CN106354605A - Database access method and system and server provided with system - Google Patents
Database access method and system and server provided with system Download PDFInfo
- Publication number
- CN106354605A CN106354605A CN201610802481.7A CN201610802481A CN106354605A CN 106354605 A CN106354605 A CN 106354605A CN 201610802481 A CN201610802481 A CN 201610802481A CN 106354605 A CN106354605 A CN 106354605A
- Authority
- CN
- China
- Prior art keywords
- data base
- access
- described data
- service name
- order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3089—Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
Abstract
The invention provides a database access method and system and a server provided with the system. The database access method comprises the following steps: a system identifier used for the access to the database is intercepted; whether a backup tool provided by the data base is called or not for connecting the database is judged; if not, according to the database system identifier, splicing is used for the access to a first service name under the state that the backup tool is not called according to the first preset splicing format; if yes, according to the database system identifier, splicing is used for the access to a second service name under the state that the backup tool is called according to the second preset splicing format. According to the database access method and system and the server provided with the system, monitoring is not required, so that a listener.ora file is not modified, the product application difficulty is reduced, and the risk caused by modifying the client environment is avoided.
Description
Technical field
The invention belongs to structural data resist technology field, it is related to the access method of data base, system and there is this is
The server of system.
Background technology
At present, nbu, avamar of emc etc. of backup software present on market, such as Symantec, when needing using close
When the mode of code checking accesses oracle database, need to start a monitoring between database server and client
Device (listener).In audiomonitor, (data base may be multiple to having to record the corresponding Service name of associated databases
Service name).By Service name it is possible to set up the connection between client and server.
Service name is registered in audiomonitor data base, has 2 kinds of methods:
1) dynamic registration
Dynamic registration is when data base is in mount or open, and pmon process is according in initsid.ora
Two parameters of instance_name, service_names are by example and service dynamic registration in audiomonitor.
2) static registration
Static registration is exactly to read the configuration of listener.ora file when example starts, and example and service are registered to prison
Listen program.
When data base is in nomount state, could recover to control file.Now data base does not also have dynamic registration data
Storehouse service is that is to say, that can not be monitored using dynamic.So in Backup and Restore field, being generally adopted by static monitoring.Use
Static monitoring, needs human configuration listener.ora.
Configuration audiomonitor, can bring following some problems in practical operation, for example,
1) configuration is monitored and is possessed certain difficulty, needs field conduct personnel to possess certain oracle knowledge.Implement people
The training of member's relevant knowledge, improves the cost of product field conduct indirectly.
2) need the production environment configuration in client to monitor, if configured with problem, influence whether the actual production of client
Activity.
Therefore, how a kind of access method of data base, system and the server with this system are provided, existing to solve
Technology is in data backup restoration field because, during using static monitoring, configuring audiomonitor, and lead to improve product field conduct one-tenth
This, is if configuration goes wrong, the defect such as impact actual production activity, asked with becoming practitioner in the art's technology urgently to be resolved hurrily in fact
Topic.
Content of the invention
The shortcoming of prior art in view of the above, it is an object of the invention to provide a kind of access method of data base,
System and the server with this system, during for solving the monitoring static because of employing of data backup restoration field in prior art,
Audiomonitor need to be configured, and lead to improve product field conduct cost, if configuration goes wrong, affect asking of actual production activity
Topic.
For achieving the above object and other related purposes, one aspect of the present invention provides a kind of access method of data base, institute
The access method stating data base comprises the following steps: intercepts in order to access the system identifier of described data base;Judge whether to adjust
Connect this data base with the backup tool that described data base provides;If it is not, then according to described system identifier, predetermined according to first
Splicing form, splices in the state of backup tool described in never call, in order to access the first service name of described data base;If
It is, then according to described system identifier, according to the second predetermined splicing form, to splice in the state of calling described backup tool,
In order to access the second service name of described data base.
In one embodiment of the invention, described intercepting is in order to access the step bag of the system identifier of described data base
Include: in order to monitor the monitoring process of client connection process state in detecting system, described system is intercepted from this monitoring process
Identifier.
In one embodiment of the invention, described splicing in the state of backup tool described in never call, in order to access
The step stating the first service name of data base includes according to the first predetermined splicing form, will in the case of need not opening monitoring,
Access the variable required by described data base to fill to the described first predetermined splicing form to form first service name;Described change
Amount includes connection protocol, database version number, database version number and the system calling backup tool to be connected with described data base
The connection value of identifier and/or environmental variable;Described connection protocol is beq agreement.
In one embodiment of the invention, described splicing is in the state of calling described backup tool, described in order to access
The step of the second service name of data base is included by second according to predetermined splicing form, will visit in the case of need not opening monitoring
Ask that the variable required by described data base is filled to the described second predetermined splicing form to form second service name;Described variable
Including the connection protocol calling backup tool to be connected with described data base, database version number, database version number and system mark
Know connection value, environmental variable and/or the ESC in order to escape of symbol.
In one embodiment of the invention, between the step in order to the system identifier accessing described data base for the intercepting,
The access method of described data base also includes obtaining the log-on message of data base described in User logs in;The login letter of described data base
Breath is by the process under root user, create a log-on message in order to obtain installing DB user subprocess and
Obtain.
In one embodiment of the invention, by described log-on message and first service name, or by described log-on message
Access described data base with described second service name.
Another aspect of the present invention provides a kind of access system of data base, and the access system of described data base includes: intercepts
Module, for intercepting in order to access the system identifier of described data base;Processing module, is used for judging whether to call described data
The backup tool that storehouse provides connects this data base;If it is not, then according to described system identifier, according to the first predetermined splicing form,
Splice in the state of backup tool described in never call, for accessing the first service name of described data base;If so, then according to institute
State system identifier, according to the second predetermined splicing form, splicing is in the state of calling described backup tool, described for accessing
The second service name of data base.
In one embodiment of the invention, connect this data in the backup tool being judged as data base's offer described in never call
During storehouse, described processing module is additionally operable to, according to the first predetermined splicing form, will access described in the case of need not opening monitoring
Variable required by data base is filled to the described first predetermined splicing form to form first service name;Described variable includes adjusting
Connection protocol, described database version number, connection value and/or the environmental variable being connected with described data base with backup tool.
In one embodiment of the invention, it is being judged as calling the backup tool that described data base provides to connect this data base
When, described processing module is additionally operable to by second according to predetermined splicing form, will access described number in the case of need not opening monitoring
Fill to the described second predetermined splicing form according to the variable that place requires to form second service name;Described variable includes calling
Connection protocol that backup tool is connected with described data base, described database version number, connection value, environmental variable and/or in order to
The ESC of escape.
Another aspect of the invention provides a kind of server, including the access system of described data base
As described above, the access method of the data base of the present invention, system and the server with this system, having following has
Beneficial effect:
First, the access method of data base of the present invention, system and have this system server pass through program from
Dynamic generation beq bound symbol, and without the tnsname.ora file changed environmentally;
Second, do not need using monitoring because the present invention connects data base using beq agreement, thus without modification
Listener.ora file, reduces the difficulty of product enforcement, has evaded the risk that modification user rs environment is brought;
3rd, the present invention can be signed in in data base using account number cipher, carry out standby in the case that data base closes
Part is recovered.
Brief description
Fig. 1 is shown as the access method of the data base of the present invention schematic flow sheet in an embodiment.
Fig. 2 is shown as the access system of the data base of present invention theory structure schematic diagram in an embodiment.
Fig. 3 is shown as the server of present invention theory structure schematic diagram in an embodiment.
Component label instructions
The access system of 1 data base
11 acquisition modules
12 interception modules
13 processing modules
14 access modules
2 servers
S1~s6 step
Specific embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art can be by this specification
Disclosed content understands other advantages and effect of the present invention easily.The present invention can also be by addition different concrete realities
The mode of applying is carried out or applies, and the every details in this specification can also be based on different viewpoints and application, without departing from
Carry out various modifications and changes under the spirit of the present invention.It should be noted that, in the case of not conflicting, following examples and enforcement
Feature in example can be mutually combined.
It should be noted that the diagram provided in following examples only illustrates the basic structure of the present invention in a schematic way
Think, then only show the assembly relevant with the present invention in schema rather than according to component count during actual enforcement, shape and size
Draw, during its actual enforcement, the kenel of each assembly, quantity and ratio can be a kind of random change, and its assembly layout kenel
It is likely more complexity.
The access method of data base of the present invention, system and there is the server of this system need to seek backup client
It is present in in an operating system with data base.Backup client and data base are present in be made with meeting in an operating system
Essential condition with beq protocol access data base.
The know-why of the access method of data base of the present invention, system and the server with this system is to pass through
Programming automatic generation beq bound symbol, and without the tnsname.ora file changed environmentally;Beq agreement does not need using prison
Listen, thus without modification listener.ora file.Without the environment of configuration client, reach the effect simplifying software deployment.
Embodiment one
The present embodiment provides a kind of access method of data base it is characterised in that the access method of described data base includes
Following steps:
Intercept in order to access the system identifier of described data base;
Judge whether to call the backup tool that described data base provides to connect this data base;If so, then according to described system
Identifier, according to the first predetermined splicing form, splices in the state of calling described backup tool, in order to access described data base
First service name;If it is not, then according to described system identifier, according to the second predetermined splicing form, splicing is described in never call
In the state of backup tool, in order to access the second service name of described data base.
Below with reference to diagram, the access method of the data base described in the present embodiment is described in detail.The present embodiment institute
The access method of the data base providing is applied to oracle database.Access described oracle database and include form in 2:
One kind is it is not necessary to account and password may log into this oracle database using operating system certification.
Another kind is exactly to need to log in described oracle database, the present embodiment institute using the method for account and cipher authentication
The access method of the data base stating is in the case that described oracle database is closed, should using account and password login
Oracle database, to carry out data backup restoration.
Refer to Fig. 1, be shown as the access method of the data base schematic flow sheet in an embodiment.As shown in figure 1, institute
The access method stating data base specifically includes following step:
S1, obtains the log-on message of data base described in User logs in.In the present embodiment, the log-on message of described data base
It is by, in the process under root user (root user), creating a log-on message in order to obtain installing DB user
Subprocess and obtain.When creating subprocess, parent process belongs to root user, and subprocess falls within root user.Parent process waits
Subprocess exits.In the present embodiment, described log-on message includes account and the password logging in described data.
S2, intercepts in order to access the system identifier of described data base.Specifically, described intercepting is in order to access described data
The process of the system identifier in storehouse be by detecting system in order to monitor the monitoring process of client connection process state, from this
Described system identifier (sid) is intercepted on monitoring process.In the present embodiment, described oracle database start when,
A monitoring process (ora_pmon_sid) in order to monitor client connection process state can be produced, when operating system is detected
On ora_pmon_* process, then intercept the rearmost information of process title as system identifier, such as this monitoring process
Process title be ora_pmon_orcl, then sid be orcl.
S3, judges whether to call the backup tool that described data base provides to connect this data base;If it is not, then execution step
s4;If so, then execution step s5.In the present embodiment, described backup tool is rman.
S4, according to described system identifier (sid) according to a predetermined splicing form, splicing is in backup tool described in never call
In the state of, in order to access the first service name of described data base.In the present embodiment, the splicing of described first service name
As follows:
According to the first predetermined splicing form, will access required by described data base in the case of need not opening monitoring
Variable is filled to the described first predetermined splicing form to form first service name;Described variable includes calling backup tool and institute
State connection protocol, the connection value of database version number, database version number and system identifier and/or the ring of data base's connection
Border variable;Described connection protocol is beq agreement.In the present embodiment, it is spliced into the connection identifier of the entitled sqlplus of first service
Symbol.Concrete form is:
Wherein, calling the connection protocol that backup tool is connected with described data base to represent specified for protocol=beq makes
Use beq agreement;
Database version program=$ oracleversion represents the version of specified oracle program.oracle 8i
Product in the past, the value of $ oracleversion is closely bound up with the concrete version of oracle, such as oracle 7.3 version, $
The value of oracleversion is oracle73;Orale 8 version, the value of $ oracleversion is oracle80;Work as oracle
Version after 8i, the primary system of $ oracleversion is oracle.
Database version number and the connection value argv0=$ oracle $ sid of system identifier;The value of argv0, is $
The connection value that oracle and $ sid couples together.If database version is oracle12c, sid is orcl.So value of argv0
For oracleorcl.
Environmental variable envs='oracle_sid=$ sid'.
S5, according to described system identifier (sid) according to another predetermined splicing form, described backup tool is being called in splicing
When in order to access the second service name of described data base.In the present embodiment, the splicing of described second service name is as follows:
By second according to predetermined splicing form, will access required by described data base in the case of need not opening monitoring
Variable is filled to the described second predetermined splicing form to form second service name;Described variable includes calling backup tool and institute
State connection protocol, described database version number, connection value, environmental variable and/or the escape word in order to escape of data base's connection
Symbol.Described first predetermined splicing form and the second predetermined splicing form are a fixing splicing form.
In the present embodiment, it is spliced into the connection identifier (CID of the entitled rman of second service.Concrete form is:
In the present embodiment, the difference of the connection identifier (CID of the connection identifier (CID of described sqlplus and rman is, described
4 ^ escape symbols before single quotation marks for the connection identifier (CID of rman.
S6, by described log-on message and first service name, or is visited by described log-on message and described second service name
Ask described data base.
The access method of the data base described in the present embodiment passes through programming automatic generation beq bound symbol, and without modification
Tnsname.ora file environmentally;Do not need using monitoring due to connecting data base using beq agreement, thus without modification
Listener.ora file, reduces the difficulty of product enforcement, has evaded the risk that modification user rs environment is brought, and can count
In the case of closing according to storehouse, signed in in data base using account number cipher, carry out Backup and Restore.
Embodiment two
The present embodiment provides a kind of access system 1 of data base, refers to Fig. 2, be shown as the access system of data base in
Theory structure schematic diagram in one embodiment.As shown in Fig. 2 the access system 1 of described data base includes: acquisition module 11, cut
Delivery block 12, processing module 13 and access modules 14.
Described acquisition module 11 is used for obtaining the log-on message of data base described in User logs in.In the present embodiment, described
The log-on message of data base be described acquisition module 11 pass through in the process under root user (root user), create one in order to
Obtain the subprocess of log-on message of installing DB user and obtain.
The interception module 12 being connected with described acquisition module 11 is used for intercepting in order to access the system banner of described data base
Symbol.Specifically, described interception module 12 is used for by entering in order to monitor the supervision of client connection process state in detecting system
Journey, intercepts described system identifier (sid) from this monitoring process.In the present embodiment, described oracle database is starting
When, a monitoring process (ora_pmon_sid) in order to monitor client connection process state can be produced, when detecting
Ora_pmon_* process in operating system, then intercepts the rearmost information of process title as system identifier, for example should
The process title of monitoring process is ora_pmon_orcl, then sid is orcl.
The processing module 13 being connected with described interception module 12 is used for the backup judging whether to call described data base to provide
Instrument connects this data base;If it is not, then according to described system identifier, splicing, under backup tool state described in never call, is used
To access the first service name of described data base;If so, then according to described system identifier (sid), splicing call described standby
Under part tool state, in order to access the second service name of described data base.In the present embodiment, described backup tool is rman.
In the present embodiment, when the backup tool being judged as that data base described in never call provides connects this data base, institute
State processing module 13 for according to the first predetermined splicing form, described data base will be accessed in the case of need not opening monitoring
Required variable is filled to the described first predetermined splicing form to form first service name;Described variable includes calling backup
Connection protocol, described database version number, connection value and/or environmental variable that instrument is connected with described data base;Described connection
Agreement is beq agreement.
In the present embodiment, when being judged as calling the backup tool that described data base provides to connect this data base, described
Processing module 13 is used for by second according to predetermined splicing form, will access described data place in the case of need not opening monitoring
The variable requiring is filled to the described second predetermined splicing form to form second service name;Described variable includes calling backup work
Have the connection protocol being connected with described data base, described database version number, connection value, environmental variable and/or in order to escape
ESC.
The access modules 14 being connected with described acquisition module 11 and processing module 13 are used for, by described log-on message and
One Service name, or described data base is accessed by described log-on message and described second service name.
The present embodiment also provides a kind of server 2, refers to Fig. 3, is shown as principle knot in an embodiment for the server
Structure schematic diagram.As shown in figure 3, described server 2 includes the access system 1 of above-mentioned data base.
In sum, the access method of data base of the present invention, system and have this system server pass through journey
Sequence automatically generates beq bound symbol, and without the tnsname.ora file changed environmentally;Due to connecting number using beq agreement
Do not need using monitoring according to storehouse, thus without modification listener.ora file, reducing the difficulty of product enforcement, having evaded and having repaiied
Change the risk that user rs environment is brought, and can be signed in in data base using account number cipher, enter in the case that data base closes
Row Backup and Restore.So, the present invention effectively overcomes various shortcoming of the prior art and has high industrial utilization.
Above-described embodiment only principle of the illustrative present invention and its effect, not for the restriction present invention.Any ripe
The personage knowing this technology all can carry out modifications and changes without prejudice under the spirit and the scope of the present invention to above-described embodiment.Cause
This, those of ordinary skill in the art is complete with institute under technological thought without departing from disclosed spirit such as
All equivalent modifications becoming or change, must be covered by the claim of the present invention.
Claims (10)
1. a kind of access method of data base is it is characterised in that the access method of described data base comprises the following steps:
Intercept in order to access the system identifier of described data base;
Judge whether to call the backup tool that described data base provides to connect this data base;If it is not, then according to described system banner
Symbol, according to the first predetermined splicing form, splices in the state of backup tool described in never call, in order to access described data base's
First service name;If so, then according to described system identifier, according to the second predetermined splicing form, described backup is being called in splicing
In the state of instrument, in order to access the second service name of described data base.
2. data base according to claim 1 access method it is characterised in that: described intercept in order to access described data
The step of the system identifier in storehouse includes: in order to monitor the monitoring process of client connection process state in detecting system, from this
Described system identifier is intercepted on monitoring process.
3. data base according to claim 1 access method it is characterised in that: described splicing described in never call back up
In the state of instrument, the step in order to access the first service name of described data base includes according to the first predetermined splicing form, will
In the case of need not opening monitoring, access the variable required by described data base and fill to the described first predetermined splicing form
To form first service name;Described variable includes connection protocol, the version database calling backup tool to be connected with described data base
The connection value of this number, database version number and system identifier and/or environmental variable;Described connection protocol is beq agreement.
4. data base according to claim 3 access method it is characterised in that: described backup work is being called in described splicing
In the state of tool, the step in order to access the second service name of described data base is included by second according to predetermined splicing form, will be
In the case of monitoring need not being opened, access the variable required by described data base fill to the described second predetermined splicing form with
Form second service name;Described variable includes connection protocol, the database version calling backup tool to be connected with described data base
Number, the connection value of database version number and system identifier, environmental variable and/or the ESC in order to escape.
5. data base according to claim 1 access method it is characterised in that: intercept in order to access described data base
The step of system identifier between, the access method of described data base also includes obtaining the login of data base described in User logs in
Information;
The log-on message of described data base is to be used in order to obtain installing DB by the process under root user, creating one
The subprocess of the log-on message at family and obtain.
6. data base according to claim 5 access method it is characterised in that: by described log-on message and first clothes
Business name, or described data base is accessed by described log-on message and described second service name.
7. a kind of access system of data base is it is characterised in that the access system of described data base includes:
Interception module, for intercepting in order to access the system identifier of described data base;
Processing module, for judging whether to call the backup tool that described data base provides to connect this data base;If it is not, then basis
Described system identifier, according to the first predetermined splicing form, splices in the state of backup tool described in never call, for accessing
The first service name of described data base;If so, then according to described system identifier, according to the second predetermined splicing form, splicing exists
In the state of calling described backup tool, for accessing the second service name of described data base.
8. data base according to claim 7 access system it is characterised in that: be judged as data base described in never call
When connecting this data base, described processing module is additionally operable to according to the first predetermined splicing form the backup tool providing, will be need not
Open in the case of monitoring, access the variable required by described data base and fill to the described first predetermined splicing form to be formed
First service name;Connection protocol that described variable includes calling backup tool to be connected with described data base, database version number, number
Connection value and/or environmental variable according to storehouse version number and system identifier.
9. data base according to claim 7 access system it is characterised in that: be judged as calling described data base to carry
For backup tool connect this data base when, described processing module is additionally operable to by second according to predetermined splicing form, will need not open
In the case of opening monitoring, access the variable required by described data base and fill to the described second predetermined splicing form to form the
Two Service names;Connection protocol that described variable includes calling backup tool to be connected with described data base, database version number, data
The connection value of storehouse version number and system identifier, environmental variable and/or the ESC in order to escape.
10. a kind of server is it is characterised in that include the access system of data base as claimed in any one of claims 7-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610802481.7A CN106354605B (en) | 2016-09-05 | 2016-09-05 | A kind of access method of database, system and the server with the system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610802481.7A CN106354605B (en) | 2016-09-05 | 2016-09-05 | A kind of access method of database, system and the server with the system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106354605A true CN106354605A (en) | 2017-01-25 |
CN106354605B CN106354605B (en) | 2019-06-21 |
Family
ID=57858832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610802481.7A Active CN106354605B (en) | 2016-09-05 | 2016-09-05 | A kind of access method of database, system and the server with the system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106354605B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101004683A (en) * | 2007-01-31 | 2007-07-25 | 华为技术有限公司 | Method and device for accessing database |
US20130339297A1 (en) * | 2012-06-18 | 2013-12-19 | Actifio, Inc. | System and method for efficient database record replication using different replication strategies based on the database records |
CN103838781A (en) * | 2012-11-27 | 2014-06-04 | 中兴通讯股份有限公司 | Database access method and system |
CN105159920A (en) * | 2015-07-28 | 2015-12-16 | 卡斯柯信号有限公司 | Attribute tag based database access method |
CN105183751A (en) * | 2015-07-13 | 2015-12-23 | 深信服网络科技(深圳)有限公司 | Database access method and database access device |
CN105335432A (en) * | 2014-08-11 | 2016-02-17 | 无锡华润微电子有限公司 | Oracle database access method |
-
2016
- 2016-09-05 CN CN201610802481.7A patent/CN106354605B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101004683A (en) * | 2007-01-31 | 2007-07-25 | 华为技术有限公司 | Method and device for accessing database |
CN100456237C (en) * | 2007-01-31 | 2009-01-28 | 华为技术有限公司 | Method and device for accessing database |
US20130339297A1 (en) * | 2012-06-18 | 2013-12-19 | Actifio, Inc. | System and method for efficient database record replication using different replication strategies based on the database records |
CN103838781A (en) * | 2012-11-27 | 2014-06-04 | 中兴通讯股份有限公司 | Database access method and system |
CN105335432A (en) * | 2014-08-11 | 2016-02-17 | 无锡华润微电子有限公司 | Oracle database access method |
CN105183751A (en) * | 2015-07-13 | 2015-12-23 | 深信服网络科技(深圳)有限公司 | Database access method and database access device |
CN105159920A (en) * | 2015-07-28 | 2015-12-16 | 卡斯柯信号有限公司 | Attribute tag based database access method |
Non-Patent Citations (1)
Title |
---|
NICK SNOWDON: "《Oracle与Visual Basic编程指南》", 30 September 2000, 北京:电子工业出版社 * |
Also Published As
Publication number | Publication date |
---|---|
CN106354605B (en) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7603375B2 (en) | System and method for generating a custom application | |
US8532970B2 (en) | Systems and methods for network monitoring and analysis of a simulated network | |
US8977739B2 (en) | Configurable frame work for testing and analysis of client-side web browser page performance | |
US8434129B2 (en) | Method and apparatus for multi-domain identity interoperability and compliance verification | |
CA2670231C (en) | Automated testing and control of networked devices | |
US20140046645A1 (en) | Systems and methods for network monitoring and analysis of a simulated network | |
US7516045B2 (en) | Method of providing content to a target device in a network | |
US7315807B1 (en) | System and methods for storage area network simulation | |
CN106357609B (en) | A kind of method and system, public network server and private clound equipment creating user | |
CN109460223A (en) | A kind of API gateway management system and its method | |
CN107678962A (en) | The automated testing method and device of a kind of cli interface | |
CN106326088B (en) | Method and device for realizing construction of test object and device for realizing service configuration test | |
CN106897216A (en) | The method and apparatus of test software | |
CN107645546A (en) | File monitor method, smart machine and storage medium based on Android system | |
US20140207935A1 (en) | Simulating real user issues in support environments | |
CN115150377A (en) | Method and device for calling and processing simulation interface | |
CN109241712A (en) | A kind of method and apparatus for accessing file system | |
CN106354605B (en) | A kind of access method of database, system and the server with the system | |
US11823701B2 (en) | Network operation based on domain specific language | |
CN111782557B (en) | Method and system for testing web application permission | |
US11316832B1 (en) | Computer network data center with reverse firewall and encryption enabled gateway for security against privacy attacks over a multiplexed communication channel | |
WO2016201810A1 (en) | Log generation method and device | |
CN111367797A (en) | Comprehensive test data generation method and device, electronic equipment and storage medium | |
WO2023150577A1 (en) | Isolated arena environment instantiation for asynchronous content delivery | |
CN114285613A (en) | Data information calling method and device, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |