obtained, the permission SQL statement segment is determined according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.
Specifically, referring to fig. 1, the specific process provided in this embodiment is as follows:
s101, acquiring an original SQL query statement of a user.
Each original SQL query statement has an ID to identify uniqueness, and includes a key (e.g., select, from, where, etc.) and a variable (e.g., kf _ sec _ user), where the key includes at least select and form.
For example, select from kf sec user where 1 is 1.
S102, determining the permission SQL statement segment according to the identity information of the user.
The permission SQL statement fragments comprise row SQL statement fragments and column SQL statement fragments.
And the SQL statement segment is used for controlling the accessed data volume.
And the column SQL statement fragment is used for controlling the displayed data fields.
Specifically, the row SQL statement segment is: an authority variable and an authority variable value.
The column SQL statement fragments are: the field name.
The identity information of the user in this step may be a user name of the user login, and the like.
The permission SQL statement fragment in the step also has an ID as a unique identifier, and the permission SQL statement fragment is divided into two types, namely a row SQL statement fragment and a column SQL statement fragment.
And the SQL statement fragment is responsible for screening the data volume. The number of the line SQL statement fragments can be multiple, and the line SQL statement fragments are connected by using an AND.
For example, the row SQL statement fragments are as follows:
user _ id ═ admin 'and user _ name ═ administrator'
Wherein, user _ id is the authority variable value, and admin is the authority variable value. The user _ name is a permission variable value, and the administrator is a permission variable value.
The column SQL statement fragment controls whether the field displays data or not, a plurality of column SQL statement fragments can be provided, and the plurality of column SQL statement fragments are connected by commas.
For example, the column SQL statement fragments are as follows:
user_id,user_name,user_qq
wherein, the user _ id, the user _ name and the user _ qq are field names.
S103, splicing the permission SQL statement fragments and the original SQL query statement.
The original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form.
When the steps are spliced, column SQL statement pieces are spliced between select and form, and row SQL statement pieces are spliced into the original SQL query statement through the keywords and.
Namely, the splicing formula is: select (column control SQL) from table name where 1and (row control SQL and ….)
For example, the spliced SQL query statement is as follows:
select user _ id, user _ name, user _ qq from where 1 ═ 1and (user _ id ═ admin 'and user _ name ═ administrator')
And S104, acquiring data after controlling the data authority based on the spliced SQL query statement.
The method provided by the embodiment can limit the display of the row data and the column data according to the data authority. Can be separated from the function authority and can be well integrated with the function authority. And multi-database support is achieved. Data permissions support paging.
In addition, the method provided by the embodiment can improve the business development function of software developers, and the business developers do not need to know the data authority.
The method for controlling data permission based on the spliced SQL statement provided by this embodiment can be implemented by the system for controlling data permission based on the spliced SQL statement shown in fig. 2. The system comprises: a management service module and a permission service module.
The management service module is connected with the authority service module.
1. Authority service module
And the authority service module is used for storing the corresponding relation between the user identity information and the data authority.
In specific implementation, the corresponding relationship between the user identity information and the data authority can be set through the interface shown in fig. 4.
2. Management service module
And the management service module is used for acquiring an original SQL query statement of the user, determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
Specifically, the management service module includes: a service processing layer and a data query layer.
The business processing layer is connected with the data query layer.
The data inquiry layer is connected with the authority service module.
The data query layer is connected with the database.
And the business processing layer is used for acquiring the original SQL query statement of the user.
And the data query layer is used for determining the permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
And the service processing layer is also used for displaying the data after controlling the data authority.
In addition, the data query layer comprises: interceptor and querier.
The interceptor is connected with the querier.
The interceptor is connected with the authority service module.
And the interceptor is used for determining the permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, and splicing the permission SQL statement fragment and the original SQL query statement.
And the querier is used for acquiring the data after controlling the data authority based on the spliced SQL query statement.
The permission SQL statement fragments comprise row SQL statement fragments and column SQL statement fragments.
And the SQL statement segment is used for controlling the accessed data volume.
And the column SQL statement fragment is used for controlling the displayed data fields.
The row SQL statement fragments are: an authority variable and an authority variable value.
The column SQL statement fragments are: the field name.
The original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form.
Splicing the permission SQL statement fragment and the original SQL query statement, comprising the following steps:
and splicing the column SQL statement pieces between select and form, and splicing the row SQL statement pieces into the original SQL query statement through the keywords and.
As shown in fig. 3, after the user performs the business operation, the business processing layer sends the original SQL query statement of the user to the interceptor, the interceptor determines the permission SQL statement fragment according to the identity information of the user, then splices the permission SQL statement fragment with the original SQL query statement, and finally performs data query based on the spliced SQL.
In the system for controlling data permission based on the spliced SQL statement provided by this embodiment, the service processing layer calls the data interception layer, and the data interception layer processes data. The interceptor queries the related authority SQL statement segment according to the user information. And synthesizing and splicing the queried permission SQL statement segment and the original SQL query statement, and then querying data based on the spliced SQL.
In the method provided by the embodiment, after the original SQL query statement of the user is obtained, the permission SQL statement fragment is determined according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Finally, it should be noted that: the above-mentioned embodiments are only used for illustrating the technical solution of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for controlling data authority based on a spliced SQL statement is characterized by comprising the following steps:
s101, acquiring an original SQL query statement of a user;
s102, determining a permission SQL statement fragment according to the identity information of the user;
s103, splicing the permission SQL statement fragment and the original SQL query statement;
and S104, acquiring data after controlling the data authority based on the spliced SQL query statement.
2. The method of claim 1, wherein the permission SQL statement fragments comprise row SQL statement fragments and column SQL statement fragments;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
3. The method of claim 2, wherein the row SQL statement fragment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
4. The method of claim 2, wherein the original SQL query statement comprises keywords and variables, wherein the keywords comprise at least select and form;
the S103 specifically includes:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
5. A system for controlling data permissions based on concatenated SQL statements, the system comprising: the management service module and the authority service module;
the management service module is connected with the authority service module;
the authority service module is used for storing the corresponding relation between the user identity information and the data authority;
the management service module is used for acquiring an original SQL query statement of a user, determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
6. The system of claim 5, wherein the management service module comprises: a service processing layer and a data query layer;
the service processing layer is connected with the data query layer;
the data query layer is connected with the authority service module;
the data query layer is connected with a database;
the business processing layer is used for acquiring an original SQL query statement of a user;
the data query layer is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement;
and the service processing layer is also used for displaying the data after controlling the data authority.
7. The system of claim 6, wherein the data query layer comprises: an interceptor and an inquirer;
the interceptor is connected with the querier;
the interceptor is connected with the authority service module;
the interceptor is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, and splicing the permission SQL statement fragment and the original SQL query statement;
and the querier is used for acquiring the data after controlling the data authority based on the spliced SQL query statement.
8. The system according to claim 5, 6 or 7, wherein the permission SQL statement fragment comprises a row SQL statement fragment and a column SQL statement fragment;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
9. The system of claim 8, wherein the row SQL statement fragment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
10. The system of claim 8, wherein the original SQL query statement comprises keywords and variables, wherein the keywords comprise at least select and form;
the splicing the permission SQL statement fragment and the original SQL query statement comprises the following steps:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
CN202010002125.3A 2020-01-02 2020-01-02 Method and system for controlling data authority based on spliced SQL (structured query language) statement Pending CN111209592A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010002125.3A CN111209592A (en) 2020-01-02 2020-01-02 Method and system for controlling data authority based on spliced SQL (structured query language) statement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010002125.3A CN111209592A (en) 2020-01-02 2020-01-02 Method and system for controlling data authority based on spliced SQL (structured query language) statement

