CN117149888A - Method, apparatus, device and computer readable medium for data processing - Google Patents

Method, apparatus, device and computer readable medium for data processing Download PDF

Info

Publication number
CN117149888A
CN117149888A CN202311439343.3A CN202311439343A CN117149888A CN 117149888 A CN117149888 A CN 117149888A CN 202311439343 A CN202311439343 A CN 202311439343A CN 117149888 A CN117149888 A CN 117149888A
Authority
CN
China
Prior art keywords
data
database
source data
importing
end database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311439343.3A
Other languages
Chinese (zh)
Other versions
CN117149888B (en
Inventor
杨平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202311439343.3A priority Critical patent/CN117149888B/en
Publication of CN117149888A publication Critical patent/CN117149888A/en
Application granted granted Critical
Publication of CN117149888B publication Critical patent/CN117149888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a data processing method, a data processing device, data processing equipment and a computer readable medium, and relates to the technical field of computers. One embodiment of the method comprises the following steps: establishing a front-end database in a front-end, wherein the front-end database comprises an object wrapper; receiving and encrypting source data, wherein the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting; and importing the encrypted source data into the front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper. This embodiment can reduce resource consumption of the browser and the server.

Description

Method, apparatus, device and computer readable medium for data processing
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a computer readable medium for data processing.
Background
Current industry front-end projects mostly require background data to be acquired via hypertext transfer protocol (Hypertext Transfer Protocol, HTTP) requests and then processed to render an interface. HTTP requests are stateless requests that are disconnected after each request, and require constant polling of the background interface if continuous data is to be acquired.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art: during the operation of the front-end item, the interactive content can be acquired by continuously sending requests, and the resource consumption of the browser and the server can be increased in the above way.
Disclosure of Invention
In view of this, embodiments of the present application provide a method, an apparatus, a device, and a computer readable medium for data processing, which can reduce resource consumption of a browser and a server.
To achieve the above object, according to one aspect of an embodiment of the present application, there is provided a method of data processing, including:
establishing a front-end database in a front-end, wherein the front-end database comprises an object wrapper;
receiving and encrypting source data, wherein the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting;
and importing the encrypted source data into the front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper.
The establishing a front-end database in the front-end comprises the following steps:
compiling a data source code into a preset format and generating the object wrapper;
and storing the data source code with the preset format in the front end, and receiving an instruction through the object wrapper.
The storing the data source code in the preset format in the front end includes:
and storing the data source codes in the preset format in the front end according to the specified path or the random path.
The file importing comprises directly importing a database file supporting SQLite;
the listening for HTTP requests includes receiving return data for the HTTP requests over a data interface.
The importing the encrypted source data into the front-end database includes:
and calling a database engine, and importing the encrypted source data into the front-end database according to a database format.
The importing the encrypted source data into the front-end database further includes:
and screening out the source data as deleted data according to the storage time of the encrypted source data, the data quantity of the encrypted source data and the quantity of the encrypted source data.
According to a second aspect of an embodiment of the present application, there is provided an apparatus for data processing, including:
the system comprises a building module, a storage module and a storage module, wherein the building module is used for building a front-end database in a front end, and the front-end database comprises an object wrapper;
the system comprises a receiving module, a receiving module and a processing module, wherein the receiving module is used for receiving and encrypting source data, the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP monitoring request and user inputting;
and the query module is used for importing the encrypted source data into the front-end database, and querying and acquiring data at the front end based on the SQL instruction received by the object wrapper.
According to a third aspect of an embodiment of the present application, there is provided an electronic device for data processing, including:
one or more processors;
storage means for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods as described above.
According to a fourth aspect of embodiments of the present application, there is provided a computer readable medium having stored thereon a computer program which when executed by a processor implements a method as described above.
According to a fifth aspect of embodiments of the present application, there is provided a computer program product comprising a computer program which, when executed by a processor, implements a method as provided by embodiments of the present application.
One embodiment of the above application has the following advantages or benefits: establishing a front-end database in a front-end, wherein the front-end database comprises an object wrapper; receiving and encrypting source data, wherein the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting; and importing the encrypted source data into the front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper. The data can be directly acquired from the front-end database, so that the repeated interaction of the data with the browser and the server is reduced, and the resource consumption of the browser and the server can be further reduced.
Further effects of the above-described non-conventional alternatives are described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the application and are not to be construed as unduly limiting the application. Wherein:
FIG. 1 is a schematic flow diagram of a method of data processing according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for creating a front-end database in memory according to an embodiment of the application;
FIG. 3 is a schematic diagram of the main structure of an apparatus for data processing according to an embodiment of the present application;
FIG. 4 is an exemplary system architecture diagram in which embodiments of the present application may be applied;
fig. 5 is a schematic diagram of a computer system suitable for use in implementing an embodiment of the application.
Detailed Description
Exemplary embodiments of the present application will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present application are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness. The technical scheme of the application obtains, stores, uses, processes and the like the data, which all meet the relevant regulations of national laws and regulations.
During the operation of the front-end project, the mode of using the HTTP request depends on the connectivity of the network, and the related service which depends on the network query data can not run in the off-line scene.
Meanwhile, for scenes with high real-time requirements, such as: monitoring, reporting, etc., requires an increase in the frequency of data acquisition. If HTTP requests need to be sent multiple times by using different parameters in some real-time data query services or multidimensional query scenarios, the resource consumption is extremely high.
In addition, the data format acquired by each HTTP request is single, and different services need to call a non-communication interface to acquire data. Such as: under the monitoring scene, statistics is carried out according to different time dimensions respectively, and then the interface is required to be called for multiple times to acquire data.
In summary, the current way of sending HTTP requests increases the resource consumption of the browser and the server.
In order to solve the problem of high resource consumption of the browser and the server, the following technical scheme in the embodiment of the application can be adopted.
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for processing data according to an embodiment of the present application, a front-end database is built in a memory to store source data in response to an SQL command. As shown in fig. 1 and 100, the method specifically comprises the following steps:
s101, a front-end database is established in the front-end, and the front-end database comprises an object wrapper.
In applications, databases are often used at the back end, requiring a third party library connection in various languages, which is then connected to a specific database. As one example, a database is installed at the backend, such as: mysql or oracle. In a specific project, a connection library is used for connection. And executing a specific SQL query statement to acquire data.
In an embodiment of the application, the query data does not need to install a database at the back end, but rather a front end database is built in the front end, and SQL instruction query is adopted at the front end.
The front-end database has the characteristics of fast data acquisition and high reliability compared with the back-end database. On the one hand, the front-end database is suitable for scenes with high real-time requirements, such as: monitoring scenes and report scenes. In a monitoring scenario or reporting scenario, data needs to be acquired from the database multiple times. Because the data can be directly obtained from the front-end database, the data is not required to be obtained from the back-end database after interaction with the back-end. On the other hand, in a network disconnection offline scene or a network instability scene, the back-end database is difficult to ensure data transmission. The front-end database is arranged at the front end, so that the front-end database can ensure normal transmission of data.
Referring to fig. 2 and 200, fig. 2 is a schematic flow chart of establishing a front-end database in a memory according to an embodiment of the application. The method specifically comprises the following steps:
s201, compiling the data source code into a preset format, and generating an object wrapper.
And acquiring the data source code, and performing sorting analysis on the data source code. Compiling the data source code into a preset format. As one example, the preset format includes a WebAssembly format. WebAssemble is a binary instruction set based on a stacked virtual machine, can be used as a compiling target of a programming language, and can be deployed in applications of a web client and a server. Wherein, the Emscripten tool chain can be adopted to compile the data source code into a preset format.
In traversing the data source code, an object wrapper (JavaScript wrapper) is generated. The Emscripten tool may also generate a JavaScript wrapper for use with the WebAssembly module.
The WebAssembly technology performs data processing, and the processing object includes original data or data which can be directly used by a user after encryption. The performance was optimized with WebAssembly technique. But cannot directly query the data using SQL instructions.
S202, storing a data source code in a preset format in the front end, and receiving an instruction through the object wrapper.
The data source code in the preset format may be stored in the front end. An object wrapper may be incorporated in the data source code such that the object wrapper is used in the browser. As one example, the front-end includes a front-end item.
In the embodiment of fig. 2, the steps of installing a database, creating a connection and the like are not needed, a front-end database is constructed at the front end, and the service of which the application service needs to process data can be directly performed at the front end, so that the offline service processing can be conveniently realized.
In one embodiment of the application, the data source code in the preset format is stored in the front end according to a specified path or a random path. Storing the data source code in a predetermined format using a random path is advantageous in improving the reading speed. And a specified path is adopted to store the data source codes in a preset format, so that the source codes can be acquired as required.
In one embodiment of the application, a front-end database is built in the front-end, and a front-end database running in memory is built using webassmbly technology. The front-end database is compatible with the SQLite syntax and runs in memory. At the same time, database data import and export functions are provided.
S102, receiving and encrypting source data, wherein the source data are data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting.
After receiving the source data, the source data may be encrypted to ensure the security of the source data. The source data may be encrypted using a preset encryption algorithm. As one example, encrypted source data may be run in a webassmbly environment. I.e. using webassmbly encapsulated encryption algorithm. The webassmbly package is adopted to improve the security, and core data cannot be exposed because the encryption and decryption process is completed and hidden.
In the embodiment of the present application, the source data is data acquired in a preset manner. I.e. source data may be acquired in a variety of ways. The preset mode comprises one or more of file import, monitoring HTTP requests and user entry. The manner of acquiring the source data is described below.
Mode one: file import
The database file supporting SQLite is directly imported as source data. After the data is imported, the imported data can be used as source data of offline business processing and provided for front-end projects. Because the source data is stored in the front-end database, the source data can be acquired through the front-end without interaction with the back-end under the scene of back-end network disconnection.
Mode two: listening for HTTP requests
And directly monitoring the HTTP request, and taking the return data of the HTTP request as source data. And particularly, a data interface is provided, and after the service request initiates the HTTP request, the return data of the HTTP request is received through the data interface.
In one embodiment of the application, the snoop HTTP request may be a request obtained during the use of the HTTP protocol, or the WEBSOCKET protocol. Then the source data may be obtained during use of the HTTP protocol, or the webOCkey protocol.
As one example, HTTP requests are snooped by callback functions. And after the HTTP request is sent, calling a callback function to realize monitoring of the HTTP request. As another example, HTTP requests are listened to by plug-ins. When the HTTP request is sent, the HTTP request is directly sent through the plug-in connector. The plug-in gathers data of the HTTP request. Wherein the insert functions like a filter.
Mode three: user entry
A scenario for a particular source data. Through the operation interface, the user manually inputs data as source data.
In the embodiment of the application, various modes are supported to acquire the source data, so that the adaptability of data processing is improved.
S103, importing the encrypted source data into a front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper.
After the source data is encrypted, the source data can be imported into a front-end database for candidate queries. In one embodiment of the application, the encrypted source data is imported into the front-end database in a database format by invoking a database engine. Wherein the database engine comprises a front-end database engine.
Specific processes of importing source data into a front-end database are described with respect to a manner of acquiring the source data.
For file import, encrypted source data to be imported is selected through a browser. And analyzing the encrypted source data by using WebAsssembly, and calling a database engine to store the analyzed data.
And for monitoring the HTTP request, after collecting data at the front end and adjusting the storage data format through WebAssemble, calling a database engine to store the adjusted data.
Aiming at user input, after data input by a user are collected at the front end through WebAssembly and the data storage format is adjusted, a database engine is called to store the adjusted data.
In the above embodiment, webAssembly is adopted to analyze and adjust the data format, and the database engine stores the adjusted data.
In an embodiment of the application, the data is obtained at the front end based on the SQL instruction query received by the object wrapper. Since the front-end database is built, the SQL query can be directly passed through the front-end.
The method is different from the back-end inquiry, the back-end inquiry is mostly requested by a network, the service data acquisition request is sent to the back-end service, and then the back-end service invokes the traditional database to acquire data by using SQL grammar.
Specifically, when the service of the structured data needs to be acquired, the corresponding service SQL is directly executed in the browser class, the SQL is checked and analyzed through WebAssembly in the front end, namely the browser, and then the packaged database engine is called to acquire the structured data, namely the encrypted source data. Decrypting the encrypted source data enables the source data to be obtained directly at the front end without involving the back end.
In one embodiment of the application, the data acquisition is supported by the multidimensional query at the front end based on the SQL instruction received by the object wrapper. As one example, the multi-dimensional query includes a plurality of parametric queries.
After the encrypted source data is imported into the front-end database, the data can be queried and retrieved at the front-end using SQL instructions. The SQL instruction can not only meet the data query requirement of a single service scene, but also support a multi-dimensional data query scene.
As an example, in a report scenario, statistics need to be performed according to different dimensions of years, months and days, and it is common practice that different dimensions provide different parameters and then call an interface to perform a query.
By adopting the technical scheme of the application, report data to be queried can be initialized through HTTP interfaces or file importing and other modes, and then, when the multidimensional statistics of the front-end database is performed, SQL instructions are directly used for performing the front-end query statistics. The times of calling the back-end interface are reduced, so that the performances of the front-end and the server are improved.
In the embodiment of the application, the data format is adjusted by WebAsssembly analysis in the front-end database, and the database engine stores the adjusted data. The data stored in the front-end database belongs to structured data and supports SQL instruction query.
As one example, the data includes: { id:1, name:2}, { id:2, name:22}. To obtain the completed data, it is necessary to traverse all the data in the database. By adopting the embodiment of the application, the SQL instruction can be directly used for acquiring data, such as: the data is structured as a table xxx, SELECT FROM xxx WHERE id =1.
In one embodiment of the present application, in order to prevent the front-end database from occupying space that does not expand over time, source data may be screened as deletion data to ensure normal use of the memory.
And screening the source data to be used as deleting data according to the storage time of the encrypted source data, the data quantity of the encrypted source data and the quantity of the encrypted source data.
As one example, encrypted source data before a preset storage time is taken as deletion data. And if the data quantity of the encrypted source data exceeds the capacity threshold, the source data is taken as deleted data. And if the number of the encrypted source data is larger than the number threshold, taking the data with the longest storage time as the deleted data.
In the embodiment of the application, a front-end database is established in the front-end, and the front-end database comprises an object wrapper; receiving and encrypting source data, wherein the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting; and importing the encrypted source data into the front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper. The data can be directly acquired from the front-end database, so that the repeated interaction of the data with the browser and the server is reduced, and the resource consumption of the browser and the server can be further reduced. And improving the data processing efficiency and the data diversified query.
Referring to fig. 3, fig. 3 is a schematic main structural diagram of a data processing apparatus according to an embodiment of the present application, where the data processing apparatus may implement a data processing method, as shown in fig. 3 and 300, where the data processing apparatus specifically includes:
a building module 301, configured to build a front-end database in a front-end, where the front-end database includes an object wrapper;
the receiving module 302 is configured to receive and encrypt source data, where the source data is data acquired in a preset manner, and the preset manner includes one or more of file import, monitoring HTTP requests, and user entry;
and the query module 303 is configured to import the encrypted source data into the front-end database, and query and acquire data at the front end based on the SQL instruction received by the object wrapper.
In one embodiment of the present application, the building module 301 is specifically configured to compile a data source code into a preset format, and generate the object wrapper;
and storing the data source code with the preset format in the front end, and receiving an instruction through the object wrapper.
In one embodiment of the present application, the establishing module 301 is specifically configured to store the data source code in the preset format in the front end according to a specified path or a random path.
In one embodiment of the application, the file import includes directly importing a database file supporting SQLite;
the listening for HTTP requests includes receiving return data for the HTTP requests over a data interface.
In one embodiment of the present application, the query module 303 is specifically configured to invoke a database engine to import the encrypted source data into the front-end database according to a database format.
In one embodiment of the present application, the query module 303 is specifically configured to support multidimensional query to obtain data at the front end based on the SQL instruction received by the object wrapper.
In one embodiment of the present application, the query module 303 is further configured to filter out the source data as the deletion data according to the storage time of the encrypted source data, the data amount of the encrypted source data, and the number of the encrypted source data.
Fig. 4 illustrates an exemplary system architecture 400 of a data processing method or apparatus to which embodiments of the present application may be applied.
As shown in fig. 4, the system architecture 400 may include terminal devices 401, 402, 403, a network 404, and a server 405. The network 404 is used as a medium to provide communication links between the terminal devices 401, 402, 403 and the server 405. The network 404 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
A user may interact with the server 405 via the network 404 using the terminal devices 401, 402, 403 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 401, 402, 403.
The terminal devices 401, 402, 403 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 405 may be a server providing various services, such as a background management server (by way of example only) providing support for shopping-type websites browsed by users using the terminal devices 401, 402, 403. The background management server may analyze and process the received data such as the product information query request, and feedback the processing result (e.g., the target push information, the product information—only an example) to the terminal device.
It should be noted that the method for processing data provided in the embodiment of the present application is generally executed by the server 405, and accordingly, the device for processing data is generally disposed in the server 405.
It should be understood that the number of terminal devices, networks and servers in fig. 4 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
A computer program product according to an embodiment of the present application includes a computer program that, when executed by a processor, implements a method for data processing according to an embodiment of the present application.
Referring now to FIG. 5, there is illustrated a schematic diagram of a computer system 500 suitable for use in implementing an embodiment of the present application. The terminal device shown in fig. 5 is only an example, and should not impose any limitation on the functions and the scope of use of the embodiment of the present application.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU) 501, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the system of the present application are performed when the computer program is executed by a Central Processing Unit (CPU) 501.
The computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules involved in the embodiments of the present application may be implemented in software or in hardware. The described modules may also be provided in a processor, for example, as: a processor includes a setup module, a receive module, and a query module. Where the names of the modules do not constitute a limitation of the module itself in some cases, for example, the build module may also be described as "for building a front-end database in a front-end, the front-end database comprising an object wrapper".
As another aspect, the present application also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be present alone without being fitted into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to include:
establishing a front-end database in a front-end, wherein the front-end database comprises an object wrapper;
receiving and encrypting source data, wherein the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting;
and importing the encrypted source data into the front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper.
According to the technical scheme of the embodiment of the application, a front-end database is established in the front end, and the front-end database comprises an object wrapper; receiving and encrypting source data, wherein the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting; and importing the encrypted source data into the front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper. The data can be directly acquired from the front-end database, so that the repeated interaction of the data with the browser and the server is reduced, and the resource consumption of the browser and the server can be further reduced.
The above embodiments do not limit the scope of the present application. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives can occur depending upon design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present application should be included in the scope of the present application.
In the technical scheme of the application, the aspects of acquisition, analysis, use, transmission, storage and the like of the related user personal information all meet the requirements of related laws and regulations, are used for legal and reasonable purposes, are not shared, leaked or sold outside the aspects of legal use and the like, and are subjected to supervision and management of a supervision department. Necessary measures should be taken for the personal information of the user to prevent illegal access to such personal information data, ensure that personnel having access to the personal information data comply with the regulations of the relevant laws and regulations, and ensure the personal information of the user. Once these user personal information data are no longer needed, the risk should be minimized by limiting or even prohibiting the data collection and/or deletion.
User privacy is protected, when applicable, by de-identifying the data, including in some related applications, such as by removing a particular identifier (e.g., date of birth, etc.), controlling the amount or specificity of stored data (e.g., collecting location data at a city level rather than at a specific address level), controlling how the data is stored, and/or other methods.

Claims (9)

1. A method of data processing, comprising:
establishing a front-end database in a front-end, wherein the front-end database comprises an object wrapper;
receiving and encrypting source data, wherein the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP request monitoring and user inputting;
and importing the encrypted source data into the front-end database, and inquiring and acquiring data at the front end based on the SQL instruction received by the object wrapper.
2. The method of data processing according to claim 1, wherein said establishing a front-end database in the front-end comprises:
compiling a data source code into a preset format and generating the object wrapper;
and storing the data source code with the preset format in the front end, and receiving an instruction through the object wrapper.
3. The method of data processing according to claim 2, wherein storing the data source code in the predetermined format in the front end comprises:
and storing the data source codes in the preset format in the front end according to the specified path or the random path.
4. The method of data processing according to claim 1, wherein the file import includes directly importing a database file supporting SQLite;
the listening for HTTP requests includes receiving return data for the HTTP requests over a data interface.
5. The method of data processing according to claim 1, wherein importing the encrypted source data into the front-end database comprises:
and calling a database engine, and importing the encrypted source data into the front-end database according to a database format.
6. The method of data processing according to claim 1, wherein importing the encrypted source data into the front-end database further comprises:
and screening out the source data as deleted data according to the storage time of the encrypted source data, the data quantity of the encrypted source data and the quantity of the encrypted source data.
7. An apparatus for data processing, comprising:
the system comprises a building module, a storage module and a storage module, wherein the building module is used for building a front-end database in a front end, and the front-end database comprises an object wrapper;
the system comprises a receiving module, a receiving module and a processing module, wherein the receiving module is used for receiving and encrypting source data, the source data is data acquired in a preset mode, and the preset mode comprises one or more of file importing, HTTP monitoring request and user inputting;
and the query module is used for importing the encrypted source data into the front-end database, and querying and acquiring data at the front end based on the SQL instruction received by the object wrapper.
8. An electronic device for data processing, comprising:
one or more processors;
storage means for storing one or more programs,
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
9. A computer readable medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any of claims 1-6.
CN202311439343.3A 2023-11-01 2023-11-01 Method, apparatus, device and computer readable medium for data processing Active CN117149888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311439343.3A CN117149888B (en) 2023-11-01 2023-11-01 Method, apparatus, device and computer readable medium for data processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311439343.3A CN117149888B (en) 2023-11-01 2023-11-01 Method, apparatus, device and computer readable medium for data processing

Publications (2)

Publication Number Publication Date
CN117149888A true CN117149888A (en) 2023-12-01
CN117149888B CN117149888B (en) 2024-02-13

Family

ID=88903234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311439343.3A Active CN117149888B (en) 2023-11-01 2023-11-01 Method, apparatus, device and computer readable medium for data processing

Country Status (1)

Country Link
CN (1) CN117149888B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111666293A (en) * 2019-03-05 2020-09-15 北京京东尚科信息技术有限公司 Database access method and device
CN112653614A (en) * 2020-12-15 2021-04-13 建信金融科技有限责任公司 Request processing method and device based on message middleware
CN113434382A (en) * 2021-07-12 2021-09-24 建信金融科技有限责任公司 Database performance monitoring method and device, electronic equipment and computer readable medium
CN116244682A (en) * 2023-01-16 2023-06-09 北京百度网讯科技有限公司 Database access method, device, equipment and storage medium
WO2023151543A1 (en) * 2022-02-09 2023-08-17 杭州未名信科科技有限公司 Query method and system based on structured query language (sql)
CN109857379B (en) * 2019-01-18 2023-09-05 广州九尾信息科技有限公司 Method and device for packaging data service
CN116166907B (en) * 2023-04-23 2023-09-26 联动优势电子商务有限公司 Method and device for developing Web application by using WebAsssembly and service page compiling technology
US11797289B2 (en) * 2022-03-17 2023-10-24 Shore Labs Zbigniew Zemła Containerized, decentralized, and distributed web applications with end-to-end encryption

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857379B (en) * 2019-01-18 2023-09-05 广州九尾信息科技有限公司 Method and device for packaging data service
CN111666293A (en) * 2019-03-05 2020-09-15 北京京东尚科信息技术有限公司 Database access method and device
CN112653614A (en) * 2020-12-15 2021-04-13 建信金融科技有限责任公司 Request processing method and device based on message middleware
CN113434382A (en) * 2021-07-12 2021-09-24 建信金融科技有限责任公司 Database performance monitoring method and device, electronic equipment and computer readable medium
WO2023151543A1 (en) * 2022-02-09 2023-08-17 杭州未名信科科技有限公司 Query method and system based on structured query language (sql)
US11797289B2 (en) * 2022-03-17 2023-10-24 Shore Labs Zbigniew Zemła Containerized, decentralized, and distributed web applications with end-to-end encryption
CN116244682A (en) * 2023-01-16 2023-06-09 北京百度网讯科技有限公司 Database access method, device, equipment and storage medium
CN116166907B (en) * 2023-04-23 2023-09-26 联动优势电子商务有限公司 Method and device for developing Web application by using WebAsssembly and service page compiling technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蔡鸿明: "互联网时代的软件工程", 上海交通大学出版社, pages: 176 *

Also Published As

Publication number Publication date
CN117149888B (en) 2024-02-13

Similar Documents

Publication Publication Date Title
EP2656248A1 (en) Bulk initial download of mobile databases
CN110858202A (en) Method and device for generating where clause in database query statement
CN110795315A (en) Method and device for monitoring service
CN110909022A (en) Data query method and device
CN110795741B (en) Method and device for carrying out security processing on data
US20230315692A1 (en) File sharing method, apparatus, and system
CN107678755B (en) Installation package packaging method and device, electronic equipment and computer readable medium
CN108959294B (en) Method and device for accessing search engine
CN117149888B (en) Method, apparatus, device and computer readable medium for data processing
CN117195263A (en) Database encryption method and device
CN107707528B (en) Method and device for isolating user information
CN112783615B (en) Data processing task cleaning method and device
CN113704222A (en) Method and device for processing service request
CN112416865A (en) File processing method and device based on big data
CN107665241B (en) Real-time data multi-dimensional duplicate removal method and device
CN113761566A (en) Data processing method and device
CN112988857A (en) Service data processing method and device
CN113495747B (en) Gray scale release method and device
CN114726564B (en) Security detection method, security detection device, electronic device, and medium
CN117033821A (en) Page jump processing method and device
CN117493383A (en) Data processing method and device
CN114528212A (en) Method, apparatus, device and computer readable medium for providing test data
CN116701499A (en) Method and device for processing request
CN114691149A (en) Method and device for generating executable file
CN113760925A (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant