CN110059081A - Data output method, device and the computer equipment shown based on data - Google Patents
Data output method, device and the computer equipment shown based on data Download PDFInfo
- Publication number
- CN110059081A CN110059081A CN201910190048.6A CN201910190048A CN110059081A CN 110059081 A CN110059081 A CN 110059081A CN 201910190048 A CN201910190048 A CN 201910190048A CN 110059081 A CN110059081 A CN 110059081A
- Authority
- CN
- China
- Prior art keywords
- data
- cleaning
- interface
- business side
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000004140 cleaning Methods 0.000 claims abstract description 62
- 238000000586 desensitisation Methods 0.000 claims abstract description 27
- 238000004590 computer program Methods 0.000 claims description 16
- 238000002955 isolation Methods 0.000 abstract description 8
- 230000006870 function Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 230000002000 scavenging effect Effects 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 229910001507 metal halide Inorganic materials 0.000 description 1
- 150000005309 metal halides Chemical class 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/215—Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The present invention provides a kind of data output method, device and computer equipment shown based on data, and the data output method that should be shown based on data includes: to clean to sensitive data, the data after cleaning is put into database, the notification list after generating cleaning;The interface of calling business side pushes the data after cleaning in database.The embodiment of the present invention has carried out desensitization encryption to the data of output, and data are safer.Wherein, rights management is carried out to the data of output, carry out data isolation make business side can not across channel acquisition data, data are safer.The data for being more than certain time limit for the time limit need to carry out expired processing.More than after validity period, business side will be unable to continue to obtain data data, ensure that the safety and validity of data.It supports a variety of push modes, more scenes can be adapted to.Interfaceization displaying can check business number formulary according to whether successfully pushing by interface, and efficiency of operation is high, at low cost.Interfaceization manage so that operation be more convenient it is more efficient.
Description
Technical field
The present embodiments relate to data analysis technique field more particularly to a kind of data output sides shown based on data
Method, device and computer equipment.
Background technique
Using financial industry such as banking, securities business, insurances as the social industry of one kind of representative, mentioned when towards the public
It when for service, needs to check the true identity of party, that is, carries out system of real name verifying work.For example, credit card application, security account
Family is opened an account etc. in processes, and original mode requires party and comes to site sales counter personally, provides personal identification perfect instrument, table
Up to personal actual wishes and associated documents are signed, this process is commonly referred to as " face label ".
In auto metal halide lamp loan industry, face faces while using the situation of legacy system and new system when signing, and is for the old and new
The inconsistent situation of system exploitation browser version benchmark, often will appear A system and shows that normally, B system page presentation is abnormal
The case where.
Summary of the invention
The purpose of the embodiment of the present invention is that provide it is a kind of based on data show data output method, device and computer set
It is standby, it is of the existing technology for solving the problems, such as.
To achieve the above object, in a first aspect, the embodiment of the present invention provides a kind of data output side shown based on data
Method, comprising:
Sensitive data is cleaned, the data after cleaning are put into database, the notification list after generating cleaning;
The interface of calling business side pushes the data after cleaning in database.
Optionally, before calling the interface of business side to be pushed the data after cleaning in database, the method
Further include:
After carrying out desensitization cleaning to sensitive data, the data after cleaning are generated into encryption file and are sent to connecing for business side
Mouthful.
Optionally, the method also includes:
Rights management is carried out to the data of output.
Optionally, the method also includes:
The time limit for obtaining data in the database, the data for being more than certain time limit for the time limit carry out expired processing.
Optionally, the method also includes:
The interface of display data push is provided, the interface includes the push situation and data of the business number formulary evidence
The reception condition of recipient.
Second aspect, the embodiment of the invention also provides a kind of data output devices shown based on data, comprising:
Data after cleaning are put into database for cleaning to sensitive data by notification list generation module, are generated clear
Notification list after washing;
Data-pushing module, for calling the interface of business side to push the data after cleaning in database.
Optionally, before calling the interface of business side to be pushed the data after cleaning in database, described device
Further include:
Encrypting module, for after carrying out desensitization cleaning to sensitive data, the data after cleaning to be generated encryption file hair
Give the interface of business side.
Optionally, described device further include:
Management module, for carrying out rights management to the data of output.
The third aspect, the embodiment of the invention also provides a kind of computer equipments, including memory, processor and storage
On a memory and the computer program that can run on a processor, the processor are realized when executing the computer program
The step of stating method.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer
Program, when the computer program is executed by processor the step of the realization above method.
Data output method, device and the computer equipment provided in an embodiment of the present invention shown based on data, is being based on
The desensitization process of data, the push of data, the expired processing of data, data are included at least in the data output method that data are shown
Rights management and interfaceization show.
The embodiment of the present invention has carried out desensitization encryption to the data of output, and data are safer.Wherein, to the data of output into
Row rights management, carry out data isolation make business side can not across channel acquisition data, data are safer.It is more than one for the time limit
The data periodically limited need to carry out expired processing.More than after validity period, business side will be unable to continue to obtain data data, ensure that
The safety and validity of data.It supports a variety of push modes, more scenes can be adapted to.Interfaceization displaying can pass through interface
Business number formulary is checked according to whether successfully pushing, efficiency of operation is high, at low cost.Interfaceization manage so that operation be more convenient it is more efficient.
Detailed description of the invention
It, below will be to embodiment party in order to illustrate more clearly of embodiments of the present invention or technical solution in the prior art
Formula or attached drawing needed to be used in the description of the prior art are briefly described.It should be evident that the accompanying drawings in the following description is only
It is merely exemplary, it for those of ordinary skill in the art, without creative efforts, can also basis
The attached drawing of offer, which is extended, obtains other implementation attached drawings.
Fig. 1 is the flow chart for the data output method shown based on data that one embodiment of the invention provides;
Fig. 2 is the structural schematic diagram for the data output device shown based on data that one embodiment of the invention provides;
Fig. 3 is the hardware structural diagram for the computer equipment that one embodiment of the invention provides.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Fig. 1 shows the process signal the embodiment of the invention provides a kind of data output method shown based on data
Figure, as shown in Figure 1, method includes the following steps:
101, sensitive data is cleaned, the data after cleaning is put into database, the notification list after generating cleaning;
With the development of Operator Specific Service, big data using more and more extensive, the safeguard protection based on big data is also got over
Send out important, therefore the cleaning of sensitive data i.e. desensitization protection also becomes the most important thing of current safety work, and at data desensitization
Reason refers to the deformation that certain sensitive informations are carried out with data by desensitization rule, realizes the reliably protecting of privacy-sensitive data.Mesh
Before, it the use of more data desensitization process method mainly include " replacement of sensitive information data " and " sensitive information encipherment protection " two
Kind mode.
In the present embodiment to sensitive data cleaned i.e. data desensitization can be in the following ways: support mask, encryption,
A variety of desensitization strategies such as Partial encryption.Such as 1 using encryption by the way of, example encrypts " age ", and " 32 years old " becomes
"0x01234567".Such as 2 be to carry out linear transformation to initial data, enables Y=aX+b, the Y data that are that treated, X is original
Data, a and b are two random numbers.Such as 3 be to carry out segment processing to initial data, such as is divided into 20 sections, each section
The average value or median of this section of value substitute.
Wherein, database is added in the data after cleaning to be on the one hand to avoid having cleaned data and unwashed data
Obscured, still further aspect is packaged preservation after database is added in the data of cleaning, avoids loss of data etc. and repeats
Property operation.
Notification list after ultimately generating cleaning is the interface in order to which the data after cleaning to be facilitated to statistics and informing business side,
The notification list can be arbitrary form, and the present embodiment is not defined the form of notification list, for example, can be the shape of table
Formula, the title and the data after cleaning corresponding with the interface of business side in table including the interface of business side.
102, the interface of business side is called to push the data after cleaning in database.
A kind of achievable mode in the embodiment of the present invention is the direct basis after carrying out desensitization cleaning to sensitive data
Content in notification list calls the interface of business side, and the data after cleaning in database are pushed, the master of data is realized
Dynamic push.
Wherein, push mode includes:
Support a variety of push modes:
A, csv file, support are introduced directly into database.
B, encrypt file: code key and file are sent to different user, and confidentiality is high, be not concerned about file is leaked by
Steal data.
C, interface pushes: by configuring the direct propelling data of calling business side interface.
D, write database: data are written in directly access service database.
The distinguishing characteristics of this programme includes at least the desensitization process of data, the push of data, the expired processing of data, data
Rights management and interfaceization show.
The embodiment of the present invention has carried out desensitization encryption to the data of output, and data are safer.Wherein, to the data of output into
Row rights management, carry out data isolation make business side can not across channel acquisition data, data are safer.It is more than one for the time limit
The data periodically limited need to carry out expired processing.More than after validity period, business side will be unable to continue to obtain data data, ensure that
The safety and validity of data.It supports a variety of push modes, more scenes can be adapted to.Interfaceization displaying can pass through interface
Business number formulary is checked according to whether successfully pushing, efficiency of operation is high, at low cost.Interfaceization manage so that operation be more convenient it is more efficient.
In a preferred embodiment of the embodiment of the present invention, in above-mentioned steps 102 in the interface for calling business side
Before data after cleaning in database are pushed, the method also includes:
After carrying out desensitization cleaning to sensitive data, the data after cleaning are generated into encryption file and are sent to connecing for business side
Mouthful.
The data after cleaning are generated into the interface that encryption file is sent to business side in the present embodiment, are avoided in business side
Interface and data not to it is corresponding when the risk that gets compromised of data.
ODS system cleans sensitive data, and data enter database after cleaning, while ODS has notification list informing
Data are cleaned, the data-pushing after calling data receiver's interface to clean, or the data after cleaning are raw
Business side is sent at encryption file.
In a preferred embodiment of the embodiment of the present invention, in order to guarantee the safety of data, the method is also
Include:
Rights management is carried out to the data of output.
Rights management: data can not trans-sectoral business side obtain, data isolation guarantees that data are safer.
For example, business side 1 is the data that can not obtain business side 2, if there are data in business side 1 and business side 2 certainly
Intersect, if any the case where the quoting that intersect, then can intuitively embody same data in the notification list after first step cleaning and be divided
It is fitted on the scene of different business sides, but has the corresponding relationship of business side and business number formulary evidence in notification list, ensure that number
According to safety, certainly previous step to data carry out encryption also achieve the secondary verifying of data application.
In a preferred embodiment of the embodiment of the present invention, in order to guarantee the safety of data, the method is also
Include:
The time limit for obtaining data in the database, the data for being more than certain time limit for the time limit carry out expired processing.
More than after validity period, business side will be unable to continue to obtain data data, ensure that the safety and validity of data.
The time limit of validity period can carry out it is customized, such as 48 hours, 5 days, 7 days, 15 days etc., when propelling data
I.e. carry out timing, be defined according to the predefined time limit, for example, predefined validity period time limit be 48 hours, 48 hours it
Afterwards, which will be automatically left out, and ensure that the timeliness of data.Some data are also avoided simultaneously because of scavenging period mistake
It is long to download or apply without being contracted by the interface of business side, lead to the problem of data inaccuracy.
In a preferred embodiment of the embodiment of the present invention, in order to intuitively show the push of business number formulary evidence into
It spends, the method in the embodiment of the present invention additionally provides showing interface.I.e. the method also includes:
The interface of display data push is provided, the interface includes the push situation and data of the business number formulary evidence
The reception condition of recipient.
Interfaceization is shown: business number formulary can be checked by interface according to whether successfully pushing, efficiency of operation is high, at low cost.
Such as when the prompting such as failed push either term of validity arrival, the data of business side can be pushed again, ensure that
Business side is to availability of data.
The data output method shown based on data that the above embodiment of the present invention provides, takes off the data of output
Quick encryption, data are safer.Wherein, rights management is carried out to the data of output, carries out data isolation and makes business side can not be across
Channel obtains data, and data are safer.The data for being more than certain time limit for the time limit need to carry out expired processing.Data are more than to have
After the effect phase, business side will be unable to continue to obtain data, ensure that the safety and validity of data.Support a variety of push modes,
More scenes can be adapted to.Interfaceization displaying can check business number formulary according to whether successfully pushing by interface, and efficiency of operation is high,
It is at low cost.Interfaceization manage so that operation be more convenient it is more efficient.
