CN117667980A - Enterprise knowledge base control method, equipment and medium - Google Patents

Enterprise knowledge base control method, equipment and medium Download PDF

Info

Publication number
CN117667980A
CN117667980A CN202311680033.0A CN202311680033A CN117667980A CN 117667980 A CN117667980 A CN 117667980A CN 202311680033 A CN202311680033 A CN 202311680033A CN 117667980 A CN117667980 A CN 117667980A
Authority
CN
China
Prior art keywords
target
query
knowledge base
source
inquiry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311680033.0A
Other languages
Chinese (zh)
Inventor
王洛成
国文峰
李腾
张迪
王太和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur General Software Co Ltd
Original Assignee
Inspur General Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur General Software Co Ltd filed Critical Inspur General Software Co Ltd
Priority to CN202311680033.0A priority Critical patent/CN117667980A/en
Publication of CN117667980A publication Critical patent/CN117667980A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a method, equipment and medium for controlling an enterprise knowledge base, wherein the method comprises the following steps: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into a target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface. The authority control query system based on the elastic search can easily construct various complex elastic search query sentences by a user, improves user experience, realizes an access control list function of the elastic search, can enable developers to perform imperceptible authority control, greatly improves query and development efficiency while ensuring data safety, and meets data management requirements in different scenes.

Description

Enterprise knowledge base control method, equipment and medium
Technical Field
The present application relates to the field of data storage, and in particular, to a method, an apparatus, and a medium for controlling an enterprise knowledge base.
Background
In recent years, in the present digital age, big data technology and search engine technology have become an integral part of various industries. Particularly in the field of enterprise-level application, how to efficiently store and process mass data and ensure the security of the data and the control of access rights are important directions of current technical development.
Over the past few decades, the technological development of the industry has undergone multiple stages. Initially, data storage and searching relied primarily on relational databases and traditional search engine technology. However, with the explosive growth of data and the diversification of user demands, such conventional techniques have failed to meet the demands of modern applications.
The main drawbacks of the prior art include: the inefficiency of data storage, slow search speed, and insufficient processing power for complex data types. These defects may lead to inefficiency in data processing for the enterprise, inability to quickly respond to market demands, and even possible leakage of sensitive data, which poses a threat to the security and reputation of the enterprise.
The causes of these technical drawbacks mainly include: traditional relational databases are inefficient in processing unstructured data and complex queries, and traditional search engine techniques cannot handle massive data and high concurrent access, while lacking the processing capability for complex data types.
Disclosure of Invention
In order to solve the above problems, the present application provides an enterprise knowledge base control method, device and medium, wherein the method includes:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
In one example, the source database includes a source user table, a source relationship table, a source role table, a source authority table and a source service table; the mapping the source data of the source database to the target knowledge base specifically comprises: determining a mapping relation between the source database and the target knowledge base; the mapping relation comprises the following steps: a first mapping relationship from the source user table to the target user table, a second mapping relationship from the source relationship table to the target relationship table, a third mapping relationship from the source role table to the target role table, and a fourth mapping relationship from the source authority table and the source service table to the target service table; and based on the mapping relation, the source data is migrated and mapped into the target knowledge base.
In one example, the querying through the default authority query interface, the query control system and the elastic search query interface specifically includes: inquiring the default authority of a user through the default authority inquiry interface; invoking a query control system, and converting the initial query condition according to the query format of the elastic search to obtain a target query condition; and inquiring through an elastic search inquiry interface based on the default authority and the target inquiry condition.
In one example, before the querying the default authority of the user through the default authority querying interface, the method further includes: writing a default authority query interface; the method further comprises the steps of: and acquiring role information of the user from the target relation table through the default authority query interface, and constructing corresponding initial query conditions according to the role information.
In one example, before the invoking the query control system converts the initial query condition according to the query format of the elastic search to obtain the target query condition, the method further includes: instantiating the ESQueryProducer class object and acquiring a query builder; an initial query condition is set using the query builder object, the initial query condition including at least one of a matching field, a query keyword.
In one example, after the setting of the initial query condition using the query builder object, the method further comprises: and processing the initial query condition to obtain an intermediate query condition, wherein the processing mode comprises at least one of paging setting and sorting.
In one example, the querying through the default authority query interface, the query control system and the elastic search query interface specifically includes: a Java query interface of the elastic search is used for sending a query request; and inquiring based on the inquiry request to obtain an inquiry result.
In one example, the mapping the source data migration to the target knowledge base based on the mapping relationship specifically includes: the source data migration is mapped into the target knowledge base by writing a data migration script or using an ETL tool.
The application also provides an enterprise knowledge base control device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
The present application also provides a non-volatile computer storage medium storing computer-executable instructions configured to: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
The method provided by the application has the following beneficial effects: the authority control query system based on the elastic search can easily construct various complex elastic search query sentences by a user, improves user experience, and realizes a user-friendly query sentence construction process through a simple factory design mode and a reflection technology. Meanwhile, the access control list function of the elastic search is realized, so that developers can perform line authority control without perception, the query and development efficiency is greatly improved while the data security is ensured compared with the traditional database, and the data management requirements under different scenes are met.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a diagram of a database table relationship of a conventional design according to an embodiment of the present application;
FIG. 2 is a flow chart of an enterprise knowledge base control method according to an embodiment of the present application;
FIG. 3 is a diagram of a target knowledge base table relationship according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a mapping relationship in an embodiment of the present application;
FIG. 5 is a schematic diagram of a data storage and query process of an enterprise knowledge base according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an enterprise knowledge base control apparatus according to an embodiment of the present application.
Detailed Description
For the purposes, technical solutions and advantages of the present application, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The following describes in detail the technical solutions provided by the embodiments of the present application with reference to the accompanying drawings.
Fig. 1 shows an enterprise knowledge base system table design of a relational database in the prior art, wherein the enterprise knowledge base system table design comprises a user table, a relational table, a role table, a permission table and a business table, the user table is associated with the role table through the relational table, then corresponding permission data is found through the association of the role table and the permission table, and in the process of actually inquiring the data, different tables are required to be inquired for many times to find the permission data conforming to the user, so that the permission management becomes complex and the response of the rear end is slower.
Fig. 2 is a flow chart of an enterprise knowledge base control method according to one or more embodiments of the present disclosure. The method can be applied to enterprise knowledge bases in different business fields, such as the Internet financial business field, the electric business field, the instant messaging business field, the game business field, the public business field and the like. The process may be performed by a computing device in the corresponding domain (e.g., a wind control server or intelligent mobile terminal corresponding to the payment service, etc.), and certain input parameters or intermediate results in the process allow for manual intervention adjustments to help improve accuracy.
The implementation of the analysis method according to the embodiment of the present application may be a terminal device or a server, which is not particularly limited in this application. For ease of understanding and description, the following embodiments are described in detail with reference to a server.
It should be noted that the server may be a single device, or may be a system composed of a plurality of devices, that is, a distributed server, which is not specifically limited in this application.
As shown in fig. 2 and 5, an embodiment of the present application provides an enterprise knowledge base control method, which includes:
s101: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table.
First, it is necessary to map the source data contained in the source database (the source database herein refers to the conventional database in fig. 5) into the target database constructed in the present application. As shown in fig. 3, the target database herein relates to four tables of a target user table, a target role table, a target relationship table and a target service table, wherein the target user table contains user information, the target role table contains role information, the target relationship table contains the relationship between users and roles, and the target service table contains a permission role list of the current data line.
In one embodiment, the source database includes a source user table, a source relation table, a source role table, a source authority table and a source service table, and when mapping source data of the source database into the target knowledge base, a mapping relation between the source database and the target knowledge base needs to be determined. As shown in fig. 4, the mapping relationship includes: the method comprises the steps of a first mapping relation from a source user table to a target user table, a second mapping relation from a source relation table to a target relation table, a third mapping relation from a source role table to a target role table, and a fourth mapping relation from a source authority table to a source service table. After determining the mapping relationship, the source data may be migration mapped into the target knowledge base based on the mapping relationship.
Further, it is also desirable to migrate the mapped data from the source database to the elastiscearch search engine, either by writing a data migration script or using an ETL tool.
S102: and setting authority data of the target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base.
When the target knowledge is released, knowledge authority data of the target knowledge are set according to data in an authority database, and a storage interface is called to store the knowledge and the authority into the target knowledge base.
S103: the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
In one embodiment, when data is queried, a query interface is called first, a default authority of a user is queried through the default authority query interface, then a query control system is called, initial query conditions are converted according to a query format of an elastomer search to obtain target query conditions, and then query is performed through the query interface of the elastomer search based on the default authority and the target query conditions.
Further, before converting the initial query condition, a default permission query interface is required to be written, so as to dynamically construct the initial query condition according to the user role information. Before the query is executed, role information of the user can be acquired in the relation table, and corresponding initial query conditions are constructed according to the role information.
Specifically, when a query control system is invoked, an ESQueryProducer class object is first instantiated.
Then, the creatESQueryBuilder method of the esquerybuilder class is called to acquire the query builder object, and the type of the query builder to be used can be specified through the setting parameter of the ESQuaryMode class. For example, the creatESQueryBuilder (esquarymode. Must) method may be invoked to retrieve a matching query builder. The query builder object is then used to set relevant query conditions, such as setting fields to match, keywords of the query, etc. The query object may be further processed as desired, such as by paging, sorting, etc. And calling a getProduct method of the query builder object to build all query conditions of query setting, calling a public method of a role of a query user in the getboost query method, and adding the default authority of the user into the query conditions to obtain a final query object. Finally, the query object is used to perform the actual search operation, for example, a Java query API using an elastomer search sends a query request and obtains results.
The query control system in the application uses a development method of factory design mode plus reflection, which comprises the following 4 parts:
1. four query pattern building tool classes: four query patterns, corresponding to the elastiscearch, respectively, include Bool query, term query, range query, wildcard query. Each query pattern building tool class provides a simple and easy-to-use interface for a user to build a corresponding query statement.
2. Querying a schema definition file: the file contains the parameter definitions, constraints, and example code for each query pattern. The user can learn how to build the tool class using each query pattern by reading the file.
3. Building a factory class: the method adopts a simple factory design mode, converts a query object constructed by a user into a query sentence object of an elastic search through a reflection technology according to a query mode input by the user, dynamically generates a corresponding query mode construction tool instance, and returns the query sentence object to the user.
4. And (3) final assembly: after each wanted mode object is obtained through the factory class, parameters are set in the object, then query sentences are uniformly generated by using the assembly class, and a user can easily construct complex query sentences without knowing the query grammar of the elastic search.
The method and the system provide a high-efficiency and flexible data storage and search solution, and ensure the safety and stability of the system at the same time, so as to solve the problems of performance bottleneck and insufficient flexibility of the traditional data storage and search system when processing large-scale data and complex permission systems.
The present invention successfully addresses the above-described technical problems by using an elastic search as a data storage and search engine, and a rights management method in combination with a role driver. The distributed nature of the elastomer search allows the system to handle large-scale data, while its search function can provide efficient data searching. The role-driven authority management method enables the authority management of the system to be more flexible and efficient, and flexible row-level authority setting and distribution can be carried out according to different role requirements.
In addition, by using roles to manage the data authority, individual authority setting for each user can be avoided, so that the efficiency and accuracy of authority management are greatly improved.
In summary, the invention provides a comprehensive and efficient data storage and search solution, which solves the problems of performance bottleneck and insufficient flexibility of the traditional data storage and search system when processing large-scale data and complex authority systems.
As shown in fig. 6, the embodiment of the present application further provides an enterprise knowledge base control device, including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
The embodiments also provide a non-volatile computer storage medium storing computer executable instructions configured to:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
All embodiments in the application are described in a progressive manner, and identical and similar parts of all embodiments are mutually referred, so that each embodiment mainly describes differences from other embodiments. In particular, for the apparatus and medium embodiments, the description is relatively simple, as it is substantially similar to the method embodiments, with reference to the section of the method embodiments being relevant.
The devices and media provided in the embodiments of the present application are in one-to-one correspondence with the methods, so that the devices and media also have similar beneficial technical effects as the corresponding methods, and since the beneficial technical effects of the methods have been described in detail above, the beneficial technical effects of the devices and media are not described in detail herein.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

1. A method for controlling an enterprise knowledge base, comprising:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table;
setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base;
the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
2. The method of claim 1, wherein the source database comprises a source user table, a source relationship table, a source role table, a source authority table and a source service table;
the mapping the source data of the source database to the target knowledge base specifically comprises:
determining a mapping relation between the source database and the target knowledge base;
the mapping relation comprises the following steps: a first mapping relationship from the source user table to the target user table, a second mapping relationship from the source relationship table to the target relationship table, a third mapping relationship from the source role table to the target role table, and a fourth mapping relationship from the source authority table and the source service table to the target service table;
and based on the mapping relation, the source data is migrated and mapped into the target knowledge base.
3. The method according to claim 1, wherein the querying through a default authority query interface, a query control system and an elastic search query interface specifically comprises:
inquiring the default authority of a user through the default authority inquiry interface;
invoking a query control system, and converting the initial query condition according to the query format of the elastic search to obtain a target query condition;
and inquiring through an elastic search inquiry interface based on the default authority and the target inquiry condition.
4. A method according to claim 3, wherein prior to querying the user's default rights via the default rights querying interface, the method further comprises: writing a default authority query interface;
the method further comprises the steps of:
and acquiring role information of the user from the target relation table through the default authority query interface, and constructing corresponding initial query conditions according to the role information.
5. The method of claim 4, wherein the invoking the query control system translates the initial query terms in an elastic search query format to obtain the target query terms, the method further comprising:
instantiating the ESQueryProducer class object and acquiring a query builder;
an initial query condition is set using the query builder object, the initial query condition including at least one of a matching field, a query keyword.
6. The method of claim 5, wherein after setting initial query conditions using the query builder object, the method further comprises:
and processing the initial query condition to obtain an intermediate query condition, wherein the processing mode comprises at least one of paging setting and sorting.
7. The method according to claim 1, wherein the querying through a default authority query interface, a query control system and an elastic search query interface specifically comprises:
a Java query interface of the elastic search is used for sending a query request;
and inquiring based on the inquiry request to obtain an inquiry result.
8. The method according to claim 2, wherein the migration mapping the source data into the target knowledge base based on the mapping relation specifically comprises:
the source data migration is mapped into the target knowledge base by writing a data migration script or using an ETL tool.
9. An enterprise knowledge base control apparatus, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table;
setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base;
the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
10. A non-transitory computer storage medium storing computer-executable instructions, the computer-executable instructions configured to:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table;
setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base;
the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
CN202311680033.0A 2023-12-07 2023-12-07 Enterprise knowledge base control method, equipment and medium Pending CN117667980A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311680033.0A CN117667980A (en) 2023-12-07 2023-12-07 Enterprise knowledge base control method, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311680033.0A CN117667980A (en) 2023-12-07 2023-12-07 Enterprise knowledge base control method, equipment and medium

Publications (1)

Publication Number Publication Date
CN117667980A true CN117667980A (en) 2024-03-08

Family

ID=90084282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311680033.0A Pending CN117667980A (en) 2023-12-07 2023-12-07 Enterprise knowledge base control method, equipment and medium

Country Status (1)

Country Link
CN (1) CN117667980A (en)

Similar Documents

Publication Publication Date Title
CN109857755B (en) Rule checking method and device
US7836063B2 (en) Customizable data translation method and system
US20210326471A1 (en) Methods and apparatuses for chaining service data
US20160171978A1 (en) Voice recognition system and construction method thereof
US20180307736A1 (en) Efficient Snapshot Generation of Data Tables
CN110019111B (en) Data processing method, data processing device, storage medium and processor
CN110895544A (en) Interface data processing method, device, system and storage medium
CN108415909A (en) A kind of system and method accessing disparate databases
US9971794B2 (en) Converting data objects from multi- to single-source database environment
CN109977317B (en) Data query method and device
CN115599764A (en) Method, device and medium for migrating table data
CN113849523B (en) A data query method, device and medium
CN112860802B (en) Database operation statement processing method and device and electronic equipment
US20220269552A1 (en) Resolving data location for queries in a multi-system instance landscape
US9009731B2 (en) Conversion of lightweight object to a heavyweight object
CN111125216B (en) Method and device for importing data into Phoenix
CN117667980A (en) Enterprise knowledge base control method, equipment and medium
CN117539981A (en) Method, equipment and medium for constructing theme data set
US12001458B2 (en) Multi-cloud object store access
US10114864B1 (en) List element query support and processing
JP2022155454A (en) Routing sql statement to elastic compute node using workload class
US8799301B2 (en) Avoiding duplicate and equivalent data objects in service registries
CN114625410A (en) Request message processing method, device and equipment
US20240378039A1 (en) Intelligent data processing system with multi-interface frontend and backend
US20230031198A1 (en) Dynamically tuning a computing device's performance for a containerized application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination