CN106156076A - The method and system that data process - Google Patents

The method and system that data process Download PDF

Info

Publication number
CN106156076A
CN106156076A CN201510149484.0A CN201510149484A CN106156076A CN 106156076 A CN106156076 A CN 106156076A CN 201510149484 A CN201510149484 A CN 201510149484A CN 106156076 A CN106156076 A CN 106156076A
Authority
CN
China
Prior art keywords
data set
data
master
document
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510149484.0A
Other languages
Chinese (zh)
Other versions
CN106156076B (en
Inventor
杜嘉宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510149484.0A priority Critical patent/CN106156076B/en
Publication of CN106156076A publication Critical patent/CN106156076A/en
Application granted granted Critical
Publication of CN106156076B publication Critical patent/CN106156076B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of data processing method and system, method includes: search the master data set at the data cell place of amendment or from the data set identification of data set;When data set identification is the data set identification of master data set, according to data set identification, find with master data set have principal and subordinate's expansion relation from data set, the data cell corresponding with data cell is being searched from data set, or, data set identification is when the data set identification of data set, according to data set identification, the master data set found and have principal and subordinate's expansion relation from data set, searches the data cell corresponding with data cell in master data set;According to the data cell of amended master data set, data set identification, back up from the form of the data cell of data set master data set, data set identification, from data set.Can be by calling last change record during backup after data cell amendment, no longer from multiple positions called data.Amendment all forms amendment record every time, makes a mistake and is not result in all revising misregistration when operating.

Description

The method and system that data process
Technical field
The application relates to field of computer technology, particularly relates to the method and system that a kind of data process.
Background technology
There is a kind of data base in reality, in this data base, a kind of common relation is data set and data set Between incidence relation.Such as, data set A is main set, and in data set A, certain data cell is corresponding One from data set B, data set A another data cell then corresponding another from data set C, data In collection A the 3rd data cell corresponding 3rd from data set D.Data base by data set and data set it Between this principal and subordinate's incidence relation constantly extend.
Using during data base, it is often necessary to the data in data base are modified, delete, The operations such as insertion.In order to avoid faulty operation, need the state of database restoration to some time point, In order to complete the reduction of data base, it is necessary first to the data base of this time point is backed up.Actually used During, master data set and each diverse location being often distributed in same computer from data set, even It is distributed in different server.Therefore, for master data set with respectively from the backup of data intensive data, in order to grasp Facilitate, it is common that individually back up.It is to say, the computer of storage master data set, according to master data The data of master data set are stored in a position by the structure of collection, and store the computer from data set, press Another position will be stored in from the data of data set according to from the structure of data set.
It is assumed that the master data set A (operating system) of certain computer created January 1 and is stored in position First;Revised from data set B (input-output equipment drives more new procedures) February 1 and be stored in position Second;Revised and be stored in position third from data set C (video driver more new procedures) March 1;From number Again revised according to collection B (input-output equipment drives more new procedures) April 1 and be stored in position Fourth.
For convenience by system reducing to January 1 to any one time point between April 1, one
Kind of backup method is, master data set and the most once changing from data set, then carry out once overall number According to backup.Master data set is according to the structure storing data of master data set, from data set according to from data set Structure storing data, so, the storage resource of computer is taken by substantial amounts of.
Another kind of method is, the position of log data set A, B, C, amendment date and each data set it Between incidence relation (corresponding relation of each key assignments in registration table).Carry out data recover time, gradually according to Time sequencing operates, then can complete the recovery of data.Certainly, due to master data set with respectively from the number of data set According to being stored in diverse location, for the computer of single main frame, data backup is comparatively laborious.Can think To, the master data set being distributed on different server and the data from data set are backed up, its Complexity can significantly increase.
For the reduction of data base, above example illustrates, it is assumed that from data set B, (input and output set Standby drive more new procedures) in corresponding registration table key assignments deleted mistakenly April 1, then in computer Data cannot correctly return to any one time point before April 1.Because from data set B and master The unique association of data set A disconnects.
Therefore, the method operability that existing data process is complicated, poor stability.
Therefore, inventor provides a kind of operation letter on the basis of studying existing computer technology Just, the method and system that the data of good stability process.
Summary of the invention
The embodiment of the present application provides a kind of method that data easy and simple to handle, good stability process, concrete, A kind of method that data process, for processing master data set, being wrapped from data set by what master data set expanded The data cell contained, including:
When data cell is modified, search the master data set at described data cell place or from data set Data set identification;
When the data set identification that described data set identification is master data set, according to described data set identification, look for To with described master data set have principal and subordinate's expansion relation from data set, searching and described number from data set According to the data cell that unit is corresponding, or, when described data set identification is from the data set identification of data set, According to described data set identification, find and the described master data set from data set with principal and subordinate's expansion relation, Master data set is searched the data cell corresponding with described data cell;
According to the data cell of amended master data set, data set identification, from the data cell of data set Form backup master data set, data set identification, from data set.
The embodiment of the present application also provides for a kind of method that data process, and is used for processing master data set, by master data The data cell comprised from data set that collection expands, including:
According to the data cell of master data set in backup document, data set identification, from the data cell of data set, Recover respectively master data set, by master data set according to principal and subordinate's incidence relation expand from data set.
The embodiment of the present application also provides for the system that a kind of data process, and is used for processing master data set, by master data The data cell comprised from data set that collection expands, including:
Search module, for searching the master data set at the data cell place being modified or from the data of data set Set identifier;
Matching module, is used for: when the data set identification that described data set identification is master data set, according to institute State data set identification, find with described master data set have principal and subordinate's expansion relation from data set, from data Concentrate and search the data cell corresponding with described data cell, or, when described data set identification is from data set Data set identification time, according to described data set identification, find and from data set, there is principal and subordinate extend pass with described The master data set of system, searches the data cell corresponding with described data cell in master data set;
Backup module, for according to the data cell of amended master data set, data set identification, from data Collection data cell form backup master data set, data set identification, from data set.
The embodiment of the present application also provides for the system that a kind of data process, and is used for processing master data set, by master data The data cell comprised from data set that collection expands, including:
Recover module, for according to the data cell of master data set in backup document, data set identification, from number According to the data cell of collection, recover master data set respectively, expanded according to principal and subordinate's incidence relation by master data set From data set.
The method and system that the data that the embodiment of the present application provides process, at least has the advantages that
According to the data cell of amended master data set, data set identification, from the data cell of data set Form backup master data set, data set identification, from data set.Can be by adjusting during backup after data cell amendment Use last change record, and need not be again from multiple positions called data, therefore, easy and simple to handle.And every time Amendment all forms amendment record, makes a mistake and is not result in whole amendment misregistrations when operating, therefore, Good stability.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes of the application Point, the schematic description and description of the application is used for explaining the application, is not intended that to the application not Work as restriction.In the accompanying drawings:
Fig. 1 is the organization chart of institution of higher education.
Fig. 2 is the flow chart of the method that the embodiment of the present application data process.
The structural representation of the system that the data that Fig. 3 provides for the embodiment of the present application process.
The structural representation of the system that another data that Fig. 4 provides for the embodiment of the present application process.
Detailed description of the invention
In order to solve the method operability complexity that existing data process, the technical problem of poor stability, this Shen Please embodiment provide data process method, according to data cell, the data set of amended master data set Mark, back up from the form of the data cell of data set master data set, data set identification, from data set.Number By calling last change record, and number can need not be transferred from multiple positions again during backup after revising according to unit According to, therefore, easy and simple to handle.And revise every time and all form amendment record, make a mistake and will not lead when operating Cause whole amendment misregistrations, therefore, good stability.
For making the purpose of the application, technical scheme and advantage clearer, specifically real below in conjunction with the application Execute example and technical scheme is clearly and completely described by corresponding accompanying drawing.Obviously, described Embodiment is only some embodiments of the present application rather than whole embodiments.Based on the enforcement in the application Example, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of the application protection.
In the computer technology relevant to data base, data structure refer to the type of organization of data or data it Between contact.Data structure is divided into again the logical structure of data and the physical arrangement of data.The logic knot of data Structure is the contact between the angle-data of logic and organizational form carrys out observed data, analytical data, Unrelated with the storage position of data.The embodiment of the present application pertains only to the logical structure of data, and will reflection and The method of contact and organizational form between data that realizes is referred to as data model.Data model mainly has three kinds, i.e. presses Graph Theory set up hierarchy Model and network structure model and by relational theory set up pass tying Structure model.
A kind of oriented and ordered tree having root node of hierarchy Model.Mathematics " is set " and is defined It it is the connected graph that returns of a nothing.Refer to the organization chart of Fig. 1, Tu1Shi Yige institution of higher education.At figure In 1, XX school is in the position of root node, is a data set.A system is in the position of minor matters point, It is a data set equally.In XX school and A system in mutual relation, XX school includes A system, XX school is master data set, and A system is from data set.XX school includes this inclusion relation of A system, It it is the one in the principal and subordinate's expansion relation pointed out in the embodiment of the present application.Hierarchy Model passes through this principal and subordinate Expansion relation constantly extends.IMS (Information Management System) is its Typical Representative.
In network structure model, in netted between data set, its Typical Representative is DBTG (Database Task Group).Can be mathematically hierarchy Model by network structure model conversation.
In relational expression structural model, the data structure of some complexity is attributed to simple binary crelation, i.e. two dimension Form.Such as, the list of results that certain class comprises all student performances is exactly the relational expression knot of binary crelation Structure.
The flow chart of the method that the data that Fig. 2 provides for the embodiment of the present application process, specifically includes following step Rapid:
S100: when data cell is modified, search described data cell place master data set or from The data set identification of data set.
Master data set or there is unique data set identification from each data sets such as data sets.Repair in data cell When changing, it is first determined the position of this data cell, i.e. the data set at data cell place.This data cell institute Data set be probably master data set, it is also possible to from data set.
Such as, to when the achievement of certain student is modified in certain class, the list of results at this achievement place is searched Coding.
The most such as, to when input-output equipment driver is updated in calculating, searches these input and output and set Standby driver key assignments in registration table.
S200: when the data set identification that described data set identification is master data set, according to described data set mark Know, find with described master data set have principal and subordinate's expansion relation from data set, search from data set with The data cell that described data cell is corresponding, or, when described data set identification is the data set mark from data set During knowledge, according to described data set identification, find and the described master data from data set with principal and subordinate's expansion relation Collection, searches the data cell corresponding with described data cell in master data set.
In previous step, according to data set identification, the data set found, it may be possible to master data set, also It is probably from data set.Master data set with from data set, there is principal and subordinate's expansion relation, such as, the bag in Fig. 2 Containing relation, or adduction relationship, index relative etc..Utilize this principal and subordinate's expansion relation, the data being modified Unit when master data set, can find out by master data set expand from data set, and from data set The data cell that the data cell that finds further and be modified is corresponding.Or, utilize this principal and subordinate to extend pass It is that the data cell being modified, when from data set, can find out the master data set from data set expanded, And from master data set, find the data cell corresponding with the data cell being modified further.
Such as, in the organization chart of institution of higher education in fig. 2, it is assumed that X certain student of specialty of A system Forward Y specialty to.When performing step S100, search student number (described data cell) place of this student X specialty (from data set) professional code X (data set identification).In this step, according to specialty Code X (data set identification) finds the A system comprising X specialty (to extend pass with having principal and subordinate from data set The master data set of system).In A system (master data set), search the student number with this student (X specialty is repaiied The data cell changed) corresponding student number (data cell of master data set).
It is pointed out that in example, the data cell of amendment comes from from data set, for those skilled in the art For, when the data cell of amendment is similar with situation presented hereinbefore, the most not from the situation of master data set Repeat again.
Simultaneously, it should be pointed out that master data set and be one layer of principal and subordinate's expansion relation between data set here, For multilamellar principal and subordinate's expansion relation, carrying out operation can realize iteration, the most no longer says Bright.
S300: according to the data cell of amended master data set, data set identification, from the data of data set Unit form backup master data set, data set identification, from data set.
According to master data set and the principal and subordinate's expansion relation from data set, by data sheet all of in master data set The mark of unit, all of data cell from data set and each data set all checks out, and presses According to the data cell of amended master data set, data set identification, standby from the form of the data cell of data set Part.Backup operation is described in detail by rear extended meeting.
In the embodiment of the present application, after the amendment of each data cell, all can back up.Data cell is again Can be by calling last change record during backup after amendment, and need not be again from multiple positions called data, therefore, Easy and simple to handle.And revise every time and all form amendment record, make a mistake and be not result in whole repairing when operating Change misregistration, therefore, good stability.
As described in background technology, master data set and each be often distributed in same computer from data set Diverse location, be even distributed in different server.Meanwhile, at master data set with respectively from data set It is often to carry out backing up according to the structure of each data set independence during data cell backup.So, backup is interior Appearance not only comprises the data content of data cell self, also comprises the structure of data, need substantial amounts of storage Resource.In the embodiment of the present application, a kind of data interchange language Backup Data using lightweight is also provided for Technical scheme, in order to alleviate the demand to memory space.
The most first the data interchange language of lightweight is used to be described briefly the embodiment of the present application.
JSON (JavaScript Object Notation) is a kind of by the conception of Douglas Kroc Ford Design, the data interchange language of lightweight.
JSON is used for describing data structure, with the presence of following form:
For object (object), object exits with " { " starts, and with " } ".One object comprises one " name/value " of the non-sequence of series, uses ", " to separate between each " name/value ".Such as: " name ": " a king young waiter in a wineshop or an inn " }.
For name/value (collection), ": " between title and value, is used to separate, such as, " name ": " a king young waiter in a wineshop or an inn ".
One title is a character string.One character string is a string character bracketed with " ".
One value can be a character string, a numerical value, an object, a Boolean, and one in order List, or a null value.
Numerical value refers to the numeral combination of a series of 0-9, can be negative or decimal.Can also with " e " or " E " is expressed as exponential form.
Boolean: be expressed as true or false.
After the ordered list (Array) of value is referred to that one or more value separates with ", ", use " [", "] " list that brackets.The ordered list of value, shape such as [collection, collection].
Further, backup master data set, data set identification, from data set, specifically include:
By the data cell of master data set, data set identification, from the data cell of data set, according to JSON Format conversion is the JSON document combined by object and list.
Programmer, author, three data cells of musician, wherein, every number are comprised below with master data set Illustrate as a example by data set according to corresponding one of unit.
" programmers ": [
{ " firstName ": " Brett ", " lastName ": " McLaughlin ", " email ": " aaaa " },
{ " firstName ": " Jason ", " lastName ": " Hunter ", " email ": " bbbb " },
{ " firstName ": " Elliotte ", " lastName ": " Harold ", " email ": " cccc " }
],
" authors ": [
{ " firstName ": " Isaac ", " lastName ": " Asimov ", " genre ": " sciencefiction " },
{ " firstName ": " Tad ", " lastName ": " Williams ", " genre ": " fantasy " },
{ " firstName ": " Frank ", " lastName ": " Peretti ", " genre ": " christianfiction " }
],
" musicians ": [
{ " firstName ": " Eric ", " lastName ": " Clapton ", " instrument ": " guitar " },
{ " firstName ": " Sergei ", " lastName ": " Rachmaninoff ", " instrument ": " piano " }
]}
Wherein, the Composition of contents object that a pair " { } " of outermost is surrounded.For name/value (collection),
" programmers ":
[
{ " firstName ": " Brett ", " lastName ": " McLaughlin ", " email ": " aaaa " },
{ " firstName ": " Jason ", " lastName ": " Hunter ", " email ": " bbbb " },
{ " firstName ": " Elliotte ", " lastName ": " Harold ", " email ": " cccc " }
],
The Composition of contents list bracketed by a pair " [] ".And " Brett " therein, " McLaughlin ", " aaaa " is then respectively as the data cell from data set program person (programmers).In the application In embodiment, by the data cell (programmer, author, musician) of master data set, from the number of data set According to unit (" Brett ", " McLaughlin ", " aaaa "), data set identification (" firstName ", " lastName ", " email ") etc. be the JSON document combined by object and list according to JSON format conversion.At this In application embodiment, owing to JSON form is a kind of light weight collection data interchange language, therefore backup document Memory space requires significantly to reduce.
Further, described method also includes:
According to default compression algorithm, JSON document is compressed.
In order to reduce the backup document requirement to memory space further, the embodiment of the present application is to JSON document It is compressed processing.The embodiment of the present application uses GZIP compress technique, according to the compression algorithm pair of GZIP JSON document is compressed processing.It should be pointed out that, it is also permissible for using other different compression algorithms , and, it is not construed as the substantial protection scope departing from the embodiment of the present application.
Further, described method also includes:
According to default encryption algorithm, compressed JSON document is encoded.
Owing to the JSON document of compression is difficult to read for user, and it is difficult to transplant.Therefore, this Shen Please embodiment, also provide for the further process of compressed JSON document.The embodiment of the present application uses BASE64 Coding techniques, carries out coded treatment according to BASE64 encryption algorithm to compressed JSON.Equally, should When it is noted that use other different encryption algorithms also possible, and, it is not construed as departing from The substantial protection scope of the embodiment of the present application.
Further, described method also includes:
According to default AES, JSON document is encrypted.
In the embodiment of the present application, in order to protect the safety of backup document, JSON document is encrypted place Reason.The embodiment of the present application uses md5 encryption technology, is encrypted JSON according to md5 encryption algorithm Process.Equally, it is noted that use other different AESs also possible, and, no Should be understood to the substantial protection scope departing from the embodiment of the present application.
Further, described method also includes:
Store encrypted JSON document in order or encoded compression JSON document forms release's letter Breath.
In order to ensure the seriality of amendment, the embodiment of the present application stores encrypted JSON document in order Or encoded compression JSON document forms release's information.Backup document is identified easily according to release's information Order, convenient management.
It is above the backup method of data, it is contemplated that restoration methods is the inverse operation to backup method, Introduce the restoration methods of data below.
Further, a kind of method that data process, it is used for processing master data set, being expanded by master data set The data cell comprised from data set, including:
According to the data cell of master data set in backup document, data set identification, from the data cell of data set, Recover respectively master data set, by master data set according to principal and subordinate's incidence relation expand from data set.
By above description, owing to backup document storing the data cell of master data set, data set mark Know, from the full content of the data cell of data set, therefore, it can the concrete data knot according to each data set Structure and requirement, recover respectively master data set, by master data set according to principal and subordinate's incidence relation expand from data Collection.
Further, described backup document is compressed JSON document, and described method also includes:
To compressed JSON document, decompress according to corresponding decompression algorithm.
The embodiment of the present application uses GZIP compress technique, according to the decompression algorithm of GZIP to JSON document Carry out decompression processing.It should be pointed out that, use other different decompression algorithm also possible, and, It is not construed as the substantial protection scope departing from the embodiment of the present application.
Further, described backup document is encoded compression JSON document, and described method also includes:
For encoded compression JSON document, it is decoded according to corresponding decoding algorithm.
The embodiment of the present application uses BASE64 decoding technique, according to BASE64 decoding algorithm to encoded Compression JSON document is decoded processing.Equally, it is noted that use other different decodings to calculate Method is also possible, and, it is not construed as the substantial protection scope departing from the embodiment of the present application.
Further, described backup document is encrypted JSON document, and described method also includes:
To encrypted JSON document, it is decrypted according to corresponding decipherment algorithm.
The embodiment of the present application uses MD5 decryption technology, is decrypted JSON according to MD5 decipherment algorithm Process.Equally, it is noted that use other different AESs also possible, and, no Should be understood to the substantial protection scope departing from the embodiment of the present application.
Further, described method also includes:
JSON document after deciphering is encrypted again;
Judge that the JSON document again encrypted is the most consistent with the JSON document before deciphering;
When both are consistent, send the message of successful decryption, otherwise, send deciphering failure.
It is pointed out that the correctness in order to verify backup document, prevent from doing non-productive work, the application is real Execute example JSON document after deciphering is encrypted again, and the JSON document more again encrypted and deciphering Front JSON document is the most consistent.When both are inconsistent, then send deciphering failure, and terminate The recovery of data.
Further, described method also includes:
Release's information that acquisition is to be recovered;
According to the backup document that release's information retrieval is to be recovered.
In the embodiment of the present application, identified the order of backup document easily by release's information, consequently facilitating The version extracting the backup document needed is easy to recover.
The method that the data provided for the embodiment of the present application above process, based on same thinking, the application is real Execute example and additionally provide the system that a kind of data process.
Refer to Fig. 3, the structural representation of the system of a kind of data process is provided for the embodiment of the present application.
A kind of data process system 1, for process master data set, by master data set expand from data The data cell that collection is comprised, including:
Search module 11, for searching the master data set at the data cell place being modified or from the number of data set According to set identifier;
Matching module 12, is used for: when the data set identification that described data set identification is master data set, root According to described data set identification, find with described master data set have principal and subordinate's expansion relation from data set, from Data set is searched the data cell corresponding with described data cell, or, when described data set identification is from number During according to the data set identification collected, according to described data set identification, find and from data set, there is principal and subordinate's expansion with described The master data set of exhibition relation, searches the data cell corresponding with described data cell in master data set;
Backup module 13, for according to the data cell of amended master data set, data set identification, from The data cell of data set form backup master data set, data set identification, from data set.
In the embodiment of the present application, data process system 1 in use, data cell amendment after backup time Can be by calling last change record, and need not be again from multiple positions called data, therefore, easy and simple to handle. And revise every time and all form amendment record, make a mistake and when operating, be not result in that whole amendment records is wrong By mistake, therefore, good stability.
Further, backup module 13, be used for backing up master data set, data set identification, from data set, Specifically for:
By the data cell of master data set, data set identification, from the data cell of data set, according to JSON Format conversion is the JSON document combined by object and list.
Further, system 1 also includes that compression module 14, compression module 14 are used for:
According to default compression algorithm, JSON document is compressed.
Further, system 1 also includes that coding module 15, coding module 15 are used for:
According to default encryption algorithm, compressed JSON document is encoded.
Further, system 1 also includes that encrypting module 16, encrypting module 16 are used for:
According to default AES, JSON document is encrypted.
Further, system 1 also includes that version management module 17, version management module 17 are used for:
Store encrypted JSON document in order or encoded compression JSON document forms release's letter Breath.
A kind of data process system 2, for process master data set, by master data set expand from data The data cell that collection is comprised, including:
Recover module 21, for according to the data cell of master data set in backup document, data set identification, From the data cell of data set, recover master data set respectively, extended according to principal and subordinate's incidence relation by master data set Go out from data set.
In the embodiment of the present application, the system 2 that data process in use, can be distinguished by backup document Recover master data set, by master data set according to principal and subordinate's incidence relation expand from data set.Further, mutually Multiple amendment record be the most independent, therefore, good stability.
Further, backup document is compressed JSON document.
System 1 also includes that decompression module 22, decompression module 22 are used for:
To compressed JSON document, decompress according to corresponding decompression algorithm.
Further, backup document is encoded compression JSON document;
System 1 also includes that decoder module 23, decoder module 23 are used for:
For encoded compression JSON document, it is decoded according to corresponding decoding algorithm.
Further, described backup document is encrypted JSON document;
System 1 also includes that deciphering module 24, deciphering module 24 are used for:
To encrypted JSON document, it is decrypted according to corresponding decipherment algorithm.
Further, system 1 also includes that module 25 is examined in school, and school inspection module 25 is used for:
JSON document after deciphering is encrypted again;
Judge that the JSON document again encrypted is the most consistent with the JSON document before deciphering;
When both are consistent, send the message of successful decryption, otherwise, send deciphering failure.
Further, system 1 also includes that version management module 26, version management module 26 are used for:
Release's information that acquisition is to be recovered;
According to the backup document that release's information retrieval is to be recovered.
Those skilled in the art it should be appreciated that embodiments of the invention can be provided as method, system or Computer program.Therefore, the present invention can use complete hardware embodiment, complete software implementation or Form in conjunction with the embodiment in terms of software and hardware.And, the present invention can use one or more wherein The computer-usable storage medium including computer usable program code (includes but not limited to disk storage Device, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and / or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding The processor of formula datatron or other numerical value processing equipments able to programme is to produce a machine so that by calculating The instruction that the processor of machine or other numerical value processing equipments able to programme performs produces for realizing at flow chart one The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other numerical value able to programme can be guided to set In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other numerical value processing equipments able to programme, makes Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
In a typical configuration, calculating equipment includes one or more processor (CPU), input/defeated Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flash RAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that removable media permanent and non-permanent, removable and non-can be by appointing Where method or technology realize information storage.Information can be computer-readable instruction, value structure, program Module or other numerical value.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its The random access memory (RAM) of his type, read only memory (ROM), electrically erasable are read-only Memorizer (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated The information that equipment accesses.According to defining herein, computer-readable medium does not include temporary computer-readable matchmaker Body (transitory media), such as numerical signal and the carrier wave of modulation.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non- Comprising of exclusiveness, so that include that the process of a series of key element, method, commodity or equipment not only wrap Include those key elements, but also include other key elements being not expressly set out, or also include for this process, The key element that method, commodity or equipment are intrinsic.In the case of there is no more restriction, statement " include One ... " key element that limits, it is not excluded that including the process of described key element, method, commodity or setting Other identical element is there is also in Bei.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey Sequence product.Therefore, the application can use complete hardware embodiment, complete software implementation or combine software and The form of the embodiment of hardware aspect.And, the application can use and wherein include calculating one or more The computer-usable storage medium of machine usable program code (include but not limited to disk memory, CD-ROM, Optical memory etc.) form of the upper computer program implemented.
The foregoing is only embodiments herein, be not limited to the application.For this area skill For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle Any modification, equivalent substitution and improvement etc. made, within the scope of should be included in claims hereof.

Claims (24)

1. data process a method, for process master data set, by master data set expand from number The data cell comprised according to collection, it is characterised in that including:
When data cell is modified, search the master data set at described data cell place or from data set Data set identification;
When the data set identification that described data set identification is master data set, according to described data set identification, look for To with described master data set have principal and subordinate's expansion relation from data set, searching and described number from data set According to the data cell that unit is corresponding, or, when described data set identification is from the data set identification of data set, According to described data set identification, find and the described master data set from data set with principal and subordinate's expansion relation, Master data set is searched the data cell corresponding with described data cell;
According to the data cell of amended master data set, data set identification, from the data cell of data set Form backup master data set, data set identification, from data set.
2. the method for claim 1, it is characterised in that backup master data set, data set identification, From data set, specifically include:
By the data cell of master data set, data set identification, from the data cell of data set, according to JSON Format conversion is the JSON document combined by object and list.
3. method as claimed in claim 2, it is characterised in that described method also includes:
According to default compression algorithm, JSON document is compressed.
4. method as claimed in claim 3, it is characterised in that described method also includes:
According to default encryption algorithm, compressed JSON document is encoded.
5. method as claimed in claim 2, it is characterised in that described method also includes:
According to default AES, JSON document is encrypted.
6. the method as described in claim 4 or 5, it is characterised in that described method also includes:
Store encrypted JSON document in order or encoded compression JSON document forms release's letter Breath.
7. data process a method, for process master data set, by master data set expand from number The data cell comprised according to collection, it is characterised in that including:
According to the data cell of master data set in backup document, data set identification, from the data cell of data set, Recover respectively master data set, by master data set according to principal and subordinate's incidence relation expand from data set.
8. method as claimed in claim 7, it is characterised in that described backup document is compressed JSON Document, described method also includes:
To compressed JSON document, decompress according to corresponding decompression algorithm.
9. method as claimed in claim 8, it is characterised in that described backup document is encoded pressure Contracting JSON document, described method also includes:
For encoded compression JSON document, it is decoded according to corresponding decoding algorithm.
10. method as claimed in claim 7, it is characterised in that described backup document is encrypted JSON document, described method also includes:
To encrypted JSON document, it is decrypted according to corresponding decipherment algorithm.
11. methods as claimed in claim 10, it is characterised in that described method also includes:
JSON document after deciphering is encrypted again;
Judge that the JSON document again encrypted is the most consistent with the JSON document before deciphering;
When both are consistent, send the message of successful decryption, otherwise, send deciphering failure.
12. methods as claimed in claim 7, it is characterised in that described method also includes:
Release's information that acquisition is to be recovered;
According to the backup document that release's information retrieval is to be recovered.
The system that 13. 1 kinds of data process, for process master data set, by master data set expand from number The data cell comprised according to collection, it is characterised in that including:
Search module, for searching the master data set at the data cell place being modified or from the data of data set Set identifier;
Matching module, is used for: when the data set identification that described data set identification is master data set, according to institute State data set identification, find with described master data set have principal and subordinate's expansion relation from data set, from data Concentrate and search the data cell corresponding with described data cell, or, when described data set identification is from data set Data set identification time, according to described data set identification, find and from data set, there is principal and subordinate extend pass with described The master data set of system, searches the data cell corresponding with described data cell in master data set;
Backup module, for according to the data cell of amended master data set, data set identification, from data Collection data cell form backup master data set, data set identification, from data set.
14. systems as claimed in claim 13, it is characterised in that described backup module, are used for backing up Master data set, data set identification, from data set, specifically for:
By the data cell of master data set, data set identification, from the data cell of data set, according to JSON Format conversion is the JSON document combined by object and list.
15. systems as claimed in claim 14, it is characterised in that described system also includes compression module, Compression module is used for:
According to default compression algorithm, JSON document is compressed.
16. systems as claimed in claim 15, it is characterised in that described system also includes coding module, Coding module is used for:
According to default encryption algorithm, compressed JSON document is encoded.
17. systems as claimed in claim 14, it is characterised in that described system also includes encrypting module, Encrypting module is used for:
According to default AES, JSON document is encrypted.
18. systems as described in claim 16 or 17, it is characterised in that described system also includes version Management module, version management module is used for:
Store encrypted JSON document in order or encoded compression JSON document forms release's letter Breath.
The system that 19. 1 kinds of data process, for process master data set, by master data set expand from number The data cell comprised according to collection, it is characterised in that including:
Recover module, for according to the data cell of master data set in backup document, data set identification, from number According to the data cell of collection, recover master data set respectively, expanded according to principal and subordinate's incidence relation by master data set From data set.
20. systems as claimed in claim 19, it is characterised in that described backup document is compressed JSON document;
Described system also includes decompression module, and decompression module is used for:
To compressed JSON document, decompress according to corresponding decompression algorithm.
21. systems as claimed in claim 20, it is characterised in that described backup document is encoded Compression JSON document;
Described system also includes decoder module, and decoder module is used for:
For encoded compression JSON document, it is decoded according to corresponding decoding algorithm.
22. systems as claimed in claim 19, it is characterised in that described backup document is encrypted JSON document;
Described system also includes deciphering module, and deciphering module is used for:
To encrypted JSON document, it is decrypted according to corresponding decipherment algorithm.
23. the system as claimed in claim 22, it is characterised in that described system also includes that module is examined in school, School inspection module is used for:
JSON document after deciphering is encrypted again;
Judge that the JSON document again encrypted is the most consistent with the JSON document before deciphering;
When both are consistent, send the message of successful decryption, otherwise, send deciphering failure.
24. systems as claimed in claim 19, it is characterised in that described system also includes version management Module, version management module is used for:
Release's information that acquisition is to be recovered;
According to the backup document that release's information retrieval is to be recovered.
CN201510149484.0A 2015-03-31 2015-03-31 The method and system of data processing Active CN106156076B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510149484.0A CN106156076B (en) 2015-03-31 2015-03-31 The method and system of data processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510149484.0A CN106156076B (en) 2015-03-31 2015-03-31 The method and system of data processing

Publications (2)

Publication Number Publication Date
CN106156076A true CN106156076A (en) 2016-11-23
CN106156076B CN106156076B (en) 2019-09-06

Family

ID=57337237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510149484.0A Active CN106156076B (en) 2015-03-31 2015-03-31 The method and system of data processing

Country Status (1)

Country Link
CN (1) CN106156076B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108268658A (en) * 2018-02-06 2018-07-10 政采云有限公司 Appendchunk storage method and system based on MySQL database
CN110032331A (en) * 2017-11-08 2019-07-19 阿里巴巴集团控股有限公司 For the method and system by improving backup efficiency around coding and decoding
CN112286674A (en) * 2019-07-24 2021-01-29 广东知业科技有限公司 Row-to-column method and system based on edge calculation
CN115686939A (en) * 2022-10-27 2023-02-03 湖南长银五八消费金融股份有限公司 Data backup method and device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7801911B1 (en) * 2004-06-11 2010-09-21 Seisint, Inc. System and method for using activity identifications in a database system
CN102402596A (en) * 2011-11-07 2012-04-04 北京搜狗科技发展有限公司 Reading and writing method and system of master slave separation database
CN102880531A (en) * 2012-09-27 2013-01-16 新浪网技术(中国)有限公司 Database backup system and backup method and slave database server of database backup system
CN102955851A (en) * 2012-10-30 2013-03-06 北京奇虎科技有限公司 Database switching method and device
CN103500229A (en) * 2013-10-24 2014-01-08 北京奇虎科技有限公司 Database synchronization method and database system
US20140258300A1 (en) * 2011-12-23 2014-09-11 Daniel Baeumges Independent Table Nodes In Parallelized Database Environments

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7801911B1 (en) * 2004-06-11 2010-09-21 Seisint, Inc. System and method for using activity identifications in a database system
CN102402596A (en) * 2011-11-07 2012-04-04 北京搜狗科技发展有限公司 Reading and writing method and system of master slave separation database
US20140258300A1 (en) * 2011-12-23 2014-09-11 Daniel Baeumges Independent Table Nodes In Parallelized Database Environments
CN102880531A (en) * 2012-09-27 2013-01-16 新浪网技术(中国)有限公司 Database backup system and backup method and slave database server of database backup system
CN102955851A (en) * 2012-10-30 2013-03-06 北京奇虎科技有限公司 Database switching method and device
CN103500229A (en) * 2013-10-24 2014-01-08 北京奇虎科技有限公司 Database synchronization method and database system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110032331A (en) * 2017-11-08 2019-07-19 阿里巴巴集团控股有限公司 For the method and system by improving backup efficiency around coding and decoding
CN108268658A (en) * 2018-02-06 2018-07-10 政采云有限公司 Appendchunk storage method and system based on MySQL database
CN108268658B (en) * 2018-02-06 2021-02-26 政采云有限公司 MySQL database-based large text field storage method and system
CN112286674A (en) * 2019-07-24 2021-01-29 广东知业科技有限公司 Row-to-column method and system based on edge calculation
CN112286674B (en) * 2019-07-24 2023-12-19 广东知业科技有限公司 Edge calculation-based row-column conversion method and system
CN115686939A (en) * 2022-10-27 2023-02-03 湖南长银五八消费金融股份有限公司 Data backup method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN106156076B (en) 2019-09-06

Similar Documents

Publication Publication Date Title
US10778441B2 (en) Redactable document signatures
EP2784665B1 (en) Program and version control method
JP4848317B2 (en) Database indexing system, method and program
US9053576B2 (en) Identifying reroutable data columns in an ETL process
JP5907902B2 (en) Table equijoin system by secret calculation, method
CN106156076A (en) The method and system that data process
CN107148616A (en) The efficient annotation system controlled for distributed version
JP2017041171A (en) Test scenario generation support device and test scenario generation support method
JP2009042869A (en) Database management program and database management apparatus
CN106933689A (en) A kind of method and apparatus for computing device
CN104021219A (en) Method and device for generating data template
CN108446115A (en) A kind of method and device of code reuse
JP4477531B2 (en) Data import method and data import apparatus
US20210303404A1 (en) Systems and methods for database migration
CN101908174A (en) Method, device and EAP (Enterprise Application Platform) system for processing part object information in drawing file
CN111949655A (en) Form display method and device, electronic equipment and medium
Eyal-Salman et al. Feature-to-code traceability in legacy software variants
CN117033309A (en) Data conversion method and device, electronic equipment and readable storage medium
CN115952201A (en) Data query method, device, system and storage medium
CN110221778A (en) Processing method, system, storage medium and the electronic equipment of hotel's data
JP6042229B2 (en) k-anonymous database control server and control method
CN113257375A (en) Method for desensitizing sudden acute infectious disease data
CN105988891B (en) A kind of data in magnetic disk restorative procedure and device
JP2018081403A (en) Incident management system, incident management method and computer program
JP2014174921A (en) Information processing system, and name-identification determination method and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.