Publications (1)

Publication Number Publication Date
CN111209592A true CN111209592A (en) 2020-05-29

Family

ID=70787172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010002125.3A Pending CN111209592A (en) 2020-01-02 2020-01-02 Method and system for controlling data authority based on spliced SQL (structured query language) statement

Country Status (1)

Country Link
CN (1) CN111209592A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112347469A (en) * 2020-11-10 2021-02-09 浙江百应科技有限公司 Low-intrusion data authority processing method and system and electronic equipment thereof
CN112926071A (en) * 2021-03-03 2021-06-08 浪潮云信息技术股份公司 Multi-level data authority control method based on government affair cloud management platform
CN113282591A (en) * 2021-06-29 2021-08-20 深圳平安智汇企业信息管理有限公司 Authority filtering method and device, computer equipment and storage medium
CN113378217A (en) * 2021-06-02 2021-09-10 浪潮软件股份有限公司 Data authority control module, data access system and data access method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106469282A (en) * 2015-08-21 2017-03-01 阿里巴巴集团控股有限公司 data access authority control method and device
CN107392053A (en) * 2017-08-11 2017-11-24 四川长虹电器股份有限公司 A kind of data permission control method in enterprise staff information database
CN107403106A (en) * 2017-07-18 2017-11-28 北京计算机技术及应用研究所 Database fine-grained access control method based on terminal user

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106469282A (en) * 2015-08-21 2017-03-01 阿里巴巴集团控股有限公司 data access authority control method and device
CN107403106A (en) * 2017-07-18 2017-11-28 北京计算机技术及应用研究所 Database fine-grained access control method based on terminal user
CN107392053A (en) * 2017-08-11 2017-11-24 四川长虹电器股份有限公司 A kind of data permission control method in enterprise staff information database

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112347469A (en) * 2020-11-10 2021-02-09 浙江百应科技有限公司 Low-intrusion data authority processing method and system and electronic equipment thereof
CN112926071A (en) * 2021-03-03 2021-06-08 浪潮云信息技术股份公司 Multi-level data authority control method based on government affair cloud management platform
CN113378217A (en) * 2021-06-02 2021-09-10 浪潮软件股份有限公司 Data authority control module, data access system and data access method
CN113282591A (en) * 2021-06-29 2021-08-20 深圳平安智汇企业信息管理有限公司 Authority filtering method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111209592A (en) Method and system for controlling data authority based on spliced SQL (structured query language) statement
US9558218B2 (en) Truncating data associated with objects in a multi-tenant database
US8682859B2 (en) Transferring records between tables using a change transaction log
US8001077B2 (en) Distributed method for synchronizing and updating bookmarks on multiple computer devices
CN109783543B (en) Data query method, device, equipment and storage medium
CN106156088B (en) Index data processing method, data query method and device
CN109726244A (en) Data lead-in method and device
CA2461871A1 (en) An efficient index structure to access hierarchical data in a relational database system
US20090106216A1 (en) Push-model based index updating
CN105808702A (en) Page content refreshing method and system, and page content synchronous refreshing management system
US8196134B2 (en) Network service for a software change catalog
CN111047434B (en) Operation record generation method and device, computer equipment and storage medium
CN113568924A (en) Data processing method and device, electronic equipment and storage medium
US20070050420A1 (en) Method and apparatus for transferring data between databases
US20110302220A1 (en) Sql processing for data conversion
CN113377876B (en) Data database processing method, device and platform based on Domino platform
CN106708946A (en) Universal API table query method
US8819668B2 (en) Accessible limited distribution release software change catalog
CN112434037A (en) Data processing method, processing device, data processing apparatus, and storage medium
CN111552861A (en) Webpage dynamic desensitization method
US20060129527A1 (en) Method and device for accessing a database
US20040153447A1 (en) Method of and apparatus for distributing data, and computer program
US9047378B1 (en) Systems and methods for accessing a multi-organization collection of hosted contacts
US11556515B2 (en) Artificially-intelligent, continuously-updating, centralized-database-identifier repository system
CN112131232B (en) Metadata-based elastic search data synchronization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200529