Method and mechanism for data consolidation
First Claim
Patent Images
1. A method for consolidating data, comprising:
- analyzing a first and a second set of data to determine possible consolidation conflict problems if said second set of data is consolidated with said first set of data, wherein said first set of data is contained in a first source and said second set of data is contained in a second source table;
preparing rules for transforming said second set of data to resolve said possible consolidation conflict problems;
transforming said second set of data using said rules to generate a transformed set of data, wherein said act of transforming said second set of data occurs at said second source table; and
merging said transformed set of data with said first set of data.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a method and mechanism for consolidating data. According to an embodiment of the invention, consolidation is performed based upon transformation rules established for data to be consolidated. An aspect of an embodiment of the invention relates to performing data transformations to resolve potential consolidation conflict issues. Another aspect of an embodiment of the invention relates to validation procedures performed after transformation.
302 Citations
68 Claims
-
1. A method for consolidating data, comprising:
-
analyzing a first and a second set of data to determine possible consolidation conflict problems if said second set of data is consolidated with said first set of data, wherein said first set of data is contained in a first source and said second set of data is contained in a second source table;
preparing rules for transforming said second set of data to resolve said possible consolidation conflict problems;
transforming said second set of data using said rules to generate a transformed set of data, wherein said act of transforming said second set of data occurs at said second source table; and
merging said transformed set of data with said first set of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
populating a set of base rules, said set of base rules corresponding to a standard data model for said second set of data; and
modifying said set of base rules with rule changes directed to any differences between said standard data model and a site-specific configuration for said second set of data.
-
-
3. The method of claim 2 in which said act of modifying said set of base rules comprises removing one or more specific rules from said set of base rules.
-
4. The method of claim 2 in which said act of modifying said set of base rules comprises adding one or more additional rules, said one or more additional rules relating to data structures not in said standard data model.
-
5. The method of claim 1 in which said rules comprises a sequence type rule, in which the act of transforming said second set of data comprises modifying numeric sequence data in said second set of data using said sequence type rule.
-
6. The method of claim 1 in which said rules comprises a prefix type rule, in which said act of transforming said second set of data comprises prefixing information to character-based data in said second set of data using said prefix type rule.
-
7. The method of claim 1 in which said act of analyzing said first and second sets of data comprises identifying unique constraints that may overlap between said first and second sets of data.
-
8. The method of claim 7 in which said act of identifying unique constraints comprises identifying primary keys.
-
9. The method of claim 8 in which said act of identifying unique constraints comprises identifying foreign keys related to said primary keys.
-
10. The method of claim 1 in which said act of transforming or merging is performed in parallel.
-
11. The method of claim 1 in which said act of transforming comprises preparing said second set of data for transformation by disabling data integrity enforcement constraints on said second set of data.
-
12. The method of claim 11 in which said data integrity enforcement constraints are selected from the group consisting of data triggers, foreign key constraints, and primary key constraints.
-
13. The method of claim 1 in which said act of transforming comprises preparing said second set of data for transformation by dropping indexes on said second set of data.
-
14. The method of claim 1 further comprising performing a non-intrusive transformation prior to said act of transforming.
-
15. The method of claim 1 in which said act of merging comprises disabling data integrity enforcement constraints on said first set of data.
-
16. The method of claim 15 in which said data integrity enforcement constraints are selected from the group consisting of data triggering foreign key constraints, and primary key constraints.
-
17. The method of claim 1 in which said act of merging comprises dropping indexes on said first set of data.
-
18. The method of claim 1 further comprising:
validating consolidation of said second set of data with said first set of data.
-
19. The method of claim 18 in which the act of validating comprises comparing record counts for data tables.
-
20. The method of claim 19 in which said act of comparing record counts take into account partial and no-merge situations.
-
21. The method of claim 18 in which the act of validating comprises comparing individual records for said first and said second sets of data.
-
22. The method of claim 18 in which the act of validating comprises determining whether database objects were invalidated.
-
23. A computer program product that includes a medium usable by a processor, the medium having stored thereon a sequence of instructions which, when executed by said processor, causes said processor to execute a process for consolidating data, said process comprising:
-
analyzing a first and a second set of data to determine possible consolidation conflict problems if said second set of data is consolidated with said first set of data, wherein said first set of data is contained in a first source and said second set of data is contained in a second source table;
preparing rules for transforming said second set of data to resolve said possible consolidation conflict problems;
transforming said second set of data using said rules to generate a transformed set of data, wherein said act of transforming said second set of data occurs at said second source table; and
merging said transformed set of data with said first set of data. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
populating a set of base rules, said set of base rules corresponding to a standard data model for said second set of data; and
modifying said set of base rules with rule changes directed to any differences between said standard data model and a site-specific configuration for said second set of data.
-
-
25. The computer program product of claim 24 in which said act of modifying said set of base rules comprises removing one or more specific rules from said set of base rules.
-
26. The computer program product of claim 24 in which said act of modifying said set of base rules comprises adding one or more additional rules, said one or more additional rules relating to data structures not in said standard data model.
-
27. The computer program product of claim 23 in which said rules comprises a sequence type rule, in which the act of transforming said second set of data comprises modifying numeric sequence data in said second set of data using said sequence type rule.
-
28. The computer program product of claim 23 in which said rules comprises a prefix type rule, in which said act of transforming said second set of data comprises prefixing information to character-based data in said second set of data using said prefix type rule.
-
29. The computer program product of claim 23 in which said act of analyzing said first and second sets of data comprises identifying unique constraints that may overlap between said first and second sets of data.
-
30. The computer program product of claim 29 in which said act of identifying unique constraints comprises identifying primary keys.
-
31. The computer program product of claim 30 in which said act of identifying unique constraints comprises identifying foreign keys related to said primary keys.
-
32. The computer program product of claim 23 in which said act of transforming or merging is performed in parallel.
-
33. The computer program product of claim 23 in which said act of transforming comprises preparing said second set of data for transformation by disabling data integrity enforcement constraints on said second set of data.
-
34. The computer program product of claim 33 in which said data integrity enforcement constraints are selected from the group consisting of data triggers, foreign key constraints, and primary key constraints.
-
35. The computer program product of claim 23 in which said act of transforming comprises preparing said second set of data for transformation by dropping indexes on said second set of data.
-
36. The computer program product of claim 23 further comprising performing a non-intrusive transformation prior to said act of transforming.
-
37. The computer program product of claim 23 in which said act of merging comprises disabling data integrity enforcement constraints on said first set of data.
-
38. The computer program product of claim 37 in which said data integrity enforcement constraints are selected from the group consisting of data triggering foreign key constraints, and primary key constraints.
-
39. The computer program product of claim 23 in which said act of merging comprises dropping indexes on said first set of data.
-
40. The computer program product of claim 23 further comprising:
validating consolidation of said second set of data with said first set of data.
-
41. The computer program product of claim 40 in which the act of validating comprises comparing record counts for data tables.
-
42. The computer program product of claim 41 in which said act of comparing record counts take into account partial and no-merge situations.
-
43. The computer program product of claim 40 in which the act of validating comprises comparing individual records for said first and said second sets of data.
-
44. The computer program product of claim 40 in which the act of validating comprises determining whether database objects were invalidated.
-
45. A non-site-specific method for consolidating data, wherein the method is capable of being configured for a specific site, the method comprising:
-
automatically analyzing a first and a second set of data to determine possible consolidation conflict problems if said second set of data is consolidated with said first set of data, wherein said first set of data is contained in a first source and said second set of data is contained in a second source table;
preparing rules for transforming said second set of data to resolve said possible consolidation conflict problems;
automatically transforming said second set of data using said rules to generate a transformed set of data, wherein said act of automatically transforming said second set of data occurs at said second source table; and
automatically merging said transformed set of data with said first set of data. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
populating a set of base rules, said set of base rules corresponding to a standard data model for said second set of data; and
modifying said set of base rules with rule changes directed to any differences between said standard data model and a site-specific configuration for said second set of data.
-
-
47. The method of claim 45 in which said act of automatically analyzing said first and second sets of data comprises identifying unique constraints that may overlap between said first and second sets of data.
-
48. The method of claim 45 in which said act of automatically transforming or merging is performed in parallel.
-
49. The method of claim 45 in which said act of automatically transforming comprises preparing said second set of data for transformation by disabling data integrity enforcement constraints on said second set of data.
-
50. The method of claim 45 in which said act of automatically transforming comprises preparing said second set of data for transformation by dropping indexes on said second set of data.
-
51. The method of claim 45 further comprising performing a non-intrusive transformation prior to said act of automatically transforming.
-
52. The method of claim 45 in which said act of automatically merging comprises disabling data integrity enforcement constraints on said first set of data.
-
53. The method of claim 45 in which said act of automatically merging comprises dropping indexes on said first set of data.
-
54. The method of claim 45 further comprising:
validating consolidation of said second set of data with said first set of data.
-
55. The method of claim 54 in which the act of validating comprises comparing individual records for said first and said second sets of data.
-
56. The method of claim 54 in which the act of validating comprises determining whether database objects were invalidated.
-
57. A computer program product that includes a medium usable by a processor, the medium having stored thereon a sequence of instructions which, when executed by said processor, causes said processor to execute a non-site-specific process for consolidating data, wherein the process is capable of being configured for a specific site, the process comprising:
-
automatically analyzing a first and a second set of data to determine possible consolidation conflict problems if said second set of data is consolidated with said first set of data, wherein said first set of data is contained in a first source and said second set of data is contained in a second source table;
preparing rules for transforming said second set of data to resolve said possible consolidation conflict problems;
automatically transforming said second set of data using said rules to generate a transformed set of data, wherein said act of automatically transforming said second set of data occurs at said second source table; and
automatically merging said transformed set of data with said first set of data. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68)
populating a set of base rules, said set of base rules corresponding to a standard data model for said second set of data; and
modifying said set of base rules with rule changes directed to any differences between said standard data model and a site-specific configuration for said second set of data.
-
-
59. The computer program product of claim 57 in which said act of automatically analyzing said first and second sets of data comprises identifying unique constraints that may overlap between said first and second sets of data.
-
60. The computer program product of claim 57 in which said act of automatically transforming or merging is performed in parallel.
-
61. The computer program product of claim 57 in which said act of automatically transforming comprises preparing said second set of data for transformation by disabling data integrity enforcement constraints on said second set of data.
-
62. The computer program product of claim 57 in which said act of automatically transforming comprises preparing said second set of data for transformation by dropping indexes on said second set of data.
-
63. The computer program product of claim 57 further comprising performing a nonintrusive transformation prior to said act of automatically transforming.
-
64. The computer program product of claim 57 in which said act of automatically merging comprises disabling data integrity enforcement constraints on said first set of data.
-
65. The computer program product of claim 57 in which said act of automatically merging comprises dropping indexes on said first set of data.
-
66. The computer program product of claim 57 further comprising:
validating consolidation of said second set of data with said first set of data.
-
67. The computer program product of claim 66 in which the act of validating comprises comparing individual records for said first and said second sets of data.
-
68. The computer program product of claim 66 in which the act of validating comprises determining whether database objects were invalidated.
Specification