Technique for enforcing temporal uniqueness in an object/relational database management system environment
First Claim
1. A method for enforcing temporal data uniqueness in a database management system having data structures defined by a primary id key and an associated temporal key, comprising the following steps:
- (a) analyzing each database command attempting insertion of a temporal key;
(b) testing for a possible temporal data uniqueness violation by comparing the command temporal key and the exiting database data structure temporal key, determining the exact nature of the violation and returning a unique violation identifier; and
(c) enforcing the temporal data uniqueness by disallowing the command or overriding the violation.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method and program extender for enforcing the uniqueness of temporal data in an object/relational database management system is provided. There is a combination of user-defined functions, triggers and specified conditions to determine if attempts to insert new data or update existing data in a data object in which temporal integrity is a consideration are valid. Barriers exist to protect against inserts or updates that would violate the temporal integrity of the existing data. Also included are ways for a user to modify the behavior of the system or method to override triggers for cases in which temporal integrity is not desired.
-
Citations
33 Claims
-
1. A method for enforcing temporal data uniqueness in a database management system having data structures defined by a primary id key and an associated temporal key, comprising the following steps:
-
(a) analyzing each database command attempting insertion of a temporal key;
(b) testing for a possible temporal data uniqueness violation by comparing the command temporal key and the exiting database data structure temporal key, determining the exact nature of the violation and returning a unique violation identifier; and
(c) enforcing the temporal data uniqueness by disallowing the command or overriding the violation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for enforcing temporal data uniqueness in a database management system having data structures defined by a primary id key and an associated temporal key, comprising:
-
computer-based means for analyzing each database command attempting insertion of a temporal key;
computer-based means for testing for a possible temporal data uniqueness violation by comparing the command temporal key and the existing database data structure temporal key, determining the exact nature of the violation and returning a unique violation identifier; and
computer-based means for enforcing the temporal data uniqueness by allowing the command or overriding the violation. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer usable medium tangibly embodying a program of instructions executable by the computer to perform a computer-based method for enforcing temporal data uniqueness in a database management system having data structures defined by a primary id key and an associated temporal key, comprising the following steps:
-
(a) analyzing each database command attempting insertion of a temporal key;
(b) testing for a possible temporal data uniqueness violation by comparing the command temporal key and the existing database data structure temporal key, determining the exact nature of the violation and returning a unique violation identifier; and
(c) enforcing the temporal data uniqueness by disallowing the command or overriding the violation. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification