Claims
- 1. A method for supporting independent data layer implementation, the method comprising:
providing a first data defining layer, wherein the first data defining layer comprises a schema; analyzing the schema to identify an invokable method accessible on the first data defining layer, wherein the invokable method comprises one or more elements of a data type known to the first data defining layer; and formatting the invokable method, wherein the one or more elements are formatted as a data type known to a second data defining layer while maintaining an application interface layer that provides for a common interface to both the first data defining layer and the second data defining layer.
- 2. The method of claim 1, wherein the data defining layer is a database
- 3. The method of claim 1, wherein the invokable method is a table.
- 4. The method of claim 1, wherein formatting the invokable method comprises formatting the invokable method for the second data defining layer, and wherein the schema is a first schema, the method further comprising:
creating a second schema based in part on the invokable method, wherein the second schema is known to the second data defining layer.
- 5. The method of claim 4, the method further comprising:
storing data to a database in accordance with the second schema.
- 6. The method of claim 1, wherein the invokable method is a table, and wherein formatting the table comprises formatting the table for an application, the method further comprising:
creating the application interface layer for the application.
- 7. The method of claim 6, wherein the first data defining layer is a database, and wherein the application interface layer comprises a schema of the first database in a form known to the application.
- 8. The method of claim 7, wherein the application interface layer further comprises one or more commands associated with the invokable method and selected from the group consisting of a read command, a create command, a terminate command, an update command, and a delete command.
- 9. The method of claim 1, wherein the first data defining layer is a first database, the second data defining layer is a second database, the invokable method is a first table, and the schema is a first schema, the method further comprising:
analyzing the first schema to identify a second table accessible on the first database, wherein the second table comprises one or more elements of a data type known to the first database; formatting the first and the second tables, wherein the elements associated with the first and second tables are formatted as a data type known to the second database; creating a second schema based in part on the first and second tables, wherein the second schema is known to the second database; and storing elements associated with the first and second tables to the second database in a format consistent with the second schema.
- 10. A method for supporting independent database implementation, the method comprising:
providing a first database; wherein the first database comprises a first schema; analyzing the schema to identify an table accessible on the first database, wherein the table comprises at least one element of a data type known to the first database; creating a second schema, wherein the at least one element is indicated as a data type known to a second database; and creating a data structure indicated by the second schema that can maintain data associated with the at least one data element in encrypted form.
- 11. The method of claim 10, the method further comprising:
storing data associated with the table on the first database to the second database, wherein data associated with the at least on data element is stored in in encrypted form on the second database.
- 12. The method of claim 10, wherein the at least one element is a first element, and wherein a second element associated with the first database is maintained in encrypted form, the method further comprising:
indicating the first element as an unencrypted element on the second database.
- 13. The method of claim 10, the method further comprising:
formatting the table for an application, wherein the at least one element is formatted as a data type known to the application; and creating a data interface layer between the application and the database.
- 14. The method of claim 13, wherein the data interface layer comprises a schema of the first database in a form known to the application.
- 15. The method of claim 13, wherein the data interface layer comprises a decryption command associated with the table, and an indication of the at least one encrypted element.
- 16. The method of claim 15, wherein the decryption command is integral to a read command associated with the table.
- 17. The method of claim 10, wherein another element element is maintained in encrypted form on the second database, the method further comprising:
formatting the table for an application, wherein the other element is formatted as a data type known to the application; and creating a data interface layer for the application; wherein the data interface layer comprises a decryption command executable to decrypt the other element maintained on the second database in encrypted form.
- 18. The method of claim 10, wherein the table is a first table and the schema is a first schema, the method further comprising:
analyzing the first schema to identify a second table accessible on the first database, wherein the second table comprises one or more elements of a data type known to the first database; formatting the first and the second tables, wherein the elements associated with the first and second tables are formatted as a data type known to the second database; and creating a second schema based in part on the first and second tables and known to the second database; and storing elements associated with the first and second tables to the second database in a format consistent with the second schema.
- 19. A system for supporting independent database implementation, the system comprising:
a computer readable medium comprising computer instructions, wherein the computer instructions are executable by a computer to:
access a first database associated with the computer, wherein the first database comprises a schema; analyze the schema to identify a table accessible on the first database, wherein the table comprises one or more elements of a data type known to the first database; and format the table, wherein the one or more elements are formatted as a data type known to a second database and/or an application.
- 20. The method of claim 19, wherein formatting the table comprises formatting the table for the second database and wherein the schema is a first schema, the method further comprising:
creating a second schema based in part on the table, wherein the second schema is known to the second database; and storing the table to the second database in a format consistent with the second schema.
- 21. The method of claim 19, wherein formatting the table comprises formatting the table for the application, the method further comprising:
creating a data interface layer for the application; wherein the data interface layer comprises a schema of the first database in a form known to the application.
- 22. The method of claim 21, wherein at least one of the elements of the table is maintained in encrypted form on the first database and wherein the data interface layer further comprises:
an indication of the encrypted element; and a command for decrypting the encrypted element.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] The present invention is related to U.S. patent application Ser. No. ______, entitled SYSTEMS AND METHODS FOR IMPLEMENTING EXTENSIBLE GENERIC APPLICATIONS (Attorney Docket Number 019555-005300US); and U.S. patent application Ser. No. ______, entitled SYSTEMS AND METHODS FOR STORING DIFFERING DATA FORMATS IN FIXED FIELD DEFINITIONS (Attorney Docket No. 019555-005100US) all of which are incorporated herein by reference for all purposes and filed on a date even herewith.