CN106354605A - Database access method and system and server provided with system - Google Patents

Database access method and system and server provided with system Download PDF

Info

Publication number
CN106354605A
CN106354605A CN201610802481.7A CN201610802481A CN106354605A CN 106354605 A CN106354605 A CN 106354605A CN 201610802481 A CN201610802481 A CN 201610802481A CN 106354605 A CN106354605 A CN 106354605A
Authority
CN
China
Prior art keywords
data base
access
described data
service name
order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610802481.7A
Other languages
Chinese (zh)
Other versions
CN106354605B (en
Inventor
陈沐豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Eisoo Information Technology Co Ltd
Original Assignee
Shanghai Eisoo Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Eisoo Information Technology Co Ltd filed Critical Shanghai Eisoo Information Technology Co Ltd
Priority to CN201610802481.7A priority Critical patent/CN106354605B/en
Publication of CN106354605A publication Critical patent/CN106354605A/en
Application granted granted Critical
Publication of CN106354605B publication Critical patent/CN106354605B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register

Abstract

The invention provides a database access method and system and a server provided with the system. The database access method comprises the following steps: a system identifier used for the access to the database is intercepted; whether a backup tool provided by the data base is called or not for connecting the database is judged; if not, according to the database system identifier, splicing is used for the access to a first service name under the state that the backup tool is not called according to the first preset splicing format; if yes, according to the database system identifier, splicing is used for the access to a second service name under the state that the backup tool is called according to the second preset splicing format. According to the database access method and system and the server provided with the system, monitoring is not required, so that a listener.ora file is not modified, the product application difficulty is reduced, and the risk caused by modifying the client environment is avoided.

Description

A kind of access method of data base, system and the server with this system
Technical field
The invention belongs to structural data resist technology field, it is related to the access method of data base, system and there is this is The server of system.
Background technology
At present, nbu, avamar of emc etc. of backup software present on market, such as Symantec, when needing using close When the mode of code checking accesses oracle database, need to start a monitoring between database server and client Device (listener).In audiomonitor, (data base may be multiple to having to record the corresponding Service name of associated databases Service name).By Service name it is possible to set up the connection between client and server.
Service name is registered in audiomonitor data base, has 2 kinds of methods:
1) dynamic registration
Dynamic registration is when data base is in mount or open, and pmon process is according in initsid.ora Two parameters of instance_name, service_names are by example and service dynamic registration in audiomonitor.
2) static registration
Static registration is exactly to read the configuration of listener.ora file when example starts, and example and service are registered to prison Listen program.
When data base is in nomount state, could recover to control file.Now data base does not also have dynamic registration data Storehouse service is that is to say, that can not be monitored using dynamic.So in Backup and Restore field, being generally adopted by static monitoring.Use Static monitoring, needs human configuration listener.ora.
Configuration audiomonitor, can bring following some problems in practical operation, for example,
1) configuration is monitored and is possessed certain difficulty, needs field conduct personnel to possess certain oracle knowledge.Implement people The training of member's relevant knowledge, improves the cost of product field conduct indirectly.
2) need the production environment configuration in client to monitor, if configured with problem, influence whether the actual production of client Activity.
Therefore, how a kind of access method of data base, system and the server with this system are provided, existing to solve Technology is in data backup restoration field because, during using static monitoring, configuring audiomonitor, and lead to improve product field conduct one-tenth This, is if configuration goes wrong, the defect such as impact actual production activity, asked with becoming practitioner in the art's technology urgently to be resolved hurrily in fact Topic.
Content of the invention
The shortcoming of prior art in view of the above, it is an object of the invention to provide a kind of access method of data base, System and the server with this system, during for solving the monitoring static because of employing of data backup restoration field in prior art, Audiomonitor need to be configured, and lead to improve product field conduct cost, if configuration goes wrong, affect asking of actual production activity Topic.
For achieving the above object and other related purposes, one aspect of the present invention provides a kind of access method of data base, institute The access method stating data base comprises the following steps: intercepts in order to access the system identifier of described data base;Judge whether to adjust Connect this data base with the backup tool that described data base provides;If it is not, then according to described system identifier, predetermined according to first Splicing form, splices in the state of backup tool described in never call, in order to access the first service name of described data base;If It is, then according to described system identifier, according to the second predetermined splicing form, to splice in the state of calling described backup tool, In order to access the second service name of described data base.
In one embodiment of the invention, described intercepting is in order to access the step bag of the system identifier of described data base Include: in order to monitor the monitoring process of client connection process state in detecting system, described system is intercepted from this monitoring process Identifier.
In one embodiment of the invention, described splicing in the state of backup tool described in never call, in order to access The step stating the first service name of data base includes according to the first predetermined splicing form, will in the case of need not opening monitoring, Access the variable required by described data base to fill to the described first predetermined splicing form to form first service name;Described change Amount includes connection protocol, database version number, database version number and the system calling backup tool to be connected with described data base The connection value of identifier and/or environmental variable;Described connection protocol is beq agreement.
In one embodiment of the invention, described splicing is in the state of calling described backup tool, described in order to access The step of the second service name of data base is included by second according to predetermined splicing form, will visit in the case of need not opening monitoring Ask that the variable required by described data base is filled to the described second predetermined splicing form to form second service name;Described variable Including the connection protocol calling backup tool to be connected with described data base, database version number, database version number and system mark Know connection value, environmental variable and/or the ESC in order to escape of symbol.
In one embodiment of the invention, between the step in order to the system identifier accessing described data base for the intercepting, The access method of described data base also includes obtaining the log-on message of data base described in User logs in;The login letter of described data base Breath is by the process under root user, create a log-on message in order to obtain installing DB user subprocess and Obtain.
In one embodiment of the invention, by described log-on message and first service name, or by described log-on message Access described data base with described second service name.
Another aspect of the present invention provides a kind of access system of data base, and the access system of described data base includes: intercepts Module, for intercepting in order to access the system identifier of described data base;Processing module, is used for judging whether to call described data The backup tool that storehouse provides connects this data base;If it is not, then according to described system identifier, according to the first predetermined splicing form, Splice in the state of backup tool described in never call, for accessing the first service name of described data base;If so, then according to institute State system identifier, according to the second predetermined splicing form, splicing is in the state of calling described backup tool, described for accessing The second service name of data base.
In one embodiment of the invention, connect this data in the backup tool being judged as data base's offer described in never call During storehouse, described processing module is additionally operable to, according to the first predetermined splicing form, will access described in the case of need not opening monitoring Variable required by data base is filled to the described first predetermined splicing form to form first service name;Described variable includes adjusting Connection protocol, described database version number, connection value and/or the environmental variable being connected with described data base with backup tool.
In one embodiment of the invention, it is being judged as calling the backup tool that described data base provides to connect this data base When, described processing module is additionally operable to by second according to predetermined splicing form, will access described number in the case of need not opening monitoring Fill to the described second predetermined splicing form according to the variable that place requires to form second service name;Described variable includes calling Connection protocol that backup tool is connected with described data base, described database version number, connection value, environmental variable and/or in order to The ESC of escape.
Another aspect of the invention provides a kind of server, including the access system of described data base
As described above, the access method of the data base of the present invention, system and the server with this system, having following has Beneficial effect:
First, the access method of data base of the present invention, system and have this system server pass through program from Dynamic generation beq bound symbol, and without the tnsname.ora file changed environmentally;
Second, do not need using monitoring because the present invention connects data base using beq agreement, thus without modification Listener.ora file, reduces the difficulty of product enforcement, has evaded the risk that modification user rs environment is brought;
3rd, the present invention can be signed in in data base using account number cipher, carry out standby in the case that data base closes Part is recovered.
Brief description
Fig. 1 is shown as the access method of the data base of the present invention schematic flow sheet in an embodiment.
Fig. 2 is shown as the access system of the data base of present invention theory structure schematic diagram in an embodiment.
Fig. 3 is shown as the server of present invention theory structure schematic diagram in an embodiment.
Component label instructions
The access system of 1 data base
11 acquisition modules
12 interception modules
13 processing modules
14 access modules
2 servers
S1~s6 step
Specific embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art can be by this specification Disclosed content understands other advantages and effect of the present invention easily.The present invention can also be by addition different concrete realities The mode of applying is carried out or applies, and the every details in this specification can also be based on different viewpoints and application, without departing from Carry out various modifications and changes under the spirit of the present invention.It should be noted that, in the case of not conflicting, following examples and enforcement Feature in example can be mutually combined.
It should be noted that the diagram provided in following examples only illustrates the basic structure of the present invention in a schematic way Think, then only show the assembly relevant with the present invention in schema rather than according to component count during actual enforcement, shape and size Draw, during its actual enforcement, the kenel of each assembly, quantity and ratio can be a kind of random change, and its assembly layout kenel It is likely more complexity.
The access method of data base of the present invention, system and there is the server of this system need to seek backup client It is present in in an operating system with data base.Backup client and data base are present in be made with meeting in an operating system Essential condition with beq protocol access data base.
The know-why of the access method of data base of the present invention, system and the server with this system is to pass through Programming automatic generation beq bound symbol, and without the tnsname.ora file changed environmentally;Beq agreement does not need using prison Listen, thus without modification listener.ora file.Without the environment of configuration client, reach the effect simplifying software deployment.
Embodiment one
The present embodiment provides a kind of access method of data base it is characterised in that the access method of described data base includes Following steps:
Intercept in order to access the system identifier of described data base;
Judge whether to call the backup tool that described data base provides to connect this data base;If so, then according to described system Identifier, according to the first predetermined splicing form, splices in the state of calling described backup tool, in order to access described data base First service name;If it is not, then according to described system identifier, according to the second predetermined splicing form, splicing is described in never call In the state of backup tool, in order to access the second service name of described data base.
Below with reference to diagram, the access method of the data base described in the present embodiment is described in detail.The present embodiment institute The access method of the data base providing is applied to oracle database.Access described oracle database and include form in 2:
One kind is it is not necessary to account and password may log into this oracle database using operating system certification.
Another kind is exactly to need to log in described oracle database, the present embodiment institute using the method for account and cipher authentication The access method of the data base stating is in the case that described oracle database is closed, should using account and password login Oracle database, to carry out data backup restoration.
Refer to Fig. 1, be shown as the access method of the data base schematic flow sheet in an embodiment.As shown in figure 1, institute The access method stating data base specifically includes following step:
S1, obtains the log-on message of data base described in User logs in.In the present embodiment, the log-on message of described data base It is by, in the process under root user (root user), creating a log-on message in order to obtain installing DB user Subprocess and obtain.When creating subprocess, parent process belongs to root user, and subprocess falls within root user.Parent process waits Subprocess exits.In the present embodiment, described log-on message includes account and the password logging in described data.
S2, intercepts in order to access the system identifier of described data base.Specifically, described intercepting is in order to access described data The process of the system identifier in storehouse be by detecting system in order to monitor the monitoring process of client connection process state, from this Described system identifier (sid) is intercepted on monitoring process.In the present embodiment, described oracle database start when, A monitoring process (ora_pmon_sid) in order to monitor client connection process state can be produced, when operating system is detected On ora_pmon_* process, then intercept the rearmost information of process title as system identifier, such as this monitoring process Process title be ora_pmon_orcl, then sid be orcl.
S3, judges whether to call the backup tool that described data base provides to connect this data base;If it is not, then execution step s4;If so, then execution step s5.In the present embodiment, described backup tool is rman.
S4, according to described system identifier (sid) according to a predetermined splicing form, splicing is in backup tool described in never call In the state of, in order to access the first service name of described data base.In the present embodiment, the splicing of described first service name As follows:
According to the first predetermined splicing form, will access required by described data base in the case of need not opening monitoring Variable is filled to the described first predetermined splicing form to form first service name;Described variable includes calling backup tool and institute State connection protocol, the connection value of database version number, database version number and system identifier and/or the ring of data base's connection Border variable;Described connection protocol is beq agreement.In the present embodiment, it is spliced into the connection identifier of the entitled sqlplus of first service Symbol.Concrete form is:
Wherein, calling the connection protocol that backup tool is connected with described data base to represent specified for protocol=beq makes Use beq agreement;
Database version program=$ oracleversion represents the version of specified oracle program.oracle 8i Product in the past, the value of $ oracleversion is closely bound up with the concrete version of oracle, such as oracle 7.3 version, $ The value of oracleversion is oracle73;Orale 8 version, the value of $ oracleversion is oracle80;Work as oracle Version after 8i, the primary system of $ oracleversion is oracle.
Database version number and the connection value argv0=$ oracle $ sid of system identifier;The value of argv0, is $ The connection value that oracle and $ sid couples together.If database version is oracle12c, sid is orcl.So value of argv0 For oracleorcl.
Environmental variable envs='oracle_sid=$ sid'.
S5, according to described system identifier (sid) according to another predetermined splicing form, described backup tool is being called in splicing When in order to access the second service name of described data base.In the present embodiment, the splicing of described second service name is as follows:
By second according to predetermined splicing form, will access required by described data base in the case of need not opening monitoring Variable is filled to the described second predetermined splicing form to form second service name;Described variable includes calling backup tool and institute State connection protocol, described database version number, connection value, environmental variable and/or the escape word in order to escape of data base's connection Symbol.Described first predetermined splicing form and the second predetermined splicing form are a fixing splicing form.
In the present embodiment, it is spliced into the connection identifier (CID of the entitled rman of second service.Concrete form is:
In the present embodiment, the difference of the connection identifier (CID of the connection identifier (CID of described sqlplus and rman is, described 4 ^ escape symbols before single quotation marks for the connection identifier (CID of rman.
S6, by described log-on message and first service name, or is visited by described log-on message and described second service name Ask described data base.
The access method of the data base described in the present embodiment passes through programming automatic generation beq bound symbol, and without modification Tnsname.ora file environmentally;Do not need using monitoring due to connecting data base using beq agreement, thus without modification Listener.ora file, reduces the difficulty of product enforcement, has evaded the risk that modification user rs environment is brought, and can count In the case of closing according to storehouse, signed in in data base using account number cipher, carry out Backup and Restore.
Embodiment two
The present embodiment provides a kind of access system 1 of data base, refers to Fig. 2, be shown as the access system of data base in Theory structure schematic diagram in one embodiment.As shown in Fig. 2 the access system 1 of described data base includes: acquisition module 11, cut Delivery block 12, processing module 13 and access modules 14.
Described acquisition module 11 is used for obtaining the log-on message of data base described in User logs in.In the present embodiment, described The log-on message of data base be described acquisition module 11 pass through in the process under root user (root user), create one in order to Obtain the subprocess of log-on message of installing DB user and obtain.
The interception module 12 being connected with described acquisition module 11 is used for intercepting in order to access the system banner of described data base Symbol.Specifically, described interception module 12 is used for by entering in order to monitor the supervision of client connection process state in detecting system Journey, intercepts described system identifier (sid) from this monitoring process.In the present embodiment, described oracle database is starting When, a monitoring process (ora_pmon_sid) in order to monitor client connection process state can be produced, when detecting Ora_pmon_* process in operating system, then intercepts the rearmost information of process title as system identifier, for example should The process title of monitoring process is ora_pmon_orcl, then sid is orcl.
The processing module 13 being connected with described interception module 12 is used for the backup judging whether to call described data base to provide Instrument connects this data base;If it is not, then according to described system identifier, splicing, under backup tool state described in never call, is used To access the first service name of described data base;If so, then according to described system identifier (sid), splicing call described standby Under part tool state, in order to access the second service name of described data base.In the present embodiment, described backup tool is rman.
In the present embodiment, when the backup tool being judged as that data base described in never call provides connects this data base, institute State processing module 13 for according to the first predetermined splicing form, described data base will be accessed in the case of need not opening monitoring Required variable is filled to the described first predetermined splicing form to form first service name;Described variable includes calling backup Connection protocol, described database version number, connection value and/or environmental variable that instrument is connected with described data base;Described connection Agreement is beq agreement.
In the present embodiment, when being judged as calling the backup tool that described data base provides to connect this data base, described Processing module 13 is used for by second according to predetermined splicing form, will access described data place in the case of need not opening monitoring The variable requiring is filled to the described second predetermined splicing form to form second service name;Described variable includes calling backup work Have the connection protocol being connected with described data base, described database version number, connection value, environmental variable and/or in order to escape ESC.
The access modules 14 being connected with described acquisition module 11 and processing module 13 are used for, by described log-on message and One Service name, or described data base is accessed by described log-on message and described second service name.
The present embodiment also provides a kind of server 2, refers to Fig. 3, is shown as principle knot in an embodiment for the server Structure schematic diagram.As shown in figure 3, described server 2 includes the access system 1 of above-mentioned data base.
In sum, the access method of data base of the present invention, system and have this system server pass through journey Sequence automatically generates beq bound symbol, and without the tnsname.ora file changed environmentally;Due to connecting number using beq agreement Do not need using monitoring according to storehouse, thus without modification listener.ora file, reducing the difficulty of product enforcement, having evaded and having repaiied Change the risk that user rs environment is brought, and can be signed in in data base using account number cipher, enter in the case that data base closes Row Backup and Restore.So, the present invention effectively overcomes various shortcoming of the prior art and has high industrial utilization.
Above-described embodiment only principle of the illustrative present invention and its effect, not for the restriction present invention.Any ripe The personage knowing this technology all can carry out modifications and changes without prejudice under the spirit and the scope of the present invention to above-described embodiment.Cause This, those of ordinary skill in the art is complete with institute under technological thought without departing from disclosed spirit such as All equivalent modifications becoming or change, must be covered by the claim of the present invention.

Claims (10)

1. a kind of access method of data base is it is characterised in that the access method of described data base comprises the following steps:
Intercept in order to access the system identifier of described data base;
Judge whether to call the backup tool that described data base provides to connect this data base;If it is not, then according to described system banner Symbol, according to the first predetermined splicing form, splices in the state of backup tool described in never call, in order to access described data base's First service name;If so, then according to described system identifier, according to the second predetermined splicing form, described backup is being called in splicing In the state of instrument, in order to access the second service name of described data base.
2. data base according to claim 1 access method it is characterised in that: described intercept in order to access described data The step of the system identifier in storehouse includes: in order to monitor the monitoring process of client connection process state in detecting system, from this Described system identifier is intercepted on monitoring process.
3. data base according to claim 1 access method it is characterised in that: described splicing described in never call back up In the state of instrument, the step in order to access the first service name of described data base includes according to the first predetermined splicing form, will In the case of need not opening monitoring, access the variable required by described data base and fill to the described first predetermined splicing form To form first service name;Described variable includes connection protocol, the version database calling backup tool to be connected with described data base The connection value of this number, database version number and system identifier and/or environmental variable;Described connection protocol is beq agreement.
4. data base according to claim 3 access method it is characterised in that: described backup work is being called in described splicing In the state of tool, the step in order to access the second service name of described data base is included by second according to predetermined splicing form, will be In the case of monitoring need not being opened, access the variable required by described data base fill to the described second predetermined splicing form with Form second service name;Described variable includes connection protocol, the database version calling backup tool to be connected with described data base Number, the connection value of database version number and system identifier, environmental variable and/or the ESC in order to escape.
5. data base according to claim 1 access method it is characterised in that: intercept in order to access described data base The step of system identifier between, the access method of described data base also includes obtaining the login of data base described in User logs in Information;
The log-on message of described data base is to be used in order to obtain installing DB by the process under root user, creating one The subprocess of the log-on message at family and obtain.
6. data base according to claim 5 access method it is characterised in that: by described log-on message and first clothes Business name, or described data base is accessed by described log-on message and described second service name.
7. a kind of access system of data base is it is characterised in that the access system of described data base includes:
Interception module, for intercepting in order to access the system identifier of described data base;
Processing module, for judging whether to call the backup tool that described data base provides to connect this data base;If it is not, then basis Described system identifier, according to the first predetermined splicing form, splices in the state of backup tool described in never call, for accessing The first service name of described data base;If so, then according to described system identifier, according to the second predetermined splicing form, splicing exists In the state of calling described backup tool, for accessing the second service name of described data base.
8. data base according to claim 7 access system it is characterised in that: be judged as data base described in never call When connecting this data base, described processing module is additionally operable to according to the first predetermined splicing form the backup tool providing, will be need not Open in the case of monitoring, access the variable required by described data base and fill to the described first predetermined splicing form to be formed First service name;Connection protocol that described variable includes calling backup tool to be connected with described data base, database version number, number Connection value and/or environmental variable according to storehouse version number and system identifier.
9. data base according to claim 7 access system it is characterised in that: be judged as calling described data base to carry For backup tool connect this data base when, described processing module is additionally operable to by second according to predetermined splicing form, will need not open In the case of opening monitoring, access the variable required by described data base and fill to the described second predetermined splicing form to form the Two Service names;Connection protocol that described variable includes calling backup tool to be connected with described data base, database version number, data The connection value of storehouse version number and system identifier, environmental variable and/or the ESC in order to escape.
10. a kind of server is it is characterised in that include the access system of data base as claimed in any one of claims 7-9.
CN201610802481.7A 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system Active CN106354605B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610802481.7A CN106354605B (en) 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610802481.7A CN106354605B (en) 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system

Publications (2)

Publication Number Publication Date
CN106354605A true CN106354605A (en) 2017-01-25
CN106354605B CN106354605B (en) 2019-06-21

Family

ID=57858832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610802481.7A Active CN106354605B (en) 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system

Country Status (1)

Country Link
CN (1) CN106354605B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101004683A (en) * 2007-01-31 2007-07-25 华为技术有限公司 Method and device for accessing database
US20130339297A1 (en) * 2012-06-18 2013-12-19 Actifio, Inc. System and method for efficient database record replication using different replication strategies based on the database records
CN103838781A (en) * 2012-11-27 2014-06-04 中兴通讯股份有限公司 Database access method and system
CN105159920A (en) * 2015-07-28 2015-12-16 卡斯柯信号有限公司 Attribute tag based database access method
CN105183751A (en) * 2015-07-13 2015-12-23 深信服网络科技(深圳)有限公司 Database access method and database access device
CN105335432A (en) * 2014-08-11 2016-02-17 无锡华润微电子有限公司 Oracle database access method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101004683A (en) * 2007-01-31 2007-07-25 华为技术有限公司 Method and device for accessing database
CN100456237C (en) * 2007-01-31 2009-01-28 华为技术有限公司 Method and device for accessing database
US20130339297A1 (en) * 2012-06-18 2013-12-19 Actifio, Inc. System and method for efficient database record replication using different replication strategies based on the database records
CN103838781A (en) * 2012-11-27 2014-06-04 中兴通讯股份有限公司 Database access method and system
CN105335432A (en) * 2014-08-11 2016-02-17 无锡华润微电子有限公司 Oracle database access method
CN105183751A (en) * 2015-07-13 2015-12-23 深信服网络科技(深圳)有限公司 Database access method and database access device
CN105159920A (en) * 2015-07-28 2015-12-16 卡斯柯信号有限公司 Attribute tag based database access method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NICK SNOWDON: "《Oracle与Visual Basic编程指南》", 30 September 2000, 北京:电子工业出版社 *

Also Published As

Publication number Publication date
CN106354605B (en) 2019-06-21

Similar Documents

Publication Publication Date Title
US7603375B2 (en) System and method for generating a custom application
US8532970B2 (en) Systems and methods for network monitoring and analysis of a simulated network
US8977739B2 (en) Configurable frame work for testing and analysis of client-side web browser page performance
US8434129B2 (en) Method and apparatus for multi-domain identity interoperability and compliance verification
CA2670231C (en) Automated testing and control of networked devices
US20140046645A1 (en) Systems and methods for network monitoring and analysis of a simulated network
US7516045B2 (en) Method of providing content to a target device in a network
US7315807B1 (en) System and methods for storage area network simulation
CN106357609B (en) A kind of method and system, public network server and private clound equipment creating user
CN109460223A (en) A kind of API gateway management system and its method
CN107678962A (en) The automated testing method and device of a kind of cli interface
CN106326088B (en) Method and device for realizing construction of test object and device for realizing service configuration test
CN106897216A (en) The method and apparatus of test software
CN107645546A (en) File monitor method, smart machine and storage medium based on Android system
US20140207935A1 (en) Simulating real user issues in support environments
CN115150377A (en) Method and device for calling and processing simulation interface
CN109241712A (en) A kind of method and apparatus for accessing file system
CN106354605B (en) A kind of access method of database, system and the server with the system
US11823701B2 (en) Network operation based on domain specific language
CN111782557B (en) Method and system for testing web application permission
US11316832B1 (en) Computer network data center with reverse firewall and encryption enabled gateway for security against privacy attacks over a multiplexed communication channel
WO2016201810A1 (en) Log generation method and device
CN111367797A (en) Comprehensive test data generation method and device, electronic equipment and storage medium
WO2023150577A1 (en) Isolated arena environment instantiation for asynchronous content delivery
CN114285613A (en) Data information calling method and device, storage medium and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant