CN115827081A - Data operation method, device, server and storage medium - Google Patents
Data operation method, device, server and storage medium Download PDFInfo
- Publication number
- CN115827081A CN115827081A CN202111087119.3A CN202111087119A CN115827081A CN 115827081 A CN115827081 A CN 115827081A CN 202111087119 A CN202111087119 A CN 202111087119A CN 115827081 A CN115827081 A CN 115827081A
- Authority
- CN
- China
- Prior art keywords
- data
- target database
- operation request
- verified
- name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Computational Linguistics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention relates to the field of information processing, in particular to a data operation method, a data operation device, a server and a storage medium. The data operation method comprises the following steps: receiving a first operation request for discarding unverified data; wherein the input parameter of the first operation request comprises a target database name; analyzing the input parameters of the operation request, acquiring the name of the target database, discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database. The data operation method provided by the embodiment of the application is simple and rapid, saves data configuration time, reduces data configuration workload, reduces data configuration difficulty, and improves data configuration experience of a user.
Description
Technical Field
The embodiment of the application relates to the field of information processing, in particular to a data operation method, a data operation device, a server and a storage medium.
Background
The network management protocol definition configuration database comprises a candidate database and a running database, the candidate database is candidate, the running database is current running database, and the running database is not influenced by modifying the candidate database. The user can write the configuration data into the candidate database (these data written into the candidate database are referred to as alternative data), after confirming that no error exists, the data in the candidate database can be submitted to the running database through commit operation, so that the data in the running database and the candidate database are consistent, if no alternative data is needed, the candidate data can be discarded through discard-change operation, so that the candidate database is restored to the state consistent with the running database. The user can also write the data directly into the running database.
The network management protocol defines an edge-configuration operation, which is used for writing configuration data into a database, when a test-option parameter of the operation is set as a test-then-set, the data is checked when being written into the database, if the check is not passed, the writing is prohibited, and for convenience of description, the operation mode is recorded as an edge-configuration < test-then-set > operation. When the test-option parameter of the edge-config operation is set as set, data is not checked when being written into the database, and can be directly written into the database. The network management protocol defines a valid operation that can be used to check configuration data and verify data written with an edge-config < set > operation in the candidate database. Data that fails the check cannot be validated. And checking the data through the valid operation, and if the check is not passed, continuing to modify the data and then executing the valid operation again until the check is passed. Therefore, when the database needs to discard the alternative configuration data which fails to pass the verification, the database needs to discard the alternative configuration data together with the verified alternative data by issuing the reverse configuration data.
However, although the way of issuing the reverse configuration data can achieve the purpose of retaining the checked alternative data, the operation is very cumbersome under the condition of more configuration data. The method of discarding together with the verified alternative data, while simple, cannot retain the verified alternative data. Therefore, when both of the two ways face the problems of complicated procedure and large configuration amount when configuring data for the configuration database, that is, the operation process of configuring data is complicated, the time is long, and the workload is large, which affects the experience of configuring data for the configuration database by a user.
Disclosure of Invention
The embodiment of the application mainly aims to provide a data operation method, a data operation device, a server and a storage medium. The data configuration time is saved, the workload of data configuration is reduced, and the difficulty of data configuration is reduced, so that the data configuration experience of a user is improved.
In order to achieve the above object, an embodiment of the present application provides a data operation method, including: receiving a first operation request for revoking unverified data; wherein the input parameter of the first operation request comprises a target database name; analyzing the input parameters of the operation request to obtain the name of the target database; and discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database.
To achieve the above object, an embodiment of the present application provides a data operating apparatus, including: the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is used for receiving a first operation request, the first operation request is used for eliminating unverified data, and input parameters of the first operation request comprise a target database name; the analysis module is used for analyzing the input parameters of the operation request to acquire the name of the target database; and the processing module is used for discarding the unverified data in the target database according to the name of the target database and reserving the verified data in the target database.
In order to achieve the above object, an embodiment of the present application further provides a server, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the above data manipulation method.
To achieve the above object, an embodiment of the present application further provides a computer-readable storage medium storing a computer program, where the computer program is executed by a processor to implement the above data operation method.
According to the data operation method provided by the embodiment of the invention, after a first operation request for discarding unverified data is received, input parameters of the operation request are analyzed, the name of the target database is obtained, the unverified data in the target database is discarded according to the name of the target database, the verified data in the target database is retained, and if the verified data is valid or useful data, the problems of complicated configuration and large configuration amount in writing configuration data to a configuration database caused by discarding excessive useful data are avoided. The data operation method saves data configuration time, reduces data configuration workload, reduces data configuration difficulty, and improves data configuration experience of users.
Drawings
FIG. 1 is a flow diagram of a method of data manipulation according to one embodiment of the present invention;
FIG. 2 is a schematic diagram of a method of data manipulation provided in accordance with an embodiment of the present invention;
FIG. 3 is a flow diagram of a method of data manipulation according to another embodiment of the present invention;
FIG. 4 is a schematic diagram of a data manipulation device according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a server according to another embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the embodiments of the present application will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that in the examples of the present application, numerous technical details are set forth in order to provide a better understanding of the present application. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present application, and the embodiments may be mutually incorporated and referred to without contradiction.
One embodiment of the invention relates to a data manipulation method. The method comprises the following steps: receiving a first operation request for revoking the unverified data line; wherein the input parameter of the first operation request comprises a target database name; analyzing the input parameters of the operation request to obtain the name of the target database; and discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database, wherein if the unverified data is useless, the verified data is valid or useful data, so that the problems of complicated configuration and large configuration amount caused by discarding excessive useful data when the configuration data is written into the configuration database are solved. The data operation method saves data configuration time, reduces data configuration workload, reduces data configuration difficulty, and improves user data configuration experience.
The implementation details of the data operation of the present embodiment are specifically described below, and the following description is only provided for the convenience of understanding, and is not necessary for implementing the present embodiment.
The specific flow of the data operation method of this embodiment may be as shown in fig. 1,
Specifically, the first operation request is a data operation request sent to a server by a client or other management agent, wherein an input parameter of the first operation request includes a target database name; the data may be network management protocol NETCONF data or other protocol operations, and the target database may include an alternative database or an operating database or other form of database.
In addition, the first operation request comprises a custom operation request; before the receiving the first operation request for revoking the unverified data, the method further includes: and defining an operation response for the self-defining operation request in advance.
In one example, the first operation request includes a custom operation request, for example, the first operation request may be a custom discard-set operation request, where an input parameter of the discard-set operation request includes a target database name, the target database name may be an alternative database candidate or a running database running, and the discard-set operation request is used to discard unverified data in the target database. When the first operation request is a custom operation request, an operation response needs to be defined for the custom operation request in advance. For example, input parameters and operation responses are defined for a customized discard-set operation request, and the input parameters of the discard-set operation request include: a database name parameter for specifying a configuration database name; the operation response of the discard-set operation is an < rpc-reply > response containing < ok >.
Taking NETCONF protocol data as an example, as shown in fig. 2, when a NETCONF server receives an operation request issued by a NETCONF client, the NETCONF server parses the received operation request through a network protocol stack, and if the operation request is parsed to be a discard-set operation request, the discard-set operation request is sent to a discard-set operation processing module for processing. After the discard-set operation processing module executes the discard-set operation, the NETCONF server returns an operation response to the NETCONF client, wherein the returned operation response is a < rpc-reply > response containing < ok >.
And 102, analyzing the input parameters of the operation request to acquire the name of the target database.
For the above case, when the first operation request is a discard-set operation request, the network protocol stack sends the discard-set operation request to the discard-set operation processing module, and then the discard-set operation processing module analyzes the input parameters of the discard-set operation request, and the obtained target database name is the candidate database.
103, discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database.
In one example, each data in the target database is identified according to the data mark of each data in the target database; wherein the flag is used to indicate whether the data is verified. Discarding the identified unverified data in the target database, and keeping the identified verified data in the target database.
In one example, the data flag is set by: after a second operation request for writing data into a database is received, detecting whether the data to be written needs to be checked according to parameters of the second operation request; if the data to be written needs to be verified, setting a data mark indicating that the data is verified for the data to be written; and if the data to be written does not need to be verified, setting the data mark indicating that the data is not verified for the data to be written.
The second operation may be to process data written in the edge-config operation, and when data is written in, mark the checked data and the unverified data, respectively, for example, when a test-option parameter of the edge-config operation is set to be a test-then-set, the data needs to be checked when being written in the database, and when such an operation is referred to as an edge-config < test-then-set > operation, a data mark indicating that the data is checked is set for the data written in the edge-config < test-then-set > operation. When the test-option parameter of the exit-config operation is set to be set, data is not checked when being written into the database, and the operation is called exit-config < set > operation, and a data mark indicating that the data is not checked is set for the data written by the exit-config < set > operation.
Because the data written in the exit-config < test-then-set > operation is already provided with the data mark indicating that the data is verified, and the data written in the exit-config < set > operation is provided with the data mark indicating that the data is not verified, in the step, whether the data is verified or not can be identified according to the data mark of each data in the target database, the unverified data in the target database can be discarded, and the verified data in the target database can be reserved. Namely, the flexible and changeable data operation method for realizing the abandonment of the unverified data discards the data written by the edge-config < set > operation in the target database, retains the data written by the edge-config < test-then-set > operation in the target database, and the flexible and changeable data operation method for realizing the abandonment of the unverified data.
In another example, step 103 may also discard unverified data in the target database and retain verified data in the target database by discarding the backup data file in the target database and retaining the main data file in the target database. The backup data file is a backup of the main data file, the main data file is used for writing verified data, and the backup data file is used for writing unverified data. The backup method aims to obtain the name of a target database according to input parameters of an operation request after the first operation request for discarding unverified data is received, only data in backup data files in the target database are discarded, and main data files in the target database are still reserved, so that the problems that configuration is complicated and configuration amount is large when configuration data are written into a configuration database due to the fact that too many useful data are discarded after verification are avoided.
In addition, the first operation request received in step 101 for revoking the unverified data may be a custom operation request or a verification operation request; the input parameters of the checking operation request comprise indication parameters for indicating whether data abandonment is carried out after checking fails; the analyzing the input parameter of the operation request, after obtaining the name of the target database, further includes: and if the indication parameter indicates that the data is discarded after the verification fails, then discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database.
In a specific implementation, the first operation request includes a verification operation request, and after an operation request for performing valid verification on data is received, the valid verification operation request includes a discard-set-option input parameter, where the discard-set-option input parameter is used to indicate whether to perform data discarding after verification fails. And if the discard-set-option input parameter indicates enable, discarding unverified data in the target database according to the name of the target database when valid verification fails, and if the discard-set-option input parameter indicates disable, not discarding unverified data when valid verification fails.
By expanding the existing checking operation request, the input parameters of the user-defined operation request are analyzed to obtain the name of the target database, and the unverified data in the target database are discarded according to the name of the target database. The input parameter of the valid checking operation request can be analyzed to obtain the name of the target database, and when valid checking fails, the unverified data are discarded according to the name of the target database, so that the problems that configuration is complicated and configuration amount is large when configuration data are written into the configuration database due to the fact that all data are discarded are solved. Moreover, the data operation method for discarding the unverified data can be flexibly and changeably realized, the data configuration time is saved, the data configuration workload is reduced, the data configuration difficulty is reduced, and the data configuration experience of a user is improved.
Another embodiment of the invention is directed to a method of data manipulation. The following describes the implementation details of the data operation method of the present invention in detail, and the following is only provided for the convenience of understanding and is not necessary for implementing the present invention. Taking NETCONF protocol data operation in a network device as an example, the configuration database is candidtate and running, and the data operation is discard-set operation. If the initial candidate database and running database are consistent, both have 100 interfaces, the NETCONF client creates 100 interfaces in the candidate database through an edge-config < test-then-set > operation and configures parameters of the interfaces, and then the NETCONF client creates 10 interfaces in the candidate database through an edge-config < set > operation and configures parameters of the interfaces. The 10 interfaces created by using the edge-config < set > operation and the parameters thereof are the unverified data, the unverified data is subjected to the discarding operation, the schematic diagram of the network device structure is shown in fig. 2, and the specific data operation flow is shown in fig. 3.
And step 301, the NETCONF client sends a discard-set operation.
Specifically, the first operation request is a discard-set operation request sent by the NETCONF client to the NETCONF server.
In step 302, the NETCONF server receives the discard-set operation request, analyzes the input parameters of the operation request and obtains the database name candidate.
Specifically, after receiving the discard-set operation request, the NETCONF server sends the discard-set operation request to the discard-set operation processing module, and the discard-set operation processing module analyzes the input parameters of the discard-set operation request, so that the obtained target database name is the candidate database.
Specifically, the obsolete candidate database is discarded, and 10 interfaces and parameters thereof created by the edge-config < set > operation are the unverified data in the target database, so that the obsolete candidate database is restored to the state of only 200 interfaces. That is, the data retained is the data in the initial candidate database, as well as the data created in the candidate database by the exit-config < test-then-set > operation.
Specifically, the operation response in this step is defined in advance before the discard-set operation request, the discard-set operation request is issued by the NETCONF client when the NETCONF server receives the discard-set operation request, the discard-set operation is executed, and the unverified data is discarded, the NETCONF server returns the operation response to the NETCONF client, where the returned operation response is a < rpc-reply > response including < ok >.
The first operation request in this embodiment is a discard-set operation request, and the input parameters of the operation request are analyzed to obtain the name of the target database, where the obtained name of the target database is candidate; discarding the unverified data in the target database according to the name of the target database, wherein 10 interfaces created by an edge-config < set > operation and parameters thereof in this embodiment are the unverified data in the target database, and meanwhile, data in the target database, which is consistent with a running database, and data created in the candidate database by the edge-config < test-then-set > operation are retained. The problems of complicated configuration and large configuration amount caused by discarding too much verified data and writing configuration data into the configuration database are solved. The data operation method saves data configuration time, reduces data configuration workload, reduces data configuration difficulty, and improves data configuration experience of users.
It should be understood that the present embodiment is a system embodiment corresponding to the above method embodiment, and the present embodiment can be implemented in cooperation with the above method embodiment. The related technical details and technical effects mentioned in the above embodiments are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the above-described embodiments.
Another embodiment of the present invention relates to a data manipulation apparatus, as shown in fig. 4, including: a receiving module 401, configured to receive a first operation request, where the first operation request is used to discard unverified data, and an input parameter of the first operation request includes a target database name; an analyzing module 402, configured to analyze an input parameter of the operation request to obtain the name of the target database; the processing module 403 is configured to discard the unverified data in the target database according to the name of the target database, and retain the verified data in the target database.
In one example, the processing module 403 is configured to identify each data in the target database according to a data tag of each data in the target database; wherein the data flag is used for indicating whether the data is verified; discarding the identified unverified data in the target database, and keeping the identified verified data in the target database.
In an example, the processing module 403 further includes a checking module (not shown in the figure) configured to, after receiving a second operation request for writing data into the database, detect whether the data to be written needs to be checked according to a parameter of the second operation request; if the data to be written needs to be verified, setting a data mark indicating that the data is verified for the data to be written; and if the data to be written does not need to be verified, setting the data mark indicating that the data is not verified for the data to be written.
In one example, the processing module 403 is configured to discard a backup data file in the target database, and reserve a main data file in the target database, where the backup data file is a backup of the main data file, the main data file is used for writing verified data, and the backup data file is used for writing unverified data.
In an example, the processing module 403 is configured to, after a verification operation request, input parameters of the verification operation request include an indication parameter for indicating whether to perform data discarding after a verification failure, and detect whether the indication parameter indicates to perform data discarding after the verification failure; and if the indication parameter indicates that the data is discarded after the verification fails, then discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database.
It should be noted that, all the modules involved in this embodiment are logic modules, and in practical application, one logic unit may be one physical unit, may also be a part of one physical unit, and may also be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, a unit which is not so closely related to solve the technical problem proposed by the present invention is not introduced in the present embodiment, but this does not indicate that no other unit exists in the present embodiment.
Another embodiment of the present invention relates to a server, as shown in fig. 5, including: at least one processor 501; and a memory 502 communicatively coupled to the at least one processor 501; the memory 502 stores instructions executable by the at least one processor 501, and the instructions are executed by the at least one processor 501, so that the at least one processor 501 can execute the data manipulation method in the above embodiments.
Where the memory and processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting together one or more of the various circuits of the processor and the memory. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor.
The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory may be used to store data used by the processor in performing operations.
Another embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.
Claims (10)
1. A method of data manipulation, comprising:
receiving a first operation request for revoking unverified data; wherein the input parameter of the first operation request comprises a target database name;
analyzing the input parameters of the operation request to obtain the name of the target database;
and discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database.
2. The data manipulation method of claim 1, wherein discarding the unverified data in the target database according to the target database name and retaining the verified data in the target database comprises:
identifying each data in the target database according to the data mark of each data in the target database; wherein the data flag is used for indicating whether the data is verified;
discarding the identified unverified data in the target database, and keeping the identified verified data in the target database.
3. The data manipulation method of claim 2 wherein the data flag is set by:
after a second operation request for writing data into a database is received, detecting whether the data to be written needs to be checked according to parameters of the second operation request;
if the data to be written needs to be verified, setting a data mark indicating that the data is verified for the data to be written;
and if the data to be written does not need to be verified, setting the data mark indicating that the data is not verified for the data to be written.
4. The data manipulation method of claim 1, wherein discarding the unverified data in the target database according to the target database name and retaining the verified data in the target database comprises:
and discarding the backup data file in the target database, and reserving the main data file in the target database, wherein the backup data file is a backup of the main data file, the main data file is used for writing verified data, and the backup data file is used for writing unverified data.
5. The data manipulation method of any of claims 1 to 4 wherein the first manipulation request comprises a custom manipulation request;
before the receiving the first operation request for revoking the unverified data, the method further includes:
and defining an operation response for the self-defining operation request in advance.
6. The data manipulation method of any one of claims 1 to 4 wherein the first manipulation request comprises a check manipulation request;
the input parameters of the checking operation request comprise indication parameters for indicating whether data abandonment is carried out after checking fails;
the analyzing the input parameter of the operation request, after obtaining the name of the target database, further includes:
detecting whether the indication parameter indicates that the verification fails and then discarding the data;
and if the indication parameter indicates that the data is discarded after the verification fails, then discarding the unverified data in the target database according to the name of the target database, and reserving the verified data in the target database.
7. The data operation method according to claim 1, wherein the data is network management protocol NETCONF data, and the target database comprises an alternative database and an operating database.
8. A data manipulation device, comprising:
the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is used for receiving a first operation request, the first operation request is used for eliminating unverified data, and input parameters of the first operation request comprise a target database name;
the analysis module is used for analyzing the input parameters of the operation request to acquire the name of the target database;
and the processing module is used for discarding the unverified data in the target database according to the name of the target database and reserving the verified data in the target database.
9. A server, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of data manipulation according to any one of claims 1 to 7.
10. A computer-readable storage medium, storing a computer program, wherein the computer program, when executed by a processor, implements the data manipulation method of any one of claims 1 to 7.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111087119.3A CN115827081A (en) | 2021-09-16 | 2021-09-16 | Data operation method, device, server and storage medium |
| PCT/CN2022/119385 WO2023041052A1 (en) | 2021-09-16 | 2022-09-16 | Data operation method and apparatus, and server and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111087119.3A CN115827081A (en) | 2021-09-16 | 2021-09-16 | Data operation method, device, server and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN115827081A true CN115827081A (en) | 2023-03-21 |
Family
ID=85515045
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111087119.3A Pending CN115827081A (en) | 2021-09-16 | 2021-09-16 | Data operation method, device, server and storage medium |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN115827081A (en) |
| WO (1) | WO2023041052A1 (en) |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5357068B2 (en) * | 2010-01-20 | 2013-12-04 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Information processing apparatus, information processing system, data archive method, and data deletion method |
| CN104866242B (en) * | 2015-05-29 | 2018-12-04 | 上海京东到家元信信息技术有限公司 | A kind of data deletion system, method and data delete center |
| US10963435B1 (en) * | 2017-07-10 | 2021-03-30 | Amazon Technologies, Inc. | Data validation of data migrated from a source database to a target database |
| CN111198868B (en) * | 2019-12-12 | 2023-09-05 | 北京淇瑀信息科技有限公司 | Intelligent database-dividing real-time data migration method and device |
| CN111309707B (en) * | 2020-01-23 | 2022-04-29 | 阿里巴巴集团控股有限公司 | Data processing method, apparatus, electronic device, and computer-readable storage medium |
-
2021
- 2021-09-16 CN CN202111087119.3A patent/CN115827081A/en active Pending
-
2022
- 2022-09-16 WO PCT/CN2022/119385 patent/WO2023041052A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2023041052A1 (en) | 2023-03-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107911249A (en) | Order line sending method, device and the equipment of a kind of network equipment | |
| CN111600885A (en) | SQL injection vulnerability detection method and device, equipment and storage medium | |
| US20070174462A1 (en) | Reporting information to a network | |
| CN111966287A (en) | Data storage method, electronic device and storage medium | |
| CN114116253A (en) | Message processing method and system for message queue | |
| US11985029B2 (en) | Pico-base station configuration method and apparatus, storage medium and electronic apparatus | |
| CN111338869A (en) | Configuration parameter management method, device, device and storage medium | |
| CN111240920B (en) | Performance testing method, device, server and storage medium | |
| US20150249566A1 (en) | Apparatus for selecting master in redundancy system | |
| CN115827081A (en) | Data operation method, device, server and storage medium | |
| CN104618474B (en) | Facility information store method and device | |
| CN112737872B (en) | ARINC664P7 end system cross-network testing system and method | |
| CN116149803A (en) | Transaction processing method and device of database, electronic equipment and storage medium | |
| CN116089015A (en) | Method, device, equipment and medium for detecting locking of virtual machine operating system | |
| CN111651362B (en) | Test case generation method, device, storage medium and computer equipment | |
| US9519597B2 (en) | Communication apparatus and method based on shared memory | |
| CN111314805A (en) | Debugging method and device for intercommunication OMCI (OMCI) messages of GPON (gigabit passive optical network) system | |
| CN118138400B (en) | Equipment deceleration reminding method, product, equipment and storage medium | |
| CN114598536B (en) | Cloud platform virtualized data traffic safety monitoring method, system and storage medium | |
| CN113794583B (en) | Configuration method and device | |
| CN118413573B (en) | Resource management method, device, computer equipment, storage medium and product | |
| JP7664424B2 (en) | Method for verifying resource queue management interface, electronic device, and storage medium | |
| US10374898B2 (en) | Network revision evaluator | |
| CN113132152B (en) | Method and device for generating Netconf real-time candidate database | |
| US9489336B2 (en) | Method and system for record access in a distributed system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |