Detecting an integrity constraint violation in a database by analyzing database schema, application and mapping and inserting a check into the database and application
First Claim
Patent Images
1. A system while executing on a computer for detecting an integrity constraint violation in a database interaction, comprising:
- a common constraint model for analyzing database schema, application type, and a mapping between said database schema and said application type;
a generating unit for generating a check based upon said database schema, said application type, and said mapping;
an inserting unit for inserting said check into one of said database and said application; and
a determining unit for determining whether an integrity constraint violation will occur in said database interaction with said application based upon said check.
1 Assignment
0 Petitions
Accused Products
Abstract
A system (and method) of detecting an error in a database interaction, includes providing information about at least one of at least first and second software systems, and a mapping between at least a portion of said at least first and second software systems; and examining said at least one of said first and second software systems and said mapping to determine an error in an interaction between said at least first and second software systems.
-
Citations
2 Claims
-
1. A system while executing on a computer for detecting an integrity constraint violation in a database interaction, comprising:
-
a common constraint model for analyzing database schema, application type, and a mapping between said database schema and said application type; a generating unit for generating a check based upon said database schema, said application type, and said mapping; an inserting unit for inserting said check into one of said database and said application; and a determining unit for determining whether an integrity constraint violation will occur in said database interaction with said application based upon said check.
-
-
2. A method of constructing a program, comprising:
-
detecting, in an application, portions of said application code that will or may raise a database integrity constraint violation during an application-database interaction during runtime, the detecting including examining database schema, examining application type, and a mapping between the database schema and the application type; generating an integrity check based upon said database schema, said application type, and said mapping; inserting said integrity check notifying a programmer of such a definite or potential violation; and completing the program.
-
Specification