Information management security visualization method and system based on domestic database
An information management and database technology, applied in digital data information retrieval, database indexing, relational databases, etc., can solve problems such as troublesome management and maintenance, increase maintenance costs, lack of openness, etc. Easy-to-operate effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] like figure 1 As shown, a security visualization method for information management based on a domestic database in this embodiment specifically includes the following steps:
[0036] Step S101: A normal business object is used to inherit a general abstract object of the set industry, so as to ensure the commonality of the business object.
[0037] In the specific implementation, a normal business object is used to inherit a general abstract object of a certain industry to ensure the versatility of the business object. It abstracts a batch of all information systems by combining relevant content, text library, picture library, video library and other information systems. The content of the system has the highest probability of appearing and is the various object attributes that are needed for this business, forming an abstract object. For example, the boarding pass of a passenger when flying is a business object. Different airlines have different boarding passes, but th...
Embodiment 2
[0121] This embodiment provides a security visualization system for information management based on a domestic database, which specifically includes:
[0122] Business object inheritance module, which is used to adopt a normal business object to inherit a general abstract object of the set industry, so as to ensure the versatility of the business object;
[0123] Object and database corresponding module, which is used to determine the corresponding relationship between business object attributes and domestic database fields according to the logical structure of the domestic database;
[0124] The visual correlation module is used to realize the visual operation of the correlation between the domestic database and the business object based on the unified visual operation model of the database and the object, and at the same time store the business object in the domestic database through the verification method for the later stage of the business object exhibit.
[0125] What n...
Embodiment 3
[0127] This embodiment provides a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, the steps in the above-mentioned method for information management security visualization based on a domestic database are implemented.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


