A data structure is provided for preventing access, in a computer system, to a data object having an identifier (ID). The data structure comprises a first lock object, in which the ID of the data object is stored, and in which a link to a storage location of the data object is assigned to the ID, an
A data structure is provided for preventing access, in a computer system, to a data object having an identifier (ID). The data structure comprises a first lock object, in which the ID of the data object is stored, and in which a link to a storage location of the data object is assigned to the ID, and a second lock object, in which the ID of the data object is stored. In one embodiment, the ID is stored in the second lock object before storing the ID in the first lock object or before assigning the storage location of the data object to the ID in first lock object. Further, the ID is deleted from the second lock object after storing the ID in the first lock object or after assigning the storage location of the data object to the ID in the first lock object. The data object may be accessible by a software application, whereby the access of the software application to the data object is prevented if the ID is stored in the first or second lock object.
대표청구항▼
What is claimed is: 1. A data structure tangibly embodied in a computer-readable storage medium, the data structure preventing access, in a computer system, to a data object stored in a first storage location, the data structure comprising: a first lock object, in which an ID of the data object is
What is claimed is: 1. A data structure tangibly embodied in a computer-readable storage medium, the data structure preventing access, in a computer system, to a data object stored in a first storage location, the data structure comprising: a first lock object, in which an ID of the data object is stored by a first process moving the data object from the first storage location to a second storage location, and in which a link to the second storage location storing a copy of the data object is assigned to the ID, the first lock object comprising a table with at least two columns, a first column for storing IDs of data objects and a second column for storing links to copies of the data objects in the second storage location; and a second lock object, in which the ID is stored by the first process performing an action on the data object before storing the ID in the first lock object or before assigning the second storage location to the ID in the first lock object, the second lock object comprising a one-dimensional data array of IDs of data objects, wherein: the first process deletes the ID from the second lock object after storing the ID in the first lock object or after assigning the second storage location to the ID in the first lock object, and a second process is prevented from accessing the data object if the ID is stored in the first lock object or the second lock object by the first process. 2. The data structure of claim 1, wherein the link is a filename or a link to a file. 3. The data structure of claim 1, wherein the first lock object is a file stored in a nonvolatile storage means. 4. The data structure of claim 1, wherein the data object comprises one or more fields of one or more tables and wherein the ID comprises one or more key fields of the one or more tables. 5. The data structure of claim 1, wherein the second process is a data moving process or a data archiving process. 6. The data structure of claim 1, wherein the second lock object is stored in a volatile or nonvolatile storage means. 7. The data structure of claim 1 for use in enterprise resource planning software. 8. A computer system for processing data and preventing access to a data object stored in a first storage location, the computer system comprising: memory means having program instructions; input means for entering data; storage means for storing data; a processor responsive to the program instructions; and a data structure comprising: a first lock object, in which an ID of the data object is stored by a first process moving the data object from the first storage location to a second storage location, and in which a link to the second storage location storing a copy of the data object is assigned to the ID, the first lock object comprising a table with at least two columns, a first column for storing IDs of data objects and a second column for storing links to copies of the data objects in the second storage location; and a second lock object, in which the ID is stored by the first process performing an action on the data object before storing the ID in the first lock object or before assigning the second storage location to the ID in the first lock object, the second lock object comprising a one-dimensional data array of IDs of data objects, wherein: the first process deletes the ID from the second lock object after storing the ID in the first lock object or after assigning the second storage location to the ID in the first lock object, and a second process is prevented from accessing the data object if the ID is stored in the first lock object or the second lock object by the first process. 9. A computer readable medium storing executable instructions which, when executed, create a data structure for preventing access, in a computer system, to a data object stored in a first storage location, the data structure comprising: a first lock object, in which an ID of the data object is stored by a first process moving the data object from the first storage location to a second storage location, and in which a link to the second storage location storing a copy of the data object is assigned to the ID, the first lock object comprising a table with at least two columns, a first column for storing IDs of data objects and a second column for storing links to copies of the data objects in the second storage location; and a second lock object, in which the ID is stored by the first process performing a action on the data object before storing the ID in the first lock object or before assigning the second storage location to the ID in the first lock object, the second lock object comprising a one-dimensional data array of IDs of data objects, wherein: the first process deletes the ID from the second lock object after storing the ID in the first lock object or after assigning the second storage location to the ID in the first lock object, and a second process is prevented from accessing the data object if the ID is stored in the first lock object or the second lock object by the first process. 10. The data structure of claims 8 or 9, wherein the link is a filename or a link to a file. 11. The data structure of claims 8 or 9, wherein the first lock object is a file stored on a nonvolatile storage means. 12. The data structure of claims 8 or 9, wherein the data object comprises one or more fields of one or more tables and wherein the ID comprises one or more key fields of the one or more tables. 13. The data structure of claims 8 or 9, wherein the the second process is a data moving process or a data archiving process. 14. The data structure of claims 8 or 9, wherein the second lock object is stored in a volatile or nonvolatile storage means.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (38)
Hickson Andrew,GBX ; Wilkinson James Gordon,GBX, Access control for groups of related data items.
Josten Jeffrey William ; Masatani Tina Louise ; Mohan Chandrasekaran ; Narang Inderpal S. ; Teng James Zu-Chia, Computer program product and program storage device for database access using a shared electronic store in a multi-syste.
Josten Jeffrey W. (Morgan Hill CA) Masatani Tina L. (San Jose CA) Mohan Chandrasekaran (San Jose CA) Narang Inderpal S. (Saratoga CA) Teng James Z. (San Jose CA), Efficient data base access using a shared electronic store in a multi-system environment with shared disks.
Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
Josten, Jeffrey William; Teng, James Zu-Chia, Method and apparatus for ensuring cache coherency for spawned dependent transactions in a multi-system environment with shared data storage devices.
Furlani, John L.; Ohlson, Alexander R., Method, apparatus and computer program product for locking interrelated data structures in a multi-threaded computing environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.