TW200822629A - Method and system of retrieving data safely from company database via instant messaging - Google Patents

Method and system of retrieving data safely from company database via instant messaging Download PDF

Info

Publication number
TW200822629A
TW200822629A TW95141500A TW95141500A TW200822629A TW 200822629 A TW200822629 A TW 200822629A TW 95141500 A TW95141500 A TW 95141500A TW 95141500 A TW95141500 A TW 95141500A TW 200822629 A TW200822629 A TW 200822629A
Authority
TW
Taiwan
Prior art keywords
instant messaging
service
service program
internet
database
Prior art date
Application number
TW95141500A
Other languages
Chinese (zh)
Other versions
TWI318832B (en
Inventor
Gong-Zheng Lin
Original Assignee
Rdonline Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rdonline Co Ltd filed Critical Rdonline Co Ltd
Priority to TW95141500A priority Critical patent/TW200822629A/en
Publication of TW200822629A publication Critical patent/TW200822629A/en
Application granted granted Critical
Publication of TWI318832B publication Critical patent/TWI318832B/zh

Links

Abstract

A method and system of retrieving data safely from a company database via instant messaging are disclosed. The method includes: a first service program unit transmits a first instant message comprising a set of database communication macros to an intermediate host through Internet; the intermediate host transmits the first instant message to a second service program unit through Internet; the second service program unit retrieves the data required by the first service program unit from the company database according to the database communication macros of the first instant message; the second service program unit transmits a second instant message comprising the data required by the first service program unit to the intermediate host through Internet; and the intermediate host transmits the second instant message to the first service program unit through Internet.

Description

200822629 九、發明說明: 【發明所屬之技術領域】 本發·明是有關於一種自企業資料庫安全取得資料之方 法及其系統,特別是指一種利用即時通訊自企業資料庫安 全取得資料之方法及其系統。 【先前技術】 一商業上目前使用的資訊系統是由早期單機作業(程式與 資料庫是一體的)發展到小區域内的網路作業,再到現今流 订的跨公司甚至是跨國的系統,也就是現在流行的網際網 路(Internet)系:統。 /乡閲圖1’由於企業内對訊息即時性的需求,愈來愈多 系統需要進行整合。除了區域内數部主機的整合之外,此 種整合的範圍也可大到全球各分公司之整合,因此過去單 機的系統已不足以滿足這樣的需求,故有所謂主從式 flen叫架構的發展。如w 1所示,此種架構即將資 =庫糸統從各用戶端⑽ent)之程式中獨立出來、,而將 與各程式主機12獨立設置,於是藉㈣料庫共用 :方式,可達到資料即時性及連結性的需求。此—方式解 2小區域整合的問題,但對於大區域(如各分公 各200822629 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a method and system for securely obtaining data from an enterprise database, and more particularly to a method for securely obtaining data from an enterprise database using instant messaging. And its system. [Prior Art] A commercially used information system is developed from early stand-alone operations (program and database integration) to network operations in small areas, to current cross-company and even multinational systems. It is now the popular Internet (Internet) system: system. /Hometown Figure 1' Due to the need for instant messaging in the enterprise, more and more systems need to be integrated. In addition to the integration of several hosts in the region, the scope of such integration can be as large as the integration of branch offices around the world. Therefore, in the past, the single-machine system was insufficient to meet such requirements, so there is a so-called master-slave flen called architecture. development of. As shown by w1, this kind of architecture will be independent from the program of each client (10) ent, and will be set independently with each program host 12, so by means of (four) library sharing: way, can reach the data The need for immediacy and connectivity. This method solves the problem of small area integration, but for large areas (such as each

礙商間)之整合,則發生以下問題V f先’共用㈣庫也等於是讓資料 的環境下,且由於任何―邻,” “ …、用 機11必ΜΓ 要連結到資料庫主 或帳號之缺造舆密碼,因此代表任何—部主機 ak成系統安全上的問題。其次,各部程 5 200822629 式主機12與資料庫主機n的即一、 網路,則由於頻寬足夠並穩 、、σ右發生在小區域内部 是,若要進行跨區域的整有太大的問題。但 網際網路,但卻會面臨一./_濟的選擇是透過 低,甚至產生使用者益法 纟連度上會有明顯降 ,網際網路的頻宽镇木士免μ 八要原因即在於 的肩見逐不如内部.網路 的時間’更別提傳送節點的穩定 :,曰加:傳送 暴露在網際網路下也是—大隱憂。將貝料庫 —參閱圖2、3’因此’為因應以上域式架構 目珂企業界亦產生另一種作法 碭, 年作去,即多層式(Muhi〜Tie 。此種架構乃是主從式架構& & 你μ 土 飞木構之改良’也就是在資料庫24盥 使用者21之間再加一 φ R "、 c 、 中間主機’如網頁伺服器(Web ^023/使用者21與網頁飼服器23之間可藉由網際 網路22來進行通訊。因此,❹者21不會直接與後端資 料庫24連線,而是透過網㈣服器23間接取得資料。亦 即,如圖3步驟M.所示,使用者21先發出查詢需求。接 著,如步驟32所示,該查詢需求透過網際網路22.傳給該 網頁伺服器23。接著,如步驟33所示,網頁祠服器B再 與後端資料庫24連線取得資料 '㈣,如步驟%所示, 資料庫24將:資科傳回網頁伺服器23。接著,如步驟%所 示,網頁伺服器23將查詢結果送出至網際網路22。於是·, 如步驟3 6所示,使用者21可透過網際網路22取得查詢結 果。 在上述如圖2所述之利用網頁伺服器23之多層式架構 200822629 中’必須先架設網頁伺服器23,並向網路管理單位申抹一 個網址,’㈣將此網址對外公佈,供使用者21從世界各地 連接。於是’使用者即可透過網際網路22連線至網頁飼服 器23 ’再利用 '網頁伺服器23連線至資料庫24 it行資料查 詢或異動的工作。 如上所述,在如圖2、3之查詢流程中服 為了讓外部使用者21找到,必須對外公佈網址,供使用者 連線。然而,使用者21中當然也包含所謂的駭客。駭客 的入侵都是針對系統安全上的漏洞,或程式設計者的疏失 可能是系統運作的騎。在任何—部網頁伺服器23, ’泣些安全上的漏洞是防不勝防的。-般管理者既要服務 使用者21又必須防堵駭客的侵犯,常常疲於奔命。然而 由很多企業對於這種危機也不是很清楚,常常身處危機之 中而不自知。甚至,右 有些企業則以拒絕上網來面對這個 題,因而犧牲了企業的競爭力。 ‘ 所以,鑒於上述習知| 夫早棧作業、主從式架構及多層式 罙構的缺失,·有必要尋求解決之道。 、 【發明内容】 本發明之目的’即在提供—種利用即時通訊自 止業貝料庫安全取得資料之方法。 二是’本發明利用即時通訊自企業資料庫安全取得資 — 驟· U)透過一網際網路,一第一服務 粒式早7L發出一第_卽 ' 第-即時通訊訊,包括訊息至一中介主機,其中該 " 組資料庫溝通巨集;(b)透過該網 7 200822629 際網路,該中介主機將該笫一 ^ ^ 捋通訊訊息傳送至該第一 即日守通訊訊息所對應之—第二服務程式單元;^ 一即時通訊訊息中的資料庫溝據該弟 元自一企鞏眘料廑曰4 > 木該弟二服務程式單 庫取㈣卜服務程式單元所需的資料. ⑷透過該騎網路,該第二服務程式單元發出_第_、主 通訊訊息至該中介主機,其中 p 士、弟一即時 第一服声^十·»— δχ —ρ打通訊訊息包括該 f ^式早疋所高的資料;及⑷透過該網際網路兮 Γ;機:該第二即時通訊訊息傳送至該第-服務程式: ’::在該第一服務程式單元及第二服務程此 不知道對方網路位址的情況 彼此' 該企業資料庫獲取所需的資料。1弟—服務程式單元能自 此外,本發明之另一·目的, 訊自企«料庫安全取得資料之系統在M、—種利用即時通 於是,本發明利用即時通訊自 料之系統包含-企業資料庫、1介主^庫;全取得資 式單元及一第二服務程式單元。該第—服服務程 透Γ網際網路,發出-包括'组資料庫=::Γ 7通§“息至該中介主機。該第二服務 用 過一網際網路,接收該中介主機所傳來的第_ 乂透 息,再根據該第-即時通訊訊息中的資料庫_=訊訊 該企業貧料庫取得該第一服務程式單元所需的自 透網路,一第二即時通訊訊息至該二=、 /、中該弟二即時通訊訊息包括該第 栈 的資料。於是,透過該網際網路,該中八^式早兀所需 茨肀介主機可將該第二 8 200822629 即%通訊訊息傳送至該 — 服務程式單元及第二^務;;^程式單元’11以在該第一 ㈣^ ^彼此不知道對方網路位 ° .良各程式單元能自該企掌資料廑痛& 所需的資料。 耒貝枓庫獲取 本^明的有盈效果在於:由於企华資料庫俨沾 式單元沒有對外開放“業貝枓“的服務程 ^ 1放,自然沒有駭客入侵之問題,且對# 的任何溝通又可以卵古』咬且對外The integration of the business, the following problems occur, V f first 'shared (four) library is also equal to the data environment, and because of any "neighbor," "..., the machine 11 must be linked to the database master or account The lack of passwords, therefore, represents any security problems in the system. Secondly, each section 5 200822629 host 12 and the database host n, the network, because the bandwidth is sufficient and stable, σ right occurs inside the small area, if the cross-region is too large problem. But the Internet, but it will face a choice of /. _ 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济 济The shoulders are not as good as the internal. The time of the network is not to mention the stability of the transmitting node: the addition: the transmission is exposed to the Internet is also a big worry. Will be the library - see Figure 2, 3 'so 'in response to the above domain architecture to achieve another way of doing business in the corporate world, the year to go, that is, multi-layer (Muhi ~ Tie. This architecture is the master-slave Architecture &&&&&&&&&&&&&&& 21 and the web server 23 can communicate via the Internet 22. Therefore, the latter 21 does not directly connect to the backend database 24, but indirectly obtains data through the network (4) server 23. That is, as shown in step M. of Fig. 3, the user 21 first issues a query request. Then, as shown in step 32, the query request is transmitted to the web server 23 via the Internet 22. Then, as shown in step 33. The web server B then connects to the backend database 24 to obtain the data '(4). As shown in step %, the database 24 will: return the text to the web server 23. Next, as shown in step %, the webpage The server 23 sends the query result to the Internet 22. Thus, as shown in step 36, the user 21 The query result is obtained through the Internet 22. In the multi-layer architecture 200822629 using the web server 23 as described above in FIG. 2, 'the web server 23 must be set up first, and a web address is applied to the network management unit, '(4) This website is published for users 21 to connect from all over the world. Therefore, the user can connect to the web server 23 through the Internet 22 and reuse the web server 23 to connect to the database 24 it line. As described above, in the inquiry flow of FIGS. 2 and 3, in order to allow the external user 21 to find, the website must be publicly announced for the user to connect. However, the user 21 of course also includes The so-called hacker. The hacker's intrusion is aimed at system security vulnerabilities, or the programmer's negligence may be the riding of the system. In any of the web server 23, 'the security holes are hard to prevent. The general manager must serve both the user 21 and the anti-blocking hacker, often exhausted. However, many companies are not very clear about this crisis, often in danger. Even in the machine, some companies on the right refuse to access the Internet to face this problem, thus sacrificing the competitiveness of the enterprise. 'So, in view of the above-mentioned practices| The early stack operation, the master-slave architecture and multiple layers The absence of the structure, it is necessary to seek a solution. [Invention] The object of the present invention is to provide a method for securely obtaining data by using the instant messaging self-stopping industry library. The second is that the present invention utilizes Instant messaging from the enterprise database securely obtained - U) Through an Internet, a first service granular 7L sends a first _卽' instant message, including a message to an intermediary host, where the ; group database communication macro; (b) through the network 7 200822629 network, the intermediary host transmits the message to the first day-to-day communication message - the second service program unit ;^ The information in the instant messaging message is based on the data from the syllabus of the syllabus. The syllabus of the syllabus is used to obtain the information required by the service module. (4) Road, the second The service program unit sends a ___, main communication message to the mediation host, wherein the p-th, the younger one immediately serves the first service ^10·»- δχ- ρ communication message includes the information of the f ^ type early; And (4) through the Internet; machine: the second instant messaging message is transmitted to the first service program: ':: the first service program unit and the second service program do not know the other party's network address Situations of each other's enterprise database to obtain the required information. 1 brother-service program unit can be self-in addition, another object of the present invention, the system for obtaining data from the enterprise database is in the M, the use of instant access, the invention uses instant messaging self-material system included - Enterprise database, 1 master library; full acquisition unit and a second service program unit. The service-service service is transmitted through the Internet, including - including the group database =:: Γ 7-pass § "Intermediate to the intermediary host. The second service has used an Internet to receive the intermediary host. The first _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ To the second =, /, the second brother of the instant messaging message includes the information of the first stack. Therefore, through the Internet, the middle of the first type of application can be the second 8 200822629 % communication message is sent to the service program unit and the second service;; ^ program unit '11 in the first (four) ^ ^ do not know each other's network bit ° good program unit can be painful from the data & required information. The profit of the 耒 枓 获取 获取 本 ^ ^ ^ ^ ^ 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于 由于The problem, and any communication with ## can be bitten and externally

孝資 "效的控制,而使用者亦無從得知企 全性。力权式早凡的位置,因而大大提高系統的安 【實施方式】 有關本發明之前述及其他技術内容、特點與功效’在 以下配合參考圖式之三個較佳實施例的詳細說明中, 清楚的呈現。 在本發明被詳細描述之前,要注意的是,在以下的說 月内谷中,類似的兀件是以相同的編號來表示。 觀察習知利用網頁飼服器之多層式資料庫架構中,一 般網頁㈣器的運作方式是被動的,必料待使用者主動 連線後溝通才會產生,且由於是該網頁飼服器的運作方 弋疋被動的故必須公開該網頁伺服器之網址,以等待使 用者連線’因而產生了安全上的問題。至於,本發明中則 是利用即時通訊技術阻絕了外部網路對内部企業資料庫的 連線,使得外部無法直接連線至内部企業資料庫,而又能 滿足使用者安全取得内部企業資料庫中的資料之需求。 本發明利用即時通訊自企業資料庫安全取得資料之系 200822629 統之第一及第二較佳實施例可針對企業内部舊系統與網際 網路進行整合。—般而言,企業内部舊有系統為單機/區域 網路系統。此種單機/區域網路系統在過去已行之有年,當 中所累績出來的技術(Know_h〇w)也是企業的價值所在。不 論是管理流程規劃、軟體撰寫的實現系統的除錯、穩定性 =立、使用者操作的調整以及操作者的f慣養成,都是 奴者企業成長所累績出來的智慧。在面臨全球化的需求時 丄:切可能都要重新建立。然而,系統要重新建置彷彿是 上:革°P且系統的輔導上線又是另-個難題,*新系統 估的後’能不能至少保有原先的運作順暢度,是很難評 估的。因此,很多企業也撰 一 — 子&擇保持現況,而本發明第 及第一貫施例便以此 方案。 门疃為出發點,發展出最佳的解決 參閱圖4,本私明楚_ 搜^ 較乜貫施例適用於企業各獨立單 妆/£域網路系統之連 平 覆建_及人.正口由於糸統的連結性可降低重 策八:並籍此達成資料的即時性,以利進行決 朿分析,因此習知最佳連 ㈣订决 方式,然而安全性曰一去、: 式應是透過網際網路的 大問題。於是,太=隐憂,且系統重寫的投資也是一 區域網路系統端建1_支服=Λ知例中只針對每套單機/ 統透過此服務程式來溝通即^私式且各單機/區域網路系 如圖4所示,本發 業資料庫41、一 #一 ,、為之弟一較佳實施例包含一企 第二服務程式單一 艮矛々%式單兀42、一中介主機44、一 .式…及另-企業資料庫46。 10 200822629 圖4中的系統配置是美 I旦. -則是如何有效溝通。安二㈣ !.—是安全性;另 :二及弟二服務程.式單元45間建立中介主機44來解 決。亦即’第一服務程式單元4 . 4 士入參久乐一服務私式早元45 疋由止業内部透過網際網路43 1 中介主撼4zl η Ρ寺通汛的方式連結到此 元45力 第—服務程式單元42及第二服務程式單 ’此間在溝通時並不會知道對方主機的位置。, 因為連結是由内而外,故 , 程1罝_ , 故苐—服務程式單元U及第二服務 :兀5 ^不需開放任何管道’因而網路網路4 其他使用者無法連線進人,自慧有效杜絕骇客人侵。 至於’如何有效溝通的問題則可藉由建立—套 溝通巨集來解決。企業一 貝科庫 ,姑太政山 般糸統運作都是以資料庫為主軸 务明中的第—服務程式單元42及第二服務 一 45亦是分別直接連結企業資料庫4卜46。於是第:: 程式單元42及篦― 、疋弟一服務 分L、 弟—服務程式單元45透過此'套巨集來協 彼此運作,如此即可在乂凋 ^ ^ ^ ^ 吏用者保有原操作習慣的前題下, 又可保有最高的安全性。去㈣統之龐大投資 參閱圖 4、5 ’ 金 ~tir ^ ^-L· 含以下步驟。首先,較佳實 單元42之人隸_ 所不’ #使用第—服務程式 止業使用者想要獲取網際網路43另 貧料庫I中的資料時,該企業使止業 務程式單元42,而命令該第一服務曰元由=乍=弟—服 路43,發屮蜜.ρ 士 式早兀42透過網際網 U一弟一即時通訊訊息至中介主機44,其中該第 200822629 -即時通訊訊息内包括座 發明之較佳實施例中”該n溝通巨集。此外,在本 訊息,藉以可進—步提 通訊訊息是經‘過加密之 接菩,i /“本發明運作時之安全性。 44將該第—即:::所二’:過網際網路43 ’該中介主機 連接之第二服務程式單元^运至與該企業資料庫#直接電 資料庫:通^驟二所示,根據該第-即時通訊訊息t的 4——US服務程式單元45自 然後,如牛W Γ 42之企業使用者所需的資料。 程式單元-發出—第二即時通訊訊; 中該第二即時通訊訊息包㈣第f中介主機仏其 使用者所需的資料。此外在ϋ務程式單元42之企業 第二即時通气$自β Χ月之較佳實施例中,該The filial piety "effective control, and the user has no way to know the integrity. The above-mentioned and other technical contents, features and effects of the present invention are greatly improved in the detailed description of the three preferred embodiments of the present invention. Clear presentation. Before the present invention is described in detail, it is to be noted that in the following description of the month, similar components are denoted by the same reference numerals. Observing the traditional multi-layer database architecture using the webpage server, the general webpage (four) device operates in a passive manner, and it is expected that the communication will be generated after the user actively connects, and because it is the webpage feeder If the operation is passive, the web address of the web server must be disclosed to wait for the user to connect. This creates a security problem. As for the invention, the instant messaging technology is used to block the connection of the external network to the internal enterprise database, so that the external can not directly connect to the internal enterprise database, and the user can securely obtain the internal enterprise database. Demand for information. The present invention utilizes instant messaging to securely obtain data from an enterprise database. The first and second preferred embodiments of the present invention can integrate the old system and the Internet within the enterprise. In general, the old system in the enterprise is a stand-alone/regional network system. This stand-alone/local network system has been in existence for some years, and the technology that has been accumulated (Know_h〇w) is also the value of the enterprise. Regardless of the management process planning, software writing, the system's debugging, stability, adjustment of the user's operation, and the operator's habit of cultivation, are the wisdom of the growth of the slave company. In the face of the need for globalization 丄: It may have to be re-established. However, the system has to be re-established as if it were: leather and the system's tutoring is another problem. * After the new system is evaluated, it is difficult to assess at least the original operational smoothness. Therefore, many companies have also written a sub- & selection to maintain the current situation, and the first and second embodiments of the present invention use this scheme. The threshold is the starting point, and the best solution is developed. See Figure 4. This is a private example. The search method is applicable to the company's independent single makeup/domain network system. Because of the connection of the system, the mouth can reduce the policy 8: and use this to achieve the immediacy of the information, in order to facilitate the analysis of the decision, so the best way to learn (4), but the security is awkward, It is a big problem through the Internet. So, too = hidden worry, and the system rewrite investment is also a regional network system end 1_ support = knowing that only for each set of stand-alone / system through this service program to communicate that is private and each stand-alone / Regional network is shown in Figure 4, the hairdressing database 41, one #1, and the younger one preferred embodiment includes a second service program, a single 艮 々 々 式 式 、 、 、, an intermediary Host 44, one.... and another-enterprise database 46. 10 200822629 The system configuration in Figure 4 is US I. - How to communicate effectively. An Er (four)! .- is security; another: the second and the second service. The unit 45 establishes an intermediary host 44 to resolve. That is, the 'first service program unit 4.4. The entrants enter the ginseng music service private morning 45 疋 by the internal industry through the Internet 43 1 intermediary master 撼 4zl η Ρ 汛 汛 汛 汛 连结 连结 45 45 45 The force-service program unit 42 and the second service program list 'will not know the location of the other host when communicating. Because the link is from the inside out, therefore, the process is 1罝_, so the service program unit U and the second service: 兀5 ^ no need to open any pipes' thus the network network 4 other users can not connect People, self-reliance effectively eliminates the invasion of guests. As for the question of how to communicate effectively, it can be solved by establishing a set of communication macros. In the case of the company, the company is based on the database. The service module 42 and the second service are also directly linked to the enterprise database. So:: program unit 42 and 篦-, 疋弟一 service points L, brother-service program unit 45 through the 'set of macros to cooperate with each other, so that you can Under the premise of operating habits, the highest security can be maintained. Go to (4) to make a huge investment. See Figure 4, 5 ’ gold ~tir ^ ^-L· with the following steps. First, when the user of the preferred real unit 42 wants to obtain the data in the internet network 43, the enterprise causes the business program unit 42 to And ordering the first service unit by =乍=弟-服服路43, 发屮蜜.ρ士式兀42 through the Internet U-di brother an instant messaging message to the intermediary host 44, wherein the 200822629 - instant messaging The message includes the n-communication macro in the preferred embodiment of the invention. In addition, in this message, the communication message can be forwarded and encrypted, and the security of the present invention is safe. Sex. 44 the first--::: two: 'over the Internet 43' the second service program unit connected to the intermediary host is transported to the enterprise database #direct electrical database: as shown in the second step, According to the first-instant messaging message t 4 - the US service program unit 45 is natural, such as the information required by the enterprise user of the cow W Γ 42. Program Unit - Issue - Second Instant Messaging; The second instant messaging packet (4) is the mediator's required information for the user. In addition, in the preferred embodiment of the second instant ventilation of the enterprise of the service program unit 42 from β Χ month,

HfL訊息是經過加密之訊息 以 本發明運作時之安全、性。 日乂了進—步提高 』接著’如步驟55所示,透過網際網路43 — 將該第二”通訊訊料送至該第—服務程式=;主機 f在㈣—服務程式單元42 &第二服務程p早凡42 ’ 此不知道對方網路位址的情 式早几衫彼 能自該企業資料庫46獲取所需的資料弟務程式單元42 參閱圖4,同理,當使 $ .使用者抑要⑽ 程式單元45之企業 資料時此企宰Γ;Γ43另一端之企業資料庫41中的 ,而>令”1 错由操作該第二服務程式單元45 弟—服務程式單元45透過網際網路43,發出一 12 200822629 第三即時通訊訊息至中介主機44 息内包括-組資料庫溝通巨集。此外、中該弟二即時通訊訊 施例中,哕第- g 士 在本發明之較佳實 落弟二即時通訊訊魚杲締 進一步提古太 < ' 匕、’工匕口岔之訊息,藉以可 呵本發明運作時之安全性。 接著’透過網際網路Μ,兮士 通訊訊息傳送至與該企業資料二/直主^^該^三即時 程式單元41。接著,妒姑 接電連接之弟一服務 溝通巨集,今第—服/即時通訊訊息中的資料庫 得該第二服務程式單元45之人掌止業資料庫41取 ,透過網際網路43 ,兮第止業使用者所需的資料。然後 時通訊訊.息至該中介=了Τ式單元42發出一第四即 括該第二服務程式單元45 四即時通訊訊息包 ’在本發明之較佳實施例中者㈣㈣料。此外 加密之訊息,藉以可進弟四即時通訊訊息是經過 接 少鈇回本發明運作時之安全性。 接者,透過網際網路 通訊訊息傳送至該第二服務_」W44㈣第四㈣ 務程式單“2及第二服;:兀42 ’猎以在該第-服 路位址的情況下,該第_=式早兀45彼此不知道對方網 廑41«雨 .服務程式單元45能自該企聿資料 庫41獲取所需的資料。 杀貝# 參閱圖6,本發明箆— _ 路系統與網際網路進行整2佳實施例適用於單機/區域網 例包含-網頁飼服器47本發明系統之第二較佳實施 d - 弟—服務程式單元42、中介主嬙 …弟二服務程式單元45及企業資料庫46。巾"主機 亦即,在該第二較隹告 焉苑例中,需先建立對外開放的 13 200822629 網頁伺服器47,且八▲ 務程式單元42與第二服菸,、:部查詢’並設置該第一服 域毅路系統蠕的第二服務程式^早745。接著,在單機/區 的第一服務程式單元42工早兀45與網頁飼服器47端 便可透過劉覽号先 9 中介主機44。於是,使用者 &无連線至網頁飼服哭d ^ 務程式單元42,傳 σσ ,再利用該第一服 早兀45,以取得企 心至弟一服務程式 菓貝科庫40中的資料。 Φ 由於早機/區域網路系統端的二 _ ^ 頁伺服器47媸沾铱 服私私式早兀45及網 的第一服務程式單元 44溝通,彼此盔 都疋通過中介主機 。此外,過:;:對方的位置,自然㈣ 也中疋透過資料庫巨集溝通,可有效和岳丨^ 狀況,因此,盾止抑w / J有效&制任何 原先早栈/區域網路系統 接成為網頁朽服即π ,. <止業貝科庫46可直 '罔頁句服“7的資料庫後台,故 再延用,因而為企f全球化_ h '死之奴貝可一 ▲ 系衣化獒供一個無痛的升級方案。 含以6: 7’與該系統第二較佳實施例對應:方法包 二。百先’如步驟Μ所示,使用者將-資料庫杳 序傳送至該網頁飼服器47及第一服務程式單元4-2 /二服務程式% 70 A再根據該資料庫查詢請求產生該 弟一即時通訊訊息。 接著,依序進行步驟51〜55。由於此圖7中的步驟 〜55與前述圖5中的步驟51〜55完全相同,因此在此該可 不需再加以贅述。 。八然後,如步驟56所示,該第一服務程式單元42將自 該企業資料庫46所取得的資料依序傳送給該網頁铒服器〇 14 200822629 及使甩者。 多閱圖-8,本發明第三較 員可透過網際網路43,利用即:广用於讓公司的業務 ,以便查詢即時資訊。本發明=訊技術連線到公司系統 一使.用者裝置仏第—服務程式單之^較佳實施例包含 二服務程式單元45及企業資料庫早::中介主機44、第 的使用者裝置48内建立第1°,/,可在使用者端 端亦建立第二服務程式單元45,而^兀42’而公司系統 二者間建立中介主機44 為/安全性考量’亦於 . 有溝通都是通過中介主機44, 便能兼顧查詢的即時性及,統安全性。 參閱圖8、9,與該系綠哲— 含以下+驟。、, ’、、、二較佳實施例對應之方法包 n二百’如步驟49所示,該使用者將資料庫查 ;;二=使用者裝置48,該第—服務程式單… 根據=料庫查詢請求產生勒—即時通訊訊息。 接者—,依序進行步驟51〜55。由於此圖$中的步驟 5!〜55與刖述圖5中的步驟〜5 ” 不需再加㈣述。 5 w相同,因此在此综可 〆然後’如步驟57所示,該第—服務程式單元42將自 該企業資料庫46所取得㈣料呈現於該❹者裝置48上 因此’本發明之特徵在於,在使用者透過網際網路杳 :業㈣庫的過程中’對外公開的是中介主機。只要欲 查詢企業資料庫之使用者利用服務程式單元主動連上中介 主機’使用者的需求便可透過該中介主機傳遞企 15 200822629 庫端的另-支服務程式單元,企業資料服 元再根據使用者的需求自企業資料 =程式單 資料。由於企業資料庫端的服務程式單元沒有;=的 自然沒有駭客人侵之問題,㈣外的任何溝通=開放, 效的控制,而使用者亦無從得知企業資料庫端服:二有 元的位置,因而大大提高I统的安全性。 4式早 …歸納上述,本發明利用即時㈣自企業 得資料之方法及其系统是ώ γ _ ,、、; 女全取 ^ _ 错由在育料需求端以及企章眘粗 2各設置-„程式單元,再於二服務程式單元間言= ^主機',於疋該二服務程式單元間可以中介主機 ,透過網際網路,利料時通訊技術互通即時訊息”, 於貧料需求端所發出的即時通訊訊 :’因而可請求企業資料庫端的服務程式= 庫取得資料。 糸貝科 &惟以上所述者,僅妹發明之較佳實施例而已,^ ^以此限定本發明實施之範圍’即大凡依本發明中請:利 範圍及發明說明内容所作之簡單的等效變化與㈣, 屬本發明專利涵蓋之範圍内。 【圖式簡單說明】 圖1是一系統方塊圖,說明一羽Α 1 . 口况月白1知主從式資料庫架構.. 構 運 圖2是一系統方塊圖’說明-習知多層式資料庫架 圖3是-流程圖,說明該習知多層式資料庫架構之 16 200822629 作流程; 業資料庫安全取得資料…本發明利用即時通訊自企 。取侍貝枓之糸統之-第-較佳實施例; 圖5疋·矛王圖,言兒明說明本發明利用即時通 業資料庫安全取得資料之方法之—第一較佳實施例;。止 疋一糸統方塊 圖6是一系統方塊圖,說明本發明利用即時通 業資料庫安全取得資料之系統之一第二較佳實施例;企The HfL message is an encrypted message that is safe and flexible in the operation of the present invention. In the future, as shown in step 55, the second "communication message is sent to the first service program through the Internet 43"; the host f is in (4) - the service program unit 42 & The second service process is as early as 42'. I don't know the other party's network address. I can get the required data from the enterprise database 46. See Figure 4, and similarly, when $. User Suppression (10) This is the enterprise data of the program unit 45; the other is in the enterprise database 41 at the other end, and the >1 is wrong by operating the second service program unit 45-service program The unit 45 sends a 12 200822629 third instant messaging message to the intermediary host 44 via the Internet 43 to include a group database communication macro. In addition, in the case of the younger brother of the instant messaging newsletter, the 哕-g 士 in the invention of the better real brother 2 instant messaging fish 杲 杲 提 提 & & & & ' ' ' ' ' ' ' ' ' In order to ensure the safety of the operation of the invention. Then, 'via the Internet, the gentleman communication message is transmitted to the company data/secondary program unit 41. Then, the 弟 接 接 接 一 一 一 一 一 一 一 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务, the information required by the first user. Then, the message is sent to the agent. The unit 42 sends a fourth, that is, the second service program unit 45. The instant messaging message package is in the preferred embodiment of the present invention (four) (four). In addition, the encrypted message allows the instant messaging message to be entered into the security of the invention. Receiver, transmitted to the second service via the Internet communication message _"W44 (four) fourth (four) service program list "2 and second service;: 兀 42 'hunting in the case of the first service route address, The _= type early 兀 45 does not know each other's network 廑 41 «rain. The service program unit 45 can obtain the required information from the enterprise database 41. Killing Bay # Referring to Figure 6, the present invention _ _ road system and the Internet The network is implemented in two embodiments. It is applicable to a single/regional network. Including a webpage server 47. The second preferred embodiment of the system of the present invention is a di-division-service program unit 42, an intermediary host, a second server module 45. And the enterprise database 46. The towel " host, that is, in the second comparative report, the first need to establish a 13 200822629 web server 47, and the eight program unit 42 and the second service ,,: the department query 'and set the second service program of the first service domain Yi Road system creep ^ early 745. Then, the first service program unit 42 in the stand-alone / district is 45 early and the web feed server 47 end You can use the Liu Wanghao first 9 intermediary host 44. So, the user & no connection to the web page Serve the crying unit 4, pass σσ, and then use the first service as early as 45 to obtain the information in the heart of the service program, the fruit library 40. Φ Because of the early machine / regional network system The second _ ^ page server 47 媸 铱 私 私 私 及 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45 45沟通 沟通 疋 资料 资料 资料 资料 资料 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋 疋Bekoku 46 can be directly 'squatting sentence sentence service' 7 database backstage, so it is extended, so for the enterprise f globalization _ h 'death slaves can be a ▲ clothing for a painless upgrade program. The inclusion of 6:7' corresponds to the second preferred embodiment of the system: method package 2. As shown in the step ,, the user transmits the database sequence to the web page feeder 47 and the first service program unit 4-2 / the second service program % 70 A and then generates the data according to the database query request. Brother an instant messaging message. Next, steps 51 to 55 are sequentially performed. Since steps 55 to 55 in FIG. 7 are identical to steps 51 to 55 in FIG. 5 described above, it is not necessary to repeat them here. . Then, as shown in step 56, the first service program unit 42 sequentially transmits the data obtained from the enterprise database 46 to the web server 2008 14 200822629 and the entrant. Referring to Figure-8, the third member of the present invention can use the Internet 43 to utilize the business widely used to query the instant information. The invention is connected to the company system, the user device, the first service program, and the preferred embodiment includes two service program units 45 and an enterprise database. The first service module 45 is established in the user terminal 48, and the second service program unit 45 is also established at the user end, and the intermediary system 44 is established between the company system and the security consideration is also considered. Through the intermediary host 44, it is possible to take into account the immediacy of the query and the security of the system. See Figures 8 and 9, and the Department of Green Philosophy - with the following +. The method package corresponding to the preferred embodiment of ',, and two is as follows: as shown in step 49, the user checks the database; the second = user device 48, the first service program list... The database query request generates a Le-IM message. Receiver - Steps 51 to 55 are performed in sequence. Since the steps 5!~55 in this figure $ and the steps in the figure 5~5" need not be added (4), 5 w is the same, so in this case, then, as shown in step 57, the first - The service program unit 42 presents the (four) material obtained from the enterprise database 46 to the user device 48. Therefore, the present invention is characterized in that it is publicly disclosed in the process of the user accessing the Internet through the Internet (4) library. It is a mediation host. As long as the user who wants to query the enterprise database uses the service program unit to actively connect to the intermediary host's user's needs, the intermediary host can be used to transmit the enterprise 15 200822629 library-side service program unit. According to the user's needs, the company data = program data. Because the service program unit at the enterprise database is not; = naturally, there is no problem of guest intrusion, (4) any communication outside = open, effective control, and the user It is impossible to know the enterprise database end service: the position of the two yuan, thus greatly improving the security of the system. 4 type early... In summary, the present invention utilizes the method of instant (4) data obtained from the enterprise and The system is ώ γ _ , , , ; female all take ^ _ wrong by the breeding demand end and the business chapter carefully 2 settings - "program unit, then between the two service program unit = ^ host', Yu The two service program units can mediate the host, through the Internet, and the instant messaging technology is used to communicate with each other. The instant messaging message sent from the poor demand side: 'Therefore, the service program on the enterprise database can be requested.糸贝科& 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 The equivalent change and (4) are within the scope of the patent of the present invention. [Simplified illustration of the drawing] Figure 1 is a system block diagram illustrating a Α . 1.                               Figure 2 is a system block diagram 'description-preferred multi-layer database shelf diagram 3 is - flow chart, illustrating the conventional multi-layer database architecture 16 200822629 process; industry database security acquisition data ... the present invention Use instant messaging to self-employ.取 枓 枓 - 第 第 第 第 第 第 第 较佳 ; ; ; ; 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 较佳 矛 较佳 矛 矛 矛 矛 矛 矛 矛 矛Figure 6 is a system block diagram showing a second preferred embodiment of the system for securely obtaining data using the instant database;

圖7是—流程圖,說明說明本發明利用即時通訊自八 業資料庫安全取得資料之方法之一第二較佳實施例; 止 圖8是—系統方塊圖,說明本發明利用即時通訊自八 業資料庫安全取得資料之系統之一第三較佳實施例;及止 圖9是一流程圖,説明說明本發明利用即時通訊自八 業資料庫安全取得資料之方法之一第三較佳實施例。FIG. 7 is a flow chart illustrating a second preferred embodiment of the method for securely obtaining data from an eight-industry database using instant messaging; FIG. 8 is a system block diagram illustrating the present invention utilizing instant messaging from eight The third preferred embodiment of the system for securely obtaining data from the industry database; and FIG. 9 is a flow chart illustrating a third preferred embodiment of the method for securely obtaining data from the eight industry database using instant messaging. example.

17 200822629 【主要元件符號說明】 11 ........ •♦資料庫主機 43 … …·網際網路 12....... …程式主機 44 ·…· •…中介主機 21 - •…, ••使用者 45 · •… •…苐一月良務程式單 22…·… …網際網路 元 2 3....... …網頁伺服器 46 ••… …·企業資料庫 24....... ••資料庫 47 ··… …·網頁伺服器 31〜36… ••步驟 48…… …·使用者裝置 4 1 ,#**.** "企業資料庫 49…" •…步驟 42……* ••第一服務程式單 50 〜57 —步驟 元17 200822629 [Explanation of main component symbols] 11 ........ • ♦ Database host 43 ... Internet Internet 12....... Program host 44 ·...· •...Intermediary host 21 - •..., ••User 45 · •... •...苐Jank Service Program List 22...·...Internet Element 2 3.............Web Server 46 ••... Library 24....... ••Database 47 ··......Web Servers 31~36... ••Step 48... User Equipment 4 1 , #**.** "Corporate Information Library 49..." •...Step 42...* •• First Service Program Sheet 50~57—Step Element

1818

Claims (1)

200822629 、申明專利範圍 1. 一種利用即時诵却ώ γ 自止業資料庫安全;Φι彳I 包含以下步驟: 早文王取仔貝枓之方法, (a) 透過一網際網路, -即時通訊訊息至—中人㈣矛“呈式單疋發出-第 息包括一包資4 ,其中該第一即時通訊訊 、、且貝枓庫溝通巨集; (b) 透過該網際絪敗分丄 訊息傳送至兮、 “ ;|主機將該第一即時通訊 式單元;w即時通訊訊息所對應之一第二服務程 (C)根據該第一 gp n主、 該第二服務.程式… 息中的資料庫溝通巨集, 齡 '早70自一企業資料庫取得該第—服務程 式早凡所需的資料;, 服知私 (d) 透過該網際網路, — 二即時通訊訊息…人 程式早元發出-第 自包括节笫' 主機’其中該第二即時通訊訊 服務程式單.元所需的資料;及 (e) 透過該網際網路,該中介 訊息傳送至該第-服務乂^丨主⑽㈣:即時通訊 式 及 各私式早兀,猎以在該第—服務程 —服務程式單元彼此不知道對方網路位址的 :::料該第—服務程式單元能自該企業資料庫獲取所 2. 依據申請專利笳囹筮1 s . 項所w^之利用即時通訊自企章資 料庫安全取得資料之方法,豆中兮 g …、 十一 ,、T $弟一即時通訊訊息及 弟二即時通訊訊息皆為經過加密之訊息。 3. 依據宇請專利範圍第2項所述之利用即時通訊自企業資 19 200822629 料庫文全取得資料之方法,豆中 接電連接至另-烤資料單元直 : 力止業貝枓庫,且該方法更包含以下步驟 ⑴透過該網際網路,該第二服務程式單 三即時通訊訊息至該中人幸-.. X出弟 自勺杠…,1主機,其中該第三即時通訊訊 心包括一組資料庫溝通巨集; ⑷透過該網際網路,該中介主機三 訊息傳送至嗜筮-H 士 I呀通Λ 單元; 弟二即時通訊訊息所對應之第-服務程式 (h) 根據該第三g主 該第-服務- 6 f料料通巨集, 務程式單元所需的資料; 取侍該弟_服 20 1 透過該網際絪收 _ ^ 、 |丨不、、.罔路,§亥弟一服務 四即時通訊訊息至^人Μ * 、早兀七出弟 ,^ 中,丨主機’其中該第四即時通訊邙 心包括該第二服務程式單元所需的資料;及 … 200822629 料庫安全取得資料之方法,其中該第— 接電連接至一網w相服抑 艮矛乃長式單元直 含-使用者將-資料庫查詢請求依序傳』*驟雨更包 器及第一服務程式單元, 、该網頁伺服 式早兀该弟一服務程式i L 資料庫查詢請求產生該第-即時通訊m自據該 該⑷步驟後更包含,該第_服務程式單:將^該方法在 ==取的資料依序傳送至該網頁飼服器及^亥企業資 項所述之利用即時通訊自企業資 =庫:王取…之方法,其中該第一服務程 於-使用者所使用之使用者裝:汉 驟前更包含哕#爾去收而落方法在該(a)步 』更已3該使用者將—f料庫查詢請 去梦署,·^结 nr» t I w褒4吏用 者裒置该弟一服務程式單元再根據嗦資祖_太、 產生該第1時通^庫查詢請求 Μ方法在该(e)步驟後更, έ,該第一服務程式單元將自資 料呈現於該使用者裳置上。 業貝科庫所獲取的資 ^ 一種利用即時通訊自企章眘袓庙〜 莱貝枓庫文全取得資料之系統, 包含: 一企業資料庫; 一中介主機; : -第-服務程式單元,用以透過一網際網路,發出 一包括-組資料庫溝較集之第—即時通訊訊息至該中 介主機·,及 -第二服務程式單元1以透過—網際網路,接收 該中介主機所傳來的第一即時通訊訊息,再根據該第— 21 200822629 即時通訊訊息中的資料庫 得該第-服務程式單元::’自該企業資料庫取 路,發出-第二即時通訊二::中:而透過該網際網 二即時通訊訊息包括該第二…主機’其中該第 其中.,透過該網際所需的資料; 通訊訊息傳送至节第 λ ;丨主機將該第二即時 -矛…」 服務程式單元,藉以在該第一服 ,::務程式單……道對丄:: •取^的=務程式單元能自該企業資料庫獲 1 ::申請專利範圍第7項所 即 料庫安全取得資料之李絲“ p才通Λ自企業貢 ’第-即〜 其中該第-即時通訊訊息及 弟-即日守通訊訊息皆為經過加密之訊息。 ’·:=專利範圍第8項所述之利用即時通訊 料*王取得諸之系統,更包含另-直接電連接至卞 弟一服務程式單元之企業資料庫,其中該第…二 _ I%更用以透過該網際網$ 服各私式 ’通巨集之第三即時_自至:;人包括-組資料庫溝 丨T ^也Λ息至該中介主機, 程式單元用以透過該網際網 Λ 力 的篦-Ρ 士 接收该中介主機所傳來 Si :通訊訊息,再根據該第三即時通訊訊息中的 •程式單二集:自該另一企業資料庫取得該第二服務 • :“的貝枓’繼而透過該網際網路,發出一第 =通訊訊息至該中介主機’該第四即時通:訊息包 。4-服務程式單元所需的資料,該中介主機再透過 ^網際網路,將該第四即時通訊訊息傳送至該第二服務 22 200822629 程式單元,藉以在該第一服務程式單元及第二服務程式 單兀彼此不知道對方網路位址的情況下·,該第二服務程 式單凡能自該另一企業資料庫獲取所需的資料。 ίο·依據申請專利範圍第9項所述之利用即時通訊自企業資 料庫安全取得資料之系統’其中該第三即時通訊訊息二 第四即時通訊訊息皆為經過加密之訊息。 11·依據中請專利範圍第8項所述之利用即時通訊自 :庫安全取得資料之系統’更包含—直接電連接至該; :服務程式單元之網頁健器,其中該網頁飼服器及第 -服務程式單元用以依序純_使用者 — 庫杳% 士太七斗雄 、不的 Μ料 未’㈣—服務程式單^根據該資料庫杳詢 -求產生該第一即時通訊訊息,且該第 更用以將自該企業資料庫所獲取 式早兀 頁伺服器及使用者。 胃抖依序傳达至該網 12.依據申請專利範圍帛8 士 參 料庫安全取得資料之系統,更包含資 ::用者裝置供設置該第一服務程式單元,且,—使: -者輪入-資料庫查詢請求,該第_服務…、吏用 .該資料庫查詢請求產生該第一即時通二二早70再根據 服務程式單元能將自該企ff料所取:’且该第一 該使用者裝置上。 彳獲取的資料呈現於 23200822629, affirmed the scope of patents 1. A kind of real-time use 诵 ώ γ self-stop business database security; Φι彳I includes the following steps: Early Wang Wang took the method of Beibei, (a) through an Internet, - instant messaging To - the middle person (four) spear "single-single-issued--the interest includes a package of 4, which is the first instant messaging, and the Bellow library communication macro; (b) through the Internet to lose the message transmission To the 兮, ";| host to the first instant messaging unit; w one of the instant messaging messages corresponding to the second service (C) according to the first gp n main, the second service. program information The library communication macro, age 'early 70 from a corporate database to obtain the information needed for the first-service program;, serving the private (d) through the Internet, - two instant messaging messages... Issued - the information required to include the "host" of the second instant messaging service program; and (e) through the internet, the intermediary message is transmitted to the first - service (10) (4): Instant messaging and private early Hunting in the first-service-service program unit does not know each other's network address::: The first-service program unit can obtain the information from the enterprise database. 2. According to the patent application 笳囹筮 1 s The method of using instant messaging to obtain data securely from the enterprise database, the instant messaging message of the bean, the instant messaging message and the instant messaging message of the brother are all encrypted messages. 3. According to the method of instant messaging from the enterprise resource 19 200822629, according to the second paragraph of the scope of the patent application, the bean is connected to the other-baked data unit. And the method further comprises the following steps: (1) through the Internet, the second service program single-three instant messaging message to the person-fortunately-.. X out of the self-drill bar..., 1 host, wherein the third instant messaging The heart consists of a set of database communication macros; (4) through the Internet, the intermediary host three messages are sent to the embarrassing-H 士 I Λ Λ unit; the second ISP corresponds to the first - service program (h) According to the third g main, the first - service - 6 f material material macro, the information required by the program unit; the service of the younger brother _ service 20 1 through the Internet to collect _ ^, | 丨 not,, 罔Road, § 弟 一 服务 服务 服务 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 即时 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中 其中... 200822629 Method for securely obtaining information from the repository, where — Connected to a network w, the service is suppressed, the long-range unit is directly included - the user will - the database query request is transmitted sequentially. * The shower is more packaged and the first service program unit, the webpage is early兀The younger one service program i L database query request generates the first instant messaging m from the data according to the step (4) further includes, the _ service program list: the method is sent to the data in the == sequence The method of using instant messaging from the enterprise feed=library: Wang f... as described in the web feed device and the ^Hui enterprise account, wherein the first service is in the user's use of the user: before the Han Including 哕#尔收收落落方法 in the (a) step has more 3 the user will be -f library query please go to the dream office, ^^nr» t I w褒4 user set the brother The service program unit further generates the first time pass library query request method according to the 嗦 祖 _ 太, after the step (e), the first service program unit presents the self-data to the user's skirt. Set it up. The company obtained by the company Bekoku ^ A system that uses instant messaging to obtain information from the company Zhangshen Temple ~ Laibei Kuwen, including: an enterprise database; an intermediary host;: - the first - service program unit, For transmitting an instant messaging message to the intermediary host through an internet connection, and the second service program unit 1 receives the intermediary host through the Internet. The first instant messaging message is sent to the first service module according to the database in the 21-2122629 instant messaging message: 'Getting the way from the enterprise database, issuing the second instant messaging two:: Medium: through the Internet 2 instant messaging message includes the second ... host 'which is the first., through the network required information; the communication message is transmitted to the section λ; 丨 the host will the second instant-spear... The service program unit, in the first service, the :: service program list... the road confrontation:: • The ^ program unit can be obtained from the enterprise database 1 :: the patent application scope item 7 isThe information on the safety of the database is obtained by Li Si, "P is only available from the company" - that is, the first - instant messaging message and the brother - the day-to-day communication message are encrypted messages. '·:= Patent scope number 8 The use of instant messaging material* Wang obtained the system described above, and further includes another-direct connection to the enterprise database of the service unit of the younger brother, wherein the second _I% is used to access the Internet through the Internet$ The third-time instant _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Receiving the Si: communication message sent by the intermediary host, and then according to the second program of the third instant messaging message: obtaining the second service from the other enterprise database: "Beibei" then passes the Internet, send a = communication message to the intermediary host 'The fourth instant pass: message packet. The information required by the 4-service program unit, the mediation host transmits the fourth instant messaging message to the second service 22 200822629 program unit via the Internet, whereby the first service program unit and the second service are provided. In the case where the program singles do not know each other's network address, the second service program can obtain the required data from the other enterprise database. Ίο· The system for securely obtaining information from the enterprise database by means of instant messaging as described in claim 9 of the patent application. The third instant messaging message 2 is the encrypted message. 11. The system for obtaining information by means of instant messaging from the library as described in item 8 of the scope of the patent application 'further includes directly connecting to the webpage; the webpage of the service program unit, wherein the webpage feeder and The first-service program unit is used to generate the first instant messaging message in order. _User - 杳 杳 士 太 七 、 、 、 、 、 、 、 、 、 ( ( ( ( ( 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务 服务And the first is used to obtain the early page server and user from the enterprise database. The stomach is transmitted to the network in sequence. 12. According to the scope of the patent application, the system for obtaining data securely by the 8th staff is further included: the user device is used to set the first service program unit, and, for example: The round-in database query request, the first _service..., 吏. The database query request generates the first instant pass 22 early 70 and then according to the service program unit can be taken from the enterprise ff: 'and the First on the user device.彳The information obtained is presented in 23
TW95141500A 2006-11-09 2006-11-09 Method and system of retrieving data safely from company database via instant messaging TW200822629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95141500A TW200822629A (en) 2006-11-09 2006-11-09 Method and system of retrieving data safely from company database via instant messaging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95141500A TW200822629A (en) 2006-11-09 2006-11-09 Method and system of retrieving data safely from company database via instant messaging

Publications (2)

Publication Number Publication Date
TW200822629A true TW200822629A (en) 2008-05-16
TWI318832B TWI318832B (en) 2009-12-21

Family

ID=44770817

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95141500A TW200822629A (en) 2006-11-09 2006-11-09 Method and system of retrieving data safely from company database via instant messaging

Country Status (1)

Country Link
TW (1) TW200822629A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI557579B (en) * 2012-03-29 2016-11-11 鴻海精密工業股份有限公司 Internet access system and method using the same

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI557579B (en) * 2012-03-29 2016-11-11 鴻海精密工業股份有限公司 Internet access system and method using the same

Also Published As

Publication number Publication date
TWI318832B (en) 2009-12-21

Similar Documents

Publication Publication Date Title
KR100505265B1 (en) Semantic information network(SION)
CN1703048B (en) Web service application protocol and SOAP processing model
US8799322B2 (en) Policy driven cloud storage management and cloud storage policy router
CN102468981B (en) Systems and methods for business network management discovery and consolidation
US20060106748A1 (en) System and method for orchestrating composite web services in constrained data flow environments
US20050071195A1 (en) System and method of synchronizing data sets across distributed systems
US7810160B2 (en) Combining communication policies into common rules store
US20050198351A1 (en) Content-based routing
US8359251B2 (en) Distributed commerce system
JP2002511961A (en) Universal domain routing and issue control system
CN101222406A (en) Dynamic system and method for virtual private network (VPN) application level content routing using dual-proxy method
JP2001527716A (en) Client-side communication server device and method
US7593337B2 (en) Packet processing system
BR112013016184A2 (en) computer-implemented method of generating maps of private spaces using sensors from mobile computing devices, server and storage media
CN102420774A (en) Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system
US7689699B2 (en) Method and apparatus for executing web services through a high assurance guard
TWI295779B (en)
US8826026B2 (en) Systems and methods for tracking electronic files in computer networks using electronic signatures
KR20180047467A (en) System and method for providing user profile
TW200822629A (en) Method and system of retrieving data safely from company database via instant messaging
JP2007013804A (en) Attribute designated communication method and communication apparatus thereof
Kodeswaran et al. Enforcing security in semantics driven policy based networks
WO2013177869A1 (en) Network platform and method for realizing multi-node type application need target
Pallapa et al. Precision: Privacy enhanced context-aware information fusion in ubiquitous healthcare
JP2003044502A (en) Information generation system for supporting ontology, method, program, recording medium