The present invention provides methods and systems for controlling access to a data object having an identifier (ID). In a computer application, before access a data object, a check is performed to determine whether an ID associated with the data object is contained in a lock object and the ID is as
The present invention provides methods and systems for controlling access to a data object having an identifier (ID). In a computer application, before access a data object, a check is performed to determine whether an ID associated with the data object is contained in a lock object and the ID is associated with a storage location. If the ID is not contained in the lock object or if the ID is not yet associated with a storage location, the data object is accessed.
대표청구항▼
What is claimed is: 1. A computer-implemented method for controlling access to a data object stored in a first storage location of a hardware memory device, the data object being assigned to an identifier (ID), the method comprising: determining, using a processor, whether another process is attemp
What is claimed is: 1. A computer-implemented method for controlling access to a data object stored in a first storage location of a hardware memory device, the data object being assigned to an identifier (ID), the method comprising: determining, using a processor, whether another process is attempting to perform a transaction with the data object by determining whether the ID is stored in a transactional lock object; upon determining that the ID is not stored in the transactional lock object and that another process is not attempting to perform a transaction with the data object, storing the ID in the transactional lock object; determining, using the processor, whether another process is archiving the data object to a second storage location by determining whether the ID is stored in a permanent lock object; and upon determining that the ID is not stored in the permanent lock object and that another process is not archiving the data object to the second storage location, granting access to the data object. 2. The method of claim 1, further comprising: deleting the ID from the transactional lock object after the access to the data object is complete. 3. The method of claim 1, wherein the transactional lock object comprises a table having a first column for the ID and a second column for a link to the second storage location with assigned to the ID. 4. The method of claim 1, wherein the data object comprises one or more fields of one or more tables and wherein the ID comprises one or more key fields of the one or more tables. 5. The method of claim 1, further comprising; upon determining that the ID is stored in the permanent lock object, determining whether the ID stored in the permanent lock object is assigned to the second storage location; and upon determining that the ID in the permanent lock object is not assigned to the second storage location, deleting the ID from the permanent lock object and granting access to the data object. 6. The method of claim 1, further comprising: upon determining that the ID is stored in the permanent lock object and that another process is archiving the data object, denying access to the data object. 7. A computer system for controlling access to a data object stored in a first storage location, the data object being assigned to an identifier (ID), the computer system comprising: memory having program instructions; storage means for storing data; at least one processor to execute the program instructions to perform a method comprising: determining whether another process is attempting to perform a transaction with the data object by determining whether the ID is stored in a transactional lock object; upon determining that the ID is not stored in the transactional lock object and that another process is not attempting to perform a transaction with the data object, storing the ID in the transactional lock object; determining whether another process is archiving the data object to a second storage location by determining whether the ID is stored in a permanent lock object; and upon determining that the ID is not stored in the permanent lock object and that another process is not archiving the data object to the second storage location, granting access to the data object. 8. The computer system of claim 7, wherein the method further comprises: deleting the ID from the transactional lock object after the access to the data object is complete. 9. The computer system of claim 7, wherein the transactional lock object comprises a table having a first column for the ID and a second column for a link to the second storage location assigned to the ID. 10. The computer system of claim 7, wherein the data object comprises one or more fields of one or more tables and wherein the ID comprises one or more key fields of the one or more tables. 11. The computer system of claim 7, wherein the method further comprises: upon determining that the ID is stored in the permanent lock object determining whether the ID stored in the permanent lock object is assigned to the second storage location; and upon determining that the ID in the permanent lock object is not assigned to the second storage location, deleting the ID from the permanent lock object and granting access to the data object. 12. The computer system of claim 7, wherein the method further comprises: upon determining that the ID is stored in the permanent lock object and that another process is archiving the data object, denying access to the data object. 13. A computer-readable medium comprising instructions for performing a method of controlling access to a data object stored in a first storage location of a hardware storage device, the data object being assigned to an identifier (ID), the method comprising: determining, using a processor, whether another process is attempting to perform a transaction with the data object by determining whether the ID is stored in a transactional lock object; upon determining that the ID is not stored in the transactional lock object and that another process is not attempting to perform a transaction with the data object storing the ID in the transactional lock object; determining, using the processor, whether another process is archiving the data object to a second storage location by determining whether the ID is stored in a permanent lock object; and upon determining that the ID is not stored in the permanent lock object and that another process is not archiving the data object to the second storage location, granting access to the data object. 14. The medium of claim 13, wherein the method further comprises: deleting the ID from the transactional lock object after the access to the data object is complete. 15. The medium of claim 13, wherein the transactional lock object comprises a table having a first column for the ID and a second column for a link to the second storage location assigned to the ID. 16. The medium of claim 13, wherein the data object comprises one or more fields of one or more tables and wherein the ID comprises one or more key fields of the one or more tables. 17. The medium of claim 13, wherein the method further comprises: upon determining that the ID is stored in the permanent lock object, determining whether the ID stored in the permanent lock object is assigned to the second storage location; and upon determining that the ID in the permanent lock object is not assigned to the second storage location deleting the ID from the permanent lock object and granting access to the data object. 18. The medium of claim 17, wherein the method further comprises: upon determining that the ID is stored in the permanent lock object and that another process is archiving the data object denying access to the data object.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (38)
Hickson Andrew,GBX ; Wilkinson James Gordon,GBX, Access control for groups of related data items.
Josten Jeffrey William ; Masatani Tina Louise ; Mohan Chandrasekaran ; Narang Inderpal S. ; Teng James Zu-Chia, Computer program product and program storage device for database access using a shared electronic store in a multi-syste.
Josten Jeffrey W. (Morgan Hill CA) Masatani Tina L. (San Jose CA) Mohan Chandrasekaran (San Jose CA) Narang Inderpal S. (Saratoga CA) Teng James Z. (San Jose CA), Efficient data base access using a shared electronic store in a multi-system environment with shared disks.
Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
Josten, Jeffrey William; Teng, James Zu-Chia, Method and apparatus for ensuring cache coherency for spawned dependent transactions in a multi-system environment with shared data storage devices.
Furlani, John L.; Ohlson, Alexander R., Method, apparatus and computer program product for locking interrelated data structures in a multi-threaded computing environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.