CN102542205B - Aided design method used for shared data protection - Google Patents
Aided design method used for shared data protection Download PDFInfo
- Publication number
- CN102542205B CN102542205B CN201110459565.2A CN201110459565A CN102542205B CN 102542205 B CN102542205 B CN 102542205B CN 201110459565 A CN201110459565 A CN 201110459565A CN 102542205 B CN102542205 B CN 102542205B
- Authority
- CN
- China
- Prior art keywords
- current
- protection mechanism
- shared data
- user
- rule feature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an aided design method used for shared data protection, relating to the field of computer aided design. The method comprises the following steps of: according to the core feature of each operating system, setting a rule feature table and an attribute feature table corresponding to each operating system; according to the name of the current operating system input by a user, selecting the corresponding current rule feature table and the corresponding current attribute feature table; according to a first order input by the user, extracting a current protection mechanism corresponding to the current shared data from the current rule feature table; according to a second order input by the user, selecting the current attribute feature description corresponding to the current shared data from the current attribute feature table; and presenting the current protection mechanism and the current attribute feature description for the user. The method reduces design burden and design risks of designers and solves the problems of high difficulty and high cost during follow-up error checking.
Description
Technical field
The present invention relates to Computer-aided Design Technology field, particularly a kind of auxiliary design method for shared data protection.
Background technology
Multiprocessor and multinuclear hardware platform obtain increasing application, more become standard configuration in some field.Corresponding operating system and Software for Design must support this change, and employing paralell design method gives full play to the performance boost space that multi-core platform brings.If share data deficiency protection in concurrent running or protect improper, gently then cause shared data corruption, heavy then cause system crash, therefore, must the protection scheme of careful design share data.But, operating system itself is more and more complicated, the operation flow that business software will realize is also more and more complicated, and the personnel being familiar with operation flow are not necessarily familiar with operating system (or being not necessarily familiar with all operations system), and the personnel being familiar with operating system are not necessarily familiar with operation flow.
Shared data protection is the difficulties in software parallelization design, and protection then affects data integrity and operating system stability not, and overprotection then affects operating system performance, can not give full play to the advantage of multi-core platform.Therefore, current shared data protection problem, adds design burden and the design risk of designer on the one hand; On the other hand, if protect improper, follow-up investigation mistake difficulty and cost very high.
Summary of the invention
(1) technical matters that will solve
The technical problem to be solved in the present invention is: how to provide a kind of auxiliary design method for shared data protection, to reduce design burden and the design risk of designer, the problem that when avoiding follow-up investigation wrong, difficulty is high, cost is high.
(2) technical scheme
For solving the problems of the technologies described above, the invention provides a kind of auxiliary design method for shared data protection, it comprises step:
A: according to the kernel feature of each operating system, sets up rule feature table and the attributive character table of corresponding each operating system;
B: according to the current operation system title of user's input, select corresponding current rule feature table and current attribute mark sheet;
C: according to the first instruction of user's input, from current rule feature table, extracts the current protection mechanism that current shared data are corresponding;
D: according to the second instruction of user's input, from current attribute mark sheet, selects the current attribute feature interpretation that current shared data are corresponding;
E: current protection mechanism and current attribute feature interpretation are presented to user.
Preferably, described step C specifically comprises step:
C1: according to the first instruction of user's input, the rule feature selecting current shared data corresponding from current rule feature table;
C2: judge whether to there is selected rule feature, if existed, performs step C3; Otherwise, perform step D;
C3: judge whether protection mechanism corresponding to described selected rule feature exists connector, if existed, performs step C4; Otherwise, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D;
C4: judge whether the kernel of current operation system has SMP characteristic, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, perform step C5;
C5: judge whether current shared data are the data of being accessed by multiple user program, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, extract the part before connector described in described protection mechanism, as the current protection mechanism that current shared data are corresponding, perform step D.
Preferably, in described rule feature table, rule feature key word corresponding to data, rule feature description and protection mechanism shared in record.
Preferably, in described attributive character table, attributive character key word corresponding to data and attributive character description shared in record.
Preferably, after described step e, also step F is comprised: user carries out software development according to current protection mechanism and current attribute feature interpretation.
(3) beneficial effect
Auxiliary design method for shared data protection of the present invention; first user is pointed out to select rule feature corresponding to current shared data and attributive character; and then corresponding conservation suggestion is provided; thus assisted user open design goes out and can share the software program of data by available protecting quickly and easily; reduce design burden and the design risk of designer, the problem that when avoiding follow-up investigation wrong, difficulty is high, cost is high.
Accompanying drawing explanation
Fig. 1 is the auxiliary design method process flow diagram for shared data protection of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the specific embodiment of the present invention is described in further detail.Following examples for illustration of the present invention, but are not used for limiting the scope of the invention.
Fig. 1 is the auxiliary design method process flow diagram for shared data protection of the present invention.As shown in Figure 1, described method comprises:
Steps A: according to the kernel feature of each operating system, sets up rule feature table and the attributive character table of corresponding each operating system.For the sake of simplicity, the present embodiment illustrates the inventive method for the (SuSE) Linux OS that kernel version is 2.6.The rule feature table of following table 1 to be corresponding kernel version the be (SuSE) Linux OS of 2.6, as shown in table 1, in described rule feature table, rule feature numbering corresponding to data, rule feature key word, rule feature description and protection mechanism shared in record.The attributive character table of following table 2 to be corresponding kernel versions the be (SuSE) Linux OS of 2.6, as shown in table 2, attributive character numbering, attributive character key word and attributive character that in described attributive character table, record shares data corresponding describe.
The corresponding kernel version of table 1 is the rule feature table of the (SuSE) Linux OS of 2.6
The corresponding kernel version of table 2 is the attributive character table of the (SuSE) Linux OS of 2.6
Step B: according to the current operation system title of user's input, select corresponding current rule feature table and current attribute mark sheet.
Step C: according to the first instruction of user's input, from current rule feature table, extracts the current protection mechanism that current shared data are corresponding.
Described step C specifically comprises step:
Step C1: according to the first instruction of user's input, the rule feature selecting current shared data corresponding from current rule feature table.Particularly, the rule feature of current rule feature table is presented to user and is selected by computing machine successively, and user chooses a corresponding rule feature according to the service condition of current shared data; If do not have suitable rule feature, user does not choose any rule feature.
Step C2: judge whether to there is selected rule feature, if existed, performs step C3; Otherwise, perform step D.
Step C3: judge whether protection mechanism corresponding to described selected rule feature exists connector, if existed, performs step C4; Otherwise, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D.Adopt+represent described connector in the present embodiment, can certainly adopt-, other symbols such as *, # represent described connector.Protection mechanism corresponding for some rule features is divided into front and back two parts by described connector.
Step C4: judge whether the kernel of current operation system has SMP (Symmetrical Multi-Processing, symmetric multi-processors) characteristic, if so, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D; Otherwise, perform step C5.
Step C5: judge whether current shared data are the data of being accessed by multiple user program, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, extract the part before connector described in described protection mechanism, as the current protection mechanism that current shared data are corresponding, perform step D.
Step D: according to the second instruction of user's input, from current attribute mark sheet, selects the current attribute feature interpretation that current shared data are corresponding.Particularly, the attributive character of current attribute mark sheet is presented to user and is selected by computing machine successively, and user chooses corresponding attributive character to describe according to the service condition of current shared data.
Step e: current protection mechanism and current attribute feature interpretation are presented to user.
Step F: user carries out software development according to current protection mechanism and current attribute feature interpretation.
For the auxiliary design method of shared data protection described in the embodiment of the present invention; first user is pointed out to select rule feature corresponding to current shared data and attributive character; and then corresponding conservation suggestion is provided; thus assisted user open design goes out and can share the software program of data by available protecting quickly and easily; reduce design burden and the design risk of designer, the problem that when avoiding follow-up investigation wrong, difficulty is high, cost is high.
Above embodiment is only for illustration of the present invention; and be not limitation of the present invention; the those of ordinary skill of relevant technical field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all equivalent technical schemes also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.
Claims (4)
1. for an auxiliary design method for shared data protection, it is characterized in that, comprise step:
A: according to the kernel feature of each operating system, sets up rule feature table and the attributive character table of corresponding each operating system;
B: according to the current operation system title of user's input, select corresponding current rule feature table and current attribute mark sheet;
C: according to the first instruction of user's input, from current rule feature table, extracts the current protection mechanism that current shared data are corresponding;
D: according to the second instruction of user's input, from current attribute mark sheet, selects the current attribute feature interpretation that current shared data are corresponding;
E: current protection mechanism and current attribute feature interpretation are presented to user;
Wherein, step C specifically comprises step:
C1: according to the first instruction of user's input, the rule feature selecting current shared data corresponding from current rule feature table;
C2: judge whether to there is selected rule feature, if existed, performs step C3; Otherwise, perform step D;
C3: judge whether protection mechanism corresponding to described selected rule feature exists connector, if existed, performs step C4; Otherwise, extract described protection mechanism as current protection mechanism corresponding to current shared data, perform step D;
C4: judge whether the kernel of current operation system has symmetric multi-processors SMP characteristic, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, perform step C5;
C5: judge whether current shared data are the data of being accessed by multiple user program, if so, extracts described protection mechanism as current protection mechanism corresponding to current shared data, performs step D; Otherwise, extract the part before connector described in described protection mechanism, as the current protection mechanism that current shared data are corresponding, perform step D.
2. the method for claim 1, is characterized in that, in described rule feature table, rule feature key word corresponding to data, rule feature description and protection mechanism shared in record.
3. the method for claim 1, is characterized in that, in described attributive character table, attributive character key word corresponding to data and attributive character description shared in record.
4. the method for claim 1, is characterized in that, after described step e, also comprise step F: user carries out software development according to current protection mechanism and current attribute feature interpretation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110459565.2A CN102542205B (en) | 2011-12-31 | 2011-12-31 | Aided design method used for shared data protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110459565.2A CN102542205B (en) | 2011-12-31 | 2011-12-31 | Aided design method used for shared data protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102542205A CN102542205A (en) | 2012-07-04 |
CN102542205B true CN102542205B (en) | 2015-06-03 |
Family
ID=46349071
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110459565.2A Expired - Fee Related CN102542205B (en) | 2011-12-31 | 2011-12-31 | Aided design method used for shared data protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102542205B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1609811A (en) * | 2003-10-24 | 2005-04-27 | 微软公司 | Providing secure input to a system with a high-security execution environment |
CN1904826A (en) * | 2006-06-30 | 2007-01-31 | 浙江大学 | Method for implementing analysis local program of embedded system with internal storage utilization |
CN101763265A (en) * | 2010-01-19 | 2010-06-30 | 湖南大学 | Procedure level software and hardware collaborative design automatized development method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4622347B2 (en) * | 2003-10-08 | 2011-02-02 | セイコーエプソン株式会社 | Output system with use right authentication function, material output device, and use right authentication output method |
-
2011
- 2011-12-31 CN CN201110459565.2A patent/CN102542205B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1609811A (en) * | 2003-10-24 | 2005-04-27 | 微软公司 | Providing secure input to a system with a high-security execution environment |
CN1904826A (en) * | 2006-06-30 | 2007-01-31 | 浙江大学 | Method for implementing analysis local program of embedded system with internal storage utilization |
CN101763265A (en) * | 2010-01-19 | 2010-06-30 | 湖南大学 | Procedure level software and hardware collaborative design automatized development method |
Also Published As
Publication number | Publication date |
---|---|
CN102542205A (en) | 2012-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103473067B (en) | Built-in Linux subregion and data restoration method, system and system development method | |
EP2936315B1 (en) | On-the-fly technical support | |
US9910554B2 (en) | Assisting graphical user interface design | |
US20150324437A1 (en) | Grid format data viewing and editing environment | |
US8160865B1 (en) | Systems and methods for managing coordinate geometry for a user interface template | |
EP3794494A1 (en) | Table detection in spreadsheet | |
CN104376043B (en) | Log recording and display methods and device | |
US9613005B2 (en) | Method and apparatus for bidirectional typesetting | |
US20140189627A1 (en) | Incremental clock tree synthesis | |
CN102200968A (en) | Method and device for removing duplications of EXCEL form data | |
US10339035B2 (en) | Test DB data generation apparatus | |
CN106777272A (en) | A kind of comparing and synchronous method | |
MXPA06013949A (en) | Computer aided design interface . | |
CN102880733B (en) | System and method for hierarchy reconstruction from flattened graphic database system layout | |
CN105487956A (en) | Debugging method and device in power-on self-test | |
WO2020211258A1 (en) | Blockchain account book data query method, electronic apparatus and storage medium | |
Johnson | The elements of MATLAB Style | |
CN107329756B (en) | Program file generation method and device, storage medium, processor and terminal | |
US8984455B1 (en) | Methods for generating schematic diagrams and apparatuses using the same | |
CN103677852A (en) | Design method of extensible class natural language formula editor | |
CN102542205B (en) | Aided design method used for shared data protection | |
US8694943B1 (en) | Methods, systems, and computer program product for implementing electronic designs with connectivity and constraint awareness | |
CN101405727B (en) | Management of statistical views in a database system | |
CN101533391A (en) | System for searching similar matched sentences and method thereof | |
CN103838890A (en) | Comparative method of layout and schematic uniformity of multi-power-domain system with black box IPs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right |
Effective date of registration: 20180823 Granted publication date: 20150603 |
|
PP01 | Preservation of patent right | ||
PD01 | Discharge of preservation of patent |
Date of cancellation: 20210823 Granted publication date: 20150603 |
|
PD01 | Discharge of preservation of patent | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150603 Termination date: 20181231 |
|
CF01 | Termination of patent right due to non-payment of annual fee |