Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for constructing a log object of a key operation

An object and log technology, applied in the computer field, can solve problems such as the lack of key information records, the integrity of log records cannot be guaranteed, etc., and achieve the effect of rapid and effective construction and reduced maintenance costs

Inactive Publication Date: 2019-03-08
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the attributes of the recorded log object are added or modified, this not only requires synchronous modification of a large number of codes, but also easily causes the loss of key information records, resulting in the inability to guarantee the integrity of the log records, leaving risks for data analysis or rollback of the business system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for constructing a log object of a key operation
  • A method and device for constructing a log object of a key operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Embodiments of the present disclosure are described below. It is to be understood, however, that the disclosed embodiments are merely examples and that other embodiments may take various alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimized to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention. As will be understood by persons of ordinary skill in the art, various features shown and described with reference to any one figure can be combined with features shown in one or more other figures to create embodiments not explicitly shown or described . Combinations of features shown provide representative embodiments for typical applications. However, various combinations and modifications of the features consist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for constructing a log object of a key operation, which comprises the following steps of obtaining the class types of objects in a data table so as to obtain all methodsets of the objects based on the class types; traversing the method set to obtain a method name of the method, and obtaining a write-in method for writing in a log table; intercepting the method nameto obtain a specific field name of the related attribute, and obtaining an obtaining method for reading the data value of the attribute from the data table through the field name; and executing an obtaining method to obtain the data value of the attribute, and writing the data value of the attribute into the log table through a writing method. Through the method, the log object can be quickly andeffectively constructed, and the maintenance cost is reduced.

Description

technical field [0001] The present invention generally relates to the computer field, and more specifically, relates to a method and device for constructing a log object of key operations. Background technique [0002] With the continuous development of information technology, various information systems have emerged. For a system with a considerable scale, when a failure occurs, if there is no complete log record backtracking and timely alarm, it is necessary to find and repair the problem. quite difficult. Operation logs for key businesses are particularly important. Whether it is used for business analysis or business rollback, a clear and accurate log record is a strong guarantee. There are many ways to record logs. Although the purpose of logging can also be achieved, the consumption, maintainability, and scalability of log records are also important. [0003] When logging key operations based on Java applications, when key operations have multiple attributes, each at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/18G06F16/23
Inventor 朱英澍
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products