CN107169055A - The operating method and operating system of a kind of database table - Google Patents
The operating method and operating system of a kind of database table Download PDFInfo
- Publication number
- CN107169055A CN107169055A CN201710285330.3A CN201710285330A CN107169055A CN 107169055 A CN107169055 A CN 107169055A CN 201710285330 A CN201710285330 A CN 201710285330A CN 107169055 A CN107169055 A CN 107169055A
- Authority
- CN
- China
- Prior art keywords
- cryptographic hash
- database table
- database
- basic
- handling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24552—Database cache management
Abstract
The present invention proposes a kind of operating method and system of database table, and method includes:S1, is that each database table generates an object, the object record attribute of the database table;S2, carries out Hash operation by the table handling sentence of first of each database table operation and obtains a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;S3, is received after the subsequent operation for a database table, will be attached for the table handling sentence of the subsequent operation with the basic cryptographic Hash of the database table, then is carried out Hash operation and obtains new cryptographic Hash;Whether S4, the basic cryptographic Hash recorded in relatively more described subsequent operation is identical with the basic cryptographic Hash currently calculated, and Fail Transaction is judged if different;S5, if identical, is verified successfully, then updates the basic cryptographic Hash in the object of the database table.The present invention ensures that the transaction that user is currently sent out is the state based on the database table seen by oneself to be operated.
Description
Technical field
The present invention relates to the operating technology of database table, operating method and operation more particularly, to database table are
System.
Background technology
The system for being currently combined block chain and database, by the system, user can be common as operation
Database is the same to send corresponding transaction to block chain, and trade fair is recorded in block chain network, while can be in bottom data
Reflected in storehouse.The system realizes database manipulation record and the separation realized, drastically increases traditional database
Security and flexibility.
Have in some cases, if many people operate to same database table simultaneously, conflict, such as table will be caused
In a data be:Small red wage 2000, party A-subscriber wants to go to give its wage raise 10% based on 2000, in this process of exchange,
Party B-subscriber has sent out a new transaction and small red wage is improved into 10%, and the transaction that at this moment party A-subscriber issues will when performing
It can again go to rise based on 2200 and 10% remove wage raise, incorrect result can be obtained.
Therefore, the problem of there is data manipulation conflict in the current block catenary system based on database.
The content of the invention
The problem of in background technology, the present invention proposes the operating method in a kind of block catenary system based on database
And system, it is ensured that the transaction that user is currently sent out is the state based on the database table seen by oneself to be operated, if
There are other transaction insertions, then Fail Transaction in centre.
The operating method of the database table of the present invention includes:
S1, creates table object:Object, the object record database table are generated for each database table
Attribute;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is subjected to Hash fortune
Calculation obtains a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation for a database table, by for the table handling of the subsequent operation
Sentence and the basic cryptographic Hash of the database table are attached, then are carried out Hash operation and obtained new cryptographic Hash;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current base calculated in S3
Whether plinth cryptographic Hash is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then the basic cryptographic Hash newly calculated is recorded into the object in the database table
It is interior.
The present invention also proposes a kind of operating system of database table, including block catenary system and transaction node, the block
Catenary system is configured as performing following steps:
S1, creates table object:Object, the object record database table are generated for each database table
Attribute;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is subjected to Hash fortune
Calculation obtains a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation from transaction node for a database table, will be follow-up for this
The table handling sentence of operation is attached with the basic cryptographic Hash of the database table, then is carried out Hash operation and obtained new Hash
Value;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current base calculated in S3
Whether plinth cryptographic Hash is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then the basic cryptographic Hash newly calculated is recorded into the object in the database table
It is interior.
Beneficial effects of the present invention include:So that the block catenary system based on database is being handed over for the operation of database table
Strict order is kept in easy sequential, user is operated based on currently seen state to table, obtains desired result, such as
Fruit fails to be operated based on current state, then Fail Transaction.
Brief description of the drawings
Fig. 1 is a structural representation of the system of the present invention;
Fig. 2 is the flow chart of an embodiment of the method for the present invention;
Fig. 3 is the flow chart of the further embodiment of the method for the present invention.
Embodiment
Embodiments of the present invention are described with reference to the accompanying drawings, wherein identical part is presented with like reference characters.
The present invention is described by taking block catenary system as an example below, but the present invention is not only applicable to block catenary system.
In the block catenary system based on database, the advanced block chain of operation of database is known together, after common recognition passes through, behaviour
Work can be recorded in the block of block chain network, while operating database table is removed in the trade fair, obtain the data that user wants
Storehouse table result.What the present invention to be realized has the technical effect that, the operation for table is a shape must be based on oneself at that time seeing
State, if state change, operation failure.
First embodiment
Fig. 1 shows a kind of topological structure of block catenary system, including database and multiple transaction nodes.Tieed up in database
Protect each database table and the record merchandised each time.
As shown in Fig. 2 the method for the present invention includes:
Step S1, creates table object:Block catenary system is that database table generates object, and the object record is described
The attribute of database table.Can be whole attribute records of database table in the object, including data described below
The basic cryptographic Hash of storehouse table.
When transaction node initiates first operation for database table, transaction node by table handling sentence send to
Block catenary system.Transaction node, which is sent to the information of block catenary system, to be included:Basis Kazakhstan in table handling sentence, and step S1
Uncommon value.The basic cryptographic Hash how is obtained on transaction node, is described in detail below.
Step S2, creates basic cryptographic Hash:The table handling sentence that block catenary system operates first of the database table
(such as sql sentences) carries out Hash operation and obtains a cryptographic Hash H0, based on cryptographic Hash, record in the object.Can
To obtain the basic cryptographic Hash of 32 bytes using SHA512-Half algorithms.
When transaction node initiates the subsequent operation for the database table, transaction node sends table handling sentence to area
Block catenary system.Transaction node, which is sent to the information of block catenary system, to be included:Basic Hash in table handling sentence, and step S2
Value.The basic cryptographic Hash how is obtained on transaction node, is described in detail below.
Moreover, for n-th of operation of the database table, all the table handling sentence of the operation is generated with previous operation
Basic cryptographic Hash Hn-1It is associated, the new basic cryptographic Hash H of generationn。
It is expressed as with formula:
Create table:baseHash H0=SHA512-Half (sql0)
Follow-up n-th operation:baseHash Hn=SHA512-Half (baseHash Hn-1+sqln)
So, table handling each time based on cryptographic Hash be all a newest value.Based on have recorded each table handling
Basic cryptographic Hash, when transaction enter common recognition link when, it is possible to verified.
Step S3, cryptographic Hash verification:Block catenary system receives the follow-up behaviour for a database table from transaction node
After work, it will be connected for the table handling sentence of the subsequent operation (such as sql sentences) and the basic cryptographic Hash of the database table
Connect, then carry out Hash operation and obtain new cryptographic Hash Hn。
Step S4, cryptographic Hash verification:The basic cryptographic Hash recorded in the transaction of block catenary system is with current in S3
Whether the basic cryptographic Hash of middle calculating is identical, not by common recognition if different, judges Fail Transaction.
Step S5, if identical, is verified successfully, then the basic cryptographic Hash newly calculated is recorded into pair in the database table
As interior.
Specifically, when a transaction node is transacted business, the database table is operated n times before, then the number
The newest basic cryptographic Hash recorded in object according to storehouse table is:
baseHash Hn=SHA512-Half (baseHash Hn-1+sqln)
When the transaction node is submitted to the block catenary system merchandises, this is (n+1)th behaviour for the database table
Make.The table handling sentence sql of the transaction node is have recorded in the transactionn+1With the newest basic cryptographic Hash based on the database table
baseHash HnThe value calculated:
baseHash Hn+1=SHA512-Half (baseHash Hn+sqln+1)。
Block catenary system is received after the transaction, based on the table handling sentence sql in the transactionn+1With being somebody's turn to do for being stored in system
The newest basic cryptographic Hash baseHash H of database tablenGenerate a cryptographic Hash baseHash H 'n+1, compare baseHash
H’n+1With baseHash Hn+1It is whether identical.It is identical, then allow to operate the database table.
Fail Transaction can allow user not think correctly and operate database, but in fact but cannot correctly expect
As a result, so drastically increasing Consumer's Experience, it is ensured that to the reliability of database table handling.
Second embodiment
As shown in figure 3, according to another aspect of the present invention, being improved first embodiment.
In step A1, the map tables that locally create of the transaction node of transaction are being sent, the key values of the map tables are data
The table name of storehouse table, the basic cryptographic Hash that corresponding value is generated in the step S2 comprising first embodiment.The map tables can be deposited
Storage is in local caching.
Step A2, when a certain transaction node sends a transaction to the block catenary system, first in the local map
Inquired about in table.
The first situation, step A3, if can be found in the map tables, with the basic cryptographic Hash that this is cached, makees
For newest basic cryptographic Hash, subsequent operation is carried out as in the first embodiment.
Second of situation, step A4, failing to find, then the transaction node is to the block catenary system acquisition request
The basic cryptographic Hash recorded in the object of the database table, as newest basic cryptographic Hash, enters as in the first embodiment
Row subsequent operation.
Preferably, in the latter case, the transaction node with the basic cryptographic Hash obtained from block catenary system come more
Value in the new local map tables.
Except the method for the renewal map tables described in step A4, also a kind of side for the cryptographic Hash for updating local map tables
Formula.
Step A5, (the cryptographic Hash verification such as the step S5 of first embodiment of transaction after the transaction success of transaction node
It is described), the transaction node updates the value in the local map tables.
In the present embodiment, map tables locally are being set up, because, it is general in the block catenary system based on database
(such as 3~9 seconds) can just generate a new block at regular intervals for setting, and the attribute of database table is all recorded in block
On, therefore the change of basic cryptographic Hash could be only reacted on new block.So, if in this time (trade fair quilt
Note is on a block) inner want to send multiple transaction to operate the table, it is necessary to a basic cryptographic Hash is cached to safeguard transaction
In the continuity of cryptographic Hash that records.
On the other hand, because the map epitopes are in caching, then the map tables can not be allowed constantly to increase, therefore, in step
A6, is that the database table in map tables sets up timer, if in a period of time (such as 30 minutes), a certain number in map tables
Do not change, then deleted in the map tables to the basic cryptographic Hash of the database table according to the clocking information of storehouse table cache
Caching record.
In addition, when the basic cryptographic Hash of certain database table in the local map tables in block catenary system with recording
Value it is inconsistent when, i.e. in the time bracket to certain database table that this section point is received, other block chain nodes are also received
Merchandised to one or more operations for a same database table.Need to perceive this mistake in time and correct this node
Corresponding basic cryptographic Hash in caching.
To all it recorded in the map tables local above by the transaction for some database table of this node, often
Generate a new block, local node check each database table recorded in local map tables operation whether into
Work(is recorded on block, if on record, deleting corresponding transaction, if it find that not recorded on block, then deleting
All Activity (because being all based on a wrong basic cryptographic Hash) after this transaction, then goes in block chain to go to obtain again
The basic cryptographic Hash of newest normal corresponding table is taken, the basic cryptographic Hash in the map tables of local cache is updated.
3rd embodiment
The present invention also proposes a kind of operating system based on database table, including block catenary system and transaction node, described
Block catenary system is configured as performing the step S1-S5 in first, second embodiment.The transaction node includes processor,
The processor is configured as performing the A1-A4 in first, second embodiment.
The present invention also proposes a kind of storage medium, its program that can be run within a processor that is stored with, and described program is the
First, the step S1-S5 and A1-A4 in second embodiment.
Embodiment described above, is the present invention more preferably embodiment, those skilled in the art is at this
The usual variations and alternatives carried out in the range of inventive technique scheme all should be comprising within the scope of the present invention.
Claims (10)
1. a kind of operating method of database table, it is characterised in that including:
S1, creates table object:An object, the object record category of the database table are generated for each database table
Property;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is carried out into Hash operation to obtain
To a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation for a database table, by for the table handling sentence of the subsequent operation
It is attached with the basic cryptographic Hash of the database table, then carries out Hash operation and obtains new cryptographic Hash;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current basis Kazakhstan calculated in S3
Whether uncommon value is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then by the basic cryptographic Hash newly calculated record in the object of the database table.
2. the operating method of database table according to claim 1, it is characterised in that also include:
A1, is initiating the map tables that locally create of table handling, the key values of the map tables are the table name of database table, corresponding
Value includes the basic cryptographic Hash of database table;
A2, when initiating table handling, is first inquired about in the local map tables;
A3, if can be found in the map tables, with the basic cryptographic Hash that this is cached, as newest basic cryptographic Hash,
Carry out follow-up table handling;
A4, failing to finding, then the basic cryptographic Hash recorded in the object of the acquisition request database table is used as newest base
Plinth cryptographic Hash, carries out follow-up table handling.
3. the operating method of database table according to claim 2, it is characterised in that
In A3 and A4, the follow-up table handling includes table handling sentence, and the table handling sentence and the newest basis
Cryptographic Hash carries out Hash operation after being attached and obtains new basic cryptographic Hash again.
4. the operating method of database table according to claim 2, it is characterised in that
After S5 is verified successfully, initiate the local of table handling and update the local map with the newest basic cryptographic Hash
Corresponding value in table.
5. the operating method of database table according to claim 4, it is characterised in that also include:
A6, is that the database table in the map tables sets up timer, if in the scheduled time, some database in map tables
The clocking information of table cache is not changed, then the caching to the basic cryptographic Hash of the database table is deleted in the map tables
Record.
6. a kind of operating system of database table, it is characterised in that including block catenary system and transaction node, the block linkwork
System is configured as performing following steps:
S1, creates table object:An object, the object record category of the database table are generated for each database table
Property;
S2, creates basic cryptographic Hash:The table handling sentence of first operation of each database table is carried out into Hash operation to obtain
To a cryptographic Hash, based on cryptographic Hash, record in the object of the database table;
S3, cryptographic Hash verification:Receive after the subsequent operation from transaction node for a database table, the subsequent operation will be directed to
Table handling sentence and the basic cryptographic Hash of the database table be attached, then carry out Hash operation and obtain new cryptographic Hash;
S4, cryptographic Hash verification:Compare the basic cryptographic Hash recorded in the subsequent operation and the current basis Kazakhstan calculated in S3
Whether uncommon value is identical, and Fail Transaction is judged if different;
S5, if identical, is verified successfully, then by the basic cryptographic Hash newly calculated record in the object of the database table.
7. the operating system of database table according to claim 6, it is characterised in that the transaction node includes processing
Device, the processor is configured as performing following steps:
A1, is initiating the map tables that locally create of table handling, the key values of the map tables are the table name of database table, corresponding
Value includes the basic cryptographic Hash of database table;
A2, when initiating table handling, is first inquired about in the local map tables;
A3, if can be found in the map tables, with the basic cryptographic Hash that this is cached, as newest basic cryptographic Hash,
Carry out follow-up table handling;
A4, failing to find, then the basic cryptographic Hash recorded into the object of the block catenary system acquisition request database table,
As newest basic cryptographic Hash, follow-up table handling is carried out.
8. the operating system of database table according to claim 7, it is characterised in that the processor is configured as performing
Following steps:
In A3 and A4, the follow-up table handling includes table handling sentence, and the table handling sentence and the newest basis
Cryptographic Hash carries out Hash operation after being attached and obtains new basic cryptographic Hash again.
9. the operating system of database table according to claim 8, it is characterised in that the processor is configured as performing
Following steps:
After S5 is verified successfully, initiate the local of table handling and update the local map with the newest basic cryptographic Hash
Corresponding value in table.
10. the operating system of database table according to claim 9, it is characterised in that the processor is configured as holding
Row following steps:
A6, is that the database table in the map tables sets up timer, if in the scheduled time, some database in map tables
The clocking information of table cache is not changed, then the caching to the basic cryptographic Hash of the database table is deleted in the map tables
Record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710285330.3A CN107169055B (en) | 2017-04-27 | 2017-04-27 | A kind of operating method and operating system of database table |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710285330.3A CN107169055B (en) | 2017-04-27 | 2017-04-27 | A kind of operating method and operating system of database table |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107169055A true CN107169055A (en) | 2017-09-15 |
CN107169055B CN107169055B (en) | 2019-10-18 |
Family
ID=59812291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710285330.3A Active CN107169055B (en) | 2017-04-27 | 2017-04-27 | A kind of operating method and operating system of database table |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107169055B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537540A (en) * | 2018-03-23 | 2018-09-14 | 北京超雷科技中心(有限合伙) | A kind of electronic data security method and equipment |
CN108960801A (en) * | 2017-12-08 | 2018-12-07 | 翟红鹰 | Transaction record management method, system and storage medium based on block chain technology |
CN110008216A (en) * | 2019-04-02 | 2019-07-12 | 北京众享比特科技有限公司 | Database table operating method, device, equipment and storage medium based on block chain |
CN111597262A (en) * | 2020-05-14 | 2020-08-28 | 北京众享比特科技有限公司 | Method and system for managing block data in block chain |
WO2021253850A1 (en) * | 2020-06-14 | 2021-12-23 | 苏州浪潮智能科技有限公司 | Data security realization method and system based on k-db database |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101021875A (en) * | 2007-03-22 | 2007-08-22 | 金蝶软件(中国)有限公司 | Object-oriented data bank access method and system |
CN101350010A (en) * | 2007-07-20 | 2009-01-21 | 迈普(四川)通信技术有限公司 | Operation method of hash table |
CN104063487A (en) * | 2014-07-03 | 2014-09-24 | 浙江大学 | File data management method based on relational database and K-D tree indexes |
CN105930345A (en) * | 2016-04-05 | 2016-09-07 | 国网浙江省电力公司湖州供电公司 | Hierarchical indexing method based on distributed real-time database system (DRTDBS) |
CN105989015A (en) * | 2015-01-28 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Capacity expanding method of database and database accessing method and device |
-
2017
- 2017-04-27 CN CN201710285330.3A patent/CN107169055B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101021875A (en) * | 2007-03-22 | 2007-08-22 | 金蝶软件(中国)有限公司 | Object-oriented data bank access method and system |
CN101350010A (en) * | 2007-07-20 | 2009-01-21 | 迈普(四川)通信技术有限公司 | Operation method of hash table |
CN104063487A (en) * | 2014-07-03 | 2014-09-24 | 浙江大学 | File data management method based on relational database and K-D tree indexes |
CN105989015A (en) * | 2015-01-28 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Capacity expanding method of database and database accessing method and device |
CN105930345A (en) * | 2016-04-05 | 2016-09-07 | 国网浙江省电力公司湖州供电公司 | Hierarchical indexing method based on distributed real-time database system (DRTDBS) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108960801A (en) * | 2017-12-08 | 2018-12-07 | 翟红鹰 | Transaction record management method, system and storage medium based on block chain technology |
CN108537540A (en) * | 2018-03-23 | 2018-09-14 | 北京超雷科技中心(有限合伙) | A kind of electronic data security method and equipment |
CN110008216A (en) * | 2019-04-02 | 2019-07-12 | 北京众享比特科技有限公司 | Database table operating method, device, equipment and storage medium based on block chain |
CN111597262A (en) * | 2020-05-14 | 2020-08-28 | 北京众享比特科技有限公司 | Method and system for managing block data in block chain |
CN111597262B (en) * | 2020-05-14 | 2023-05-02 | 北京众享比特科技有限公司 | Management method and management system for block data in block chain |
WO2021253850A1 (en) * | 2020-06-14 | 2021-12-23 | 苏州浪潮智能科技有限公司 | Data security realization method and system based on k-db database |
Also Published As
Publication number | Publication date |
---|---|
CN107169055B (en) | 2019-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107169055B (en) | A kind of operating method and operating system of database table | |
KR101429555B1 (en) | System and method for providing high availability data | |
JP6304945B2 (en) | Method and system for providing real-time information about objects in a network | |
WO2017016329A1 (en) | Method and apparatus for recovering incomplete transaction | |
CN108319661A (en) | A kind of structured storage method and device of spare part information | |
CN111209591A (en) | Storage structure sorted according to time and quick query method | |
WO2019153506A1 (en) | Provident fund transferring method, computer readable storage medium, terminal device and apparatus | |
CN109634959A (en) | A kind of block index method and block index device | |
CN111091381A (en) | Hardware wallet and management method thereof | |
US10185735B2 (en) | Distributed database system and a non-transitory computer readable medium | |
CN105353976B (en) | It is a kind of to obtain data cached method and apparatus | |
CN104484180A (en) | Event guide method and guide system based on intelligent equipment | |
US9727621B2 (en) | Systems and methods for servicing database events | |
KR20180095885A (en) | Verification methods and devices | |
CN107291574A (en) | Backup Data based on solution release system recovers major key generation method | |
US9210147B1 (en) | Method, apparatus and computer program product for assessing risk associated with authentication requests | |
CN107704557B (en) | Processing method and device for operating mutually exclusive data, computer equipment and storage medium | |
CN105989503A (en) | Method and system of on-line transaction system data consistency | |
JP2009295050A (en) | Product management server, product management method and program | |
US20190114371A1 (en) | System and method for managing contact names that identify the same person | |
CN116346500B (en) | Method and system for realizing account control authority management through intelligent contracts | |
JP2015059984A (en) | Information concealing method in cloud computing | |
US11614993B1 (en) | System and method for restoring deleted objects and their assignments to other objects based on any deletion of the other objects | |
JP5467032B2 (en) | Information management system and its data update operation method | |
US11604860B1 (en) | System and method for synchronizing account information on two different computer systems coupled via a network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |