CN107247643A - A kind of data base management method, device, system, storage medium and equipment - Google Patents
A kind of data base management method, device, system, storage medium and equipment Download PDFInfo
- Publication number
- CN107247643A CN107247643A CN201710512167.XA CN201710512167A CN107247643A CN 107247643 A CN107247643 A CN 107247643A CN 201710512167 A CN201710512167 A CN 201710512167A CN 107247643 A CN107247643 A CN 107247643A
- Authority
- CN
- China
- Prior art keywords
- data base
- check code
- backup
- data file
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1466—Management of the backup or restore process to make the backup process non-disruptive
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/80—Database-specific techniques
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention discloses a kind of data base management method, device, system, storage medium and equipment.This method includes:Backup generation step, the target data file that will be stored in target database backups to volatile data base, to generate interim backup;Step is reset, in volatile data base, the password and/or authority of user in interim backup is reset;Replacement step, target data file is replaced with the interim backup in volatile data base.This method is additionally may included in the first generation step before backup generation step, and the first check code is generated to target data file;The second generation step after step is reset and before replacement step, the second check code is generated to target data file;And judgment step, judge whether the first check code and the second check code are identical, if the two is different, re-execute the first generation step to judgment step;If the first check code and the second check code are identical, above-mentioned replacement step is performed.
Description
Technical field
The present invention relates to a kind of data base management method, device, system, storage medium and equipment.
Background technology
In cloud field or other database trustship fields, it is necessary to which the third party of such as cloud service provider, trusteeship service business safeguards
User (hereinafter referred to as " maintenance side ") carries out routine maintenance to the database of client, for example, back up and monitor.Therefore, safeguarding
When side sets up database for client, meeting reservation management person user in database, subsequently to be safeguarded using the administrator
The database of client.
During the use of database, in some cases, when customer action database or importing data, number can be changed
The data such as the password and/or authority of the administrator reserved according to maintenance side in the user's table of storehouse, cause maintenance side can not log in number
According to storehouse.Typically for the database of those subsidiary operating system authentication functions, such as Oracle (inscriptions on bones or tortoise shells) database is safeguarded
Can by using operating system keeper's Account Logon database, reset maintenance side user data.But, for such as
The database without operating system authentication function such as MySQL, when above-mentioned situation occurs, maintenance side will be unable to log database
Carry out database manipulation.
For problem above, prior art discloses a kind of method that user is repaired by restarting database.But should
Method has the obvious disadvantage that.Specifically, during restarting database, client can be caused can not normally to access database and business
Terminal, inconvenience is caused to client, and then influence the service quality of ISP.
The content of the invention
For the defect solved the above problems with prior art, data base administration is realized the embodiments of the invention provide one kind
Method, device, system, storage medium and equipment, to make maintenance side to contact user or to restart database, so that it may
To complete the replacement of reserved administrator's password and/or authority, the quick solution to problem is realized, and do not influence user
Business operation, ensured the business demand of user.
In a first aspect, the embodiments of the invention provide a kind of method for realizing data base administration, this method includes:Backup life
Into step, the target data file that will be stored in target database backups to volatile data base, to generate interim backup;Reset step
Suddenly, in volatile data base, the password and/or authority of user in interim backup is reset;Replacement step, target data file is replaced
It is changed to the interim backup in volatile data base.
With reference in a first aspect, can also further be wrapped the embodiments of the invention provide a kind of method for realizing data base administration
Include:The first generation step before backup generation step, the first check code is generated to target data file;After step is reset
And the second generation step before replacement step, the second check code is generated to target data file;And judgment step, judge first
Whether check code and the second check code are identical, if the two is different, re-execute the first generation step to judgment step;If
First check code and the second check code are identical, then perform above-mentioned replacement step.
Second aspect, the embodiments of the invention provide a kind of device for realizing data base administration, the device includes:Backup life
Into module, the target data file for will be stored in target database backups to volatile data base, to generate interim backup;Weight
Module is put, password and/or authority in volatile data base, resetting user in interim backup;Replacement module, for by mesh
Mark data file replaces with the interim backup in volatile data base.
With reference to second aspect, a kind of device for realizing data base administration provided in an embodiment of the present invention can also be wrapped further
Include:The first generation module before backup generation module, for generating the first check code to target data file;Resetting module
The second generation module afterwards and before replacement module, for generating the second check code to target data file;And judge module,
Judge whether the first check code and the second check code are identical, if the two is different, then return to the first generation module;If first
Check code and the second check code are identical, then proceed to replacement module.
The third aspect, the embodiments of the invention provide a kind of system for realizing data base administration, the system includes second party
Face or the data bank management device and target database and volatile data base for combining second aspect.
Fourth aspect, the embodiments of the invention provide a kind of non-volatile memory medium, non-volatile memory medium tool
There is the instruction being stored therein, when the instruction is performed so that computing device data base management method, specifically, this refers to
Order includes:Backup generation instruction, the target data file that will be stored in target database backups to volatile data base, faced with generating
When back up;Reset indication, in volatile data base, resets the password and/or authority of user in interim backup;Replacement instruction, will
Target data file replaces with the interim backup in volatile data base.
With reference to fourth aspect, a kind of non-volatile memory medium provided in an embodiment of the present invention can further include,
The first generation instruction before backup generation instruction, the first check code is generated to target data file;After reset indication and
The second generation instruction before replacement instruction, the second check code is generated to target data file;And decision instruction, judge the first school
Test code and whether the second check code is identical, if the two is different, re-executes the first generation and instruct to decision instruction;If the
One check code and the second check code are identical, then perform above-mentioned replacement instruction.
5th aspect, the embodiments of the invention provide a kind of equipment, including memory, the computer that is stored with is executable to be referred to
Order, processor, processor is configured as the process that execute instruction is managed with implementation database, and the process includes:Backup generation step
Suddenly, the target data file that will be stored in target database backups to volatile data base, to generate interim backup;Reset step,
In volatile data base, the password and/or authority of user in interim backup is reset;Replacement step, target data file is replaced
For the interim backup in volatile data base.
With reference to the 5th aspect, a kind of equipment provided in an embodiment of the present invention, the process performed by the processor of the equipment is also
It may further include, the first generation step before backup generation step, the first check code generated to target data file;
The second generation step after replacement step and before replacement step, the second check code is generated to target data file;And judgement
Step, judges whether the first check code and the second check code are identical, if the two is different, re-executes the first generation step extremely
Judgment step;If the first check code and the second check code are identical, above-mentioned replacement step is performed.
Based on such scheme, maintenance side backs up and replaced by being performed in an operating system to target data file, and
The replacement operation of user cipher and/or authority is performed in volatile data base, has evaded the direct operation to target database, has made
Obtaining technical scheme will not intervene and influence the normal operation of target database, therefore, technical scheme energy
Maintenance side is contacted user or restart database, it is possible to complete administrator's password and/or the power reserved
The replacement of limit, realizes the quick solution to problem, and does not influence the business operation of user, has ensured the business demand of user.
Brief description of the drawings
Fig. 1 is the flow chart of data base management method 100 according to a first embodiment of the present invention.
Fig. 2 is the flow chart of data base management method 200 according to a second embodiment of the present invention.
Fig. 3 is the schematic block diagram of data bank management device 300 according to embodiments of the present invention.
Fig. 4 is the schematic block diagram of data bank management device 400 according to embodiments of the present invention.
Fig. 5 is the schematic block diagram of the system 500 of data base administration according to embodiments of the present invention.
Embodiment
To make the purpose and technical scheme of the embodiment of the present invention clearer, below in conjunction with the attached of the embodiment of the present invention
Figure, the technical scheme to the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is of the invention
A part of embodiment, rather than whole embodiments.Based on described embodiments of the invention, those of ordinary skill in the art
The every other embodiment obtained on the premise of without creative work, belongs to the scope of protection of the invention.
Embodiments of the invention are understood for convenience, introduce the several key elements introduced in embodiment description at this first:
User (User) table:User's table is one of most important authority list in database, and there being record in the table allows connection
To the user profile of database.Table includes the fields such as user name, password and authority;
Hash (Hash) function:Hash function comes from one in the set with many (or even unlimited amount) members
Value project value in the set with fixed qty (less) member, i.e., the data of arbitrary size are mapped to fixed size
Data.In addition, hash function can be used for determining whether two objects are equal;With
MD5 (Message-Digest 5, eap-message digest 5):MD5 algorithms are that a kind of widely used generation 128 is Hash
The hash function of value.Although MD5 is initially designed as being used as keyed Hash function, it is used as verifying extensively and to test now
Integrity of verified data.
The technical scheme of the embodiment of the present invention can apply to following scene, include but is not limited to:The reserved number in maintenance side
It is deleted according to librarian user, maintenance side can not log database;The reserved administrator in maintenance side is changed, this
In situation, the login password and/or authority of user can cause the side of maintenanceing log database or can not safeguard database by modification, tool
For body, a kind of situation is the login password or login password and authority as user while when being changed, maintenance side can not be logged in
Database performs database maintenance, and another situation is that the authority of only user is changed, maintenance side can log database, but
It is the authority that maintenance side loses modification user's table and management database, it is impossible to perform database maintenance work.In above scene,
The reserved keeper in maintenance side while ensureing that database is normally run, can be completed by technical scheme
The replacement of user.
First embodiment
Data base management method 100 according to embodiments of the present invention is described in detail below in conjunction with Fig. 1.
Fig. 1 is the flow chart of data base management method 100 according to embodiments of the present invention.As shown in figure 1, in step
S101, the target data file that will be stored in target database backup to volatile data base, to generate interim backup.
Embodiments in accordance with the present invention, volatile data base can be arranged in the physical machine of target database, or other things
On reason machine.Physical machine includes but is not limited to:Micro computer, minicomputer, medium-sized machine, large scale computer, giant computer or other can run number
According to the physical equipment in storehouse., can be directly in an operating system by mesh when volatile data base and target database are in same physical machine
The user's table reset is needed to copy in volatile data base in mark database;When volatile data base is in other physical machines, it can lead to
Cross network to connect physical machine, the network includes but is not limited to:LAN, Metropolitan Area Network (MAN) or wide area network, so, in an operating system
Can by such as FTP (File Transfer Protocol, FTP), SSL (Secure Sockets Layer,
SSL) etc. host-host protocol user's list file is backuped in volatile data base to the interim backup for generating user's table, can be with
Understand, the interim backup is and the identical database file of user's list file.It should be understood that the transmission of user's list file
It is not limited to use network, various non-volatile mobile memory mediums, for example:Magnetic storage apparatus is (for example, hard disk, floppy disk, magnetic
Bar), CD (for example, compact disk (CD), digital versatile disk (DVD)), smart card, flash memory device (for example, memory card, memory stick,
Keyed actuator), it can be used in transmission of user's list file between target database and volatile data base.
Generally, the version of volatile data base can be identical with the version of target database, is sent out when can so reduce backup
Raw probability of failure, improves operating efficiency.Optionally, in addition, volatile data base can be created before each execution method 100,
One can also be configured for this method 100 meet the database of above-mentioned condition as volatile data base.
Also, it is understood that ground, volatile data base is typically created by maintenance side, and maintenance side possesses to volatile data base
Administration authority.
Next, in step S102, in volatile data base, resetting the password and/or authority of user in interim backup.
In an embodiment of the present invention, as noted previously, as maintenance side has the administration authority of volatile data base, maintenance side
The interim backup of user's table can be accessed in volatile data base, and the keeper of replacement maintenance side uses in volatile data base
The password and/or authority at family.Specifically, in the interim backup, if administrator has been deleted, maintenance side is used
SQL (Structured Query Language, SQL) increase order increases keeper into interim backup
The data item of user;If the administrator is changed, maintenance side uses SQL more newer command, by administrator's
The reset data of password and/or authority is correct data.Finally refreshing volatile data base makes data come into force, so new data
It can store in interim backup.
In step S103, target data file is replaced with to volatile data base in interim backup.
In an embodiment of the present invention, by file branch mode same in step S101, interim backup is sent to
The relevant position of user's list file of target database, and replace user's list file.At this moment, it is only necessary to right in an operating system
Target database performs user's table and is loaded into operation, target database is reloaded user's table data, you can complete user's table
Reset.
Finally, method 100 deletes the interim backup file in volatile data base.
In an embodiment of the present invention, by using above-mentioned data base management method, maintenance side passes through in an operating system
To target data file execution backup and replacement, and in volatile data base, the replacement of execution user cipher and/or authority is grasped
Make, evaded the direct operation to target database so that technical scheme will not intervene and influence target database
Normal operation, therefore, maintenance side need not contact user or restart database, it is possible to complete reserved administrator
The replacement of password and/or authority.The quick response to problem and quick solution had so both been realized, and has not influenceed the business of user
Operation, has ensured the business demand of user.
Data base management method 100 according to a first embodiment of the present invention is described in detail above in association with Fig. 1, below will knot
Close the data base management method 200 of Fig. 2 detailed descriptions according to a second embodiment of the present invention.
Second embodiment
Although the execution speed of data base management method 100 of the invention is relatively fast, and user changes user on one's own initiative
The probability of table is relatively very low, but exists during method 100 is performed, and user to user table is operated, and makes user
The situation that table data change.
Fig. 2 is the flow chart of data base management method 200 according to embodiments of the present invention.
As shown in Fig. 2 in method 200, step S101, S102 and S103 of step S202, S203 and S206 and method 100
It is identical respectively, in order to simple, omit specifically describe herein.
In step S201, the first check code is generated to target data file.
As an example, it can use hash function etc. that the algorithm of data integrity verifying can be realized to target
Need the user's table reset to be calculated in database, and correspondingly generate a check code, i.e. the first check code, according to Hash
The nonidentity operation rule of function, the check code can be that (Secure Hash Algorithm 1 pacify for such as MD5 codes or SHA-1
Full hash algorithm 1) code etc..As an example, the present invention it is exemplary use MD5 codes as the verification of the embodiment of the present invention
Code, but the check code of the present invention is not limited to MD5 codes.
Specifically, other operating systems for Unix operating systems or based on Unix operating systems, for example,
Linux, Mac OS etc., can use " md5sum " program to carry out MD5 to target database user list file in an operating system
Computing, generates MD5 codes;For Microsoft's Windows operating system, " Get- can be used under PowerShell environment
FileHash ", which is ordered, to carry out MD5 computings to user's list file of target database and generates MD5 codes.
After step S203 completions, perform step S204, the second check code is generated to target data file.In order to determine
Whether user's table in target database is changed, in step S204, such as above-mentioned step S201, and user's list file is entered again
Row MD5 computings, generate the second check code.
It should be noted that in the verification of data integrity, can by compare identical file it is front and rear not in the same time
The MD5 codes of generation, to determine whether this document of later moment in time is changed, whether complete.Specifically, if same file is preceding
The MD5 code-phases of different time generation are same afterwards, then it is assumed that this document data within the period are complete, and data are not lost
Or changed;, whereas if the MD5 codes of front and rear different time generation are different, then it is assumed that this document data quilt within the period
Modification is lost.
Therefore, in step S205, judge whether the first check code and the second check code identical, if the two is different, weigh
It is new to perform S201 to S205;If the first check code is identical with second check code, S206 is performed.
As an example, if the first check code is different from the second check code, illustrate the process performed in method 200
In, user have changed user's table in target database, i.e. now user's table is different from the interim backup generated in S202, false
As performed S206 in this case, although the administrator of maintenance side can be reset, but can also reset user in method 200
To the modification of user's table in implementation procedure, and then have influence on the business operation of user.Therefore, if the first check code and the second school
Test code different, then method 200 is re-executed, when both first, second check codes are identical, just further perform step
S206。
Therefore, the data base management method of the embodiment of the present invention, further by carrying out data integrity school to user's table
Test, it is determined that the data of only maintenance side administrator have differences in the data of both interim backup and user's table, and other
Data are consistent.Therefore, because other data of user are not deleted or changed, the data depositary management of the embodiment of the present invention
Reason method so realize do not influence customer service operate in the case of, quickly complete reserved administrator's password and/
Or the replacement of authority.
Finally, after administrator is reset, method 200 deletes the interim backup in volatile data base.
Above in conjunction with Fig. 1 and Fig. 2, data base management method according to embodiments of the present invention is described in detail, below will
With reference to Fig. 3 to Fig. 5, description data bank management device according to embodiments of the present invention and data base management system.
Fig. 3 is the schematic block diagram of data bank management device 300 according to embodiments of the present invention.As shown in figure 3, the data
Library management device 300 includes:
Backup generation module 301, the target data file for will be stored in the target database backups to nonce
According to storehouse, to generate interim backup;
Module 302 is reset, in the volatile data base, resetting the described close of user described in the interim backup
Code and/or authority;With
Replacement module 303, it is described interim standby in the volatile data base for the target data file to be replaced with
Part.
Alternatively, device 300 can also include removing module, for after target data file is replaced, deleting described
Interim backup.
It is to be appreciated that the above-mentioned functions of modules in the data bank management device 300 of the embodiment of the present invention and/or
Other operations, for brief introduction, are omitted be described in detail herein to realize the corresponding flow of method in Fig. 1.
Therefore, the data bank management device 300 of the embodiment of the present invention, can make maintenance side to contact user or again
Open database, it is possible to complete the replacement of reserved administrator's password and/or authority.So both realized to the fast of problem
Speed response and quick solution, and the business operation of user is not influenceed, ensure the business demand of user.
Fig. 4 shows the schematic block diagram of data bank management device 400 according to embodiments of the present invention.As shown in figure 4, should
Data bank management device 400 includes:
First generation module 401, for generating the first check code to the target data file;
Backup generation module 402, the target data file for will be stored in the target database backups to nonce
According to storehouse, to generate interim backup;
Module 403 is reset, in the volatile data base, resetting the described close of user described in the interim backup
Code and/or authority;
Second generation module 404, for generating the second check code to the target data file;
Judge module 405, for judging whether first check code and second check code are identical, if the two is not
Together, then the first generation module 401 is returned;If first check code is identical with second check code, replacement is proceeded to
Module 406;With
Replacement module 406, it is described interim standby in the volatile data base for the target data file to be replaced with
Part.
Alternatively, device 300 can also include removing module, for after target data file is replaced, deleting described
Interim backup.
It is to be appreciated that the above-mentioned functions of modules in the data bank management device 400 of the embodiment of the present invention and/or
Other operations, for brief introduction, are omitted be described in detail herein to realize the corresponding flow of method in Fig. 2.
Therefore, the data bank management device 400 of the embodiment of the present invention, further by carrying out data integrity to user's table
Verification, ensure that in the case where not influenceing customer service to operate, quickly complete reserved administrator's password and/or
The replacement of authority.
Fig. 5 is the schematic block diagram of data base management system according to embodiments of the present invention.As shown in figure 5, the system 500
Including:Target database 501, volatile data base 502 and data bank management device 503, wherein the data bank management device 503 can
To be Fig. 3 to any middle data bank management device described in Fig. 4.
Further, embodiments in accordance with the present invention, also provide a kind of non-volatile memory medium, the non-volatile memories
Medium has the instruction being stored therein, when the instruction is performed so that computing device data base management method, specifically
, the instruction includes:Backup generation instruction, the target data file that will be stored in target database backups to volatile data base,
To generate interim backup;Reset indication, in volatile data base, resets the password and/or authority of user in interim backup;Replace
Instruction, target data file is replaced with the interim backup in volatile data base.
Alternatively, according to another embodiment of the present invention, the storage medium is additionally may included in before backup generation instruction
First generation instruction, the first check code is generated to target data file;Second after reset indication and before replacement instruction
Generation instruction, the second check code is generated to target data file;And decision instruction, judge that the first check code and the second check code are
It is no identical, if the two is different, re-executes the first generation and instruct to decision instruction;If the first check code and the second verification
Code-phase is same, then performs above-mentioned replacement instruction.
Alternatively, the storage medium can also include deleting instruction, after target data file is replaced, face described in deletion
When back up.
Further, according to another embodiment of the present invention, a kind of equipment, including memory are also provided, be stored with calculating
Machine executable instruction, processor, processor is configured as the process that execute instruction is managed with implementation database, and the process includes:
Backup generation step, the target data file that will be stored in target database backups to volatile data base, to generate interim backup;
Step is reset, in volatile data base, the password and/or authority of user in interim backup is reset;Replacement step, by target data
File replaces with the interim backup in volatile data base.
Alternatively, according to another embodiment of the present invention, the process is additionally may included in first before backup generation step
Generation step, the first check code is generated to target data file;The second generation after step is reset and before replacement step
Step, the second check code is generated to target data file;And judgment step, judge the first check code and the second check code whether phase
Together, if the two is different, the first generation step is re-executed to judgment step;If the first check code and the second verification code-phase
Together, then above-mentioned replacement step is performed.
Alternatively, the process can also include delete step, after target data file is replaced, and delete described interim standby
Part.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, involved action and module is not necessarily of the invention
It is necessary.
Although disclosed herein various aspects and embodiment, other side and embodiment are for those skilled in the art
For will be apparent.Various aspects and embodiment disclosed herein are for illustrative purposes, and to be not intended to be limited, very
The four corner for the equivalent that real scope should be authorized to by appended claims and such claim is indicated.Also
It is appreciated that term used herein is merely to describe the purpose of specific embodiment, and be not intended to be limited.
Because many modifications, the changes and modifications in details can be made to described example, but before being intended to
All items shown in the description in face and accompanying drawing be interpreted it is illustrative, rather than limitation the meaning.
Claims (13)
1. a kind of data base management method, password and/or authority for the user that resets target database, it is characterised in that
Including:
Backup generation step, the target data file that will be stored in the target database backups to volatile data base, to generate
Interim backup;
Step is reset, in the volatile data base, the password and/or power of user described in the interim backup is reset
Limit;
Replacement step, the target data file is replaced with the interim backup in the volatile data base.
2. according to the method described in claim 1, it is characterised in that methods described takes a step forward the backup generation step
Including:
First generation step, the first check code is generated to the target data file.
3. method according to claim 2, it is characterised in that methods described is after the replacement step and described replaces
Further comprise before step:
Second generation step, the second check code is generated to the target data file;With
Judgment step, judges whether first check code and second check code are identical, if the two is different, hold again
Row first generation step is to the judgment step;If first check code is identical with second check code, hold
The row replacement step.
4. the method according to claim 1 or 3, it is characterised in that further comprise:
Delete step, after the target data file is replaced, deletes the interim backup.
5. method according to claim 4, it is characterised in that
First and second check code is MD5 codes.
6. a kind of data bank management device, password and/or authority for the user that resets target database, it is characterised in that
Including:
Backup generation module, the target data file for will be stored in the target database backups to volatile data base, with
The interim backup of generation;
Reset module, in the volatile data base, reset the password of user described in the interim backup and/or
Authority;
Replacement module, for the target data file to be replaced with to the interim backup in the volatile data base.
7. device according to claim 6, it is characterised in that described device takes a step forward the backup generation module
Including:
First generation module, for generating the first check code to the target data file.
8. device according to claim 7, it is characterised in that described device is after the replacement module and described replaces
Further comprise before module:
Second generation module, for generating the second check code to the target data file;With
Judge module, for judging whether first check code and second check code are identical, if the two is different, return
Return first generation module;If first check code is identical with second check code, proceed to the replacement mould
Block.
9. the device according to claim 6 or 8, it is characterised in that further comprise:
Removing module, for after the target data file is replaced, deleting the interim backup.
10. device according to claim 9, it is characterised in that
First and second check code is MD5 codes.
11. a kind of system for realizing data base administration, including target database, volatile data base and claim 6-10 are any
Data bank management device described in.
12. a kind of non-volatile memory medium, the non-volatile memory medium has the instruction being stored therein, when the instruction
When being performed so that computing device data base management method, the instruction includes:
Backup generation instruction, the target data file that will be stored in the target database backups to volatile data base, to generate
Interim backup;
Reset indication, in the volatile data base, resets the password and/or power of user described in the interim backup
Limit;
Replacement instruction, the target data file is replaced with the interim backup in the volatile data base.
13. a kind of equipment, including memory, be stored with computer executable instructions, processor, and the processor is configured as holding
Row is described to instruct the process managed with implementation database, and the process includes:
Backup generation step, the target data file that will be stored in the target database backups to volatile data base, to generate
Interim backup;
Step is reset, in the volatile data base, the password and/or power of user described in the interim backup is reset
Limit;
Replacement step, the target data file is replaced with the interim backup in the volatile data base.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710512167.XA CN107247643A (en) | 2017-06-28 | 2017-06-28 | A kind of data base management method, device, system, storage medium and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710512167.XA CN107247643A (en) | 2017-06-28 | 2017-06-28 | A kind of data base management method, device, system, storage medium and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107247643A true CN107247643A (en) | 2017-10-13 |
Family
ID=60013573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710512167.XA Pending CN107247643A (en) | 2017-06-28 | 2017-06-28 | A kind of data base management method, device, system, storage medium and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107247643A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111367994A (en) * | 2019-06-27 | 2020-07-03 | 北京关键科技股份有限公司 | Method and system for synchronously backing up incremental data of database |
CN113448769A (en) * | 2020-03-27 | 2021-09-28 | 西安诺瓦星云科技股份有限公司 | Parameter backup method and device, and parameter recovery method and device |
CN113486313A (en) * | 2021-07-05 | 2021-10-08 | 江苏欧帝电子科技有限公司 | Uniform identity authentication method and system for school system personnel |
CN113569277A (en) * | 2021-06-25 | 2021-10-29 | 北京鼎普科技股份有限公司 | Method and device for checking security file data and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462936A (en) * | 2014-11-23 | 2015-03-25 | 国云科技股份有限公司 | Method for solving problem of forgetting password of MySQL database administrator account in Windows |
CN105095513A (en) * | 2015-09-09 | 2015-11-25 | 浪潮(北京)电子信息产业有限公司 | Method and apparatus for cracking password of Oracle database account |
CN106649481A (en) * | 2016-09-30 | 2017-05-10 | 郑州云海信息技术有限公司 | A method and system of log optimization for SQL Server database |
-
2017
- 2017-06-28 CN CN201710512167.XA patent/CN107247643A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462936A (en) * | 2014-11-23 | 2015-03-25 | 国云科技股份有限公司 | Method for solving problem of forgetting password of MySQL database administrator account in Windows |
CN105095513A (en) * | 2015-09-09 | 2015-11-25 | 浪潮(北京)电子信息产业有限公司 | Method and apparatus for cracking password of Oracle database account |
CN106649481A (en) * | 2016-09-30 | 2017-05-10 | 郑州云海信息技术有限公司 | A method and system of log optimization for SQL Server database |
Non-Patent Citations (1)
Title |
---|
何石: "《Mysql忘记用户密码的解决办法》", 《HTTPS://WWW.CNBLOGS.COM/SHIJIAOYUN/P/6029025.HTML》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111367994A (en) * | 2019-06-27 | 2020-07-03 | 北京关键科技股份有限公司 | Method and system for synchronously backing up incremental data of database |
CN113448769A (en) * | 2020-03-27 | 2021-09-28 | 西安诺瓦星云科技股份有限公司 | Parameter backup method and device, and parameter recovery method and device |
CN113569277A (en) * | 2021-06-25 | 2021-10-29 | 北京鼎普科技股份有限公司 | Method and device for checking security file data and electronic equipment |
CN113569277B (en) * | 2021-06-25 | 2024-01-26 | 北京鼎普科技股份有限公司 | Method and device for checking security document data and electronic equipment |
CN113486313A (en) * | 2021-07-05 | 2021-10-08 | 江苏欧帝电子科技有限公司 | Uniform identity authentication method and system for school system personnel |
CN113486313B (en) * | 2021-07-05 | 2023-07-25 | 江苏欧帝电子科技有限公司 | Unified identity authentication method and system for school system personnel |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220214995A1 (en) | Blockchain data archiving method, apparatus, and computer-readable storage medium | |
TWI782970B (en) | Computer-implemented methods for securing blockchain transaction based on undetermined data, electronic device, and a computer readable storage | |
US20200117550A1 (en) | Method, device and computer program product for backing up data | |
US20190207748A1 (en) | Blockchain storage device | |
US8199911B1 (en) | Secure encryption algorithm for data deduplication on untrusted storage | |
US20190268138A1 (en) | Meta block chain | |
CN110602147B (en) | Data encryption safe storage method, system and storage medium based on cloud platform | |
CN106133743A (en) | For optimizing the system and method for the scanning of pre-installation application program | |
CN110688261A (en) | Heterogeneous electronic file cloud disaster recovery system based on block chain | |
US20130246358A1 (en) | Online verification of a standby database in log shipping physical replication environments | |
US11886593B2 (en) | Verification of a provisioned state of a platform | |
CN107247643A (en) | A kind of data base management method, device, system, storage medium and equipment | |
CN106815528B (en) | A kind of file management method and device, storage equipment | |
TWI706274B (en) | Computing device and non-transitory computer-readable storage medium enabling operating system repairs via recovery agents | |
CN111782623B (en) | File checking and repairing method in HDFS (Hadoop distributed File System) storage platform | |
He et al. | Public integrity auditing for dynamic regenerating code based cloud storage | |
WO2023051308A1 (en) | Data verification method and apparatus, device and storage medium | |
EP3980955A1 (en) | Subscription to edits of blockchain transaction | |
CN108256351B (en) | File processing method and device, storage medium and terminal | |
CN106294017B (en) | A kind of information security back-up method | |
CN111291001B (en) | Method and device for reading computer file, computer system and storage medium | |
CN113312656A (en) | Data rotation method, device, equipment and system | |
CN112817912A (en) | File management method and device, computer equipment and storage medium | |
CN117421157A (en) | Data backup storage method and system based on block chain | |
Song et al. | Techniques to audit and certify the long-term integrity of digital archives |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 200090 Room 201, 10 B, 619 Longchang Road, Yangpu District, Shanghai. Applicant after: Excellent Polytron Technologies Inc Address before: 200090 Shanghai city Yangpu District road 619 Longchang city concept 10 building B block. Applicant before: SHANGHAI UCLOUD INFORMATION TECHNOLOGY CO., LTD. |
|
CB02 | Change of applicant information | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171013 |
|
WD01 | Invention patent application deemed withdrawn after publication |