Fig. 2 shows a kind of structural representations of the data output device shown based on data provided in an embodiment of the present invention
Figure, as shown in Fig. 2, the device includes:
Data after cleaning are put into database for cleaning to sensitive data by notification list generation module 21, are generated
Notification list after cleaning;
With the development of Operator Specific Service, big data using more and more extensive, the safeguard protection based on big data is also got over
Send out important, therefore the cleaning of sensitive data i.e. desensitization protection also becomes the most important thing of current safety work, and at data desensitization
Reason refers to the deformation that certain sensitive informations are carried out with data by desensitization rule, realizes the reliably protecting of privacy-sensitive data.Mesh
Before, it the use of more data desensitization process method mainly include " replacement of sensitive information data " and " sensitive information encipherment protection " two
Kind mode.
In the present embodiment to sensitive data cleaned i.e. data desensitization can be in the following ways: support mask, encryption,
A variety of desensitization strategies such as Partial encryption.Such as 1 using encryption by the way of, example encrypts " age ", and " 32 years old " becomes
"0x01234567".Such as 2 be to carry out linear transformation to initial data, enables Y=aX+b, the Y data that are that treated, X is original
Data, a and b are two random numbers.Such as 3 be to carry out segment processing to initial data, such as is divided into 20 sections, each section
The average value or median of this section of value substitute.
Wherein, database is added in the data after cleaning to be on the one hand to avoid having cleaned data and unwashed data
Obscured, still further aspect is packaged preservation after database is added in the data of cleaning, avoids loss of data etc. and repeats
Property operation.
Notification list after ultimately generating cleaning is the interface in order to which the data after cleaning to be facilitated to statistics and informing business side,
The notification list can be arbitrary form, and the present embodiment is not defined the form of notification list, for example, can be the shape of table
Formula, the title and the data after cleaning corresponding with the interface of business side in table including the interface of business side.
Data-pushing module 22, for calling the interface of business side to push the data after cleaning in database.
A kind of achievable mode in the embodiment of the present invention is the direct basis after carrying out desensitization cleaning to sensitive data
Content in notification list calls the interface of business side, and the data after cleaning in database are pushed, the master of data is realized
Dynamic push.
Wherein, push mode includes:
Support a variety of push modes:
A, csv file, support are introduced directly into database.
B, encrypt file: code key and file are sent to different user, and confidentiality is high, be not concerned about file is leaked by
Steal data.
C, interface pushes: by configuring the direct propelling data of calling business side interface.
D, write database: data are written in directly access service database.
The distinguishing characteristics of this programme includes at least the desensitization process of data, the push of data, the expired processing of data, data
Rights management and interfaceization show.
The embodiment of the present invention has carried out desensitization encryption to the data of output, and data are safer.Wherein, to the data of output into
Row rights management, carry out data isolation make business side can not across channel acquisition data, data are safer.It is more than one for the time limit
The data periodically limited need to carry out expired processing.More than after validity period, business side will be unable to continue to obtain data data, ensure that
The safety and validity of data.It supports a variety of push modes, more scenes can be adapted to.Interfaceization displaying can pass through interface
Business number formulary is checked according to whether successfully pushing, efficiency of operation is high, at low cost.Interfaceization manage so that operation be more convenient it is more efficient.
In a preferred embodiment of the embodiment of the present invention, calling the interface of business side that will clean in database
Before data afterwards are pushed, described device further include:
Encrypting module, for after carrying out desensitization cleaning to sensitive data, the data after cleaning to be generated encryption file hair
Give the interface of business side.
The data after cleaning are generated into the interface that encryption file is sent to business side in the present embodiment, are avoided in business side
Interface and data not to it is corresponding when the risk that gets compromised of data.
ODS system cleans sensitive data, and data enter database after cleaning, while ODS has notification list informing
Data are cleaned, the data-pushing after calling data receiver's interface to clean, or the data after cleaning are raw
Business side is sent at encryption file.
In a preferred embodiment of the embodiment of the present invention, in order to guarantee the safety of data, described device is also
Include:
Management module, for carrying out rights management to the data of output.
Rights management: data can not trans-sectoral business side obtain, data isolation guarantees that data are safer.
For example, business side 1 is the data that can not obtain business side 2, if there are data in business side 1 and business side 2 certainly
Intersect, if any the case where the quoting that intersect, then can intuitively embody same data in the notification list after first step cleaning and be divided
It is fitted on the scene of different business sides, but has the corresponding relationship of business side and business number formulary evidence in notification list, ensure that number
According to safety, certainly previous step to data carry out encryption also achieve the secondary verifying of data application.
In a preferred embodiment of the embodiment of the present invention, in order to guarantee the safety of data, described device is also
Include:
The time limit for obtaining data in the database, the data for being more than certain time limit for the time limit carry out expired processing.
More than after validity period, business side will be unable to continue to obtain data data, ensure that the safety and validity of data.
The time limit of validity period can carry out it is customized, such as 48 hours, 5 days, 7 days, 15 days etc., when propelling data
I.e. carry out timing, be defined according to the predefined time limit, for example, predefined validity period time limit be 48 hours, 48 hours it
Afterwards, which will be automatically left out, and ensure that the timeliness of data.Some data are also avoided simultaneously because of scavenging period mistake
It is long to download or apply without being contracted by the interface of business side, lead to the problem of data inaccuracy.
In a preferred embodiment of the embodiment of the present invention, in order to intuitively show the push of business number formulary evidence into
It spends, the method in the embodiment of the present invention additionally provides showing interface.That is described device further include:
Showing interface module, for providing the interface of display data push, the interface includes the business number formulary evidence
Push situation and the reception condition of data receiver.
Interfaceization is shown: business number formulary can be checked by interface according to whether successfully pushing, efficiency of operation is high, at low cost.
Such as when the prompting such as failed push either term of validity arrival, the data of business side can be pushed again, ensure that
Business side is to availability of data.
The data output device shown based on data that the above embodiment of the present invention provides, takes off the data of output
Quick encryption, data are safer.Wherein, rights management is carried out to the data of output, carries out data isolation and makes business side can not be across
Channel obtains data, and data are safer.The data for being more than certain time limit for the time limit need to carry out expired processing.Data are more than to have
After the effect phase, business side will be unable to continue to obtain data, ensure that the safety and validity of data.Support a variety of push modes,
More scenes can be adapted to.Interfaceization displaying can check business number formulary according to whether successfully pushing by interface, and efficiency of operation is high,
It is at low cost.Interfaceization manage so that operation be more convenient it is more efficient.
The embodiment of the invention provides a kind of computer readable storage mediums, are stored thereon with computer program, the meter
The step of realization is shown based on data when calculation machine program is executed by processor data output method, device and computer equipment.
The embodiment of the invention also provides a kind of computer equipment, including memory, processor and it is stored in memory
Computer program that is upper and can running on a processor, the processor are realized above-mentioned based on number when executing the computer program
According to displaying data output method, device and computer equipment the step of.
A kind of computer equipment provided in this embodiment can such as execute the smart phone, tablet computer, notebook of program
Computer, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server are (including independent
Server cluster composed by server or multiple servers) etc..The computer equipment 30 of the present embodiment includes at least but not
It is limited to: memory 31, the processor 32 of connection can be in communication with each other by system bus, as shown in Figure 3.It is pointed out that Fig. 3
The computer equipment 30 with component 31-32 is illustrated only, it should be understood that being not required for implementing all groups shown
Part, the implementation that can be substituted is more or less component.
In the present embodiment, memory 31 (i.e. readable storage medium storing program for executing) includes flash memory, hard disk, multimedia card, card-type memory
(for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic
Disk, CD etc..In some embodiments, memory 31 can be the internal storage unit of computer equipment 30, such as the calculating
The hard disk or memory of machine equipment 30.In further embodiments, memory 31 is also possible to the external storage of computer equipment 30
The plug-in type hard disk being equipped in equipment, such as the computer equipment 30, intelligent memory card (Smart Media Card, SMC), peace
Digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 31 can also both include meter
The internal storage unit for calculating machine equipment 30 also includes its External memory equipment.In the present embodiment, memory 31 is commonly used in storage
It is installed on the operating system and types of applications software of computer equipment 30, such as the data-pushing device intermediate range in above-described embodiment
Sequence code etc..In addition, memory 31 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 32 can be in some embodiments central processing unit (Central Processing Unit, CPU),
Controller, microcontroller, microprocessor or other data processing chips.The processor 32 is commonly used in control computer equipment
30 overall operation.In the present embodiment, program code or processing data of the processor 32 for being stored in run memory 31,
To realize data output method, device and the computer equipment shown based on data in above-described embodiment.
The computer equipment of the embodiment of the present invention can exist in a variety of forms, including but not limited to:
(1) mobile communication equipment: the characteristics of this kind of equipment is that have mobile communication function, and to provide speech, data
Communication is main target.This Terminal Type includes: smart phone (such as iPhone), multimedia handset, functional mobile phone and low
Hold mobile phone etc..
(2) super mobile personal computer equipment: this kind of equipment belongs to the scope of personal computer, there is calculating and processing function
Can, generally also have mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind of equipment can show and play multimedia content.Such equipment include: audio,
Video player (such as iPod), handheld device, e-book and intelligent toy and portable car-mounted navigation equipment.
(4) server: providing the equipment of the service of calculating, and the composition of server includes that processor, hard disk, memory, system are total
Line etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, in processing energy
Power, stability, reliability, safety, scalability, manageability etc. are more demanding.
(5) other have the electronic device for reminding transaction record function.
The apparatus embodiments described above are merely exemplary, wherein the unit as illustrated by the separation member
(module) may or may not be physically separated, and component shown as a unit may or may not be
Physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to the actual needs
Some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory
(for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic
Disk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc.
Answer function.The computer readable storage medium of the present embodiment driving means for storing data is realized when being executed by processor
State data output method, device and computer equipment that embodiment is shown based on data.
The embodiment of the invention provides a kind of computer program products, wherein computer program product is non-including being stored in
Computer program in transitory computer readable storage medium, computer program include program instruction, wherein when program instruction quilt
When computer equipment executes, electronic equipment is made to execute the data output side shown based on data in above-mentioned any means embodiment
Method, device and computer equipment.
Each functional module in each embodiment of the present invention can integrate in one processing unit, be also possible to each
Module physically exists alone, and can also be integrated in one unit with two or more modules.Above-mentioned integrated unit both may be used
To use formal implementation of hardware, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
Device (can be personal computer, server or network equipment etc.) or intelligent terminal or processor (Processor)
Execute the part steps of each embodiment method of the present invention.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only storage
Device (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or light
The various media that can store program code such as disk.
In above-described embodiment provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of module, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple module or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.
Module may or may not be physically separated as illustrated by the separation member, show as module
Component may or may not be physical module, it can and it is in one place, or may be distributed over multiple networks
On unit.Some or all of the modules therein can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
Claims (10)
1. a kind of data output method shown based on data characterized by comprising
Sensitive data is cleaned, the data after cleaning are put into database, the notification list after generating cleaning;
The interface of calling business side pushes the data after cleaning in database.
2. the method according to claim 1, wherein after calling the interface of business side that will clean in database
Before data are pushed, the method also includes:
After carrying out desensitization cleaning to sensitive data, the data after cleaning are generated into the interface that encryption file is sent to business side.
3. the method according to claim 1, wherein the method also includes:
Rights management is carried out to the data of output.
4. the method according to claim 1, wherein the method also includes:
The time limit for obtaining data in the database, the data for being more than certain time limit for the time limit carry out expired processing.
5. the method according to claim 1, wherein the method also includes:
The interface of display data push is provided, the interface includes the push situation and data receiver of the business number formulary evidence
The reception condition of side.
6. a kind of data output device shown based on data characterized by comprising
Data after cleaning are put into database, after generating cleaning for cleaning to sensitive data by notification list generation module
Notification list;
Data-pushing module, for calling the interface of business side to push the data after cleaning in database.
7. device according to claim 6, which is characterized in that after calling the interface of business side that will clean in database
Before data are pushed, described device further include:
Encrypting module, for the data after cleaning being generated encryption file and are sent to after carrying out desensitization cleaning to sensitive data
The interface of business side.
8. device according to claim 6, which is characterized in that described device further include:
Management module, for carrying out rights management to the data of output.
9. a kind of computer equipment, which is characterized in that including memory, processor and store on a memory and can handle
The computer program run on device, the processor are realized described in any one of claim 1 to 5 when executing the computer program
The step of method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program
The step of any one of claim 1 to 5 the method is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910190048.6A CN110059081A (en) | 2019-03-13 | 2019-03-13 | Data output method, device and the computer equipment shown based on data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910190048.6A CN110059081A (en) | 2019-03-13 | 2019-03-13 | Data output method, device and the computer equipment shown based on data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110059081A true CN110059081A (en) | 2019-07-26 |
Family
ID=67316798
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910190048.6A Pending CN110059081A (en) | 2019-03-13 | 2019-03-13 | Data output method, device and the computer equipment shown based on data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110059081A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110399749A (en) * | 2019-08-05 | 2019-11-01 | 杭州安恒信息技术股份有限公司 | Data assets management method and system |
CN112420202A (en) * | 2019-08-23 | 2021-02-26 | 阿里巴巴集团控股有限公司 | Data processing method, device and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090132419A1 (en) * | 2007-11-15 | 2009-05-21 | Garland Grammer | Obfuscating sensitive data while preserving data usability |
CN106446704A (en) * | 2015-08-10 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Method and device for data processing |
CN106547805A (en) * | 2015-09-23 | 2017-03-29 | 北京奇虎科技有限公司 | The method and apparatus of optimization database index |
CN108154038A (en) * | 2016-12-06 | 2018-06-12 | 北京京东尚科信息技术有限公司 | Data processing method and device |
CN108289095A (en) * | 2018-01-02 | 2018-07-17 | 诚壹泰合(北京)科技有限公司 | A kind of sensitive data storage method, apparatus and system |
-
2019
- 2019-03-13 CN CN201910190048.6A patent/CN110059081A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090132419A1 (en) * | 2007-11-15 | 2009-05-21 | Garland Grammer | Obfuscating sensitive data while preserving data usability |
CN106446704A (en) * | 2015-08-10 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Method and device for data processing |
CN106547805A (en) * | 2015-09-23 | 2017-03-29 | 北京奇虎科技有限公司 | The method and apparatus of optimization database index |
CN108154038A (en) * | 2016-12-06 | 2018-06-12 | 北京京东尚科信息技术有限公司 | Data processing method and device |
CN108289095A (en) * | 2018-01-02 | 2018-07-17 | 诚壹泰合(北京)科技有限公司 | A kind of sensitive data storage method, apparatus and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110399749A (en) * | 2019-08-05 | 2019-11-01 | 杭州安恒信息技术股份有限公司 | Data assets management method and system |
CN112420202A (en) * | 2019-08-23 | 2021-02-26 | 阿里巴巴集团控股有限公司 | Data processing method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107786344A (en) | Applying digital certificate, the implementation method used and device | |
WO2020056996A1 (en) | Method and apparatus for managing donation information, computer device, and storage medium | |
CN111815454B (en) | Data uplink method and device, electronic equipment and storage medium | |
CN109977684A (en) | A kind of data transmission method, device and terminal device | |
CN112150113A (en) | Method, device and system for borrowing file data and method for borrowing data | |
CN105227380B (en) | The method, apparatus and system of user data processing | |
US11281773B2 (en) | Access card penetration testing | |
CN112150030A (en) | Account management method based on multiple units and multiple identities, terminal equipment and storage medium | |
CN110059081A (en) | Data output method, device and the computer equipment shown based on data | |
US11818116B2 (en) | Network gateway messaging systems and methods | |
CN111813418A (en) | Distributed link tracking method, device, computer equipment and storage medium | |
CN110175316B (en) | Media number interaction method, system and storage medium based on blockchain | |
CN106559386A (en) | A kind of authentication method and device | |
CA3054213A1 (en) | Information management method and device | |
CN113904832A (en) | Data encryption method, device, equipment and storage medium | |
CN116993523A (en) | Configurable account checking method, device, equipment and storage medium | |
CN110019490A (en) | Information query method, device and its equipment based on block chain | |
CN110880965A (en) | Outgoing electronic document encryption method, system, terminal and storage medium | |
CN109271564A (en) | Declaration form querying method and equipment | |
CN110943982B (en) | Document data encryption method and device, electronic equipment and storage medium | |
CN114513469A (en) | Traffic shaping method and device for distributed system and storage medium | |
CN113645025A (en) | Data encryption storage method, storage device, user equipment and storage medium | |
CN107545332A (en) | Prospect's information combined analysis method and server | |
CN112287658A (en) | Business data processing method and device, electronic equipment and medium | |
CN112286881A (en) | Document authentication and tracing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190726 |
|
WD01 | Invention patent application deemed withdrawn after publication |