WO2006010320A1 - Serveur d'informations oriente-objet, procede de generation associe et navigateur - Google Patents
Serveur d'informations oriente-objet, procede de generation associe et navigateur Download PDFInfo
- Publication number
- WO2006010320A1 WO2006010320A1 PCT/CN2005/001080 CN2005001080W WO2006010320A1 WO 2006010320 A1 WO2006010320 A1 WO 2006010320A1 CN 2005001080 W CN2005001080 W CN 2005001080W WO 2006010320 A1 WO2006010320 A1 WO 2006010320A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- concept
- information
- program processing
- module
- processing module
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 369
- 230000008569 process Effects 0.000 claims abstract description 157
- 238000013475 authorization Methods 0.000 claims abstract description 8
- 230000006870 function Effects 0.000 claims description 105
- 238000013500 data storage Methods 0.000 claims description 31
- 238000003860 storage Methods 0.000 claims description 27
- 238000012552 review Methods 0.000 claims description 18
- 241000282414 Homo sapiens Species 0.000 claims description 13
- 238000004519 manufacturing process Methods 0.000 claims description 8
- 238000012546 transfer Methods 0.000 abstract description 19
- 230000007246 mechanism Effects 0.000 abstract description 14
- 230000002194 synthesizing effect Effects 0.000 abstract description 3
- 238000012986 modification Methods 0.000 abstract description 2
- 230000004048 modification Effects 0.000 abstract description 2
- 238000007726 management method Methods 0.000 description 61
- 239000000306 component Substances 0.000 description 33
- 238000005516 engineering process Methods 0.000 description 32
- 239000003795 chemical substances by application Substances 0.000 description 24
- 230000000694 effects Effects 0.000 description 19
- 238000012545 processing Methods 0.000 description 17
- 238000013461 design Methods 0.000 description 13
- 238000011161 development Methods 0.000 description 12
- 230000018109 developmental process Effects 0.000 description 12
- 238000004886 process control Methods 0.000 description 12
- 238000012423 maintenance Methods 0.000 description 11
- 230000008901 benefit Effects 0.000 description 10
- 241000282412 Homo Species 0.000 description 9
- 230000006854 communication Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000009826 distribution Methods 0.000 description 7
- 238000009434 installation Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 230000010365 information processing Effects 0.000 description 6
- 230000001276 controlling effect Effects 0.000 description 5
- 238000012384 transportation and delivery Methods 0.000 description 5
- 238000012550 audit Methods 0.000 description 4
- 230000007547 defect Effects 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 3
- 239000000470 constituent Substances 0.000 description 3
- 238000007429 general method Methods 0.000 description 3
- 230000006872 improvement Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012797 qualification Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000003786 synthesis reaction Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008570 general process Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000033772 system development Effects 0.000 description 2
- 238000009825 accumulation Methods 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 238000005094 computer simulation Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 238000012938 design process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000008521 reorganization Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011273 social behavior Effects 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 230000007474 system interaction Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000004260 weight control Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/20—Software design
Definitions
- the present invention relates to an information management server and a browser, and a method of fabricating an information management server; more specifically, the present invention relates to information tagging, presentation, storage, distribution, combination, Integrate, manage, query, browse, and use, and especially with access control and business process control technologies. Background technique
- Computer operating systems such as Microsoft's Windows
- system programs provide an easy way to manage and use a variety of hardware and software resources, greatly increasing the ability of humans to use computing facilities and auxiliary facilities hardware resources and related software resources.
- human beings need a social resource operating system to shield the existence of various hardware and software resources to a greater extent, and to directly use and manage various social resource information in a transparent manner.
- the property is directly managed, and other related business processes such as buying and selling goods are carried out; at least it is not necessary to switch too much between too many application systems.
- the "an information browser” described in the specification and claims of the invention patent TO001411 is a technical core of a powerful information resource browser that is currently widely used. It can parse and display information resources from known formats on different servers, and can add letters by installing additional program processing modules or methods for parsing the processing module Protocol Handler. 01080 The ability to parse, display, and use.
- the browser includes a basic program module, and other program modules can be continuously installed and adjusted according to the needs of the user, and can even directly run other program modules located on the local operating system, thereby having strong scalability and having certain Support for graphical operation features.
- the Uniform Resource Tag Protocol URI is an improvement to the URL.
- the URI is a uniform resource naming URN added to the URL. Its purpose is to provide a permanent, globally unique, location-independent identifier for resources, and can be mapped to different namespaces, can be entered via the keyboard and can be transmitted via different transmission procedures. However, the URI does not fundamentally resolve the flaws of the above URL.
- the URL and URI are opaque or translucent to the user, because in some operations it is even necessary for the user to understand their structure and adjust the content. Although this situation can I think some users provide some convenience, but it is unreasonable in terms of transparency and security. There should be a uniform marking method for internal use of the system that facilitates machine identification and management, but does not require the user to touch, understand or feel it.
- UID Uniform Marking UID technology is a promising application technology, but the current application scope for UID is still very limited. In some applications, UID is mainly used to mark computing resources, such as the 0ID and CLASSID of the program module. There is still no solution for the entire process of representing, storing, managing, transferring, browsing and using the UID system for the entire information concept object.
- NamingSpace technology and directory service systems such as DNS, X500, LDAP and other specification systems and service systems, maintain the entire namespace by establishing hierarchical namespace subdomains and maintaining the uniqueness of information object names in the same domain. The uniqueness of the named tag.
- the problem is that there is no standard design for the hierarchy of namespace subdomains, and this nomenclature is a lengthy code-based system that is not suitable for data storage hierarchy applications.
- the file system can store, transfer, and manage information data in both formatted and unformatted form.
- Current word processing programs are still the main tools for humans to handle this form of information, such as Word and WPS. These tools have greatly improved the efficiency of human processing of text and information, but have not fundamentally changed the ability of humans to process information and manage information.
- the information contained in these files requires a lot of human intelligence and manual intervention - humans need to first understand the information contained in the file, and then carry out the operational behavior of the new information application.
- excessive human intervention has become a bottleneck for improving information processing efficiency and reducing human labor intensity and complexity.
- users may need to manage and use a large number of files. To complete an information processing work, you must have a certain degree of information technology knowledge and operational skills.
- the current popular object-oriented programming technology provides an intuitive means of modular processing of information transmission and processing, enhancing the ability of humans to represent and process information, but in various current application systems, The way and scope of using object-oriented programming techniques, modelling techniques, and presentation techniques is still very simple and limited.
- the first is information storage and delivery over-reliance on file systems.
- the conceptual object information can be stored in a single file by formatting the file to represent information or processing the information, such as XML documents and streaming Streamlizing or characterizing Java Objects via Output Stream or XMLEncoder.
- This breaks the structure between conceptual object information, and it still poses an obstacle to large-scale applications in the absence of effective large-scale management and effective use of these formatted information stored in files.
- the client still does not take full advantage of the process of processing information based on conceptual objects. For example, web pages are a pile of text information, client programs are less versatile, and there is a problem of large setup and maintenance workload.
- the resource definition system RDF represents the relationship between various concept attributes and content through the structure of a simple statement; this statement relationship can even be expressed by means of nodes representing conceptual objects, connecting lines to represent attributes or relationships, thus forming conceptual objects and Topological network of interrelationships. There are even some client programs that support browsing and managing this topology network structure. But there is no complete technical solution for how to further use and manage these concept nodes and relationships after they are represented, stored and displayed.
- RDF Resource Definition System
- Grid technology is a technical concept that shields all research and design aspects of software and hardware computer resources, mainly to solve the problem of insufficient transparency and openness of information resources in various distributed computing systems. But the flaw is still to pay too much attention to how to complete the task of "shielding", but lacks the necessary attention or results in the common structure within the concept of knowledge. Grid technology still lacks a practical and effective computational model, information model, storage model, and overall framework for security control.
- RMI, COM, CORBA, and Web Service are all widely used remote functional methods that call RPC's technical specification system.
- the commonality of these procedures is that both the calling party and the called party need to install an underlying proxy module Stub and Sekelet 0 n. This means that whenever a program module is installed on the server side, the client also needs to install a stub and provide the Interface file for the function call.
- Some procedures, such as Web Servcie even need to create an interface file implementation module on the client. Class. This makes the installation and maintenance of the client program module endless, increasing the cost of the installation and maintenance of the client program.
- ECLIPES is a general-purpose information application development platform that can be used in a variety of programming languages, program modules and remote call specifications.
- the shortcoming of this platform system is still mainly aimed at how to make various computer resources and functions understand each other or work together.
- the interface connection method provided is still based on the package program module, and has not risen to the system combination.
- the concept object information processed by the package and the corresponding processing function method level is also mainly limited to the process of system development.
- the corresponding data table and program processing module are established, which is a common development method of the multi-level Multi Tier structure server system.
- the general process is to first define the boundary of the system, then establish a conceptual information model based on the determined system tasks, and finally build a data table system and a program module system based on this model.
- some software engineering principles can follow the optimization results in the local scope, there is a lack of necessary standard methods to standardize the entire development process and content.
- the obtained system is optimal for current tasks and resources even in a closed system, but at a higher level of information application, there are problems such as chaotic information format and difficulty in communication interaction.
- the fundamental problem is the lack of a high-level abstract representation structure model of conceptual objects, which makes various server systems based on a relatively stable and open information model, along a set of simple and concrete development methods and ideas. System design and implementation work.
- the authority control system must include the functions of the representation of the authorization information and the two parts of the authority matching audit; it can be controlled by the ticket or certificate, or by a special server.
- the distribution control system through the ticket will be the authority principal authentication information Credential operation
- the contents of the object Object and the operation function method Operation are stored in the Access List in the permission table, and are sent to each node of the distribution system along with the ticket.
- Each node performs a permission audit matching based on this permission table.
- the problem is that the form of the representation authority has a great limitation on the content and scope of the representation of the power.
- the encryption security in the ticket transmission process is extremely high.
- the nodes must have a high trust between the nodes. degree. The large number of such tickets are issued in a large number of nodes, and the existing management problems and the problem of excessive trust are the weaknesses of this solution.
- the above problem can be alleviated to some extent, and the flexibility of the authorization information form can be improved by the role-based Role Based permission information representation storage mechanism.
- the problem is that in the currently implemented role-based privilege control systems, such as DBMS, C0RBA, and J2EE, the role settings are static and need to be set by the system administrator during the system installation or during the running process; The roles and permissions cannot be changed, and it is impossible to authorize others to perform their own operations—unless someone else uses their own account.
- the above roles often reflect the relationship between units, such as employees, customers, etc., and this relationship is constantly changing, so it requires the participation of a large number of system administrators; further notice that in the real world, people
- the role has another meaning, which reflects the relationship between people and property, such as the relationship between the owner and the property; and the relationship is in a more frequent process of change. For example, after the owner of a property sells the property, the role of the owner is transferred from the seller to the buyer. This role relationship and the dynamic characteristics that are presented are not covered by the general role-based access control system.
- the business process can be done in a single information system or in two peer-to-peer information systems.
- the completion of business transaction control in a separate information system occurs mostly in the B2C type of business.
- the usual control method is to publish a simple electronic order.
- the customer can input the product name, model number, quantity, price, etc., and the seller organizes the delivery and settlement after sending.
- Formatted electronic documents such as EDI messages
- EDI messages convey various contents of the business process through standardized message format information; automatically parse the message by installing a special parser, such as an EDI message interpreter, on each application system. Content, and then complete their respective processing tasks in their own way.
- a special parser such as an EDI message interpreter
- the problem is that the way to transmit and store messages in the EDI application system is dominated by the file system, so the opportunity for information exposure is large. For example, the weakness of the file security control on the floppy disk cannot be eradicated; at the same time, this file-based
- the information representation and storage scheme is not conducive to the query and synthesis of information; further, the EDI application system can only talk to other EDI systems, not only the scope of application is limited, but also the cost of system implementation is high.
- xCBL has built a set of document generation mechanisms based on basic business object components by using XML technology, which can help to establish transaction process messages suitable for various industries.
- XML technology can help to establish transaction process messages suitable for various industries.
- This does not fundamentally solve the order documents suitable for machine understanding and execution.
- the problem of simple machinery does not provide further improvement mechanisms that reflect the rich and complex content of contracts.
- the common purpose of ebXML and UDDI is to support various enterprise application systems to discover each other's services and help them to establish a dialogue channel for interaction. After discovering the other party, the developer can obtain the information of the structure of the dialogue information in the other party system, the interaction procedure, and the like, and accordingly, the corresponding communication dialog program module can be established or the corresponding settings can be completed.
- the problem is that the technical workload and complexity of establishing various dialog program modules are at the geometric quantity level as a whole, that is, the square of the total number of enterprise application systems (N 2 ), and ultimately do not avoid the information technology that the above various technical solutions face together. Apply complex and costly N 2 issues.
- Some types of information are always interrupted from the flow of one system to another. For example, the same item being sold in an information system requires an ownership review, and the second review may again require the same review process.
- Controlling the legitimacy of a business transaction process is another non-negligible link of the authority control mechanism. It needs to involve the comprehensive application of various aspects, including the subject qualification of the party, the legality of the subject matter, the transaction time, the location restrictions, The number of transactions, the price, the amount of the limit, and so on. How to reliably obtain this information and maintain the continuity of various information flows is a problem that is solved beyond any single or both internal application systems. Disclosure of invention The object of the present invention is to propose a comprehensive set of object-oriented technical solutions for information representation, storage, management, browsing and use, and make full use of various existing technical means to maximize and avoid the above-mentioned various aspects of information applications. Item; specifically:
- the object of the present invention is to establish an object-oriented information representation, storage and management server production
- the object of the present invention is to further propose a new abstract information model for all social resource conceptual objects at a higher level, so that the system has a more open representation range and a relatively stable conceptual object information model;
- the object of the present invention is to further establish an agent service system for information management services for all social resource concept objects, which can limit all management and development contents related to computer technology and resources to the server side, so that the information system is internal.
- the implementation process, any changes and adjustments of the underlying technology are always transparent to users and client programs;
- the object of the present invention is to establish a simple and concrete method for establishing and maintaining such a server product
- the object of the present invention is to establish an object-oriented information browsing and using device, which can simplify the user operation process and reduce the learning cost while maintaining rich information graphic display and operation means; the user can directly directly according to social common sense and related knowledge in the application field. Use a variety of information;
- the object of the present invention is to maintain the simplicity of the client browser program code structure and to facilitate installation and maintenance while achieving the above functions;
- the object of the present invention is to further propose a new method for expressing the authority information of the authority control and the business transaction control and a technical solution for controlling the audit, so that the process of the authority control and the business control is more flexible to comply with social norms, customs and legal requirements;
- the object of the present invention is to further provide a rich dynamic authority representation and control system; comprehensively reflect various attribute relationships and dynamic characteristics of various rights and obligations relationships through power concept objects and rights concept objects, and can operate objects according to user identity and operation objects. , content and scope, specifically calculating and judging whether the user has the eligibility to use a particular functional method;
- the object of the present invention is to further represent and store attribute information of various business transactions in a system through a business transaction concept object, and establish a new mechanism for business transaction process control; and can fully utilize existing types of EDI, xCBL, ebXML, etc.
- the normative system provides the model content represented by the transaction process to establish a conceptual object information model for various business transactions;
- the object of the present invention is to further package the data and functions provided by the existing various types of information system applications on the server side by establishing a new program module, utilizing existing remote or local calling procedures, and then presenting the information in a standardized form.
- the service is handed over to the user through the core component program to enable standardized delivery of functions and information;
- the object of the present invention is to further provide a public communication channel and a usage platform for various types of information and functions, instead of directly transferring the connection to a program module of an internal information system owned by each of the business contacts, thereby limiting the number of system connections to linear growth.
- N level the complexity level
- the information and functions of the packaged various program modules can be simultaneously passed through the platform permissions in the case where their respective internal permission control systems exist in parallel Control
- the system control uses a brief description of the drawing
- Figure 1 Schematic diagram of the overall logical structure of the server and browser.
- FIG. 1 Schematic diagram of the overall composition of the server and browser.
- Figure 3 Schematic diagram of the relationship between the conceptual object program module and the data table.
- FIG. 4 Schematic diagram of the server's production method.
- FIG. 5 Schematic diagram of the internal logic of the browser.
- Figure 6 The overall appearance of the object-oriented browser is a special implementation rendering of a browser.
- Figure 7 The attribute name and content list is a partial graph of a special implementation effect of the browser, showing the display effect of the basic attribute set of the property item MyTV.
- Figure 8 Information Usage The historical memory area is a partial graphic of a special implementation effect of the browser.
- Figure 9 The operation options for the user and the operation object are partial graphics of a special implementation effect of the browser, showing the operation function option display interface that the user can click on the icon.
- Figure 10 The common concept object memory area is a partial graphic of a special implementation effect of the browser.
- Figure 11 shows that the conceptual object set of power is a partial graph of a special implementation effect of the browser, giving a list of the rights concept objects owned by the individual Rechard, such as the rights of the owner, the rights of the user, and so on.
- Figure 12 The concept object collection of the property owner is a partial image of a special implementation effect of the browser, which is a display effect diagram of the conceptual object collection of the owner of the property item MyTV.
- BEST MODE FOR CARRYING OUT THE INVENTION The technical features, structures, functions, and effects of the technical solutions of the present invention will be described below in conjunction with various drawings.
- the schematic diagram of the overall logical structure of the server and browser gives the logical schematic of the system configuration and operation process.
- Figure 2 shows the overall composition of the server and browser.
- the present invention utilizes a unique tag code (100) to tag all concept objects and to optimize the entire process of storing, finding, transmitting, and processing conceptual objects.
- the unique tag code (100) is an alphanumeric code with a relatively fixed length, also known as UID (Unified Identification), generated by a fixed algorithm that guarantees two different pairs in the same and different application systems.
- Concept objects are tagged differently. Because it is a fixed-length code, it is beneficial to the database system to optimize the physical structure of the data storage.
- the conceptual object information is hierarchically represented and stored by a unique tag code (100), which simplifies the process of accessing, retrieving, and managing.
- each data table uses a uniform primary key code algorithm to avoid unnecessary confusion in the primary key format and code generation sequence.
- Unique token generated by the unified algorithm The primary key of each data table (PRIMARY KEY) is also a foreign key of various data tables except the basic data table (410); each data table is constructed according to the hierarchical structure of the conceptual object type itself to simplify the design process of the data table structure.
- Different types of concept objects use the same markup method, which can make the concept objects comparable by matching the code of the markup, and provide technical support for comparing various concept objects.
- the process of storage can be simplified.
- the content data of the concept attribute is stored in the data table, and all the data of the concept object or the location of the partial data can be sequentially determined by the unique tag code (100); instead, the entire object module 0BJCET is not stored.
- the unique tag code (100) can uniquely determine the location of the data.
- the process of loading a concept object attribute data only the unique tag code needs to be loaded first, and other parts of the data can be extracted and loaded into the program processing as needed.
- the module Because of the mature database technology, through its powerful data retrieval function, the problem of poor data retrieval capability of the file system based storage object module can be avoided.
- the communication process can be simplified.
- the unique mark of the concept object is passed at different application levels of the system, instead of all relevant resource information of the concept object, such as program module, attribute set, attribute content and processing function, etc., the user can obtain the unique mark according to his own needs. Calling the concept object attribute content or functional methods greatly reduces the amount of blind communication.
- the client programming and implementation process can be simplified.
- the browser manages operations through icons with such tags, which greatly simplifies the implementation process.
- the Relay Agent Module 300
- the object oriented information server is constructed by a service program module array (400) installed on a computer system.
- the composition thus comprises at least one data processor (010), at least one data storage medium (040) and program modules (420, 421, 422, 423) stored on the data storage medium (040).
- the service program module array (400) according to the unique mark code (100) of the concept object, hierarchically represent, store and manage various concept objects and their attributes in the objective existence; the user passes the relay agent module (300) Calls to various functional methods of the program module.
- FIG. 4 Schematic diagram of the method of making the server illustrates the steps to create various conceptual objects. Further details are as follows:
- the electronic name EName is a simple, intuitive, and visual name used by the user for the concept object in the system. It is similar to the user name but the named object is not limited to people but all conceptual objects.
- This program module provides functional methods for accessing various basic attributes and various basic functional methods for managing concept objects by accessing the basic data table (410); these functional methods can be inherited by functional methods of the same name in the lower program modules. Or cover Inheritance Or Override, so you can take full advantage of the technical support of polymorphic Polymorphism in the programming process.
- These functional methods include:
- Create a concept object record create that is, create a specific concept object record according to the attribute feature content of a provided concept object, such as a specific concept object named "Zhang San", a type of "natural person”; the method first passes Calling an existing algorithm for generating a UID to create an associated unique tag code (100), then creating a record in the base data table (410) and returning the UID;
- Find the concept object findUID that is, according to the attribute features of the provided conceptual object, such as the electronic name, look up the positioning concept object in the data table, and return a collection of the unique tag code (100) of the qualified concept object, if not found, return An empty set;
- Find the type of concept object findTypology that is, you can determine the type to which it belongs by accessing the base data table (410) based on the unique markup code (100) or electronic name of the provided concept object.
- the functional method of using the corresponding conceptual object is managed by inheriting the basic program processing module (420) in one or more program processing modules (421) of the data storage medium (040) and by accessing the corresponding data table (411).
- This module automatically obtains the basic functional methods provided in the upper program module through inheritance, so it is only necessary to further provide the operation management content of the connotation added part on this basis;
- the create method of the concept object attribute record is established.
- the method obtains the unique mark code (100) of the new concept object while establishing the basic record in the basic data table (410) by calling the upper program module with the same name method, and then correspondingly A corresponding record is created in the data table (411).
- the function method create of the concept object record is established, and the method obtains the corresponding basic record in the basic data table (410) and the data table (411) by calling the upper-order program module with the same name method, and obtains the unique mark of the new concept object.
- the code (100), and the unique tag code (100) is created as a UID along with other newly added attribute contents in the corresponding data table (412).
- the extension of the various functional methods is expanded, and other functional methods are established.
- program processing modules (423) on the storage medium by inheriting a program module (421, 422) of the upper-level concept object, and accessing a program processing module provided by a third party, providing more detailed Functional method.
- the specific method can be (but is not limited to):
- the program module is passed to a third-party vendor to implement
- wrapper module only some of the functional methods are forwarded to the third-party program module, and other functional methods are implemented. Therefore, it is possible to establish a data table of the concept object at the same time.
- the proxy server module (300) running on the data storage medium (040) by the data processor (010), the server enters the ready state, and can start working to provide various types of information services for the user.
- the relay agent module (300) is an important component program module in the concept object information manager, which acts as a bridge between the information browsing program module (200) and the service program module array (400);
- the various program modules in the background are always transparent to the browser. In other words, the addition, subtraction and maintenance of the program modules on the server will not affect the operation of the browser. Its functions and implementation steps are:
- the service agent locates the distribution position of the corresponding program module on the server side according to the mark of the concept object, according to the registration record of various concept object types.
- the unique tag code (100) and findTypology methods of a given concept object can be used to find the type of the corresponding concept object, and then find the corresponding program processing module's seat and the calling program processing module in the type registry, which can be local.
- the call can also be a remote call procedure such as S0AP, RMI, C0RBA, II0P or DC0M.
- the service agent triggers the corresponding function program according to the discovered procedure according to the name and input parameters of the calling function, and feeds back the result of the execution to the user.
- the user determines the appropriate information display method based on the returned information, such as a collection of icons of the concept object or text information.
- the returned information may also be the use of navigation information to further complete the functional method, the user can interpret this information and further generate a navigation page to guide the user's further operations.
- the service program module array (400) can be a set of program modules that run independently, or can be additional services in other standard specification service systems, such as ebXML and UDDI.
- the server system is actually a general device system for representing, storing and managing knowledge information, providing information representation based on concept objects and Managed tools. And the process of manufacturing the server can be completed by simply constructing a program processing module array and a data table system through a simple and feasible process.
- This kind of server can not only make full use of the powerful functions of computer hardware, database management system, and network system, but also has the following advantages:
- this server system is an open system design.
- the server system can continuously increase the number of program processing modules for various specific concept objects and expand the scope of server information services as needed.
- this kind of server system is based on the object-oriented modeling technology.
- the various attributes of the concept object are represented, stored and processed hierarchically according to the concept object type and attribute sharing.
- the object-oriented program technology can be fully utilized. Inheritance and polymorphism in the middle; Improve the frequency of reuse of program modules in a step-by-step manner, thus improving the efficiency of information representation, storage, and management.
- program modules that have been formed or the program modules provided by the third party can be connected to the system in a standard manner and become an integral part of the system.
- This server system therefore provides a standard way of integrating various types of computer and network applications.
- Standardized packaging of existing types of program modules can also ultimately achieve the purpose of expanding the scope of the system's functions and information services.
- the browser program module does not need to perceive the final source and storage location of various information services, and can directly perform various information browsing and use operations.
- the function of this transit proxy service technology is similar to that of the object request broker ORB in the C0RBA, but the usage method, the scope of use and the effect of use have significantly different characteristics:
- the present invention uniquely marks the code (100) and the functional method The name dynamically invokes the functional method in real time, there is no special program installation requirement on the client side, and the server module array (400) can be distributed over a wider range using various other remote calling procedures.
- This relay agent service mechanism makes the background service module array transparent to the browser, and can keep all information technology related development, installation, adjustment and maintenance work on the server side.
- the program modules on the server side are constantly being adjusted and added, there is no need to install, adjust, and maintain frequently on the browser side.
- This privilege control system can control the use and operation of various concept objects, and has rich and intuitive abstraction and specific power concept object representation and storage functions. If you further use the business process control system, you can achieve dynamic Power management process.
- the object-oriented information browser is implemented by an information browsing program module (200) running on a terminal device, such as a mobile phone or a personal computer system PC, and thus includes at least one data processor (010) and at least one data display ( 020), at least one data storage medium (040), at least one information browsing application module (200) stored on the data storage medium (040), and at least one object-oriented information server described in the present invention, characteristics of the technical solution Yes:
- the information browsing storage data storage medium (040) is browsed using the program module (200) according to the unique object code (100) of the concept object, and the various concept objects and attributes are passed through the data display (020) Representation and use in the form of certain graphics or text, and the various functional methods located on the service module array (400) can be invoked by providing the relay agent module (300) with the name and input parameters of the functional method, and finally returning The information is parsed, displayed, used or used as a basis for further operations.
- a stand-alone application that can utilize graphical operations to design and implement more powerful programming languages, such as Delphi, VB, and Java, without being limited by the limitations of existing browser system design;
- Protocol interpretation processing module Protocol Handler on the web browser establishes a protocol interpretation processing module Protocol Handler on the web browser, and can use the information organization and the use format in the invention as a special network resource format for ordinary Web browser browsing use;
- ⁇ is a program component nested in other applications of office automation, such as in Microsoft's OFFICE system, access to such program components through VBA, such as Active-X Control can make the domain Field control in the document
- VBA such as Active-X Control
- the following is a social resource information browser independent application established by Java Swing, which is a preferred embodiment of the object-oriented information browser of the present invention.
- Java language is a powerful high-level programming language, and products developed in Java can run on different operating system platforms.
- Java Swing provides the basic technical support for the necessary graphics operations.
- the internal logic function of the browser consists of the following functional modules: internal and interface initialization management module (240), login management module (241), mouse and keyboard input event management module (242), menu management Module (243), command parsing and execution module (244), and information display module (245).
- internal and interface initialization management module 240
- login management module 241
- mouse and keyboard input event management module 242
- menu management Module 243
- command parsing and execution module 244
- information display module 245.
- the internal and interface initialization management module (240) first completes the setting of the internal state and interface structure, the main menu, and the mouse and keyboard operation event listener segment Event Listner.
- - 16-record management module (241) verifies the identity of the user according to an authentication mechanism, and then stores the verification information in a secure component;
- Input event management module (242), centrally manage various events of mouse and keyboard operations. Different program modules are executed depending on the mouse operation or keyboard operation and the currently selected object; (4) If the currently selected object is an icon of a concept object, the unique object code of the concept object should be extracted ⁇ ) Send to the menu management module;
- the menu management module (243) determines whether to open the concept object according to the number of mouse clicks and the left and right button selections, or sends a request to the server, retrieves the user's operation function method menu for the concept object, and then displays the menu. come out;
- the command parsing and execution module (244) can generate a name and an input parameter of the calling function according to the unique tag code (100) of the provided conceptual object, and then use the information as a parameter to call the relay agent.
- the fixed function method on the module (300) triggers the operation of the corresponding function side; after obtaining the return information, the information is submitted to the information display module (245) for parsing and display.
- the information display module (245) displays a series of icons or windows (150) on a desktop display component JDesktopPanel as a placeholder for each conceptual object; whenever a conceptual object is hit, it will be in this area.
- An icon is displayed; the icon or window (150) is implemented by the JInternalFrame component, which can be converted into an icon, restored to the original shape, maximized, and moved as needed; a unique tag code associated with the concept object is stored behind the JInternalFrame component ( 100).
- the browser interface includes a common concept object memory area (210), a usage history memory area (211), a user icon display area (212), and a detailed information display area (213).
- the entire interface is synthesized through a JFrame.
- each icon in the tree structure represents not a file directory and a file but a conceptual object, such as a property item, company, individual, contract, country, and so on.
- the common concept object memory area (210) is implemented by a JTree, and the unique object code (100) of the corresponding concept object is stored by the User Object contained in each tree node TreeNode.
- a memory area can be created for each user's own common concept object, a subset of the concept objects is stored and the relative relationship of the concept objects is represented, and technical support is provided for the user to customize his own use interface. It works the same as My Favourites, which is common in other browsers, but it is a storage area with a tree structure, and users can memorize and manage common concept objects by copying, pasting, dragging and dropping, etc.
- the concept objects are organized according to their own understanding and in an easy-to-use manner, so the usage is the same as the tree file directory structure on the Computer Explorer.
- the main difference with the directory management in the computer resource manager is that the user can organize the structure and relationship of the concept objects according to their own understanding, use and habits, without any technical restrictions, which is the same as the file shortcut.
- the icon Shortcut is similar.
- Different copies of nodes can be placed under different parent nodes at the same time to represent the complex and variable aspects of knowledge structure and logical relationships.
- the information usage history memory gives a close-up graph of the use of the historical memory area (211).
- the history memory area (211) implemented by JComobox, is the process record area for the user to use the concept object.
- the query information of the concept object can be input, and the other aspect can memorize the recently used concept object to support frequent repeated operations. Therefore, it has the same function as the upper address bar of the web browser, except that the address bar of the web browser always inputs the URL address, and the present invention can input the electronic name or other attribute content of the conceptual object, always remembering and displaying the concept.
- the object's name and icon are actually the only tag code (100) behind it.
- the detailed information display area (213) is a desktop display unit JDesktopPanel controlled by the information display module (245), and provides an area for displaying detailed information of various concept objects and performing various related function operations. Clicking on various icons of various concept objects displayed on the interface can cause the corresponding concept object to be displayed in the area by an icon or window (150) implemented by a JlnternalFrame.
- the user can perform further mouse operations on the icon, such as dragging and dropping with the mouse or clicking a button to adjust the window position, size, closure, and full iconization. It is also possible to call the corresponding function menu and parse the returned information and display it through other graphical components attached to the icon or window (150), such as a table JTable, a list JList, a text box JTextarea, or even a Browser Web Browser or text editor Word. These components are dynamically generated; the choice of which component is determined by the format of the information returned by the server.
- JTable For example, if you return an array that represents a collection of properties, use JTable; if it is a collection of conceptual objects, use JList; if it is an XML message, use a given XSL document to convert it to HTML information for display on JTextArea or Web Browser.
- the various information displayed may be accompanied by an icon representing a conceptual object; this icon is implemented by several abels, and can further implement a similar function menu and display the detailed window of the concept object.
- the 'm 7 genus' name and content list is a subset of the basic attribute characteristics of the corresponding concept object displayed by nesting the table component JTable on the icon or window (150). In this example, the basic properties of the property item MyTv are displayed.
- Figure 11 shows that the conceptual object set of power gives a list of individuals Rechard's rights concept objects, such as the rights of the owner, the rights of the user, etc., which is displayed by JList;
- Figure 12 The concept object collection of the property owner is the property item MyTV owner's concept object collection, this collection information is displayed by JList.
- the user icon display area (212) is a display icon indicating the user's own; after the current user completes the login, the browser displays the icon representing the user as the representative of the user in the information space, and the user is in the information space. Proxy or corresponding mapping object. Clicking on this icon displays the main menu that the current user can operate on.
- Figure 9 shows the operation function option display interface that can be requested by the user point ⁇ icon for the operation options of the user and the operation object, and is implemented by the popup menu component JPopupMenu. In this example, the display of the pop-up menu for the current user BILL request operation option is given.
- the use history memory (211) is implemented by a comprehensive input display component JComoBox. Its function is to provide the user with the tool to input the characteristics of the concept object attribute, and to memorize a fixed number of recently used concept objects; the user can also select any one of the concept objects in the memory, and open the display in the detailed information display area (213) again. Any conceptual object.
- the component forwards the function method name and input parameters that generate the lookup concept object to the command parsing and execution module (244); for example:
- the name of the generated function method is: findUID;
- the parameters of the method are: Object args [] two ⁇ " (EN ⁇ ) " ⁇ ; where (EName) is the electronic name of the input.
- the command parsing and execution module (244) can trigger the findUID method on the basic program processing module (420) through the relay agent module (300); in this case, there is no need to provide a unique tag code for the concept object (100). Because the program module of any conceptual object has this findUID method.
- an icon or window (150) is created in the display area as a placeholder for the concept object, including the unique tag code (100) of the concept object;
- the above steps may obtain an icon or window of a plurality of conceptual objects of interest to the user (150);
- the user can use the cursor operation on the icon or window (150) to trigger a sequence of instructions on the input event management module (242) and the menu management module (243), the process being first obtained through the input event management module (242).
- the unique markup code (100) of the concept object and then call the fixed name function method getMenu through the menu management module (243), obtain the menu set of the function method that the concept object can provide, and finally display the menu set in this
- the icon or window (150) is associated with the user for selection; behind the respective function method menu names, the user uses the prompt function and the internal operation instruction information to call the function method; for example, the format and content of the internal operation instruction are:
- the user selects a menu item, and the information browsing using program module (200) will trigger an instruction sequence to first extract the unique tag code (100) of the associated concept object and the internal instruction information behind the function method name, and generate each required for calling the function method.
- a parameter and then call the method in the specified information display module (245), such as showDetail, which in turn passes the relay agent module (300), triggers the corresponding functional method of the concept object, such as getOwner, according to the returned information, the showDetail method , will decide to select the component that represents the information, and display the resulting information in the display area associated with the concept object through the display component; for example, the getOwner method returns a collection of the corresponding concept object owner, so this information will pass A JList is displayed; each owner is displayed in a JList by a few abels, both icons and text; adding some function methods to respond to mouse events to this display component, you can complete the included concept object Make more The code for further operations. If the attribute information of the concept object is displayed through the
- JTable, ist, JTree, JTextArea, JComobox and other display components provide powerful event-based event-based programming support for mouse graphics operations, thus enabling quick and easy implementation of various graphics operations through the mouse and keyboard.
- Some of the components in the browser of the present invention, such as JTable, JList, and JTextArea, have special meanings that represent a collection of properties or properties of a conceptual object, respectively.
- the set of function method menus of the conceptual objects provided to the user may further include copying Copy, pasting Paste, deleting Remove or Clone Clone, and further enriching the way the user operates the conceptual object, such as generating new conceptual objects, combinations. Synthesize new concept objects, delete concept objects, etc.
- the specific content and implementation process of these operations are:
- Copy which means that the unique tag code (100) of the currently selected concept object is copied and stored in the copy buffer;
- Paste refers to the unique object code associated with the unique tag code (100) stored in the copy buffer, and establishes a specific relationship with the object selected by the current cursor; if the current selected area of the cursor is in the common concept object memory area (210) Just under the selected tree node, create a new concept object node; if the current cursor selected area is in a unit of JTable, the copied concept object is used as the content of the corresponding attribute; if the current cursor is selected Is a JList to create a new relationship concept object, such as the inclusion, use rights, ownership, etc.;
- Delete determine the following operations: If the selected object is a tree node in a common concept object memory area (210), it is deleted from the tree structure; if it is a display part representing a specific relationship The concept object included in the concept, delete the relationship and remove the corresponding placeholder from the display component;
- a conceptual object By dragging and dropping an icon or window (150) representing a conceptual object, a conceptual object can be associated with another conceptual object, thereby performing operations on the synthesis of the conceptual object, and the process is implemented by Java's Drag&Drop interface.
- the first step is to obtain the unique tag code (100) of the concept object represented by the source and target components of the drag and drop operation, and then determine the operation on the target component according to the attribute name represented by the target component, for example, performing concept synthesis and adding use. Owner, add power, and so on. If the target component is the display component of the common concept object memory area (210), JTree creates a new node under the tree node of the drop cursor position to store a copy of the concept object of the source component.
- the social resource browser implements the information browsing method based on the concept object, and completes the information representation and use from the document-based file to the concept-based object. , there are qualitative differences between the various types of computer resources and web browser functions and scope.
- Such browsers have a rich graphical user interface and means similar to computer resource browsers.
- rich graphical manipulations such as drag and drop, display scale, range and angle Adjustments, graphical representations of conceptual objects, etc.
- the range of resource objects for browsing and use is various types of conceptual objects supported by the server, and is a variety of conceptual objects in social existence, not just It is a computer resource concept object.
- Each concept object in the browser can have an icon corresponding to it; by cursor operation on these icons, the user can achieve the purpose of information usage and management.
- the use of unique tag codes (100) and icons greatly simplifies the implementation of various graphics manipulation functions.
- the unique tag code (100) is always hidden; the general user does not need to know its existence, and does not need to intervene in the editing modification of the positioning tag encoding. Therefore, the unique tag code (100) can improve the transparency of the underlying technology to the user throughout the use process, which is different from the use of the URL.
- the display of random information combinations can combine, adjust, hide, and display partial collections and structures of conceptual objects according to the user's own understanding, needs, and preferences. It avoids the disadvantages of the web browser interface, the accumulation of text information and the single operation means.
- a functional method operation menu is provided in a targeted manner.
- the operational options of the functional methods are provided for the nature and function of the conceptual object itself.
- the browser is distributed around the server in a star manner and the server can be distributed in the scope of the WAN. If this is used as a core architecture platform for establishing various other information application service systems, the cost of system development, maintenance, expansion, and reorganization can be reduced. At the browser end, a lot of system installation and maintenance tasks are avoided.
- a social resource information management server 2.
- the social resource information management server establishes a program processing module for each type of conceptual object through a Java Bean; each Java Bean accesses a data table corresponding to the conceptual object through an Enterprise Java Bean relative to j1 ⁇ 2, and obtains a technique for controlling the Transaction Control by the operation unit. Support;
- the program processing module of the concept object implemented by Java Bean can be quickly converted into a server module or a WebService type server module.
- the relay agent module (300) MEntity is also implemented by the Java Bean; it uses the local calling procedure to call various functional methods on the service program module (400); after obtaining the name of the program module, the corresponding example method newlnstance can be directly invoked. Create an object module Object.
- MEntity is responsible for submitting permission audits. It proposes a permission review to the background rights management system by calling the may I method in the program processing module of the power concept object according to the unique tag code (100) of the concept object, the function name, the input parameter, and the user's authentication information; If not, immediately stop the call process and feed back the corresponding call failure information; MEntity determines the type of the concept object according to the unique tag code (100) of the concept object provided by the caller; then registers the type of the concept object Information Sheet The name of the program processing module corresponding to the concept object type and the corresponding package location are obtained by the corresponding program module ATypology.
- MEntity uses an invokeMethod method to trigger the corresponding function method according to the name, location and procedure of the program processing module obtained by the query, and feed back the obtained result information to the caller; using java.lang The invoke method on the reflect. Method implements the above invokeMethod method.
- the way to generate the unique tag code (100) is the way the JID is generated in the JDK.
- the class concept object Part is included, and its program processing module APart inherits the basic program processing module (420) AEntity, and further includes the attribute inclusion and inclusion, indicating the mutual inclusive relationship between the existence;
- Human concept object Person its program processing module APerson inherits AEntity, and further includes the common attributes of human beings, including natural persons and social organizations with or without legal personality;
- Asset class its program processing module AAsset inherits AEntity, and represents the common basic attributes of property, and provides management and control over property ownership and use rights, including attributes, units of measure, quantity and unit price;
- the content of the attribute object can be any conceptual object in the social existence, and thus these concepts are associated with the property concept to obtain operational functional methods of the property.
- the owner concept object Owner its program processing module AOwner inherits AEntity, indicating the social relationship between the owner and the property;
- User rights concept object User its program processing module AUser inherits AEntity, indicating the social relationship between the owner and the property;
- AEntity represents the social relationship between the creation of people and property
- Agent human concept object Agent its program processing module AAgent inherits AEntity, indicating the social relationship between the agent and the agent;
- the power concept object Power its program processing module APower inherits AEntity, which indicates the qualification of a person to operate on a certain concept object.
- the basic attributes include the subject of the power (user), the object (the concept object as the operation object), and the content. (the operation method corresponding to the concept object); the permission class concept object Constraint, its program processing module AConstraint inheritance
- AEntity which represents a restrictive condition for power. Attributes may include restrictions on the scope of the subject, the scope of the object, and the scope of the content;
- AEntity including the common basic attributes of the business process or legal process; and the type and attribute structure of various business processes can be established according to the standard content of the business process information message provided by the EDI, ebXML and xCBL specification systems;
- Log concept object TxLog its program processing module ATxLog inherits AEntity, a recording system for establishing the main events of the system use process and business process;
- it may also include the following various conceptual object types: standard, legal, unit of measure, country, currency, geographic region, and the like, to make the embodiment of the present invention a true social resource information server and Browser.
- a service or functional method that can be provided to a program module located in a utility service authority information system such as a property transaction institution, a financial service institution, a population management institution, an industrial and commercial administration institution, etc., through one or more lower positions of the above various program modules
- a program module located in a utility service authority information system such as a property transaction institution, a financial service institution, a population management institution, an industrial and commercial administration institution, etc.
- the program module of the concept object type is wrapped.
- the program processing module of the concept object needs to provide various functional methods for accessing related attributes, and at least includes one or more of the following functional methods:
- Create a concept object record create, that is, create a concrete concept object according to the attribute feature content of a provided concept object, such as a specific concept object named "Zhang San", a type of "natural person”; the method is first called An existing algorithm for generating a UID establishes an associated unique tag code (100), and then creates a corresponding record in the basic data table (410) and other data tables (411, 412) and returns the corresponding record.
- UID
- Find the concept object f indUID that is, according to the attribute features of the provided conceptual object, such as the electronic name and type, look up the positioning concept object in the data table, and return the set of the unique tag code (100) of the qualified concept object, if not Find an empty set if found;
- Find the type of the concept object findTypology that is, according to the unique markup code (100) or electronic name of the provided conceptual object, determine the type to which it belongs by accessing the basic data table (410); determining the type of the conceptual object is determining the conceptual object program A pre-requisite operation step of the module; obtaining menu information getMenu, providing menu information corresponding to the operation option that the concept can provide for the current user; on the browser, the menu management module (243) can dynamically create a pop-up menu according to the information;
- the menu information includes the display name of the menu item, the corresponding fixing method on the browsing program module, the name of the function method corresponding to the program module, the number and type of parameters to be input, and the information display manner after execution;
- Obtaining a property collection getProperty providing a property collection of a conceptual object of a corresponding type; the method takes a property of the conceptual object as a special conceptual object, and queries and gives a collection of the special conceptual object according to the type of the given conceptual object, the specific step is Collecting the attribute structure of the concept object and the corresponding feature information on the program module of the concept object, and then returning the information in the form of an array; obtaining a set of function methods getMethod, providing a collection of various functional methods corresponding to the concept class; the method will be located
- the function method of the concept object on the program processing module is a special concept object. Query according to the type of the given concept object and give a collection of this special concept object in the form of an array.
- the concept component getPart query a set of constituent components of a given concept object; query the relevant records in the corresponding data table through the APart program module; if not, return an empty set;
- getCreator and AddCreator query and add a collection of ownership of a given concept object; query or create a corresponding record in the corresponding data table through the ACreator program module.
- the rights control system is another important component of the preferred embodiment of the concept object server.
- the permission control system is completed by the program processing module of the power concept object.
- the concept of power attributes includes subjects, objects, and operations; the contents of these attributes are represented by their respective unique tag codes (100).
- a specific concept of power is a specific means of expressing power to a particular subject for a particular subject, such as Zhang Shan's power to transfer his Toshiba TV set;
- An abstract power concept object refers to any subject matter (operator), object (operation object), or operation is an abstract conceptual object, such as the type of conceptual object, the social relationship of a particular object (such as owner and use) The right person, etc.) or a host concept object of a conceptual object;
- the abstract power representation method can represent the role-based authorization content simply, intuitively and efficiently, such as the power of the property owner to transfer ownership of the property item;
- the method that the program processing module of the power concept object needs to include needs to include the mayl method.
- This method starts a special algorithm that examines the powers and restrictions that a given user has on a given functional method by accessing the records of abstract and specific power concept objects. The steps are:
- Direct matching with a power concept object means that the unique tag code (100) of the subject, object, and operation is exactly matched;
- Indirect matching with a power concept object means: at least one of the subject, the object, and the operation indirectly matches the given user, operation object, and function method, and the other items directly match; if the user and the operation object have Social relationship between the owner, the owner or the creator, the Lord The body is indirectly matched with the conceptual object of the social relationship, and the object and the operational function can directly or indirectly match the given operational object and the operational function method; if the user is the agent of another person, the subject and the agent represent the agent relationship Concept objects form direct or indirect matches, and object and operational functions can be directly or indirectly matched to a given operational object and operational functional method;
- Direct matching means that the comparison item is identical to the unique tag code (100) of the compared item;
- indirect matching means that the comparison item is a type concept object, a superordinate type concept object or a host concept object of the compared item;
- the type concept object of the comparison item is a concept object representing the type of the comparison item;
- the upper-level type concept object of the comparison item is the upper-level type concept object of the type concept object of the comparison item, and the upper-level concept of the comparison item itself is a type concept object Object;
- the host conceptual object refers to another conceptual object that contains the conceptual object. That is to say, the conceptual object is a constituent component of the host conceptual object, for example, a television is a host conceptual object of the kinescope.
- each power concept object in the result set of the matched power concept object is also required according to the given consumer, operation object, input parameter, according to the concept of authority
- the object data record is reviewed for permissions; the permission review may include restrictions on the scope of the parameters, as well as restrictions on time and place, etc.;
- J returns the allowed Information.
- the user can change the social relationship between the user and various concept objects through the automatic execution of the business process, such as the owner, the right holder, and the agent, thereby forming a dynamic management mechanism for the authority control.
- the above-mentioned authority control system further expands the existing role-based or job-based authority control mechanism, making it a weight control mechanism based on the actual social relationship of the operator's concept objects.
- This privilege control system combined with the business process control system described in detail below, allows the acquisition and transfer of various operational privilege independent of any system administrator, but relies on legal-based system settings and the rights of the owner to dispose of rights. , for example, the principal, transfer and transfer of power. And through the management and control of the legal process concept object, the expression and realization of the individual will of the parties are completed according to law.
- the role identity is relative to the action object.
- the role identity is the fixed identity decision of the user in the unit system.
- the relationship with the resource concept object in the system is fixed, and the relationship between the user and the conceptual object being used in the new control system is fixed. It is also a special form of character.
- This provides a richer support for abstract permission representations.
- the concept object can be more richly abstracted, for example, through the concept object of the social relationship of property owner, user and creator as a means of expressing a kind of abstract power, indicating the social relationship subject General rights to the object.
- the parties may, in accordance with the law, punish their rights by means of contracts, powers of attorney, etc., to realize the transfer and acquisition of rights; the system automatically adjusts the identity and authority of the parties according to these legal process documents. For example, after a property transaction is completed, the role of the seller's owner is transferred to the buyer. This role change does not require the intervention of system administrators. It is the personal decision and control of the parties through the legal process concept object, which solves the "stationary character defect problem".
- the business process control system is also another important component of the preferred embodiment of the conceptual object information management system server.
- the business process control system is implemented by the program processing module of the business concept object.
- the user can control the development of the business transaction process, and can automatically execute at least part of the specific content, such as transfer of ownership and use rights, transfer of funds, and acceptance of service quality acceptance. and many more.
- a business transaction process record includes at least Party A, Party B, related business transactions, and business operations.
- the business process program module needs to include at least one or more of the following functional methods - query the signer getSigner, query the corresponding data table through the ASigner program module, and return the set of parties that need to be signed before the transaction process takes effect, the default signature
- the person is the owner of the relevant property;
- Execute execute the execution of the business process content after the business transaction process takes effect; change the content of the corresponding social relationship through the program module corresponding to the social relationship of the owner, the user, the agent, and the like;
- the log registration log is used to register various events during the business transaction process;
- the ATxLog program module is used to establish corresponding records in the corresponding data table;
- Get legal advice getLegalAdvice this method is another aspect of legal review; return information to review the legal process, or the legal process can not meet the legal requirements; users can call this method in the process of establishing a business transaction, Advice on obtaining legal validity;
- the business process program module realizes the function of establishing a new business transaction process, synthesizing a plurality of business transaction activities, and forming a total business transaction process by calling a common create, addPart, and the like. Relevant parties can edit and modify the various attributes of business transactions, and sign the various signing activities of invitations, offers and promises through signatures.
- the business process is divided into two types: legal process and non-legal process.
- legal process will result in changes in the parties' rights and obligations, including contracts, orders, deliveries, etc.
- the process of business transfer, commissioning, authorized use, etc., such as property and operational use rights, is a legal process.
- legal concept objects Through the use of legal concept objects, the legitimate rights and interests of the parties can be guaranteed, and the technical process of the rights management process can be blocked.
- the role change process is automatically completed by the system through the "execution contract";
- Non-legal processes generate control over the control of business processes and the acquisition of specific services, such as the generation of plans and reports.
- the business process can be a transfer document, the object of which is a property item, such as goods, services or cash, etc.; the parties have signed the certificate to prove the completion of the transfer of property.
- the business transaction process can be a contract, characterized in that the object of the business transaction process is a property item; the operation item of the business transaction process is the sale, lease, commission, and transfer of the property; the contract process can be combined by a plurality of small business transactions.
- the contract is effective after all parties sign; the sub-processes to which the effective contract is executed constitute the execution of the contract as a whole; the sub-processes to which the effective contract is executed may respectively control the single-step process of the contract by generating the transfer document Execution; control of the entire fulfillment process through control of a single-step process;
- the business process concept object can be as reduced as the general concept object, such as the terms of the contract.
- the general method of conveniently browsing and managing concept objects provided in a concept object browser can be directly applied to managing business process concept objects.
- the parties can control the business process.
- the relevant parties or the persons designated by the right holder are required to sign the business process concept object, fully guaranteeing the parties' understanding of the process content and realizing the control of the business process.
- flexible and flexible business process flow control can be formed, which avoids the disadvantages of being difficult to update through the program code and high maintenance cost.
- the system can automate business processes.
- the device system provides functions for automatically executing business processes, automatically selecting and triggering corresponding functions provided by various underlying support systems, and completing changes to the social attributes and other attributes of the target concept object, thereby breaking the law in written or document form or Business text can only be understood and enforced by humans, and the process of modifying the content of various attributes is transparent—no need for manual or system administrators to do it manually.
- the automated execution of the transaction process also provides new technical facility support for the simultaneous execution of cargo service delivery and settlement payments.
- legal advice on the process of the transaction can be provided in a targeted manner.
- the user may request relevant information about the operational use and authority according to the nature and content of the current business process or legal process; or obtain relevant prompt information in the feedback information without passing the legality review.
- Reviewing the legitimacy of the business process is a further means of controlling the legal validity of the business process, and is another important component of the authority control system.
- a social legal system requires a variety of specific norms for a legal process, and the decision process is complex; based on such process concept objects, the authority control system has the opportunity to have more comprehensive control over such processes. For example, a comprehensive review of the party's age, legal personality, type, quantity, specification and nature of the subject matter determines the legitimacy of the business process, or gives relevant information.
- the business process concept object provides the possibility to take advantage of the various outcomes of industry standard specifications.
- EDI, xCBL, and ebXML have detailed industry-recognized specifications for the content and format of various documents for business transactions; these concepts can be leveraged to establish a conceptual object architecture for business process control.
- Typical conceptual object operations are creating, editing, modifying, and synthesizing conceptual objects.
- By inputting the attribute content of the corresponding concept object category it is possible to establish various types of concept objects supported by the server side, such as a property item, a contract, and a contract term.
- Examples of typical business processing functions include sending a contract or offer, signing a contract, executing a contract, and confirming an application, that is, after the establishment of a property concept object, the competent authority is required to review the ownership of the property item by the owner.
- the browser parses and displays the navigation interface from the feedback information of the server, such as XML information, to maintain the user's operation dialogue with the system.
- the feedback information of the server such as XML information
- Multi-threaded applications can improve the response speed of the algorithm through multi-threaded Thread technology; for example, the process of calling the function module can be arranged in a separate thread, and the user can continue the other operation without waiting for the result of the execution, thereby improving the efficiency of the operation. , also make full use of the server system multi-process capabilities.
- the use of multi-threading technology in the process of privilege review is very important to improve the efficiency of privilege auditing.
- a secure directory product can be used to replace this data table with a hierarchical directory management structure, which can solve the problem and support the distribution of data storage. Other data sheets can be adjusted the same.
- UID is an alphanumeric code with a relatively fixed length, which is theoretically exhaustive. But this threat is very remote, because UID code often has the characteristics of date and time; the time of the next repeated UID may be 10,000 years later; in order to avoid this "year-old problem", humans have sufficient time to use New UID generation algorithm.
- a reliable data communication security encryption technology can be used to control the privacy and security of the system's use.
- Industrial applicability can be used to control the privacy and security of the system's use.
- the invention is applied to information tagging, presentation, storage, distribution, composition, integration, management, query, browsing and use.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410055435 CN1728133B (zh) | 2004-07-27 | 2004-07-27 | 面向对象的信息服务器、其制作方法及浏览器 |
CN200410055435.2 | 2004-07-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006010320A1 true WO2006010320A1 (fr) | 2006-02-02 |
Family
ID=35785897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2005/001080 WO2006010320A1 (fr) | 2004-07-27 | 2005-07-20 | Serveur d'informations oriente-objet, procede de generation associe et navigateur |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN1728133B (fr) |
WO (1) | WO2006010320A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112433722A (zh) * | 2020-11-27 | 2021-03-02 | 深圳前海微众银行股份有限公司 | 模块化系统代码开发方法、装置、设备及系统 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100407818C (zh) * | 2006-02-23 | 2008-07-30 | 华为技术有限公司 | 实现PoC群组发起会话时选择会话成员的方法 |
CN101188798B (zh) * | 2007-08-09 | 2012-03-28 | 胡维朗 | 基于手机短信平台的信息服务系统 |
CN102236645B (zh) * | 2010-05-06 | 2016-03-30 | 上海五和际软件信息有限公司 | 基于语义逻辑的类自然语言人机对话装置 |
CN102457474A (zh) * | 2010-10-21 | 2012-05-16 | 镇江金软计算机科技有限责任公司 | SaaS应用软件的租户日志管理方法 |
CN102479356A (zh) * | 2010-11-30 | 2012-05-30 | 金蝶软件(中国)有限公司 | 一种穿行测试方法和装置 |
CN102331763A (zh) * | 2011-08-02 | 2012-01-25 | 成都海视特科技有限公司 | 过程控制系统的命令生成执行方法 |
CN104765843B (zh) * | 2015-04-16 | 2018-11-09 | 国家电网公司 | 一种用于电力实时监控系统的图形界面控制方法 |
CN105224396B (zh) * | 2015-10-14 | 2019-10-18 | 深圳市金证科技股份有限公司 | 一种业务数据处理方法和装置 |
CN105872578A (zh) * | 2016-03-30 | 2016-08-17 | 青岛海信电器股份有限公司 | 一种调用方法及服务器 |
CN110543371B (zh) * | 2019-08-29 | 2023-11-17 | 张浩天 | 一种远程调用接口的方法、装置、电子设备和存储介质 |
CN112860770B (zh) * | 2019-11-27 | 2024-03-01 | 北京沃东天骏信息技术有限公司 | 报表生成的方法、装置、电子设备和存储介质 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1462391A (zh) * | 2001-05-15 | 2003-12-17 | 索尼公司 | 使用信息图像的信息管理系统和信息管理方法 |
US20040024847A1 (en) * | 2002-04-11 | 2004-02-05 | Toshiyuki Furuta | Paper identification information management system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6003083A (en) * | 1998-02-19 | 1999-12-14 | International Business Machines Corporation | Workload management amongst server objects in a client/server network with distributed objects |
US7526468B2 (en) * | 1999-01-08 | 2009-04-28 | Computer Associates Think, Inc. | System and method for recursive path analysis of DBMS procedures |
KR100618997B1 (ko) * | 2000-04-10 | 2006-08-31 | 삼성전자주식회사 | 홈 페이지 광고 방법 |
CN1339748A (zh) * | 2000-08-21 | 2002-03-13 | 叶柯 | 信息的发布、分拣和访问的方法 |
-
2004
- 2004-07-27 CN CN 200410055435 patent/CN1728133B/zh not_active Expired - Fee Related
-
2005
- 2005-07-20 WO PCT/CN2005/001080 patent/WO2006010320A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1462391A (zh) * | 2001-05-15 | 2003-12-17 | 索尼公司 | 使用信息图像的信息管理系统和信息管理方法 |
US20040024847A1 (en) * | 2002-04-11 | 2004-02-05 | Toshiyuki Furuta | Paper identification information management system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112433722A (zh) * | 2020-11-27 | 2021-03-02 | 深圳前海微众银行股份有限公司 | 模块化系统代码开发方法、装置、设备及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN1728133A (zh) | 2006-02-01 |
CN1728133B (zh) | 2010-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8478616B2 (en) | Business application development and execution environment | |
US7610575B2 (en) | System and method for the composition, generation, integration and execution of business processes over a network | |
Brambilla et al. | Process modeling in web applications | |
US7730446B2 (en) | Software business process model | |
US8126920B2 (en) | Enterprise security management system using hierarchical organization and multiple ownership structure | |
US7577934B2 (en) | Framework for modeling and providing runtime behavior for business software applications | |
US7343348B2 (en) | System for performing real-estate transactions over a computer network using participant templates | |
EP1857930A2 (fr) | Système, procédé et appareil pour permettre à un design, une administration et une présentation des applications de logiciels informatiques | |
US20070239726A1 (en) | Systems and methods of transforming data for web communities and web applications | |
US20020111922A1 (en) | Electronic markets business interchange system and method | |
US20050177575A1 (en) | System and method of co-branding pages over a network | |
US20070136676A1 (en) | Managing information display | |
US20100318511A1 (en) | Techniques for connectors in a system for collaborative work | |
GB2557522A (en) | Digital ticketing system including a server and multiple mobile smartphone computing devices each including a respective digital ticketing application | |
CN101272281A (zh) | 一种涉及四方的提供网络服务的系统和方法 | |
WO2005041032A1 (fr) | Systeme permettant de soutenir l'introduction/l'operation d'integration d'un logiciel de travail | |
WO2006010320A1 (fr) | Serveur d'informations oriente-objet, procede de generation associe et navigateur | |
US20080162564A1 (en) | Back-end field control for multiple software layers | |
US20140330694A1 (en) | Method and system for preparation of a financial transaction | |
Jacobsen et al. | Component leasing on the world wide web | |
US8832180B2 (en) | Function module dispatcher | |
US7478397B1 (en) | Service-based interface method | |
WO2002046977A2 (fr) | Procedes de gestion commerciale bases sur la connaissance, et systemes de mise en oeuvre correspondants | |
Kutvonen | Supporting global electronic commerce with ODP tools | |
Zahir et al. | mySAP Portals: Concept-Architecture-Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |