A Xinchuang database migration verification method
A verification method and database technology, applied in the direction of database design/maintenance, digital data protection, structured data retrieval, etc. The effect of smooth migration
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] Such as figure 1 As shown, a Xinchuang database migration verification method includes the following steps:
[0022] Step 1: Read all the data in the Xinchuang database, obtain the basic information of the data, and set a data label for each piece of data;
[0023] Step 2: Process the read data, and encrypt the Xinchuang database through the MD5 algorithm, and generate the first encrypted value;
[0024] Step 3: Select the migration path and the target database, and implement blocking protection for the selected migration path;
[0025] Step 4: In the process of data migration, the migrated data is verified, and then the complete data migration is completed, and the migrated data is encrypted by the MD5 algorithm to obtain a second encrypted value.
[0026] It should be further explained that in the specific implementation process, the specific process of reading the basic information of all data in the Xinchuang database includes the following steps:
[0027] Step S...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
