Universal data management interface

ABSTRACT

A universal data management interface (UDMI) system includes a processing system generates a visual interface through which a user can access, manage, and manipulate data on plural different types of remote databases. The UDMI connects to multiple standard database management systems and to allow multiple users to access, manage, and manipulate data within each of the multiple standard database management systems. The UDMI also allows multiple virtual databases that reside in a single database to be available as a network service.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation application of and claims priority toapplication Ser. No. 10/217,937, filed Aug. 12, 2002 now U.S. Pat. No.7,117,225, which claims priority to U.S. Provisional Application No.60/311,863, filed on Aug. 13, 2001, the contents of which are herebyincorporated by reference into this application as if set forth hereinin full.

TECHNICAL FIELD

The present invention relates to a client-server application that allowsnetwork users to manage data in any standard Database Management System(DBMS) through a visual interface that does not require special softwareinstalled on the user's computing or communication device.

BACKGROUND

DBMS is a common method of storing, organizing, and manipulating data.DBMS can provide a reliable and transparent way for people to storelarge amounts of data. Although, DBMS makes it easier to store, manage,and manipulate low-level data (binary data), DBMS is still too complexto operate for an average user.

Many database administrators and software professionals usecharacter-driven data interfaces. These interfaces provide freedom andpower in data management and manipulation. However, these interfaces donot provide a transparent, human-friendly interaction with data. This isone reason for the use of visual interfaces that non-softwareprofessionals, computing devices, and communication devices canunderstand and interpret.

There are several problems associated with conventional visualinterfaces. For example, access to data is limited to interfaces thatare accessed through specialized software that needs to be installed onthe user's computing or communication device. This implies that userscan access their data only through devices that include this specializedsoftware. Specialized software is any software that is not pre-installedon a standard computing or communication device. For example, a webbrowser such as Netscape Navigator or Microsoft Internet Explorer, orany software pre-installed (“usually comes with”) on a Personal DigitalAssistant (PDA), mobile device (e.g., cell phone), or any othercomputing or communication device is not considered to be specializedsoftware. On the other hand, Crystal Reports is a report generatingsoftware that does not come pre-installed with most computers;therefore, it is considered to be specialized software.

DBMSs produced by competing companies are generally incompatible.Although, most DBMSs use a standard Structured Query Language (SQL) tomanage data, internal organization of different DBMSs differconsiderably. Furthermore, multiple dialects of SQL are introduced whenoperating different DBMSs.

In an environment where access to data is restricted to specializedsoftware, and where DBMS incompatibilities are an every day reality,there is a need for a network service that allows network users tomanage and manipulate data in the background DBMS transparently bysubscribing to the service through any computing or communication deviceconnected to the network.

SUMMARY

In general, in one aspect, the invention is directed to storinginformation relating to a database in an external file. The informationincludes instructions, parameters, and tables that facilitate access todifferent types of databases. This aspect also includes accessing thedatabase using the information, and may include one or more of thefeatures set forth below.

Accessing the database may be performed using a database managementlanguage. This aspect may include establishing a link to the database,obtaining the information via the link, synchronizing with the datastructure of the database, and/or managing and manipulating data in thedatabase following accessing.

The database may be accessed via software that operates over a network.The database may include multiple databases and accessing may includeaccessing one or more of the multiple databases. The external files mayinclude a file that stores network location and access information ofthe database, a file that stores at least one of names and columns oftables in the database, a table containing session identifierinformation for identifying a session in which the database is accessed,a file that stores information for use in sorting data from thedatabase, a file that stores sizes of columns in the database, a filethat stores information relating to relationships among tables in thedatabase, a file for storing security information to limit access to thedatabase, a file that stores network location and access informationthat contains security information, a table located in a remotedatabase, a file containing instructions that are executable by softwarethat accesses the database, a file that stores at least one of names andcolumns of reports in the database, a file that stores pre-parsedinstructions and parameters used for report generation, and/or a filethat stores sizes of columns of a report.

This invention may also include generating a graphical user interfaceand managing data in the database via the graphical user interface.

In general, in another aspect, the invention is directed to a universaldata management interface (UDMI) system. This aspect includes aprocessing system that executes instructions to generate a visualinterface through which a user can access, manage, and manipulate dataon plural different types of remote databases.

This aspect may also include one or more of the following features. Thevisual interface may be executed and interpreted by software thatinterprets a markup. The markup may include one or more of HTML, DHTML,SGML, XML or any other standard markup language.

In general, in one aspect, the invention is directed to a UDMI thatincludes a processing system that executes instructions to connect tomultiple standard database management systems and to allow multipleusers to access, manage, and manipulate data within each of the multiplestandard database management systems.

This aspect may include one or more of the following features. Themultiple standard database management systems includes one or more ofOracle, MSSQL Server, SyBase, Informix, DB2, dBase, mSQL, mySQL and anyother standard database management system (e.g., oracle, Sybase, etc.are DBMSystems).

In general, in another aspect, the invention is a UDMI that includes aprocessing system that executes instructions to allow multiple virtualdatabases that reside in a single database to be available as a networkservice. This aspect may include one or more of the following features.

The processing system may use a table management process to allow themultiple virtual databases to be available. The processing system mayuse an external file containing table domains to allow the multiplevirtual databases to be available. The processing system may use a tablethat stores information on users enrolled to use the network dataservice. The processing system may use a sign-up process to allow usersto sign-up over a network for the network data service.

Other features and advantages of the invention will become apparent fromthe following description, including the claims and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a diagram showing a general DBMS database including n sampletables.

FIG. 1 is a block diagram showing general operation of the UniversalData Management Interface (UDMI) according to the present invention.

FIG. 2 is a block diagram showing the abstract structure of UDMI.

FIG. 3 is a block diagram of the UDMI Column Names Hash File interactingwith the UDMI Column Names File.

FIG. 4 is a block diagram of the logical structure of UDMI and UDMI'sfour major functional areas.

FIG. 5 shows graphical user interface (GUI) form components usedthroughout UDMI's GUI output.

FIG. 6 is a GUI showing the Initial Access Procedure's login screen.

FIG. 7 is a GUI showing UDMI's four functional areas.

FIG. 8 is a block diagram of the Table Manager's two modes of operation.

FIG. 9 is a GUI showing the Initial Table Level screen with four tablesdefined.

FIG. 10 is a GUI showing the first step in table creation.

FIG. 11 is a GUI showing the second step in table creation.

FIG. 12 is a GUI showing the table deletion confirmation screen.

FIG. 13 is a GUI showing the table end-data level screen.

FIG. 14 is a GUI showing the Table Manager's insert row screen.

FIG. 15 is a GUI showing the Table Manager's insert column screen.

FIG. 16 is an example of checking/marking rows and columns.

FIG. 17 is a GUI showing the Table Manager delete marked confirmationscreen.

FIG. 18 is a GUI showing the query/search screen.

FIG. 19 is a GUI showing the Table Manager's rename columns screen.

FIG. 20 is a GUI showing the Table Manager's resize columns screen.

FIG. 21 is a GUI showing the Table Manager's reorder columns screen.

FIG. 22 is a GUI showing the Table Manager's backup table screen.

FIG. 23 is a GUI showing the Table Manager's load data screen.

FIG. 24 is a block diagram of the Report Manager's two modes ofoperation.

FIG. 25 is a GUI showing the Report Manager's initial screen.

FIG. 26 is a GUI showing the first step in report creation.

FIG. 27 is a GUI showing the second step in report creation.

FIG. 28 is a GUI showing the third step in report creation.

FIG. 29 is a GUI showing the report deletion confirmation screen.

FIG. 30 is a GUI showing the Report Manager's end-data screen.

FIG. 31 is a GUI showing the Report Manager's first step in columninsertion.

FIG. 32 is a GUI showing the Report Manager's second step in columninsertion.

FIG. 33 is a GUI showing the Report Manager's third step in columninsertion.

FIG. 34 is a GUI showing the Report Manager's rename columns screen.

FIG. 35 is a GUI showing the Report Manager's resize columns screen.

FIG. 36 is a GUI showing the Report Manager's reorder columns screen.

FIG. 37 is a GUI showing the Report Manager's backup table screen.

FIG. 38 is a GUI showing the Report Manager's first step in changingconditions in a report.

FIG. 39 is a GUI showing the Report Manager's second step in changingconditions in a report.

FIG. 40 is a GUI showing the Relations Manager screen.

FIG. 41A is a GUI showing the Administrator's Area with two functionalareas: User Manager and Data Source Manager.

FIG. 41 is a GUI showing the Security Table.

FIG. 42 is a GUI showing the Data Sources Manager.

FIG. 43A is a block diagram of the Multiple-database Within One DatabaseUDMI (MUDMI) logical structure.

FIG. 43 is a block diagram of MUDMI's Table Manager.

FIG. 44 is a GUI showing MUDMI's table mode.

FIG. 45 is a GUI showing MUDMI's end-data mode.

FIG. 46 is a GUI showing MUDMI's first step in table creation.

FIG. 47 is a GUI showing MUDMI's second step in table creation.

FIG. 48 is a GUI showing MUDMI's insert column screen.

FIG. 49 is a GUI showing MUDMI's sign-up screen.

Like reference numerals in different figures indicate like elements.

DESCRIPTION

Database Management System is defined herein as a hardware component,software, or any data source that hosts, manages, and manipulates dataorganized in tables.

Device is defined herein as any hardware component or software that isable to connect to any other hardware component or software.

Computing device/software is defined herein as any hardware component orsoftware that can perform computation of any kind with or withoutinvolvement of any other hardware component or software.

Communication device/software is defined herein as any hardwarecomponent or software that can exchange signals of any kind with anotherhardware component or software with or without involvement of any otherhardware component or software.

Universal Data Management Interface (UDMI) is a software application forperforming data manipulation and management. As such, UDMI providesnetwork users with a tool for connecting to a DBMS that resides on adevice connected to the network. UDMI connects to all standard DBMSs(Oracle, MS SQL Server, SyBase, Informix, mSQL, mySQL, and otherdatabase management systems) and allows multiple users to access,manage, and manipulate data within a DBMS database.

As shown in FIG. 1, a user 10 connects to the network 30 through a localsystem 20 that includes a computing or communication device/software.The network 30 contains UDMI 100 (UDMI), through which the user 10connects to, accesses, and manages/manipulates DBMS 50, as described inmore detail below.

Once a user is connected to DBMS using UDMI, the user can place, modify,delete, search, and sort data; generate reports from data; define andmodify relations among the data tables; define and modify data sources;and add, delete, and modify users and their access privileges. Usersaccomplish the above-mentioned tasks within DBMS through the visualinterface, i.e., the graphical user interface (GUI) of Web browsers(e.g., Internet Explorer and Netscape Navigator), or of any other deviceor software that complies with the protocol of a specific network andinterprets (PDAs, mobile devices, etc.), is embedded (Java applets,ActiveX components, etc.) into, or is executed by the markup (e.g. HTML,SGML, XML, etc.) or any other language that presents data.

UDMI can be implemented as predominantly server-side application throughserver-side executable program (Engine Program), or as predominantlyclient-side application through technology such as JavaScript, Javaapplet, and ActiveX component. For the sake of illustration, the UDMIEngine Program described herein is implemented as a predominantlyserver-side application.

Described herein are two separate embodiments of UDMI: (1) aone-database UDMI (denoted as UDMI herein) that synchronizes with,accesses, manages, and manipulates one DBMS database, and (2) amulti-database UDMI (denoted as MUDMI herein) that hosts multiplevirtual databases (user table collections) in one DBMS database.

First Embodiment One-Database UDMI

One-database UDMI accesses a DBMS database, reads and synchronizes withthe database's table structure, and manages/manipulates the database'stables and end-data through an interface that portrays the entiredatabase's content (except special purpose tables). This UDMI embodimentmay serve as a stand-alone application for management of data in newlybuilt databases and databases that are not originally created by UDMI.

As shown in FIG. 2, one-database UDMI includes three abstract segments:UDMI Engine Program 1000, DBMS connectivity interface 1020, andGraphical User Interface (GUI) 1010. These highly interconnectedinterfaces work together to accomplish UDMI's main purpose: manipulationand management of data in a remote (local in some instances) DBMS(relational or non-relational) database. As shown in the FIG. 4,logically (as seen by end users), UDMI operates through the InitialAccess Procedure (IAP) 1001 and four functional areas: Table Manager1002, Report Manager 1003, Relations Manager 1004, and Administrator'sArea 1005.

UDMI Engine Program

The heart of UDMI's functionality is the Engine Program 1000 (see FIG.2), which directs and controls the flow of data from the DBMSconnectivity interface 1020 to GUI 1010 and vice versa. It is a client(parts of the computation is done on a client's device/software)-server(parts of the computation is done on a server device) applicationexecutable by users through web browsers (Microsoft Internet Explorer,Netscape Navigator, etc.), or through any other device or software thatcomplies with the protocol of a specific network and interprets (PDAs,mobile devices, etc.), is embedded (Java applets, ActiveX components,etc.) into, or is executed by the markup (e.g. HTML, SGML, XML, etc.) orany other language that presents data.

Engine Program 1000 may reside on a device connected to the network.Engine Program 1000 receives directions from GUI 1010 on what DBMSmanipulations and data management procedures to execute, initiates DBMSconnectivity, issues Structured Query Language (SQL) instructions toDBMS, and presents data received from a DBMS database 60 (see FIG. 2)back to GUI 1010. The Engine Program 1000 is completely independent ofthe programming language in which it is written and implemented. TheEngine Program 1000 may use GUI markup (HTML, SGML, XML, etc.) or anyother language for presentation of data over the network. Also, theEngine Program 1000 may use itself or the connectivity interface SQL orany other language for management/manipulation of data.

DBMS Connectivity Interface

DBMS connectivity interface 1020 is responsible for establishing a linkwith a DBMS database 60 that resides on a computing device connected tothe network. Since the data is stored in DBMS database 60, the linkbetween Engine Program 1000 and DBMS connectivity interface 1020 iscrucial for correct functionality of the entire system for manipulationand management of data in a remote DBMS database 60.

Once DBMS connectivity interface 1020 establishes a link between theEngine Program 1000 and DBMS database 60 (shown in FIG. 11A), DBMSconnectivity interface 1020 uses SQL to obtain, manipulate, and managedata (e.g., content of a specific DBMS database table 9900 cell) in DBMSdatabase 60.

UDMI connects to all standard DBMSs, including but not limited to,Oracle, MS SQL Server, SyBase, Informix, mSQL, mySQL, and other databasemanagement systems, through Database Interface (DBI) 70 and itspredefined functions. DBI is a standard database interface produced byindependent software programmers. DBI is available for free use as anopen source application. UDMI Engine Program 1000 connects to DBMS usinga DBI instruction:

-   -   connect($data_source, $username, $password).        In this instruction $data_source is text string (see Interface        Data Source File below for more detail on this string)        containing the location and access information of the DBMS        database to be manipulated/managed, $username is the access        login word for the DBMS database, and $password is the password        for the DBMS database. Once the Engine Program 1000 connects to        DBMS database, it uses DBI instruction:    -   $sth=$dbh→prepare($statement) or die “Can't prepare $statement:        $dbh→errstr\n”        to prepare SQL statement for execution, and it uses DBI        instruction of the type    -   $rv=$sth→execute or die “can't execute the query: $sth→errstr;        to issue execution request to DBMS database. In the previous two        DBI instructions, $sth is a statement handle object, $dbh is        DBMS database handle object, and $statement is the SQL statement        to be executed. Other DBI instructions are occasionally used        within the Engine Program 1000 (see descriptions of specific        functions below for more detail).

Although, DBI offers a standard template for DBMS database manipulation,certain incompatibilities exist among different DBMSs. UDMI is designedto bypass these incompatibilities and is completely independent of thebackground DBMS. This is achieved by using the external files 80 (FIG.4). These files reside on the server 40 where UDMI's Engine Program 1000resides or on any other device connected to the network 30. Theseexternal files 80 store information about UDMI's state (table and datastructure, security, session IDs (identifiers), etc., details explainedin the rest of the document) independently from the DBMS database's 60state. The external files are accessed, read and modified by all partsof UDMI Engine Program (Initial Access Procedure 1001, Table Manager1002, Report Manager 1003, Relations Manager 1004, and Administrator'sArea 1005). FIG. 4 shows the external files 80 grouped by the majorparts (Initial Access Procedure 1001, Table Manager 1002, Report Manager1003, Relations Manager 1004, and Administrator's Area 1005) of theEngine Program. This grouping only implies that some UDMI parts (InitialAccess Procedure 1001, Table Manager 1002, Report Manager 1003,Relations Manager 1004, and Administrator's Area 1005) use the specificexternal file(s) 80 most often. The external files 80 comprise anystorage place for data, e.g., text files, or table within DBMS database.The information for external files 80 that relates to data stored inDBMS database and its structure is obtained from the DBMS database viaan established DBI link using SQL instructions.

Not only do the external files 80 ensure universal compatibility, butalso they enhance DBMS's functionality as seen by UDMI's end-users, asdescribed below.

External Files

Session IDs Table 81 is a special purpose table that stores current UDMIlogged-in users' session IDs. The purpose of the Session IDs Table 81 isto allow the Engine Program 1000 to compute the inactivity time betweentwo subsequent executions of UDMI for each logged-in user (userpresently using UDMI). Session IDs Table is not stored in the TableNames File and therefore is invisible to UDMI users. The following is anexample of the Session IDs Table:

SessionId Password UserName LastVisited 1 1ira0000 ira 1024286633 2zoro2948 zoro 1024287439The SessionId column represents the primary key (unique recordidentifier) for the Session IDs Table. The LastVisited column stores thenumber of seconds passed from Jan. 1, 1970 to the last time eachparticular user executed an UDMI function. Information in theLastVisited column is used by the Engine Program 1000 to calculatelengths of sessions (inactivity time) for each particular user.

The JavaScript Functions File 82 contains three JavaScript routines thatadd client-side functionality to UDMI, and enhance UDMI's speed andusability. The JavaScript Functions File 82 is used by the EngineProgram 1000 to store the client-side executable functions. In thisembodiment, the three JavaScript routines include:

(1) “document.FormOne.Java_Script_Works.value=1;” this function attemptsto set Java_Script_Works hidden field 1016 (GUI component, see GUI belowfor definitions of all GUI components) to 1 during the Initial AccessProcedure (IAP) 1001 execution (see IAP section for more detail). If itsucceeds, the next execution of the Engine Program 1000 will recognizethat the user 10 has a JavaScript enabled device or software by checkingthe Java_Script_Works field for 1 value.

(2) “function cm(changedCell)” concatenates the name of its associateddata cell (text field GUI component 1011) to the modifiedCells hiddenfield 1017 in the table end-data markup when the on Change JavaScriptevent occurs (see Table Manager end-data mode section below for moredetail).

(3) “function checkAllKeyCheckBoxes( )” executes when a user clicks onthe “Check All” check box (GUI component) within the table end-data GUI.The function either selects or deselects all other check boxes in thetable end-data GUI depending on its previous state (selected orunselected).

The Table Names File 83 contains names of tables in the current UDMItable collection. These tables are the tables within a DBMS databasemanaged/manipulated by UDMI (see the Engine Program section below formore detail). The Table Names File 83 is used by the Engine Program 1000to store names of tables in the current UDMI table collection. Thefollowing is an example of the Table Names File 83:

-   -   Costs:.:Customer:.:Location:.:Purchase

The Table Column Names File 84 contains user-defined/visible tablecolumn names in order (from left to right) in which they appear in thetable end-data GUI. The Table Column Names File 84 is used by the EngineProgram 1000 to store user-defined/visible table column names. Thefollowing is an example of the Table Column Names File 84 for the“Purchase” table:

-   -   AmountSold:.:UnitPrice:.:Place:.:Date:.:CustomerID:.:PurchaseID

The Table Column Names Hash File 85 is a DBM (database management) hashfile containing user-defined/visible table column names (column namespresented to the user through the table end-data GUI) as keys 5010, andthe Engine Program 1000 defined table column names within DBMS (userinvisible column names) as values 5020. FIG. 3 shows a Table ColumnNames Hash File 85 (including the hash's keys 5010 and values 5020)interacting with the Table Column Names File 84. The Table Column NamesHash File 85 is used by the Engine Program 1000 to storeuser-defined/visible table column names as keys, and the Engine Programdefined table column names within DBMS as values. Column renaming occursin the Columns Names File 84 and within the column names hash's keys.Although, most new versions of DBMSs provide column renaming function,old versions as well as a small number of new DBMS editions do not allowfor column renaming. In order to ensure that UDMI is compatible with allstandard DBMSs, the Table Column Names Hash File 85 is used.

The Table Column Sorting File 86 contains column names that will be usedby “ORDER BY” SQL clause to achieve sorting of data records (rows) byspecific columns. If more than one column name is present in the TableColumn Sorting. File, data records will be sorted by columns in order inwhich they appear in the Table Column Sorting File (first column name inthe Column Sorting File will appear first in the ORDER BY clause, secondname will appear second in the clause, etc.). Table Column Sorting Filecontains DBMS database table 9900 column names (user invisible columnnames) (FIG. 1A). The Table Column Sorting File 86 is used by the EngineProgram 1000 to store column names that will be used by “ORDER BY” SQLclause to achieve sorting of data records (rows) by specific columns.The following is an example of the Table Column Sorting File for the“Purchase” table:

-   -   col0:.:col1:.:col3

The Table Column Sizes File 87 is used exclusively for the tableend-data GUI purposes to determine user-defined table column widths. TheTable Column Sizes File 87 contains column widths in order (from left toright) in which they appear in the table within the table end-data GUI.The Table Column Sizes File 87 is used by the Engine Program 1000 tostore user-defined table column widths. The following is an example ofthe Table Column Sizes File for the “Purchase” table:

-   -   15:.:15:.:15:.:15:.:15:.:15

The Report Names File 88 contains names of reports in the current UDMIreport collection. The Report Names File 88 is used by the EngineProgram 1000 to store names of reports in the current UDMI reportcollection. The Following is an example of the Report Names File:

-   -   TotalPurchasesPerCustomer:.:AugustPurchases

The Report Column Sizes File 90 is used exclusively for the reportend-data GUI purposes to determine user-defined report column widths.The Report Column Sizes File 90 is used by the Engine Program 1000 tostore user-defined report column widths. The Report Column Sizes File 90contains column widths in order (from left to right) in which theyappear in the report within the report end-data GUI. Following is anexample of the Report Column Sizes File 90 for the “AugustPurchases”report:

-   -   15:.:15:.:15:.:15

The Pre SQL Statement File 89 contains non-parsed (slightly modified tobe easily manipulated) sections of the SQL statement that generates aparticular report. The file contains three sections: SELECT section,FROM section, and WHERE/ORDER BY/GROUP BY section. The third section isdivided into three subsections that correspond to WHERE, ORDER BY, andGROUP BY clauses of a standard SQL statement.

Every section and subsection of the file contains entries—clausesseparated by comma, and, or, or some other separator in a standard SQLstatement (e.g. “[Purchase].[AmountSold]*[Purchase].[UnitPrice] as ‘q4’”and [Purchase].[Date]<‘2001-09-01’”). As in a regular SQL statement,only the SELECT and FROM sections are mandatory in order for a report tobe generated. The Pre SQL Statement File 89 is used by the EngineProgram 1000 to store non-parsed sections of the SQL statement thatgenerates a particular report. The following is an example of a full PreSQL Statement File 89 that contains non-parsed SQL code for reportgeneration:

-   -   [Purchase].[CustomerID] as ‘CusId’, [Location].[Zip] as ‘Loc’,    -   [Location].[Zip] as ‘Zip’,        [Purchase].[AmountSold]*[Purchase].[UnitPrice] as        ‘SalesAmount’:.:[Location],    -   [Purchase]:.:[Purchase].[Date]>‘2001-08-01’ and        [Purchase].[Date]<‘2001-09-01’ and        [Purchase].[Place]=[Location].[LocationID] order by ‘CusId’        group by ‘Loc’

The Table Relations File 91 stores relations among tables in the currentUDMI table collection. This file contains table relations domains (onedomain per table). Each row in the Table Relations File 91 represents atable relations domain. A table relations domain is defined as a set ofcolumn pairs (relations) with the first column selected from theoriginating table and the second column selected from the concludingtable. The Table relations domain also includes the specific table nameto which the above-mentioned set of relations belong. This set ofrelations can be an empty list. The Table Relations File 91 does notnecessarily correspond to relations defined in the DBMS database.Because the Table Relations File may be a completely separate entityfrom the DBMS database defined relations, it is possible to definerelations within a non-relational database. The Table Relations File 91is used by the Engine Program 1000 to store relations among tables inthe current UDMI table collection. The following is an example of theTable Relations File:

-   -   Customer    -   Purchase:.:Purchase.CustomerID>>Customer.CustomerID:.:Purchase.Place>>Location.LocationID    -   Location    -   Costs:.:Costs.PurchaseID>>Purchase.PurchaseID

The Interface Data Source File 92 contains one line of text defining thelocation and access information of the current DBMS database. TheInterface Data Source File 92 is used by the Engine Program 1000 tostore the location and access information of the current DBMS database.The Following is a sample of the Interface Data Source File:

-   -   DBI:mysql:jcosic:localhost:3306:.:jcosic:.:jcos4082        In this file,    -   DBI indicates to the Engine Program 1000 that the Database        Interface will be used to connect to the database.

Mysql indicates that the database to be accessed and manipulated/managedis of mySQL type. Other possibilities for this field include oracle,Informix, mssql, etc.

-   -   jcosic indicates the name of the database to be accessed and        manipulated/managed.    -   localhost is the address at which the database to be accessed        and manipulated/managed. Other possibilities for this field        include addresses of type cscil.mcla.edu or IP address of type        123.123.123.123.    -   3306 indicates the database port.    -   jcosic is the user name for accessing the database.    -   zoro4082 is the password for accessing the database.

The Security Table Source File 93 contains one line of text defining thelocation, and access information of UDMI's security table. The SecurityTable Source File 92 is used by the Engine Program 1000 to store thelocation, and access information of UDMI's security table (see SecurityTable below for more detail on the Security Table). Following is asample of the Security Table Source File:

-   -   DBI:mysql:jcosic:localhost:3306:.:jcosic2:.:jcos4083        A description of fields in the Security Table Source File 93 can        be found in the Interface Data Source File section above.

The Security Table 94 is a special purpose table that stores informationon users and their privileges in accessing UDMI. The Security Table isnot stored in the Table Names File 83 and therefore is invisible to UDMIusers who do not have administrator's access privileges. The Followingis an example of the security table:

Password UserName FirstName LastName Status jcos4082 jcosic Jasmin Cosicadmin jg432432 jgreen John Green userTwo access privileges are defined within the Security Table 94 at thisstage of UDMI development: “admin” and “user”. In the case that a user'sStatus column is set to “user.” the user will not have access toadministrator's area (User Manager and Data Sources Manager) withinUDMI. If a user's Status column is set to “admin,” the user can accessall UDMI functions. The Security Table 94 can be expanded to includeadditional information about UDMI users such as address, phone, sign-update, etc. Password column is the primary key (unique record identifier)for the Security Table.

Graphical User Interface (GUI)

Referring back to FIG. 2, GUI 1010 has two functions within UDMI: visualpresentation of data, and as an input for users to provide manipulationdirections (clicking on buttons, entering text in text fields 1011,clicking on check boxes 1015, etc.). GUI 1010 presents data and datamanipulation/management forms through visual templates that are easilyunderstandable to end-users who do not possess extensive databaseknowledge.

GUI 1010 operates through server-generated markup (e.g. HTML, SGML, XML,etc.) forms, and client-side executable code embedded into the markup(e.g. JavaScript, Java applet, ActiveX component, etc.). Several GUIform components are used for presentation of data, Engine Programfunctioning, and gathering user's input and operating directions. FIG. 5shows examples of GUI form components, including text boxes fields 1011,text areas 1012, drop down menus 1013, push buttons 1014, check boxes1015, links 1018 as well as hidden fields Java_Script_Works 1016 andmodifiedCells 1017. Although, hidden fields are not visual (visible tousers) components, they are part of GUI component collection hereinbecause they are embedded into the markup that presents visualcomponents.

Text box 1011 takes one line of text as input. Text box 1011 can eitherbe assigned an initial value by the Engine Program 1000, or it can bewritten into from the user's keyboard.

Text area 1012 takes multiple lines of text as input. As was the casewith the text box 1011, text area 1012 contains the Engine Program 1000assigned value, or user typed text.

Drop-down menus 1013 contain predefined values outlined in the menuitself by the name labels (the menu entries for specific values). Userspick their preferred value by clicking on it within the menu entries.

Push buttons 1014 serve as means of submitting the current (currently onthe screen) GUI form to the Engine Program 1000 for processing andexecution. Users activate the push button 1014 by clicking on it usingtheir mouse.

Check boxes 1015 possess either of the two values (states): checked orunchecked. Each time a user clicks on a check box 1015, he/she changesthe check box's state to opposite of its previous state (e.g. checked tounchecked, and vice versa).

Generic hidden field's purpose is to store a value for the EngineProgram 1000 use in such a manner that it's value is invisible to auser. The hidden field is embedded into the markup.

Java_Script_Works hidden field's purpose is to indicate whether theuser's software or device is JavaScript enabled. This hidden fieldcontains either 0 value or 1 value. 0 indicates that the user's softwareor device is not JavaScript enabled, whereas, 1 indicates the opposite.

modifiedCells hidden field's purpose is to store names of text boxescorresponding to the modified data cells within the table end-data GUI.This hidden field is modified by the JavaScript function“cm(changedCell)” on the user's device when the user changes the value(onChange JavaScript event) of a text box corresponding to a DBMSdatabase table 9900 data cell (see Update Table function for moredetail).

Links 1018 within UDMI are underlined pieces of text that, when clickedon, lead to another network location, or execute a program or functionto which they point (e.g. UDMI Engine Program function). Users utilizelinks 1018 within UDMI for quick access to a particular part of UDMI andfor moving through the hierarchical UDMI structure.

After a user clicks on push button 1011 that submits the form, data fromspecific form components is sent to UDMI Engine Program 1000. UDMIEngine Program 1000 interprets the data (GUI components' values)received from the online form, and executes a corresponding set of SQLinstructions and GUI directions to acquire needed information andproduce required output through a visual interface. The output ispresented to the user through the above-mentioned GUI components.

All functions within UDMI are executed by clicking on an appropriatepush button within GUI. It is always assumed that users need to click ona push button to execute a function even where clicking on it is notexplicitly noted in this document.

Logical Division

Logically (from a user's perspective), UDMI operates through InitialAccess Procedure and the four functional areas. These are shown in FIG.4, and include the Initial Access Procedure 1001, Table Manager 1002,Report Manager 1003, Relations Manager 1004, and Administrator's Area1005 as well as the sub-areas: User Manager 1006, Data Sources Manager1007, and External files 80. Table Manager's 1002 purpose is tomanipulate/manage tables and table end-data (data within tables). ReportManager's 1003 purpose is to manipulate/manage reports and reportend-data (data within reports). Relations Manager's 1004 purpose is tomanipulate/manage relations among tables in the current tablecollection. Administrator's Area's 1005 purpose is to manipulate/manageusers and their privileges through User Manager, and tomanipulate/manage Security Table data source and the interface datasource through Data Sources Manager.

In this embodiment, seven separate interrelated physical programs areused to manipulate/manage data and UDMI structure. These include (1)login.cgi, which administers initial access to UDMI; (2)cdmitablemanager.cgi, which administers table manipulation/management;(3) cynaqdmi.cgi, which administers end-data within tablesmanipulation/management; (4) cdmireportmanager.cgi, which administersreport manipulation/management; (5) cdmireportgenerator.cgi, whichadministers end-data within reports manipulation/management; (6)cdmirelationsmanager.cgi, which administers relations among tablesmanipulation/management; and (7) datasources.cgi, which administers datasources manipulation/management.

Initial Access Procedure (IAP)

Users access UDMI's functions by passing through the Initial AccessProcedure 1001. Users are required to enter their user names andpasswords in order to go to UDMI main console (four functional areasredirection screen, see FIG. 7; see below for explanation of FIG. 7), orthey are required to click on the Administrator's Area link that leadsto the Administrator's Area. FIG. 6 shows a user login screen, in whichthe user enters a user name 210 and a password 220. After entry, theuser clicks on submit button 230 to provide this information to the UDMIengine. The UDMI Engine Program 1000 then matches the user-entered loginand password with the UserName and Password columns in the SecurityTable 94. If it finds a match, the Engine Program 1000 generates asession ID for this user by creating an additional record in the SessionIDs Table. This is done by adding one to the maximum integer in theSessionId column within the Session IDs Table 81, and placing this newnumber as the SessionId column value for the new record. This way theuniqueness of the primary key column (SessionId) is maintained. A secondstep in adding a new record to the Session IDs Table 81 is placing theuser name, password, and the current time in the remaining three columns(UserName, Password, and LastVisited). After the new record is added,the user is granted access to UDMI functions (Table Manager, ReportManager, Relations Manager, and Administrator's Area) through the mainconsole GUI, shown in FIG. 7.

FIG. 7 shows links to UDMI's four functional areas: Table Manager 1002,Report Manager 1003, Relations Manager 1004, and Administrator's Area1005, and the link 250 that, when clicked on, leads back to the initiallogin screen (see FIG. 6). If the Engine Program 1000 does not find amatch for the user-entered user name and password, an access deniedmessage is presented through GUI.

During the Initial Access Procedure, the JavaScript function

-   -   “document.FormOne.Java_Script_Works.value=1;”        attempts to set Java_Script_Works hidden field to 1. If it        succeeds, the next execution of the Engine Program 1000 will        “know” that the user has a JavaScript enabled device or software        by checking the Java_Script_Works field for 1 value.        Java_Script_Works value (0 or 1) is passed through the entire        program as long as the user operates UDMI. Based on the value of        Java_Script_Works field, several UDMI functions, such as the        table end-data Update Table function, gain on the client-side        computational efficiency (see the particular UDMI areas'        description for details on efficiency gains).

At all operating points during and beyond the Initial Access Procedureand execution of any UDMI function, the UDMI Engine Program 1000 locatesthe database to be accessed and manipulated/managed as well as theSecurity Table 94 against which to match user-entered user names andpasswords. The Engine Program 1000 does this by opening and reading theInterface Data Source File 92 to obtain a location of the database to bemanipulated, and by opening and reading the Security Table. Source File93 to obtain location of the database where the Security Table 94resides (see the section on External Files for details on the InterfaceData Source File and Security Table Source File).

At all operating points beyond the Initial Access Procedure 1001, theUDMI Engine Program 1000 checks the user's session ID before executingany of its functions. When the user passes through the Initial AccessProcedure 1001, the user's session ID is written to UDMI User SessionsAnalyzer (USA). This analyzer computes the inactivity time (set as 15minutes by default) by subtracting the current time from the LastVisitedcolumn in the Session IDs Table 81. To obtain present time the EngineProgram uses function

-   -   localtime( );    -   To obtain the user's LastVisited column value, the Engine        Program 1000 takes the user's session ID, which is passed        through the entire program as long as the user operates UDMI,        and finds a match in SessionId column of the Session IDs Table        81. Once the match is found and the computation is done, the        UDMI Engine Program 1000 can take two actions:

(1) if the inactivity time is less than the allowed inactivity time(e.g., 15 minutes), the UDMI Engine Program updates the correspondinguser's session record in the LastVisited column with the new “last” time(expressed in seconds since 1970) the user executed an UDMI function; or

(2) if the inactivity time is longer than the allowed inactivity time,the UDMI Engine Program 1000 deletes the user's session record, andpresents a “you have been inactive for too long” message through GUI.The user then has an option to go to the initial login screen.

Each time the procedure for managing session IDs is executed, it deletessession IDs of user's who are not operating UDMI for longer than theallowed inactivity time. This is done by subtracting the current timefrom each record's LastVisited column value in the Session IDs Table 81.If the difference is greater than the allowed inactivity time, theEngine Program 1000 deletes the corresponding record.

Table Manager

The Table Manager operates at two levels through two modes of the EngineProgram 1000: table level/mode (level and mode are used interchangeablyherein) and table end-data mode (see FIG. 8). The former allows fortable manipulation/management (accessing/viewing, creating, and deletingtables) while the later manipulates/manages data within a given table.FIG. 8 shows the Table Manager 1002, Table Level 260, Table End-dataLevel 270, as well as the general functions on each level (see below formore detail on each function).

Table Manager Table Level/Mode

Table manipulation/management occurs at this level. Three functions aredefined at this level: View Table, Create Table, and Delete Table (seeFIG. 9). FIG. 9 shows View Table push button 290, Create Table pushbutton 300, Delete Table push button 310, list 320 including table names330, as well as the Login Screen link 250 and Main Console link 280 (seebelow for more detail on the three functions).

General Facts

In order to maintain synchronization with the underlying DBMS database60, the Engine Program 1000 reads the list of tables presently in theDBMS database 60 each time a table level 260 or table end-data level 270function is executed. The Engine Program 1000 uses SQL instructions suchas “SHOW TABLES;” to obtain the list of tables in DBMS database 60. Oncethe DBMS table list is obtained, the Engine Program 1000 matches everyelement of this list with the elements (table names) stored in the TableNames File 83. If table(s) are found to exist in DBMS table list and donot exist in the Table Names File 83, the Engine Program 1000 createsthe non-existent table(s) within UDMI by placing their names in theTable Names File 83, by placing the tables' relations domains into theTable Relations File 91, and by creating the tables' own external files:Table Column Names File 84, Table Column Names Hash File 85, TableColumn Sorting File 86 and Table Column Sizes File 87 (see Create Tablefor details on table creation).

To achieve a complete synchronization with the underlying tables andend-data within DBMS database 60, the Engine Program 1000 also readseach DBMS table's column list. The Engine Program 1000 uses SQLinstruction of type “DESCRIBE TableName;” to obtain the list of columnsin DBMS database table 9900. Once the DBMS table column list isobtained, the Engine Program 1000 matches every element of this listwith the elements (column names) stored in the Table Column Names File84. If column(s) are found to exist in DBMS table column list and do notexist in the particular table's Table Column Names File 84, the EngineProgram 1000 creates the non-existent column(s) within UDMI by placingtheir names in the particular table's Table Column Names File 84; byestablishing the link in the Table Column Names Hash File 85 betweenDBMS database table 9900 column name and column name appointed by theEngine Program 1000; by placing the new column name into the TableRelations File 91 in the particular table's relations domain; by placingthe initial column width for the new column into the Table Column SizesFile 87; and by placing an empty string value throughout the new column.

View Table

View Table function (push button) 290 accesses the selected table in thebackground DBMS database 60 and shows data presently in the tablethrough the table end-data GUI. Another function of the View Table 290is changing operating modes. After View Table 290 is executed, UDMIswitches to table end-data mode 270 (see Table End-Data Level/Mode fordetails on table end-data mode). UDMI enters table end-data mode 270through View Table function 290 called from the table level 260.

The View Table function 290 performs the following steps: reads thevalue (DBMS table name) behind the list entry 320 (the selected tablename 330) to obtain the table selection 330, calls (executes) indexmainfunction 412 on the table end-data level 260, and passes the table nameto indexmain 412 as parameter.

Users take the following steps to view a table: from the initial tablelevel screen (see FIG. 9) select the table name from the list 320 (GUIcomponent), and click on View Table button 290.

Create Table

Create Table 300 adds a new table with user-defined properties (tablename, column names, primary key, and column ranges) to the user's tablecollection, and to the Table Relations File 91. Initially, an emptytable relations domain is added to the Table Relations File 91.

Create Table 300 performs the following steps: adds the new table toDBMS database 60, places the table name into the Table Names File 83,places the table's relations domain into the Table Relations File 91,and creates the table's own external files: Table Column Names File 84,Table Column Names Hash File 85, Table Column Sorting File 86 and TableColumn Sizes File 87. After the table is created by DBMS database 60 andplaced in the Table Names File 83, a new table name is shown to the userthrough the table level GUI (see FIG. 9).

The following are steps that users take to create a table: from theinitial table level screen (see FIG. 9) press Create Table button 300(GUI component), enter the table name and initial number of columns thatnew table will contain into text field GUI components 450 and 460 (seeFIG. 10). FIG. 10 shows the Table name text field 450, “initial numberof columns” text field 460, and Submit push button 470. The second stepin table creation is to enter initial column names 480, column valuetypes 490, column ranges 500, and choose primary key column 510 byclicking on a corresponding checkbox GUI component. FIG. 11 shows columnname text boxes 480, column type drop-down menus 490, column range textboxes 500, primary key check boxes 510, and the Submit push button 510.

Column types offered in this UDMI version are INTEGER, TEXT, DECIMAL,and DATE. For example, if a column is set as a DATE type, the only valueit can contain is of date format (12-31-2002, 2002-12-31, etc.).

In the case that the user picks TEXT type for a particular column, theuser can define its range (range is applicable only to TEXT typecolumns). Range is the number of characters the underlying DBMS databasetable 9900 column will accept as input. Range is any integer between 1and 255 (ranges for different DBMSs may have slightly different limitson the column ranges). If the user does not define a range for a TEXTtype column, the Engine Program assigns 255 to the range columnproperty.

Delete Table

Delete Table 310 function (FIG. 9) removes the selected table from theuser's table collection.

Delete Table 310 performs the following functions: reads the value (DBMStable name) behind the list 320 entry (the selected table 330) to obtainthe table selection 330, removes the selected table from DBMS database60, deletes the table name from the Table Names File 83, deletes thetable's relations domain and the table name from the Table RelationsFile 91, removes the table name from reports' Pre SQL Statement Files89, and deletes the table name from the tables external files: TableColumn Names File 84, Table Column Hash File 85, Table Column SortingFile 86 and Table Column Sizes File 87. The table name is removed fromthe table level GUI as well.

Users take the following steps to delete a table: from the initial tablelevel screen (see FIG. 9) select the table name 330 from the drop-downlist 320 (GUI component), press Delete Table button (GUI component) 310,and confirm the deletion (see FIG. 12). FIG. 12 shows check box 530 fordeleting the selected table from all reports in the table collection(current database), Delete button 540, and Cancel button 550.

Table Manager End-Data Level/Mode

The Table Manager, in the end-data mode, operates as record, column, andcell manager/manipulator via the following functions, which aredescribed in detail below: indexmain, update table, insert row, insertcolumn, delete marked, query/search, sort by, rename columns, resizecolumns, reorder columns, backup data, and load data.

Indexmain

Indexmain function 412 provides initial presentation of data presentlyin a DBMS database table 9900 (see FIG. 13). FIG. 13 shows the Loginscreen link 250, Main console link 280, Table manager link 281, UpdateTable button 401, Insert Row button 402, Insert Column button 403,Delete Marked button 404, Rename Columns button 405, Resize Columnsbutton 406, Reorder Columns button 407, Query/Search button 408, Sort Bybutton 409, Backup Table button 6410, Load Data button 411, Check Allcheck box 630, individual records' check boxes 640, individual columns'check boxes 620, and data cells text boxes 650.

Indexmain 412 performs the following steps:

(1) Indexmain 412 reads the following files corresponding to a specifictable: Table Column Names File 84 to obtain user-defined column names;Table Column Sorting File 86 to obtain user's sorting preferences; andTable Column Sizes File 87 to obtain user's column width preferences.

(2) Indexmain 412 obtains DBMS database table 9900 column names (DBMSdatabase table 9900 column names are different from user-defined columnnames that reside in Column Names File 84) by reading the Table ColumnNames Hash File 85. Indexmain 412 uses column names read from the TableColumn Names File 85 as keys and obtains DBMS database table 9900 columnnames as values of specific keys within the Column Names Hash File 85.

(3) Indexmain 412 extracts data from DBMS database table 9900. SQLinstruction of type “SELECT col1, col2, col3, . . . FROM tableName ORDERBY col1*, col2*, col3*, . . . ” is used. In this SQL instruction, “col1,col2, col3, . . . ” represent column names obtained from the ColumnNames Hash File 85 as values (DBMS database table 9900 column names) ofspecific keys (user-defined/visible column names). TableName is the nameof table with which the user is currently working. “col1*, col2*, col3*,. . . ” represent column names obtained from the Column Sorting File 86.

(4) Indexmain 412 shows through the table end-data GUI: text fields 650(GUI components) corresponding to DBMS database table 9900 cells; pushbuttons corresponding to UDMI's data management/manipulation functions(see below for the functions description); check boxes 640 and 620corresponding to particular rows and columns respectively.

(5) In the case that the Initial Access Procedure 1001 discoveredJavaScript enabled device or software on the client machine, indexmain412 prints a reference in the markup to the update field function in theJavaScript Functions File. In the case that the Initial Access Proceduredid not discover JavaScript enabled device or software, indexmain 412prints in the markup the hidden fields 1019 possessing the same valuesas the corresponding text fields 650. Double cell representation (havingboth text fields 650 and hidden fields 1019 contain the same values)will be used by Update Table 601 function for finding which cells havebeen updated (see Update Table for additional details on text fields andhidden fields relationship).

Indexmain 412 is executed after each DBMS database table 9900 end-datamanipulation/management (inserting data, modifying data, deleting data,searching data, sorting data, backing data, and column resizing,reordering, and renaming) due to user's need to see the effects ofrecent manipulations.

Update Table

Update Table function 401 provides a means of applying cellmodifications to DBMS database table 9900. Update table 401 performs thefollowing functions.

(1) In the case that the user's device or software is not JavaScriptenabled (Java_Script_Works field set to 0), Update Table 401 functiontakes the values of GUI text boxes 650 and hidden fields 1019 (hiddenfields are printed within the markup during indexmain 412 execution),and compares each text box value with its corresponding hidden field.The Engine Program 1000 updates only text boxes 650 (DBMS database table9900 cells) whose values differed from the corresponding hidden fields1019.

(2) In the case that the user's device or software is JavaScript enabled(Java_Script_Works field set to 1) Update Table 601 function takes themodifiedCells hidden field 1017, splits it up by “:.:” delimiter toobtain names of all modified cells, and places new user-entered valuesinto the corresponding cells. This technique greatly increases UDMI'sspeed due to the fact that only one dynamically (JavaScript client-sideprocessing) generated field that keeps track of updated table data cellsis passed from the client to the server. Each time a user changes a datacell text box 650 (in the case of JavaScript enabled device orsoftware), JavaScript embedded into the markup appends the name of thechanged text box 650 to the modifiedCells hidden field 1017. This waythe Engine Program “knows,” when it splits the modifiedCells hiddenfield, which data cells (text boxes 650) have been modified.

Once the names of the data cells (text boxes 650) to be updated areobtained by the Engine Program, Update Table 401 function uses SQLinstruction of type: “UPDATE tableName SET columnName=someValue WHEREcolumnName*=someValue*.” In this SQL instruction, tableName is the nameof table with which the user is currently working. ColumnName andcolumnName* represent column names obtained from Column Names Hash File85 as values (DBMS database table 9900 column names) of specific keys(user-defined/visible column names).

Insert Row

Insert Row function 403 serves as a new record generator. Use of thisfunction causes the Engine Program 1000 to create a new record withinDBMS database table 9900 with which user is currently working.

Insert Row function 403 uses SQL instruction of type: “INSERT INTOtableName (columnName) VALUES (someValue).” In this SQL instruction,tableName is the name of table with which the user is currently working.ColumnName represents DBMS database table 9900 column name.

The following are steps that users take to insert a new row: click onthe Insert Row button 403 within the table end-data GUI (see FIG. 13),and fill the column value text fields 700 (see FIG. 14). FIG. 14 showscolumn value text fields 700 associated with specific table columns anda Submit push button 710.

Insert Column

Insert Column function 402 represents a new column generator. Thisfunction causes the Engine Program 1000 to create a new column withinDBMS database table 9900 with which the user is currently working. Thenew column is shown at the left end of the table end-data GUI (see FIG.13).

Insert Column function 402 performs the following steps:

(1) Insert Column function 402 uses SQL instruction of type: “ALTERTABLE tableName ADD columnName” to insert the new column into the DBMSdatabase table 9900. In this SQL instruction, tableName is the name oftable with which the user is currently working. ColumnName representsDBMS database table 9900 column name (user invisible column name)appointed by the Engine Program 1000.

(2) Insert Column function 402 places user-defined/visible column nameinto the Table Column Names File 84.

(3) Insert Column function 402 establishes the link betweenuser-defined/visible column name and column name appointed by the EngineProgram 1000. This link is created by inserting an entry (key-valuepair) into the Table Column Names Hash File 85. User-defined/visiblecolumn name represents the key, while column name appointed by theEngine Program 1000 represents the value.

(4) Insert Column function 402 places the new column name into the TableRelations File 91 in the table relations domain of the table with whichthe user is currently working.

(5) Insert Column function 402 places initial column width for the newcolumn into the Table Column Sizes File 87. Initial width is 15characters.

(6) Insert Column function 402 places an empty string value throughoutthe new column.

Users call the Insert Column function by pressing the Insert Column pushbutton 402 within the table end-data GUI (see FIG. 13), and by enteringthe new column name into text field 730, by selecting column type (TEXT,INTEGER, DECIMAL, or DATE, see table creation above for details oncolumn types and ranges) from the drop-down menu 740, and optionally byentering the new column range into the text field 750 (see FIG. 15).FIG. 15 shows Column Name text field 730, Column Type drop-down menu740, Range text field 750, and Submit push button 760.

Delete Marked

Delete Marked function 404 removes selected (marked by check boxes 640and 620) rows and columns (see FIG. 16 for example on checking/markingrows and columns). FIG. 16 shows columns LName and Address1, and rows 1,3, and 4 marked by their respective check boxes 620 (for columns) and640 (for rows).

Delete Marked function performs the following steps:

(1) Delete Marked function 404 removes the selected rows and columnsfrom DBMS database table 9900 by using SQL instruction of type: “DELETEFROM tableName WHERE columnName=someValue” for row (data record)deletion, and SQL instruction of type “ALTER TABLE tableName DROP COLUMNcolumnName” for column deletion. In this SQL instruction, tableName isthe name of table with which the user is currently working. ColumnNamerepresents DBMS database table 9900 column name.

(2) Delete Marked function 404 deletes selected user-defined/visiblecolumn names from the Table Column Names File 84.

(3) Delete Marked function 404 deletes entries (key-value pairs)corresponding to selected columns from the Table Column Names Hash File85.

(4) Delete Marked function 404 deletes selected user-defined/visiblecolumn names from the corresponding table relations domain in the TableRelations File 91.

(5) Delete Marked function 404 deletes SELECT section entries thatcontained selected (selected for deletion) columns in all Pre SQLStatement Files 89.

(6) Delete Marked function 404 deletes selected user-defined/visiblecolumn names from the table Column Sorting File 86.

(7) Delete Marked function 404 Deletes numbers (widths in characters)from the Table Column Sizes File 87 corresponding to selected columnnames.

Users call Delete Marked function 404 by selecting (clicking on thecheck boxes 640 and 620) rows and columns to be deleted, by clicking onthe Delete Marked push button 404 within the table end-data GUI, and byconfirming the deletion (see FIG. 17). FIG. 17 shows the “deleteselected column names from all reports within current database” checkbox 770, Delete push button 780, and Cancel push button 790.

Query/Search

Query/Search function 408 provides a table querying and searching tool.Users are expected to select the type of query through the drop-downmenu 800, fill GUI text fields 810 (within Search/Query screen, see FIG.18) corresponding to specific columns, and click on Submit button 820for results. Query results are presented through the indexmain function412 and its GUI (see FIG. 13).

To receive required query results, the Engine Program 1000 uses SQLinstruction of type “SELECT col1, col2, col3, . . . FROM tableName WHEREcolumnName1*=someValue, columnName2*=someValue . . . ORDER BY col1*,col2*, col3*, . . . ”. In this SQL instruction, “col1, col2, col3, . . .” and “columnName1*=someValue, columnName2*.=someValue . . . ” representcolumn names obtained from Column Names Hash File 85 as values (DBMSdatabase table 9900 column names) of specific keys (user-defined/visiblecolumn names). TableName is the name of table with which the user iscurrently working. “col1*, col2*, col3*, . . . ” represent DBMS databasetable 9900 column names obtained from Column Sorting File 86.

Two types of queries are offered through the drop-down menu 800: logical“OR” (default) and “AND”. The former presents all records that containedEITHER of the non-empty text field 810 values in the correspondingcolumns. An “AND” query presents all records that contained ALL of thenonempty text field 810 values in the corresponding columns. “OR”generally produces a longer list of records than an “AND” query, whichis more restrictive. In both cases, if the corresponding record valuecontains the query text field value, the record is valid for presentingin query results.

One of the most powerful GUI features allows for modification of datawhile in the query GUI (query GUI is the same as the table end-data GUI,see indexmain above for more details). When modification of data throughquery window is complete, using the Update Table function 401 causesDBMS database 60 to apply changes to DBMS database table 9900. Use ofthe Update Table 401 function also causes GUI to call indexmain, whichshows table end-data GUI exiting the query GUI.

Users call Search/Query function by pressing the Search/Query pushbutton 408 within the table end-data GUI (see FIG. 13), and by enteringthe search phrases into the text fields 810 corresponding to thespecific table columns.

Sort By

Sort By function 409 rearranges table records in ascending order byselected columns within the table end-data GUI.

Sort By function 409 performs the following steps: (1) rewrites (deletesand writes over) the Table Column Sorting File (86) by placing DBMSdatabase table 9900 column names selected (checked by clicking on thecorresponding column check boxes 620) for sorting into the Table ColumnSorting File 86 in order (from left to right) in which the selectedcolumn names appear within the table end-data GUI (see FIG. 13 for tableend-data GUI).

Users call Sort By function 409 by selecting (checking the correspondingcolumn check boxes 620) columns by which rows will be sorted, and bypressing the Sort By push button 409 within the table end-data GUI.

Rename Columns

Rename Columns function 405 modifies user-defined column names withinthe table with which the user is currently working.

Rename Columns function 405 performs the following steps:

(1) Rename Columns function 405 rewrites the Table Column Names File 84by placing the new user-defined/visible column names into the TableColumn Names File 84.

(2) Rename Columns function 405 rewrites entries (key-value pairs) inthe Table Column Names Hash File 85 by removing old user-defined/visiblecolumn names (keys) and placing new keys (modified user-defined/visiblecolumn names). Values (DBMS database table 9900 column names) in theColumn Names Hash File 85 remain the same.

(3) Rename Columns function 405 renames the corresponding column namesin the Table Relations File 91.

(4) Rename Columns function 405 renames the corresponding entries in allsections and subsections of the reports' Pre SQL Statement Files 89.

Users call Rename Columns function 405 by clicking on the Rename Columnspush button 405 within the table end-data GUI (see FIG. 13 for tableend-data GUI), and by entering the new column names into the text fields830 (see FIG. 19). FIG. 19 shows the new column name text fields 830,“rename columns in all reports within current database” check box 840,and Submit push button 850.

Resize Columns

Resize Columns function 406 modifies the table end-data GUI text box 650sizes (column widths in characters) corresponding to the specificcolumns within the table with which the user is currently working.

Resize Columns function 406 performs the following steps: rewrites theTable Column Sizes File 87 by placing the new user-defined column sizesinto the Table Column Sizes File 87.

Users call Resize Columns function 406 by clicking on the Resize Columnspush button 406 within the table end-data GUI (see FIG. 13 for tableend-data GUI), and by entering the new column sizes into the text fields860 (see FIG. 20). FIG. 20 shows the new column size text fields 860,and Submit push button 870.

Reorder Columns

Reorder Columns function 407 modifies the order in which columns appearwithin the table end-data GUI (see FIG. 13 for table end-data GUI).

Reorder Columns function 407 performs the following steps: rewrites theTable Column Names File 84 by placing user-defined/visible column namesinto the Table Column Names File 84 in the new order.

Users call Reorder Columns function 407 by clicking on the ReorderColumns push button 407 within the table end-data GUI (see FIG. 13 fortable end-data GUI), and by selecting each column's new order numberthrough drop-down menus 880 (see FIG. 21). FIG. 21 shows the columnorder drop-down menus 880, and Submit push button 890.

Backup Table

Backup Table function 410 gives user an option to save the server-sidedata stored in DBMS database table 9900 to the user's device 20. Afterthe user presses the Backup Table button 410, data from the currenttable is presented in the text area 900 as a tab-delimited text (formatreadable by most data management programs, see FIG. 22). FIG. 22 showsthe text area 900 with tab-delimited text in it. The user can copy thetab-delimited text and paste it into a text file for saving on his/herdevice. In order to obtain data to place into the text area, the EngineProgram 1000 uses SQL instruction of type “SELECT col1, col2, col3, . .. FROM tableName ORDER BY col1*, col2*, col3*, . . . ”. In this SQLinstruction, “col1, col2, col3, . . . ” represent column names obtainedfrom the Column Names Hash File 85 as values (DBMS database table 9900column names) of specific keys (user-defined/visible column names).TableName is the name of table with which the user is currently working.“col1*, col2*, col3*, . . . ” represent column names obtained from theTable Column Sorting File 86.

Load Data

Load Data function 411 represents a way to load large amount of datainto the current table. After pressing the Load Data button 411 withinthe table end-data GUI (see FIG. 13 for table end-data GUI), the GUIpresents a screen with an input text area 910 (GUI component see FIG.23). FIG. 23 shows the input text area 910, and Submit push button 920.Users are expected to type or paste a tab-delimited text into the textarea 910 in order to load the data into the current table. Once theEngine Program 1000 obtains the data from the text area 910 it uses SQLinstruction of type: “INSERT INTO tableName (columnName) VALUES(someValue).” In this SQL instruction, tableName is the name of tablewith which the user is currently working. ColumnName represents DBMSdatabase table 9900 column name. When loading data, the Engine Program1000 reads the tab-delimited text columns from left to right and loadsthe data from the leftmost column to the right (as far as it can) in thecurrent DBMS database 60 column ordering structure.

Report Manager

Report Manager 1003 operates at two levels through two modes of theEngine Program 1000: report level/mode and report end-data mode (seeFIG. 24). The former allows for report manipulation (accessing/viewing,creating, and deleting) while the later manipulates/manages data withina given report. FIG. 24 shows the Report Manager 1003, Report Level1500, Report End-data Level 1510, as well as the general functions oneach level (see below for more detail on each function).

Report Manager Report Level/Mode

Report manipulation/management occurs at this level. Three functions aredefined at this level: View Report, Create Report, and Delete Report(see FIG. 25). FIG. 25 shows View Report push button 1520, Create Reportpush button 1530, Delete Report push button 1540, list 1573 includingreport names 1574, as well as the Login Screen link 250 and Main Consolelink 280 (see below for more detail on the three functions).

View Report

View Report 1520 accesses the selected report in the user's reportcollection and shows through the report end-data GUI (see FIG. 30 belowfor report end-data GUI) the data that conforms to the rules defined inthe report. Another important function of View Report 1520 is changingoperating modes. After View Report 1520 is executed, UDMI switches toreport end-data mode 1510 (see Report End-Data Level/Mode for details onthe report end-data mode). UDMI enters report end-data mode 1510 throughView Report function 1520 called from the report level 1500.

View Report function 1520 performs the following steps: reads the valuebehind the list entry (the selected report 1574) to obtain the reportselection 1574, calls (executes) indexmain function 1550 on the reportend-data level 1510, and passes the report name to indexmain 1550 asparameter.

Users take the following steps to view a report: from the initial reportlevel screen (see FIG. 25) select the report name 1574 from thedrop-down menu 1573, and press the View Report button 1520.

Create Report

Create Report function 1530 adds a new report with user-definedproperties (report name, column names, column definitions, recordfiltering conditions, and grouping conditions) to the user's reportcollection.

Create Report function 1530 performs the following steps: adds the newreport name to the Report Names File 88, creates the report's Pre SQLStatement File 89, and creates the report's Column Sizes File 90. Beforethe report can be created, the Engine Program 1000 checks for existenceof relations (see Table Relations File above for definition of arelation) among tables selected for the report data extraction. If thenumber of relations is one less than the number of tables selected fordata extraction or greater, the report can be created, otherwise, amessage “Unrelated tables selected” will be displayed through GUI. Theuser can then select tables that have a sufficient number of relationsamong them and proceed with the report creation. After the report iscreated, the new report name is shown to the user through the reportlevel GUI (see FIG. 25).

The following are steps that users take to create a report: from theinitial report level screen (see FIG. 25) press the Create Report button1530; enter the report name 1580, initial number of columns 1590 thatnew report will contain, and select from list 1600 the table(s) fromwhich the report will obtain data (see FIG. 26). FIG. 26 shows theReport name text field 1580, “initial number of columns” text field1590, table selection list 1600 including table names 1610, and Submitpush button 1620. Second step in report creation is to enter initialcolumn names 1630, select column definitions using drop-down menus 1640and 1650 and using text field 1651 (not visible in the FIG. 27), selectrecord filtering conditions using drop-down menus 1660 and 1670 andusing text field 1680, and select grouping conditions using drop-downmenu 1690 (see FIG. 27). Column definition is done either by selectingcolumn 1650, or by defining computation 1640 of multiple columns 1650,see below for explanation. FIG. 27 shows the column name text boxes1630, column computation drop-down menus 1640, column selectiondrop-down menus 1650, column selection drop-down menus 1660, filteringconditions drop-down menus 1670, filtering conditions text fields 1680,grouping conditions drop-down menu 1690, and Submit push button 1700.Third step in report creation is the optional custom modification of theEngine Program 11000 generated pre-parsed sections and subsections ofthe SQL report code through modification of the sections and subsectionstext fields 1710, 1720, 1730, and 1740 (see FIG. 28). FIG. 28 shows thetext field 1710 corresponding to the SELECT section of the Pre-SQLStatement File, text field 1720 corresponding to the FROM section, textfield 1730 corresponding to the WHERE subsection, text field 1740corresponding to the GROUP BY subsection, and Submit push button 1750.

Users are offered the following options when defining a column:

(1) Grouping (must be used in combination with Group By function)functions (leftmost column definition function drop-down menu 1640): SUM(sum of records in the selected column), COUNT (number of records in theselected column), MIN (minimum value in the selected column), MAX(maximum value in the selected column), and AVG (average value in theselected column).

(2) Inter-column functions: MULT (multiplication of values in theselected columns), DIV (division of values in the selected columns), ADD(addition of values in the selected columns), and SUB (subtraction ofvalues in the selected columns). Depending on the version of UDMIimplementation, additional column definition functions can/will beintroduced.

Users are offered the following options when defining record filteringconditions (drop-down menu 1670): EXISTS (value present in the column),DOES NOT EXIST (value not present in the column), EQUAL (equal columnvalues), NOT EQUAL (not equal column values), LESS THAN (columnselection 1660 values less than the value defined in the text field1680), AND GREATER THAN (column selection 1660 values greater than thevalue defined in the text field 1680). Depending on the version of UDMIimplementation, additional record filtering functions can/will beintroduced.

Users define the grouping conditions by selecting in the drop-down list1690 any column from any table that was selected as source of data inthe first step of column creation.

Delete Report

Delete Report function 1540 removes the selected report from the user'sreport collection. Delete Report function 1540 performs the followingsteps: reads the value behind the list entry (the selected report 1574)to obtain the report selection 1574, removes the selected report fromthe Report Names File 88, deletes the report's Pre SQL Statement File89, and deletes the report's Column Sizes File 90. The report name isremoved from the report level GUI as well (see FIG. 25 for report levelGUI).

Users take the following steps to delete a report: from the initialreport level screen (FIG. 25) select the report name 1574 from thedrop-down list 1573, press the Delete Report button 1540, and confirmthe deletion (see FIG. 29). FIG. 29 shows the Delete button 1760, andCancel button 1770.

Report Manager End-Data Level/Mode

Report Manager in the end-data mode operates as record, column, and cellmanager/manipulator through the following functions, which are describedin detail below: indexmain, insert column, delete columns, changeconditions, sort by, rename columns, resize columns, reorder columns,and backup data.

Indexmain

Indexmain function 1550 (FIG. 24) provides initial presentation of datathat conforms to the rules defined in the report (see FIG. 30). FIG. 30shows the Login screen link 250, Main console link 280, Report managerlink 282, Insert Column button 1551, Delete Columns button 1552, ChangeConditions button 1553, Rename Columns button 1554, Resize Columnsbutton 1555, Reorder Columns button 1556, Sort By button 1557, BackupTable button 1558, individual columns' check boxes 1820, and data cellstext boxes 1830.

Indexmain function 1550 performs the following steps:

(1) Indexmain function 1550 reads the following files corresponding to aparticular report: Pre SQL Statement File 89, to obtain sections andsubsections of the pre-parsed SQL statement; and the Report Column SizesFile 90 to obtain the user's column width preferences.

(2) Indexmain function 1550 extracts data from DBMS database table 9900susing the user-defined and the DBMS specific report properties obtainedin the report creation procedure. SQL instruction of type “SELECT col1col2, col3, . . . FROM table1, table2, table3, . . . WHERE cond1, cond2,cond3, . . . ORDER BY col1*, col2*, col3*, . . . GROUP BY col1**,col2**, col3**, . . . ” is used. In this SQL instruction, “col1, col2,col3, . . . ” represent column names obtained from the Pre SQL StatementFile's 89 SELECT section entries. “table1, table2, table3, . . . ” arenames of tables from which data will be used to generate the report.“cond1, cond2, cond3, . . . ” are user-defined conditions for filteringthe report records. “col1*, col2*, col3*, . . . ” represent the user'scolumn sorting preferences. “col1**, col2**, col3**, . . . ” representthe user's column grouping preferences.

(3) Indexmain function 1550 shows GUI text fields 1830 corresponding tothe report data cells.

(4) Indexmain function 1550 shows push buttons 1551, 1552, 1553, 1554,1555, 1556, 1557, 1558 corresponding to the report data manipulationfunctions.

(5) Indexmain function 1550 shows check boxes 1820 corresponding to theparticular columns.

Indexmain 1550 is executed after each report manipulation (changingreport conditions, sorting data, backing data, etc.) due to the user'sneed to see the effects of recent manipulations.

Insert Column

Insert Column function 1551 represents a new column generator. Thisfunction causes the Engine Program 1000 to create a new column withinthe report with which the user is currently working. The new columnpossesses values that comply with the user-defined conditions for thenew column as well as the general (e.g. grouping) column conditions inthe report in which the new column will be inserted. The new column isshown at the left end of the report end-data GUI (see FIG. 30).

Insert Column function 1551 performs the following steps:

(1) Insert Column function 1551 creates a new entry in the SELECTsection of the report's Pre SQL Statement File 89 by (1A) adding theuser-defined column name, DBMS table column name (user invisible columnname) and column definition to the SELECT section (e.g.[Purchase].[AmountSold]*[Purchase].[UnitPrice] as ‘SalesAmount’); (1B)depending on whether the user selected additional table(s) from whichthe report will obtain data the Engine Program 1000 modifies the FROMsection of the report's Pre SQL Statement File 89 by appendingadditional table names or changing the list of table names already inthe FROM section; and (1C) depending on whether the user selectedgrouping column(s) the Engine Program 1000 modifies the GROUP BYsubsection of the report's Pre SQL Statement File 89 by appendingadditional table column names or changing the list of table column namesalready in the GROUP BY subsection.

(2) Insert Column function 1551 places the initial column width for thenew column into the Report Column Sizes File 90. Initial width is 15characters.

The following are steps that users take to insert column: press theInsert Column button 1551 and select from the list 1850 one or moretable names 1860 from which the column will obtain data (see FIG. 31).FIG. 31 shows table selection list 1850 including table names 1860, andSubmit push button 1870. Second step in column insertion is to enterinitial column name 1630, select column definition 1640 and 1650 (eithera column selection, or computation of multiple columns), and selectgrouping conditions through drop-down menu 1690 (see FIG. 32). FIG. 32shows the column name text box 1630, column computation drop-down menus1640, column selection drop-down menus 1650, grouping conditionsdrop-down menu 1690, and Submit push button 1890. Third step in columninsertion is the optional custom modification of the Engine Program 1000generated pre-parsed section and subsection of the SQL report codethrough modification of the text fields 1710 and 1740 (see FIG. 33).FIG. 33 shows the text field 1710 corresponding to the SELECT section ofthe Pre-SQL Statement File, text field 1740 corresponding to the GROUPBY subsection, and Submit push button 1900.

Delete Columns

Delete Columns function 1552 removes selected (marked by check boxes1820) columns within the report with which the user is currentlyworking.

Delete Marked function 1552 performs the following steps:

(1) Delete Columns function 1552 removes the entries from all sectionsand subsections in the report's Pre SQL Statement File 89 correspondingto the selected columns or entries that contained the selected column.

(2) Delete Columns function 1552 deletes column width values from theReport Column Sizes File 90 corresponding to the selected column names.

Users call Delete Marked function 1552 by selecting (clicking on thecheck boxes 1820) columns to be deleted, pressing the Delete Marked pushbutton 1552 within the report end-data GUI (FIG. 30), and by confirmingthe deletion (similar to FIG. 17, description above).

Sort By

Sort By function 1557 rearranges records in ascending order by theselected columns within the report end-data GUI (see FIG. 30 for reportend-data GUI).

Sort By function 1557 performs the following steps: rewrites the entriesin the ORDER BY subsection of the report's Pre SQL Statement File 89 byplacing column names selected for sorting into the ORDER BY subsectionin order (from left to right) in which the selected columns appearwithin the report end-data GUI (FIG. 30).

Users call Sort By function by selecting (clicking on check boxes 1820)columns by which rows will be sorted, and clicking on Sort By pushbutton within the report end-data GUI (FIG. 30).

Rename Columns

Rename Columns function 1554 modifies user-defined report column names.

Rename Columns function 1554 performs the following steps: rewritesentries in the SELECT section of the report's Pre SQL Statement File 89by changing the entries' user-defined column names portion (the portionafter the “as” word).

Users execute Rename Columns function 1554 by pressing the RenameColumns push button 1554 within the report end-data GUI (FIG. 30), andby entering the new column names (see FIG. 34). FIG. 34 shows the newcolumn name text fields 1920, and Submit push button 1930.

Resize Columns

Resize Columns function 1555 modifies the report end-data GUI text boxsizes (column widths in characters) corresponding to specific columnswithin the report with which the user is currently working.

Resize Columns function 1555 performs the following steps: rewrites theReport Column Sizes File 90 by placing the new user-defined column sizesinto the Report Column Sizes File 90.

Users call Resize Columns function 1555 by clicking on the ResizeColumns push button 1555 within the report end-data GUI (FIG. 30), andby entering the new column sizes (see FIG. 35). FIG. 35 shows the newcolumn size text fields 1950, and Submit push button 1960.

Reorder Columns

Reorder Columns function 1556 modifies the order in which columns appearwithin the report end-data GUI (see FIG. 30 for report end-data GUI).

Reorder Columns function 1556 performs the following steps: rearrangesand rewrites entries in the SELECT section of the report's Pre SQLStatement File 89. The new location of each entry in the SELECT sectioncorresponds to the new (defined by user) order number 1980 of eachentry.

Users call Reorder Columns function 1556 by pressing the Reorder Columnspush button 1556 within the report end-data GUI (FIG. 30), and byselecting a new order number 1980 corresponding to each column (see FIG.36). FIG. 36 shows the column order drop-down menus 1980, and Submitpush button 1990.

Backup Table

Backup Table function 1558 represents a way to save the report's data onthe user's device. After the user presses the Backup Table button 1558within the report end-data GUI, the data from the current report ispresented in the text area 2010 as a tab-delimited text (format readableby most data management programs, see FIG. 37). FIG. 37 shows the textarea 2010 with tab-delimited text in it. The user can copy thetab-delimited text and paste it into a text file for saving on his/herdevice. In order to obtain data to place into the text area, the EngineProgram 1000 uses SQL instruction of type “SELECT col1, col2, col3, . .. FROM table1, table2, table3, . . . WHERE cond1, cond2, cond3, . . .ORDER BY col1*, col2*, col3*, . . . GROUP BY col1**, col2**, col3**, . .. ”. In this SQL instruction, “col1, col2, col3, . . . ” representcolumn names obtained from the Pre SQL Statement File's 89 SELECTsection entries. “table1, table2, table3, . . . ” are names of tablesfrom which data will be used to generate the report. “cond1, cond2,cond3, . . . ” are user-defined conditions for filtering the reportrecords. “col1*, col2*, col3*, . . . ” represent the user's columnsorting preferences. “col1**, col2**, col3**, . . . ” represent theuser's column grouping preferences.

Change Conditions

Change Conditions function 1553 modifies record filtering and groupingconditions. This function causes the Engine Program 1000 to create newdata compliance rules within the report with which the user is currentlyworking.

Change Conditions function 1553 performs the following steps: rewritesentries in the WHERE and GROUP BY subsections of the report's Pre SQLStatement File 89 by placing newly defined record filtering and groupingconditions into the WHERE and GROUP BY subsections, respectively.

The following are steps that users take to change a report's filteringand grouping conditions: press the Change Conditions button 1553 withinthe report end-data GUI (FIG. 30), define new record filteringconditions by selecting table column(s), filtering function(s), andfiltering value(s) through GUI drop-down menus 1660 and 1670 and textfields 1680, and define new grouping conditions by selecting a groupingcolumn through drop-down menu 1690 (see FIG. 38). FIG. 38 shows thecolumn selection drop-down menus 1660, filtering conditions drop-downmenus 1670, filtering conditions text fields 1680, grouping conditionsdrop-down menu 1690, and Submit push button 2030. Second step inchanging a report's conditions is the optional custom modification ofthe Engine Program 1000 generated pre-parsed sections and subsections ofthe SQL report code through modification of the sections and subsectionstext fields 1730, and 1740 (see FIG. 39). FIG. 39 shows the text field1730 corresponding to the WHERE subsection, text field 1740corresponding to the GROUP BY subsection, and Submit push button 2050.

Relations Manager

UDMI users manipulate/manage relations among tables in the current tablecollection through Relations Manager 1004. This is done throughmodification of column pairs 2070-2080 within the Relations Manager GUI(see FIG. 40). FIG. 40 shows the Login screen link 250, Main consolelink 280, originating table column selection drop-down menus 2070,concluding table column selection drop-down menus 2080, and Submit pushbutton 7222. Each row in the Relations Manager GUI represents a tablerelations domain. A table relations domain is defined as a set of columnpairs (relations) with the first column selected from the originatingtable and the second column selected from the concluding table. Tablerelations domain also includes the specific table name (owner of thespecific relations domain) to which a set of relations belong. This setof relations can be an empty list. Users define a relation betweenTable1 and Table2 by selecting a Table1's column (origin of relation)within Table1's table relations domain, and by selecting a Table2'scolumn (conclusion of relation) within Table1's table relations domain.The originating and concluding columns are separated by the “>>” withinthe Relations Manager GUI (see FIG. 40) to indicate the direction of therelation. Relations (column pairs) within the GUI are separated by “;”.

Once the Engine Program 1000 obtains the column pairs (relations) fromthe user through the Relations Manager GUI, it rewrites the TableRelations File 91. Each time the user presses the Submit button withinthe Relations Manager GUI (FIG. 40) the Engine Program 1000 collects allcolumn pairs defined in the GUI and rewrites the Table Relations File 91in its entirety.

Relations defined through the Relations Manager 1004 do not correspondwith relations possibly defined in the DBMS database 60. Because theTable Relations File 91 is a completely separate entity from the DBMSdatabase 60-defined relations, it makes it possible to define relationswithin a non-relational database.

Administrator's Area

Users access the Administrator's Area 1005 by pressing theAdministrator's Area link 240 on the initial login screen (FIG. 6), orby pressing the Administrator's Area link 1005 on the UDMI's mainconsole (FIG. 7). Users are required to enter their user names 210 andpasswords 220 (similar to FIG. 6, initial login screen) to access theAdministrator's Area 1005 (see FIG. 41A). FIG. 41A, shows the Loginscreen link 250, Main console link 280, Administrator's login screenlink 284, User Manager link 1006 and Data Sources Manager link 1007.After the user name and password are matched against the SecurityTable's 94 UserName and Password columns, and if the user's SecurityTable's 94 record shows “admin” in the Status column, the user isallowed to access the Administrator's Area through the two subfunctions: User Manager 1006 and Data Sources Manager 1007. User Manager1006 manages/manipulates users and user access and operating privileges,while Data Sources Manager 1007 manipulates/manages the interface datasource and security table source (see Data Sources Manager below formore detail).

User Manager

User management occurs when a user with administrator's access privilegemanipulates a special purpose table (Security Table 94) that storesinformation on users and their privileges in accessing UDMI. SecurityTable 94 is not stored in the Table Names File 83 and therefore isinvisible to UDMI users who do not have administrator's accessprivilege. Following is an example of the Security Table 94:

Password UserName FirstName LastName Status jcos4082 Jcosic Jasmin Cosicadmin jg432432 Jgreen John Green user

The Security Table's 94 data is managed/manipulated in the same manneras all other tables' data through UDMI's table end-data level-mode GUI(see FIG. 41 which is equivalent of FIG. 13). For example, to addanother user, an administrator presses the Insert Row button 403, andfills out the five mandatory text fields 700 (Password, UserName,FirstName, LastName, and Status, equivalent of FIG. 14). To delete auser, an administrator selects the row in which the user's informationreside, and presses the Delete Marked button 404. Also, all otherSecurity Table 94 manipulations mimic manipulations of a regular UDMItable (any table within the Table Names File 83).

More important than the Security Table's 94 management/manipulationprocedures is the content of this special purpose table's mandatorycolumns. Password, UserName, FirstName, and LastName areself-explanatory. Two access privileges (column values) for the Statuscolumn are defined: “admin” and “user.” In the case that a user's Statusvalue is set to “user,” the user will not have access to Administrator'sArea 1005 (User Manager 1006 and Data Sources Manager 1007) within UDMI.If a user's Status value is set to “admin,” the user can access all UDMIfunctions. The Security Table 94 can be expanded to include additionalnon-mandatory columns such as address, phone, sign-up date, etc.

Another important parameter of the Security Table 94 is its networklocation (physical or abstract). The Security Table's 94 location may bethe same as the UDMI manipulated/managed database's location, or it canbe a different network location on the network (see below for details ondata sources).

Data Sources Manager

Users manipulate UDMI accessed/managed DBMS database's 60 location andSecurity Table's 94 location through the Data Sources Manager (see FIG.42). FIG. 42 shows Login screen link 250, Main console link 280,Administrator's login screen link 284, Administrator's console link 285,interface data source (IDS) User Name text field 2100, IDS Password textfield 2110, IDS Database type text field 2120, IDS Database Name textfield 2130, IDS Host Name text field 2140, IDS Port text field 2150,security data source (SDS) User Name text field 2160, SDS Password textfield 2170, SDS Database type text field 2180, SDS Database Name textfield 2190, SDS Host Name text field 2200, and SDS Port text field 2210.Submit push button 8000 is located below the above-mentioned textfields, but is not visible on FIG. 42.

Users are expected to enter the following access information for bothdata sources (Interface Data Source and Security Table Source) throughthe Data Sources Manager GUI: database type (e.g. mysql), database name(e.g. jcosic), database IP address (e.g. csci.fds.edu), database port(e.g. 3306), database access user name (e.g. zoro), and database accesspassword (e.g. zoro4321). Once the Engine Program 1000 obtains the sixpieces of information for the two data sources, it rewrites theInterface Data Source File 92 and the Security Table Source File 93 (seeexternal files for details on data source files) with the new accessinformation.

Second Embodiment Multiple-Database within One Database UDMI (MUDMI)

MUDMI hosts multiple virtual databases (user table collections/domains)in one DBMS database 60. This UDMI embodiment is designed to efficientlyserve multiple users (UDMI also serves multiple users) in an ApplicationService Provider (ASP) environment (e.g. network data managementservice). For the purpose of this description, MUDMI is implemented asan application similar in functionality to UDMI and its Table Manager1002. Certain variations exist, and they are explained in detail in thetext that follows.

As shown in FIG. 2, equivalently to UDMI, MUDMI includes three abstractsegments: UDMI Engine Program 1000, DBMS connectivity interface 1020,and Graphical User Interface (GUI) 1010.

Logically (as seen by the end user), MUDMI operates through the InitialAccess Procedure 1001, and Table Manager 1002 (see logical divisionbelow for details).

Abstract Division

MUDMI's abstract division is equivalent to UDMI's abstract divisiondescribed in the first embodiment. MUDMI's abstract division includesMUDMI Engine Program 1000, DBMS Connectivity Interface 1020, and GUI1010. See the first embodiment for descriptions of each abstract MUDMI'ssegment.

External Files

Session IDs Table 81 is equivalent to UDMI's Session IDs Table 81 (seedescription of the first embodiment for explanation).

JavaScript Functions File 82 is equivalent to UDMI's JavaScriptFunctions File 82 (see description of first embodiment for explanation).

Table Names File 83 is equivalent to UDMI's Table Names File 83 (seedescription of first embodiment for explanation).

Column Names File 84 is equivalent to UDMI's Table Column Names File 84(see description of first embodiment for explanation).

Column Names Hash File 85 is equivalent to UDMI's Table Column NamesHash File 85 (see description of first embodiment for explanation).

Column Sorting File 86 is equivalent to UDMI's Table Column Sorting File86 (see description of first embodiment for explanation).

Column Sizes File 87 is equivalent to UDMI's Table Column Sizes File 87(see description of first embodiment for explanation).

Sequential Number Generator 9100 contains a single integer valuerepresenting the attachment number (number after “_” that makes tablenames unique, e.g. MyTable_253) of the last created table. SequentialNumber Generator 9100 is used by Table Management Algorithm (see TableLevel/Mode for details on TMA) to ensure that table names within DBMSdatabase 60 are unique. A call to the Sequential Number Generator 9100returns the last integer that has been used within TMA. Every integeroutput incremented by one from the Sequential Number Generator is aunique integer within TMA.

Security Table 9101 is a special purpose table that stores informationon users who are allowed access to MUDMI. Security Table 9101 is notstored in the Table Names File and therefore is invisible to MUDMIusers. Following is an example of the Security Table 9101:

Password UserName FirstName LastName jcos4082 jcosic Jasmin Cosicjg432432 jgreen John Green

The Security Table 9101 can be expanded to include additionalinformation about MUDMI users such as address, phone, sign-up date, etc.Password column is the primary key (unique record identifier) for theSecurity Table.

Graphical User Interface (GUI)

MUDMI GUI 1010 serves the same general purpose as UDMI's GUI, thereforethe two are equivalent when functionality is concerned. See thedescription of first embodiment for explanation of GUI functioning.

Logical Division

Logically, MUDMI operates through the Initial Access Procedure 1001, andTable Manager 1002 (see FIG. 43A). FIG. 43A shows the Initial AccessProcedure 1001, Table Manager 1002 as well as the External files 80. Inthis embodiment, three separate interrelated physical programs are usedto manipulate/manage data and MUDMI structure: (1) login.cgi, whichadministers initial access to MUDMI; (2) mudmistablemanager.cgi, whichadministers table manipulation/management; and (3) cynaqmudmis.cgi,which administers end-data within tables manipulation/management.

Initial Access Procedure

Before accessing UDMI functions through the Initial Access Procedure,users are placed in the Security Table either by the network UDMIservice administrators, or by the users themselves through the UDMIsign-up screen (see FIG. 49). FIG. 49 shows the Username text field30001, Password text field 30002, Password confirmation text field30003, First Name text field 30004, Last Name text field 30005, Companytext field 30006, and submit push button 30007. Users are expected tofill the required fields and press the push button 30007. If the newuser-defined password is not found in the Password column in theSecurity Table, the user is successfully enrolled in the network UDMIservice and the user is granted the right to access UDMI functionsthrough the Initial Access Procedure 1001.

Users access MUDMI's functions by passing through the Initial AccessProcedure 1001. Users are required to enter their user names 210 andpasswords 220 (see FIG. 6, FIG. 6 is MUDMI equivalent). The MUDMI EngineProgram 1000 then matches the user-entered login 210 and password 220with the UserName and Password columns in the Security Table 9101. If itfinds a match, the Engine Program 1000 generates a session ID for thisuser by creating an additional record in the Session IDs Table 81. Thisis done by adding one to the maximum integer in the SessionId columnwithin the Session IDs Table 81, and placing this new number as theSessionId column value for the new record. This way the uniqueness ofthe primary key column (SessionId) is maintained. Second step in addinga new record to the Session IDs Table is placing the user name,password, and the current time in the remaining three columns (UserName,Password, and LastVisited). After the new record is added, the user isgranted access to MUDMI functions through the table level GUI (see FIG.9, FIG. 9 is MUDMI equivalent).

If the Engine Program does not find a match for the user-entered username and password, an access denied message is presented through GUI.

During the Initial Access Procedure the JavaScript function

-   -   “document.FormOne.Java_Script_Works.value=1;”        attempts to set Java_Script_Works hidden field 1016 to 1. If it        succeeds, the next execution of the Engine Program 1000 will        “know” that the user has a JavaScript enabled device or software        by checking the Java_Script_Works hidden field 1016 for 1 value.        Java_Script_Works value (0 or 1) is passed through the entire        program as long as the user operates MUDMI. Based on the value        of Java_Script_Works hidden field 1016, several MUDMI functions        such as the end-data Update Table function gain on the        client-side computational efficiency.

At all operating points beyond the Initial Access Procedure 1001, theMUDMI Engine Program 1000 checks the user's session ID before executingany of its functions. When the user passes through the Initial AccessProcedure 1001, his/her session ID is written to MUDMI User SessionsAnalyzer (USA). This analyzer computes the inactivity time (set as 15minutes by default) by subtracting the current time from the LastVisitedcolumn in the Session IDs Table 81. To obtain the current time theEngine Program 1000 uses function

-   -   Localtime ( ).

To obtain the user's LastVisited column value the Engine Program 1000takes the user's session ID, which is passed through the entire programas long as the user operates MUDMI, and finds a match in SessionIdcolumn of the Session ID Table 81. Once the match is found, the MUDMIEngine Program can take two actions:

-   -   if the inactivity time is less than the allowed inactivity time        (15 minutes by default), the MUDMI Engine Program 1000 updates        the corresponding user's session record in the LastVisited        column with the new “last” time (expressed in seconds        since 1970) the user executed an MUDMI function.    -   if the inactivity time is longer than the allowed inactivity        time, the MUDMI Engine Program 1000 deletes the user's session        record, and presents the “you have been inactive for too long”        message through GUI. The user has an option to go to the initial        login screen.

Each time the procedure for managing session IDs is executed, it deletessession IDs of user's who are not operating MUDMI for longer than theallowed inactivity time. This is done by subtracting the current timefrom each record's LastVisited column value in the Session IDs Table 81.If the difference is greater than the allowed inactivity time, theEngine Program 1000 deletes the corresponding record.

Table Manager

Table Manager operates at two levels through two modes of the EngineProgram 1000: table level/mode (level and mode are used interchangeablyherein) and table end-data mode (see FIG. 43, FIG. 43 is equivalent toFIG. 8). The former allows for table manipulation/management(accessing/viewing, creating, and deleting tables) while the latermanipulates/manages data within a given table.

Table Level/Mode

Table manipulation/management occurs at this logical level. Threefunctions are defined at this level: View Table 290, Create Table 300,and Delete Table 310 (see FIG. 44). FIG. 44 shows the Login screen link250, View Table push button 290, Create Table push button 300, DeleteTable push button 310, and list 320 including table names 330 (see belowfor more detail on the three functions).

General Facts

Each table within MUDMI possesses a special purpose primary key (uniquerecord identifier) column. The primary key column's content are integersin the descending order for easy monitoring and update of data cells.Whenever a user executes a MUDMI table end-data function (Update Table401, Insert Column 402, etc.) the Engine Program 1000 obtains theprimary key of the particular row(s) on which the manipulation takesplace, and conducts the manipulation. This user-invisible columnimproves MUDMI's efficiency and simplicity by keeping track of primarykeys automatically.

View Table

View Table function 290 accesses the selected table in the backgroundDBMS database 60 and shows data presently in the table through theend-data GUI (see FIG. 45; see end-data mode below for more detail).Another important function of the View Table 290 is changing operatingmodes. After View Table is executed, MUDMI switches to end-data mode(see End-Data Level/Mode for details on end-data mode).

View Table function 290 performs the following steps: reads the value(DBMS table name) behind the list entry (the selected table 330) toobtain the table selection 330, calls (executes) indexmain function 412on the end-data level, and passes the table name to indexmain 412 asparameter.

Users take the following steps to view a table: from the initial tablelevel screen (FIG. 44) select the table name 330 from the drop-down list320, and click on View Table button 290.

Create Table

Create Table 300 adds new table with user-defined properties (tablename, and column names) to the user's table domain (set of tablescreated by individual user, see User's Table Domain below for moredetail).

Create Table 300 performs the following steps: adds the new table toDBMS database 60, places the table name into the Table Names File 83,and places the new table name into MUDMI's table management algorithm(TMA). Use of TMA (see Table Management Algorithm for details) ensuresthat table names within each user's domain are unique. After the tableis created by DBMS database 60 and placed in TMA, the new table name isshown to the user through the table level GUI (FIG. 44).

The following are steps that users take to create a table: from theinitial table level screen (FIG. 44) press Create Table button 300, andenter the new table name and initial number of columns that the tablewill contain into text field GUI components 450 and 460 (see FIG. 46,FIG. 46 is equivalent to FIG. 10). Second step in table creation is toenter initial column names 480 (see FIG. 47). FIG. 47 shows column nametext boxes 480, and Submit push button 510.

Delete Table

Delete Table function 310 removes selected table from the user's tabledomain.

Delete Table function 310 performs the following steps: reads the value(DBMS table name) behind the list entry (the selected table 330) toobtain the table selection 330, removes the table from DBMS database 60,deletes the table name from the Table Names File 83, and deletes thetable name from TMA. The table name is removed from the table level GUI(FIG. 44) as well.

Users take the following steps to delete a table: from the initial tablelevel screen (FIG. 44) select the table name 330 from the drop-down list320, press Delete Table button 310, and confirm the deletion (see FIG.12, FIG. 12 is MUDMI equivalent).

User's Table Domain

When a user applies for MUDMI use, he/she is given a folder (his/her owndomain logically inaccessible by other users) within MUDMI, separatecopies of cynaqmudmis.cgi and mudmistablemanager.cgi, and external filesbelonging to that user's domain (see External Files above for details).Separate copies of the two MUDMI physical programs enhance MUDMI's speedwhen multiple users concurrently access MUDMI. In the case of two ormore users accessing MUDMI at the same time, they would not compete forthe same copy of the program, which would extend waiting time. Thiswaiting time would be significantly long if thousands of users aresubscribed to MUDMI. By placing separate copies of the two MUDMIphysical programs in each user's domain, separate physical programs areinterpreted for each individual user. This technique greatly enhancesMUDMI's speed.

MUDMI Table Management Algorithm (TMA)

Each user has access to tables only within his/her table domain. Tabledomain is an abstract object that resides within the Table Names File83. The separation of user domains is achieved through utilization of analgorithm that ensures name uniqueness of every table within the DBMSdatabase 60 even though different users might have defined same tablenames within their respective table domains. Separate table domains canlegitimately possess the same table names. However, TMA allows onlyunique table names to be used within individual user's domain.

When a new table name is defined by the user, TMA checks whether the newtable name already exists within the user's domain. If it does, an errormessage is presented through GUI. In the case that the new table namedoes not exist in the user's domain, TMA attaches an incremented numbergenerated by the Sequential Number Generator to the user-defined tablename. Since each incremented number obtained from the Sequential NumberGenerator is unique, every new table name approved by TMA (it isapproved if it is unique within user's domain) will be unique withinDBMS database 60. This technique is crucial in ensuring that every tablewithin DBMS database has a unique name.

End-Data Level/Mode

Table Manager 1002, in the end-data mode 270, operates as record,column, and cell manager/manipulator via the following functions, whichare described in detail below: indexmain, update table, insert row,insert column, delete marked, query/search, sort by, rename columns,resize columns, reorder columns, backup data, and load data.

Indexmain

Indexmain function 412 provides initial presentation of data presentlyin a DBMS database table 9900 (see FIG. 45). FIG. 45 shows the Loginscreen link 250, Table manager link 281, Update Table button 601, InsertRow button 602, Insert Column button 603, Delete Marked button 604,Rename Columns button 605, Resize Columns button 606, Reorder Columnsbutton 607, Query/Search button 608, Sort By button 609, Backup Tablebutton 610, Load Table button 611, Check All check box 630, individualrecords' check boxes 640, individual columns' check boxes 620, and datacells text boxes 650.

Indexmain function 412 performs the following steps:

(1) Indexmain function 412 reads the following files corresponding to aspecific table: Column Names File 84 to obtain user-defined columnnames; Column Sorting 86 File to obtain user's sorting preferences; andColumn Sizes File 87 to obtain user's column width preferences.

(2) Indexmain function 412 obtains DBMS database table 9900 column namesby reading the Column Names Hash File 85. Indexmain uses column namesread from Column Names File 84 as keys 5010 and obtains DBMS databasetable 9900 column names as values 5020 of specific keys 5010 within theColumn Names Hash File 85.

(3) Indexmain function 412 extracts data from DBMS database table 9900.SQL instruction of type “SELECT col1, col2, col3, . . . FROM tableNameORDER BY col1*, col2*, col3*, . . . ” is used. In this SQL instruction,“col1, col2, col3, . . . ” represent column names obtained from ColumnNames Hash File 85 as values (DBMS database table 9900 column names) ofspecific keys (user-defined/visible column names). TableName is the nameof table with which the user is currently working. “col1*, col2*, col3*,. . . ” represent column names obtained from Column Sorting File 86.

(4) Indexmain function 412 shows (prints into the markup) GUI textfields 650 corresponding to DBMS database table 9900 cells.

(5) Indexmain function 412 shows push buttons corresponding to MUDMI'sdata manipulation functions.

(6) Indexmain function 412 shows check boxes 640 and 620 correspondingto particular rows and columns respectively.

(7) In the case that the Initial Access Procedure 1001 discoveredJavaScript enabled device or software on the client machine, indexmainprints a reference in the markup to the update field function in theJavaScript Functions File 82. In the case that the Initial AccessProcedure 1001 did not discover JavaScript enabled device or software,indexmain 412 prints in the markup the hidden fields possessing the samevalues as the corresponding text fields. Double cell representation(having both text fields and hidden fields contain the same values) willbe used by Update Table function for finding which cells have beenupdated (see Update Table for additional details on text fields andhidden fields relationship).

Indexmain function 412 is executed after each DBMS database table 9900end-data manipulation/management (inserting data, modifying data,deleting data, searching data, sorting data, backing data, and columnresizing, reordering, and renaming) due to user's need to see theeffects of recent manipulations.

Update Table

Update Table function 401 provides a means of applying cellmodifications to DBMS database table 9900. Update table 401 performs thefollowing steps:

(1) In the case that the user's device or software is not JavaScriptenabled (Java_Script_Works hidden field 1016 set to 0) Update Tablefunction 401 takes the values of GUI text boxes and hidden fields(hidden fields are printed within the markup during indexmainexecution), and compares each text box value with its correspondinghidden field. The Engine Program updates only text boxes (DBMS databasetable 9900 cells) whose values differed from the corresponding hiddenfields.

(2) In the case that the user's device or software is JavaScript enabled(Java_Script_Works hidden field 1016 set to 1) Update Table function 401takes the modifiedCells hidden field 1017, splits it up by “:.:”delimiter to obtain names of all modified cells, and places newuser-entered values into the corresponding cells. This technique greatlyincreases MUDMI's speed due to the fact that only one dynamically(JavaScript client-side processing) generated field that keeps track ofupdated table data cells is passed from the client device/software tothe server device/software.

Once the names of the data cells to be updated are obtained by theEngine Program 1000, Update Table function 401 uses SQL instruction oftype: “UPDATE tableName SET columnName=someValue WHEREcolumnName*=someValue*.” In this SQL instruction, tableName is the nameof table with which the user is currently working. ColumnName andcolumnName* represent column names obtained from Column Names Hash File85 as values (DBMS database table 9900 column names) of specific keys(user-defined/visible column names).

Insert Row

Insert Row function 403 serves as a new record generator. Use of thisfunction causes the Engine Program 1000 to create a new record withinDBMS database table 9900 with which the user is currently working. Thenew record is shown as a row of empty text boxes within the end-data GUI(FIG. 45).

Insert Row function 403 uses SQL instruction of type: “INSERT INTOtableName (columnName) VALUES (someValue).” In this SQL instruction,tableName is the name of table with which the user is currently working.ColumnName represents DBMS database table 9900 column name.

The following is the step that users take to insert a new row: click onthe Insert Row button 403 within the end-data GUI (FIG. 45).

Insert Column

Insert Column function 402 represents a new column generator. Thisfunction causes the Engine Program 1000 to create a new column withinDBMS database table 9900 with which the user is currently working. Thenew column possesses either a specific (user-defined) or an empty value(in the case that user choose not to place an initial value) throughoutthe new column. The Engine Program 1000 shows the new column at the leftend of the end-data GUI (FIG. 45).

Insert Column function 402 performs the following steps:

(1) Insert Column function 402 uses SQL instruction of type: “ALTERTABLE tableName ADD columnName” to insert new column into DBMS databasetable 9900. In this SQL instruction, tableName is the name of table withwhich the user is currently working. ColumnName represents DBMS databasetable 9900 column name (user invisible column name) appointed by EngineProgram 1000.

(2) Insert Column function 402 places the user-defined/visible columnname into the Column Names File 84.

(3) Insert Column function 402 establishes the link between theuser-defined/visible column name and column name appointed by the EngineProgram 1000. This link is created by inserting an entry (key-valuepair) into the Column Names Hash File 85. User-defined/visible columnname represents the key 5010, while column name appointed by the EngineProgram 1000 represents the value 5020. Engine Program defines(appoints) DBMS database table 9900 column name by calculating thelargest number accompanying any column name within a given table, andincrementing it by one. The DBMS database table 9900 column name is oftype “col+largestNumberAccompanyingAnyColumnNamePlusOne (e.g. col3).”

(4) Insert Column function 402 places initial column width for the newcolumn into the Column Sizes File 87. Initial width is 15 characters.

(5) Insert Column function 402 places initial value throughout the newcolumn. If the user defined an initial value, it is placed throughoutthe new column; otherwise, an empty string is placed.

Users call the Insert Column function by pressing the Insert Column pushbutton 402 within the end-data GUI (FIG. 45), and by entering the newcolumn name 730 and optionally the initial column value 3300 (see FIG.48). FIG. 48 shows the Column name text field 730, Initial value textfield 3300, and Submit push button 3310.

Delete Marked

Delete Marked function 404 removes selected (marked by check boxes 640and 620) rows and columns (see FIG. 16 for example on checking/markingrows and columns; FIG. 16 is MUDMI equivalent). FIG. 16 shows columnsLName and Address1, and rows 1, 3, and 4 marked by their respectivecheck boxes 620 (for columns) and 640 (for rows).

Delete Marked function 404 performs the following steps:

(1) Delete Marked function 404 removes the selected rows and columnsfrom DBMS database table 9900 by using SQL instruction of type: “DELETEFROM tableName WHERE columnName=someValue” for row (data record)deletion, and SQL instruction of type “ALTER TABLE tableName DROP COLUMNcolumnName” for column deletion. In this SQL instruction, tableName isthe name of table with which the user is currently working. ColumnNamerepresents DBMS database table 9900 column name.

(2) Delete Marked function 404 deletes selected user-defined/visiblecolumn names from the Column Names File 84.

(3) Delete Marked function 404 deletes entries (key-value pairs)corresponding to selected columns from the Column Names Hash File 85.

(4) Delete Marked function 404 deletes selected user-defined/visiblecolumn names from the Column Sorting File 86.

(5) Delete Marked function 404 deletes numbers (widths in characters)from the Column Sizes File 87 corresponding to selected column names.

Users call Delete Marked function 404 by selecting (clicking on thecheck boxes 640 and 620) rows and columns to be deleted, by clicking onthe Delete Marked push button 404 within the table end-data GUI, and byconfirming the deletion (see FIG. 17, FIG. 17 is MUDMI equivalent).

Query/Search

Query/Search 408 is equivalent to UDMI's Query/Search function 408.

Sort By

Sort By 409 is equivalent to UDMI's Sort By function 409.

Rename Columns

Rename Columns 405 is equivalent to UDMI's Rename Columns function 405.

Resize Columns

Resize Columns 406 is equivalent to UDMI's Resize Columns function 406.

Reorder Columns

Reorder Columns 407 is equivalent to UDMI's Reorder Columns function407.

Backup Table

Backup Table 410 is equivalent to UDMI's Backup Table function 410.

Load Data

Load Data 411 is equivalent to UDMI's Load Data function 411.

Other Embodiments UDMI Implemented as Predominantly Client-SideApplication

The two UDMI embodiments (denoted as UDMI and MUDMI) described above arepredominantly server-side applications. A slightly different UDMIimplementation is a predominantly client-side UDMI. Client-side UDMIuses technology such as Java Applet, ActiveX Component, or a client-sidescripting language such as JavaScript or VBScript. Client-side UDMIremains essentially the same functionality as the predominantlyserver-side UDMI. The only difference is that most of the computationalwork is done on the client's (user's) device.

Client-side implementation of UDMI requires the Engine Program to resideon the user's device as opposed to the predominantly server-side UDMIwhose Engine Program resides and is executed on a server (device thathosts UDMI). On the client's device, the Engine Program would either beexecuted by a virtual machine (e.g. Java Applet requirement), a plugin(preinstalled software that interprets files and executables designedfor it), or by the user's (client's) operating system. For example, inthe case of a Java Applet, the Engine Program (1) connects to a DBMSdatabase through the UDMI's DBMS Connectivity Interface placed on theclient device; (2) requests data from the server-side. DBMS; (3)processes the data on the client's device; and (4) . . . presents theresults of the computations on the client's device through a webbrowser, or another device or program.

UDMI implemented as a predominantly client-side application establishesa real time link between the DBMS database and client-side software(Java applet, ActiveX component, JavaScript, etc.). UDMI users areinformed real-time about DBMS database events that can affect or beuseful in their work.

Further Embodiments

UDMI may provide concurrent access by multiple users, and definitions ofadditional operational privileges.

Concurrency

One of the fields of UDMI development is the field of concurrency.Concurrency is an issue only in the UDMI implementation that ispredominantly server-side.

In the case that multiple users access the same UDMI database, asituation may occur that one user updates a DBMS database table 9900,and the other user does not know about the update. This is a possibilitybecause a predominantly server-side UDMI sends data to the user'sdevice. The unchanged data remains on the user's device until the userexecutes an UDMI function. Since the user can take a few minutes inbetween function executions, another user of the same DBMS databasetable 9900 can update the table with new data in the meantime. The userwho accessed the table first does not know about the recent update, sowill override the second user's updates if he/she executes one of thetable update functions (e.g. Update Table, Insert Column, etc.).

Solution to the concurrency issue is found by introducing either of thetwo techniques of informing the user about the recent modifications inthe DBMS database table 9900:

-   -   Before the user updates a table an update array will be checked.        The update array will contain users who updated DBMS database        table 9900 most recently (e.g. in the thirty minutes). Whenever        a user wants to update a DBMS database table 9900, he/she will        receive a message that another user updated the table if the        update array indicates this.    -   Ability of UDMI to establish a real-time link between DBMS        database and client-side device or software will completely        solve the issue of concurrency. Whenever a user updates a table,        the Engine Program informs all other users connected to the same        table about the recent update. Also, values of the data cells        within the table end-data GUI change automatically after the        update.

Access Privileges

The second field of UDMI development is conducted as definition ofadditional access privileges at table level and end-data (columnsconcerned only) level. Definition of privileges will be done throughcreation of additional access rules (privileges) on user and grouplevels. Use of users and groups will allow administrators to define towhich tables, columns, end-data (rows, columns, and cells), and UDMIfunctions will each particular user or group have access.

Architecture

The UDMI is not limited to use with the hardware/software configurationshown in the figures; it may find applicability in any computing orprocessing environment. The UDMI may be implemented in hardware (e.g.,an ASIC {Application-Specific Integrated Circuit} and/or an FPGA {FieldProgrammable Gate Array}), software, or a combination of hardware andsoftware.

The UDMI may be implemented using one or more computer programsexecuting on programmable computers and/or executing on a computing orcommunication device connected to the network, that each includes aprocessor, and a storage medium (e.g., a remote storage server) readableby the processor (including volatile and non-volatile memory and/orstorage elements).

Each such program may be implemented in a high level procedural orobject-oriented programming language to communicate with a computersystem. Also, the programs can be implemented in assembly or machinelanguage. The language may be a compiled or an interpreted language.

Each computer program may be stored on a storage medium or device (e.g.,CD-ROM, hard disk, or magnetic diskette) that is readable by a generalor special purpose programmable machine for configuring and operatingthe computer when the storage medium or device is read by the computerto execute UDMI.

The UDMI may also be implemented as a machine-readable storage medium,configured with a computer program, where, upon execution, instructionsin the computer program cause the machine to perform the functionsdescribed herein.

Other embodiments not described herein are also within the scope of thefollowing claims.

What is claimed is:
 1. A method comprising: outputting a graphical userinterface, via a web browser, using information obtained from a networkservice over a network, wherein the graphical user interface isconfigured to manage data in a database associated with a databasemanagement system via the network; enabling, via the web browser, accessto the data, including search and modification of the data, over thenetwork through the graphical user interface comprising a query userinterface; gathering operating input in the graphical user interfacethat conforms to a markup language, via the web browser, formanipulation of the data subsequent to the enabling access to the data;and providing, via the web browser, the operating input to a universaldata management interface which is implemented through a universal datamanagement interface engine program, wherein the universal datamanagement interface engine program is configured to convert theoperating input from a form conforming to the markup language into acompatible database query language used in the database associated withthe database management system.
 2. The method of claim 1, wherein theoutputting of the graphical user interface facilitates management of atleast one of: an Oracle system, a MSSQL Server, a SyBase system, anInformix system, a DB2-based system, a dBase-based system, a mSQL-basedsystem, or a mySQL-based system.
 3. The method of claim 1, wherein theoutputting of the graphical user interface facilitates management of atleast one of a remote database management system or a local databasemanagement system.
 4. The method of claim 1, wherein the outputting ofthe graphical user interface is configured to allow access to the datausing a database management language.
 5. The method of claim 1, whereinthe outputting includes outputting a graphical user interface that isconfigured to allow access to the data based on user access informationthat is used to pass an initial access procedure.
 6. The method of claim1, wherein the outputting of the graphical user interface allows accessto the database.
 7. The method of claim 1, wherein the outputting isperformed via a network enabled device.
 8. The method of claim 7,wherein the network enabled device includes at least one of a computer,personal digital assistant, or cellular telephone.
 9. The method ofclaim 1, further comprising outputting a further graphical userinterface that is configured to facilitate a sign-up to the networkservice.
 10. The method of claim 1, further comprising enablingmanagement, via the web browser, of the data subsequent to allowingaccess to the data.
 11. The method of claim 10, wherein the enablingmanagement of the data comprises enabling viewing the data in thedatabase management system, and wherein the enabling manipulation of thedata comprises enabling modifying the data in the database managementsystem.
 12. The method of claim 10, wherein the enabling management ofthe data and the enabling manipulation of the data comprise enablingmanagement and manipulation of the data using a database managementlanguage.
 13. The method of claim 10, wherein the enabling management ofthe data and the enabling manipulation of the data include enablingmanagement and manipulation of the data via the web browser whileoperating over a network.
 14. The method of claim 10, wherein theenabling management of the data and the enabling manipulation of thedata comprise enabling management and manipulation of the data in thedatabase management system from the web browser.
 15. The method of claim1, further comprising allowing management and manipulation of tables,via the graphical user interface, within the network service using atable management process.
 16. The method of claim 15, wherein theallowing management and manipulation of tables within the networkservice includes allowing creation, from the web browser, of a tablewithin the network service using a table management process.
 17. Themethod of claim 15, wherein the allowing management and manipulation oftables within the network service includes allowing deletion, from theweb browser, of a table within the network service using a tablemanagement process.
 18. The method of claim 15, wherein the allowingmanagement and manipulation of tables within the network serviceincludes allowing management and manipulation, from the web browser, ofdata in the tables within the network service using a table managementprocess.
 19. The method of claim 10, further comprising providing accessto a relations management process to allow management and manipulation,from the web browser, of relations among tables within the networkservice via the graphical user interface.
 20. The method of claim 19,wherein the providing access to a relations management process comprisesproviding access to a relations management process that enablesmanagement, from the web browser, of a column name pair within thenetwork service.
 21. The method of claim 19, wherein the providingaccess to a relations management process comprises providing access to arelations management process that enables managing and manipulating,from the web browser, of a column name pair within the network service.22. The method of claim 19, wherein the providing access to a relationsmanagement process comprises providing access to a relations managementprocess that allows creating, from the web browser, virtual relationsamong tables within the network service.
 23. The method of claim 10,wherein the enabling management and the enabling manipulation includeallowing administration of the network service, from the web browser.24. The method of claim 23, wherein the allowing administration of thenetwork database service includes allowing administrators to manage andmanipulate user enrollment of the network service, from the web browser.25. The method of claim 23, wherein the allowing administration of thenetwork service includes allowing administrators to manage andmanipulate data sources within the network service, from the webbrowser.
 26. The method of claim 10, further comprising allowingmanagement and manipulation, from the web browser, of reports within thenetwork service using a report management process.
 27. The method ofclaim 26, wherein the allowing management and manipulation of reportsincludes allowing requesting, from the web browser, that a report becreated within the network service.
 28. The method of claim 26, whereinthe allowing management and manipulation of reports includes allowingrequesting, from the web browser, that a report be deleted within thenetwork service.
 29. The method of claim 26, wherein the allowingmanagement and manipulation of reports includes allowing management andmanipulation, from the web browser, of data in the reports within thenetwork service.
 30. The method of claim 1, wherein the enablingmanipulation of the data includes enabling at least one of addition,deletion, or modification of the data.
 31. The method of claim 1,wherein the enabling access to the database management system includesenabling access to the database management system over an internet,intranet, or extranet.
 32. The method of claim 1, further comprisingconnecting to the network service using the web browser over thenetwork.
 33. The method of claim 1, wherein the information conforms toat least one of HTML or XML.
 34. The method of claim 1, wherein thegraphical user interface is implemented using a client-side applicationexecuting within the web browser.
 35. The method of claim 34, whereinthe client-side application comprises at least one of a JavaScriptscript, a Java applet, or an ActiveX component.
 36. The method of claim1, wherein the universal data management interface is further configuredto interface with the database management system and the graphical userinterface.
 37. The method of claim 1, wherein the universal datamanagement interface engine program is further configured to produceoutput via the graphical user interface.
 38. The method of claim 1,wherein the universal data management interface engine program isfurther configured to implement a security function using a securitytable.
 39. An apparatus comprising: a processor; and a memory configuredto communicate with the processor, the memory having instructions storedthereon that, in response to execution by a computing device, cause thecomputing device to perform operations comprising: output a graphicaluser interface via a web browser using information that conforms to amarkup language to manage data within a database management system via anetwork service, wherein the graphical user interface is a querygraphical user interface that allows modification and search of the datawithin the database management system; gather operating input in thegraphical user interface that conform to the extensive markup language,for modification of the data within the database management system viathe graphical user interface of the web browser, wherein modification ofthe data comprises altering the data at a remote database associatedwith the database management system via the web browser; and provide theoperating input to a universal data management interface which isimplemented through a universal data management interface engineprogram, wherein the universal data management interface engine programis configured to convert the operating input from a form conforming tothe markup language into a compatible database query language used inthe remote database associated with the database management system. 40.The apparatus of claim 39, wherein the graphical user interface isconfigured to interact with a relations management process to allowmanagement and manipulation of relations among tables within the networkservice via the graphical user interface.
 41. The apparatus of claim 40,wherein the relations comprise column name pairs within the networkservice.
 42. The apparatus of claim 40, wherein the graphical userinterface is configured to manage and manipulate column name pairswithin the network service.
 43. The apparatus of claim 40, wherein theinstructions are executable to provide a relations management processthat allows management and manipulation of relations by creating virtualrelations among tables within the network service.
 44. The apparatus ofclaim 39, wherein the altering is performed by a query.
 45. Acomputer-readable medium comprising instructions that in response tobeing executed by a computing device, causes the computing device tooutput a graphical user interface, comprising a query graphical userinterface, via a web browser using information that conforms to a markuplanguage to search, modify, manage and manipulate data within a databasemanagement system via a network service, wherein operating input thatconform to the markup language are gathered in the graphical userinterface and provided to a universal data management interface, whichis implemented through a universal data management interface engineprogram, for manipulation of the data within the database managementsystem comprises altering the data at a remote database associated withthe database management system via the web browser, wherein theuniversal data management interface engine program is configured toconvert the operating input from a form conforming to the markuplanguage to a compatible database query language used in the remotedatabase associated with the database management system.
 46. Thecomputer-readable medium of claim 45, wherein the instructions comprisesinstructions to configure the graphical user interface to enableinteraction with a relations management process to allow management andmanipulation of relations among tables within the network service viathe graphical user interface.
 47. The computer-readable medium of claim46, wherein the relations comprise column name pairs within the networkservice.
 48. The computer-readable medium of claim 46, wherein themanagement and the manipulation of relations comprises managing andmanipulating column name pairs within the network service.
 49. Thecomputer-readable medium of claim 46, wherein the relations managementprocess is configured to manage and manipulate relations includescreating virtual relations among tables within the network service. 50.A system comprising: means for outputting a graphical user interface viaa web browser using information obtained from a network service over anetwork, wherein the information conforms to a markup language to managedata within a database management system via the network service, thedatabase management system including a database; means for gatheringoperating input in the graphical user interface that conform to theextensive markup language, for manipulating the data in a databaseassociated with the database management system by modifying data in thedatabase via the operating input gathered in the graphical userinterface comprising a query graphical user interface that allows searchand modification of the data in the database; and means for providingthe operating input to a universal data management interface which isimplemented through a universal data management interface engineprogram, wherein the universal data management interface engine programis configured to convert the operating input from a form conforming tothe markup language into a compatible database query language used inthe database associated with the database management system.
 51. Thesystem of claim 50, wherein the database management system comprises atleast one of: an Oracle system, a MSSQL Server, a SyBase system, anInformix system, a DB2-based system, a dBase-based system, a mSQL-basedsystem, or a mySQL-based system.
 52. The system of claim 50, wherein thedatabase management system comprises at least one of a remote databasemanagement system or a local database management system.
 53. The systemof claim 50, wherein the network comprises at least one of internet,intranet or extranet.
 54. The system of claim 50, wherein the system isembodied on a network enabled device.
 55. The system of claim 54,wherein the network enabled device includes at least one of a computer,personal digital assistant, or cellular telephone.
 56. The system ofclaim 50, further comprising a means for connecting to the networkservice over the network.