Generating and utilizing composite keys in lieu of compound keys
First Claim
1. A method for generating a composite key from a compound key comprising the steps of:
- retrieving a plurality of values of a compound key for a particular set of data in a data store;
generating a composite key by applying an invertible composition transformation to the values of the compound key; and
providing the composite key to a separate application instead of the compound key.
2 Assignments
0 Petitions
Accused Products
Abstract
Various technologies and techniques are disclosed that improve the retrieval or interaction with data in databases. A database has one or more tables with compound keys. An entity key that is a single composite key of each of the compound keys is generated via an invertible composition transformation. The composite entity key is a binary serialization of the respective compound keys. The composite entity key is used by separate applications to interact with the database instead of the respective underlying compound keys. The composite entity key is decomposed into the underlying compound keys when a particular database operation needs to be performed. The results are then returned to the separate application with the composite entity key.
23 Citations
20 Claims
-
1. A method for generating a composite key from a compound key comprising the steps of:
-
retrieving a plurality of values of a compound key for a particular set of data in a data store;
generating a composite key by applying an invertible composition transformation to the values of the compound key; and
providing the composite key to a separate application instead of the compound key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable medium having computer-executable instructions for causing a computer to perform steps comprising:
-
store at least a portion of data in a data store, the data store having a plurality of compound keys;
generate a composite key for at least some of the plurality of compound keys by applying an invertible composition transformation to the values of the compound keys;
receive a request from a separate application to perform a database operation on a first set of data using the composite key;
generate a respective compound key from the composite key by applying an inverse of the composition transformation; and
use the respective compound key to perform the database operation on the first set of data. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method for using a composite key instead of a compound key comprising the steps of:
-
generating a binary serialization of a compound key in a data store by applying an invertible composition transformation to a set of values of the compound key;
including the binary serialization of the compound key in a single composite key; and
generating the compound key from the composite key by applying an inverse of the composition transformation when the compound key is needed for a particular operation. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification