CN110457941A - A kind of management method and device, electronic equipment in common test library - Google Patents
A kind of management method and device, electronic equipment in common test library Download PDFInfo
- Publication number
- CN110457941A CN110457941A CN201910636943.6A CN201910636943A CN110457941A CN 110457941 A CN110457941 A CN 110457941A CN 201910636943 A CN201910636943 A CN 201910636943A CN 110457941 A CN110457941 A CN 110457941A
- Authority
- CN
- China
- Prior art keywords
- identity
- target
- hive database
- target hive
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 100
- 238000007726 management method Methods 0.000 title claims abstract description 38
- 238000000034 method Methods 0.000 claims abstract description 44
- 238000001514 detection method Methods 0.000 claims description 19
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000011084 recovery Methods 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 abstract description 9
- 238000012545 processing Methods 0.000 description 13
- 230000008859 change Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 11
- 230000004048 modification Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 230000015572 biosynthetic process Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000007599 discharging Methods 0.000 description 3
- 230000008676 import Effects 0.000 description 3
- 238000000429 assembly Methods 0.000 description 2
- 230000000712 assembly Effects 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 241001269238 Data Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000005401 electroluminescence Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The present invention relates to Business Process Optimizing technical fields, disclose the management method and device, electronic equipment in a kind of common test library.The described method includes: when detecting target hive database by use, obtaining the identity of the system using target hive database;Wherein, target hive database is any of multiple hive databases in common test library;According to identity, judge whether the identity said system is that the master of target hive database is responsible for system;If it is not, executing scan script, it whether there is db_sid critical field and/or region_sid critical field in the system table to detect target hive database;If it exists, the permission for adjusting above-mentioned identity said system is to check permission, so that the identity said system can not modify the data of target hive database.It can be avoided the loss of data of common test library or data be capped, guarantee business progress.
Description
Technical field
The present invention relates to Business Process Optimizing technical field, in particular to a kind of the management method and dress in common test library
It sets, electronic equipment.
Background technique
(Business Data Platform, BDP) is a Cloud Server for common test library, i.e. business data platform,
Data, chart required for routine office work can be uploaded, then by the integration and analysis of profession, finally output is visual
The data or chart of change.By BDP, the relevant person in charge of enterprise can be allowed to understand and grasp the operation data of enterprise in time, from
And more rationally, more efficiently carry out the optimization and configuration of resource.
Currently, BDP generally comprises multiple hive databases, it is usually used in deposit operation data storage (Operational
Data Store, ODS) layer basic data, these basic datas are mainly derived from each system.However, it has been found in practice that
When multiple systems use the same hive database, often there is situations such as loss of data or capped data, seriously affect
Business progress.Such as when A system and B system use the same hive database, probably due to the knot that B system is submitted
Fruit destroys that A system is submitted as a result, leading to the system table loss of data or capped of A system.
Therefore, how BDP is effectively managed, avoids the loss of data of common test library or data capped, is to need at present
One of hot issue of solution.
Summary of the invention
In order to solve the problems, such as that the loss of data of common test library or data are capped, the present invention provides a kind of common tests
The management method and device in library, electronic equipment.
First aspect of the embodiment of the present invention discloses a kind of management method in common test library, and the common test library includes
Multiple hive databases, which comprises
When detect target hive database by use, obtain using the target hive database system identity
Mark;Wherein, the target hive database is any of the multiple hive database;
According to the identity, judge the identity said system whether be the target hive database master
It is responsible for system;
If the master that the identity said system is not the target hive database is responsible for system, scanning foot is executed
This, closes in the system table to detect the target hive database with the presence or absence of db_sid critical field and/or region_sid
Key field;
If there are db_sid critical field and/or region_sid keywords in the system table of the target hive database
Section, the permission for adjusting the identity said system is to check permission, so that the identity said system can not be modified
The data of the target hive database.
It is described according to the identity as an alternative embodiment, in first aspect of the embodiment of the present invention,
Judge whether the identity said system is that the master of the target hive database is responsible for system, comprising:
Obtain the traffic table of the target hive database;The traffic table is used to indicate target hive described in current time
The master of database is responsible for system;
According to the identity, judge in the identity said system and the traffic table indicated by current time
Master be responsible for whether system matches;
If master indicated by current time is responsible for system matches in the identity said system and the traffic table, really
The fixed identity said system is that the master of the target hive database is responsible for system;
If master indicated by current time is responsible for system mismatch in the identity said system and the traffic table,
Determine that the identity said system is not that the master of the target hive database is responsible for system.
As an alternative embodiment, in first aspect of the embodiment of the present invention, if in the identity
Master indicated by current time is responsible for system mismatch in said system and the traffic table, determines system belonging to the identity
System is not responsible for after system for the master of the target hive database and the execution scan script, to detect the target
Before whether there is db_sid critical field and/or region_sid critical field in the system table of hive database, the side
Method further include:
Create script file;
Sweep parameter is imported in the script file to generate the scan script;Wherein, sweep parameter includes at least
The path of the title of the target hive database, the type of the target hive database and the target hive database.
As an alternative embodiment, in first aspect of the embodiment of the present invention, if in the target hive
There are db_sid critical field and/or region_sid critical fielies in the system table of database, adjust the identity institute
The permission of category system is to check permission, so that the identity said system can not modify the number of the target hive database
According to later, the method also includes:
Obtain the journal file of the target hive database;
According to the journal file, the target update record of the system table of the target hive database is determined;The mesh
Mark, which updates, to be recorded as after the identity said system is using the target hive database, the target hive database
System table more new record;
It is recorded according to the target update, the system table of the target hive database is restored to conjunction rule state;It is described
Closing rule state is that the shape before db_sid critical field and/or region_sid critical field is generated in target update record
State.
As an alternative embodiment, in first aspect of the embodiment of the present invention, it is described according to the target more
New record restores the system table of the target hive database to after closing rule state, the method also includes:
Transmission goes beyond one's commission information to the identity said system, to warn the use for operating the identity said system
Family, which is gone beyond one's commission, uses the target hive database.
As an alternative embodiment, in first aspect of the embodiment of the present invention, if in the identity
Master indicated by current time is responsible for system matches in said system and the traffic table, determines the identity said system
For the target hive database master be responsible for system after, the method also includes:
Using exclusive lock, the master is responsible for system and the target hive database is bound, so as to be responsible for except main
Other systems outside system can not modify the data of the target hive database.
As an alternative embodiment, exclusive lock is utilized described, by institute in first aspect of the embodiment of the present invention
It states main responsible system and the target hive database is bound, so that the other systems in addition to main responsible system can not be modified
After the data of the target hive database, the method also includes:
It detects whether to receive END instruction;The END instruction is used to indicate the master and is responsible for described in system finishing use
Target hive database;
If receiving the END instruction, the exclusive lock is discharged, so that the target hive database recovery is to the free time
State.
Second aspect of the embodiment of the present invention discloses a kind of managing device in common test library, and the common test library includes
Multiple hive databases, described device include:
First acquisition unit detects that target hive database is used the target hive in use, obtaining for working as
The identity of the system of database;Wherein, the target hive database is any of the multiple hive database;
Judging unit, for judging whether the identity said system is the target according to the identity
The master of hive database is responsible for system;
First detection unit, for judging that the identity said system is not the target when the judging unit
When the master of hive database is responsible for system, execute scan script, in the system table to detect the target hive database whether
There are db_sid critical field and/or region_sid critical fielies;
Adjustment unit, for existing when in the system table that the first detection unit detects the target hive database
When db_sid critical field and/or region_sid critical field, the permission for adjusting the identity said system is to check
Permission, so that the identity said system can not modify the data of the target hive database.
The third aspect of the embodiment of the present invention discloses a kind of electronic equipment, and the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is by the processing
When device executes, a kind of management method in common test library disclosed in first aspect of the embodiment of the present invention is realized.
Fourth aspect of the embodiment of the present invention discloses a kind of computer readable storage medium, stores computer program, institute
Stating computer program makes computer execute a kind of management method in common test library disclosed in first aspect of the embodiment of the present invention.
The technical solution that the embodiment of the present invention provides can include the following benefits:
A kind of management method in common test library provided by the present invention, which includes the following steps: to work as, detects target hive number
According to library by use, obtaining the identity of the system using target hive database;Wherein, target hive database is
Any of multiple hive databases in common test library;According to identity, whether the identity said system is judged
Master for target hive database is responsible for system;If it is not, scan script is executed, to detect the system table of target hive database
In whether there is db_sid critical field and/or region_sid critical field;If it exists, system belonging to above-mentioned identity is adjusted
The permission of system is to check permission, so that the identity said system can not modify the data of target hive database.
Under the method, if judging that the identity said system is not the master of target hive database according to identity
It is responsible for system, the managing device in common test library further detects in the system table of target hive database with the presence or absence of db_sid
Critical field and/or region_sid critical field, and if it exists, show that the identity said system may will affect other and be
System normal use target hive database, the permission that the managing device in common test library adjusts above-mentioned identity said system are
It checks permission, so that the identity said system can not modify the data of target hive database, can be avoided common test
Library loss of data or data are capped, guarantee business progress.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited
Invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and in specification together principle for explaining the present invention.
Fig. 1 is a kind of structural schematic diagram of device disclosed by the embodiments of the present invention;
Fig. 2 is a kind of flow chart of the management method in common test library disclosed by the embodiments of the present invention;
Fig. 3 is the flow chart of the management method in another common test library disclosed by the embodiments of the present invention;
Fig. 4 is the flow chart of the management method in another common test library disclosed by the embodiments of the present invention;
Fig. 5 is a kind of structural schematic diagram of the managing device in common test library disclosed by the embodiments of the present invention;
Fig. 6 is the structural schematic diagram of the managing device in another common test library disclosed by the embodiments of the present invention;
Fig. 7 is the structural schematic diagram of the managing device in another common test library disclosed by the embodiments of the present invention.
Specific embodiment
Here will the description is performed on the exemplary embodiment in detail, the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Embodiment one
Implementation environment of the invention can be electronic equipment, such as smart phone, tablet computer, desktop computer.Electronics is set
Standby middle stored image may is that the image from the Internet download;Pass through wireless connection or the received image of wired connection;It is logical
Cross the image that itself institute's built-in camera is shot.
Fig. 1 is a kind of structural schematic diagram of device disclosed by the embodiments of the present invention.Device 100 can be above-mentioned electronics and set
It is standby.As shown in Figure 1, device 100 may include following one or more components: processing component 102, memory 104, power supply module
106, multimedia component 108, audio component 110, sensor module 114 and communication component 116.
The integrated operation of the usual control device 100 of processing component 102, such as with display, telephone call, data communication, phase
Machine operation and the associated operation of record operation etc..Processing component 102 may include one or more processors 118 to execute
Instruction, to complete all or part of the steps of following methods.In addition, processing component 102 may include one or more modules,
For convenient for the interaction between processing component 102 and other assemblies.For example, processing component 102 may include multi-media module, use
In to facilitate the interaction between multimedia component 108 and processing component 102.
Memory 104 is configured as storing various types of data to support the operation in device 100.These data are shown
Example includes the instruction of any application or method for operating on the device 100.Memory 104 can be by any kind of
Volatibility or non-volatile memory device or their combination are realized, such as static random access memory (Static Random
Access Memory, abbreviation SRAM), electrically erasable programmable read-only memory (Electrically Erasable
Programmable Read-Only Memory, abbreviation EEPROM), Erasable Programmable Read Only Memory EPROM (Erasable
Programmable Read Only Memory, abbreviation EPROM), programmable read only memory (Programmable Red-
Only Memory, abbreviation PROM), read-only memory (Read-Only Memory, abbreviation ROM), magnetic memory, flash
Device, disk or CD.It is also stored with one or more modules in memory 104, is configured to for the one or more module
It is executed by the one or more processors 118, to complete all or part of step in method as follows.
Power supply module 106 provides electric power for the various assemblies of device 100.Power supply module 106 may include power management system
System, one or more power supplys and other with for device 100 generate, manage, and distribute the associated component of electric power.
Multimedia component 108 includes the screen of one output interface of offer between device 100 and user.In some realities
It applies in example, screen may include liquid crystal display (Liquid Crystal Display, abbreviation LCD) and touch panel.If
Screen includes touch panel, and screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes
One or more touch sensors are to sense the gesture on touch, slide, and touch panel.Touch sensor can be sensed not only
The boundary of a touch or slide action, but also detect duration and pressure relevant to touch or slide.Screen may be used also
To include display of organic electroluminescence (Organic Light Emitting Display, abbreviation OLED).
Audio component 110 is configured as output and/or input audio signal.For example, audio component 110 includes a Mike
Wind (Microphone, abbreviation MIC), when device 100 is in operation mode, such as call model, logging mode and speech recognition mould
When formula, microphone is configured as receiving external audio signal.The received audio signal can be further stored in memory
104 or via communication component 116 send.In some embodiments, audio component 110 further includes a loudspeaker, for exporting
Audio signal.
Sensor module 114 includes one or more sensors, and the state for providing various aspects for device 100 is commented
Estimate.For example, sensor module 114 can detecte the state that opens/closes of device 100, the relative positioning of component, sensor group
Part 114 can be with the position change of 100 1 components of detection device 100 or device and the temperature change of device 100.Some
In embodiment, which can also include Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 116 is configured to facilitate the communication of wired or wireless way between device 100 and other equipment.Device
100 can access the wireless network based on communication standard, such as WiFi (Wireless-Fidelity, Wireless Fidelity).In the present invention
In embodiment, communication component 116 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In embodiments of the present invention, communication component 116 further includes near-field communication (Near Field Communication, abbreviation
NFC) module, for promote short range communication.For example, radio frequency identification (Radio Frequency can be based in NFC module
Identification, abbreviation RFID) technology, ultra wide band (Ultra Wideband, abbreviation UWB) technology, Bluetooth technology and its
His technology is realized.
In the exemplary embodiment, device 100 can be by one or more application specific integrated circuit (Application
Specific Integrated Circuit, abbreviation ASIC), it is digital signal processor, digital signal processing appts, programmable
Logical device, field programmable gate array, controller, microcontroller, microprocessor or other electronic components are realized, for executing
Following methods.
Embodiment two
Referring to Fig. 2, Fig. 2 is a kind of process signal of the management method in common test library disclosed by the embodiments of the present invention
Figure.As shown in Fig. 2, this method may comprise steps of:
201, when detect target hive database by use, obtain using target hive database system body
Part mark.
In the embodiment of the present invention, common test library includes multiple hive databases, wherein target hive database is public
Any of multiple hive databases of test library, the embodiment of the present invention is not construed as limiting.In embodiments of the present invention, above-mentioned body
Part mark can be system identifier, and the embodiment of the present invention is not construed as limiting.
It is understood that each system has unique identity, system passes through the access interface of hive database
When accessing to hive database, the access interface of hive database will record the identity of the system, therefore, work as detection
To target hive database by use, the managing device in common test library can be obtained by access interface and use the target
The identity of the system of hive database, such as the ID of the system.
202, according to identity, judge whether the identity said system is that the master of target hive database is responsible for system
System;If not, executing step 203;Conversely, terminating this process.
In the embodiment of the present invention, the managing device in common test library can be according to the identity got, to the identity
It is identified, and judges whether the identity said system is that the master of target hive database is responsible for system with this, such as
Fruit is not that the managing device in common test library executes step 203, executes scan script, is with detect target hive database
It whether there is db_sid critical field and/or region_sid critical field in system table.
203, scan script is executed, whether there is db_sid critical field in the system table to detect target hive database
And/or region_sid critical field;If so, executing step 204;Conversely, terminating this process.
In the embodiment of the present invention, it is to be understood that when multiple systems use the same hive database, hive data
The system table in library can generate the critical fielies such as db_sid critical field and region_sid critical field.For example, when A system
With B system use target hive database when, may because of B system submit result destroy A system submission as a result, from
And the data of the system table of target hive database are tampered, the capitalization of such as letter is changed to small letter, will lead to this when
The loss of data of the system table of target hive database, generate irregularity has db_sid critical field and/or region_
The system table of sid critical field.In embodiments of the present invention, the managing device in common test library can execute scan script, inspection
It surveys and whether there is db_sid critical field and/or region_sid critical field in the system table of target hive database, if depositing
Showing that above-mentioned identity said system influences the master of target hive database and is responsible for the normal use of the system target
The managing device of hive database, common test library executes step 204, and the permission of the identity said system is adjusted to look into
Permission is seen, so that the identity said system can not modify the data of target hive database.
204, the permission for adjusting identity said system is to check permission, so that the identity said system can not be repaired
Change the data of target hive database.
In the embodiment of the present invention, when in the system table for detecting target hive database there are db_sid critical field and/
Or when region_sid critical field, the managing device in common test library can be by the permission tune of above-mentioned identity said system
Whole is to check permission, so that the identity said system can only read the data of target hive database, and can not modify mesh
The data for marking hive database can prevent the data of identity said system modification target hive database and influence
Main responsible system normal use target hive database.
In the embodiment of the present invention, although sometimes some system is not that the master of target hive database is responsible for system,
The system, which may be because, has emergency management processing to need temporarily using target hive database, at this point, as a kind of optional reality
Apply mode, execute step 204 adjust above-mentioned identity said system permission be check permission before, can also be performed with
Lower step: the managing device in common test library can detecte the identity said system and pass through access interface access target hive
Whether interim call instruction is carried when database, if carrying interim call instruction, the managing device in common test library gives the identity
Said system is identified plus interim lock, so that the identity said system temporarily can read and modify target hive database
System table in data;If not carrying interim call instruction, the managing device in common test library executes step 204, adjusts body
The permission of part mark said system is to check permission, so that the identity said system can not modify target hive database
Data.
In the embodiment of the present invention, interim lock is the system for guaranteeing some system and temporarily can reading and modify hive database
The lock of data in table.Such as if to system Q plus interim lock, then, even if system Q is not target hive database
Main responsible system, system Q can also the data in the system table to target hive database be read out and modify.
Implement the embodiment, if emergency management processing needs temporarily to use target above-mentioned identity said system again
When hive database, the managing device in common test library, plus interim lock, can guarantee business to the identity said system
Be normally carried out.
As it can be seen that implementing method described in Fig. 2, the managing device in common test library judges the identity mark according to identity
Know whether said system is that the master of target hive database is responsible for system, if it is not, the managing device in common test library is further
It detects and whether there is db_sid critical field and/or region_sid critical field in the system table of target hive database, if
In the presence of showing that the identity said system may will affect other systems normal use target hive database, common test
The managing device in library adjust above-mentioned identity said system permission be check permission so that the identity said system without
Method modifies the data of target hive database, and it is capped to can be avoided the loss of data of common test library or data, guarantee business into
Degree.
Embodiment three
Referring to Fig. 3, Fig. 3 is the process signal of the management method in another common test library disclosed by the embodiments of the present invention
Figure.As shown in figure 3, this method may comprise steps of:
301, when detect target hive database by use, obtain using target hive database system body
Part mark.
In the embodiment of the present invention, common test library includes multiple hive databases, wherein target hive database is public
Any of multiple hive databases of test library, the embodiment of the present invention is not construed as limiting.In embodiments of the present invention, above-mentioned body
Part mark can be system identifier, and the embodiment of the present invention is not construed as limiting.
302, the traffic table of target hive database is obtained.
In the embodiment of the present invention, the master that traffic table is used to indicate current target hive database is responsible for system.
303, according to identity, judge that master indicated by current time is negative in the identity said system and traffic table
Whether duty system matches;If not, executing step 304- step 307;If not, executing step 309.
In the embodiment of the present invention, the master that traffic table has recorded current target hive database is responsible for system, wherein uses
In distinguishing that the master is responsible for the mark of system and can be responsible for the identity of system, such as system identifier based on.The management in common test library
Device can first obtain the traffic table of target hive database, then will use the identity of the system of target hive data
The identity for being responsible for system with the master of current target hive database in traffic table is compared, if using the target
The master of current target hive database is responsible for the identity mark of system in the identity and traffic table of the system of hive data
Sensible matching shows that the identity said system is that the master of target hive database is responsible for system;If using target hive
The master of current target hive database is responsible for the identity of system not in the identity and traffic table of the system of data
Matching, shows that the identity said system is not that the master of target hive database is responsible for system.
In the embodiment of the present invention, implementation steps 302- step 303, using the traffic table of target hive database, according to body
Part identifies to judge that the identity said system is responsible for whether system matches with master indicated by current time in traffic table, if
Matching, executes step 304, and the managing device in common test library determines that the identity said system is target hive database
Main responsible system;If mismatching, step 309 is executed, the managing device in common test library determines the identity said system not
Master for target hive database is responsible for system;The master for capableing of accurate judgement target hive database is responsible for system.
304, identity said system is determined not and is that the master of target hive database is responsible for system.
305, script file is created.
In the embodiment of the present invention, script file, that is, script program, the programming language typically provided by application program,
Different command in combination can be got up, and automatically and continuously be executed by determining sequence.In embodiments of the present invention, using journey
Sequence may include that browser (javaScript, VBScript) and authoring tool, the embodiment of the present invention are not construed as limiting.
306, sweep parameter is imported in script file to generate scan script.
In the embodiment of the present invention, sweep parameter includes at least the title of target hive database, target hive database
The path of type and target hive database, the embodiment of the present invention are not construed as limiting.
In the embodiment of the present invention, sweep parameter by creation script file and is imported foot by implementation steps 305- step 306
Scan script is generated in this document, can be improved the formation efficiency of scan script.
In the embodiment of the present invention, because common test library includes multiple hive databases, the managing device in common test library
The more than one hive database often managed, therefore, further, if as an alternative embodiment, subsequent need
When scanning other hive databases in common test library, the managing device in common test library can change sweep parameter and will more
The sweep parameter changed imports script file, that is, produces new scan script.
Implement the embodiment, when the managing device in common test library needs to scan other hive data in common test library
When library, it need to only change sweep parameter and not have to rewrite scan script, can be improved the formation efficiency of scan script.
307, scan script is executed, whether there is db_sid critical field in the system table to detect target hive database
And/or region_sid critical field;If so, executing step 308;Conversely, terminating this process.
308, the permission for adjusting identity said system is to check permission, so that the identity said system can not be repaired
Change the data of target hive database.
309, determine that identity said system is that the master of target hive database is responsible for system.
In the embodiment of the present invention, if the managing device in step 303 common test library judges system belonging to above-mentioned identity
System is responsible for system with master indicated by current time in traffic table and matches, and thens follow the steps 309, the management dress in common test library
It sets and determines that the identity said system is that the master of target hive database is responsible for system.
As it can be seen that method described in implementing Fig. 3 utilizes target hive database compared with implementing method described in Fig. 2
Traffic table, judge that master indicated by current time is responsible in the identity said system and traffic table according to identity
Whether system matches, if matching, which is that the master of target hive database is responsible for system, can be accurate
Judge that the master of target hive database is responsible for system.In addition, by creation script file and sweep parameter is imported script file
Middle generation scan script, can be improved the formation efficiency of scan script.
Example IV
Referring to Fig. 4, Fig. 4 is the process signal of the management method in another common test library disclosed by the embodiments of the present invention
Figure.As shown in figure 4, this method may comprise steps of:
401, when detect target hive database by use, obtain using target hive database system body
Part mark.
In the embodiment of the present invention, common test library includes multiple hive databases, wherein target hive database is public
Any of multiple hive databases of test library, the embodiment of the present invention is not construed as limiting.In embodiments of the present invention, above-mentioned body
Part mark can be system identifier, and the embodiment of the present invention is not construed as limiting.
402, the traffic table of target hive database is obtained.
In the embodiment of the present invention, the master that traffic table is used to indicate current target hive database is responsible for system.
403, according to identity, judge that master indicated by current time is negative in the identity said system and traffic table
Whether duty system matches;If not, executing step 404- step 412;If not, executing step 413- step 416.
404, identity said system is determined not and is that the master of target hive database is responsible for system.
405, script file is created.
406, sweep parameter is imported in script file to generate scan script.
In the embodiment of the present invention, sweep parameter includes at least the title of target hive database, target hive database
The path of type and target hive database, the embodiment of the present invention are not construed as limiting.
407, scan script is executed, whether there is db_sid critical field in the system table to detect target hive database
And/or region_sid critical field;If so, executing step 408;Conversely, terminating this process.
408, the permission for adjusting identity said system is to check permission, so that the identity said system can not be repaired
Change the data of target hive database.
409, the journal file of target hive database is obtained.
In the embodiment of the present invention, journal file is the record file or file set for recording system operatio event, can
To be used to handle historical data and diagnose the tracking of problem.
In the embodiment of the present invention, data update each time in the system table of target hive database, target hive database
Journal file can all have record, therefore, the managing device in common test library can determine target hive according to journal file
The target update of the system table of database records, wherein target update is recorded as using mesh in above-mentioned identity said system
After marking hive database, then the more new record of the system table of target hive database is recorded according to the target update, by target
The system table of hive database is restored to the state before generation db_sid critical field and/or region_sid critical field.
410, according to journal file, the target update record of the system table of target hive database is determined.
In the embodiment of the present invention, target update is recorded as using target hive database in above-mentioned identity said system
Afterwards, the more new record of the system table of target hive database.
411, it is recorded according to target update, the system table of target hive database is restored to conjunction rule state.
In the embodiment of the present invention, closing rule state is to generate db_sid critical field and/or region_ in target update record
State before sid critical field.
In the embodiment of the present invention, implementation steps 409- step 411 is first determined according to the journal file of target hive database
The system table of target hive database is restored to rule state is closed further according to target update record, can be incited somebody to action by target update record
The system table of target hive database restores normal so that the master of target hive database be responsible for system being capable of normal use.
412, it sends information of going beyond one's commission and gives identity said system, to warn the user for operating the identity said system
It goes beyond one's commission and uses target hive database.
In the embodiment of the present invention, implementation steps 412 give identity said system, Neng Gouji by sending information of going beyond one's commission
When warning operate the identity said system user so that the user pause use target hive database.
As an alternative embodiment, after step 412 transmission goes beyond one's commission information to identity said system, also
Following steps can be executed:
The identity said system is marked and is recorded;
Detect whether the number that the identity said system is recorded is more than preset times;
If being more than, the terminal that alarm signal is used to related management personnel is sent, so that related management personnel are handled emphatically.
In the embodiment of the present invention, the number that preset times can set for developer by abundant experimental results, this
Inventive embodiments are not construed as limiting.In embodiments of the present invention, if detecting, the number that the identity said system is recorded is super
Preset times are crossed, show that the identity said system is repeatedly gone beyond one's commission use, in order to guarantee the data peace in common test library
Entirely, the managing device in common test library can send the terminal that alarm signal is used to related management personnel, so that related management
Personnel are handled emphatically.
Implement the embodiment, whether be more than preset times by detecting the number that identity said system is recorded,
If being more than, show that the identity said system is repeatedly gone beyond one's commission use, the managing device in common test library can send police
The terminal that the number of notifying is used to related management personnel can prevent common test library so that related management personnel are handled emphatically
Leaking data guarantees the data safety in common test library.
413, determine that identity said system is that the master of target hive database is responsible for system.
414, using exclusive lock, main responsible system and target hive database are bound, so that except main responsible system
Outer other systems can not modify the data of target hive database.
In the embodiment of the present invention, exclusive lock is to prevent the other systems in addition to main responsible system from modifying target hive database
System table in data lock.
For example, if system T has added exclusive lock to hive database M, i.e., system T and hive database M is tied up
It is fixed, then, hive database M only allow system T read and the system table of modification hive database M in data, at this time if
System R also uses hive database M, then, hive database M can only read the data in the system table of hive database M,
And the data in the system table of hive database M can not be modified.
415, it detects whether to receive END instruction;If so, executing step 416;Conversely, continuing to execute step 415.
In the embodiment of the present invention, END instruction is used to indicate main responsible system finishing and uses target hive database.
416, exclusive lock is discharged, so that target hive database recovery is to idle state.
In the embodiment of the present invention, if receiving END instruction, the managing device in common test library discharges exclusive lock, so that mesh
Hive database recovery is marked to idle state, guarantees the normal use of next stage;If not receiving END instruction, common test
The managing device in library continues to execute step 415, until receiving END instruction.
In the embodiment of the present invention, implementation steps 414- step 416, by being responsible for system and target for main using exclusive lock
Hive database is bound, and the data of the other systems modification target hive database in addition to main responsible system can be prevented,
Guarantee the normal use of main responsible system.When receiving END instruction, by discharging exclusive lock, target hive data can be made
Library is restored to idle state, guarantees the normal use of next stage.
As it can be seen that implementing method described in Fig. 4 compared with the method described in the implementing Fig. 3, being recorded according to target update will
The system table of target hive database is restored to rule state is closed, and the system table of target hive database can be restored normal, with
The master of target hive database is set to be responsible for system normal use.Information is gone beyond one's commission to system belonging to identity in addition, sending
System can warn the user for operating the identity said system in time, so that user pause uses target hive database.
In addition, being bound main responsible system and target hive database using exclusive lock, can prevent in addition to main responsible system
Other systems modify the data of target hive database, guarantee the normal use of main responsible system.In addition, referring to when receiving end
When enabling, exclusive lock is discharged, target hive database recovery can be made to idle state, guarantee the normal use of next stage.
Embodiment five
Referring to Fig. 5, Fig. 5 is a kind of structural representation of the managing device in common test library disclosed by the embodiments of the present invention
Figure.As shown in figure 5, the apparatus may include: first acquisition unit 501, judging unit 502, first detection unit 503 and tune
Whole unit 504, wherein
First acquisition unit 501 detects that target hive database is used target hive in use, obtaining for working as
The identity of the system of database.
In the embodiment of the present invention, common test library includes multiple hive databases, wherein target hive database is public
Any of multiple hive databases of test library, the embodiment of the present invention is not construed as limiting.
It is understood that each system has unique identity, system passes through the access interface of hive database
When accessing to hive database, the access interface of hive database will record the identity of the system, therefore, work as detection
To target hive database by use, first acquisition unit 501 can be obtained by access interface uses target hive number
According to the identity of the system in library, such as the ID of the system.
Judging unit 502, for judging whether the identity said system is target hive data according to identity
The master in library is responsible for system.
First detection unit 503 is target hive number for judging identity said system not when judging unit 502
When being responsible for system according to the master in library, scan script is executed, whether there is db_sid in the system table to detect target hive database
Critical field and/or region_sid critical field.
Adjustment unit 504, for existing when in the system table that first detection unit 503 detects target hive database
When db_sid critical field and/or region_sid critical field, the permission for adjusting above-mentioned identity said system is to check
Permission, so that the identity said system can not modify the data of target hive database.
In the embodiment of the present invention, when there are db_ in the system table that first detection unit 503 detects target hive database
When sid critical field and/or region_sid critical field, adjustment unit 504 can be by above-mentioned identity said system
Permission is adjusted to check permission, so that the identity said system can only read the data of target hive database, and can not
Modify target hive database data, can prevent the identity said system modification target hive database data and
Influence main responsible system normal use target hive database.
In the embodiment of the present invention, although sometimes some system is not that the master of target hive database is responsible for system,
The system, which may be because, has emergency management processing to need temporarily using target hive database, at this point, as a kind of optional reality
Apply mode, adjustment unit 504 adjust above-mentioned identity said system permission be check permission before, can also be performed with
Lower step: first detection unit 503 can detecte the identity said system and pass through access interface access target hive data
Whether interim call instruction is carried when library, if carrying interim call instruction, adjustment unit 504 adds to the identity said system
Upper interim lock, so that the identity said system temporarily can read and modify the number in the system table of target hive database
According to;If not carrying interim call instruction, adjustment unit 504 adjusts the permission of identity said system to check permission, so that
The identity said system can not modify the data of target hive database.
In the embodiment of the present invention, interim lock is the system for guaranteeing some system and temporarily can reading and modify hive database
The lock of data in table.Such as if to system Q plus interim lock, then, even if system Q is not target hive database
Main responsible system, system Q can also the data in the system table to target hive database be read out and modify.
Implement the embodiment, if emergency management processing needs temporarily to use target above-mentioned identity said system again
When hive database, adjustment unit 504 to the identity said system plus interim lock, can guarantee business it is normal into
Row.
As it can be seen that implementing the managing device in common test library described in Fig. 5, which is judged according to identity
Whether category system is that the master of target hive database is responsible for system, if it is not, the further system of detection target hive database
It whether there is db_sid critical field and/or region_sid critical field in table, and if it exists, show system belonging to the identity
System may will affect other systems normal use target hive database, and the permission for adjusting above-mentioned identity said system is to look into
It sees permission, so that the identity said system can not modify the data of target hive database, can be avoided common test library
Loss of data or data are capped, guarantee business progress.
Embodiment six
Referring to Fig. 6, Fig. 6 is the structural representation of the managing device in another common test library disclosed by the embodiments of the present invention
Figure.The managing device in common test library shown in fig. 6 is that the managing device in common test library as shown in Figure 5 optimizes to obtain
's.Compared with the managing device in common test library shown in fig. 5, the managing device in common test library shown in fig. 6 can be with
It include: creating unit 505 and generation unit 506, wherein
Judging unit 502 includes:
Subelement 5021 is obtained, for obtaining the traffic table of target hive database;Wherein, traffic table is used to indicate currently
Moment target hive, the master of database was responsible for system;
Judgment sub-unit 5022, it is current in the identity said system and traffic table for judging according to identity
Master indicated by moment is responsible for whether system matches;
First determines subelement 5023, for judging above-mentioned identity said system and industry when judgment sub-unit 5022
When master indicated by current time is responsible for system mismatch in business table, determine that the identity said system is not target hive number
It is responsible for system according to the master in library;
Second determines subelement 5024, for judging above-mentioned identity said system and industry when judgment sub-unit 5022
When master indicated by current time is responsible for system and matches in business table, determine that the identity said system is target hive data
The master in library is responsible for system.
Creating unit 505, for judging in above-mentioned identity said system and traffic table in judgment sub-unit 5022
Master indicated by current time is responsible for system mismatch, and first determines that subelement 5023 determines that the identity said system is not
The master of target hive database is responsible for after system and first detection unit 503 executes scan script, to detect target hive
Before whether there is db_sid critical field and/or region_sid critical field in the system table of database, creation script text
Part.
Generation unit 506, for importing in script file sweep parameter to generate scan script.
In the embodiment of the present invention, sweep parameter includes at least the title of target hive database, target hive database
The path of type and target hive database, the embodiment of the present invention are not construed as limiting.
In the embodiment of the present invention, because common test library includes multiple hive databases, the managing device in common test library
The more than one hive database often managed, therefore, further, if as an alternative embodiment, subsequent need
When scanning other hive databases in common test library, generation unit 506 can change sweep parameter and sweep what is changed
It retouches parameter and imports script file, that is, produce new scan script.
Implement the embodiment, when needing to scan other hive databases in common test library, need to only change scanning ginseng
It counts and does not have to rewrite scan script, can be improved the formation efficiency of scan script.
As it can be seen that implementing public survey described in Fig. 6 compared with the managing device for implementing common test library described in Fig. 5
The managing device in examination library judges system belonging to the identity according to identity using the traffic table of target hive database
System is responsible for whether system matches with master indicated by current time in traffic table, if matching, the identity said system are
The master of target hive database is responsible for system, and the master for capableing of accurate judgement target hive database is responsible for system.In addition, passing through wound
It builds script file and imports sweep parameter in script file and generate scan script, can be improved the formation efficiency of scan script.
Embodiment seven
Referring to Fig. 7, Fig. 7 is the structural representation of the managing device in another common test library disclosed by the embodiments of the present invention
Figure.The managing device in common test library shown in Fig. 7 is that the managing device in common test library as shown in Figure 6 optimizes to obtain
's.Compared with the managing device in common test library shown in fig. 6, the managing device in common test library shown in Fig. 7 can be with
Include: second acquisition unit 507, determination unit 508, reply unit 509, transmission unit 510, the detection of binding unit 511, second
Unit 512 and releasing unit 513, wherein
Second acquisition unit 507, for being deposited in the system table that first detection unit 503 detects target hive database
In db_sid critical field and/or region_sid critical field, adjustment unit 504 adjusts above-mentioned identity said system
Permission is to check permission, so as to obtain mesh after the identity said system can not modify the data of target hive database
Mark the journal file of hive database.
Determination unit 508, for determining the target update note of the system table of target hive database according to journal file
Record.
In the embodiment of the present invention, target update is recorded as using target hive database in above-mentioned identity said system
Afterwards, the more new record of the system table of target hive database.
Recovery unit 509 restores the system table of target hive database to advise shape to conjunction for being recorded according to target update
State.
In the embodiment of the present invention, closing rule state is to generate db_sid critical field and/or region_ in target update record
State before sid critical field.
In the embodiment of the present invention, data update each time in the system table of target hive database, target hive database
Journal file can all have record, accordingly, it is determined that unit 508 target hive database can be determined according to journal file be
The target update record of system table, wherein target update is recorded as using target hive data in above-mentioned identity said system
Behind library, the more new record of the system table of target hive database, then recovery unit 509 is recorded according to the target update, by mesh
The system table of mark hive database is restored to the state before generation db_sid critical field and/or region_sid critical field.
Transmission unit 510, for being recorded in recovery unit 509 according to target update, by the system of target hive database
Table restores to after closing rule state, and transmission goes beyond one's commission information to above-mentioned identity said system, operates the identity with warning
The user of said system goes beyond one's commission using target hive database.
As an alternative embodiment, transmission unit 510 transmission go beyond one's commission information to identity said system it
Afterwards, following steps can also be performed:
The identity said system is marked and is recorded;
Detect whether the number that the identity said system is recorded is more than preset times;
If being more than, the terminal that alarm signal is used to related management personnel is sent, so that related management personnel are handled emphatically.
In the embodiment of the present invention, the number that preset times can set for developer by abundant experimental results, this
Inventive embodiments are not construed as limiting.In embodiments of the present invention, if detecting, the number that the identity said system is recorded is super
Preset times are crossed, show that the identity said system is repeatedly gone beyond one's commission use, in order to guarantee the data peace in common test library
Entirely, transmission unit 510 can send the terminal that alarm signal is used to related management personnel, so that related management personnel locate emphatically
Reason.
Implement the embodiment, whether be more than preset times by detecting the number that identity said system is recorded,
If being more than, show that the identity said system is repeatedly gone beyond one's commission use, transmission unit 510 can send alarm signal to phase
The leaking data in common test library can be prevented so that related management personnel are handled emphatically by closing the terminal that administrative staff use, and be protected
Demonstrate,prove the data safety in common test library.
Binding unit 511, for judging in above-mentioned identity said system and traffic table in judgment sub-unit 5022
Master indicated by current time is responsible for system and matches, and second determines that subelement 5024 determines that the identity said system is mesh
The master of mark hive database is responsible for after system, and using exclusive lock, main responsible system and target hive database are bound,
So that the other systems in addition to main responsible system can not modify the data of target hive database.
In the embodiment of the present invention, exclusive lock is to prevent the other systems in addition to main responsible system from modifying target hive database
System table in data lock.
Second detection unit 512, for utilizing exclusive lock in binding unit 511, by main responsible system and target hive number
It is bound according to library, so that after the other systems in addition to main responsible system can not modify the data of target hive database, inspection
It surveys and whether receives END instruction.
In the embodiment of the present invention, END instruction is used to indicate main responsible system finishing and uses target hive database.
Releasing unit 513, for discharging exclusive lock when the detection of second detection unit 512 receives END instruction, so that
Target hive database recovery is to idle state.
As it can be seen that implementing public survey described in Fig. 7 compared with the managing device for implementing common test library described in Fig. 6
The system table of target hive database is restored to rule state is closed according to target update record, can be incited somebody to action by the managing device for trying library
The system table of target hive database restores normal so that the master of target hive database be responsible for system being capable of normal use.
In addition, sending information of going beyond one's commission gives identity said system, the user for operating the identity said system can be warned in time,
So that user pause uses target hive database.In addition, being responsible for system and target hive database for main using exclusive lock
It is bound, the data of the other systems modification target hive database in addition to main responsible system can be prevented, guarantee main be responsible for
The normal use of system.In addition, discharging exclusive lock when receiving END instruction, target hive database recovery can be made extremely
Idle state guarantees the normal use of next stage.
The present invention also provides a kind of electronic equipment, which includes:
Processor;
Memory is stored with computer-readable instruction on the memory, when which is executed by processor,
Realize a kind of management method in common test library as previously shown.
The electronic equipment can be Fig. 1 shown device 100.
In one exemplary embodiment, the present invention also provides a kind of computer readable storage mediums, are stored thereon with calculating
Machine program when the computer program is executed by processor, realizes a kind of management method in common test library as previously shown.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and change can executed without departing from the scope.The scope of the present invention is limited only by the attached claims.
Claims (10)
1. a kind of management method in common test library, the common test library includes multiple hive databases, which is characterized in that institute
The method of stating includes:
When detect target hive database by use, obtain using the target hive database system identity mark
Know;Wherein, the target hive database is any of the multiple hive database;
According to the identity, judge whether the identity said system is that the master of the target hive database is responsible for
System;
If the master that the identity said system is not the target hive database is responsible for system, scan script is executed, with
It detects in the system table of the target hive database with the presence or absence of db_sid critical field and/or region_sid keyword
Section;
If there are db_sid critical field and/or region_sid critical field in the system table of the target hive database,
The permission for adjusting the identity said system be check permission so that the identity said system can not modify it is described
The data of target hive database.
2. judging the identity mark the method according to claim 1, wherein described according to the identity
Know whether said system is that the master of the target hive database is responsible for system, comprising:
Obtain the traffic table of the target hive database;The traffic table is used to indicate target hive data described in current time
The master in library is responsible for system;
According to the identity, master indicated by current time in the identity said system and the traffic table is judged
Whether responsible system matches;
If master indicated by current time is responsible for system matches in the identity said system and the traffic table, institute is determined
It states the master that identity said system is the target hive database and is responsible for system;
If master indicated by current time is responsible for system mismatch in the identity said system and the traffic table, determine
The identity said system is not that the master of the target hive database is responsible for system.
3. if according to the method described in claim 2, it is characterized in that, in the identity said system and the industry
Master indicated by current time is responsible for system mismatch in business table, determines that the identity said system is not the target
The master of hive database is responsible for after system and the execution scan script, is with detect the target hive database
Before whether there is db_sid critical field and/or region_sid critical field in system table, the method also includes:
Create script file;
Sweep parameter is imported in the script file to generate the scan script;Wherein, sweep parameter includes at least described
The path of the title of target hive database, the type of the target hive database and the target hive database.
4. if according to the method described in claim 3, it is characterized in that, in the system table of the target hive database
There are db_sid critical field and/or region_sid critical field, the permission for adjusting the identity said system is to look into
See permission, so that after the identity said system can not modify the data of the target hive database, the method
Further include:
Obtain the journal file of the target hive database;
According to the journal file, the target update record of the system table of the target hive database is determined;The target is more
New record is after the identity said system is using the target hive database, and the target hive database is
The more new record of system table;
It is recorded according to the target update, the system table of the target hive database is restored to conjunction rule state;The conjunction rule
State is that the state before db_sid critical field and/or region_sid critical field is generated in target update record.
5. according to the method described in claim 4, it is characterized in that, being recorded described according to the target update, by the mesh
The system table of mark hive database is restored to after closing rule state, the method also includes:
Transmission goes beyond one's commission information to the identity said system, to warn the user for operating the identity said system to get over
Power uses the target hive database.
6. method according to any one of claims 2 to 5, which is characterized in that if being belonging to the identity
System is responsible for system matches with master indicated by current time in the traffic table, determines that the identity said system is described
The master of target hive database is responsible for after system, the method also includes:
Using exclusive lock, the master is responsible for system and the target hive database is bound, so that except main responsible system
Outer other systems can not modify the data of the target hive database.
7. according to the method described in claim 6, it is characterized in that, it is described utilize exclusive lock, by the master be responsible for system and
The target hive database is bound, so that the other systems in addition to main responsible system can not modify the target hive number
After the data in library, the method also includes:
It detects whether to receive END instruction;The END instruction is used to indicate the master and is responsible for system finishing using the target
Hive database;
If receiving the END instruction, the exclusive lock is discharged, so that the target hive database recovery is to idle state.
8. a kind of managing device in common test library, the common test library includes multiple hive databases, which is characterized in that institute
Stating device includes:
First acquisition unit detects that target hive database is used the target hive data in use, obtaining for working as
The identity of the system in library;Wherein, the target hive database is any of the multiple hive database;
Judging unit, for judging whether the identity said system is the target hive according to the identity
The master of database is responsible for system;
First detection unit, for judging that the identity said system is not the target hive when the judging unit
When the master of database is responsible for system, scan script is executed, whether there is in the system table to detect the target hive database
Db_sid critical field and/or region_sid critical field;
Adjustment unit, for detecting that there are db_ in the system table of the target hive database when the first detection unit
When sid critical field and/or region_sid critical field, the permission for adjusting the identity said system is the power of checking
Limit, so that the identity said system can not modify the data of the target hive database.
9. a kind of electronic equipment, including memory and processor, the memory are stored with computer program, which is characterized in that
The step of processor realizes method according to any one of claims 1 to 7 when executing the computer program.
10. a kind of computer readable storage medium, which is characterized in that it stores computer program, and the computer program makes
Computer perform claim requires a kind of 1~7 described in any item management methods in common test library.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910636943.6A CN110457941A (en) | 2019-07-15 | 2019-07-15 | A kind of management method and device, electronic equipment in common test library |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910636943.6A CN110457941A (en) | 2019-07-15 | 2019-07-15 | A kind of management method and device, electronic equipment in common test library |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110457941A true CN110457941A (en) | 2019-11-15 |
Family
ID=68481264
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910636943.6A Pending CN110457941A (en) | 2019-07-15 | 2019-07-15 | A kind of management method and device, electronic equipment in common test library |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110457941A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150127607A1 (en) * | 2013-01-10 | 2015-05-07 | Unicom Systems, Inc. | Distributed data system with document management and access control |
US20160210692A1 (en) * | 2015-01-18 | 2016-07-21 | Alejandro Evaritso Perez | Data stocks integrated it multi-platform system |
US20160373476A1 (en) * | 2015-06-17 | 2016-12-22 | Accenture Global Services Limited | Data acceleration |
CN107133309A (en) * | 2017-04-28 | 2017-09-05 | 东软集团股份有限公司 | Storage, querying method and the device of flow instance, storage medium and electronic equipment |
CN108038114A (en) * | 2017-10-17 | 2018-05-15 | 广东欧珀移动通信有限公司 | A kind of path query method, terminal, computer-readable recording medium |
CN108733532A (en) * | 2017-04-18 | 2018-11-02 | 北京京东尚科信息技术有限公司 | Health degree management-control method, device, medium and the electronic equipment of big data platform |
CN109241184A (en) * | 2018-08-20 | 2019-01-18 | 中国平安人寿保险股份有限公司 | Method of data synchronization, device, computer equipment and storage medium |
CN109308302A (en) * | 2018-08-15 | 2019-02-05 | 深圳壹账通智能科技有限公司 | Data determination method, device, electronic equipment and computer readable storage medium |
-
2019
- 2019-07-15 CN CN201910636943.6A patent/CN110457941A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150127607A1 (en) * | 2013-01-10 | 2015-05-07 | Unicom Systems, Inc. | Distributed data system with document management and access control |
US20160210692A1 (en) * | 2015-01-18 | 2016-07-21 | Alejandro Evaritso Perez | Data stocks integrated it multi-platform system |
US20160373476A1 (en) * | 2015-06-17 | 2016-12-22 | Accenture Global Services Limited | Data acceleration |
CN108733532A (en) * | 2017-04-18 | 2018-11-02 | 北京京东尚科信息技术有限公司 | Health degree management-control method, device, medium and the electronic equipment of big data platform |
CN107133309A (en) * | 2017-04-28 | 2017-09-05 | 东软集团股份有限公司 | Storage, querying method and the device of flow instance, storage medium and electronic equipment |
CN108038114A (en) * | 2017-10-17 | 2018-05-15 | 广东欧珀移动通信有限公司 | A kind of path query method, terminal, computer-readable recording medium |
CN109308302A (en) * | 2018-08-15 | 2019-02-05 | 深圳壹账通智能科技有限公司 | Data determination method, device, electronic equipment and computer readable storage medium |
CN109241184A (en) * | 2018-08-20 | 2019-01-18 | 中国平安人寿保险股份有限公司 | Method of data synchronization, device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106844217B (en) | Method and device for embedding point of applied control and readable storage medium | |
CN103020541B (en) | Personal space (data) in contrast to company space (data) | |
US20190012188A1 (en) | Dynamically configurable workflow in a mobile environment | |
CN101467144B (en) | Declarative management framework | |
US20140278244A1 (en) | System and method for providing user guidance for electronic device processing | |
CA2673422C (en) | Software for facet classification and information management | |
CN105700819B (en) | Method and system for network data storage | |
CN110460583B (en) | Sensitive information recording method and device and electronic equipment | |
CN103810232B (en) | Content management | |
CN107729031A (en) | Code administration method, apparatus, computer equipment and computer-readable recording medium | |
CN110517384B (en) | Key management box | |
CN110223127A (en) | Bill data backing method and system | |
CN110119354A (en) | Method for testing software, device and electronic equipment based on Test cases technology | |
CN110134593A (en) | Method for testing software, device, electronic equipment and storage medium | |
CN109614092A (en) | Atomic service method of combination and device, electronic equipment based on micro services framework | |
CN109542431A (en) | Control property analysis method, device, electronic equipment and storage medium | |
CN109951512A (en) | User preference determines method, system, electronic equipment and storage medium | |
CN110134591A (en) | A kind of software method for testing pressure and system, electronic equipment | |
CN107770151A (en) | A kind of enterprise's integrated work management system and its method | |
CN115082036A (en) | Data management method and device, electronic equipment and storage medium | |
CN109857921A (en) | A kind of document management method and document file management system updated based on data | |
US20220004369A1 (en) | Rule builder and simulator tool for creating complex event processing rules | |
US20170132517A1 (en) | Dynamically determining relevant cases | |
CN110457941A (en) | A kind of management method and device, electronic equipment in common test library | |
CN110716914A (en) | Database configuration method, system, computer readable storage medium and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |