CN113326249A - Structured Query Language (SQL) underlying technology-based configuration data statistical query system - Google Patents

Structured Query Language (SQL) underlying technology-based configuration data statistical query system Download PDF

Info

Publication number
CN113326249A
CN113326249A CN202110586992.0A CN202110586992A CN113326249A CN 113326249 A CN113326249 A CN 113326249A CN 202110586992 A CN202110586992 A CN 202110586992A CN 113326249 A CN113326249 A CN 113326249A
Authority
CN
China
Prior art keywords
data
user
function
authority
external
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110586992.0A
Other languages
Chinese (zh)
Inventor
王国彬
张慧玲
安静
王乐乐
刘会
李叶飞
汪小闯
马骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd
Original Assignee
Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd filed Critical Marketing Service Center Of State Grid Ningxia Electric Power Co ltd Metering Center Of State Grid Ningxia Electric Power Co ltd
Priority to CN202110586992.0A priority Critical patent/CN113326249A/en
Publication of CN113326249A publication Critical patent/CN113326249A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2462Approximate or statistical queries

Abstract

The invention discloses a structured data statistics query system based on SQL (structured query language) underlying technology, which comprises an authority limit function, a data manipulation function and a data definition function, wherein the authority limit function opens different functions according to user account authority, the data manipulation function is a function special for internal personnel and is used for inputting, modifying, deleting data and auditing feedback data, the data definition function belongs to the subordinate function of the authority limit function, and enters a corresponding mode according to the user account authority, and the authority limit function is realized by adopting an information security network isolation device and is used for isolating user login authority from background user login authority. In the invention, the authority limit function is generated by using the information security network isolation device, so that interfaces are different after different account numbers are logged in, the information security is ensured not to leak, the information security of a user is ensured, and meanwhile, different schemes can be conveniently formulated by internal personnel aiming at clients, so that the market is conveniently developed, the service is expanded, and the company benefit is improved.

Description

Structured Query Language (SQL) underlying technology-based configuration data statistical query system
Technical Field
The invention relates to the technical field of data statistics and query systems, in particular to a configuration data statistics and query system based on SQL (structured query language) underlying technology.
Background
The structured query language, SQL for short, is a special purpose programming language, a database query and programming language, used to access data and query, update, and manage relational database systems.
The user does not need to access the underlying technology, only needs to check the statistical data, and the existing user and the user are not isolated, so that the data checked by the internal personnel and the external user are the same, the text data is easy to generate errors, the use of the internal personnel is influenced, even the expansion of the market is influenced, and the problem is solved.
In order to solve the above problems, the present application provides a Structured Query Language (SQL) based configuration data statistics query system.
Disclosure of Invention
The present invention is directed to solving one of the technical problems of the prior art or the related art.
Therefore, the technical scheme adopted by the invention is as follows:
a configuration data statistics query system based on SQL (structured query language) underlying technology comprises an authority limit function, a data manipulation function and a data definition function, wherein the authority limit function opens different functions according to user account authority, the data manipulation function is an internal personnel special function and is used for inputting, modifying, deleting data and auditing feedback data, and the data definition function belongs to an authority limit function subordinate function and enters a corresponding mode according to the user account authority.
The method comprises the following steps:
the method comprises the following steps: the user login interface is used for allowing a user to login by using an existing account or selecting a temporary user to login;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected according to the account information, wherein the authority of the account is divided into three categories, namely an external user, background personnel and an administrator;
③: after the authority is determined, entering different interfaces;
a. the external user enters a global mode, the summary of each information can be viewed according to the view displayed by the global mode, and the external user enters an external mode;
b. the background user enters the text entry interface, can perform text data entry, modification and deletion in a targeted manner, has the function of auditing the text data fed back by the user, and has all data information viewing permissions, wherein the permission level is higher than that of an external user;
c. the administrator enters a bottom layer data writing mode and is used for repairing the BUG and changing the user permission level;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously writing feedback text data into an external user, and determining whether the text data is recorded in a book or not after being audited by background personnel.
The present invention in a preferred example may be further configured to: the authority limit function is realized by adopting an information security network isolation device and is used for isolating the user login authority from the background user login authority.
By adopting the technical scheme, users with different authorities can be easily isolated by utilizing the authority limit function, the information safety is protected, and the information of the users can be ensured not to be leaked.
The present invention in a preferred example may be further configured to: the authority limit function is used for isolating the administrator login authority, the background login authority and the user login authority, and all the authorities are in inclusion relation, and the inclusion relation is that the administrator login authority includes the background login authority and includes the user login authority, and the authorities are sequentially arranged from front to back.
By adopting the technical scheme, the administrator has all the authorities, the background user has all the information viewing authorities and the data correction and verification authorities, and the external user only has the information viewing authorities.
The present invention in a preferred example may be further configured to: the temporary user can only check the data information summary, and the user login interface can be skipped when the data information summary is clicked, and the existing account is selected to login or register to become a registered user.
By adopting the technical scheme, the temporary user can search the desired information without registering, and then selects whether to become the registered user according to the requirement, so that the user experience is improved.
The present invention in a preferred example may be further configured to: the data manipulation function is divided into three modules, namely a data entry module, a data modification module and a data auditing module.
By adopting the technical scheme, the background personnel function is used for correcting data, auditing feedback data and avoiding influence on data statistics caused by mixing of useless data.
The present invention in a preferred example may be further configured to: the data definition function is divided into three modes, namely an external mode, an internal mode and a global mode, and the access authority of the corresponding mode is obtained according to the user authority.
By adopting the technical scheme, different modes are set, and the user can be effectively classified, so that the system operation pressure is reduced, the fluency is improved, and the user experience is optimized.
The present invention in a preferred example may be further configured to: the data entry module is used for entering data, the data modification module is used for modifying and deleting the module, and the data auditing module is used for auditing data fed back by external personnel.
By adopting the technical scheme, the system is divided into three modules, so that the division of labor can be ensured, and the situation that the modules are mixed together and the data are difficult to integrate rapidly when the background personnel use the system is avoided.
The present invention in a preferred example may be further configured to: the global mode in the data definition function corresponds to a temporary user, the external mode corresponds to an external user, and the internal mode corresponds to an administrator.
By adopting the technical scheme, each mode is graded and corresponds to different authorities, so that a user can directly enter corresponding operation after logging in, redundant steps are not required to be repeated, and the system is simpler.
The present invention in a preferred example may be further configured to: the external user can write feedback data and upload the feedback data to a special audit area of background personnel, and the external mode can be displayed after the audit is passed.
Through adopting above-mentioned technical scheme, set up the feedback function, consequently can be better to data statistics, promote data integrality.
The present invention in a preferred example may be further configured to: the data manipulation function belongs to the subordinate function of the data definition function, namely, the data manipulation function has the same priority as the external mode, the internal mode and the global mode.
By adopting the technical scheme, the data manipulation function is restricted by the data definition function, and the use sequence is ensured.
By adopting the technical scheme, the invention has the beneficial effects that:
1. in the invention, the authority limit function is generated by using the information security network isolation device, so that interfaces are different after different account numbers are logged in, the information security is ensured not to leak, the information security of a user is ensured, and meanwhile, different schemes can be conveniently formulated by internal personnel aiming at clients, so that the market is conveniently developed, the service is expanded, and the company benefit is improved.
2. In the invention, the authority is divided into four levels, namely, the administrator authority, the background personnel authority, the external user authority and the temporary user authority, and each high-level authority comprises all the authorities of the lower level, so that when the system is used, the service can be more accurately released at the user side, and the service benefit is improved.
3. According to the invention, a temporary user authority is set, so that a temporary user can directly check the summary of related information without logging in, and after the information is attracted to the user, the user needs to log in or register to check detailed information, thereby promoting the inrush of new users and ensuring the overall activity of the user.
Drawings
FIG. 1 is an overall flow diagram of one embodiment of the present invention;
FIG. 2 is a diagram of a data definition functional structure according to one embodiment of the present invention;
FIG. 3 is a diagram of a data manipulation function architecture of one embodiment of the present invention;
fig. 4 is a diagram of a permission restriction function according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
It is to be understood that this description is made only by way of example and not as a limitation on the scope of the invention.
The following describes, with reference to fig. 1 to 4, a configured data statistics query system based on an SQL underlying technology, provided by some embodiments of the present invention, including an authority limiting function, a data manipulation function, and a data definition function, where the authority limiting function opens different functions according to a user account authority, the data manipulation function is an internal personnel dedicated function for entering, modifying, deleting data, and auditing feedback data, and the data definition function belongs to an authority limiting function subordinate function and enters a corresponding mode according to the user account authority.
Specifically, the authority limit function is realized by adopting an information security network isolation device and is used for isolating the user login authority from the background user login authority, and the authority limit function is formulated by adopting the information security network isolation device, so that the levels are independent, the information safety is ensured, and the user experience is improved.
The containing relation is that the administrator login authority contains the background login authority and the user login authority, and the containing relation is arranged from front to back in sequence, so that the absolute control authority of the administrator on the system is guaranteed, and the safety is improved.
Furthermore, the data definition function is divided into three modes, namely an external mode, an internal mode and a global mode, and corresponding mode access permission is obtained according to user permission, the global mode corresponds to a temporary user, the external mode corresponds to an external user, the internal mode corresponds to an administrator, the hierarchical use is realized, and the system stability is improved.
In the present embodiment, the data manipulation function belongs to a function lower than the data definition function, i.e. the same priority as the external mode, the internal mode, and the global mode.
The first embodiment is as follows:
referring to fig. 1, the system for statistical query of configuration data based on SQL underlying technology provided in the present invention includes the following steps:
the method comprises the following steps: the user logs in the interface, the user can log in by using the existing account number, or selects a temporary user to log in, and the temporary user directly enters into the global mode after logging in;
secondly, the step of: after the account is logged in, the authority limit function is started, and the account authority is detected as an external user according to the account signal;
③: after the authority is determined, the external user enters a global mode, the summary of each information can be checked according to the view displayed by the global mode, and the external mode is entered;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously writing feedback text data into an external user, and determining whether the text data is recorded in a book or not after being audited by background personnel.
Specifically, the temporary user can only check the data information summary, click the data information summary, jump to a user login interface, select an existing account to login or register to become a registered user, the inrush amount of effective new users is increased, unnecessary new users are reduced, accurate users are obtained, and the customer obtaining efficiency is improved.
Furthermore, the external user can write feedback data and upload the feedback data to a review special area of background personnel, the mode can be displayed outside after the review is passed, interaction is realized through feedback, user experience is emphasized, enterprise credit is improved, and the market development difficulty is reduced.
Example two:
with reference to fig. 1 and 3, on the basis of the first embodiment, the method includes the following steps:
the method comprises the following steps: a user login interface, wherein a user can log in by using an existing background personnel account;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected as background personnel according to the account information;
③: after the authority is determined, the background user enters a text entry interface, can perform text data entry, modification and deletion in a targeted manner, has the function of auditing the text data fed back by the user, and has all data information viewing authority, and the authority level is higher than that of an external user;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously auditing the feedback text data written by the external user by background personnel, recording the feedback text data after the audit is passed, and displaying the feedback text data in the external mode.
Specifically, the data manipulation function is divided into three modules, namely a data entry module, a data modification module and a data auditing module, wherein the data entry module is used for entering data, the data modification module is used for modifying and deleting the module, and the data auditing module is used for auditing data fed back by external personnel.
Example three:
with reference to fig. 1, 2, and 4, in the above embodiment, the method includes the following steps:
the method comprises the following steps: a user login interface, wherein an administrator logs in through an administrator account;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected as an administrator according to the account information;
③: and after the authority is determined, the administrator enters a bottom layer data writing mode for repairing the BUG and changing the user authority level.
In the present invention, the term "plurality" means two or more unless explicitly defined otherwise. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items. The terms "mounted," "connected," "fixed," and the like are to be construed broadly, and for example, "connected" may be a fixed connection, a removable connection, or an integral connection; "coupled" may be direct or indirect through an intermediary. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
It will be understood that when an element is referred to as being "mounted to," "secured to" or "disposed on" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "upper," "lower," "left," "right," and the like as used herein are for illustrative purposes only and do not denote a unique embodiment.
In the description herein, the description of the terms "one embodiment," "some embodiments," "specific embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the claims and their equivalents.

Claims (10)

1. A Structured Query Language (SQL) underlying technology-based configuration data statistical query system is characterized by comprising:
the authority limit function opens different functions according to the authority of the user account;
the data manipulation function, which is a special function for internal personnel, is used for inputting, modifying and deleting data and auditing feedback data;
the data definition function belongs to the lower function of the authority limit function and enters a corresponding mode according to the authority of the user account;
the method comprises the following steps:
the method comprises the following steps: the user login interface is used for allowing a user to login by using an existing account or selecting a temporary user to login;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected according to the account information, wherein the authority of the account is divided into three categories, namely an external user, background personnel and an administrator;
③: after the authority is determined, entering different interfaces;
a. the external user enters a global mode, the summary of each information can be viewed according to the view displayed by the global mode, and the external user enters an external mode;
b. the background user enters the text entry interface, can perform text data entry, modification and deletion in a targeted manner, has the function of auditing the text data fed back by the user, and has all data information viewing permissions, wherein the permission level is higher than that of an external user;
c. the administrator enters a bottom layer data writing mode and is used for repairing the BUG and changing the user permission level;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously writing feedback text data into an external user, and determining whether the text data is recorded in a book or not after being audited by background personnel.
2. The system according to claim 1, wherein the permission restriction function is implemented by using an information security network isolation device for isolating user login permission from background user login permission.
3. The system of claim 1, wherein the permission restriction function is configured to isolate administrator login permissions, background login permissions, and user login permissions, and each permission has an inclusion relationship, and the inclusion relationship is that administrator login permissions including background login permissions include user login permissions, and the permissions are arranged from front to back.
4. The system of claim 1, wherein the temporary user can only view the summary of data information, clicking on the summary of data information jumps to a user login interface, and selects an existing account to log in or registers as a registered user.
5. The system according to claim 1, wherein the data manipulation function is divided into three modules, namely a data entry module, a data modification module and a data auditing module.
6. The system of claim 1, wherein the data definition function is divided into three modes, namely an external mode, an internal mode and a global mode, and the access rights of the corresponding modes are obtained according to user rights.
7. The system according to claim 5, wherein the data entry module is configured to enter data, the data modification module is configured to modify and delete data, and the data auditing module is configured to audit data fed back by external personnel.
8. The system according to claim 6, wherein the global schema in the data definition function corresponds to a temporary user, the external schema corresponds to an external user, and the internal schema corresponds to an administrator.
9. The system of claim 8, wherein the external user can write feedback data and upload the feedback data to a review district of background personnel, and the feedback data can be displayed in an external mode after the review is passed.
10. The system according to claim 1, wherein the data manipulation function belongs to a data definition function subordinate function, i.e. the same priority as the external mode, the internal mode, and the global mode.
CN202110586992.0A 2021-05-27 2021-05-27 Structured Query Language (SQL) underlying technology-based configuration data statistical query system Pending CN113326249A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110586992.0A CN113326249A (en) 2021-05-27 2021-05-27 Structured Query Language (SQL) underlying technology-based configuration data statistical query system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110586992.0A CN113326249A (en) 2021-05-27 2021-05-27 Structured Query Language (SQL) underlying technology-based configuration data statistical query system

Publications (1)

Publication Number Publication Date
CN113326249A true CN113326249A (en) 2021-08-31

Family

ID=77421924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110586992.0A Pending CN113326249A (en) 2021-05-27 2021-05-27 Structured Query Language (SQL) underlying technology-based configuration data statistical query system

Country Status (1)

Country Link
CN (1) CN113326249A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254151A (en) * 2016-09-18 2016-12-21 国家电网公司 A kind of SCD file visualization display and management method
CN106844438A (en) * 2016-12-15 2017-06-13 广州术医传承信息科技有限公司 A kind of member's Rights Management System based on content
CN109726534A (en) * 2018-12-24 2019-05-07 江苏哩咕信息科技有限公司 A kind of solution with information service and system integration coordinated implementation
CN109857754A (en) * 2018-11-29 2019-06-07 华迪计算机集团有限公司 A kind of information text searching method and system based on information access rights in domain
CN112632489A (en) * 2020-11-30 2021-04-09 中国船舶重工集团公司第七0九研究所 Police lockset knowledge sharing method and system based on wiki technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254151A (en) * 2016-09-18 2016-12-21 国家电网公司 A kind of SCD file visualization display and management method
CN106844438A (en) * 2016-12-15 2017-06-13 广州术医传承信息科技有限公司 A kind of member's Rights Management System based on content
CN109857754A (en) * 2018-11-29 2019-06-07 华迪计算机集团有限公司 A kind of information text searching method and system based on information access rights in domain
CN109726534A (en) * 2018-12-24 2019-05-07 江苏哩咕信息科技有限公司 A kind of solution with information service and system integration coordinated implementation
CN112632489A (en) * 2020-11-30 2021-04-09 中国船舶重工集团公司第七0九研究所 Police lockset knowledge sharing method and system based on wiki technology

Similar Documents

Publication Publication Date Title
US7725501B1 (en) System and method for rapid database application deployment and use
US20200236098A1 (en) Security migration in a business intelligence environment
US8849770B2 (en) Event auditing framework
CN101226573B (en) Method for controlling access authority of electric document
US9183526B2 (en) Metadata-driven audit reporting system that applies data security to audit data
US11423128B2 (en) Method for setting permission of user in information exchange unit in system
US20050060342A1 (en) Holistic dynamic information management platform for end-users to interact with and share all information categories, including data, functions, and results, in collaborative secure venue
AU2013201034A1 (en) System for analyzing security compliance requirements
US20060026180A1 (en) System and method for automatically synchronizing security-relevant information between a relational database and a multidimensional database
EP3702954A1 (en) Methods and systems for extending row-level security policies
CN103605512A (en) System and method for data verification based on GTechnology platform
Manjunath et al. Analysis of data quality aspects in datawarehouse systems
US11232226B2 (en) Column value-based separate authorization method for statistical list operations
Letrache et al. The automatic creation of OLAP cube using an MDA approach
CN113326249A (en) Structured Query Language (SQL) underlying technology-based configuration data statistical query system
Langit Foundations of SQL Server 2005 Business Intelligence
Leonard Design and implementation of an enterprise data warehouse
Khan et al. Modernization Framework to Enhance the Security of Legacy Information Systems.
Wong et al. Species at risk: Data and knowledge management within the WILDSPACE™ Decision Support System
AU2014280991B2 (en) System for analyzing security compliance requirements
US20230035835A1 (en) System and method of a modular framework for configuration and reuse of web components
Rosenthal et al. Methodology for intelligence database data quality
JP2023502757A (en) dataset network creation system
CN106874276A (en) Permanent resident population's data statistic analysis system
Hale et al. Asset Management GASB 34 Compliance Phase III (HYDRA+)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210831