CN102542205B - Aided design method used for shared data protection - Google Patents

Aided design method used for shared data protection Download PDF

Info

Publication number
CN102542205B
CN102542205B CN201110459565.2A CN201110459565A CN102542205B CN 102542205 B CN102542205 B CN 102542205B CN 201110459565 A CN201110459565 A CN 201110459565A CN 102542205 B CN102542205 B CN 102542205B
Authority
CN
China
Prior art keywords
current
protection mechanism
shared data
user
rule feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110459565.2A
Other languages
Chinese (zh)
Other versions
CN102542205A (en
Inventor
殷建儒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Opzoon Technology Co Ltd
Original Assignee
Opzoon Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Opzoon Technology Co Ltd filed Critical Opzoon Technology Co Ltd
Priority to CN201110459565.2A priority Critical patent/CN102542205B/en
Publication of CN102542205A publication Critical patent/CN102542205A/en
Application granted granted Critical
Publication of CN102542205B publication Critical patent/CN102542205B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an aided design method used for shared data protection, relating to the field of computer aided design. The method comprises the following steps of: according to the core feature of each operating system, setting a rule feature table and an attribute feature table corresponding to each operating system; according to the name of the current operating system input by a user, selecting the corresponding current rule feature table and the corresponding current attribute feature table; according to a first order input by the user, extracting a current protection mechanism corresponding to the current shared data from the current rule feature table; according to a second order input by the user, selecting the current attribute feature description corresponding to the current shared data from the current attribute feature table; and presenting the current protection mechanism and the current attribute feature description for the user. The method reduces design burden and design risks of designers and solves the problems of high difficulty and high cost during follow-up error checking.

Description

For the auxiliary design method of shared data protection
Technical field
The present invention relates to Computer-aided Design Technology field, particularly a kind of auxiliary design method for shared data protection.
Background technology
Multiprocessor and multinuclear hardware platform obtain increasing application, more become standard configuration in some field.Corresponding operating system and Software for Design must support this change, and employing paralell design method gives full play to the performance boost space that multi-core platform brings.If share data deficiency protection in concurrent running or protect improper, gently then cause shared data corruption, heavy then cause system crash, therefore, must the protection scheme of careful design share data.But, operating system itself is more and more complicated, the operation flow that business software will realize is also more and more complicated, and the personnel being familiar with operation flow are not necessarily familiar with operating system (or being not necessarily familiar with all operations system), and the personnel being familiar with operating system are not necessarily familiar with operation flow.
Shared data protection is the difficulties in software parallelization design, and protection then affects data integrity and operating system stability not, and overprotection then affects operating system performance, can not give full play to the advantage of multi-core platform.Therefore, current shared data protection problem, adds design burden and the design risk of designer on the one hand; On the other hand, if protect improper, follow-up investigation mistake difficulty and cost very high.
Summary of the invention
(1) technical matters that will solve
The technical problem to be solved in the present invention is: how to provide a kind of auxiliary design method for shared data protection, to reduce design burden and the design risk of designer, the problem that when avoiding follow-up investigation wrong, difficulty is high, cost is high.
(2) technical scheme
For solving the problems of the technologies described above, the invention provides a kind of auxiliary design method for shared data protection, it comprises step:
A: according to the kernel feature of each operating system, sets up rule feature table and the attributive character table of corresponding each operating system;
B: according to the current operation system title of user's input, select corresponding current rule feature table and current attribute mark sheet;
C: according to the first instruction of user's input, from current rule feature table, extracts the current protection mechanism that current shared data are corresponding;
D: according to the second instruction of user's input, from current attribute mark sheet, selects the current attribute feature interpretation that current shared data are corresponding;
E: current protection mechanism and current attribute feature interpretation are presented to user.
Preferably, described step C specifically comprises step:
C1: according to the first instruction of user's input, the rule feature selecting current shared data corresponding from current rule feature table;
C2: judge whether to there is selected rule feature, if existed, performs step C3; Otherwise, perform step D;
C3: judge whether protection mechanism corresponding to described selected rule feature exists connector, if existed, performs step C4; Otherwise, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D;
C4: judge whether the kernel of current operation system has SMP characteristic, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, perform step C5;
C5: judge whether current shared data are the data of being accessed by multiple user program, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, extract the part before connector described in described protection mechanism, as the current protection mechanism that current shared data are corresponding, perform step D.
Preferably, in described rule feature table, rule feature key word corresponding to data, rule feature description and protection mechanism shared in record.
Preferably, in described attributive character table, attributive character key word corresponding to data and attributive character description shared in record.
Preferably, after described step e, also step F is comprised: user carries out software development according to current protection mechanism and current attribute feature interpretation.
(3) beneficial effect
Auxiliary design method for shared data protection of the present invention; first user is pointed out to select rule feature corresponding to current shared data and attributive character; and then corresponding conservation suggestion is provided; thus assisted user open design goes out and can share the software program of data by available protecting quickly and easily; reduce design burden and the design risk of designer, the problem that when avoiding follow-up investigation wrong, difficulty is high, cost is high.
Accompanying drawing explanation
Fig. 1 is the auxiliary design method process flow diagram for shared data protection of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the specific embodiment of the present invention is described in further detail.Following examples for illustration of the present invention, but are not used for limiting the scope of the invention.
Fig. 1 is the auxiliary design method process flow diagram for shared data protection of the present invention.As shown in Figure 1, described method comprises:
Steps A: according to the kernel feature of each operating system, sets up rule feature table and the attributive character table of corresponding each operating system.For the sake of simplicity, the present embodiment illustrates the inventive method for the (SuSE) Linux OS that kernel version is 2.6.The rule feature table of following table 1 to be corresponding kernel version the be (SuSE) Linux OS of 2.6, as shown in table 1, in described rule feature table, rule feature numbering corresponding to data, rule feature key word, rule feature description and protection mechanism shared in record.The attributive character table of following table 2 to be corresponding kernel versions the be (SuSE) Linux OS of 2.6, as shown in table 2, attributive character numbering, attributive character key word and attributive character that in described attributive character table, record shares data corresponding describe.
The corresponding kernel version of table 1 is the rule feature table of the (SuSE) Linux OS of 2.6
The corresponding kernel version of table 2 is the attributive character table of the (SuSE) Linux OS of 2.6
Step B: according to the current operation system title of user's input, select corresponding current rule feature table and current attribute mark sheet.
Step C: according to the first instruction of user's input, from current rule feature table, extracts the current protection mechanism that current shared data are corresponding.
Described step C specifically comprises step:
Step C1: according to the first instruction of user's input, the rule feature selecting current shared data corresponding from current rule feature table.Particularly, the rule feature of current rule feature table is presented to user and is selected by computing machine successively, and user chooses a corresponding rule feature according to the service condition of current shared data; If do not have suitable rule feature, user does not choose any rule feature.
Step C2: judge whether to there is selected rule feature, if existed, performs step C3; Otherwise, perform step D.
Step C3: judge whether protection mechanism corresponding to described selected rule feature exists connector, if existed, performs step C4; Otherwise, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D.Adopt+represent described connector in the present embodiment, can certainly adopt-, other symbols such as *, # represent described connector.Protection mechanism corresponding for some rule features is divided into front and back two parts by described connector.
Step C4: judge whether the kernel of current operation system has SMP (Symmetrical Multi-Processing, symmetric multi-processors) characteristic, if so, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D; Otherwise, perform step C5.
Step C5: judge whether current shared data are the data of being accessed by multiple user program, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, extract the part before connector described in described protection mechanism, as the current protection mechanism that current shared data are corresponding, perform step D.
Step D: according to the second instruction of user's input, from current attribute mark sheet, selects the current attribute feature interpretation that current shared data are corresponding.Particularly, the attributive character of current attribute mark sheet is presented to user and is selected by computing machine successively, and user chooses corresponding attributive character to describe according to the service condition of current shared data.
Step e: current protection mechanism and current attribute feature interpretation are presented to user.
Step F: user carries out software development according to current protection mechanism and current attribute feature interpretation.
For the auxiliary design method of shared data protection described in the embodiment of the present invention; first user is pointed out to select rule feature corresponding to current shared data and attributive character; and then corresponding conservation suggestion is provided; thus assisted user open design goes out and can share the software program of data by available protecting quickly and easily; reduce design burden and the design risk of designer, the problem that when avoiding follow-up investigation wrong, difficulty is high, cost is high.
Above embodiment is only for illustration of the present invention; and be not limitation of the present invention; the those of ordinary skill of relevant technical field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all equivalent technical schemes also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (4)

1. for an auxiliary design method for shared data protection, it is characterized in that, comprise step:
A: according to the kernel feature of each operating system, sets up rule feature table and the attributive character table of corresponding each operating system;
B: according to the current operation system title of user's input, select corresponding current rule feature table and current attribute mark sheet;
C: according to the first instruction of user's input, from current rule feature table, extracts the current protection mechanism that current shared data are corresponding;
D: according to the second instruction of user's input, from current attribute mark sheet, selects the current attribute feature interpretation that current shared data are corresponding;
E: current protection mechanism and current attribute feature interpretation are presented to user;
Wherein, step C specifically comprises step:
C1: according to the first instruction of user's input, the rule feature selecting current shared data corresponding from current rule feature table;
C2: judge whether to there is selected rule feature, if existed, performs step C3; Otherwise, perform step D;
C3: judge whether protection mechanism corresponding to described selected rule feature exists connector, if existed, performs step C4; Otherwise, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D;
C4: judge whether the kernel of current operation system has symmetric multi-processors SMP characteristic, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, perform step C5;
C5: judge whether current shared data are the data of being accessed by multiple user program, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, extract the part before connector described in described protection mechanism, as the current protection mechanism that current shared data are corresponding, perform step D.
2. the method for claim 1, is characterized in that, in described rule feature table, rule feature key word corresponding to data, rule feature description and protection mechanism shared in record.
3. the method for claim 1, is characterized in that, in described attributive character table, attributive character key word corresponding to data and attributive character description shared in record.
4. the method for claim 1, is characterized in that, after described step e, also comprise step F: user carries out software development according to current protection mechanism and current attribute feature interpretation.
CN201110459565.2A 2011-12-31 2011-12-31 Aided design method used for shared data protection Expired - Fee Related CN102542205B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110459565.2A CN102542205B (en) 2011-12-31 2011-12-31 Aided design method used for shared data protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110459565.2A CN102542205B (en) 2011-12-31 2011-12-31 Aided design method used for shared data protection

Publications (2)

Publication Number Publication Date
CN102542205A CN102542205A (en) 2012-07-04
CN102542205B true CN102542205B (en) 2015-06-03

Family

ID=46349071

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110459565.2A Expired - Fee Related CN102542205B (en) 2011-12-31 2011-12-31 Aided design method used for shared data protection

Country Status (1)

Country Link
CN (1) CN102542205B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1609811A (en) * 2003-10-24 2005-04-27 微软公司 Providing secure input to a system with a high-security execution environment
CN1904826A (en) * 2006-06-30 2007-01-31 浙江大学 Method for implementing analysis local program of embedded system with internal storage utilization
CN101763265A (en) * 2010-01-19 2010-06-30 湖南大学 Procedure level software and hardware collaborative design automatized development method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4622347B2 (en) * 2003-10-08 2011-02-02 セイコーエプソン株式会社 Output system with use right authentication function, material output device, and use right authentication output method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1609811A (en) * 2003-10-24 2005-04-27 微软公司 Providing secure input to a system with a high-security execution environment
CN1904826A (en) * 2006-06-30 2007-01-31 浙江大学 Method for implementing analysis local program of embedded system with internal storage utilization
CN101763265A (en) * 2010-01-19 2010-06-30 湖南大学 Procedure level software and hardware collaborative design automatized development method

Also Published As

Publication number Publication date
CN102542205A (en) 2012-07-04

Similar Documents

Publication Publication Date Title
CN103473067B (en) Built-in Linux subregion and data restoration method, system and system development method
EP2936315B1 (en) On-the-fly technical support
US9910554B2 (en) Assisting graphical user interface design
US20150324437A1 (en) Grid format data viewing and editing environment
US8160865B1 (en) Systems and methods for managing coordinate geometry for a user interface template
EP3794494A1 (en) Table detection in spreadsheet
CN104376043B (en) Log recording and display methods and device
US9613005B2 (en) Method and apparatus for bidirectional typesetting
US20140189627A1 (en) Incremental clock tree synthesis
CN102200968A (en) Method and device for removing duplications of EXCEL form data
US10339035B2 (en) Test DB data generation apparatus
CN106777272A (en) A kind of comparing and synchronous method
MXPA06013949A (en) Computer aided design interface .
CN102880733B (en) System and method for hierarchy reconstruction from flattened graphic database system layout
CN105487956A (en) Debugging method and device in power-on self-test
WO2020211258A1 (en) Blockchain account book data query method, electronic apparatus and storage medium
Johnson The elements of MATLAB Style
CN107329756B (en) Program file generation method and device, storage medium, processor and terminal
US8984455B1 (en) Methods for generating schematic diagrams and apparatuses using the same
CN103677852A (en) Design method of extensible class natural language formula editor
CN102542205B (en) Aided design method used for shared data protection
US8694943B1 (en) Methods, systems, and computer program product for implementing electronic designs with connectivity and constraint awareness
CN101405727B (en) Management of statistical views in a database system
CN101533391A (en) System for searching similar matched sentences and method thereof
CN103838890A (en) Comparative method of layout and schematic uniformity of multi-power-domain system with black box IPs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20180823

Granted publication date: 20150603

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20210823

Granted publication date: 20150603

PD01 Discharge of preservation of patent
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150603

Termination date: 20181231

CF01 Termination of patent right due to non-payment of annual fee