CN111209592A - Method and system for controlling data authority based on spliced SQL (structured query language) statement - Google Patents
Method and system for controlling data authority based on spliced SQL (structured query language) statement Download PDFInfo
- Publication number
- CN111209592A CN111209592A CN202010002125.3A CN202010002125A CN111209592A CN 111209592 A CN111209592 A CN 111209592A CN 202010002125 A CN202010002125 A CN 202010002125A CN 111209592 A CN111209592 A CN 111209592A
- Authority
- CN
- China
- Prior art keywords
- sql
- statement
- data
- permission
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/242—Query formulation
- G06F16/2433—Query languages
- G06F16/2448—Query languages for particular applications; for extensibility, e.g. user defined types
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Computational Linguistics (AREA)
- Automation & Control Theory (AREA)
- Mathematical Physics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to a method and a system for controlling data authority based on a spliced SQL statement, wherein the method comprises the following steps: acquiring an original SQL query statement of a user; determining a permission SQL statement fragment according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and acquiring data after controlling the data authority based on the spliced SQL query statement. According to the method provided by the invention, after the original SQL query statement of the user is obtained, the permission SQL statement fragment is determined according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for controlling data permission based on a spliced SQL statement.
Background
The background management system generally has authority management, the authority is divided into data authority and function authority, and the current authority setting is function authority, which is specifically shown in that the user can not see the menu and the user can not see the function button.
Most background management also only has functional authority, and the requirement that a user can only access data in a fixed area exists in the government affairs field, so that the data protection is increased, and the current authority management cannot meet the requirement that the user flexibly manages the data access authority.
Disclosure of Invention
Technical problem to be solved
In order to solve the above problems in the prior art, the present invention provides a method and a system for controlling data permissions based on a spliced SQL statement.
(II) technical scheme
In order to achieve the purpose, the invention adopts the main technical scheme that:
a method for controlling data permissions based on a spliced SQL statement, the method comprising:
s101, acquiring an original SQL query statement of a user;
s102, determining a permission SQL statement fragment according to the identity information of the user;
s103, splicing the permission SQL statement fragment and the original SQL query statement;
and S104, acquiring data after controlling the data authority based on the spliced SQL query statement.
Optionally, the permission SQL statement segment includes a row SQL statement segment and a column SQL statement segment;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
Optionally, the row SQL statement segment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
Optionally, the original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form;
the S103 specifically includes:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
In order to achieve the above purpose, the main technical solution adopted by the present invention further comprises:
a system for controlling data permissions based on concatenated SQL statements, the system comprising: the management service module and the authority service module;
the management service module is connected with the authority service module;
the authority service module is used for storing the corresponding relation between the user identity information and the data authority;
the management service module is used for acquiring an original SQL query statement of a user, determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
Optionally, the management service module includes: a service processing layer and a data query layer;
the service processing layer is connected with the data query layer;
the data query layer is connected with the authority service module;
the data query layer is connected with a database;
the business processing layer is used for acquiring an original SQL query statement of a user;
the data query layer is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement;
and the service processing layer is also used for displaying the data after controlling the data authority.
Optionally, the data query layer includes: an interceptor and an inquirer;
the interceptor is connected with the querier;
the interceptor is connected with the authority service module;
the interceptor is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, and splicing the permission SQL statement fragment and the original SQL query statement;
and the querier is used for acquiring the data after controlling the data authority based on the spliced SQL query statement.
Optionally, the permission SQL statement segment includes a row SQL statement segment and a column SQL statement segment;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
Optionally, the row SQL statement segment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
Optionally, the original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form;
the splicing the permission SQL statement fragment and the original SQL query statement comprises the following steps:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
(III) advantageous effects
The invention has the beneficial effects that: after an original SQL query statement of a user is obtained, determining an authority SQL statement fragment according to identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.
Drawings
Fig. 1 is a schematic flowchart of a method for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a system for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another method for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application;
fig. 4 is a schematic application interface diagram of another method for controlling data permissions based on a concatenated SQL statement according to an embodiment of the present application.
Detailed Description
For the purpose of better explaining the present invention and to facilitate understanding, the present invention will be described in detail by way of specific embodiments with reference to the accompanying drawings.
The background management system generally has authority management, the authority is divided into data authority and function authority, and the current authority setting is function authority, which is specifically shown in that the user can not see the menu and the user can not see the function button.
Most background management also only has functional authority, and the requirement that a user can only access data in a fixed area exists in the government affairs field, so that the data protection is increased, and the current authority management cannot meet the requirement that the user flexibly manages the data access authority.
Based on the method and the system, after the original SQL query statement of the user is obtained, the permission SQL statement segment is determined according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.
Specifically, referring to fig. 1, the specific process provided in this embodiment is as follows:
s101, acquiring an original SQL query statement of a user.
Each original SQL query statement has an ID to identify uniqueness, and includes a key (e.g., select, from, where, etc.) and a variable (e.g., kf _ sec _ user), where the key includes at least select and form.
For example, select from kf sec user where 1 is 1.
S102, determining the permission SQL statement segment according to the identity information of the user.
The permission SQL statement fragments comprise row SQL statement fragments and column SQL statement fragments.
And the SQL statement segment is used for controlling the accessed data volume.
And the column SQL statement fragment is used for controlling the displayed data fields.
Specifically, the row SQL statement segment is: an authority variable and an authority variable value.
The column SQL statement fragments are: the field name.
The identity information of the user in this step may be a user name of the user login, and the like.
The permission SQL statement fragment in the step also has an ID as a unique identifier, and the permission SQL statement fragment is divided into two types, namely a row SQL statement fragment and a column SQL statement fragment.
And the SQL statement fragment is responsible for screening the data volume. The number of the line SQL statement fragments can be multiple, and the line SQL statement fragments are connected by using an AND.
For example, the row SQL statement fragments are as follows:
user _ id ═ admin 'and user _ name ═ administrator'
Wherein, user _ id is the authority variable value, and admin is the authority variable value. The user _ name is a permission variable value, and the administrator is a permission variable value.
The column SQL statement fragment controls whether the field displays data or not, a plurality of column SQL statement fragments can be provided, and the plurality of column SQL statement fragments are connected by commas.
For example, the column SQL statement fragments are as follows:
user_id,user_name,user_qq
wherein, the user _ id, the user _ name and the user _ qq are field names.
S103, splicing the permission SQL statement fragments and the original SQL query statement.
The original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form.
When the steps are spliced, column SQL statement pieces are spliced between select and form, and row SQL statement pieces are spliced into the original SQL query statement through the keywords and.
Namely, the splicing formula is: select (column control SQL) from table name where 1and (row control SQL and ….)
For example, the spliced SQL query statement is as follows:
select user _ id, user _ name, user _ qq from where 1 ═ 1and (user _ id ═ admin 'and user _ name ═ administrator')
And S104, acquiring data after controlling the data authority based on the spliced SQL query statement.
The method provided by the embodiment can limit the display of the row data and the column data according to the data authority. Can be separated from the function authority and can be well integrated with the function authority. And multi-database support is achieved. Data permissions support paging.
In addition, the method provided by the embodiment can improve the business development function of software developers, and the business developers do not need to know the data authority.
The method for controlling data permission based on the spliced SQL statement provided by this embodiment can be implemented by the system for controlling data permission based on the spliced SQL statement shown in fig. 2. The system comprises: a management service module and a permission service module.
The management service module is connected with the authority service module.
1. Authority service module
And the authority service module is used for storing the corresponding relation between the user identity information and the data authority.
In specific implementation, the corresponding relationship between the user identity information and the data authority can be set through the interface shown in fig. 4.
2. Management service module
And the management service module is used for acquiring an original SQL query statement of the user, determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
Specifically, the management service module includes: a service processing layer and a data query layer.
The business processing layer is connected with the data query layer.
The data inquiry layer is connected with the authority service module.
The data query layer is connected with the database.
And the business processing layer is used for acquiring the original SQL query statement of the user.
And the data query layer is used for determining the permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
And the service processing layer is also used for displaying the data after controlling the data authority.
In addition, the data query layer comprises: interceptor and querier.
The interceptor is connected with the querier.
The interceptor is connected with the authority service module.
And the interceptor is used for determining the permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, and splicing the permission SQL statement fragment and the original SQL query statement.
And the querier is used for acquiring the data after controlling the data authority based on the spliced SQL query statement.
The permission SQL statement fragments comprise row SQL statement fragments and column SQL statement fragments.
And the SQL statement segment is used for controlling the accessed data volume.
And the column SQL statement fragment is used for controlling the displayed data fields.
The row SQL statement fragments are: an authority variable and an authority variable value.
The column SQL statement fragments are: the field name.
The original SQL query statement comprises keywords and variables, wherein the keywords at least comprise select and form.
Splicing the permission SQL statement fragment and the original SQL query statement, comprising the following steps:
and splicing the column SQL statement pieces between select and form, and splicing the row SQL statement pieces into the original SQL query statement through the keywords and.
As shown in fig. 3, after the user performs the business operation, the business processing layer sends the original SQL query statement of the user to the interceptor, the interceptor determines the permission SQL statement fragment according to the identity information of the user, then splices the permission SQL statement fragment with the original SQL query statement, and finally performs data query based on the spliced SQL.
In the system for controlling data permission based on the spliced SQL statement provided by this embodiment, the service processing layer calls the data interception layer, and the data interception layer processes data. The interceptor queries the related authority SQL statement segment according to the user information. And synthesizing and splicing the queried permission SQL statement segment and the original SQL query statement, and then querying data based on the spliced SQL.
In the method provided by the embodiment, after the original SQL query statement of the user is obtained, the permission SQL statement fragment is determined according to the identity information of the user; splicing the permission SQL statement fragment and the original SQL query statement; and data after controlling the data authority is obtained based on the spliced SQL query statement, so that the flexible control of the data authority is realized.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Finally, it should be noted that: the above-mentioned embodiments are only used for illustrating the technical solution of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. A method for controlling data authority based on a spliced SQL statement is characterized by comprising the following steps:
s101, acquiring an original SQL query statement of a user;
s102, determining a permission SQL statement fragment according to the identity information of the user;
s103, splicing the permission SQL statement fragment and the original SQL query statement;
and S104, acquiring data after controlling the data authority based on the spliced SQL query statement.
2. The method of claim 1, wherein the permission SQL statement fragments comprise row SQL statement fragments and column SQL statement fragments;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
3. The method of claim 2, wherein the row SQL statement fragment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
4. The method of claim 2, wherein the original SQL query statement comprises keywords and variables, wherein the keywords comprise at least select and form;
the S103 specifically includes:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
5. A system for controlling data permissions based on concatenated SQL statements, the system comprising: the management service module and the authority service module;
the management service module is connected with the authority service module;
the authority service module is used for storing the corresponding relation between the user identity information and the data authority;
the management service module is used for acquiring an original SQL query statement of a user, determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement.
6. The system of claim 5, wherein the management service module comprises: a service processing layer and a data query layer;
the service processing layer is connected with the data query layer;
the data query layer is connected with the authority service module;
the data query layer is connected with a database;
the business processing layer is used for acquiring an original SQL query statement of a user;
the data query layer is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, splicing the permission SQL statement fragment and the original SQL query statement, and acquiring data after controlling the data permission based on the spliced SQL query statement;
and the service processing layer is also used for displaying the data after controlling the data authority.
7. The system of claim 6, wherein the data query layer comprises: an interceptor and an inquirer;
the interceptor is connected with the querier;
the interceptor is connected with the authority service module;
the interceptor is used for determining a permission SQL statement fragment according to the identity information of the user and the corresponding relation between the user identity information and the data permission stored by the permission service module, and splicing the permission SQL statement fragment and the original SQL query statement;
and the querier is used for acquiring the data after controlling the data authority based on the spliced SQL query statement.
8. The system according to claim 5, 6 or 7, wherein the permission SQL statement fragment comprises a row SQL statement fragment and a column SQL statement fragment;
the line SQL statement segment is used for controlling the accessed data volume;
and the column SQL statement fragment is used for controlling the displayed data field.
9. The system of claim 8, wherein the row SQL statement fragment is: authority variables and authority variable values;
the column SQL statement fragments are as follows: the field name.
10. The system of claim 8, wherein the original SQL query statement comprises keywords and variables, wherein the keywords comprise at least select and form;
the splicing the permission SQL statement fragment and the original SQL query statement comprises the following steps:
and splicing the column SQL statement pieces between select and form, splicing the row SQL statement pieces into the original SQL query statement through keywords and, and finally.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010002125.3A CN111209592A (en) | 2020-01-02 | 2020-01-02 | Method and system for controlling data authority based on spliced SQL (structured query language) statement |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010002125.3A CN111209592A (en) | 2020-01-02 | 2020-01-02 | Method and system for controlling data authority based on spliced SQL (structured query language) statement |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111209592A true CN111209592A (en) | 2020-05-29 |
Family
ID=70787172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010002125.3A Pending CN111209592A (en) | 2020-01-02 | 2020-01-02 | Method and system for controlling data authority based on spliced SQL (structured query language) statement |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111209592A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112347469A (en) * | 2020-11-10 | 2021-02-09 | 浙江百应科技有限公司 | Low-intrusion data authority processing method and system and electronic equipment thereof |
CN112926071A (en) * | 2021-03-03 | 2021-06-08 | 浪潮云信息技术股份公司 | Multi-level data authority control method based on government affair cloud management platform |
CN113282591A (en) * | 2021-06-29 | 2021-08-20 | 深圳平安智汇企业信息管理有限公司 | Authority filtering method and device, computer equipment and storage medium |
CN113378217A (en) * | 2021-06-02 | 2021-09-10 | 浪潮软件股份有限公司 | Data authority control module, data access system and data access method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106469282A (en) * | 2015-08-21 | 2017-03-01 | 阿里巴巴集团控股有限公司 | data access authority control method and device |
CN107392053A (en) * | 2017-08-11 | 2017-11-24 | 四川长虹电器股份有限公司 | A kind of data permission control method in enterprise staff information database |
CN107403106A (en) * | 2017-07-18 | 2017-11-28 | 北京计算机技术及应用研究所 | Database fine-grained access control method based on terminal user |
-
2020
- 2020-01-02 CN CN202010002125.3A patent/CN111209592A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106469282A (en) * | 2015-08-21 | 2017-03-01 | 阿里巴巴集团控股有限公司 | data access authority control method and device |
CN107403106A (en) * | 2017-07-18 | 2017-11-28 | 北京计算机技术及应用研究所 | Database fine-grained access control method based on terminal user |
CN107392053A (en) * | 2017-08-11 | 2017-11-24 | 四川长虹电器股份有限公司 | A kind of data permission control method in enterprise staff information database |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112347469A (en) * | 2020-11-10 | 2021-02-09 | 浙江百应科技有限公司 | Low-intrusion data authority processing method and system and electronic equipment thereof |
CN112926071A (en) * | 2021-03-03 | 2021-06-08 | 浪潮云信息技术股份公司 | Multi-level data authority control method based on government affair cloud management platform |
CN113378217A (en) * | 2021-06-02 | 2021-09-10 | 浪潮软件股份有限公司 | Data authority control module, data access system and data access method |
CN113282591A (en) * | 2021-06-29 | 2021-08-20 | 深圳平安智汇企业信息管理有限公司 | Authority filtering method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111209592A (en) | Method and system for controlling data authority based on spliced SQL (structured query language) statement | |
US9558218B2 (en) | Truncating data associated with objects in a multi-tenant database | |
US8682859B2 (en) | Transferring records between tables using a change transaction log | |
US8001077B2 (en) | Distributed method for synchronizing and updating bookmarks on multiple computer devices | |
CN109783543B (en) | Data query method, device, equipment and storage medium | |
CN106156088B (en) | Index data processing method, data query method and device | |
CN109726244A (en) | Data lead-in method and device | |
CA2461871A1 (en) | An efficient index structure to access hierarchical data in a relational database system | |
US20090106216A1 (en) | Push-model based index updating | |
CN105808702A (en) | Page content refreshing method and system, and page content synchronous refreshing management system | |
US8196134B2 (en) | Network service for a software change catalog | |
CN111047434B (en) | Operation record generation method and device, computer equipment and storage medium | |
CN113568924A (en) | Data processing method and device, electronic equipment and storage medium | |
US20070050420A1 (en) | Method and apparatus for transferring data between databases | |
US20110302220A1 (en) | Sql processing for data conversion | |
CN113377876B (en) | Data database processing method, device and platform based on Domino platform | |
CN106708946A (en) | Universal API table query method | |
US8819668B2 (en) | Accessible limited distribution release software change catalog | |
CN112434037A (en) | Data processing method, processing device, data processing apparatus, and storage medium | |
CN111552861A (en) | Webpage dynamic desensitization method | |
US20060129527A1 (en) | Method and device for accessing a database | |
US20040153447A1 (en) | Method of and apparatus for distributing data, and computer program | |
US9047378B1 (en) | Systems and methods for accessing a multi-organization collection of hosted contacts | |
US11556515B2 (en) | Artificially-intelligent, continuously-updating, centralized-database-identifier repository system | |
CN112131232B (en) | Metadata-based elastic search data synchronization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200529 |