CN107818102B - Data extraction method and device - Google Patents

Data extraction method and device Download PDF

Info

Publication number
CN107818102B
CN107818102B CN201610819807.7A CN201610819807A CN107818102B CN 107818102 B CN107818102 B CN 107818102B CN 201610819807 A CN201610819807 A CN 201610819807A CN 107818102 B CN107818102 B CN 107818102B
Authority
CN
China
Prior art keywords
script
user
target
identifier
target script
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610819807.7A
Other languages
Chinese (zh)
Other versions
CN107818102A (en
Inventor
黄望
黄涛
杨勇
刘斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201610819807.7A priority Critical patent/CN107818102B/en
Publication of CN107818102A publication Critical patent/CN107818102A/en
Application granted granted Critical
Publication of CN107818102B publication Critical patent/CN107818102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a data extraction method and a data extraction device, which comprise the following steps: acquiring a script execution request, and acquiring a user identifier and a target script to be executed according to the script execution request, wherein the user identifier is used for uniquely identifying a user for executing an operation on the target script; searching a script library identifier corresponding to the user identifier; when the target script is selected from the shared scripts, judging whether a user corresponding to the user identification has an execution authority on the target script or not according to the script library identification; and when the user corresponding to the user identification has an execution authority to the target script, executing the target script to extract corresponding data from a corresponding database according to the target script. The script utilization rate is improved.

Description

Data extraction method and device
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data extraction method and apparatus.
Background
A Database (Database) is a repository that organizes, stores, and manages data according to a data structure.
When data is extracted from a database through a script, a user needs to log in a relay machine set corresponding to the type of the database, write the script through PL/SQL (program language, called procedural language/SQL) software on the relay machine, and execute the script to extract the data from the corresponding database. In the whole data extraction process, the transfer machine only plays a transfer role in the execution of the script, and after the script is executed, the transfer machine cannot further manage and utilize the executed script, which is obviously a waste of resources.
Disclosure of Invention
Based on this, it is necessary to provide a data extraction method and apparatus capable of improving script resource utilization.
A method of data extraction, the method comprising the steps of:
acquiring a script execution request, and acquiring a user identifier and a target script to be executed according to the script execution request, wherein the user identifier is used for uniquely identifying a user for executing an operation on the target script;
searching a script library identifier corresponding to the user identifier;
when the target script is selected from the shared scripts, judging whether a user corresponding to the user identification has an execution authority on the target script or not according to the script library identification;
and when the user corresponding to the user identification has an execution authority to the target script, executing the target script to extract corresponding data from a corresponding database according to the target script.
In one embodiment, the method further comprises:
when the target script is a newly added script, establishing a corresponding relation between the newly added target script and a script library corresponding to the script library identification;
and executing the target script to extract corresponding data from a corresponding database according to the target script.
In one embodiment, the method further comprises:
and saving and setting the newly added target script as a shared script so that any user successfully logging in can view the target script.
In one embodiment, the step of determining whether the user corresponding to the user identifier has an execution right on the target script according to the script library identifier includes:
and judging whether the target script corresponds to the script library corresponding to the script library identifier, if so, judging that the user corresponding to the user identifier has an execution authority on the target script, and if not, judging that the user corresponding to the user identifier has no execution authority on the target script.
In one embodiment, before the step of obtaining the script execution request, the method further includes:
acquiring a user login request, wherein the user login request comprises a user identifier and a login password of a user requesting login;
calling an interface of a user management system to enable the user management system to judge whether a user corresponding to the user identification is an authorized person with a subordinate relationship with a preset mechanism;
and when the user corresponding to the user identification is an authorized person having a subordinate relationship with a preset mechanism, login verification is carried out according to the user identification and the login password, and the login is successful if the verification is passed.
In one embodiment, the shared script is multiple, and the multiple shared scripts correspond to one or more database types.
A data extraction apparatus, the apparatus comprising:
the acquisition module is used for acquiring a script execution request, and acquiring a user identifier and a target script to be executed according to the script execution request, wherein the user identifier is used for uniquely identifying a user who executes an operation on the target script;
the searching module is used for searching the script library identifier corresponding to the user identifier;
the execution permission judging module is used for judging whether a user corresponding to the user identification has execution permission on the target script according to the script library identification when the target script is selected from shared scripts;
and the execution module is used for executing the target script when the user corresponding to the user identification has the execution authority on the target script so as to extract corresponding data from a corresponding database according to the target script.
In one embodiment, the execution module is further configured to, when the target script is a newly added script, establish a corresponding relationship between the newly added target script and a script library corresponding to the script library identifier; and executing the target script to extract corresponding data from a corresponding database according to the target script.
In one embodiment, the apparatus further comprises:
and the sharing module is used for storing the newly added target script and setting the target script as a sharing script so that any user successfully logging in can view the target script.
In one embodiment, the execution permission determining module is further configured to determine whether the target script corresponds to a script library corresponding to the script library identifier, if so, determine that a user corresponding to the user identifier has an execution permission for the target script, and if not, determine that the user corresponding to the user identifier does not have an execution permission for the target script.
In one embodiment, the obtaining module is further configured to obtain a user login request, where the user login request includes a user identifier and a login password of a user requesting to login;
the device further comprises:
the interface calling module is used for calling an interface of a user management system so that the user management system judges whether a user corresponding to the user identifier is an authorized person having a subordinate relationship with a preset mechanism or not;
and the verification module is used for performing login verification according to the user identification and the login password when the user corresponding to the user identification is an authorized person having a subordinate relationship with a preset mechanism, and the login is successful if the verification is passed.
In one embodiment, the shared script is multiple, and the multiple shared scripts correspond to one or more database types.
According to the data extraction method and device, a script execution request is obtained, a user identifier and a target script to be executed are obtained according to the script execution request, and the user identifier is used for uniquely identifying a user who executes an operation on the target script; searching a script library identifier corresponding to the user identifier; when the target script is selected from the shared scripts, judging whether a user corresponding to the user identification has an execution authority on the target script or not according to the script library identification; and when the user corresponding to the user identification has an execution authority to the target script, executing the target script to extract corresponding data from a corresponding database according to the target script. Namely, the script library and the shared script are set, which is equivalent to storing and sharing the script, and the script resource utilization rate and the script execution efficiency are improved.
In addition, when the shared script is executed, the script execution authority of the user is judged according to the corresponding script library identification, and when the execution authority exists, the target script is executed. The safety is greatly improved.
Drawings
FIG. 1 is a schematic flow chart diagram of a data extraction method in one embodiment;
FIG. 2 is a flowchart illustrating a method for executing a newly added script in one embodiment;
FIG. 3 is a flowchart illustrating a login authentication method according to an embodiment;
FIG. 4 is a schematic diagram of the structure of a data extraction device in one embodiment;
FIG. 5 is a schematic diagram of a data extraction device according to another embodiment;
fig. 6 is a schematic structural diagram of a data extraction device in yet another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, a data extraction method is provided, which is exemplified by applying the method to a server, and the method includes the following steps:
and 102, acquiring a script execution request, and acquiring a user identifier and a target script to be executed according to the script execution request, wherein the user identifier is used for uniquely identifying a user who executes an operation on the target script.
In this embodiment, after the script executor logs in successfully, a script to be executed is input, that is, a target script is input, and a script execution operation is performed. The input of the script to be executed may include selecting a target script from the shared script, or may include manually adding a target script.
The server acquires a script execution request, and acquires a user identifier and a target script to be executed according to the script execution request. The user identifier is used for uniquely identifying a user who executes the operation on the target script, namely uniquely identifying a script executor.
Further, the script execution request may include a target script and a user identifier. And the server acquires the target script and the user identification contained in the script request. The script execution request may also include a target script identifier and a user identifier, and the server obtains the target script identifier and the user identifier included in the script execution request, and obtains the corresponding target script according to the target script identifier. The present embodiment does not limit how the server obtains the user identifier and the target script to be executed according to the script execution request.
And 104, searching the script library identification corresponding to the user identification.
In this embodiment, the server stores the corresponding relationship between the user identifier and the script library identifier. The user identification and the script library identification which have the corresponding relation show that the user corresponding to the user identification has the operation authority to the script in the script library corresponding to the script library identification.
And the server searches the script library identification corresponding to the acquired user identification according to the corresponding relation.
And 106, when the target script is selected from the shared scripts, judging whether the user corresponding to the user identification has an execution authority to the target script according to the script library identification.
Further, the server determines the source of the target script. The source of the target script can be a shared script or a newly added script of the user. The shared script is a script stored in the server and can be seen by any user who successfully logs in. It is understood that the sharing script may be one or more.
And when the target script is selected from the shared scripts, the server judges whether the user corresponding to the user identification has the execution authority to the target script according to the searched script library identification.
And 108, when the user corresponding to the user identification has an execution authority to the target script, executing the target script to extract corresponding data from a corresponding database according to the target script.
Further, when the user corresponding to the user identifier has an execution right on the target script, the target script is executed, so that corresponding data is extracted from a corresponding database according to the target script. And when the user corresponding to the user identification has no execution right on the target script, not executing the target script.
In the embodiment, the script library and the shared script are set, which is equivalent to storing and sharing the script, and the script resource utilization rate is improved. Therefore, when executing the script, the user can directly select the script from the shared script without manually writing the script, and the script execution efficiency is improved.
Further, when the target script is selected from the shared scripts, judging whether the user corresponding to the user identifier has an execution right on the target script or not according to the searched script library identifier; and when the user corresponding to the user identification has an execution authority to the target script, executing the target script to extract corresponding data from the corresponding database according to the target script. That is, when executing the shared script, the script execution authority of the user is judged according to the corresponding script library identifier, and when the execution authority exists, the target script is executed. The safety is greatly improved.
As shown in fig. 2, in an embodiment, the method further includes a step of adding a new script, specifically including the following steps:
step 202, when the target script is the newly added script, establishing a corresponding relationship between the newly added target script and the script library corresponding to the script library identifier.
And step 204, executing the target script to extract corresponding data from the corresponding database according to the target script.
In this embodiment, when the target script is a newly added script corresponding to the user identifier, that is, when the target script is a script that is manually input after the user successfully logs in, instead of a script in an original shared script, the server may establish a corresponding relationship between the newly added target script and a script library corresponding to the found script library identifier. And adding the newly added target script as one member of the script library corresponding to the searched script library identification.
Further, the server executes the newly added target script to extract corresponding data from the corresponding database according to the target script.
In this embodiment, it is equivalent to that, when the target script requested to be executed is the newly added script, a corresponding relationship is established between the newly added script and the script library corresponding to the script library identifier corresponding to the user, that is, an affiliated relationship between the newly added script and the script library is established. The method is beneficial to judging the execution authority when the user executes the script next time, and is equivalent to improving the safety.
In one embodiment, the method further comprises: and saving and setting the newly added target script as a shared script so that any user successfully logging in can view the steps.
In this embodiment, the server may further store the newly added target script and set the target script as a shared script, so that any user who successfully logs in can view the target script. Specifically, the server stores the newly added target script in the corresponding script library.
It is understood that this step is performed after the target script is determined to be the newly added script. Thus, it may be performed before or after the step of extracting the corresponding data from the corresponding database according to the target script.
In the embodiment, the newly added target script is stored and set as the shared script, so that the newly added script can be shared and used, and the utilization rate of script resources is improved.
In one embodiment, the step of judging whether the user corresponding to the user identifier has an execution right for the target script according to the script library identifier includes: and judging whether the target script corresponds to the script library corresponding to the script library identifier, if so, judging that the user corresponding to the user identifier has an execution authority on the target script, and if not, judging that the user corresponding to the user identifier does not have the execution authority on the target script.
In this embodiment, the server may determine whether the target script corresponds to the script library corresponding to the found script library identifier. Specifically, the server stores a correspondence between the script and the script library. It is understood that the script and the script library having a corresponding relationship indicate that the script belongs to the script library, i.e., the script library includes the script. Further, the corresponding relationship between the script identifier and the script library identifier may be stored.
And judging whether the target script corresponds to the script library corresponding to the searched script library identification or not according to the corresponding relation. And when the target script corresponds to the script library corresponding to the searched script library identifier, the server judges that the user corresponding to the user identifier has the execution permission on the target script. And when the target script does not correspond to the script library corresponding to the searched script library identifier, the server judges that the user corresponding to the user identifier has no execution permission on the target script.
It can be understood that the found script library identifier is the script library identifier corresponding to the user identifier, which indicates that the user corresponding to the user identifier has an execution right on the script in the script library corresponding to the found script library identifier. And when the target script is judged to correspond to the script library corresponding to the searched script library identifier, the target script is indicated to be contained in the script library corresponding to the searched script library identifier, and then the user can be judged to have the execution permission on the target script. And when the target script is judged not to correspond to the script library corresponding to the found script library identification, the target script is indicated not to be contained in the script library corresponding to the found script library identification, and further, the user can be judged not to have the execution permission on the target script.
As shown in fig. 3, in an embodiment, before the step of obtaining the script execution request, a login verification step is further included, which specifically includes the following steps:
step 302, a user login request is obtained, wherein the user login request comprises a user identifier and a login password of a user requesting to login.
In this embodiment, a user sends a login request to a server through a terminal, and the server obtains the user login request, where the user login request includes a user identifier and a login password of the user requesting to login.
And step 304, calling an interface of the user management system, so that the user management system judges whether the user corresponding to the user identifier is an authorized person having a subordinate relationship with a preset mechanism.
Further, the server calls an interface of the user management system, so that the user management interface judges whether the user corresponding to the user identifier contained in the user login request is an authorized person having a subordinate relationship with the preset mechanism.
The user management system refers to a system for managing affiliation of an organization with employees belonging to the organization. The authorized personnel having a subordinate relationship with the preset organization can be all the personnel subordinate to the preset organization or the personnel subordinate to the preset organization and reaching a preset level. Further, the preset mechanism may be one or more.
Specifically, the user management system may determine whether the user is a login authorized user by determining whether the user corresponding to the user identifier is an employee belonging to a preset authority. Further, the user management system may determine whether the user corresponding to the user identifier is a staff member belonging to a preset organization and reaching a preset level. The preset level may be any one of a general level, a middle level, a high level, and the like.
And step 306, when the user corresponding to the user identifier is an authorized person who has a subordinate relationship with the preset mechanism, performing login verification according to the user identifier and the login password, and if the verification is passed, the login is successful.
Further, when the user corresponding to the user identifier is an authorized person who has a subordinate relationship with the preset mechanism, the server performs login verification according to the user identifier and the login password, and if the verification is passed, the login is successful. Otherwise, if the verification fails, the login is unsuccessful.
In this embodiment, when the user is authenticated by logging in, the server first calls an interface of the user management system to authenticate whether the user is an authorized person having a relationship with a predetermined organization. Namely, the membership of the user and the preset mechanism is verified, and whether the user is a staff of the preset mechanism is judged. And when the user is authenticated to be an authorized person with a subordinate relationship with the preset organization, the server authenticates the user identification and the login password. The method is equivalent to the method for monitoring each employee of the organization by controlling the monitoring of each employee of the organization for each login request, and then carrying out the next user name and password verification through the identity determination of the employee. In the traditional method for logging in the transfer machine, the account number for logging in the transfer machine is only one universal machine account number, and any employee can log in the transfer machine by using the universal machine account number. The transfer machine does not know which employee is logged in. Obviously, compared with the traditional method, the method increases the verification of the identity of the staff and greatly improves the safety.
In one embodiment, when there are multiple shared scripts, the multiple shared scripts may correspond to one or more database types. That is, multiple shared scripts may correspond to one database type or multiple database types. For example, the sharing scripts are S1, S2, and S3, which may simultaneously correspond to an Oracle database, or S1 and S2 correspond to an Oracle database, and S3 corresponds to a Sybase database.
In this embodiment, it is equivalent to that different scripts can be executed through one-time login by sharing the scripts to extract data in a plurality of different types of databases. In the conventional method, corresponding transfer machines are respectively arranged in different types of databases, and if data in a plurality of database types needs to be extracted, the respective transfer machines need to be respectively logged in, and then corresponding scripts are executed to extract corresponding data from the corresponding databases. Compared with the traditional method, the method greatly saves the operation steps and improves the data extraction efficiency.
As shown in fig. 4, in an embodiment, a data extraction apparatus is provided, which includes an obtaining module 404, a searching module 406, an execution permission determining module 408, and an executing module 410, where:
the obtaining module 404 is configured to obtain a script execution request, and obtain a user identifier and a target script to be executed according to the script execution request, where the user identifier is used to uniquely identify a user performing an execution operation on the target script.
And the searching module 406 is configured to search for the script library identifier corresponding to the user identifier.
And the execution permission judging module 408 is configured to, when the target script is a script selected from the shared scripts, judge whether a user corresponding to the user identifier has an execution permission for the target script according to the script library identifier.
And the executing module 410 is configured to execute the target script when the user corresponding to the user identifier has an execution right on the target script, so as to extract corresponding data from a corresponding database according to the target script.
In one embodiment, the executing module 410 is further configured to, when the target script is an additional script, establish a corresponding relationship between the additional target script and a script library corresponding to the script library identifier; and executing the target script to extract corresponding data from the corresponding database according to the target script.
As shown in fig. 5, in one embodiment, the apparatus further comprises:
and the sharing module 412 is used for saving and setting the newly added target script as a sharing script so that any user successfully logging in can view the target script.
In one embodiment, the execution permission determining module 408 is further configured to determine whether the target script corresponds to the script library identifier, if so, determine that the user corresponding to the user identifier has an execution permission for the target script, and if not, determine that the user corresponding to the user identifier has no execution permission for the target script.
As shown in fig. 6, the obtaining module 404 is further configured to obtain a user login request, where the user login request includes a user identifier and a login password of a user requesting login;
the device also includes:
an interface calling module 402, configured to call an interface of the user management system, so that the user management system determines whether a user corresponding to the user identifier is an authorized person having a subordinate relationship with a preset authority;
and the verification module 403 is configured to, when the user corresponding to the user identifier is an authorized person who has an affiliation with a preset organization, perform login verification according to the user identifier and the login password, and if the user passes the verification, perform login successfully.
In one embodiment, the shared script is multiple, and the multiple shared scripts correspond to one or more database types.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of data extraction, the method comprising the steps of:
acquiring a script execution request, and acquiring a user identifier and a target script to be executed according to the script execution request, wherein the user identifier is used for uniquely identifying a user for executing an operation on the target script;
searching a script library identifier corresponding to the user identifier, wherein the server pre-stores the corresponding relation between the user identifier and the script library identifier, and the user identifier and the script library identifier with the corresponding relation indicate that a user corresponding to the user identifier has an operation authority on a script in a script library corresponding to the script library identifier;
when the target script is selected from the shared scripts, judging whether a user corresponding to the user identification has an execution authority on the target script or not according to the script library identification;
when the user corresponding to the user identification has an execution authority to the target script, executing the target script to extract corresponding data from a corresponding database according to the target script;
the method further comprises the following steps:
when the target script is a newly added script, establishing a corresponding relation between the newly added target script and a script library corresponding to the script library identification;
and executing the target script to extract corresponding data from a corresponding database according to the target script.
2. The method of claim 1, further comprising:
and saving and setting the newly added target script as a shared script so that any user successfully logging in can view the target script.
3. The method according to claim 1, wherein the step of determining whether the user corresponding to the user identifier has an execution right for the target script according to the script library identifier comprises:
and judging whether the target script corresponds to the script library corresponding to the script library identifier, if so, judging that the user corresponding to the user identifier has an execution authority on the target script, and if not, judging that the user corresponding to the user identifier has no execution authority on the target script.
4. The method of claim 1, further comprising, prior to the step of obtaining a script execution request:
acquiring a user login request, wherein the user login request comprises a user identifier and a login password of a user requesting login;
calling an interface of a user management system to enable the user management system to judge whether a user corresponding to the user identification is an authorized person with a subordinate relationship with a preset mechanism;
and when the user corresponding to the user identification is an authorized person having a subordinate relationship with a preset mechanism, login verification is carried out according to the user identification and the login password, and the login is successful if the verification is passed.
5. The method of claim 1, wherein the shared script is plural, and wherein the plural shared scripts correspond to one or more database types.
6. A data extraction apparatus, characterized in that the apparatus comprises:
the acquisition module is used for acquiring a script execution request, and acquiring a user identifier and a target script to be executed according to the script execution request, wherein the user identifier is used for uniquely identifying a user who executes an operation on the target script;
the searching module is used for searching the script library identification corresponding to the user identification, wherein the corresponding relation between the user identification and the script library identification is pre-stored in the server, and the user identification and the script library identification which have the corresponding relation indicate that the user corresponding to the user identification has the operation authority on the script in the script library corresponding to the script library identification;
the execution permission judging module is used for judging whether a user corresponding to the user identification has execution permission on the target script according to the script library identification when the target script is selected from shared scripts;
the execution module is used for executing the target script when the user corresponding to the user identifier has an execution authority on the target script so as to extract corresponding data from a corresponding database according to the target script;
the execution module is further used for establishing a corresponding relation between the newly added target script and the script library corresponding to the script library identifier when the target script is the newly added script; and executing the target script to extract corresponding data from a corresponding database according to the target script.
7. The apparatus of claim 6, further comprising:
and the sharing module is used for storing the newly added target script and setting the target script as a sharing script so that any user successfully logging in can view the target script.
8. The apparatus according to claim 6, wherein the execution permission determining module is further configured to determine whether the target script corresponds to a script library corresponding to the script library identifier, if so, determine that a user corresponding to the user identifier has an execution permission for the target script, and if not, determine that a user corresponding to the user identifier has no execution permission for the target script.
9. The apparatus according to claim 6, wherein the obtaining module is further configured to obtain a user login request, where the user login request includes a user identifier and a login password of a user requesting login;
the device further comprises:
the interface calling module is used for calling an interface of a user management system so that the user management system judges whether a user corresponding to the user identifier is an authorized person having a subordinate relationship with a preset mechanism or not;
and the verification module is used for performing login verification according to the user identification and the login password when the user corresponding to the user identification is an authorized person having a subordinate relationship with a preset mechanism, and the login is successful if the verification is passed.
10. The apparatus of claim 6, wherein the shared script is plural, and wherein the plural shared scripts correspond to one or more database types.
CN201610819807.7A 2016-09-12 2016-09-12 Data extraction method and device Active CN107818102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610819807.7A CN107818102B (en) 2016-09-12 2016-09-12 Data extraction method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610819807.7A CN107818102B (en) 2016-09-12 2016-09-12 Data extraction method and device

Publications (2)

Publication Number Publication Date
CN107818102A CN107818102A (en) 2018-03-20
CN107818102B true CN107818102B (en) 2020-03-27

Family

ID=61601307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610819807.7A Active CN107818102B (en) 2016-09-12 2016-09-12 Data extraction method and device

Country Status (1)

Country Link
CN (1) CN107818102B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614313A (en) * 2018-10-25 2019-04-12 平安科技(深圳)有限公司 Automated testing method, device and computer readable storage medium
CN109683942B (en) * 2018-11-13 2024-05-24 平安科技(深圳)有限公司 Script management method, script management device, script management medium and electronic equipment
CN110427310B (en) * 2019-06-24 2022-08-19 苏州浪潮智能科技有限公司 Script log processing method and device and computer readable storage medium
CN114398104B (en) * 2022-01-19 2024-06-04 中国平安人寿保险股份有限公司 Script processing method, device, equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339534A (en) * 2008-06-17 2009-01-07 金蝶软件(中国)有限公司 Software test apparatus and test method
CN101431713A (en) * 2007-11-09 2009-05-13 中国移动通信集团公司 Resource access method and equipment
CN101710348A (en) * 2009-12-29 2010-05-19 金蝶软件(中国)有限公司 Document data query method and server
CN102270132A (en) * 2011-07-13 2011-12-07 中国人民解放军海军计算技术研究所 Control method for script action in Linux operating system
CN102402628A (en) * 2010-09-07 2012-04-04 无锡中星微电子有限公司 Method and system for generating systems-on-a-chip (SoC) verification platform
CN102867069A (en) * 2012-09-28 2013-01-09 浙江图讯科技有限公司 Method and system for executing database scripts based on SQL (structured query language)
CN104516908A (en) * 2013-09-29 2015-04-15 华为技术有限公司 Database access method and device
CN104572644A (en) * 2013-10-10 2015-04-29 北京大学 Database updating device and database updating method
CN104866743A (en) * 2015-05-07 2015-08-26 北京金山安全软件有限公司 Method and device for calling interface in browser
CN105608373A (en) * 2015-12-11 2016-05-25 曙光信息产业(北京)有限公司 User right control method and apparatus

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431713A (en) * 2007-11-09 2009-05-13 中国移动通信集团公司 Resource access method and equipment
CN101339534A (en) * 2008-06-17 2009-01-07 金蝶软件(中国)有限公司 Software test apparatus and test method
CN101710348A (en) * 2009-12-29 2010-05-19 金蝶软件(中国)有限公司 Document data query method and server
CN102402628A (en) * 2010-09-07 2012-04-04 无锡中星微电子有限公司 Method and system for generating systems-on-a-chip (SoC) verification platform
CN102270132A (en) * 2011-07-13 2011-12-07 中国人民解放军海军计算技术研究所 Control method for script action in Linux operating system
CN102867069A (en) * 2012-09-28 2013-01-09 浙江图讯科技有限公司 Method and system for executing database scripts based on SQL (structured query language)
CN104516908A (en) * 2013-09-29 2015-04-15 华为技术有限公司 Database access method and device
CN104572644A (en) * 2013-10-10 2015-04-29 北京大学 Database updating device and database updating method
CN104866743A (en) * 2015-05-07 2015-08-26 北京金山安全软件有限公司 Method and device for calling interface in browser
CN105608373A (en) * 2015-12-11 2016-05-25 曙光信息产业(北京)有限公司 User right control method and apparatus

Also Published As

Publication number Publication date
CN107818102A (en) 2018-03-20

Similar Documents

Publication Publication Date Title
CN107818102B (en) Data extraction method and device
CN110381031B (en) Single sign-on method, device, equipment and computer readable storage medium
CN109150828B (en) Verification registration method and system
CN109471865B (en) Offline data management method, system, server and storage medium
CN106934274B (en) Weak password detection method, device and system
RU2017119549A (en) MOBILE AUTHENTICATION IN MOBILE VIRTUAL NETWORK
CN104574167B (en) Lease processing method, related device and system
CN110365483B (en) Cloud platform authentication method, client, middleware and system
CN113779585B (en) Unauthorized vulnerability detection method and device
CN107256387B (en) Fingerprint authentication method, system and computer readable storage medium
CN107911340B (en) Login verification method, device and equipment of application program and storage medium
CN107026836B (en) Service implementation method and device
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
US9509672B1 (en) Providing seamless and automatic access to shared accounts
CN105447364A (en) Remote biological recognition registering method, device and system
CN112822222A (en) Login verification method, automatic login verification method, server side and client side
US20160269381A1 (en) Apparatus, system and method of dynamically controlling access to a cloud service
CN107767509B (en) Authorization method, server, authorization system and storage medium
SG189085A1 (en) User account recovery
AU2017285865B2 (en) Mobile authentication method and system therefor
TW202024975A (en) Information processing method and device, electronic equipment and computer readable storage medium
CN113111339A (en) Access control method, device, equipment and medium for application service
CN108234122B (en) Token checking method and device
CN109829321B (en) Method, device, equipment and storage medium for authenticating identity
CN106295384B (en) Big data platform access control method and device and authentication server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant