CN106354605B - A kind of access method of database, system and the server with the system - Google Patents
A kind of access method of database, system and the server with the system Download PDFInfo
- Publication number
- CN106354605B CN106354605B CN201610802481.7A CN201610802481A CN106354605B CN 106354605 B CN106354605 B CN 106354605B CN 201610802481 A CN201610802481 A CN 201610802481A CN 106354605 B CN106354605 B CN 106354605B
- Authority
- CN
- China
- Prior art keywords
- database
- access
- service name
- format
- splicing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3089—Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
Abstract
The present invention provides the access method, system and the server with the system of a kind of database, and the access method of the database is the following steps are included: intercept the system identifier to access the database;Judge whether that the backup tool for calling the database to provide connects the database;If it is not, then according to the system identifier, in the state of splicing the backup tool described in never call, according to the first predetermined splicing format, to access the first service name of the database;If so, according to the second predetermined splicing format, being spliced in the state of calling the backup tool, to access the second service name of the database according to the system identifier.Access method, system and the server with the system of database of the present invention are not needed using monitoring, to not have to modification listener.ora file, are reduced the difficulty of product implementation, have been evaded modification user rs environment bring risk.
Description
Technical field
The invention belongs to structural data protection technique field, it is related to the access method of database, system and is with this
The server of system.
Background technique
Currently, existing backup software on the market, such as the NBU of Symantec, the Avamar etc. of EMC, when needing using close
When the mode Accessing Oracle Database of code verifying, need to start a monitoring between database server and client
Device (Listener).In monitor, will record the corresponding Service name of associated databases, (database may be corresponding with multiple
Service name).Pass through Service name, so that it may establish the connection between client and server.
Service name is registered in monitor by database, there is 2 kinds of methods:
1) dynamic registration
Dynamic registration is when database is in mount open, and PMON process is according in initSID.ora
Two parameters of instance_name, service_names are by example and service dynamic registration into monitor.
2) static registration
Static registration is exactly that the configuration of listener.ora file is read when example starting, and example and service are registered to prison
Listen program.
When database is in nomount state, could restore to control file.Database does not have dynamic registration data also at this time
Library service, that is to say, that dynamic cannot be used to monitor.So being generally adopted by static monitoring in Backup and Restore field.It uses
Static state is monitored, and human configuration listener.ora is needed.
Monitor is configured, following some problems can be brought in actual operation, for example,
1) configuration, which is monitored, has certain difficulty, and field conduct personnel is needed to have certain Oracle knowledge.Implement people
The training of member's relevant knowledge, improves the cost of product field conduct indirectly.
2) it needs to configure in the production environment of client and monitor, if configuration is problematic, influence whether the actual production of client
Activity.
Therefore, how the access method, system and the server with the system of a kind of database are provided, it is existing to solve
Technology need to configure monitor when data backup restoration field is because using static monitor, and cause to improve product field conduct at
This, it is real to be asked with becoming practitioner in the art's technology urgently to be resolved if the defects of configuration goes wrong, influences actual production activity
Topic.
Summary of the invention
In view of the foregoing deficiencies of prior art, the purpose of the present invention is to provide a kind of access method of database,
System and server with the system, for when solving that data backup restoration field is because using static monitor in the prior art,
Monitor need to be configured, and causes to improve product field conduct cost, if configuration goes wrong, influences that actual production is movable to ask
Topic.
In order to achieve the above objects and other related objects, one aspect of the present invention provides a kind of access method of database, institute
The access method of database is stated the following steps are included: intercepting the system identifier to access the database;Judge whether to adjust
The database is connected with the backup tool that the database provides;If it is not, then according to the system identifier, it is predetermined according to first
Splice format, in the state of splicing the backup tool described in never call, to access the first service name of the database;If
It is then to be spliced in the state of calling the backup tool according to the system identifier according to the second predetermined splicing format,
To access the second service name of the database.
In one embodiment of the invention, the packet the step of system identifier intercepted to access the database
It includes: to monitor the monitoring process of client connection process state in detection system, the system is intercepted from the monitoring process
Identifier.
In one embodiment of the invention, in the state of splicing backup tool described in never call, to access
The step of stating the first service name of database include according to the first predetermined splicing format, will in the case where being monitored without opening,
Variable required by the database is accessed to fill into the described first predetermined splicing format to form first service name;The change
Amount includes connection protocol, database version number, database version number and the system for calling backup tool to connect with the database
The connection value, and/or environmental variance of identifier;The connection protocol is BEQ agreement.
In one embodiment of the invention, the splicing is described to access in the state of calling the backup tool
The step of second service name of database includes that will visit in the case where monitoring without opening by second according to predetermined splicing format
Ask that variable required by the database is filled into the described second predetermined splicing format to form second service name;The variable
Including connection protocol, database version number, database version number and the system mark for calling backup tool to connect with the database
Know connection value, environmental variance, and/or the escape character to escape of symbol.
In one embodiment of the invention, between the step of intercepting the system identifier to access the database,
The access method of the database further includes the log-on message for obtaining user and logging in the database;The login of the database is believed
Breath be create by the process under root user a log-on message to obtain installing DB user subprocess and
It obtains.
In one embodiment of the invention, by the log-on message and first service name, or pass through the log-on message
The database is accessed with the second service name.
Another aspect of the present invention provides a kind of access system of database, and the access system of the database includes: interception
Module, for intercepting the system identifier to access the database;Processing module calls the data for judging whether
The backup tool that library provides connects the database;If it is not, make a reservation for splicing format according to first then according to the system identifier,
In the state of splicing the backup tool described in never call, for accessing the first service name of the database;If so, according to institute
System identifier is stated, according to the second predetermined splicing format, is spliced in the state of calling the backup tool, it is described for accessing
The second service name of database.
In one embodiment of the invention, the data are connected in the backup tool for being judged as that database described in never call provides
When library, the processing module is also used to according to the first predetermined splicing format, will be in the case where monitoring without opening, described in access
Variable required by database is filled into the described first predetermined splicing format to form first service name;The variable includes adjusting
Connection protocol, the database version number, connection value, and/or the environmental variance being connect with backup tool with the database.
In one embodiment of the invention, the database is connected in the backup tool for being judged as that the calling database provides
When, the processing module is also used to that the number will be accessed in the case where monitoring without opening according to predetermined splicing format by second
It fills into the described second predetermined splicing format according to variable required by library to form second service name;The variable includes calling
Connection protocol that backup tool is connect with the database, the database version number, connection value, environmental variance, and/or to
The escape character of escape.
Another aspect of the invention provides a kind of server, the access system including the database
As described above, the access method of database of the invention, system and the server with the system, have with following
Beneficial effect:
First, access method, system and the server with the system of database of the present invention pass through program certainly
It is dynamic to generate BEQ bound symbol, and do not have to the tnsname.ora file of modification environmentally;
Second, since the present invention is not needed using BEQ agreement connection database using monitoring, to not have to modification
Listener.ora file reduces the difficulty of product implementation, has evaded modification user rs environment bring risk;
Third, the present invention can be logged on in database using account number cipher, be carried out standby in the case where database is closed
Part is restored.
Detailed description of the invention
Fig. 1 is shown as flow diagram of the access method of database of the invention in an embodiment.
Fig. 2 is shown as the access system of the database of the invention theory structure schematic diagram in an embodiment.
Fig. 3 is shown as the server of the invention theory structure schematic diagram in an embodiment.
Component label instructions
The access system of 1 database
11 obtain module
12 interception modules
13 processing modules
14 access modules
2 servers
S1~S6 step
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification
Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities
The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from
Various modifications or alterations are carried out under spirit of the invention.It should be noted that in the absence of conflict, following embodiment and implementation
Feature in example can be combined with each other.
It should be noted that illustrating the basic structure that only the invention is illustrated in a schematic way provided in following embodiment
Think, only shown in schema then with related component in the present invention rather than component count, shape and size when according to actual implementation
Draw, when actual implementation kenel, quantity and the ratio of each component can arbitrarily change for one kind, and its assembly layout kenel
It is likely more complexity.
Access method, system and the server with the system of database of the present invention need to seek backup client
It is present in database in an operating system.Backup client and database are present in and are made with meeting in an operating system
With the necessary condition of BEQ protocol access database.
The technical principle of the access method of database of the present invention, system and the server with the system is to pass through
Programming automatic generation BEQ bound symbol, and do not have to the tnsname.ora file of modification environmentally;BEQ agreement is not needed using prison
It listens, to not have to modification listener.ora file.Without configuring the environment of client, simplified software deployment is haved the function that.
Embodiment one
The present embodiment provides a kind of access methods of database, which is characterized in that the access method of the database includes
Following steps:
Intercept the system identifier to access the database;
Judge whether that the backup tool for calling the database to provide connects the database;If so, according to the system
Identifier splices in the state of calling the backup tool, according to the first predetermined splicing format to access the database
First service name;If it is not, then according to the system identifier, according to the second predetermined splicing format, splicing is described in the never call
In the state of backup tool, to access the second service name of the database.
It is described in detail below with reference to the access method of diagram database described in the present embodiment.The present embodiment institute
The access method of the database of offer is applied to oracle database.Accessing the oracle database includes form in 2:
One is using operating system to authenticate, does not need account and password may log into the oracle database.
Another kind is exactly to need to log in the oracle database, the present embodiment institute using account and the method for cipher authentication
The access method for the database stated is to be somebody's turn to do in the case where the oracle database is closed using account and password login
Oracle database, to carry out data backup restoration.
Referring to Fig. 1, being shown as flow diagram of the access method of database in an embodiment.As shown in Figure 1, institute
The access method for stating database specifically includes following steps:
S1 obtains the log-on message that user logs in the database.In the present embodiment, the log-on message of the database
It is by the process under root user (root user), creating a log-on message to obtain installing DB user
Subprocess and obtain.When creating subprocess, parent process belongs to root user, and subprocess also belongs to root user.Parent process waits
Subprocess exits.In the present embodiment, the log-on message includes logging in the account and password of the data.
S2 intercepts the system identifier to access the database.Specifically, the interception is to access the data
The process of the system identifier in library is by the monitoring process in detection system to monitor client connection process state, from this
The system identifier (SID) is intercepted in monitoring process.In the present embodiment, the oracle database starting when,
A monitoring process (ora_pmon_SID) to monitor client connection process state can be generated, when detecting operating system
On ora_pmon_* process, then intercept the rearmost information of process title as system identifier, such as the monitoring process
Process title be ora_pmon_orcl, then SID be orcl.
S3 judges whether that the backup tool for calling the database to provide connects the database;If it is not, thening follow the steps
S4;If so, thening follow the steps S5.In the present embodiment, the backup tool is RMAN.
S4 splices the backup tool described in never call according to the system identifier (SID) according to a predetermined splicing format
In the state of, to access the first service name of the database.In the present embodiment, the splicing of the first service name
It is as follows:
According to the first predetermined splicing format, will be accessed required by the database in the case where being monitored without opening
Variable is filled into the described first predetermined splicing format to form first service name;The variable includes calling backup tool and institute
State database connection connection protocol, database version number, database version number and system identifier connection value, and/or ring
Border variable;The connection protocol is BEQ agreement.In the present embodiment, it is spliced into the connection identifier of the entitled sqlplus of first service
Symbol.Specific format are as follows:
Wherein, the connection protocol for calling backup tool to connect with the database, which is that PROTOCOL=beq expression is specified, to be made
With BEQ agreement;
Database version PROGRAM=$ oracleVersion indicates the version of specified Oracle program.Oracle 8i
Pervious product, the value of $ oracleVersion and the specific version of Oracle are closely bound up, such as 7.3 version of Oracle, $
The value of oracleVersion is oracle73;8 version of Orale, the value of $ oracleVersion are oracle80;Work as oracle
Version after 8i, the primary system of $ oracleVersion are oracle.
The connection value ARGV0=$ oracle $ sid of database version number and system identifier;The value of ARGV0 is $
The connection value that oracle and $ sid is connected.If database version is Oracle12c, sid orcl.So value of ARGV0
For oracleorcl.
Environmental variance ENVS='ORACLE_SID=$ sid'.
S5, according to the system identifier (SID) according to another predetermined splicing format, the backup tool is being called in splicing
When to access the second service name of the database.In the present embodiment, the splicing of the second service name is as follows:
By second according to predetermined splicing format, will be accessed required by the database in the case where being monitored without opening
Variable is filled into the described second predetermined splicing format to form second service name;The variable includes calling backup tool and institute
State connection protocol, the database version number, connection value, environmental variance, and/or the escape word to escape of database connection
Symbol.Described first predetermined format and the second predetermined splicing format of splicing is a fixed splicing format.
In the present embodiment, it is spliced into the connection identifier (CID of the entitled RMAN of second service.Specific format are as follows:
In the present embodiment, the difference of the connection identifier (CID of the connection identifier (CID and RMAN of the sqlplus is, described
4 ^ escape symbols of the connection identifier (CID of RMAN before single quotation marks.
S6 is visited by the log-on message and first service name, or by the log-on message and the second service name
Ask the database.
The access method of database described in the present embodiment does not have to modification by programming automatic generation BEQ bound symbol
Tnsname.ora file environmentally;Due to using BEQ agreement connection database not need to use monitoring, to not have to modification
Listener.ora file reduces the difficulty of product implementation, has evaded modification user rs environment bring risk, and can be in number
In the case where being closed according to library, logged on in database using account number cipher, carries out Backup and Restore.
Embodiment two
The present embodiment provides a kind of access systems 1 of database, referring to Fig. 2, be shown as the access system of database in
Theory structure schematic diagram in one embodiment.As shown in Fig. 2, the access system 1 of the database includes: to obtain module 11, cut
Modulus block 12, processing module 13 and access modules 14.
The acquisition module 11 is for obtaining the log-on message that user logs in the database.In the present embodiment, described
The log-on message of database is the acquisition module 11 by the process under root user (root user), creation one to
It obtains the subprocess of the log-on message of installing DB user and obtains.
The interception module 12 connecting with the acquisition module 11 is used to intercept the system banner to access the database
Symbol.Specifically, the interception module 12 be used for by detection system to monitor the monitoring of client connection process state into
Journey intercepts the system identifier (SID) from the monitoring process.In the present embodiment, the oracle database is starting
When, a monitoring process (ora_pmon_SID) to monitor client connection process state can be generated, when detecting
Then ora_pmon_* process in operating system intercepts the rearmost information of process title as system identifier, such as should
The process title of monitoring process is ora_pmon_orcl, then SID is orcl.
The backup that the processing module 13 connecting with the interception module 12 is used to judge whether to call the database to provide
Tool connects the database;If it is not, then being spliced under the backup tool state described in never call according to the system identifier, use
To access the first service name of the database;If so, splicing is described standby in calling according to the system identifier (SID)
Under part tool state, to access the second service name of the database.In the present embodiment, the backup tool is RMAN.
In the present embodiment, when the backup tool for being judged as that database described in never call provides connects the database, institute
Processing module 13 is stated for the database will to be accessed in the case where monitoring without opening according to the first predetermined splicing format
Required variable is filled into the described first predetermined splicing format to form first service name;The variable includes calling backup
Connection protocol, the database version number, connection value, and/or the environmental variance that tool is connect with the database;The connection
Agreement is BEQ agreement.
In the present embodiment, described when being judged as that the backup tool for calling the database to provide connects the database
Processing module 13 is used to that the database institute will to be accessed in the case where monitoring without opening according to predetermined splicing format by second
It is required that variable fill into the described second predetermined splicing format to form second service name;The variable includes calling backup work
Have the connection protocol connecting with the database, the database version number, connection value, environmental variance, and/or to escape
Escape character.
It is used for the acquisition module 11 and the access modules 14 that connect of processing module 13, passes through the log-on message and the
One Service name, or the database is accessed by the log-on message and the second service name.
The present embodiment also provides a kind of server 2, referring to Fig. 3, being shown as principle knot of the server in an embodiment
Structure schematic diagram.As shown in figure 3, the server 2 includes the access system 1 of above-mentioned database.
In conclusion the access method of database of the present invention, system and the server with the system pass through journey
Sequence automatically generates BEQ bound symbol, and does not have to the tnsname.ora file of modification environmentally;Due to using BEQ agreement connection number
It does not need according to library using monitoring, to not have to modification listener.ora file, reduces the difficulty of product implementation, evaded and having repaired
Change user rs environment bring risk, and can be logged on in database in the case where database is closed using account number cipher, into
Row Backup and Restore.So the present invention effectively overcomes various shortcoming in the prior art and has high industrial utilization value.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe
The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause
This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as
At all equivalent modifications or change, should be covered by the claims of the present invention.
Claims (6)
1. a kind of access method of database, which is characterized in that the access method of the database the following steps are included:
Intercept the system identifier to access the database;
Judge whether that the backup tool for calling the database to provide connects the database;If it is not, then according to the system banner
Symbol, according to the first predetermined splicing format, in the state of splicing the backup tool described in never call, to access the database
First service name;If so, according to the second predetermined splicing format, the backup is being called in splicing according to the system identifier
In the state of tool, to access the second service name of the database;
Wherein, it will access variable required by the database in the case where being monitored without opening and fill to described first in advance
Surely splice in format to form first service name;The variable includes the connection for calling backup tool to connect with the database at this time
Agreement, database version number, database version number and system identifier connection value, and/or environmental variance;
It will access variable required by the database in the case where being monitored without opening and fill to the described second predetermined splicing
To form second service name in format;At this time the variable include call backup tool connect with the database connection protocol,
The database version number, connection value, environmental variance, and/or the escape character to escape;
The connection protocol is BEQ agreement.
2. the access method of database according to claim 1, it is characterised in that: the interception is to access the data
The step of system identifier in library includes: to the monitoring process for monitoring client connection process state in detection system, from this
The system identifier is intercepted in monitoring process.
3. the access method of database according to claim 1, it is characterised in that: in interception to access the database
System identifier the step of before, the access method of the database further includes obtaining user to log in the login of the database
Information;The log-on message of the database is by the process under root user, creating one to obtain installing DB
The subprocess of the log-on message of user and obtain.
4. the access method of database according to claim 3, it is characterised in that: taken by the log-on message and first
Business name, or pass through the log-on message and the second service name access database.
5. a kind of access system of database, which is characterized in that the access system of the database includes:
Interception module, for intercepting the system identifier to access the database;
Processing module, for judging whether that the backup tool for calling the database to provide connects the database;If it is not, then basis
The system identifier, according to the first predetermined splicing format, in the state of splicing the backup tool described in never call, for accessing
The first service name of the database;If so, according to the second predetermined splicing format, splicing exists according to the system identifier
In the state of calling the backup tool, for accessing the second service name of the database;
Wherein, it will access variable required by the database in the case where being monitored without opening and fill to described first in advance
Surely splice in format to form first service name;The variable includes the connection for calling backup tool to connect with the database at this time
Agreement, database version number, database version number and system identifier connection value, and/or environmental variance;
It will access variable required by the database in the case where being monitored without opening and fill to the described second predetermined splicing
To form second service name in format;At this time the variable include call backup tool connect with the database connection protocol,
The database version number, connection value, environmental variance, and/or the escape character to escape;
The connection protocol is BEQ agreement.
6. a kind of server, which is characterized in that the access system including database as described in claim 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610802481.7A CN106354605B (en) | 2016-09-05 | 2016-09-05 | A kind of access method of database, system and the server with the system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610802481.7A CN106354605B (en) | 2016-09-05 | 2016-09-05 | A kind of access method of database, system and the server with the system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106354605A CN106354605A (en) | 2017-01-25 |
CN106354605B true CN106354605B (en) | 2019-06-21 |
Family
ID=57858832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610802481.7A Active CN106354605B (en) | 2016-09-05 | 2016-09-05 | A kind of access method of database, system and the server with the system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106354605B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101004683A (en) * | 2007-01-31 | 2007-07-25 | 华为技术有限公司 | Method and device for accessing database |
CN103838781A (en) * | 2012-11-27 | 2014-06-04 | 中兴通讯股份有限公司 | Database access method and system |
CN105159920A (en) * | 2015-07-28 | 2015-12-16 | 卡斯柯信号有限公司 | Attribute tag based database access method |
CN105183751A (en) * | 2015-07-13 | 2015-12-23 | 深信服网络科技(深圳)有限公司 | Database access method and database access device |
CN105335432A (en) * | 2014-08-11 | 2016-02-17 | 无锡华润微电子有限公司 | Oracle database access method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013192198A2 (en) * | 2012-06-18 | 2013-12-27 | Actifio, Inc. | Enhanced data management virtualization system |
-
2016
- 2016-09-05 CN CN201610802481.7A patent/CN106354605B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101004683A (en) * | 2007-01-31 | 2007-07-25 | 华为技术有限公司 | Method and device for accessing database |
CN100456237C (en) * | 2007-01-31 | 2009-01-28 | 华为技术有限公司 | Method and device for accessing database |
CN103838781A (en) * | 2012-11-27 | 2014-06-04 | 中兴通讯股份有限公司 | Database access method and system |
CN105335432A (en) * | 2014-08-11 | 2016-02-17 | 无锡华润微电子有限公司 | Oracle database access method |
CN105183751A (en) * | 2015-07-13 | 2015-12-23 | 深信服网络科技(深圳)有限公司 | Database access method and database access device |
CN105159920A (en) * | 2015-07-28 | 2015-12-16 | 卡斯柯信号有限公司 | Attribute tag based database access method |
Also Published As
Publication number | Publication date |
---|---|
CN106354605A (en) | 2017-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111092869B (en) | Security management and control method for terminal access to office network and authentication server | |
US8532970B2 (en) | Systems and methods for network monitoring and analysis of a simulated network | |
EP2279465B1 (en) | Method and system for cyber security management of industrial control systems | |
US20140046645A1 (en) | Systems and methods for network monitoring and analysis of a simulated network | |
CN101553821B (en) | Method and system for analyzing safety status of data processing environment | |
CN112187585B (en) | Network protocol testing method and device | |
CN106357609B (en) | A kind of method and system, public network server and private clound equipment creating user | |
CN104092755B (en) | A kind of method and device for capturing of cloud service origination data | |
CN104639653A (en) | Self-adaptive method and system based on cloud architecture | |
CN104579822A (en) | Automatic performance test system and method of mobile application based on Http protocol | |
CN106452955B (en) | A kind of detection method and system of abnormal network connection | |
CN109460223A (en) | A kind of API gateway management system and its method | |
US20120266024A1 (en) | Protocol software component and test apparatus | |
CN102427445B (en) | Safe auditing method of IT simulation infrastructure offline compliance | |
CN106326088B (en) | Method and device for realizing construction of test object and device for realizing service configuration test | |
CN106844163A (en) | The method and device of a kind of database master-slave synchronisation condition monitoring | |
CN106789381A (en) | It is a kind of for cloud computing management platform simplified deployment and the method for rapid configuration | |
CN107819611B (en) | Client test method based on IEC61850 multi-server simulation | |
CN107645546A (en) | File monitor method, smart machine and storage medium based on Android system | |
CN107168844B (en) | Performance monitoring method and device | |
US9866466B2 (en) | Simulating real user issues in support environments | |
CN115150377A (en) | Method and device for calling and processing simulation interface | |
CN106354605B (en) | A kind of access method of database, system and the server with the system | |
WO2016197690A1 (en) | Iptv service check method and device utilizing same | |
CN106953874B (en) | Website falsification-proof method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |