Method and system for detection of integrity constraint violations
First Claim
Patent Images
1. A method for detecting an error in an interaction between a plurality of software systems, comprising:
- providing information about at least one of at least first and second software systems, and a mapping between at least a portion of said at least first and second software systems; and
examining said at least one of said first and second software systems and said mapping to determine an error in an interaction between said at least first and second software systems.
1 Assignment
0 Petitions
Accused Products
Abstract
A system (and method) of detecting an error in a database interaction, includes providing information about at least one of at least first and second software systems, and a mapping between at least a portion of said at least first and second software systems; and examining said at least one of said first and second software systems and said mapping to determine an error in an interaction between said at least first and second software systems.
74 Citations
69 Claims
-
1. A method for detecting an error in an interaction between a plurality of software systems, comprising:
-
providing information about at least one of at least first and second software systems, and a mapping between at least a portion of said at least first and second software systems; and
examining said at least one of said first and second software systems and said mapping to determine an error in an interaction between said at least first and second software systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 69)
-
-
45. A method of detecting an error in a database interaction, comprising:
-
examining database code for database constraints;
examining application code for application-level constraints; and
analyzing a mapping between said database code and said application code, to determine an error in a database interaction. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 67)
-
-
53. A method of detecting an integrity constraint violation in a database interaction, comprising:
-
examining a database schema;
examining an application type; and
analyzing a mapping between said database schema and said application type, to determine whether an integrity constraint violation will occur in said database interaction with said application. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 68)
-
-
64. A system of detecting an error in a database interaction, comprising:
-
a module for examining a database code for database constraints;
a module for examining an application code for application-level constraints; and
an analyzing unit for analyzing a mapping between said database code and said application code, to determine an error in a database interaction.
-
-
65. A system for detecting an integrity constraint violation in a database interaction, comprising:
-
a common constraint model for analyzing database schema, application type, and a mapping between said database schema and said application type; and
a determining unit for determining whether an integrity constraint violation will occur in said database interaction with said application.
-
-
66. A method of constructing a program, comprising:
-
detecting, in an application, portions of said application code that will or may raise a database integrity constraint violation during an application-database interaction during runtime, the detecting including examining database schema, examining application type, and a mapping between the database schema and the application type;
inserting an integrity check notifying a programmer of such a definite or potential violation; and
completing the program.
-
Specification