CN113326249A - Structured Query Language (SQL) underlying technology-based configuration data statistical query system - Google Patents
Structured Query Language (SQL) underlying technology-based configuration data statistical query system Download PDFInfo
- Publication number
- CN113326249A CN113326249A CN202110586992.0A CN202110586992A CN113326249A CN 113326249 A CN113326249 A CN 113326249A CN 202110586992 A CN202110586992 A CN 202110586992A CN 113326249 A CN113326249 A CN 113326249A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- function
- authority
- external
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2379—Updates performed during online database operations; commit processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/242—Query formulation
- G06F16/2433—Query languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2462—Approximate or statistical queries
Abstract
The invention discloses a structured data statistics query system based on SQL (structured query language) underlying technology, which comprises an authority limit function, a data manipulation function and a data definition function, wherein the authority limit function opens different functions according to user account authority, the data manipulation function is a function special for internal personnel and is used for inputting, modifying, deleting data and auditing feedback data, the data definition function belongs to the subordinate function of the authority limit function, and enters a corresponding mode according to the user account authority, and the authority limit function is realized by adopting an information security network isolation device and is used for isolating user login authority from background user login authority. In the invention, the authority limit function is generated by using the information security network isolation device, so that interfaces are different after different account numbers are logged in, the information security is ensured not to leak, the information security of a user is ensured, and meanwhile, different schemes can be conveniently formulated by internal personnel aiming at clients, so that the market is conveniently developed, the service is expanded, and the company benefit is improved.
Description
Technical Field
The invention relates to the technical field of data statistics and query systems, in particular to a configuration data statistics and query system based on SQL (structured query language) underlying technology.
Background
The structured query language, SQL for short, is a special purpose programming language, a database query and programming language, used to access data and query, update, and manage relational database systems.
The user does not need to access the underlying technology, only needs to check the statistical data, and the existing user and the user are not isolated, so that the data checked by the internal personnel and the external user are the same, the text data is easy to generate errors, the use of the internal personnel is influenced, even the expansion of the market is influenced, and the problem is solved.
In order to solve the above problems, the present application provides a Structured Query Language (SQL) based configuration data statistics query system.
Disclosure of Invention
The present invention is directed to solving one of the technical problems of the prior art or the related art.
Therefore, the technical scheme adopted by the invention is as follows:
a configuration data statistics query system based on SQL (structured query language) underlying technology comprises an authority limit function, a data manipulation function and a data definition function, wherein the authority limit function opens different functions according to user account authority, the data manipulation function is an internal personnel special function and is used for inputting, modifying, deleting data and auditing feedback data, and the data definition function belongs to an authority limit function subordinate function and enters a corresponding mode according to the user account authority.
The method comprises the following steps:
the method comprises the following steps: the user login interface is used for allowing a user to login by using an existing account or selecting a temporary user to login;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected according to the account information, wherein the authority of the account is divided into three categories, namely an external user, background personnel and an administrator;
③: after the authority is determined, entering different interfaces;
a. the external user enters a global mode, the summary of each information can be viewed according to the view displayed by the global mode, and the external user enters an external mode;
b. the background user enters the text entry interface, can perform text data entry, modification and deletion in a targeted manner, has the function of auditing the text data fed back by the user, and has all data information viewing permissions, wherein the permission level is higher than that of an external user;
c. the administrator enters a bottom layer data writing mode and is used for repairing the BUG and changing the user permission level;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously writing feedback text data into an external user, and determining whether the text data is recorded in a book or not after being audited by background personnel.
The present invention in a preferred example may be further configured to: the authority limit function is realized by adopting an information security network isolation device and is used for isolating the user login authority from the background user login authority.
By adopting the technical scheme, users with different authorities can be easily isolated by utilizing the authority limit function, the information safety is protected, and the information of the users can be ensured not to be leaked.
The present invention in a preferred example may be further configured to: the authority limit function is used for isolating the administrator login authority, the background login authority and the user login authority, and all the authorities are in inclusion relation, and the inclusion relation is that the administrator login authority includes the background login authority and includes the user login authority, and the authorities are sequentially arranged from front to back.
By adopting the technical scheme, the administrator has all the authorities, the background user has all the information viewing authorities and the data correction and verification authorities, and the external user only has the information viewing authorities.
The present invention in a preferred example may be further configured to: the temporary user can only check the data information summary, and the user login interface can be skipped when the data information summary is clicked, and the existing account is selected to login or register to become a registered user.
By adopting the technical scheme, the temporary user can search the desired information without registering, and then selects whether to become the registered user according to the requirement, so that the user experience is improved.
The present invention in a preferred example may be further configured to: the data manipulation function is divided into three modules, namely a data entry module, a data modification module and a data auditing module.
By adopting the technical scheme, the background personnel function is used for correcting data, auditing feedback data and avoiding influence on data statistics caused by mixing of useless data.
The present invention in a preferred example may be further configured to: the data definition function is divided into three modes, namely an external mode, an internal mode and a global mode, and the access authority of the corresponding mode is obtained according to the user authority.
By adopting the technical scheme, different modes are set, and the user can be effectively classified, so that the system operation pressure is reduced, the fluency is improved, and the user experience is optimized.
The present invention in a preferred example may be further configured to: the data entry module is used for entering data, the data modification module is used for modifying and deleting the module, and the data auditing module is used for auditing data fed back by external personnel.
By adopting the technical scheme, the system is divided into three modules, so that the division of labor can be ensured, and the situation that the modules are mixed together and the data are difficult to integrate rapidly when the background personnel use the system is avoided.
The present invention in a preferred example may be further configured to: the global mode in the data definition function corresponds to a temporary user, the external mode corresponds to an external user, and the internal mode corresponds to an administrator.
By adopting the technical scheme, each mode is graded and corresponds to different authorities, so that a user can directly enter corresponding operation after logging in, redundant steps are not required to be repeated, and the system is simpler.
The present invention in a preferred example may be further configured to: the external user can write feedback data and upload the feedback data to a special audit area of background personnel, and the external mode can be displayed after the audit is passed.
Through adopting above-mentioned technical scheme, set up the feedback function, consequently can be better to data statistics, promote data integrality.
The present invention in a preferred example may be further configured to: the data manipulation function belongs to the subordinate function of the data definition function, namely, the data manipulation function has the same priority as the external mode, the internal mode and the global mode.
By adopting the technical scheme, the data manipulation function is restricted by the data definition function, and the use sequence is ensured.
By adopting the technical scheme, the invention has the beneficial effects that:
1. in the invention, the authority limit function is generated by using the information security network isolation device, so that interfaces are different after different account numbers are logged in, the information security is ensured not to leak, the information security of a user is ensured, and meanwhile, different schemes can be conveniently formulated by internal personnel aiming at clients, so that the market is conveniently developed, the service is expanded, and the company benefit is improved.
2. In the invention, the authority is divided into four levels, namely, the administrator authority, the background personnel authority, the external user authority and the temporary user authority, and each high-level authority comprises all the authorities of the lower level, so that when the system is used, the service can be more accurately released at the user side, and the service benefit is improved.
3. According to the invention, a temporary user authority is set, so that a temporary user can directly check the summary of related information without logging in, and after the information is attracted to the user, the user needs to log in or register to check detailed information, thereby promoting the inrush of new users and ensuring the overall activity of the user.
Drawings
FIG. 1 is an overall flow diagram of one embodiment of the present invention;
FIG. 2 is a diagram of a data definition functional structure according to one embodiment of the present invention;
FIG. 3 is a diagram of a data manipulation function architecture of one embodiment of the present invention;
fig. 4 is a diagram of a permission restriction function according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
It is to be understood that this description is made only by way of example and not as a limitation on the scope of the invention.
The following describes, with reference to fig. 1 to 4, a configured data statistics query system based on an SQL underlying technology, provided by some embodiments of the present invention, including an authority limiting function, a data manipulation function, and a data definition function, where the authority limiting function opens different functions according to a user account authority, the data manipulation function is an internal personnel dedicated function for entering, modifying, deleting data, and auditing feedback data, and the data definition function belongs to an authority limiting function subordinate function and enters a corresponding mode according to the user account authority.
Specifically, the authority limit function is realized by adopting an information security network isolation device and is used for isolating the user login authority from the background user login authority, and the authority limit function is formulated by adopting the information security network isolation device, so that the levels are independent, the information safety is ensured, and the user experience is improved.
The containing relation is that the administrator login authority contains the background login authority and the user login authority, and the containing relation is arranged from front to back in sequence, so that the absolute control authority of the administrator on the system is guaranteed, and the safety is improved.
Furthermore, the data definition function is divided into three modes, namely an external mode, an internal mode and a global mode, and corresponding mode access permission is obtained according to user permission, the global mode corresponds to a temporary user, the external mode corresponds to an external user, the internal mode corresponds to an administrator, the hierarchical use is realized, and the system stability is improved.
In the present embodiment, the data manipulation function belongs to a function lower than the data definition function, i.e. the same priority as the external mode, the internal mode, and the global mode.
The first embodiment is as follows:
referring to fig. 1, the system for statistical query of configuration data based on SQL underlying technology provided in the present invention includes the following steps:
the method comprises the following steps: the user logs in the interface, the user can log in by using the existing account number, or selects a temporary user to log in, and the temporary user directly enters into the global mode after logging in;
secondly, the step of: after the account is logged in, the authority limit function is started, and the account authority is detected as an external user according to the account signal;
③: after the authority is determined, the external user enters a global mode, the summary of each information can be checked according to the view displayed by the global mode, and the external mode is entered;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously writing feedback text data into an external user, and determining whether the text data is recorded in a book or not after being audited by background personnel.
Specifically, the temporary user can only check the data information summary, click the data information summary, jump to a user login interface, select an existing account to login or register to become a registered user, the inrush amount of effective new users is increased, unnecessary new users are reduced, accurate users are obtained, and the customer obtaining efficiency is improved.
Furthermore, the external user can write feedback data and upload the feedback data to a review special area of background personnel, the mode can be displayed outside after the review is passed, interaction is realized through feedback, user experience is emphasized, enterprise credit is improved, and the market development difficulty is reduced.
Example two:
with reference to fig. 1 and 3, on the basis of the first embodiment, the method includes the following steps:
the method comprises the following steps: a user login interface, wherein a user can log in by using an existing background personnel account;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected as background personnel according to the account information;
③: after the authority is determined, the background user enters a text entry interface, can perform text data entry, modification and deletion in a targeted manner, has the function of auditing the text data fed back by the user, and has all data information viewing authority, and the authority level is higher than that of an external user;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously auditing the feedback text data written by the external user by background personnel, recording the feedback text data after the audit is passed, and displaying the feedback text data in the external mode.
Specifically, the data manipulation function is divided into three modules, namely a data entry module, a data modification module and a data auditing module, wherein the data entry module is used for entering data, the data modification module is used for modifying and deleting the module, and the data auditing module is used for auditing data fed back by external personnel.
Example three:
with reference to fig. 1, 2, and 4, in the above embodiment, the method includes the following steps:
the method comprises the following steps: a user login interface, wherein an administrator logs in through an administrator account;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected as an administrator according to the account information;
③: and after the authority is determined, the administrator enters a bottom layer data writing mode for repairing the BUG and changing the user authority level.
In the present invention, the term "plurality" means two or more unless explicitly defined otherwise. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items. The terms "mounted," "connected," "fixed," and the like are to be construed broadly, and for example, "connected" may be a fixed connection, a removable connection, or an integral connection; "coupled" may be direct or indirect through an intermediary. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
It will be understood that when an element is referred to as being "mounted to," "secured to" or "disposed on" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "upper," "lower," "left," "right," and the like as used herein are for illustrative purposes only and do not denote a unique embodiment.
In the description herein, the description of the terms "one embodiment," "some embodiments," "specific embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the claims and their equivalents.
Claims (10)
1. A Structured Query Language (SQL) underlying technology-based configuration data statistical query system is characterized by comprising:
the authority limit function opens different functions according to the authority of the user account;
the data manipulation function, which is a special function for internal personnel, is used for inputting, modifying and deleting data and auditing feedback data;
the data definition function belongs to the lower function of the authority limit function and enters a corresponding mode according to the authority of the user account;
the method comprises the following steps:
the method comprises the following steps: the user login interface is used for allowing a user to login by using an existing account or selecting a temporary user to login;
secondly, the step of: after the account is logged in, the authority limit function is started, and the authority of the account is detected according to the account information, wherein the authority of the account is divided into three categories, namely an external user, background personnel and an administrator;
③: after the authority is determined, entering different interfaces;
a. the external user enters a global mode, the summary of each information can be viewed according to the view displayed by the global mode, and the external user enters an external mode;
b. the background user enters the text entry interface, can perform text data entry, modification and deletion in a targeted manner, has the function of auditing the text data fed back by the user, and has all data information viewing permissions, wherein the permission level is higher than that of an external user;
c. the administrator enters a bottom layer data writing mode and is used for repairing the BUG and changing the user permission level;
fourthly, the method comprises the following steps: and recording the text data, displaying the text data in an external mode, simultaneously writing feedback text data into an external user, and determining whether the text data is recorded in a book or not after being audited by background personnel.
2. The system according to claim 1, wherein the permission restriction function is implemented by using an information security network isolation device for isolating user login permission from background user login permission.
3. The system of claim 1, wherein the permission restriction function is configured to isolate administrator login permissions, background login permissions, and user login permissions, and each permission has an inclusion relationship, and the inclusion relationship is that administrator login permissions including background login permissions include user login permissions, and the permissions are arranged from front to back.
4. The system of claim 1, wherein the temporary user can only view the summary of data information, clicking on the summary of data information jumps to a user login interface, and selects an existing account to log in or registers as a registered user.
5. The system according to claim 1, wherein the data manipulation function is divided into three modules, namely a data entry module, a data modification module and a data auditing module.
6. The system of claim 1, wherein the data definition function is divided into three modes, namely an external mode, an internal mode and a global mode, and the access rights of the corresponding modes are obtained according to user rights.
7. The system according to claim 5, wherein the data entry module is configured to enter data, the data modification module is configured to modify and delete data, and the data auditing module is configured to audit data fed back by external personnel.
8. The system according to claim 6, wherein the global schema in the data definition function corresponds to a temporary user, the external schema corresponds to an external user, and the internal schema corresponds to an administrator.
9. The system of claim 8, wherein the external user can write feedback data and upload the feedback data to a review district of background personnel, and the feedback data can be displayed in an external mode after the review is passed.
10. The system according to claim 1, wherein the data manipulation function belongs to a data definition function subordinate function, i.e. the same priority as the external mode, the internal mode, and the global mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110586992.0A CN113326249A (en) | 2021-05-27 | 2021-05-27 | Structured Query Language (SQL) underlying technology-based configuration data statistical query system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110586992.0A CN113326249A (en) | 2021-05-27 | 2021-05-27 | Structured Query Language (SQL) underlying technology-based configuration data statistical query system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113326249A true CN113326249A (en) | 2021-08-31 |
Family
ID=77421924
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110586992.0A Pending CN113326249A (en) | 2021-05-27 | 2021-05-27 | Structured Query Language (SQL) underlying technology-based configuration data statistical query system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113326249A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106254151A (en) * | 2016-09-18 | 2016-12-21 | 国家电网公司 | A kind of SCD file visualization display and management method |
CN106844438A (en) * | 2016-12-15 | 2017-06-13 | 广州术医传承信息科技有限公司 | A kind of member's Rights Management System based on content |
CN109726534A (en) * | 2018-12-24 | 2019-05-07 | 江苏哩咕信息科技有限公司 | A kind of solution with information service and system integration coordinated implementation |
CN109857754A (en) * | 2018-11-29 | 2019-06-07 | 华迪计算机集团有限公司 | A kind of information text searching method and system based on information access rights in domain |
CN112632489A (en) * | 2020-11-30 | 2021-04-09 | 中国船舶重工集团公司第七0九研究所 | Police lockset knowledge sharing method and system based on wiki technology |
-
2021
- 2021-05-27 CN CN202110586992.0A patent/CN113326249A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106254151A (en) * | 2016-09-18 | 2016-12-21 | 国家电网公司 | A kind of SCD file visualization display and management method |
CN106844438A (en) * | 2016-12-15 | 2017-06-13 | 广州术医传承信息科技有限公司 | A kind of member's Rights Management System based on content |
CN109857754A (en) * | 2018-11-29 | 2019-06-07 | 华迪计算机集团有限公司 | A kind of information text searching method and system based on information access rights in domain |
CN109726534A (en) * | 2018-12-24 | 2019-05-07 | 江苏哩咕信息科技有限公司 | A kind of solution with information service and system integration coordinated implementation |
CN112632489A (en) * | 2020-11-30 | 2021-04-09 | 中国船舶重工集团公司第七0九研究所 | Police lockset knowledge sharing method and system based on wiki technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7725501B1 (en) | System and method for rapid database application deployment and use | |
US20200236098A1 (en) | Security migration in a business intelligence environment | |
US8849770B2 (en) | Event auditing framework | |
CN101226573B (en) | Method for controlling access authority of electric document | |
US9183526B2 (en) | Metadata-driven audit reporting system that applies data security to audit data | |
US11423128B2 (en) | Method for setting permission of user in information exchange unit in system | |
US20050060342A1 (en) | Holistic dynamic information management platform for end-users to interact with and share all information categories, including data, functions, and results, in collaborative secure venue | |
AU2013201034A1 (en) | System for analyzing security compliance requirements | |
US20060026180A1 (en) | System and method for automatically synchronizing security-relevant information between a relational database and a multidimensional database | |
EP3702954A1 (en) | Methods and systems for extending row-level security policies | |
CN103605512A (en) | System and method for data verification based on GTechnology platform | |
Manjunath et al. | Analysis of data quality aspects in datawarehouse systems | |
US11232226B2 (en) | Column value-based separate authorization method for statistical list operations | |
Letrache et al. | The automatic creation of OLAP cube using an MDA approach | |
CN113326249A (en) | Structured Query Language (SQL) underlying technology-based configuration data statistical query system | |
Langit | Foundations of SQL Server 2005 Business Intelligence | |
Leonard | Design and implementation of an enterprise data warehouse | |
Khan et al. | Modernization Framework to Enhance the Security of Legacy Information Systems. | |
Wong et al. | Species at risk: Data and knowledge management within the WILDSPACE™ Decision Support System | |
AU2014280991B2 (en) | System for analyzing security compliance requirements | |
US20230035835A1 (en) | System and method of a modular framework for configuration and reuse of web components | |
Rosenthal et al. | Methodology for intelligence database data quality | |
JP2023502757A (en) | dataset network creation system | |
CN106874276A (en) | Permanent resident population's data statistic analysis system | |
Hale et al. | Asset Management GASB 34 Compliance Phase III (HYDRA+) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210831 |