CN107169055A - The operating method and operating system of a kind of database table - Google Patents

The operating method and operating system of a kind of database table Download PDF

Info

Publication number
CN107169055A
CN107169055A CN201710285330.3A CN201710285330A CN107169055A CN 107169055 A CN107169055 A CN 107169055A CN 201710285330 A CN201710285330 A CN 201710285330A CN 107169055 A CN107169055 A CN 107169055A
Authority
CN
China
Prior art keywords
cryptographic hash
database table
database
basic
handling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710285330.3A
Other languages
Chinese (zh)
Other versions
CN107169055B (en
Inventor
严挺
吴飞鹏
卢小明
陈姝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Original Assignee
BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd filed Critical BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Priority to CN201710285330.3A priority Critical patent/CN107169055B/en
Publication of CN107169055A publication Critical patent/CN107169055A/en
Application granted granted Critical
Publication of CN107169055B publication Critical patent/CN107169055B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management

Abstract

The present invention proposes a kind of operating method and system of database table, and method includes:S1, is that each database table generates an object, the object record attribute of the database table;S2, carries out Hash operation by the table handling sentence of first of each database table operation and obtains a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;S3, is received after the subsequent operation for a database table, will be attached for the table handling sentence of the subsequent operation with the basic cryptographic Hash of the database table, then is carried out Hash operation and obtains new cryptographic Hash;Whether S4, the basic cryptographic Hash recorded in relatively more described subsequent operation is identical with the basic cryptographic Hash currently calculated, and Fail Transaction is judged if different;S5, if identical, is verified successfully, then updates the basic cryptographic Hash in the object of the database table.The present invention ensures that the transaction that user is currently sent out is the state based on the database table seen by oneself to be operated.

Description

The operating method and operating system of a kind of database table
Technical field
The present invention relates to the operating technology of database table, operating method and operation more particularly, to database table are System.
Background technology
The system for being currently combined block chain and database, by the system, user can be common as operation Database is the same to send corresponding transaction to block chain, and trade fair is recorded in block chain network, while can be in bottom data Reflected in storehouse.The system realizes database manipulation record and the separation realized, drastically increases traditional database Security and flexibility.
Have in some cases, if many people operate to same database table simultaneously, conflict, such as table will be caused In a data be:Small red wage 2000, party A-subscriber wants to go to give its wage raise 10% based on 2000, in this process of exchange, Party B-subscriber has sent out a new transaction and small red wage is improved into 10%, and the transaction that at this moment party A-subscriber issues will when performing It can again go to rise based on 2200 and 10% remove wage raise, incorrect result can be obtained.
Therefore, the problem of there is data manipulation conflict in the current block catenary system based on database.
The content of the invention
The problem of in background technology, the present invention proposes the operating method in a kind of block catenary system based on database And system, it is ensured that the transaction that user is currently sent out is the state based on the database table seen by oneself to be operated, if There are other transaction insertions, then Fail Transaction in centre.
The operating method of the database table of the present invention includes:
S1, creates table object:Object, the object record database table are generated for each database table Attribute;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is subjected to Hash fortune Calculation obtains a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation for a database table, by for the table handling of the subsequent operation Sentence and the basic cryptographic Hash of the database table are attached, then are carried out Hash operation and obtained new cryptographic Hash;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current base calculated in S3 Whether plinth cryptographic Hash is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then the basic cryptographic Hash newly calculated is recorded into the object in the database table It is interior.
The present invention also proposes a kind of operating system of database table, including block catenary system and transaction node, the block Catenary system is configured as performing following steps:
S1, creates table object:Object, the object record database table are generated for each database table Attribute;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is subjected to Hash fortune Calculation obtains a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation from transaction node for a database table, will be follow-up for this The table handling sentence of operation is attached with the basic cryptographic Hash of the database table, then is carried out Hash operation and obtained new Hash Value;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current base calculated in S3 Whether plinth cryptographic Hash is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then the basic cryptographic Hash newly calculated is recorded into the object in the database table It is interior.
Beneficial effects of the present invention include:So that the block catenary system based on database is being handed over for the operation of database table Strict order is kept in easy sequential, user is operated based on currently seen state to table, obtains desired result, such as Fruit fails to be operated based on current state, then Fail Transaction.
Brief description of the drawings
Fig. 1 is a structural representation of the system of the present invention;
Fig. 2 is the flow chart of an embodiment of the method for the present invention;
Fig. 3 is the flow chart of the further embodiment of the method for the present invention.
Embodiment
Embodiments of the present invention are described with reference to the accompanying drawings, wherein identical part is presented with like reference characters.
The present invention is described by taking block catenary system as an example below, but the present invention is not only applicable to block catenary system.
In the block catenary system based on database, the advanced block chain of operation of database is known together, after common recognition passes through, behaviour Work can be recorded in the block of block chain network, while operating database table is removed in the trade fair, obtain the data that user wants Storehouse table result.What the present invention to be realized has the technical effect that, the operation for table is a shape must be based on oneself at that time seeing State, if state change, operation failure.
First embodiment
Fig. 1 shows a kind of topological structure of block catenary system, including database and multiple transaction nodes.Tieed up in database Protect each database table and the record merchandised each time.
As shown in Fig. 2 the method for the present invention includes:
Step S1, creates table object:Block catenary system is that database table generates object, and the object record is described The attribute of database table.Can be whole attribute records of database table in the object, including data described below The basic cryptographic Hash of storehouse table.
When transaction node initiates first operation for database table, transaction node by table handling sentence send to Block catenary system.Transaction node, which is sent to the information of block catenary system, to be included:Basis Kazakhstan in table handling sentence, and step S1 Uncommon value.The basic cryptographic Hash how is obtained on transaction node, is described in detail below.
Step S2, creates basic cryptographic Hash:The table handling sentence that block catenary system operates first of the database table (such as sql sentences) carries out Hash operation and obtains a cryptographic Hash H0, based on cryptographic Hash, record in the object.Can To obtain the basic cryptographic Hash of 32 bytes using SHA512-Half algorithms.
When transaction node initiates the subsequent operation for the database table, transaction node sends table handling sentence to area Block catenary system.Transaction node, which is sent to the information of block catenary system, to be included:Basic Hash in table handling sentence, and step S2 Value.The basic cryptographic Hash how is obtained on transaction node, is described in detail below.
Moreover, for n-th of operation of the database table, all the table handling sentence of the operation is generated with previous operation Basic cryptographic Hash Hn-1It is associated, the new basic cryptographic Hash H of generationn
It is expressed as with formula:
Create table:baseHash H0=SHA512-Half (sql0)
Follow-up n-th operation:baseHash Hn=SHA512-Half (baseHash Hn-1+sqln)
So, table handling each time based on cryptographic Hash be all a newest value.Based on have recorded each table handling Basic cryptographic Hash, when transaction enter common recognition link when, it is possible to verified.
Step S3, cryptographic Hash verification:Block catenary system receives the follow-up behaviour for a database table from transaction node After work, it will be connected for the table handling sentence of the subsequent operation (such as sql sentences) and the basic cryptographic Hash of the database table Connect, then carry out Hash operation and obtain new cryptographic Hash Hn
Step S4, cryptographic Hash verification:The basic cryptographic Hash recorded in the transaction of block catenary system is with current in S3 Whether the basic cryptographic Hash of middle calculating is identical, not by common recognition if different, judges Fail Transaction.
Step S5, if identical, is verified successfully, then the basic cryptographic Hash newly calculated is recorded into pair in the database table As interior.
Specifically, when a transaction node is transacted business, the database table is operated n times before, then the number The newest basic cryptographic Hash recorded in object according to storehouse table is:
baseHash Hn=SHA512-Half (baseHash Hn-1+sqln)
When the transaction node is submitted to the block catenary system merchandises, this is (n+1)th behaviour for the database table Make.The table handling sentence sql of the transaction node is have recorded in the transactionn+1With the newest basic cryptographic Hash based on the database table baseHash HnThe value calculated:
baseHash Hn+1=SHA512-Half (baseHash Hn+sqln+1)。
Block catenary system is received after the transaction, based on the table handling sentence sql in the transactionn+1With being somebody's turn to do for being stored in system The newest basic cryptographic Hash baseHash H of database tablenGenerate a cryptographic Hash baseHash H 'n+1, compare baseHash H’n+1With baseHash Hn+1It is whether identical.It is identical, then allow to operate the database table.
Fail Transaction can allow user not think correctly and operate database, but in fact but cannot correctly expect As a result, so drastically increasing Consumer's Experience, it is ensured that to the reliability of database table handling.
Second embodiment
As shown in figure 3, according to another aspect of the present invention, being improved first embodiment.
In step A1, the map tables that locally create of the transaction node of transaction are being sent, the key values of the map tables are data The table name of storehouse table, the basic cryptographic Hash that corresponding value is generated in the step S2 comprising first embodiment.The map tables can be deposited Storage is in local caching.
Step A2, when a certain transaction node sends a transaction to the block catenary system, first in the local map Inquired about in table.
The first situation, step A3, if can be found in the map tables, with the basic cryptographic Hash that this is cached, makees For newest basic cryptographic Hash, subsequent operation is carried out as in the first embodiment.
Second of situation, step A4, failing to find, then the transaction node is to the block catenary system acquisition request The basic cryptographic Hash recorded in the object of the database table, as newest basic cryptographic Hash, enters as in the first embodiment Row subsequent operation.
Preferably, in the latter case, the transaction node with the basic cryptographic Hash obtained from block catenary system come more Value in the new local map tables.
Except the method for the renewal map tables described in step A4, also a kind of side for the cryptographic Hash for updating local map tables Formula.
Step A5, (the cryptographic Hash verification such as the step S5 of first embodiment of transaction after the transaction success of transaction node It is described), the transaction node updates the value in the local map tables.
In the present embodiment, map tables locally are being set up, because, it is general in the block catenary system based on database (such as 3~9 seconds) can just generate a new block at regular intervals for setting, and the attribute of database table is all recorded in block On, therefore the change of basic cryptographic Hash could be only reacted on new block.So, if in this time (trade fair quilt Note is on a block) inner want to send multiple transaction to operate the table, it is necessary to a basic cryptographic Hash is cached to safeguard transaction In the continuity of cryptographic Hash that records.
On the other hand, because the map epitopes are in caching, then the map tables can not be allowed constantly to increase, therefore, in step A6, is that the database table in map tables sets up timer, if in a period of time (such as 30 minutes), a certain number in map tables Do not change, then deleted in the map tables to the basic cryptographic Hash of the database table according to the clocking information of storehouse table cache Caching record.
In addition, when the basic cryptographic Hash of certain database table in the local map tables in block catenary system with recording Value it is inconsistent when, i.e. in the time bracket to certain database table that this section point is received, other block chain nodes are also received Merchandised to one or more operations for a same database table.Need to perceive this mistake in time and correct this node Corresponding basic cryptographic Hash in caching.
To all it recorded in the map tables local above by the transaction for some database table of this node, often Generate a new block, local node check each database table recorded in local map tables operation whether into Work(is recorded on block, if on record, deleting corresponding transaction, if it find that not recorded on block, then deleting All Activity (because being all based on a wrong basic cryptographic Hash) after this transaction, then goes in block chain to go to obtain again The basic cryptographic Hash of newest normal corresponding table is taken, the basic cryptographic Hash in the map tables of local cache is updated.
3rd embodiment
The present invention also proposes a kind of operating system based on database table, including block catenary system and transaction node, described Block catenary system is configured as performing the step S1-S5 in first, second embodiment.The transaction node includes processor, The processor is configured as performing the A1-A4 in first, second embodiment.
The present invention also proposes a kind of storage medium, its program that can be run within a processor that is stored with, and described program is the First, the step S1-S5 and A1-A4 in second embodiment.
Embodiment described above, is the present invention more preferably embodiment, those skilled in the art is at this The usual variations and alternatives carried out in the range of inventive technique scheme all should be comprising within the scope of the present invention.

Claims (10)

1. a kind of operating method of database table, it is characterised in that including:
S1, creates table object:An object, the object record category of the database table are generated for each database table Property;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is carried out into Hash operation to obtain To a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation for a database table, by for the table handling sentence of the subsequent operation It is attached with the basic cryptographic Hash of the database table, then carries out Hash operation and obtains new cryptographic Hash;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current basis Kazakhstan calculated in S3 Whether uncommon value is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then by the basic cryptographic Hash newly calculated record in the object of the database table.
2. the operating method of database table according to claim 1, it is characterised in that also include:
A1, is initiating the map tables that locally create of table handling, the key values of the map tables are the table name of database table, corresponding Value includes the basic cryptographic Hash of database table;
A2, when initiating table handling, is first inquired about in the local map tables;
A3, if can be found in the map tables, with the basic cryptographic Hash that this is cached, as newest basic cryptographic Hash, Carry out follow-up table handling;
A4, failing to finding, then the basic cryptographic Hash recorded in the object of the acquisition request database table is used as newest base Plinth cryptographic Hash, carries out follow-up table handling.
3. the operating method of database table according to claim 2, it is characterised in that
In A3 and A4, the follow-up table handling includes table handling sentence, and the table handling sentence and the newest basis Cryptographic Hash carries out Hash operation after being attached and obtains new basic cryptographic Hash again.
4. the operating method of database table according to claim 2, it is characterised in that
After S5 is verified successfully, initiate the local of table handling and update the local map with the newest basic cryptographic Hash Corresponding value in table.
5. the operating method of database table according to claim 4, it is characterised in that also include:
A6, is that the database table in the map tables sets up timer, if in the scheduled time, some database in map tables The clocking information of table cache is not changed, then the caching to the basic cryptographic Hash of the database table is deleted in the map tables Record.
6. a kind of operating system of database table, it is characterised in that including block catenary system and transaction node, the block linkwork System is configured as performing following steps:
S1, creates table object:An object, the object record category of the database table are generated for each database table Property;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is carried out into Hash operation to obtain To a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation from transaction node for a database table, the subsequent operation will be directed to Table handling sentence and the basic cryptographic Hash of the database table be attached, then carry out Hash operation and obtain new cryptographic Hash;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current basis Kazakhstan calculated in S3 Whether uncommon value is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then by the basic cryptographic Hash newly calculated record in the object of the database table.
7. the operating system of database table according to claim 6, it is characterised in that the transaction node includes processing Device, the processor is configured as performing following steps:
A1, is initiating the map tables that locally create of table handling, the key values of the map tables are the table name of database table, corresponding Value includes the basic cryptographic Hash of database table;
A2, when initiating table handling, is first inquired about in the local map tables;
A3, if can be found in the map tables, with the basic cryptographic Hash that this is cached, as newest basic cryptographic Hash, Carry out follow-up table handling;
A4, failing to find, then the basic cryptographic Hash recorded into the object of the block catenary system acquisition request database table, As newest basic cryptographic Hash, follow-up table handling is carried out.
8. the operating system of database table according to claim 7, it is characterised in that the processor is configured as performing Following steps:
In A3 and A4, the follow-up table handling includes table handling sentence, and the table handling sentence and the newest basis Cryptographic Hash carries out Hash operation after being attached and obtains new basic cryptographic Hash again.
9. the operating system of database table according to claim 8, it is characterised in that the processor is configured as performing Following steps:
After S5 is verified successfully, initiate the local of table handling and update the local map with the newest basic cryptographic Hash Corresponding value in table.
10. the operating system of database table according to claim 9, it is characterised in that the processor is configured as holding Row following steps:
A6, is that the database table in the map tables sets up timer, if in the scheduled time, some database in map tables The clocking information of table cache is not changed, then the caching to the basic cryptographic Hash of the database table is deleted in the map tables Record.
CN201710285330.3A 2017-04-27 2017-04-27 A kind of operating method and operating system of database table Active CN107169055B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710285330.3A CN107169055B (en) 2017-04-27 2017-04-27 A kind of operating method and operating system of database table

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710285330.3A CN107169055B (en) 2017-04-27 2017-04-27 A kind of operating method and operating system of database table

Publications (2)

Publication Number Publication Date
CN107169055A true CN107169055A (en) 2017-09-15
CN107169055B CN107169055B (en) 2019-10-18

Family

ID=59812291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710285330.3A Active CN107169055B (en) 2017-04-27 2017-04-27 A kind of operating method and operating system of database table

Country Status (1)

Country Link
CN (1) CN107169055B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537540A (en) * 2018-03-23 2018-09-14 北京超雷科技中心(有限合伙) A kind of electronic data security method and equipment
CN108960801A (en) * 2017-12-08 2018-12-07 翟红鹰 Transaction record management method, system and storage medium based on block chain technology
CN110008216A (en) * 2019-04-02 2019-07-12 北京众享比特科技有限公司 Database table operating method, device, equipment and storage medium based on block chain
CN111597262A (en) * 2020-05-14 2020-08-28 北京众享比特科技有限公司 Method and system for managing block data in block chain
WO2021253850A1 (en) * 2020-06-14 2021-12-23 苏州浪潮智能科技有限公司 Data security realization method and system based on k-db database

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021875A (en) * 2007-03-22 2007-08-22 金蝶软件(中国)有限公司 Object-oriented data bank access method and system
CN101350010A (en) * 2007-07-20 2009-01-21 迈普(四川)通信技术有限公司 Operation method of hash table
CN104063487A (en) * 2014-07-03 2014-09-24 浙江大学 File data management method based on relational database and K-D tree indexes
CN105930345A (en) * 2016-04-05 2016-09-07 国网浙江省电力公司湖州供电公司 Hierarchical indexing method based on distributed real-time database system (DRTDBS)
CN105989015A (en) * 2015-01-28 2016-10-05 阿里巴巴集团控股有限公司 Capacity expanding method of database and database accessing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021875A (en) * 2007-03-22 2007-08-22 金蝶软件(中国)有限公司 Object-oriented data bank access method and system
CN101350010A (en) * 2007-07-20 2009-01-21 迈普(四川)通信技术有限公司 Operation method of hash table
CN104063487A (en) * 2014-07-03 2014-09-24 浙江大学 File data management method based on relational database and K-D tree indexes
CN105989015A (en) * 2015-01-28 2016-10-05 阿里巴巴集团控股有限公司 Capacity expanding method of database and database accessing method and device
CN105930345A (en) * 2016-04-05 2016-09-07 国网浙江省电力公司湖州供电公司 Hierarchical indexing method based on distributed real-time database system (DRTDBS)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960801A (en) * 2017-12-08 2018-12-07 翟红鹰 Transaction record management method, system and storage medium based on block chain technology
CN108537540A (en) * 2018-03-23 2018-09-14 北京超雷科技中心(有限合伙) A kind of electronic data security method and equipment
CN110008216A (en) * 2019-04-02 2019-07-12 北京众享比特科技有限公司 Database table operating method, device, equipment and storage medium based on block chain
CN111597262A (en) * 2020-05-14 2020-08-28 北京众享比特科技有限公司 Method and system for managing block data in block chain
CN111597262B (en) * 2020-05-14 2023-05-02 北京众享比特科技有限公司 Management method and management system for block data in block chain
WO2021253850A1 (en) * 2020-06-14 2021-12-23 苏州浪潮智能科技有限公司 Data security realization method and system based on k-db database

Also Published As

Publication number Publication date
CN107169055B (en) 2019-10-18

Similar Documents

Publication Publication Date Title
CN107169055B (en) A kind of operating method and operating system of database table
KR101429555B1 (en) System and method for providing high availability data
JP6304945B2 (en) Method and system for providing real-time information about objects in a network
WO2017016329A1 (en) Method and apparatus for recovering incomplete transaction
CN108319661A (en) A kind of structured storage method and device of spare part information
CN111209591A (en) Storage structure sorted according to time and quick query method
WO2019153506A1 (en) Provident fund transferring method, computer readable storage medium, terminal device and apparatus
CN109634959A (en) A kind of block index method and block index device
CN111091381A (en) Hardware wallet and management method thereof
US10185735B2 (en) Distributed database system and a non-transitory computer readable medium
CN105353976B (en) It is a kind of to obtain data cached method and apparatus
CN104484180A (en) Event guide method and guide system based on intelligent equipment
US9727621B2 (en) Systems and methods for servicing database events
KR20180095885A (en) Verification methods and devices
CN107291574A (en) Backup Data based on solution release system recovers major key generation method
US9210147B1 (en) Method, apparatus and computer program product for assessing risk associated with authentication requests
CN107704557B (en) Processing method and device for operating mutually exclusive data, computer equipment and storage medium
CN105989503A (en) Method and system of on-line transaction system data consistency
JP2009295050A (en) Product management server, product management method and program
US20190114371A1 (en) System and method for managing contact names that identify the same person
CN116346500B (en) Method and system for realizing account control authority management through intelligent contracts
JP2015059984A (en) Information concealing method in cloud computing
US11614993B1 (en) System and method for restoring deleted objects and their assignments to other objects based on any deletion of the other objects
JP5467032B2 (en) Information management system and its data update operation method
US11604860B1 (en) System and method for synchronizing account information on two different computer systems coupled via a network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant