CN106354605B - A kind of access method of database, system and the server with the system - Google Patents

A kind of access method of database, system and the server with the system Download PDF

Info

Publication number
CN106354605B
CN106354605B CN201610802481.7A CN201610802481A CN106354605B CN 106354605 B CN106354605 B CN 106354605B CN 201610802481 A CN201610802481 A CN 201610802481A CN 106354605 B CN106354605 B CN 106354605B
Authority
CN
China
Prior art keywords
database
access
service name
format
splicing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610802481.7A
Other languages
Chinese (zh)
Other versions
CN106354605A (en
Inventor
陈沐豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Eisoo Information Technology Co Ltd
Original Assignee
Shanghai Eisoo Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Eisoo Information Technology Co Ltd filed Critical Shanghai Eisoo Information Technology Co Ltd
Priority to CN201610802481.7A priority Critical patent/CN106354605B/en
Publication of CN106354605A publication Critical patent/CN106354605A/en
Application granted granted Critical
Publication of CN106354605B publication Critical patent/CN106354605B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register

Abstract

The present invention provides the access method, system and the server with the system of a kind of database, and the access method of the database is the following steps are included: intercept the system identifier to access the database;Judge whether that the backup tool for calling the database to provide connects the database;If it is not, then according to the system identifier, in the state of splicing the backup tool described in never call, according to the first predetermined splicing format, to access the first service name of the database;If so, according to the second predetermined splicing format, being spliced in the state of calling the backup tool, to access the second service name of the database according to the system identifier.Access method, system and the server with the system of database of the present invention are not needed using monitoring, to not have to modification listener.ora file, are reduced the difficulty of product implementation, have been evaded modification user rs environment bring risk.

Description

A kind of access method of database, system and the server with the system
Technical field
The invention belongs to structural data protection technique field, it is related to the access method of database, system and is with this The server of system.
Background technique
Currently, existing backup software on the market, such as the NBU of Symantec, the Avamar etc. of EMC, when needing using close When the mode Accessing Oracle Database of code verifying, need to start a monitoring between database server and client Device (Listener).In monitor, will record the corresponding Service name of associated databases, (database may be corresponding with multiple Service name).Pass through Service name, so that it may establish the connection between client and server.
Service name is registered in monitor by database, there is 2 kinds of methods:
1) dynamic registration
Dynamic registration is when database is in mount open, and PMON process is according in initSID.ora Two parameters of instance_name, service_names are by example and service dynamic registration into monitor.
2) static registration
Static registration is exactly that the configuration of listener.ora file is read when example starting, and example and service are registered to prison Listen program.
When database is in nomount state, could restore to control file.Database does not have dynamic registration data also at this time Library service, that is to say, that dynamic cannot be used to monitor.So being generally adopted by static monitoring in Backup and Restore field.It uses Static state is monitored, and human configuration listener.ora is needed.
Monitor is configured, following some problems can be brought in actual operation, for example,
1) configuration, which is monitored, has certain difficulty, and field conduct personnel is needed to have certain Oracle knowledge.Implement people The training of member's relevant knowledge, improves the cost of product field conduct indirectly.
2) it needs to configure in the production environment of client and monitor, if configuration is problematic, influence whether the actual production of client Activity.
Therefore, how the access method, system and the server with the system of a kind of database are provided, it is existing to solve Technology need to configure monitor when data backup restoration field is because using static monitor, and cause to improve product field conduct at This, it is real to be asked with becoming practitioner in the art's technology urgently to be resolved if the defects of configuration goes wrong, influences actual production activity Topic.
Summary of the invention
In view of the foregoing deficiencies of prior art, the purpose of the present invention is to provide a kind of access method of database, System and server with the system, for when solving that data backup restoration field is because using static monitor in the prior art, Monitor need to be configured, and causes to improve product field conduct cost, if configuration goes wrong, influences that actual production is movable to ask Topic.
In order to achieve the above objects and other related objects, one aspect of the present invention provides a kind of access method of database, institute The access method of database is stated the following steps are included: intercepting the system identifier to access the database;Judge whether to adjust The database is connected with the backup tool that the database provides;If it is not, then according to the system identifier, it is predetermined according to first Splice format, in the state of splicing the backup tool described in never call, to access the first service name of the database;If It is then to be spliced in the state of calling the backup tool according to the system identifier according to the second predetermined splicing format, To access the second service name of the database.
In one embodiment of the invention, the packet the step of system identifier intercepted to access the database It includes: to monitor the monitoring process of client connection process state in detection system, the system is intercepted from the monitoring process Identifier.
In one embodiment of the invention, in the state of splicing backup tool described in never call, to access The step of stating the first service name of database include according to the first predetermined splicing format, will in the case where being monitored without opening, Variable required by the database is accessed to fill into the described first predetermined splicing format to form first service name;The change Amount includes connection protocol, database version number, database version number and the system for calling backup tool to connect with the database The connection value, and/or environmental variance of identifier;The connection protocol is BEQ agreement.
In one embodiment of the invention, the splicing is described to access in the state of calling the backup tool The step of second service name of database includes that will visit in the case where monitoring without opening by second according to predetermined splicing format Ask that variable required by the database is filled into the described second predetermined splicing format to form second service name;The variable Including connection protocol, database version number, database version number and the system mark for calling backup tool to connect with the database Know connection value, environmental variance, and/or the escape character to escape of symbol.
In one embodiment of the invention, between the step of intercepting the system identifier to access the database, The access method of the database further includes the log-on message for obtaining user and logging in the database;The login of the database is believed Breath be create by the process under root user a log-on message to obtain installing DB user subprocess and It obtains.
In one embodiment of the invention, by the log-on message and first service name, or pass through the log-on message The database is accessed with the second service name.
Another aspect of the present invention provides a kind of access system of database, and the access system of the database includes: interception Module, for intercepting the system identifier to access the database;Processing module calls the data for judging whether The backup tool that library provides connects the database;If it is not, make a reservation for splicing format according to first then according to the system identifier, In the state of splicing the backup tool described in never call, for accessing the first service name of the database;If so, according to institute System identifier is stated, according to the second predetermined splicing format, is spliced in the state of calling the backup tool, it is described for accessing The second service name of database.
In one embodiment of the invention, the data are connected in the backup tool for being judged as that database described in never call provides When library, the processing module is also used to according to the first predetermined splicing format, will be in the case where monitoring without opening, described in access Variable required by database is filled into the described first predetermined splicing format to form first service name;The variable includes adjusting Connection protocol, the database version number, connection value, and/or the environmental variance being connect with backup tool with the database.
In one embodiment of the invention, the database is connected in the backup tool for being judged as that the calling database provides When, the processing module is also used to that the number will be accessed in the case where monitoring without opening according to predetermined splicing format by second It fills into the described second predetermined splicing format according to variable required by library to form second service name;The variable includes calling Connection protocol that backup tool is connect with the database, the database version number, connection value, environmental variance, and/or to The escape character of escape.
Another aspect of the invention provides a kind of server, the access system including the database
As described above, the access method of database of the invention, system and the server with the system, have with following Beneficial effect:
First, access method, system and the server with the system of database of the present invention pass through program certainly It is dynamic to generate BEQ bound symbol, and do not have to the tnsname.ora file of modification environmentally;
Second, since the present invention is not needed using BEQ agreement connection database using monitoring, to not have to modification Listener.ora file reduces the difficulty of product implementation, has evaded modification user rs environment bring risk;
Third, the present invention can be logged on in database using account number cipher, be carried out standby in the case where database is closed Part is restored.
Detailed description of the invention
Fig. 1 is shown as flow diagram of the access method of database of the invention in an embodiment.
Fig. 2 is shown as the access system of the database of the invention theory structure schematic diagram in an embodiment.
Fig. 3 is shown as the server of the invention theory structure schematic diagram in an embodiment.
Component label instructions
The access system of 1 database
11 obtain module
12 interception modules
13 processing modules
14 access modules
2 servers
S1~S6 step
Specific embodiment
Illustrate embodiments of the present invention below by way of specific specific example, those skilled in the art can be by this specification Other advantages and efficacy of the present invention can be easily understood for disclosed content.The present invention can also pass through in addition different specific realities The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints and application, without departing from Various modifications or alterations are carried out under spirit of the invention.It should be noted that in the absence of conflict, following embodiment and implementation Feature in example can be combined with each other.
It should be noted that illustrating the basic structure that only the invention is illustrated in a schematic way provided in following embodiment Think, only shown in schema then with related component in the present invention rather than component count, shape and size when according to actual implementation Draw, when actual implementation kenel, quantity and the ratio of each component can arbitrarily change for one kind, and its assembly layout kenel It is likely more complexity.
Access method, system and the server with the system of database of the present invention need to seek backup client It is present in database in an operating system.Backup client and database are present in and are made with meeting in an operating system With the necessary condition of BEQ protocol access database.
The technical principle of the access method of database of the present invention, system and the server with the system is to pass through Programming automatic generation BEQ bound symbol, and do not have to the tnsname.ora file of modification environmentally;BEQ agreement is not needed using prison It listens, to not have to modification listener.ora file.Without configuring the environment of client, simplified software deployment is haved the function that.
Embodiment one
The present embodiment provides a kind of access methods of database, which is characterized in that the access method of the database includes Following steps:
Intercept the system identifier to access the database;
Judge whether that the backup tool for calling the database to provide connects the database;If so, according to the system Identifier splices in the state of calling the backup tool, according to the first predetermined splicing format to access the database First service name;If it is not, then according to the system identifier, according to the second predetermined splicing format, splicing is described in the never call In the state of backup tool, to access the second service name of the database.
It is described in detail below with reference to the access method of diagram database described in the present embodiment.The present embodiment institute The access method of the database of offer is applied to oracle database.Accessing the oracle database includes form in 2:
One is using operating system to authenticate, does not need account and password may log into the oracle database.
Another kind is exactly to need to log in the oracle database, the present embodiment institute using account and the method for cipher authentication The access method for the database stated is to be somebody's turn to do in the case where the oracle database is closed using account and password login Oracle database, to carry out data backup restoration.
Referring to Fig. 1, being shown as flow diagram of the access method of database in an embodiment.As shown in Figure 1, institute The access method for stating database specifically includes following steps:
S1 obtains the log-on message that user logs in the database.In the present embodiment, the log-on message of the database It is by the process under root user (root user), creating a log-on message to obtain installing DB user Subprocess and obtain.When creating subprocess, parent process belongs to root user, and subprocess also belongs to root user.Parent process waits Subprocess exits.In the present embodiment, the log-on message includes logging in the account and password of the data.
S2 intercepts the system identifier to access the database.Specifically, the interception is to access the data The process of the system identifier in library is by the monitoring process in detection system to monitor client connection process state, from this The system identifier (SID) is intercepted in monitoring process.In the present embodiment, the oracle database starting when, A monitoring process (ora_pmon_SID) to monitor client connection process state can be generated, when detecting operating system On ora_pmon_* process, then intercept the rearmost information of process title as system identifier, such as the monitoring process Process title be ora_pmon_orcl, then SID be orcl.
S3 judges whether that the backup tool for calling the database to provide connects the database;If it is not, thening follow the steps S4;If so, thening follow the steps S5.In the present embodiment, the backup tool is RMAN.
S4 splices the backup tool described in never call according to the system identifier (SID) according to a predetermined splicing format In the state of, to access the first service name of the database.In the present embodiment, the splicing of the first service name It is as follows:
According to the first predetermined splicing format, will be accessed required by the database in the case where being monitored without opening Variable is filled into the described first predetermined splicing format to form first service name;The variable includes calling backup tool and institute State database connection connection protocol, database version number, database version number and system identifier connection value, and/or ring Border variable;The connection protocol is BEQ agreement.In the present embodiment, it is spliced into the connection identifier of the entitled sqlplus of first service Symbol.Specific format are as follows:
Wherein, the connection protocol for calling backup tool to connect with the database, which is that PROTOCOL=beq expression is specified, to be made With BEQ agreement;
Database version PROGRAM=$ oracleVersion indicates the version of specified Oracle program.Oracle 8i Pervious product, the value of $ oracleVersion and the specific version of Oracle are closely bound up, such as 7.3 version of Oracle, $ The value of oracleVersion is oracle73;8 version of Orale, the value of $ oracleVersion are oracle80;Work as oracle Version after 8i, the primary system of $ oracleVersion are oracle.
The connection value ARGV0=$ oracle $ sid of database version number and system identifier;The value of ARGV0 is $ The connection value that oracle and $ sid is connected.If database version is Oracle12c, sid orcl.So value of ARGV0 For oracleorcl.
Environmental variance ENVS='ORACLE_SID=$ sid'.
S5, according to the system identifier (SID) according to another predetermined splicing format, the backup tool is being called in splicing When to access the second service name of the database.In the present embodiment, the splicing of the second service name is as follows:
By second according to predetermined splicing format, will be accessed required by the database in the case where being monitored without opening Variable is filled into the described second predetermined splicing format to form second service name;The variable includes calling backup tool and institute State connection protocol, the database version number, connection value, environmental variance, and/or the escape word to escape of database connection Symbol.Described first predetermined format and the second predetermined splicing format of splicing is a fixed splicing format.
In the present embodiment, it is spliced into the connection identifier (CID of the entitled RMAN of second service.Specific format are as follows:
In the present embodiment, the difference of the connection identifier (CID of the connection identifier (CID and RMAN of the sqlplus is, described 4 ^ escape symbols of the connection identifier (CID of RMAN before single quotation marks.
S6 is visited by the log-on message and first service name, or by the log-on message and the second service name Ask the database.
The access method of database described in the present embodiment does not have to modification by programming automatic generation BEQ bound symbol Tnsname.ora file environmentally;Due to using BEQ agreement connection database not need to use monitoring, to not have to modification Listener.ora file reduces the difficulty of product implementation, has evaded modification user rs environment bring risk, and can be in number In the case where being closed according to library, logged on in database using account number cipher, carries out Backup and Restore.
Embodiment two
The present embodiment provides a kind of access systems 1 of database, referring to Fig. 2, be shown as the access system of database in Theory structure schematic diagram in one embodiment.As shown in Fig. 2, the access system 1 of the database includes: to obtain module 11, cut Modulus block 12, processing module 13 and access modules 14.
The acquisition module 11 is for obtaining the log-on message that user logs in the database.In the present embodiment, described The log-on message of database is the acquisition module 11 by the process under root user (root user), creation one to It obtains the subprocess of the log-on message of installing DB user and obtains.
The interception module 12 connecting with the acquisition module 11 is used to intercept the system banner to access the database Symbol.Specifically, the interception module 12 be used for by detection system to monitor the monitoring of client connection process state into Journey intercepts the system identifier (SID) from the monitoring process.In the present embodiment, the oracle database is starting When, a monitoring process (ora_pmon_SID) to monitor client connection process state can be generated, when detecting Then ora_pmon_* process in operating system intercepts the rearmost information of process title as system identifier, such as should The process title of monitoring process is ora_pmon_orcl, then SID is orcl.
The backup that the processing module 13 connecting with the interception module 12 is used to judge whether to call the database to provide Tool connects the database;If it is not, then being spliced under the backup tool state described in never call according to the system identifier, use To access the first service name of the database;If so, splicing is described standby in calling according to the system identifier (SID) Under part tool state, to access the second service name of the database.In the present embodiment, the backup tool is RMAN.
In the present embodiment, when the backup tool for being judged as that database described in never call provides connects the database, institute Processing module 13 is stated for the database will to be accessed in the case where monitoring without opening according to the first predetermined splicing format Required variable is filled into the described first predetermined splicing format to form first service name;The variable includes calling backup Connection protocol, the database version number, connection value, and/or the environmental variance that tool is connect with the database;The connection Agreement is BEQ agreement.
In the present embodiment, described when being judged as that the backup tool for calling the database to provide connects the database Processing module 13 is used to that the database institute will to be accessed in the case where monitoring without opening according to predetermined splicing format by second It is required that variable fill into the described second predetermined splicing format to form second service name;The variable includes calling backup work Have the connection protocol connecting with the database, the database version number, connection value, environmental variance, and/or to escape Escape character.
It is used for the acquisition module 11 and the access modules 14 that connect of processing module 13, passes through the log-on message and the One Service name, or the database is accessed by the log-on message and the second service name.
The present embodiment also provides a kind of server 2, referring to Fig. 3, being shown as principle knot of the server in an embodiment Structure schematic diagram.As shown in figure 3, the server 2 includes the access system 1 of above-mentioned database.
In conclusion the access method of database of the present invention, system and the server with the system pass through journey Sequence automatically generates BEQ bound symbol, and does not have to the tnsname.ora file of modification environmentally;Due to using BEQ agreement connection number It does not need according to library using monitoring, to not have to modification listener.ora file, reduces the difficulty of product implementation, evaded and having repaired Change user rs environment bring risk, and can be logged on in database in the case where database is closed using account number cipher, into Row Backup and Restore.So the present invention effectively overcomes various shortcoming in the prior art and has high industrial utilization value.
The above-described embodiments merely illustrate the principles and effects of the present invention, and is not intended to limit the present invention.It is any ripe The personage for knowing this technology all without departing from the spirit and scope of the present invention, carries out modifications and changes to above-described embodiment.Cause This, institute is complete without departing from the spirit and technical ideas disclosed in the present invention by those of ordinary skill in the art such as At all equivalent modifications or change, should be covered by the claims of the present invention.

Claims (6)

1. a kind of access method of database, which is characterized in that the access method of the database the following steps are included:
Intercept the system identifier to access the database;
Judge whether that the backup tool for calling the database to provide connects the database;If it is not, then according to the system banner Symbol, according to the first predetermined splicing format, in the state of splicing the backup tool described in never call, to access the database First service name;If so, according to the second predetermined splicing format, the backup is being called in splicing according to the system identifier In the state of tool, to access the second service name of the database;
Wherein, it will access variable required by the database in the case where being monitored without opening and fill to described first in advance Surely splice in format to form first service name;The variable includes the connection for calling backup tool to connect with the database at this time Agreement, database version number, database version number and system identifier connection value, and/or environmental variance;
It will access variable required by the database in the case where being monitored without opening and fill to the described second predetermined splicing To form second service name in format;At this time the variable include call backup tool connect with the database connection protocol, The database version number, connection value, environmental variance, and/or the escape character to escape;
The connection protocol is BEQ agreement.
2. the access method of database according to claim 1, it is characterised in that: the interception is to access the data The step of system identifier in library includes: to the monitoring process for monitoring client connection process state in detection system, from this The system identifier is intercepted in monitoring process.
3. the access method of database according to claim 1, it is characterised in that: in interception to access the database System identifier the step of before, the access method of the database further includes obtaining user to log in the login of the database Information;The log-on message of the database is by the process under root user, creating one to obtain installing DB The subprocess of the log-on message of user and obtain.
4. the access method of database according to claim 3, it is characterised in that: taken by the log-on message and first Business name, or pass through the log-on message and the second service name access database.
5. a kind of access system of database, which is characterized in that the access system of the database includes:
Interception module, for intercepting the system identifier to access the database;
Processing module, for judging whether that the backup tool for calling the database to provide connects the database;If it is not, then basis The system identifier, according to the first predetermined splicing format, in the state of splicing the backup tool described in never call, for accessing The first service name of the database;If so, according to the second predetermined splicing format, splicing exists according to the system identifier In the state of calling the backup tool, for accessing the second service name of the database;
Wherein, it will access variable required by the database in the case where being monitored without opening and fill to described first in advance Surely splice in format to form first service name;The variable includes the connection for calling backup tool to connect with the database at this time Agreement, database version number, database version number and system identifier connection value, and/or environmental variance;
It will access variable required by the database in the case where being monitored without opening and fill to the described second predetermined splicing To form second service name in format;At this time the variable include call backup tool connect with the database connection protocol, The database version number, connection value, environmental variance, and/or the escape character to escape;
The connection protocol is BEQ agreement.
6. a kind of server, which is characterized in that the access system including database as described in claim 5.
CN201610802481.7A 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system Active CN106354605B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610802481.7A CN106354605B (en) 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610802481.7A CN106354605B (en) 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system

Publications (2)

Publication Number Publication Date
CN106354605A CN106354605A (en) 2017-01-25
CN106354605B true CN106354605B (en) 2019-06-21

Family

ID=57858832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610802481.7A Active CN106354605B (en) 2016-09-05 2016-09-05 A kind of access method of database, system and the server with the system

Country Status (1)

Country Link
CN (1) CN106354605B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101004683A (en) * 2007-01-31 2007-07-25 华为技术有限公司 Method and device for accessing database
CN103838781A (en) * 2012-11-27 2014-06-04 中兴通讯股份有限公司 Database access method and system
CN105159920A (en) * 2015-07-28 2015-12-16 卡斯柯信号有限公司 Attribute tag based database access method
CN105183751A (en) * 2015-07-13 2015-12-23 深信服网络科技(深圳)有限公司 Database access method and database access device
CN105335432A (en) * 2014-08-11 2016-02-17 无锡华润微电子有限公司 Oracle database access method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013192198A2 (en) * 2012-06-18 2013-12-27 Actifio, Inc. Enhanced data management virtualization system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101004683A (en) * 2007-01-31 2007-07-25 华为技术有限公司 Method and device for accessing database
CN100456237C (en) * 2007-01-31 2009-01-28 华为技术有限公司 Method and device for accessing database
CN103838781A (en) * 2012-11-27 2014-06-04 中兴通讯股份有限公司 Database access method and system
CN105335432A (en) * 2014-08-11 2016-02-17 无锡华润微电子有限公司 Oracle database access method
CN105183751A (en) * 2015-07-13 2015-12-23 深信服网络科技(深圳)有限公司 Database access method and database access device
CN105159920A (en) * 2015-07-28 2015-12-16 卡斯柯信号有限公司 Attribute tag based database access method

Also Published As

Publication number Publication date
CN106354605A (en) 2017-01-25

Similar Documents

Publication Publication Date Title
CN111092869B (en) Security management and control method for terminal access to office network and authentication server
US8532970B2 (en) Systems and methods for network monitoring and analysis of a simulated network
EP2279465B1 (en) Method and system for cyber security management of industrial control systems
US20140046645A1 (en) Systems and methods for network monitoring and analysis of a simulated network
CN101553821B (en) Method and system for analyzing safety status of data processing environment
CN112187585B (en) Network protocol testing method and device
CN106357609B (en) A kind of method and system, public network server and private clound equipment creating user
CN104092755B (en) A kind of method and device for capturing of cloud service origination data
CN104639653A (en) Self-adaptive method and system based on cloud architecture
CN104579822A (en) Automatic performance test system and method of mobile application based on Http protocol
CN106452955B (en) A kind of detection method and system of abnormal network connection
CN109460223A (en) A kind of API gateway management system and its method
US20120266024A1 (en) Protocol software component and test apparatus
CN102427445B (en) Safe auditing method of IT simulation infrastructure offline compliance
CN106326088B (en) Method and device for realizing construction of test object and device for realizing service configuration test
CN106844163A (en) The method and device of a kind of database master-slave synchronisation condition monitoring
CN106789381A (en) It is a kind of for cloud computing management platform simplified deployment and the method for rapid configuration
CN107819611B (en) Client test method based on IEC61850 multi-server simulation
CN107645546A (en) File monitor method, smart machine and storage medium based on Android system
CN107168844B (en) Performance monitoring method and device
US9866466B2 (en) Simulating real user issues in support environments
CN115150377A (en) Method and device for calling and processing simulation interface
CN106354605B (en) A kind of access method of database, system and the server with the system
WO2016197690A1 (en) Iptv service check method and device utilizing same
CN106953874B (en) Website falsification-proof method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant