CN109062954A - A kind of efficient data exchange and data source shielding system - Google Patents
A kind of efficient data exchange and data source shielding system Download PDFInfo
- Publication number
- CN109062954A CN109062954A CN201810655423.5A CN201810655423A CN109062954A CN 109062954 A CN109062954 A CN 109062954A CN 201810655423 A CN201810655423 A CN 201810655423A CN 109062954 A CN109062954 A CN 109062954A
- Authority
- CN
- China
- Prior art keywords
- database
- data
- component
- module
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention provides a kind of efficient data exchange and data source shielding systems, including database creation module: creating multiple local data bases or remote data base, and writes down each wide area information server information;Assembly module, defines the correlated variables of at least one operation data, and obtains ID number;Function module: including database manipulation function;Code Edit module: according to wide area information server information, database manipulation function is selected in function module, is inserted into database operation code;And the parameter in default database handling function is revised as to the variable name defined, it is then accordingly written if necessary to data base manipulation statement;Code preserving module saves the code that user is formed;Code execution module executes the code saved in code preserving module.The present invention can operate simultaneously the isomeric data of disparate databases in a software;It will not influence the safety of data source in the maloperation of data;To realize the data exchange between distinct type data-base.
Description
Technical field
The present invention relates to computer programming fields, and in particular, to a kind of efficient data exchange and data source every
From system.
Background technique
With the fast development of science and technology and society, computer software engineering is become more and more important, the machine in all trades and professions
Tool automation, intelligentized control method, internet, Internet of Things etc. are for the requirement such as the efficiency of software development, control or speed of service
Also more and more.
In soft project application, software development mainly includes page interaction, service logic and database design.In software industry
Before logic of being engaged in is implemented, Pages Design and database design have to complete.Traditional database design is all that single database is set
Meter or multiple database isomorphism categorical data.This traditional method can not solve the processing of the isomeric data of multiple database, packet
Include the exchange of data and the isolation of data source.For example, the data manipulation between MySQL and Access database how is solved, tradition
Mode there is no good solution.
It is found by retrieval:
1, application No. is 201710418271.2 Chinese invention patent application " data exchange system, method and apparatus ",
Disclose data exchange system, method and apparatus.One specific embodiment of the system includes: first server, for being based on
Demand information obtains data to be exchanged mark;Data Identification to be exchanged is stored;Obtain the storage of data to be exchanged mark
Address;The storage address of Data Identification to be exchanged is encrypted, the first encryption storage address is generated;Second server is used for
The first encryption storage address is obtained from first server;First encryption storage address is decrypted, data to be exchanged mark is obtained
The storage address of knowledge;Based on the storage address of data to be exchanged mark, data to be exchanged mark is obtained;Based on data to be exchanged mark
Know, the indicated data to be exchanged of data to be exchanged mark is found out from pre-stored data acquisition system, so that first service
Device obtains data to be exchanged from second server.The embodiment saves the construction and maintenance cost of data exchange system.But
It is that the invention is a kind of system, method and apparatus that data exchange storage is carried out by marker, and essence is same type data
Operation, the data manipulation not being suitable between disparate databases type.
2, application No. is 201710341456.8 Chinese invention patent applications " method for interchanging data of SAP and BPC and is
System ", the method for interchanging data of SAP and BPC a kind of is disclosed, is mounted in BW system by BPC system, BPC combination system is built
It stands on the basis of BW Multidimensional Data Model, carries out data exchange using BW ETL tool and SAP business suite;And this method pair
The data exchange system of the SAP and BPC answered a kind of, including data source memory module, data conversion module, data warehouse management mould
Block, business modeling module and merging process control monitor.Advantage of the present invention shows themselves in that optimization consolidated accounts system data significantly
Collection process, the double criterion of mode bring for meeting SAP system and non-SAP system difference operation are calculated and the need of report disclosure
It asks, optimizes the treatment process of double criterion report data bring re-classification of data, optimization master data maintenance process, makes data point
Analysis process is more flexible.But the data exchange and processing between SAP system and non-SAP system are focused in the invention, are applicable in model
It encloses narrow.
3, a kind of data exchange system, English abbreviation DTP are to be deployed between different security level network/security domains, specially
Door is used for the software and hardware system of business datum inspection, access control and distribution.Data exchange system is made of two independent hosts:
TAS (data exchange system trust end), UAS (the non-trusted end of data exchange system).Suitable for government, finance, large enterprise etc.
Need the network application environment of high-volume data efficient rate, high safety, highly-reliable transmission.But the data exchange system is to hard
Part requires height, and will affect hardware design, is not suitable for promoting.
Therefore, the demand of industrial application is no longer satisfied using traditional database design method.How difference is isolated
Type of database, and operate different type of database simultaneously, become this field urgent problem to be solved.
Summary of the invention
Aiming at the above shortcomings existing in the prior art, the object of the present invention is to provide a kind of efficient data exchange sum numbers
According to source shielding system, which can be isolated different type of database, and can operate different type of database simultaneously, number
Operation data is effectively ensured according to caching mechanism and source data is isolated, can preferably meet in existing industrial application and software is opened
The demand of hair.The data buffer storage mechanism refers to: one variable of data assignment for the database that DB function is read, this variable
It is exactly a data buffer storage.
The present invention is achieved by the following technical solutions.
A kind of efficient data exchange and data source shielding system, comprising:
Database creation module: the database creation module is for creating multiple local data bases or teledata
Library, and write down each wide area information server information;
Assembly module, the assembly module are used for the correlated variables of defining operation database, and obtain each correlation and become
The ID number of amount;
Function module: the function module includes the data exchange and data for realizing operation data between disparate databases
Source isolated data library handling function;;
Code Edit module: the Code Edit module selects in function module according to wide area information server information
Database manipulation function is inserted into corresponding database manipulation code;And the default parameters in database manipulation function is revised as
The correlated variables ID number defined is then accordingly written if necessary to data base manipulation statement;
Code preserving module, the code preserving module save the code formed in Code Edit module;
Code execution module, the code execution module execute the code saved in code preserving module, realize different numbers
According to the data exchange between library, while realizing that the data source between disparate databases is isolated.
Preferably, the database information includes following any one or any multinomial:
Type of database;
Database address;
Database-name;
Database password.
Preferably, the assembly module includes for building Layer layers of Layer layer assembly and being arranged in Layer layers
In multiple other assemblies, wherein obtain the ID number of Layer layer assembly and each other assemblies, as operating database
The ID number of correlated variables.
Preferably, the other assemblies include: infrastructure component, general purpose module and high-level component.
Preferably, the database manipulation function includes such as minor function:
- DB function, for realizing the operation to database and the data exchange between disparate databases;
- BindingDataTo function, for realizing the data source isolation between disparate databases.
Preferably, the function expression of the DB function is following any one or any multinomial:
- DB:varDB=Access, FileName, Password, SQL indicate operation Access database, wherein
VarDB is data source, and Access shows that type of database, FileName are file path, and Password is password, and SQL is number
According to querying condition;
- DB:varDB=Excel, FileName, SQL indicate operation excel database, and wherein varDB is data source,
Excel shows that type of database, FileName are file path, and SQL is data query conditions;
- DB:varDB=MySQL, ServerName, DBName, UserName, Password, SQL indicate operation
MySQL database, wherein varDB is data source, and MySQL shows that type of database, ServerName are server name,
DBName is database-name, and UserName is user name, and Password is password, and SQL is data query conditions
- DB:varDB=SqlLite, FileName, SQL indicate operation SqlLite database, and wherein varDB is data
Source, SqlLite show that type of database, FileName are file path, and SQL is data query conditions;
- DB:varDB=SQLServer, ServerName, DBName, UserName, Password, SQL indicate operation
SQLServer database, wherein varDB is data source, and SQLServer shows that type of database, ServerName are server
Domain name or IP, DBName are database name, and UserName is user name, and Password is password, and SQL is data query conditions.
Preferably, the expression formula of the BindingDataTo function are as follows:
BindingDataTo:ControlID=DataSource [, [DISTINCT] FieldName], indicate binding number
According to control is arrived, the data be the data read by DB function from database, the control for TextBox, ListBox and
In Combo any one or it is any a variety of;Wherein, ControlID TextBox, ListBox and/or Combo,
DataSource is data source, and [, [DISTINCT] FieldName] is the return value of TextBox, ListBox and/or Combo.
Preferably, it when in the parameter of database manipulation function including SQL parameter name, demonstrates the need for database manipulation
The database manipulation function is written as parameter in sentence.
Preferably, the code execution module includes the exploitation environment unit and/or Runtime environment for executing code
Unit.
Preferably, the ID number defaulted when the ID number of the correlated variables is established for variable or the ID number obtained by assignment.
Compared with prior art, the present invention have it is following the utility model has the advantages that
1, efficient data exchange and data source shielding system provided by the invention, are the numbers to different type of database
According to being operated, by selecting database manipulation function, realize that the exchange of isomeric data and isolation (are grasped between disparate databases
Make the data exchange and data source isolation of data).
2, efficient data exchange and data source shielding system provided by the invention, can satisfy setting for most of system
Meter is not limited to certain a kind of system, while can handle different types of database data.
3, efficient data exchange and data source shielding system provided by the invention, are more emphasized at the data in software
Reason, without special hardware requirement, while focusing on the data exchange between distinct type data-base and processing.
4, the present invention can operate simultaneously the isomeric data of disparate databases in a software.
5, efficient data exchange and data source shielding system provided by the invention, will not influence in the maloperation of data
The safety of data source.
6, data exchange and data source isolation between distinct type data-base may be implemented in the present invention.
The above beneficial effect shows that the present invention can preferably meet the need in existing industrial application for software development
It asks.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other feature of the invention,
Objects and advantages will become more apparent upon:
Fig. 1 is data exchange and data source shielding system structure principle chart in one embodiment of the invention.
Specific embodiment
Elaborate below to the embodiment of the present invention: the present embodiment carries out under the premise of the technical scheme of the present invention
Implement, the detailed implementation method and specific operation process are given.It should be pointed out that those skilled in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.
As shown in Figure 1, a kind of structure principle chart of efficient data exchange and data source shielding system, comprising:
Database creation module: the database creation module is for creating multiple local data bases or teledata
Library, and write down each wide area information server information;
Assembly module, the variable-definition module are used for the correlated variables of defining operation database, and obtain each phase
Close the ID number of variable;
Function module: the function module includes database manipulation function, for user's selection;The database manipulation
Function is the function that can be realized the data exchange of operation data and data source isolation between disparate databases;
Code Edit module: the Code Edit module is used for according to wide area information server information, in function module
Database manipulation function is selected, the database manipulation code of corresponding informance is inserted into;And the default in database manipulation function is joined
Number is revised as the correlated variables ID number defined, is then accordingly written if necessary to data base manipulation statement;
Code preserving module, the code preserving module save the code formed in Code Edit module;
Code execution module, the code execution module execute the code saved in code preserving module.
Wherein:
The effect in function is written in data base manipulation statement are as follows: the argument section of database manipulation function, some are data
The action statement in library needs to write out data base manipulation statement, could the proper use of function.
Judgement needs to be written the standard of data base manipulation statement: when including SQL in the parameter of database manipulation function
When parameter name, which demonstrates the need for that database manipulation function is written using data base manipulation statement as parameter.
In above-mentioned steps, database manipulation code can be understood as a function in database manipulation function, number
According to the parameter that library action statement is in the function, the i.e. parameter of operating database.
Further, the database information includes following any one or any multinomial:
Type of database;
Database address;
Database-name;
Database password.
Further, the variable-definition module includes for building Layer layers of Layer layer assembly and being arranged in
Multiple other assemblies in Layer layers, wherein user can obtain each component (Layer layer assembly and other assemblies)
ID number, i.e. the ID number of the correlated variables of operating database.
Further, the other assemblies include: infrastructure component, general purpose module and high-level component;Wherein:
The basic module includes following any one or any number of components:
- Label component, for constructing label;
- TextBox component, for constructing text box;
- Image component, for constructing Image image;
- Gif component, for constructing Gif cardon;
- Apng component, for constructing Apng image;
- CommandButton component, for constructing button;
- Var component, for constructing the variable in code;
The general purpose module includes following any one or any number of components:
- Menu component, for constructing menu bar;
- ComboBox component, for constructing combobox;
- ListBox component, for constructing list box;
- CheckBox component, for constructing check box;
- OptionButton component, for constructing single-point choice box;
- DateBox component, for constructing date selection component;
- TimeBox component, for constructing time component;
- ProgreBar component, for constructing progress bar;
- Timer component, for constructing triggering clock;
The high-level component includes following any one or any number of components:
- Chart component, for constructing chart frame;
Flash component, for constructing Flash;
- Report component, for constructing report component;
- Tree component, for constructing tree component;
- WebBrowser component, for constructing browser component.
Further, the database manipulation function includes such as minor function:
- DB function, for realizing the operation to database and the data exchange between disparate databases;
- BindingDataTo function, for realizing the data source isolation between disparate databases.
Further, the function expression of the DB function is following any one or any multinomial:
- DB:varDB=Access, FileName, Password, SQL indicate operation Access database, wherein
VarDB is data source, and Access shows that type of database, FileName are file path, and Password is password, and SQL is number
According to querying condition;
- DB:varDB=Excel, FileName, SQL indicate operation excel database, and wherein varDB is data source,
Excel shows that type of database, FileName are file path, and SQL is data query conditions;
- DB:varDB=MySQL, ServerName, DBName, UserName, Password, SQL indicate operation
MySQL database, wherein varDB is data source, and MySQL shows that type of database, ServerName are server name,
DBName is database-name, and UserName is user name, and Password is password, and SQL is data query conditions
- DB:varDB=SqlLite, FileName, SQL indicate operation SqlLite database, and wherein varDB is data
Source, SqlLite show that type of database, FileName are file path, and SQL is data query conditions;
- DB:varDB=SQLServer, ServerName, DBName, UserName, Password, SQL indicate operation
SQLServer database, wherein varDB is data source, and SQLServer shows that type of database, ServerName are server
Domain name or IP, DBName are database name, and UserName is user name, and Password is password, and SQL is data query conditions.
Further, the expression formula of the BindingDataTo function are as follows:
BindingDataTo:ControlID=DataSource [, [DISTINCT] FieldName], indicate binding number
According to control is arrived, the data be the data read by DB function from database, the control for TextBox, ListBox and
In Combo any one or it is any a variety of;Wherein, ControlID TextBox, ListBox and/or Combo,
DataSource is data source, and [, [DISTINCT] FieldName] is the return value of TextBox, ListBox and/or Combo.
Further, the code execution module includes the exploitation environment unit and/or Runtime ring for executing code
Border unit.
Further, the ID number defaulted when the ID number of the correlated variables is established for variable or the ID obtained by assignment
Number.
Efficient data exchange and data source shielding system provided by the above embodiment, data exchange and data source isolation
Method includes the following steps:
Step S1: defining multiple local data bases or remote data base, and writes down wide area information server information, described
Database information includes the information such as type of database, database address, database-name, database password;
Step S2: the correlated variables of defining operation database, and obtain each correlated variables assignment ID number;With Var group
For part is as the correlated variables of operating database, the correlated variables of the operating database includes data buffer storage, database
The variables such as location;
Step S3: according to wide area information server information (such as type of database), the data selected in function module
Library handling function is inserted into the database manipulation code of corresponding informance (such as type of database);
Default parameters in database manipulation function: being revised as the correlated variables ID number defined by step S4, if needed
Data base manipulation statement is wanted then accordingly to be written;
Step S5: it clicks Action and saves code;
Step S6: database manipulation function is executed.
Further, step S2 includes the following steps:
Step S2-1: arrangement layer Layer;
Step S2-2: correlated variables of multiple components as operating database is chosen, is dragged in layer Layer;
Step S2-3: the ID number of each component, the as ID number of the correlated variables of operating database are obtained.
Wherein, step S6 includes following any one or any number of steps:
Code is executed in exploitation environment;
Code is executed under Runtime mode.
A kind of efficient data exchange and data source shielding system provided in this embodiment are realized between disparate databases
Data exchange, while can be realized the isolation of the data source between disparate databases.
It in order to more specifically understand the present invention, is illustrated below by way of specific application example, but the application example is not
For limiting the present invention.Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail,
But in the appropriate case, the technology, method and apparatus should be considered as part of specification.
In following application example, the implementation of efficient data exchange and data source shielding system using computer system into
Row, computer system include computer, and computer includes processing unit, the system storage, fixation via system bus connection
Memory interface, mobile memory interface, user input interface, network interface, video interface and peripheral interface etc.;
Wherein, under the support of processing unit, by user input interface realize the efficient data exchange of the present embodiment and
The implementation of data source shielding system;Multiple databases are defined using database creation module and database of record information passes through keyboard
Perhaps touch screen complete using assembly module build Layer layer and arrange component in need it is complete by keyboard or touch screen
At modifying the default parameters in database manipulation function in Code Edit module is that the correlated variables ID number defined needs to lead to
Cross keyboard completion;It chooses database manipulation function and needs to click by mouse or touch screen to Code Edit module, Huo Zhetong
Cross keyboard input;The event routine code of formation can also be connect by fixed memory interface, mobile memory interface, network
Mouth, video interface and peripheral interface etc. are saved into other memories or running environment;It is needed using code preserving module
It is clicked by mouse or touch screen and saves code to storage hard disk;It needs to click by mouse using code execution module and run
Interpreter explains the code that operation is stored on hard disk, passes through the software of computer display display operation.
It should be noted that above-mentioned hardware configuration explanation is merely illustrative, and it is in no way intended to the present embodiment
Using or any restrictions that use.
With reference to the accompanying drawing and the present invention program is described in further detail in specific embodiment.
Application example explanation:
Example citing 1:MySQL database and Access data bank simultaneous operation
MySQL database and Access database have been respectively created by database creation module first.Then it opens soft
Part (such as UCC develops software), after arranging layer Layer by assembly module, drags a Button component to layer Layer
In container, the ID number of Button component is double-clicked, click event is write, in click event, the DB that is firstly inserted into function module:
Var=Access function is simultaneously inserted into Code Edit module, and is rewritten according to the Access database situation of the machine, then in code
Editor module is inserted into DB:varDB=MySQL function, and is modified according to the MySQL database situation of the machine.It clicks
Simultaneously for save routine to code preserving module, two differences can be obtained to Action by clicking Button component by code execution module
Database data source, while becoming same data buffer storage from different data sources, that is, there is same operation data
In correlated variables.
Subprogram example:
DB:db data set
1=MySQL, '@txtServer.Text', '@txtDatabase.Text', '@txtUsername.Text', '@
txtPassword.Text',SQL@txtSQL.text;
DB:db data set 2=Access, '@txtAccessFile', ", SQL@txtSQL.text;
The efficient data exchange and data source shielding system that the above embodiment of the present invention provides, realize the friendship of isomeric data
It changes and is isolated (data exchange and data source isolation i.e. between disparate databases), meet the design of most of system, do not limit to
Mr. Yu's one kind system, while can handle different types of database data.The data processing in software is more emphasized, without spy
Other hardware requirement, while focusing on the data exchange between distinct type data-base and processing, it can be in a software simultaneously
Operate the isomeric data of disparate databases.It will not influence the safety of data source in the maloperation of data.
Block diagram in attached drawing shows methodological function and the operation of preferred embodiment according to the present invention.In this regard, frame
Each box in figure or block diagram can represent a module, program segment or a part of instruction, the module, program segment or refer to
A part of order includes one or more executable instructions for implementing the specified logical function.In some realities as replacement
In existing, function marked in the box can also occur in a different order than that indicated in the drawings.For example, two continuous sides
Frame can actually be basically executed in parallel, they can also be executed in the opposite order sometimes, this according to related function and
It is fixed.It, can the function as defined in executing or movement it is also noted that the combination of each box and box in block diagram
Dedicated hardware based system is realized, or can be realized using a combination of dedicated hardware and computer instructions.For this
It is well known that, realized by hardware mode for the technical staff of field, software and hardware is realized and passed through by software mode
In conjunction with mode realize it is all of equal value.
Specific embodiments of the present invention are described above.It is to be appreciated that the invention is not limited to above-mentioned
Particular implementation, those skilled in the art can make various deformations or amendments within the scope of the claims, this not shadow
Ring substantive content of the invention.
Claims (10)
1. a kind of efficient data exchange and data source shielding system characterized by comprising
Database creation module: the database creation module is used to create multiple local data bases or remote data base, and
Write down each wide area information server information;
Assembly module, the assembly module are used for the correlated variables of defining operation database, and obtain each correlated variables
ID number;
Function module: the function module include realize disparate databases between operation data data exchange and data source every
From database manipulation function;;
Code Edit module: the Code Edit module selects data according to wide area information server information in function module
Library handling function is inserted into corresponding database manipulation code;And the default parameters in database manipulation function is revised as defining
Good correlated variables ID number, is then accordingly written if necessary to data base manipulation statement;
Code preserving module, the code preserving module save the code formed in Code Edit module;
Code execution module, the code execution module execute the code saved in code preserving module, realize disparate databases
Between data exchange, while realize the data source between disparate databases be isolated.
2. efficient data exchange according to claim 1 and data source shielding system, which is characterized in that the database
Information includes following any one or any multinomial:
Type of database;
Database address;
Database-name;
Database password.
3. efficient data exchange according to claim 1 and data source shielding system, which is characterized in that the assembly mould
Block includes multiple other assemblies for building Layer layers of Layer layer assembly and being arranged in Layer layers, wherein is obtained
The ID number of Layer layer assembly and each other assemblies, the as ID number of the correlated variables of operating database.
4. efficient data exchange according to claim 3 and data source shielding system, which is characterized in that other described groups
Part includes: infrastructure component, general purpose module and high-level component;Wherein:
The basic module includes following any one or any number of components:
- Label component, for constructing label;
- TextBox component, for constructing text box;
- Image component, for constructing Image image;
- Gif component, for constructing Gif cardon;
- Apng component, for constructing Apng image;
- CommandButton component, for constructing button;
- Var component, for constructing the variable in code;
The general purpose module includes following any one or any number of components:
- Menu component, for constructing menu bar;
- ComboBox component, for constructing combobox;
- ListBox component, for constructing list box;
- CheckBox component, for constructing check box;
- OptionButton component, for constructing single-point choice box;
- DateBox component, for constructing date selection component;
- TimeBox component, for constructing time component;
- ProgreBar component, for constructing progress bar;
- Timer component, for constructing triggering clock;
The high-level component includes following any one or any number of components:
- Chart component, for constructing chart frame;
Flash component, for constructing Flash;
- Report component, for constructing report component;
- Tree component, for constructing tree component;
- WebBrowser component, for constructing browser component.
5. efficient data exchange according to claim 1 and data source shielding system, which is characterized in that the database
Handling function includes such as minor function:
- DB function, for realizing the operation to database and the data exchange between disparate databases;
- BindingDataTo function, for realizing the data source isolation between disparate databases.
6. efficient data exchange according to claim 5 and data source shielding system, which is characterized in that the DB function
Function expression be following any one or any multinomial:
- DB:varDB=Access, FileName, Password, SQL indicate operation Access database, and wherein varDB is
Data source, Access show that type of database, FileName are file path, and Password is password, and SQL is data query item
Part;
- DB:varDB=Excel, FileName, SQL indicate operation excel database, and wherein varDB is data source, Excel
Show that type of database, FileName are file path, SQL is data query conditions;
- DB:varDB=MySQL, ServerName, DBName, UserName, Password, SQL indicate operation MySQL number
According to library, wherein varDB is data source, and MySQL shows that type of database, ServerName are server name, and DBName is number
According to library name, UserName is user name, and Password is password, and SQL is data query conditions
- DB:varDB=SqlLite, FileName, SQL indicate operation SqlLite database, and wherein varDB is data source,
SqlLite shows that type of database, FileName are file path, and SQL is data query conditions;
- DB:varDB=SQLServer, ServerName, DBName, UserName, Password, SQL indicate operation
SQLServer database, wherein varDB is data source, and SQLServer shows that type of database, ServerName are server
Domain name or IP, DBName are database name, and UserName is user name, and Password is password, and SQL is data query conditions.
7. efficient data exchange according to claim 5 and data source shielding system, which is characterized in that described
The expression formula of BindingDataTo function are as follows:
BindingDataTo:ControlID=DataSource [, [DISTINCT] FieldName], indicate that binding data arrives
Control, the data are the data read by DB function from database, and the control is TextBox, ListBox and Combo
In any one or it is any a variety of;Wherein, ControlID TextBox, ListBox and/or Combo object,
DataSource is data source, [, [DISTINCT] FieldName] and it is returning for TextBox, ListBox and/or Combo object
Return value.
8. efficient data exchange according to claim 6 or 7 and data source shielding system, which is characterized in that in code
In editor module, when in the parameter of database manipulation function including SQL parameter name, demonstrate the need for data base manipulation statement
The database manipulation function is written as parameter.
9. efficient data exchange according to claim 1 and data source shielding system, which is characterized in that the code is held
Row module includes the exploitation environment unit and/or Runtime environment unit for executing code.
10. efficient data exchange according to claim 1 and data source shielding system, which is characterized in that the correlation
The ID number defaulted when the ID number of variable is established for variable or the ID number obtained by assignment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810655423.5A CN109062954A (en) | 2018-06-23 | 2018-06-23 | A kind of efficient data exchange and data source shielding system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810655423.5A CN109062954A (en) | 2018-06-23 | 2018-06-23 | A kind of efficient data exchange and data source shielding system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109062954A true CN109062954A (en) | 2018-12-21 |
Family
ID=64820931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810655423.5A Pending CN109062954A (en) | 2018-06-23 | 2018-06-23 | A kind of efficient data exchange and data source shielding system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109062954A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113570059A (en) * | 2021-07-21 | 2021-10-29 | 北京航天测控技术有限公司 | Spacecraft decision reasoning method, device and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1567301A (en) * | 2003-06-23 | 2005-01-19 | 华为技术有限公司 | Method and apparatus for accessing database |
CN1976320A (en) * | 2006-12-22 | 2007-06-06 | 中国建设银行股份有限公司 | Data access control method and system |
CN101645074A (en) * | 2009-09-07 | 2010-02-10 | 浪潮集团山东通用软件有限公司 | Method for accessing relational databases of different types |
CN102841889A (en) * | 2011-06-20 | 2012-12-26 | 中兴通讯股份有限公司 | Method and device for achieving efficient database access based on ORM (object relational mapping) architecture |
-
2018
- 2018-06-23 CN CN201810655423.5A patent/CN109062954A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1567301A (en) * | 2003-06-23 | 2005-01-19 | 华为技术有限公司 | Method and apparatus for accessing database |
CN1976320A (en) * | 2006-12-22 | 2007-06-06 | 中国建设银行股份有限公司 | Data access control method and system |
CN101645074A (en) * | 2009-09-07 | 2010-02-10 | 浪潮集团山东通用软件有限公司 | Method for accessing relational databases of different types |
CN102841889A (en) * | 2011-06-20 | 2012-12-26 | 中兴通讯股份有限公司 | Method and device for achieving efficient database access based on ORM (object relational mapping) architecture |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113570059A (en) * | 2021-07-21 | 2021-10-29 | 北京航天测控技术有限公司 | Spacecraft decision reasoning method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10754493B2 (en) | Software robots for programmatically controlling computer programs to perform tasks | |
JP6850907B2 (en) | Generate and execute query plans in a relational database management system with a temporal-relational database | |
US9292306B2 (en) | System, multi-tier interface and methods for management of operational structured data | |
US20170270022A1 (en) | Intelligent Metadata Management and Data Lineage Tracing | |
US9026901B2 (en) | Viewing annotations across multiple applications | |
US20170017708A1 (en) | Entity-relationship modeling with provenance linking for enhancing visual navigation of datasets | |
CN109997126A (en) | Event-driven is extracted, transformation, loads (ETL) processing | |
US20210357503A1 (en) | Systems and Methods for Detecting Data Alteration from Source to Target | |
JP2006012146A (en) | System and method for impact analysis | |
AU2014233672A1 (en) | System for metadata management | |
WO2013119416A1 (en) | A system to view and manipulate artifacts at a temporal reference point | |
US9015608B2 (en) | Regenerating a user interface area | |
Psallidas et al. | Provenance for interactive visualizations | |
Dumas et al. | Robotic Process Mining. | |
US10877984B1 (en) | Systems and methods for filtering and visualizing large scale datasets | |
AlBar et al. | A journey towards building real-time big data analytics environment for drilling operations: Challenges and lessons learned | |
EP2343658A1 (en) | Federation as a process | |
Simmhan et al. | Analysis of approaches for supporting the open provenance model: A case study of the trident workflow workbench | |
McNicholas et al. | Automating tasks in protein structure determination with the clipper python module | |
CN109062954A (en) | A kind of efficient data exchange and data source shielding system | |
Almeida et al. | Performance analysis and optimization techniques for oracle relational databases | |
CN109670011B (en) | Multi-map-source map service engine | |
Omitola et al. | Capturing interactive data transformation operations using provenance workflows | |
CN108959489A (en) | A kind of efficient data exchange and data source partition method | |
Schulz et al. | A flexible data model to support multi-domain performance analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181221 |
|
RJ01 | Rejection of invention patent application after publication |