CN112765248A - SQL-based data extraction method and equipment - Google Patents
SQL-based data extraction method and equipment Download PDFInfo
- Publication number
- CN112765248A CN112765248A CN202110033160.6A CN202110033160A CN112765248A CN 112765248 A CN112765248 A CN 112765248A CN 202110033160 A CN202110033160 A CN 202110033160A CN 112765248 A CN112765248 A CN 112765248A
- Authority
- CN
- China
- Prior art keywords
- data
- sql
- source
- temporary table
- sql query
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000013075 data extraction Methods 0.000 title claims description 12
- 238000000586 desensitisation Methods 0.000 claims abstract description 43
- 238000013507 mapping Methods 0.000 claims abstract description 23
- 230000015654 memory Effects 0.000 claims description 17
- 238000012163 sequencing technique Methods 0.000 claims description 2
- 238000000605 extraction Methods 0.000 abstract description 13
- 230000000694 effects Effects 0.000 abstract description 2
- 238000004590 computer program Methods 0.000 description 4
- 230000005291 magnetic effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 101100534231 Xenopus laevis src-b gene Proteins 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/254—Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/242—Query formulation
- G06F16/2433—Query languages
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Computational Linguistics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The method comprises the steps of reading SQL query statements to obtain source data in a source database, and storing the source data in a temporary table; desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; and storing the desensitized data into a target data table according to a table mapping relation. The data source is limited through the SQL statement, so that the extraction effect is realized, the data source is flexibly limited, the complex combination of multiple tables is realized, and the configuration process is simplified.
Description
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for extracting data based on SQL.
Background
At present, large data is widely applied, and personal information protection is challenged never before. People enjoy the appropriate services brought to their lives by data analysis, and are also seriously troubled by personal information leakage and even disturbance, so that the data desensitization use is very important. The common extraction or desensitization operation is to operate the whole table of the source database, the selection of the data source is not flexible, and if the field to be extracted and the sorting mode of the data are limited or the contents of a plurality of tables are extracted to one table, special configuration needs to be added, so that the operation is complicated.
Disclosure of Invention
An object of the present application is to provide a method and a device for extracting data based on SQL, which solve the problem in the prior art that the selection of a data source is not flexible enough in the data desensitization and extraction processes.
According to an aspect of the present application, there is provided a method for SQL-based data extraction, the method comprising:
reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table;
desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data;
and storing the desensitized data into a target data table according to a table mapping relation.
Further, before reading the SQL query statement, the method includes:
selecting a source database connection, and compiling a corresponding SQL query statement;
and configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relation between the temporary table and the target data table.
Further, writing a corresponding SQL query statement includes:
determining a data table, a field, data content and a sequencing mode to be extracted according to the selected source database connection;
and writing a corresponding SQL query statement according to the data table, the field, the data content and the sorting mode to be extracted.
Further, configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relationship between the temporary table and the target data table includes:
configuring a desensitization algorithm corresponding to the data according to each field contained in the data in the temporary table;
and selecting a user of the target database and a target data table, and establishing a table mapping relation with the temporary table according to the user and the target data table.
Further, reading the SQL query statement to obtain source data in the source database, and storing the source data in a temporary table, including:
reading a plurality of SQL query statements corresponding to each source database, acquiring a query result of each SQL query statement, and storing each query result in a corresponding temporary table.
According to another aspect of the present application, there is also provided an apparatus for SQL-based data extraction, the apparatus including:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
According to yet another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement the method as described above.
Compared with the prior art, the method and the device have the advantages that the source data in the source database are obtained by reading the SQL query statement, and the source data are stored in the temporary table; desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; and storing the desensitized data into a target data table according to a table mapping relation. The data source is limited through the SQL statement, so that the extraction effect is realized, the data source is flexibly limited, the complex combination of multiple tables is realized, and the configuration process is simplified.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a schematic flow chart of a method for SQL based data extraction according to an aspect of the present application;
FIG. 2 is a schematic flow chart illustrating SQL-based data desensitization and extraction according to an embodiment of the present application;
fig. 3 is a schematic structural diagram illustrating an apparatus for SQL-based data extraction according to another aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change RAM (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic cassette tape, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 is a schematic flow chart illustrating a method for SQL-based data extraction according to an aspect of the present application, where the method includes: step S11-step S13, wherein in step S11, the SQL query statement is read to obtain the source data in the source database, and the source data is stored in the temporary table; in step S12, desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; in step S13, the desensitized data is stored in the target data table according to the table mapping relationship. Therefore, the configuration process of the extraction mode can be greatly simplified in an SQL mode, and the method is more flexible.
Specifically, in step S11, the SQL query statement is read to obtain source data in the source database, and the source data is stored in the temporary table; the SQL is a structured query statement, the SQL query statement is read to obtain a query result, the query result is source data obtained by querying a source database, the read result is stored in a temporary table, the data source is flexibly limited, and accordingly desensitization and extraction are performed on the temporary table subsequently.
Specifically, in step S12, desensitize the data in the temporary table according to a desensitization algorithm of the data, to obtain desensitized data; and reading configuration information of a desensitization algorithm of the data, and desensitizing the source data stored in the temporary table by using the desensitization algorithm to obtain desensitized data.
Specifically, in step S13, the desensitized data is stored in the target data table according to the table mapping relationship. The desensitized data is extracted and then mapped from the temporary table to the target data table according to the table mapping relation, so that the extraction configuration process is simplified and more flexible.
In an embodiment of the present application, before reading the SQL query statement, a source database connection may be selected, and the corresponding SQL query statement is written; and configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relation between the temporary table and the target data table. Selecting a source database, compiling an SQL query statement, firstly selecting which database to acquire data from, selecting according to the connection of the source database, performing operations such as increasing, deleting, checking, modifying and the like on the source database according to the connection of the source database, and selecting connection according to requirements in the subsequent desensitization and extraction processes so as to select a corresponding database. Storing the data read by SQL in a temporary table, desensitizing and extracting the temporary table, configuring desensitization rules and table mapping relations for the temporary table, so as to desensitize the data in the temporary table according to the desensitization rules, finding a target data table according to the table mapping relations for the desensitized data, and storing the data in the target data table.
In an embodiment of the application, when writing a corresponding SQL query statement, determining a data table, a field, data contents and an ordering mode to be extracted according to a selected source database connection; and writing a corresponding SQL query statement according to the data table, the field, the data content and the sorting mode to be extracted. After the database connection is established, a source database which needs to be queried is selected, and information such as a data table, a field, data content and an ordering mode of data in the source database which needs to be extracted is determined according to the selected source database connection, so that SQL statements are written according to the information in a targeted manner, and the data table, the field, the data content and the ordering mode which need to be extracted are limited through the SQL statements.
In an embodiment of the present application, a desensitization algorithm corresponding to data in the temporary table may be configured according to each field included in the data; and selecting a user of the target database and a target data table, and establishing a table mapping relation with the temporary table according to the user and the target data table. Here, the desensitization algorithm used for the temporary table is set, and the corresponding desensitization algorithm may be configured according to information of each field included in the data in the temporary table, for example, the temporary table a includes two fields, name (deposit name) and address (deposit address), and then the desensitization rule may be set to "randomly generate name" and "randomly generate address", for example, for the name field, the desensitization algorithm that "reserve surname, replace first name with" may also be used. Selecting a corresponding desensitization algorithm according to the requirements of a user, for example, desensitizing a name field in a temporary table and then generating a name, replacing original data with the randomly generated name regardless of whether the data stored in a database is information such as age, address and the like, wherein the desensitization algorithm of the name uses the original data as a random factor, and different names are generated by different original data. Similarly, desensitization can be performed on the address field in the temporary table, and the data after desensitization is address data. When configuring the table mapping relationship, each temporary table data is extracted into the target data table of the target database, and during configuration, a user and a data table of the target database need to be selected, for example, data in the temporary table is extracted into a table under an oracle user of the target database.
In an embodiment of the present application, in step S11, a plurality of SQL query statements corresponding to each source database are read, a query result of each SQL query statement is obtained, and each query result is stored in a corresponding temporary table. Here, a database may have a plurality of SQL query statements, for example, data in database a needs to be extracted into database B, and the SQL statements are query statements for database a in order to extract which data in database a is extracted into database B. The query result of each SQL statement forms a temporary table, so that subsequent desensitization and table mapping relation configuration can be performed on the temporary table, and complex combination of multiple tables is realized.
Fig. 2 shows a schematic flow diagram of data desensitization and extraction based on SQL in an embodiment of the present application, where a source database is selected for connection, an SQL query statement is compiled, a desensitization policy and a mapping relationship of a configuration table are configured, extraction is performed, the SQL statement is read to obtain a query result, if the query result is not empty, configuration information of the desensitization policy is read, if the desensitization policy is configured in a temporary table, desensitization is performed on data in the temporary table, mapping relationship information of the table is read, it is determined whether a target data table exists, a target data table is obtained, and the desensitized data is written in the target data table. For example, for two tables, table _ src1(id, name, age), table _ src2(id, name, job) in the source database and data table _ dest (id, name) in the target database, data whose age is greater than 30 in table _ src1 and data whose job is equal to "teacher" in table _ src2 need to be extracted into target data table _ dest at the same time. Writing an SQL statement:
select id,name from table_src1 where age>30
union select id,name from table_src2 where job='teacher'order by name desc;
the result of the SQL query is extracted into the table _ dest table, so that the configuration process is greatly simplified in an SQL mode, the limitation condition of configuring a data source when a traditional extraction mode is used is avoided, and the data source is more flexible.
When desensitization or extraction source data is selected, a data table selection mode is replaced by a written SQL (structured query language) form, SQL sentences can be nested for use, and great flexibility is achieved. By writing SQL, the desired desensitized or extracted data tables, fields, sorting modes, etc. can be defined, and simultaneously, data of multiple tables can be combined and extracted into one table.
In addition, a computer readable medium is provided in the embodiments of the present application, and computer readable instructions are stored thereon, and the computer readable instructions can be executed by a processor to implement the foregoing SQL-based data extraction method.
In correspondence with the method described above, the present application also provides a terminal, which includes modules or units capable of executing the method steps described in fig. 1 or fig. 2 or various embodiments, and these modules or units can be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in an embodiment of the present application, there is further provided an apparatus for SQL-based data extraction, where the apparatus includes:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
For example, the computer readable instructions, when executed, cause the one or more processors to:
reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table;
desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data;
and storing the desensitized data into a target data table according to a table mapping relation.
Fig. 3 is a schematic structural diagram of an apparatus for SQL-based data extraction according to another aspect of the present application, where the apparatus includes: the device comprises a reading device 11, a desensitization device 12 and a storage device 13, wherein the reading device 11 is used for reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table; the desensitization device 12 is used for desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; the storage device 13 is used for storing the desensitized data into the target data table according to the table mapping relationship.
It should be noted that the content executed by the reading device 11, the desensitizing device 12, and the storing device 13 is the same as or corresponding to the content in the above steps S11, S12, and S13, respectively, and for the sake of brevity, the description thereof is omitted here.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (7)
1. A method of SQL-based data extraction, wherein the method comprises:
reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table;
desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data;
and storing the desensitized data into a target data table according to a table mapping relation.
2. The method of claim 1, wherein reading the SQL query statement comprises:
selecting a source database connection, and compiling a corresponding SQL query statement;
and configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relation between the temporary table and the target data table.
3. The method of claim 2, wherein writing a corresponding SQL query statement comprises:
determining a data table, a field, data content and a sequencing mode to be extracted according to the selected source database connection;
and writing a corresponding SQL query statement according to the data table, the field, the data content and the sorting mode to be extracted.
4. The method of claim 2, wherein configuring a desensitization algorithm of data in the temporary table and configuring a table mapping relationship between the temporary table and a target data table comprises:
configuring a desensitization algorithm corresponding to the data according to each field contained in the data in the temporary table;
and selecting a user of the target database and a target data table, and establishing a table mapping relation with the temporary table according to the user and the target data table.
5. The method of claim 1, wherein reading the SQL query statement to obtain source data in a source database, and storing the source data in a temporary table comprises:
reading a plurality of SQL query statements corresponding to each source database, acquiring a query result of each SQL query statement, and storing each query result in a corresponding temporary table.
6. An apparatus for SQL-based data extraction, wherein the apparatus comprises:
one or more processors; and
memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 5.
7. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110033160.6A CN112765248A (en) | 2021-01-11 | 2021-01-11 | SQL-based data extraction method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110033160.6A CN112765248A (en) | 2021-01-11 | 2021-01-11 | SQL-based data extraction method and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112765248A true CN112765248A (en) | 2021-05-07 |
Family
ID=75701414
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110033160.6A Pending CN112765248A (en) | 2021-01-11 | 2021-01-11 | SQL-based data extraction method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112765248A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113312382A (en) * | 2021-05-31 | 2021-08-27 | 上海万物新生环保科技集团有限公司 | Method, device and system for database paging query |
CN113486101A (en) * | 2021-07-01 | 2021-10-08 | 公安部第三研究所 | Method, device, processor and storage medium for realizing eID data storage, extraction and desensitization processing based on big data technology |
CN116796361A (en) * | 2023-03-15 | 2023-09-22 | 深圳优钱信息技术有限公司 | Sensitive data desensitization method based on Guoman hash function |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140164405A1 (en) * | 2012-12-12 | 2014-06-12 | Institute For Information Industry | Dynamic data masking method and database system |
CN108446570A (en) * | 2018-02-28 | 2018-08-24 | 四川新网银行股份有限公司 | A kind of data desensitization method and device |
CN110598451A (en) * | 2019-09-19 | 2019-12-20 | 中国银行股份有限公司 | Data desensitization method and device |
CN111159754A (en) * | 2019-12-12 | 2020-05-15 | 浙江华云信息科技有限公司 | Data desensitization method and device for reverse analysis |
CN111177788A (en) * | 2020-01-07 | 2020-05-19 | 北京启明星辰信息安全技术有限公司 | Hive dynamic desensitization method and dynamic desensitization system |
CN111191276A (en) * | 2019-12-05 | 2020-05-22 | 平安银行股份有限公司 | Data desensitization method and device, storage medium and computer equipment |
-
2021
- 2021-01-11 CN CN202110033160.6A patent/CN112765248A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140164405A1 (en) * | 2012-12-12 | 2014-06-12 | Institute For Information Industry | Dynamic data masking method and database system |
CN108446570A (en) * | 2018-02-28 | 2018-08-24 | 四川新网银行股份有限公司 | A kind of data desensitization method and device |
CN110598451A (en) * | 2019-09-19 | 2019-12-20 | 中国银行股份有限公司 | Data desensitization method and device |
CN111191276A (en) * | 2019-12-05 | 2020-05-22 | 平安银行股份有限公司 | Data desensitization method and device, storage medium and computer equipment |
CN111159754A (en) * | 2019-12-12 | 2020-05-15 | 浙江华云信息科技有限公司 | Data desensitization method and device for reverse analysis |
CN111177788A (en) * | 2020-01-07 | 2020-05-19 | 北京启明星辰信息安全技术有限公司 | Hive dynamic desensitization method and dynamic desensitization system |
Non-Patent Citations (1)
Title |
---|
焦伟等: "测试数据脱敏技术框架的研究与探讨", 《中国金融电脑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113312382A (en) * | 2021-05-31 | 2021-08-27 | 上海万物新生环保科技集团有限公司 | Method, device and system for database paging query |
CN113486101A (en) * | 2021-07-01 | 2021-10-08 | 公安部第三研究所 | Method, device, processor and storage medium for realizing eID data storage, extraction and desensitization processing based on big data technology |
CN116796361A (en) * | 2023-03-15 | 2023-09-22 | 深圳优钱信息技术有限公司 | Sensitive data desensitization method based on Guoman hash function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112765248A (en) | SQL-based data extraction method and equipment | |
Behrang et al. | Automated test migration for mobile apps | |
US20220004532A1 (en) | Generation of realistic mock data | |
US20140090049A1 (en) | Context-based database security | |
US8359592B2 (en) | Identifying groups and subgroups | |
US20230153455A1 (en) | Query-based database redaction | |
CN112162982A (en) | Data query method, device, equipment and medium | |
CN106557586B (en) | Database access processing method and device | |
CN107220265A (en) | A kind of database statement compiling and execution method and device | |
CN105786478A (en) | Data processing method and device | |
CN112948389B (en) | MD 5-based database table data comparison method and device | |
US20150006578A1 (en) | Dynamic search system | |
CN112835903A (en) | Sensitive data identification method and equipment | |
CN114707180A (en) | Log desensitization method and device | |
CN113312373A (en) | Method and equipment for analyzing data structured query statement | |
CN113282631A (en) | Method and equipment for determining target user based on user portrait data | |
CN108228604B (en) | Model construction method based on memory object, information query method and device | |
CN111723104A (en) | Method, device and system for syntax analysis in data processing system | |
CN114595229A (en) | Method and equipment for extracting table object | |
CN117667882A (en) | Method and device for checking sql code | |
CN113971295A (en) | Data desensitization method and equipment based on field filtering | |
CN112328665A (en) | Data import method and device, storage medium and processor | |
CN116541409A (en) | SQL sentence processing method and device, electronic equipment and storage medium | |
CN117609303A (en) | Multi-table joint query method, device, equipment and storage medium | |
CN116737594A (en) | Test case conversion method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210507 |
|
RJ01 | Rejection of invention patent application after publication |