CN116860311A - Script analysis method, script analysis device, computer equipment and storage medium - Google Patents

Script analysis method, script analysis device, computer equipment and storage medium Download PDF

Info

Publication number
CN116860311A
CN116860311A CN202310884141.3A CN202310884141A CN116860311A CN 116860311 A CN116860311 A CN 116860311A CN 202310884141 A CN202310884141 A CN 202310884141A CN 116860311 A CN116860311 A CN 116860311A
Authority
CN
China
Prior art keywords
script
sql script
auditing
sql
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310884141.3A
Other languages
Chinese (zh)
Inventor
方琛
张�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Health Insurance Company of China Ltd
Original Assignee
Ping An Health Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Health Insurance Company of China Ltd filed Critical Ping An Health Insurance Company of China Ltd
Priority to CN202310884141.3A priority Critical patent/CN116860311A/en
Publication of CN116860311A publication Critical patent/CN116860311A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Databases & Information Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Mathematical Physics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the application belongs to the field of big data and the field of financial science and technology, and relates to a script analysis method, which comprises the following steps: receiving an sql script submitted by a user; performing quality inspection on the sql script, and judging whether the sql script passes the quality inspection or not; if yes, acquiring the function information of the sql script; classifying the sql script based on the function information, and generating classification information of the sql script; acquiring a target auditing rule corresponding to the classification information from preset auditing rules; and auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script. The application also provides a script analysis device, computer equipment and a storage medium. In addition, the application also relates to a blockchain technology, and script auditing results can be stored in the blockchain. The application can be applied to a step auditing scene in the financial field, effectively improves the auditing efficiency of the sql script, and ensures the accuracy of the generated script auditing result.

Description

Script analysis method, script analysis device, computer equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies and financial technologies, and in particular, to a script analysis method, a script analysis device, a computer device, and a storage medium.
Background
In daily database development and maintenance work of a financial science and technology company, developers of the financial science and technology company need to transfer a well-developed sql script to a production database for execution, but if the execution of the sql script is not fully evaluated, the execution of the sql script in the production database may cause unpredictable results, and serious system breakdown of a production service may even be caused.
The current sql script evaluation scheme adopted by finance and technology companies is usually a mode of manual auditing by using dba. Before each delivery, a developer needs to actively submit the sql script to dba for auditing, or dba actively inquires related contents in the sql script from related development, so as to perform auditing work before execution. However, after the manual verification is passed, the content of the sql script cannot be ensured to be changed, or the auditor cannot be informed of the change in time to review in time after the change, and the online risk still exists. Although the mode based on manual examination of the sql script can effectively avoid some obvious sql script problems, due to the number of scripts and the manpower problems, the condition that the sql script cannot be examined in time or the manual omission occurs often, and some subjective judgment factors exist, so that the compliance problem of the sql script cannot be accurately judged according to the established rule, meanwhile, the manual cost is greatly occupied, the examination efficiency of the sql script is low, and the accuracy of the examination result of the generated sql script cannot be ensured.
Disclosure of Invention
The embodiment of the application aims to provide a script analysis method, a script analysis device, computer equipment and a storage medium, which are used for solving the technical problems that the auditing efficiency of an sql script is low and the accuracy of the auditing result of the generated sql script cannot be ensured in the existing manual auditing mode of the sql script.
In order to solve the technical problems, the embodiment of the application provides a script analysis method, which adopts the following technical scheme:
receiving an sql script submitted by a user;
performing quality inspection on the sql script, and judging whether the sql script passes the quality inspection or not;
if yes, acquiring the function information of the sql script;
classifying the sql script based on the function information, and generating classification information of the sql script;
acquiring a target auditing rule corresponding to the classification information from preset auditing rules;
and auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script.
Further, the step of performing an audit process on the sql script based on the target audit rule to generate a script audit result corresponding to the sql script specifically includes:
Analyzing the sql script to obtain corresponding analysis data;
performing verification processing on the analysis data based on the target auditing rule to generate a corresponding data verification result;
and generating a script auditing result of the sql script based on the data checking result.
Further, after the step of performing an audit process on the sql script based on the target audit rule to generate a script audit result corresponding to the sql script, the method further includes:
obtaining auditing overview information corresponding to the sql script;
and visually displaying the script auditing result and the auditing overview information.
Further, after the step of performing an audit process on the sql script based on the target audit rule to generate a script audit result corresponding to the sql script, the method further includes:
judging whether the script auditing result is that auditing is not passed;
if yes, acquiring an abnormal type of the sql script from the audit overview information, and acquiring an abnormal modification mode corresponding to the abnormal type;
and modifying the sql script based on an abnormal modification mode corresponding to the abnormal type, and generating a modified target sql script.
Further, after the step of performing an audit process on the sql script based on the target audit rule to generate a script audit result corresponding to the sql script, the method further includes:
judging whether the script auditing result is that auditing is not passed;
if yes, acquiring auditing risk information corresponding to the sql script from the acquired auditing overview information;
and generating a target risk level of the sql script based on the audit risk information.
Further, the step of generating the target risk level of the sql script based on the audit risk information specifically includes:
acquiring high risk level number, medium risk level number, low risk level number and early warning level number from the audit risk information;
acquiring weight values respectively corresponding to the high risk level number, the medium risk level number, the low risk level number and the early warning level number;
calculating the high risk level number, the medium risk level number, the low risk level number and the early warning level number based on the weight value, and generating a corresponding risk score;
and generating a target risk level of the sql script based on the risk score.
Further, after the step of generating the target risk level of the sql script based on the risk score, the method further includes:
generating a target processing priority level corresponding to the sql script based on the target risk level;
acquiring a preset sql script processing sequence table;
and updating the sql script processing sequence table based on the target processing priority.
In order to solve the technical problems, the embodiment of the application also provides a script analysis device, which adopts the following technical scheme:
the receiving module is used for receiving the sql script submitted by the user;
the verification module is used for carrying out quality inspection on the sql script and judging whether the sql script passes the quality inspection or not;
the first acquisition module is used for acquiring the function information of the sql script if yes;
the classification module is used for classifying the sql script based on the functional information and generating classification information of the sql script;
the second acquisition module is used for acquiring a target auditing rule corresponding to the classification information from preset auditing rules;
the first generation module is used for conducting auditing processing on the sql script based on the target auditing rule and generating a script auditing result corresponding to the sql script.
In order to solve the above technical problems, the embodiment of the present application further provides a computer device, which adopts the following technical schemes:
receiving an sql script submitted by a user;
performing quality inspection on the sql script, and judging whether the sql script passes the quality inspection or not;
if yes, acquiring the function information of the sql script;
classifying the sql script based on the function information, and generating classification information of the sql script;
acquiring a target auditing rule corresponding to the classification information from preset auditing rules;
and auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script.
In order to solve the above technical problems, an embodiment of the present application further provides a computer readable storage medium, which adopts the following technical schemes:
receiving an sql script submitted by a user;
performing quality inspection on the sql script, and judging whether the sql script passes the quality inspection or not;
if yes, acquiring the function information of the sql script;
classifying the sql script based on the function information, and generating classification information of the sql script;
acquiring a target auditing rule corresponding to the classification information from preset auditing rules;
And auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
in the embodiment of the application, firstly, receiving an sql script submitted by a user; then, quality inspection is carried out on the sql script, and whether the sql script passes the quality inspection is judged; if yes, acquiring the function information of the sql script; classifying the sql scripts based on the function information to generate classification information of the sql scripts; subsequently, a target auditing rule corresponding to the classification information is obtained from a preset auditing rule; and finally, auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script. The application can automatically and intelligently complete the auditing processing of the sql script based on the auditing rule, and can quickly and accurately generate the script auditing result corresponding to the sql script, thereby effectively reducing the auditing difficulty of the sql script, improving the auditing efficiency of the sql script and ensuring the accuracy of the generated script auditing result.
Drawings
In order to more clearly illustrate the solution of the present application, a brief description will be given below of the drawings required for the description of the embodiments of the present application, it being apparent that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without the exercise of inventive effort for a person of ordinary skill in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of a script analysis method in accordance with the present application;
FIG. 3 is a schematic diagram of the architecture of one embodiment of a script analysis device in accordance with the present application;
FIG. 4 is a schematic structural diagram of one embodiment of a computer device in accordance with the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description of the application and the claims and the description of the drawings above are intended to cover a non-exclusive inclusion. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to make the person skilled in the art better understand the solution of the present application, the technical solution of the embodiment of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablet computers, electronic book readers, MP3 players (Moving Picture Experts Group Audio Layer III, dynamic video expert compression standard audio plane 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic video expert compression standard audio plane 4) players, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the script analysis method provided by the embodiment of the present application is generally executed by a server/terminal device, and accordingly, the script analysis device is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow chart of one embodiment of a script analysis method in accordance with the present application is shown. The order of the steps in the flowchart may be changed and some steps may be omitted according to various needs. The script analysis method provided by the embodiment of the application can be applied to any scene needing script auditing, and can be applied to products of the scenes, such as sql script auditing scenes in the field of financial insurance. The script analysis method comprises the following steps:
Step S201, receiving sql script submitted by a user.
In this embodiment, the electronic device (for example, the server/terminal device shown in fig. 1) on which the script analysis method operates may acquire the sql script through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection may include, but is not limited to, 3G/4G/5G connection, wiFi connection, bluetooth connection, wiMAX connection, zigbee connection, UWB (ultra wideband) connection, and other now known or later developed wireless connection. In daily CI/CD operations, a developer needs to hand over the well-developed sql script to the production database for execution, but before the execution of the sql script, sufficient evaluations need to be made on the corresponding content of the sql script, such as grammar, data volume of an execution table, influence, etc., otherwise if the sufficient evaluations are not performed, the execution of the sql script in the production database may cause unpredictable consequences, and serious system breakdown of the production service may even result.
And step S202, performing quality inspection on the sql script, and judging whether the sql script passes the quality inspection.
In the present embodiment, the quality check is used to detect the writing quality of the sql script, including but not limited to detecting whether the writing of the sql script is normal, detecting whether the sql script has a bug, detecting whether there is a repeat statement in the sql script, and the like. Specifically, the quality inspection of the sql script may be performed by a pre-built quality inspection tool.
And step S203, if yes, acquiring the function information of the sql script.
In this embodiment, the analysis information may be obtained by analyzing the sql script, and then the function information of the sql script may be obtained from the analysis information.
And step S204, classifying the sql script based on the function information, and generating classification information of the sql script.
In this embodiment, the division manner of the script types may be set according to the function of the script, specifically, the script may be divided into a clearing type (for example, sql statement that needs to delete a certain file), a view type (for example, sql statement that obtains a certain picture), a backup type (for example, sql statement that needs to backup a certain file), and so on according to the function of the script.
Step S205, obtaining a target auditing rule corresponding to the classification information from preset auditing rules.
In this embodiment, script auditing rules are formulated according to database types (ORACLE, MYSQL), sql script types (DDL, DML) and object types (including squice, TABLE pat, GENERAL, UPDATE, DELETE, etc.), and further subdivided into auditing rules respectively corresponding to various script functions according to script functions, where the auditing rules include any one or more rules of the script auditing rules. For example, it is classified into an audit rule corresponding to a clean-up class script, an audit rule corresponding to a view class script, an audit rule corresponding to a backup class script, and so on. The method comprises the steps that a target auditing rule matched with classification information of the sql script is used for auditing the sql script, and all auditing rules are not needed for auditing the sql script, so that the auditing of the sql script is more targeted, the processing efficiency of the auditing of the sql script is effectively improved, and the auditing accuracy of the sql script is ensured. Specifically, the script auditing rule may at least include: 1. strictly prohibiting the query authority of the direct authorization application table from being given to the dev user; 2. only the inquiry authority of the application table can be authorized to the DEV role; 3. tightly forbidding the authority of the direct authorized application table to the OPR user; 4. only the query authority of the application table can be authorized to the QRY role; 5. only the EXECUTE inquiry authority can be authorized to the EXEC role; 6. inhibit authorization to a publish user; 7. the deletion of the foreign key index is forbidden; 8. high frequency unused binding variable; 9. scanning a whole table; 10. scanning a high-frequency full table; 11. high-frequency index full scanning; 12. gao Pindi Called; 13. the partition column is not allowed to be empty; the sequence must use a CACHE and has a minimum value of 40;15. creating a SEQUENCE essential keyword; the delete must present the where clause; the hit write method is incorrect; 18. a high frequency index column function; 19. the number of the binding variables exceeds 200;20. inhibit simultaneous use of connectiby and regularization; the update must appear a where clause; 22. establishing synonyms to disable ORREPLACE;23. disabling the LONG type field; 24. the tables and fields need to be annotated with Chinese; 25. fields that must be created when building the table; 26. an index must be built on the external key; 27. all tables must have a primary key; 28. the service user prohibits the grant of the dropoff right; 29. creating an index must initialize the slot; 30. creating an index or Rebuild index must use an online;31. index forbidden designating table space; 32. establishing an index with an owner name; 33. creating or reconstructing an index to recover a parallel value; 34. disabling keywords in naming; 35. prohibiting the use of double quotation marks to quote objects; 36. object naming can only use English letters, numbers and underlines; 37. implicit conversion; 38. high frequency implicit conversion; 39. high consumption of execution plan; 40. the index is scanned completely; 41. cartesian product; 42. the range partition must specify the MAXVALUE partition; 43. using the enablewmovement specification; 44. the list partition must contain a DEFAULT partition; 45. the number of hash partitions must be the power of 2 to the power of N; 46. creating a SEQUENCE using NOORDER; the value of MAXVALUE must be all 9;48. creating or deleting a SEQUENCE must carry the owner; delete prohibits the occurrence of the orderby clause; 50. an index column function; 51. high-frequency operation time SQL;52. accumulating the operation time SQL;53. non-segmented commit SQL; update prohibit the occurrence of the orderby clause; 55. inhibiting updating of the primary key column value; 56. build table disable STORAGE and NOLOGGING;57. the index must be built first to create the primary key; 58. establishing a unique key must be preceded by establishing an index; 59. the construction of the table sentence must specify the object slot; 60. creating, modifying or deleting a TABLE must carry an owner; 61. establishing a primary key and an index forbidden designated table space; 62. the main key and the list establishing sentence must be separately written; 63. deleting a primary key or using a keyindex with a unique constraint; 64. creating or deleting a TRIGGER must carry an owner; 65. disable SELECT when creating a view; 66. creating a view disable FORUPDATE;67. ORDERBY is prohibited from being used in the view; 68. creating or deleting a VIEW must carry the owner; 69. starting a GoldenGate synchronous library, and checking field consistency of the synchronous library; 70. limiting the number of indexes; 71. the index contains a field length accumulation limit; 72. the deletion index is required to be written in a file independently; fast refresh mode can only use ROWID-based materialized views; 74. the refresh mode is necessary to use ONDEMAND; ondemand mode disable STARTWITH;76. forbidding the use of forerefresh; 77. disabling competefferesh; 78. deleting the materialized view cascade deletion log; 79. the table name disables the universal prefix and suffix; date field name prefix specification; 81. a primary key field naming convention; 82. a local view naming convention; 83. constraint name naming convention; 84. index naming convention; 85. materialized view naming convention; 86. a table partition naming convention; a naming convention for context; PACKAGE naming convention; a sequence naming convention; SYNONYM naming principle; trigger naming convention; 92. not allowing the inclusion of independent/rows; 93. index jumping; 94. the nested connection is too deep; 95. the table is greater than 2GB to be considered as a partition; 96. the data of the partition table are uniformly distributed; 97. partition upper limit specification; 98. index design specification of partition table; 99. enabling a solix archive configuration information check; 100. select is prohibited.
And step S206, auditing the sql script based on the target auditing rule, and generating a script auditing result corresponding to the sql script.
In the embodiment, the pre-constructed auditing rule applied to the sql script provides a standard auditing flow of the sql script, so that the condition of human omission is avoided. Secondly, automatic auditing of the sql script is realized, and manpower is released. From development submission, automatic auditing, automatic deployment of test environments, automatic notification of relevant personnel, all of which can be done automatically depending on the tool. Compared with manual operation and manual deployment, the efficiency of the sql script auditing work is greatly improved. In addition, a large number of scripts can be simultaneously audited in a unified and batched mode depending on the formulated audit rule, and the problem of online of the sql scripts caused by omission of manual audit or insufficient evaluation is solved, so that the quality of the sql scripts is improved. Finally, summarizing and rewinding can be performed timely through the recorded problems, and auditing rules of the sql script are continuously perfected. The method includes the steps of performing an auditing process on the sql script based on the target auditing rule, and generating a specific implementation process of a script auditing result corresponding to the sql script, which will be described in further detail in the following specific embodiments, and will not be described in any more detail herein.
Firstly, receiving an sql script submitted by a user; then, quality inspection is carried out on the sql script, and whether the sql script passes the quality inspection is judged; if yes, acquiring the function information of the sql script; classifying the sql scripts based on the function information to generate classification information of the sql scripts; subsequently, a target auditing rule corresponding to the classification information is obtained from a preset auditing rule; and finally, auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script. The application can automatically and intelligently complete the auditing processing of the sql script based on the auditing rule, and can quickly and accurately generate the script auditing result corresponding to the sql script, thereby effectively reducing the auditing difficulty of the sql script, improving the auditing efficiency of the sql script and ensuring the accuracy of the generated script auditing result.
In some alternative implementations, step S206 includes the steps of:
and analyzing the sql script to obtain corresponding analysis data.
In this embodiment, the recognition analysis is performed on the sql statement extracted from the sql script, so as to obtain analysis data that can be recognized by the audit rule. Specifically, the sql tree-shaped analysis data can be obtained after the sql statement is analyzed, so that verification processing of the analysis data is facilitated according to the audit items in the audit policy.
And verifying the analysis data based on the target auditing rule to generate a corresponding data verification result.
In this embodiment, the target audit rule may include at least a plurality of audit items, and different audit items include different audit content. And the analysis data can be respectively checked by using the audit contents corresponding to each audit item, if the analysis data accords with the audit contents corresponding to each audit item, a data check result that the analysis data passes the check is generated, and otherwise, a data check result that the analysis data does not pass the check is generated.
And generating a script auditing result of the sql script based on the data checking result.
In this embodiment, if the data verification result is that the analysis data passes the verification, a script verification result is generated in which the content corresponding to the sql script is verification passed; if the data verification result is that the analysis data fails to pass the verification, generating a script verification result that the content corresponding to the sql script is not verified
The method comprises the steps of analyzing the sql script to obtain corresponding analysis data; then, checking the analysis data based on the target auditing rule to generate a corresponding data checking result; and generating a script auditing result of the sql script based on the data checking result. According to the application, the sql script is audited by using the target audit rule matched with the classification information of the sql script, and the sql script is not required to be audited by using all audit rules, so that the audit of the sql script is more targeted, the processing efficiency of the sql script audit is effectively improved, and the accuracy of the sql script audit is ensured.
In some optional implementations of this embodiment, after step S206, the electronic device may further perform the following steps:
and obtaining auditing overview information corresponding to the sql script.
In this embodiment, after the auditing process for the sql script is completed by using the target auditing rule, auditing overview information and a script auditing result that are matched with the sql script are generated. The audit overview information may include audit risk information, whether an exception type exists, an exception modification mode corresponding to the existing exception type, and the like. The script audit result includes audit pass or audit fail.
And visually displaying the script auditing result and the auditing overview information.
In this embodiment, the script audit result and the audit overview information may be displayed on a front-end interface of the electronic device.
The application obtains the auditing overview information corresponding to the sql script; and then, visually displaying the script auditing result and the auditing overview information, so that development, dba and other related staff can know the related auditing conditions of the sql script in time, and the sql script can be modified according to the auditing result in time, thereby being beneficial to improving the working efficiency of the staff and the working experience of the staff.
In some alternative implementations, after step S206, the electronic device may further perform the following steps:
judging whether the script auditing result is that the auditing is not passed.
In this embodiment, the script audit result includes audit pass or audit fail.
If yes, acquiring the abnormal type of the sql script from the audit overview information, and acquiring an abnormal modification mode corresponding to the abnormal type.
In this embodiment, the audit overview information may specifically include a plurality of preset audit items, an exception type of each audit item, and an exception modification manner corresponding to the exception type of each audit item. The preset auditing items and the item identifiers have a corresponding relation, and the setting of the item identifiers corresponding to the auditing items in the auditing overview information is the same as the setting of the item identifiers corresponding to the auditing items contained in the target auditing rule.
And modifying the sql script based on an abnormal modification mode corresponding to the abnormal type, and generating a modified target sql script.
In this embodiment, for each exception type existing in the sql script, modification processing is performed on the sql script based on an exception modification manner corresponding to the exception type, so as to obtain a modified target sql script.
Judging whether the script auditing result is that auditing is not passed or not; if yes, acquiring an abnormal type of the sql script from the audit overview information, and acquiring an abnormal modification mode corresponding to the abnormal type; and modifying the sql script based on an abnormal modification mode corresponding to the abnormal type, and generating a modified target sql script. When the abnormal condition of the sql script is detected, the abnormal modification mode corresponding to the abnormal type can be intelligently obtained to automatically modify the sql script, so that the sql script does not need to be manually modified, the modification efficiency of the sql script is greatly improved, and the accuracy of the sql script is ensured.
In some alternative implementations, after step S206, the electronic device may further perform the following steps:
judging whether the script auditing result is that the auditing is not passed.
In this embodiment, the script audit result includes audit pass or audit fail.
If yes, acquiring audit risk information corresponding to the sql script from the acquired audit overview information.
In this embodiment, the audit overview information at least includes information such as a high risk level number, a medium risk level number, a low risk level number, and an early warning level number.
And generating a target risk level of the sql script based on the audit risk information.
In this embodiment, the foregoing specific implementation process of generating the target risk level of the sql script based on the audit risk information will be described in further detail in the following specific embodiments, which will not be described herein.
Judging whether the script auditing result is that auditing is not passed or not; if yes, acquiring auditing risk information corresponding to the sql script from the acquired auditing overview information; and generating the target risk level of the sql script based on the auditing risk information. According to the method and the device for the modification processing of the sql script, the auditing risk information contained in the auditing overview information is analyzed and processed, so that the target risk level of the sql script can be generated rapidly and intelligently, the modification processing sequence of the sql script can be updated accurately according to the obtained target risk level, and the reasonable operation of the modification processing of the sql script is ensured.
In some optional implementations of this embodiment, the generating the target risk level of the sql script based on the audit risk information includes the steps of:
And acquiring the high risk level number, the medium risk level number, the low risk level number and the early warning level number from the audit risk information.
And acquiring weight values respectively corresponding to the high risk level number, the medium risk level number, the low risk level number and the early warning level number.
In this embodiment, the value of the weight value is not specifically limited, and may be set according to the actual service usage requirement. Preferably, the sum of the weight values is 1, and the weight value of the high risk level number > the weight value of the medium risk level number > the weight value of the low risk level number > the weight value of the early warning level number.
And calculating the high risk level number, the medium risk level number, the low risk level number and the early warning level number based on the weight value to generate a corresponding risk score.
In this embodiment, the high risk level number, the medium risk level number, the low risk level number, and the early warning level number may be calculated using the weight values based on a weighted summation processing manner, so as to generate a corresponding risk score.
And generating a target risk level of the sql script based on the risk score.
In this embodiment, the target risk level of the sql script may be obtained by querying a preset risk level mapping table, and querying risk level data matched with the risk score from the risk level mapping table. The risk level mapping table is a data table which is built in advance and stores a plurality of score intervals and risk levels corresponding to the score intervals one by one. Risk levels include severity level, mid level, mild level, etc.
The method comprises the steps of obtaining the high risk level number, the medium risk level number, the low risk level number and the early warning level number from the audit risk information; then, weight values respectively corresponding to the high risk level number, the medium risk level number, the low risk level number and the early warning level number are obtained; calculating the high risk level number, the medium risk level number, the low risk level number and the early warning level number based on the weight value to generate a corresponding risk score; and generating a target risk level of the sql script based on the risk score. According to the method and the system for the modification processing of the sql script, the high risk level quantity, the medium risk level quantity, the low risk level quantity and the early warning level quantity contained in the auditing risk information are analyzed and processed to calculate the corresponding risk score, so that the target risk level of the sql script can be rapidly and intelligently generated according to the risk score, the modification processing sequence of the sql script can be accurately updated according to the obtained target risk level, and reasonable operation of the modification processing of the sql script is guaranteed.
In some optional implementations of this embodiment, after the step of generating the target risk level of the sql script based on the risk score, the electronic device may further perform the steps of:
and generating a target processing priority level corresponding to the sql script based on the target risk level.
In the present embodiment, the correspondence between the risk level and the processing priority level is preset. If the risk level is a serious level, the corresponding processing priority level is a high priority level; if the risk level is a medium level, the processing priority level is a medium priority level; if the risk level is a serious and slight level, the corresponding processing priority level is a low priority level.
And acquiring a preset sql script processing sequence table.
In the present embodiment, the sql script processing order table is a processing order table previously constructed in which processing priority levels of respective sql scripts to be processed are stored.
And updating the sql script processing sequence table based on the target processing priority.
In this embodiment, the target processing priority corresponding to the sql script may be input into the sql script processing order table, so as to update the sql script processing order table.
Generating a target processing priority level corresponding to the sql script based on the target risk level; then acquiring a preset sql script processing sequence table; and subsequently, updating the sql script processing sequence table based on the target processing priority. After the target risk level of the sql script is generated, the target processing priority level corresponding to the sql script is intelligently generated according to the target risk level, and the sql script processing sequence table is updated by using the target processing priority level, so that the sql script processing sequence table can be correspondingly adjusted according to each sql script processing priority level, reasonable operation of modification processing of each sql script can be realized, and the intelligence and accuracy of the modification processing of the sql script are effectively improved.
It should be emphasized that, to further ensure the privacy and security of the script auditing results, the script auditing results may also be stored in a node of a blockchain.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by computer readable instructions stored in a computer readable storage medium that, when executed, may comprise the steps of the embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a script analysis apparatus, which corresponds to the method embodiment shown in fig. 2, and which is particularly applicable to various electronic devices.
As shown in fig. 3, the script analysis device 300 according to the present embodiment includes: a receiving module 301, a checking module 302, a first obtaining module 303, a classifying module 304, a second obtaining module 305 and a first generating module 306. Wherein:
A receiving module 301, configured to receive an sql script submitted by a user;
the verification module 302 is configured to perform quality verification on the sql script, and determine whether the sql script passes the quality verification;
the first obtaining module 303 is configured to obtain, if yes, functional information of the sql script;
the classification module 304 is configured to classify the sql script based on the function information, and generate classification information of the sql script;
the second obtaining module 305 is configured to obtain a target audit rule corresponding to the classification information from preset audit rules;
the first generation module 306 is configured to perform an audit process on the sql script based on the target audit rule, and generate a script audit result corresponding to the sql script.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the script analysis method in the foregoing embodiment one by one, and are not described herein again.
In some alternative implementations of the present embodiment, the first generating module 306 includes:
the analysis sub-module is used for analyzing the sql script to obtain corresponding analysis data;
the verification sub-module is used for carrying out verification processing on the analysis data based on the target auditing rule to generate a corresponding data verification result;
And the first generation sub-module is used for generating a script auditing result of the sql script based on the data checking result.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the script analysis method in the foregoing embodiment one by one, and are not described herein again.
In some optional implementations of this embodiment, the script analysis device further includes:
the third acquisition module is used for acquiring audit overview information corresponding to the sql script;
and the display module is used for visually displaying the script auditing result and the auditing overview information.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the script analysis method in the foregoing embodiment one by one, and are not described herein again.
In some optional implementations of this embodiment, the script analysis device further includes:
the first judging module is used for judging whether the script auditing result is that the auditing is not passed;
the fourth acquisition module is used for acquiring the abnormal type of the sql script from the audit overview information and acquiring an abnormal modification mode corresponding to the abnormal type if yes;
and the modification module is used for modifying the sql script based on an abnormal modification mode corresponding to the abnormal type to generate a modified target sql script.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the script analysis method in the foregoing embodiment one by one, and are not described herein again.
In some optional implementations of this embodiment, the script analysis device further includes:
the second judging module is used for judging whether the script auditing result is that the auditing is not passed;
the fifth acquisition module is used for acquiring auditing risk information corresponding to the sql script from the auditing overview information if yes;
and the second generation module is used for generating the target risk level of the sql script based on the auditing risk information.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the script analysis method in the foregoing embodiment one by one, and are not described herein again.
In some optional implementations of this embodiment, the second generating module includes:
the first acquisition sub-module is used for acquiring the high risk level number, the medium risk level number, the low risk level number and the early warning level number from the audit risk information;
the second obtaining sub-module is used for obtaining weight values respectively corresponding to the high risk level number, the medium risk level number, the low risk level number and the early warning level number;
The calculating sub-module is used for calculating the high risk level number, the medium risk level number, the low risk level number and the early warning level number based on the weight value to generate a corresponding risk score;
and the second generation sub-module is used for generating a target risk level of the sql script based on the risk score.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the script analysis method in the foregoing embodiment one by one, and are not described herein again.
In some optional implementations of this embodiment, the second generating module further includes:
a third generation sub-module, configured to generate a target processing priority level corresponding to the sql script based on the target risk level;
the third acquisition sub-module is used for acquiring a preset sql script processing sequence table;
and the updating sub-module is used for updating the sql script processing sequence table based on the target processing priority level.
In this embodiment, the operations performed by the modules or units respectively correspond to the steps of the script analysis method in the foregoing embodiment one by one, and are not described herein again.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 4, fig. 4 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 4 comprises a memory 41, a processor 42, a network interface 43 communicatively connected to each other via a system bus. It should be noted that only computer device 4 having components 41-43 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), programmable gate arrays (fields-Programmable Gate Array, FPGAs), digital processors (Digital Signal Processor, DSPs), embedded devices, etc.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the computer device 4. Of course, the memory 41 may also comprise both an internal memory unit of the computer device 4 and an external memory device. In this embodiment, the memory 41 is typically used to store an operating system and various application software installed on the computer device 4, such as computer readable instructions of a script analysis method. Further, the memory 41 may be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute computer readable instructions stored in the memory 41 or process data, such as computer readable instructions for executing the script analysis method.
The network interface 43 may comprise a wireless network interface or a wired network interface, which network interface 43 is typically used for establishing a communication connection between the computer device 4 and other electronic devices.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
in the embodiment of the application, firstly, receiving an sql script submitted by a user; then, quality inspection is carried out on the sql script, and whether the sql script passes the quality inspection is judged; if yes, acquiring the function information of the sql script; classifying the sql scripts based on the function information to generate classification information of the sql scripts; subsequently, a target auditing rule corresponding to the classification information is obtained from a preset auditing rule; and finally, auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script. The application can automatically and intelligently complete the auditing processing of the sql script based on the auditing rule, and can quickly and accurately generate the script auditing result corresponding to the sql script, thereby effectively reducing the auditing difficulty of the sql script, improving the auditing efficiency of the sql script and ensuring the accuracy of the generated script auditing result.
The present application also provides another embodiment, namely, a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of the script analysis method as described above.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
in the embodiment of the application, firstly, receiving an sql script submitted by a user; then, quality inspection is carried out on the sql script, and whether the sql script passes the quality inspection is judged; if yes, acquiring the function information of the sql script; classifying the sql scripts based on the function information to generate classification information of the sql scripts; subsequently, a target auditing rule corresponding to the classification information is obtained from a preset auditing rule; and finally, auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script. The application can automatically and intelligently complete the auditing processing of the sql script based on the auditing rule, and can quickly and accurately generate the script auditing result corresponding to the sql script, thereby effectively reducing the auditing difficulty of the sql script, improving the auditing efficiency of the sql script and ensuring the accuracy of the generated script auditing result.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
It is apparent that the above-described embodiments are only some embodiments of the present application, but not all embodiments, and the preferred embodiments of the present application are shown in the drawings, which do not limit the scope of the patent claims. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a thorough and complete understanding of the present disclosure. Although the application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing description, or equivalents may be substituted for elements thereof. All equivalent structures made by the content of the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the scope of the application.

Claims (10)

1. A script analysis method, comprising the steps of:
receiving an sql script submitted by a user;
performing quality inspection on the sql script, and judging whether the sql script passes the quality inspection or not;
if yes, acquiring the function information of the sql script;
classifying the sql script based on the function information, and generating classification information of the sql script;
acquiring a target auditing rule corresponding to the classification information from preset auditing rules;
and auditing the sql script based on the target auditing rule to generate a script auditing result corresponding to the sql script.
2. The script analysis method according to claim 1, wherein the step of performing an audit process on the sql script based on the target audit rule to generate a script audit result corresponding to the sql script specifically includes:
analyzing the sql script to obtain corresponding analysis data;
performing verification processing on the analysis data based on the target auditing rule to generate a corresponding data verification result;
and generating a script auditing result of the sql script based on the data checking result.
3. The script analysis method according to claim 1, further comprising, after the step of generating a script audit result corresponding to the sql script by conducting audit processing on the sql script based on the target audit rule:
Obtaining auditing overview information corresponding to the sql script;
and visually displaying the script auditing result and the auditing overview information.
4. The script analysis method according to claim 3, further comprising, after the step of generating a script audit result corresponding to the sql script by conducting audit processing on the sql script based on the target audit rule:
judging whether the script auditing result is that auditing is not passed;
if yes, acquiring an abnormal type of the sql script from the audit overview information, and acquiring an abnormal modification mode corresponding to the abnormal type;
and modifying the sql script based on an abnormal modification mode corresponding to the abnormal type, and generating a modified target sql script.
5. The script analysis method according to claim 3, further comprising, after the step of generating a script audit result corresponding to the sql script by conducting audit processing on the sql script based on the target audit rule:
judging whether the script auditing result is that auditing is not passed;
if yes, acquiring auditing risk information corresponding to the sql script from the acquired auditing overview information;
And generating a target risk level of the sql script based on the audit risk information.
6. The script analysis method according to claim 5, wherein the step of generating the target risk level of the sql script based on the audit risk information specifically comprises:
acquiring high risk level number, medium risk level number, low risk level number and early warning level number from the audit risk information;
acquiring weight values respectively corresponding to the high risk level number, the medium risk level number, the low risk level number and the early warning level number;
calculating the high risk level number, the medium risk level number, the low risk level number and the early warning level number based on the weight value, and generating a corresponding risk score;
and generating a target risk level of the sql script based on the risk score.
7. The script analysis method of claim 6, further comprising, after the step of generating the target risk level of the sql script based on the risk score:
generating a target processing priority level corresponding to the sql script based on the target risk level;
Acquiring a preset sql script processing sequence table;
and updating the sql script processing sequence table based on the target processing priority.
8. A script analysis device, comprising:
the receiving module is used for receiving the sql script submitted by the user;
the verification module is used for carrying out quality inspection on the sql script and judging whether the sql script passes the quality inspection or not;
the first acquisition module is used for acquiring the function information of the sql script if yes;
the classification module is used for classifying the sql script based on the functional information and generating classification information of the sql script;
the second acquisition module is used for acquiring a target auditing rule corresponding to the classification information from preset auditing rules;
the first generation module is used for conducting auditing processing on the sql script based on the target auditing rule and generating a script auditing result corresponding to the sql script.
9. A computer device comprising a memory having stored therein computer readable instructions which when executed by a processor implement the steps of the script analysis method of any of claims 1 to 7.
10. A computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the script analysis method of any of claims 1 to 7.
CN202310884141.3A 2023-07-18 2023-07-18 Script analysis method, script analysis device, computer equipment and storage medium Pending CN116860311A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310884141.3A CN116860311A (en) 2023-07-18 2023-07-18 Script analysis method, script analysis device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310884141.3A CN116860311A (en) 2023-07-18 2023-07-18 Script analysis method, script analysis device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116860311A true CN116860311A (en) 2023-10-10

Family

ID=88230237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310884141.3A Pending CN116860311A (en) 2023-07-18 2023-07-18 Script analysis method, script analysis device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116860311A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117435515A (en) * 2023-12-21 2024-01-23 云和恩墨(北京)信息技术有限公司 SQL statement auditing method, device, equipment and medium based on database

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117435515A (en) * 2023-12-21 2024-01-23 云和恩墨(北京)信息技术有限公司 SQL statement auditing method, device, equipment and medium based on database

Similar Documents

Publication Publication Date Title
US11663254B2 (en) System and engine for seeded clustering of news events
WO2020233330A1 (en) Batch testing method, apparatus, and computer-readable storage medium
Jonnalagadda et al. A new iterative method to reduce workload in systematic review process
WO2020164276A1 (en) Webpage data crawling method, apparatus and system, and computer-readable storage medium
US8019756B2 (en) Computer apparatus, computer program and method, for calculating importance of electronic document on computer network, based on comments on electronic document included in another electronic document associated with former electronic document
US20140172880A1 (en) Intelligent evidence classification and notification in a deep question answering system
US20150161134A1 (en) Managing a search
CA2919878C (en) Refining search query results
CN113836131B (en) Big data cleaning method and device, computer equipment and storage medium
CN112396108A (en) Service data evaluation method, device, equipment and computer readable storage medium
CN112052138A (en) Service data quality detection method and device, computer equipment and storage medium
CN112527774A (en) Data center building method and system and storage medium
CN115547466B (en) Medical institution registration and review system and method based on big data
CN110851461A (en) Method and device for auditing non-relational database and storage medium
CN111553556A (en) Business data analysis method and device, computer equipment and storage medium
CN115577701A (en) Risk behavior identification method, device, equipment and medium for big data security
CN116860311A (en) Script analysis method, script analysis device, computer equipment and storage medium
US20150310004A1 (en) Document management system, document management method, and document management program
EP3062245A1 (en) Dynamic modular ontology
CN112363814A (en) Task scheduling method and device, computer equipment and storage medium
CN114722789B (en) Data report integrating method, device, electronic equipment and storage medium
US8868485B2 (en) Data flow cost modeling
US10409871B2 (en) Apparatus and method for searching information
US9471569B1 (en) Integrating information sources to create context-specific documents
CN112445710B (en) Test method, test device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination