Metadata Reuse For Validation Against Decentralized Schemas
First Claim
1. A method, said method comprising steps of:
- generating metadata that is used to validate a first data object;
determining whether said metadata satisfies one or more reuse criteria for reusing said metadata to validate a second data object;
wherein said reuse criteria includes at least that a first set of distinct paths in said first data object match a second set of distinct paths in said second database object;
in response to determining that said metadata satisfies said one or more reuse criteria, using said metadata to validate said second data object;
wherein the method is performed by one or more computing devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A validation procedure employs metadata reuse using composite path signatures to make a metadata reuse determination. The procedure is performed as part of validating a set of data objects. Validating an initial subset of data objects generates N different sets of object-specific metadata, each set of which is associated with a different composite path signature. When subsequently validating another data object, a composite path signature is generated for the data object and compared with the composite path signatures of the N different sets of object-specific metadata. If a match is found, then the object-specific metadata of the matching composite path signature is reused for the data object. The object-specific metadata is remapped to an in-memory representation of the data object.
21 Citations
20 Claims
-
1. A method, said method comprising steps of:
-
generating metadata that is used to validate a first data object; determining whether said metadata satisfies one or more reuse criteria for reusing said metadata to validate a second data object; wherein said reuse criteria includes at least that a first set of distinct paths in said first data object match a second set of distinct paths in said second database object; in response to determining that said metadata satisfies said one or more reuse criteria, using said metadata to validate said second data object; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4)
-
-
5. A method, comprising:
-
generating N sets of metadata to validate data objects, each set of N sets of metadata being generated to validate a respective data object of said data objects; wherein each set of N sets of metadata is associated with a composite path signature, each composite path signature comprising a plurality of path signatures, each path signature of said plurality of path signatures representing a distinct path of one or more structured element instances in the respective data object of said each composite path signature; generating a first composite path signature for a first data object, said first composite path signature comprising a plurality of path signatures, each path signature of said plurality of path signatures representing a distinct path of one or more structure element instances in the first data object; determining whether said first composite path signature matches any composite path signature of the composite path signatures of said data objects to determine whether to reuse a set of metadata of N sets of metadata; and in response to determining that a set of metadata that is associated with a composite path signature matching the first composite signature is a reusable metadata usable to validate the first data object, using the reusable metadata to validate the first data object; and wherein the method is performed by one or more computing devices. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium storing instructions which, when executed by one or more processors, cause the one or more processors to perform steps comprising:
-
generating metadata that is used to validate a first data object; determining whether said metadata satisfies one or more reuse criteria for reusing said metadata to validate a second data object; wherein said reuse criteria includes at least that a first set of distinct paths in said first data object match a second set of distinct paths in said second database object; and in response to determining that said metadata satisfies said one or more reuse criteria, using said metadata to validate said second data object. - View Dependent Claims (12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing instructions which, when executed by one or more processors, cause the one or more processors to perform steps comprising:
-
generating N sets of metadata to validate data objects, each set of N sets of metadata being generated to validate a respective data object of said data objects; wherein each set of N sets of metadata is associated with a composite path signature, each composite path signature comprising a plurality of path signatures, each path signature of said plurality of path signatures representing a distinct path of one or more structured element instances in the respective data object of said each composite path signature; generating a first composite path signature for a first data object, said first composite path signature comprising a plurality of path signatures, each path signature of said plurality of path signatures representing a distinct path of one or more structure element instances in the first data object; determining whether said first composite path signature matches any composite path signature of the composite path signatures of said data objects to determine whether to reuse a set of metadata of N sets of metadata; and in response to determining that a set of metadata that is associated with a composite path signature matching the first composite signature is a reusable metadata usable to validate the first data object, using the reusable metadata to validate the first data object. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification