CN110427760A - A kind of data managing method, device and computer storage medium - Google Patents

A kind of data managing method, device and computer storage medium Download PDF

Info

Publication number
CN110427760A
CN110427760A CN201910578884.1A CN201910578884A CN110427760A CN 110427760 A CN110427760 A CN 110427760A CN 201910578884 A CN201910578884 A CN 201910578884A CN 110427760 A CN110427760 A CN 110427760A
Authority
CN
China
Prior art keywords
data
user
data block
modification
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910578884.1A
Other languages
Chinese (zh)
Other versions
CN110427760B (en
Inventor
蔡恒进
蔡天琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN201910578884.1A priority Critical patent/CN110427760B/en
Publication of CN110427760A publication Critical patent/CN110427760A/en
Application granted granted Critical
Publication of CN110427760B publication Critical patent/CN110427760B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the present application discloses a kind of data managing method, device and computer storage medium, method and comprises determining that the first data block for needing to modify data on data-link;The permission consumption value of modification data is obtained, the permission consumption value indicates cost required for modifying the data in first data block;The current authority credentials of user is obtained according to user account;It determines that the current authority credentials of the user is more than or equal to the permission consumption value, the modification data of first data block is written in the current data block on the data-link.Database is managed by permission consumption value and user current authority credentials, user is avoided optionally to modify the data in database.

Description

A kind of data managing method, device and computer storage medium
Technical field
This application involves technical field of software engineering more particularly to a kind of data managing methods, device and computer storage Medium.
Background technique
Currently, the database that relevant database is made of multiple two-dimensional tables that are mutually related, with two-dimensional array Structure storing data is managed database without suitable management method, and user can according to their own needs optionally The data in database are modified, so that database is disorderly and unsystematic.In the case, database how is effectively managed to become to be badly in need of It solves the problems, such as.
Summary of the invention
In view of this, the embodiment of the present application be solve the problems, such as it is existing in the prior art at least one and a kind of data are provided Management method, device and computer storage medium, effectively manage database.
In order to achieve the above objectives, the technical solution of the embodiment of the present application is achieved in that
In a first aspect, the embodiment of the present application provides a kind of data managing method, which comprises
Determine the first data block for needing to modify data on data-link;
The permission consumption value of modification data is obtained, the permission consumption value indicates to modify the data in first data block Required cost;
The current authority credentials of user is obtained according to user account;
Determine that the current authority credentials of the user is more than or equal to the permission consumption value, by first data block Modification data are written in the current data block on the data-link.
In above-mentioned technical proposal, the permission consumption value for obtaining modification data, comprising:
Obtain the timestamp of first data block;
The weight of modification data is obtained according to the attribute of first data block;
According to the weight at current time, the timestamp of first data block and the modification data, modification number is determined According to permission consumption value.
In above-mentioned technical proposal, the weight that modification data are obtained according to the attribute of first data block, comprising:
Obtain the attribute of first data block;
The attribute of first data block is matched with attribute list, obtains the corresponding modification number of first data block According to weight, the attribute list include data block attribute, with modification data weight corresponding relationship.
It is described that the current authority credentials of user is obtained according to user account in above-mentioned technical proposal, comprising:
Obtain user account;
The user account is matched with user right table, obtains the current authority credentials of user, the user right Table includes the user account, the corresponding relationship with the authority credentials of user.
In above-mentioned technical proposal, the current authority credentials of the determination user is more than or equal to the permission consumption value Later, further includes:
The current authority credentials of the user is updated according to the permission consumption value.
In above-mentioned technical proposal, the current number on the data-link is written in the modification data by first data block After in block, further includes:
Modification label is generated according to first data block, the modification label is used to indicate in the current data block Data are the modification data of first data block;
The block head in the current data block is written into the modification label.
In above-mentioned technical proposal, the method also includes:
Permission reward value is obtained, the permission reward value is for increasing the current authority credentials of the user;
The current authority credentials of the user is updated according to the permission reward value.
Second aspect, the embodiment of the present application provide a kind of data administrator, and described device includes:
First determination unit needs to modify the first data block of data for determining on data-link;
First acquisition unit, for obtaining the permission consumption value of modification data, the permission consumption value is indicated described in modification Cost required for data in first data block;
Second acquisition unit, for obtaining the current authority credentials of user according to user account;
Second determination unit, for determining that the current authority credentials of the user is more than or equal to the permission consumption value, The modification data of first data block are written in the current data block on the data-link.
The third aspect, the embodiment of the present application provide a kind of data administrator, and described device includes network interface, memory And processor;Wherein,
The network interface, the connection communication being arranged for carrying out between component;
The memory is configured to the computer program that storage can be run on the processor;
The processor is configured to when running the computer program, executes first aspect the method.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, and the computer storage medium is stored with Computer program realizes either method described in first aspect when the computer program is executed by least one processor.
A kind of data managing method, device provided by the embodiment of the present application and computer storage medium pass through and determine number According to the first data block for needing to modify data on chain;The permission consumption value of modification data is obtained, the permission consumption value expression is repaired Change cost required for the data in first data block;The current authority credentials of user is obtained according to user account;Determine institute The current authority credentials of user is stated more than or equal to the permission consumption value, institute is written into the modification data of first data block It states in the current data block on data-link.Database is managed by permission consumption value and user current authority credentials, User is avoided optionally to modify the data in database.
Detailed description of the invention
Fig. 1 is a kind of implementation process schematic diagram one of data managing method provided by the embodiments of the present application;
Fig. 2 is a kind of implementation process schematic diagram two of data managing method provided by the embodiments of the present application;
Fig. 3 is a kind of implementation process schematic diagram three of data managing method provided by the embodiments of the present application;
Fig. 4 is a kind of implementation process schematic diagram four of data managing method provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of data administrator 500 provided in an embodiment of the present invention;
Fig. 6 is a kind of specific hardware structure schematic diagram of data administrator 600 provided in an embodiment of the present invention.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the specific technical solution of application is described in further detail.Following embodiment does not have to for illustrating the application To limit scope of the present application.
Data in relevant database can be optionally modified according to their own needs in order to solve any user, it can For one administrator of relational data lab setting, which, which has permission, modifies to data.But this set to close It is the excessively centralization of type database, the efficiency of management is very low.Therefore, the embodiment of the present application provides a kind of data managing method, should Data managing method is applied to data-link, which can solve the problems, such as relevant database centralization, low efficiency.
Database is Data Link Layer, and Data Link Layer includes at least one data-link, and data-link is the data structure of chain type, class Like directed acyclic graph, i.e., nth data block (data block) in data-link includes the informative abstract of (n-1)th data block, and n-th + 1 data block includes the informative abstract of nth data block, wherein informative abstract refers to that data block is reflected by Hash operation compression Information after penetrating, Hash operation refer to the operation of the Information Compression of random length to regular length.Due to once n-th of change The informative abstract of the information of data block, the nth data block after change will also change, then (n+1)th data block includes The informative abstract of nth data block can not just be matched with the informative abstract of the nth data block after change, pass through data-link Informative abstract can effectively prevent distorting for data.Wherein, data block includes block head and block body, when the block head includes Between stab, the timestamp indicates certain moment, and the block body is for being written data.
Different types of data may be on the data-link of respective type, such as financial data is in financial data chain Upper, depot data is on depot data chain, has the user of corresponding authority being capable of the logging data on corresponding data-link.
The embodiment of the present application provides a kind of data managing method, which can be applied to terminal, can be with Applied to server, Fig. 1 is a kind of implementation process schematic diagram one of data managing method provided by the embodiments of the present application, such as Fig. 1 Shown, this method mainly comprises the steps that
Step 101 determines the first data block for needing to modify data on data-link.
It should be noted that an at least data block on data-link, can show data on the display interface of terminal Each data block of chain can be chosen when user needs to modify the data in a certain data block on the input interface of terminal It needs to modify the data block of data, after completing input, that is, forms the first data block for needing to modify data, first data block For the arbitrary data block for needing to modify data on data-link, so that terminal can determine the first data block for needing to modify data.
Step 102, the permission consumption value for obtaining modification data, the permission consumption value indicate to modify first data block In data required for cost.
It should be noted that the permission consumption value of modification data is bigger, then illustrate to modify the data institute in the first data block The cost needed is bigger;The permission consumption value for modifying data is smaller, then illustrates required for modifying the data in the first data block Cost is smaller.
The permission consumption value for obtaining modification data, comprising: obtain the timestamp of first data block;According to described The attribute of first data block obtains the weight of modification data;According to current time, the timestamp of first data block and institute The weight of modification data is stated, determines the permission consumption value of modification data.Wherein, when the block head of the data block on data-link includes Between stab, the timestamp of the available each data block of terminal.Terminal can obtain current time according to timing routine, according to current The difference of the timestamp of the timestamp of moment and the first data block available current time and the first data block, works as difference Bigger, permission consumption value will be bigger, and it is bigger to modify cost required for the data in the first data block;When difference is smaller, permission Consumption value will be smaller, and it is smaller to modify cost required for the data in the first data block.It can be with according to the attribute of the first data block The weight of modification data is obtained, the weight of the modification data is used to characterize the significance level of data that needs are modified, according to working as The permission of the difference of the timestamp of preceding moment and the first data block and the available modification data of the weight for modifying data consumes Value.
It should be noted that obtaining the weight of modification data according to the attribute of first data block, comprising: described in acquisition The attribute of first data block;The attribute of first data block is matched with attribute list, obtains first data block pair The weight for the modification data answered, the attribute list include the attribute of data block, the corresponding relationship with the weight of modification data.Its In, user can preset an attribute list in the terminal, and the attribute of the first data block is matched with the attribute list, is obtained The weight of the corresponding modification data of the first data block is taken, user can number be modified in setting in attribute list in advance according to actual needs According to weight.
Step 103 obtains the current authority credentials of user according to user account.
It should be noted that the current authority credentials of the user is for judging whether user can modify data, Mei Geyong The current authority credentials of the corresponding user of family account may be different.
The current authority credentials of user is obtained according to user account, comprising: obtains user account;By the user account and use Family authority list is matched, and the current authority credentials of user is obtained, and the user right table includes the user account and user The corresponding relationship of authority credentials.Wherein, user inputs user account and user password at the terminal, and by verifying after, terminal can To obtain user account, and user account is matched with user right table, the current authority credentials of user is obtained, so as to subsequent Determine whether user can modify data according to the current authority credentials of user and permission consumption value.
Step 104 determines that the current authority credentials of the user is more than or equal to the permission consumption value, by described first The modification data of data block are written in the current data block on the data-link.
It should be noted that the current authority credentials of user may be unsatisfactory for this time modifying for user, when the current power of user Limit value is more than or equal to permission consumption value, then illustrates that the number of user's modification data is fewer, which has permission modification number According to, it can be by the current data block on the modification data of the first data block write-in data-link, the current data block is data It needs to be written the data block of data on chain, the data block of data is written not in block body;When the current authority credentials of user is small In permission consumption value, then illustrate that the number of user's modification data is relatively more, which does not have permission to modify data.
It should be noted that when determining the current authority credentials of user more than or equal to permission consumption value, it is determined that user It can this time be modified, and deduct permission consumption value to update the current authority credentials of user.
It should be noted that the modification data of first data block are written in the current data block on the data-link Later, modification label can also be generated according to first data block, the modification label is used to indicate the current data block In data be first data block modification data;The block in the current data block is written into the modification label Head.It can illustrate whether the data in data block are modification data, are realized so as to subsequent according to modification label by modifying label Reward mechanism.
It should be noted that avoiding user frequent to guarantee that the accuracy of data is written in user within the data block every time Data are modified, reward mechanism can be set, be arranged within a preset time period according to the data block without write-in modification data Permission reward value, the permission reward value is for increasing the current authority credentials of user, according to permission reward value update The current authority credentials of user.
The embodiment of the present application is managed database by the current authority credentials of permission consumption value and user, avoids User optionally modifies the data in database.
The embodiment of the present application provides a kind of data managing method, which can be applied to terminal, can be with Applied to server, Fig. 2 is a kind of implementation process schematic diagram two of data managing method provided by the embodiments of the present application, such as Fig. 2 Shown, this method mainly comprises the steps that
Step 201 receives user's checking request, and the user's checking request includes user account and user password.
It should be noted that input is used at the terminal when user needs logging data, i.e. data cochain on data-link Family account and user password, then terminal can receive user's checking request, and whether user's checking request can be with for verifying user The logging data on data-link.
Step 202, the data type for obtaining data-link to be logged.
It should be noted that user can choose the data type for needing typing, such as user on the input interface of terminal The data type for needing typing can be chosen by slidably inputing the input frame idler wheel at interface, it can also be by input interface Directly input the data type for needing typing, user completes the data type that input needs typing in input interface, that is, formed to The data type of logging data chain, thus the data type of the available data-link to be logged of terminal, such as data type can be with It is financial data, depot data etc..
It should be noted that step 201,202 having no apparent sequencing.
Step 203 determines whether the corresponding data of data type described in typing according to user account and user password, If it is determined that step 204 can be then transferred to the corresponding data of data type described in typing;If it is determined that cannot be counted described in typing According to the corresponding data of type, then terminate current process.
It should be noted that user can preset a proof list in the database, which includes user's account Number, user password, the corresponding relationship with the data type of logging data chain, user's checking is requested to be compared with proof list, I.e. by user's checking request in user account, user account, user password and logging data in user password and proof list The data type of chain is compared, and obtaining user can determine that obtained user can be with typing with the data type of logging data chain Whether the data type of data-link matches with the data type for the data-link to be logged that user inputs, if it does, then determination can The corresponding data of data type described in typing are had permission with the corresponding data of data type described in typing, the i.e. user;If no Matching, it is determined that the corresponding data of data type, the i.e. user cannot not have data type described in permission typing described in typing Corresponding data.
It should be noted that have corresponding authority user can on data-link typing respective type data, for example, only Have financial staff can on financial data chain typing financial data, only warehouse keeper can on depot data chain typing warehouse Data are passed in and out, warehouse keeper cannot the logging data on financial data chain.
The corresponding data of the data type are written in current data block step 204.
It should be noted that the initial data of user's typing at the terminal can be the shapes such as video, audio, picture, text The data of formula, due to the data in writing data blocks be standardization data, i.e. the data of Unified Form, therefore, it is necessary to by Computer-aided tool carries out data processing to initial data, for example, user's typing initial data at the terminal, such as invoice figure Piece, terminal are converted invoice picture using optical character identification (Optical Character Recognition, OCR) software For text formatting, user audits text format, correct after generate the data of writable data block.
Standardization processing is carried out to the corresponding initial data of data type, the corresponding data of data type are obtained, for example, storehouse Data corresponding initial data in library is the video that warehouse some day passes in and out cargo, is extracted by edge calculations or video analytic technique The text information of warehouse disengaging cargo out, the text information include timing node, the goods information etc. for passing in and out warehouse, and should Current data block is written in the corresponding data of data type, and the current data block is the data for needing to be written data on data-link Block, the data block that data are written not in block body, for example, data-link has sequentially connected N number of data block, then current data Block is the last one data block, i.e. n-th data block, and the n-th data block is the data block for needing to be written data, does not exist The data block of data is written in block body.
It should be noted that data block includes block body, the block body is for being written the corresponding data of data type.It will In block body in the corresponding data write-in current data block of data type.
After the corresponding data write-in current data block of the data type, Hash is carried out to the data in current data block Operation obtains the informative abstract of current data block, and the informative abstract of current data block is written in next data block, completes Logging data, i.e. data cochain on current data block, so that user be avoided arbitrarily to modify the data in data block.
Step 205 current time is written in the timestamp of current data block, and the current time is corresponding for data type Data write-in current data block at the time of.
It should be noted that data block includes block head, the block head includes timestamp, when the timestamp is current It carves.
In the corresponding data write-in current data block of data type, current time is obtained based on timing routine, and will work as In timestamp in preceding moment write-in current data block.
It should be noted that step 204-205 is the process that data are written within the data block.Following steps 206-213 is The process of the data in data block is modified, as shown in Figure 3.Step 204-205 and step 206-213 has no apparent successively suitable Sequence.
Step 206 determines the first data block for needing to modify data.
It should be noted that each data block of data-link can be shown on the display interface of terminal, when user needs When modifying the data in a certain data block, the data block for needing to modify data can be chosen on the input interface of terminal, such as used Family can choose the data block for needing to modify data, user is complete in input interface by slidably inputing the input frame idler wheel at interface It needs to modify the data block of data at input, that is, forms the first data block for needing to modify data, first data block is number According to the arbitrary data block for needing to modify data on chain, so that terminal can determine the first data block for needing to modify data, such as There are 8 data blocks on financial data chain, user inputs at the terminal needs to modify the 5th data block, then the available need of terminal The data block for modifying data is the 5th data block.
Step 207, the timestamp for obtaining the first data block.
It should be noted that after user determines and needs to modify the first data block of data, available first number of terminal According to the timestamp of block, the timestamp is indicated in the first data block at the time of logging data.
Step 208, the weight that modification data are obtained according to the attribute of the first data block.
It should be noted that the attribute of first data block is the type of the first data block, such as financial data block, storehouse Library block etc..
User can preset first attribute list in the terminal, first attribute list include data block attribute, With the corresponding relationship of the weight of modification data, the attribute of the first data block is matched with first attribute list, obtains first The weight of the weight of the corresponding modification data of data block, the modification data is used to characterize the important journey for needing the data modified Degree, the weight of modification data can be arranged in user in the first attribute list in advance according to actual needs, for example, financial data compares storehouse Library data are important, then the weight for modifying the weight ratio modification depot data of financial data is big, such as the financial data block in attribute list The weight of corresponding modification data is 2, and the weight of the corresponding modification data of depot data block is 1, and under normal circumstances, user does not have Permission modifies financial data.
Step 209, according to current time, the first data block timestamp and modify data weight, define the competence and disappear Consumption value, the permission consumption value indicate cost required for the data in the first data block of modification.
It should be noted that terminal can obtain current time according to timing routine.According to current time, the first data block Timestamp and modify data weight, can define the competence consumption value, and the formula of the permission consumption value is as follows:
Gas=R × △ t × Wupdated (1)
Gas in above-mentioned formula (1) indicates permission consumption value, and R indicates adjustable integral coefficient, for adjusting according to actual needs Permission consumption value, value range are (0,2), can be taking human as presetting, and △ t indicates the time at current time and the first data block The difference of stamp, when △ t is bigger, permission consumption value will be bigger, and it is bigger to modify cost required for the data in the first data block;When △ t is smaller, and permission consumption value will be smaller, and cost required for the data in the first data block of modification is smaller, WupdatedExpression is repaired Change the weight of data.
Step 210 obtains the current authority credentials of user according to user account.
It should be noted that the current authority credentials of the user is for judging whether user can modify data, Mei Geyong The current authority credentials of the corresponding user of family account may be different.
After determining whether logging data according to user account and user password, user account and user can be weighed Limit table is matched, and obtains the current authority credentials of user, the user right table includes user account and the authority credentials of user The corresponding authority credentials of user account 1 in corresponding relationship, such as user right table is 10, and the corresponding authority credentials of user account 2 is 5, i.e. the authority credentials of user account 1 is bigger than the authority credentials of user account 2, and user account 1 can be modified more relative to user account 2 More data.
Step 211 determines whether the current authority credentials of user is more than or equal to permission consumption value, if user is current Authority credentials is more than or equal to permission consumption value, then is transferred to step 212;If the current authority credentials of user is consumed less than permission Value, then terminate current process.
It should be noted that the current authority credentials of user may be unsatisfactory for this time modifying for user, when the current power of user Limit value is more than or equal to permission consumption value, then illustrates that the number of user's modification data is fewer, which has permission modification number According to;When the current authority credentials of user be less than permission consumption value, then illustrate user modify data number it is relatively more, which does not have Permission modifies data, and prompt information displayed on the terminals, and the prompt information does not have permission to modify data for characterizing user, For example, the prompt information can be " current entitlement value is insufficient ", database is managed by permission consumption value, avoids using Optionally modify the data in database in family.
Step 212 updates the current authority credentials of user according to permission consumption value.
It should be noted that when determining the current authority credentials of user more than or equal to permission consumption value, it is determined that user It can this time be modified, and deduct permission consumption value to update the current authority credentials of user.
Step 213, will the first data block modification data write-in current data block in.
It should be noted that data-link is the data structure of chain type, the data in the data block on data-link cannot be changed, When needing to modify the data in data block, the data of modification can only be written in current data block.Therefore, when according to permission When consumption value and the current authority credentials determination of user can modify the data in the first data block, need to write the data of modification Enter in current data block, the current data block is to need to be written the data block of data on data-link, do not write in block body Enter the data block of data.
It should be noted that after current data block is written in the data of the modification in the first data block, according to the first data Block generates modification label, and the modification is marked the block head in write-in current data block, and the modification label, which is used to indicate, works as Data in preceding data block are the modification data of the first data block.
It should be noted that step 206-213 is the process for modifying the data in data block.Following steps 214-217 is The process of the current authority credentials of user is updated according to permission reward value, as shown in Figure 4.Step 206-213 and step 214-217 are simultaneously Without apparent sequencing.
Step 214 is determined not to be written within a preset time period and be repaired according to the timestamp and modification label of data block Change the data block of data.
It should be noted that avoiding user frequent to guarantee that the accuracy of data is written in user within the data block every time Data are modified, reward mechanism can be set, be arranged within a preset time period according to the data block without write-in modification data Permission reward value.
The successively data block in ergodic data chain determines that the timestamp of data block belongs to preset period, and data block There is no modifications to mark, then the data block is that the data block of modification data is not written within a preset time period, described preset Period is that user inputs the certain time period for needing to reward on the input interface of terminal.
Step 215 obtains data weighting according to the attribute for the data block that modification data are not written.
It should be noted that user can preset second attribute list in the terminal, which includes The attribute and the second attribute list of the data block of modification data will not be written for the attribute of data block, the corresponding relationship with data weighting It is matched, the corresponding data weighting of data block of modification data is not written, the data weighting is used for characterize data block Can data weighting be arranged in the second attribute list in advance according to actual needs in the significance level of middle data, user.Wherein, first The weight that attribute list can identical with the second attribute list, i.e. modify data can be identical with data weighting, and the first attribute list can also With with the second attribute list it is not identical, i.e. modify data weight and data weighted.
Step 216, according to current time, respectively be not written modification data data block timestamp and data weighting, really Determine permission reward value, the permission reward value is for updating the current authority credentials of user.
It should be noted that terminal can obtain current time according to timing routine.According to current time, is not written respectively and repairs The timestamp and data weighting for changing the data block of data, can define the competence reward value, and the formula of the permission reward value is such as Under:
Bonus in above-mentioned formula (2) indicates permission reward value, and n indicates the number that the data block of modification data is not written, Integral coefficient that R ' expression is adjustable, for adjusting permission reward value according to actual needs, value range is (0,2), can be taking human as preparatory Setting, △ t 'iIndicate that the difference of the timestamp of the data block of modification data, W is not written with i-th in current timeiIt indicates i-th The corresponding data weighting of data block of modification data is not written.
Step 217 updates the current authority credentials of user according to permission reward value.
It should be noted that reward mechanism, root can be set in order to encourage user that accurate data are written within the data block According to current time, the timestamp and data weighting of each data block that modification data are not written, define the competence reward value, will be described The permission reward value authority credentials current with user is added, and updates the current authority credentials of user.
Same inventive concept based on the above embodiment, the embodiment of the present application provide a kind of data administrator, and Fig. 5 is this The structural schematic diagram for a kind of data administrator 500 that inventive embodiments provide, as shown in figure 5, described device 500 includes:
First determination unit 501 needs to modify the first data block of data for determining on data-link;
First acquisition unit 502, for obtaining the permission consumption value of modification data, the permission consumption value indicates modification institute State cost required for the data in the first data block;
Second acquisition unit 503, for obtaining the current authority credentials of user according to user account;
Second determination unit 504, for determining that the current authority credentials of the user is consumed more than or equal to the permission Value, the modification data of first data block are written in the current data block on the data-link.
It should be noted that the first acquisition unit 502 specifically includes first processing units 5021, the second processing unit 5022, third processing unit 5023;Wherein,
The first processing units 5021 are used to obtain the timestamp of first data block;
Described the second processing unit 5022 is used to obtain the weight of modification data according to the attribute of first data block;
The third processing unit 5023 be used for according to current time, first data block timestamp and described repair Change the weight of data, determines the permission consumption value of modification data.
It should be noted that described the second processing unit 5022 is specifically used for obtaining the attribute of first data block;It will The attribute of first data block is matched with attribute list, obtains the weight of the corresponding modification data of first data block, The attribute list includes the attribute of data block, the corresponding relationship with the weight of modification data.
It should be noted that the second acquisition unit 503 is specifically used for obtaining user account;By the user account with User right table is matched, and obtains the current authority credentials of user, the user right table includes the user account and user Authority credentials corresponding relationship.
It should be noted that second determination unit 504 be also used to determine the current authority credentials of the user be greater than or Person is equal to the permission consumption value, updates the current authority credentials of the user according to the permission consumption value.
It should be noted that the data administrator 500 further include:
Writing unit 505, for generating modification label according to first data block, the modification label is used to indicate institute State the modification data that the data in current data block are first data block;The current data is written into modification label Block head in block.
It should be noted that the data administrator 500 further includes
Updating unit 506, for obtaining permission reward value, the permission reward value is for increasing the current power of the user Limit value;The current authority credentials of the user is updated according to the permission reward value.
Each component part in embodiments of the present invention can integrate in one processing unit, be also possible to each unit It physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated unit can both be adopted With formal implementation of hardware, can also be realized in the form of software function module.
If the integrated unit realizes that being not intended as independent product is sold in the form of software function module Or in use, can store in a computer readable storage medium, based on this understanding, the skill of the embodiment of the present invention Substantially all or part of the part that contributes to existing technology or the technical solution can be with soft in other words for art scheme The form of part product embodies, which is stored in a storage medium, including some instructions are to make It obtains a computer equipment (can be personal computer, server or the network equipment etc.) or processor (processor) is held The all or part of the steps of row the method for the embodiment of the present invention.And storage medium above-mentioned include: USB flash disk, it is mobile hard disk, read-only Memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or The various media that can store program code such as person's CD.
Therefore, the embodiment of the invention provides a kind of computer storage medium, which is stored with calculating Machine program, the computer program realize step described in above-described embodiment when being executed by least one processor.
Referring to Fig. 6, a kind of specific hardware structure of data processing equipment 600 provided in an embodiment of the present invention is shown, is wrapped It includes: network interface 601, memory 602 and processor 603;Various components are coupled by bus system 604.It is understood that Bus system 604 is for realizing the connection communication between these components.Bus system 604 is also wrapped in addition to including data/address bus Include power bus, control bus and status signal bus in addition.But for the sake of clear explanation, various buses are all marked in Fig. 6 For bus system 604.Wherein,
The network interface 601, during for being received and sent messages between other ext nal network elements, the reception of signal And transmission;
Memory 602, for storing the computer program that can be run on processor 603;
Processor 603, for executing when running the computer program:
Determine the first data block for needing to modify data on data-link;
The permission consumption value of modification data is obtained, the permission consumption value indicates to modify the data in first data block Required cost;
The current authority credentials of user is obtained according to user account;
Determine that the current authority credentials of the user is more than or equal to the permission consumption value, by first data block Modification data are written in the current data block on the data-link.
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Sync Link DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 602 of method described herein is intended to include but is not limited to these to be suitble to any other The memory of type.
And processor 603 may be a kind of IC chip, the processing capacity with signal.During realization, on Each step for stating method can be completed by the integrated logic circuit of the hardware in processor 603 or the instruction of software form. Above-mentioned processor 603 can be general processor, digital signal processor (Digital Signal Processor, DSP), Specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor are patrolled Collect device, discrete hardware components.It may be implemented or execute disclosed each method, step and the logical box in the embodiment of the present invention Figure.General processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with the present invention The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and execute completion, or use decoding processor In hardware and software module combination execute completion.Software module can be located at random access memory, and flash memory, read-only memory can In the storage medium of this fields such as program read-only memory or electrically erasable programmable memory, register maturation.The storage Medium is located at memory 602, and processor 603 reads the information in memory 602, and the step of the above method is completed in conjunction with its hardware Suddenly.
It should be understood that " one embodiment " or " embodiment " that specification is mentioned in the whole text mean it is related with embodiment A particular feature, structure, or characteristic is included at least one embodiment of the present invention.Therefore, occur everywhere in the whole instruction " in one embodiment " or " in one embodiment " not necessarily refer to identical embodiment.In addition, these specific features, knot Structure or characteristic can combine in any suitable manner in one or more embodiments.It should be understood that in various implementations of the invention In example, magnitude of the sequence numbers of the above procedures are not meant that the order of the execution order, the execution sequence Ying Yiqi function of each process It can determine that the implementation process of the embodiments of the invention shall not be constituted with any limitation with internal logic.The embodiments of the present invention Serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
In several embodiments provided herein, it should be understood that disclosed method and apparatus can pass through it Its mode is realized.Terminal embodiment described above is only schematical, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit Or communication connection, it can be electrical, mechanical or other forms.
In several embodiments provided herein, it should be understood that disclosed method and apparatus can pass through it Its mode is realized.Terminal embodiment described above is only schematical, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine, or It is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition portion Mutual coupling or direct-coupling or communication connection is divided to can be through some interfaces, the INDIRECT COUPLING of equipment or unit Or communication connection, it can be electrical, mechanical or other forms.
Disclosed method in several embodiments of the method provided herein, in the absence of conflict can be any group It closes, obtains new embodiment of the method.
Disclosed feature in several product embodiments provided herein, in the absence of conflict can be any group It closes, obtains new product embodiments.
Disclosed feature in several methods provided herein or apparatus embodiments, in the absence of conflict can be with Any combination obtains new embodiment of the method or apparatus embodiments.

Claims (10)

1. a kind of data managing method, which is characterized in that the described method includes:
Determine the first data block for needing to modify data on data-link;
The permission consumption value of modification data is obtained, the permission consumption value indicates needed for modifying the data in first data block The cost wanted;
The current authority credentials of user is obtained according to user account;
Determine that the current authority credentials of the user is more than or equal to the permission consumption value, by the modification of first data block Data are written in the current data block on the data-link.
2. the method according to claim 1, wherein the permission consumption value for obtaining modification data, comprising:
Obtain the timestamp of first data block;
The weight of modification data is obtained according to the attribute of first data block;
According to the weight at current time, the timestamp of first data block and the modification data, modification data are determined Permission consumption value.
3. according to the method described in claim 2, it is characterized in that, described obtained according to the attribute of first data block is modified The weight of data, comprising:
Obtain the attribute of first data block;
The attribute of first data block is matched with attribute list, obtains the corresponding modification data of first data block Weight, the attribute list include the attribute of data block, the corresponding relationship with the weight of modification data.
4. the method according to claim 1, wherein described obtain the current permission of user according to user account Value, comprising:
Obtain user account;
The user account is matched with user right table, obtains the current authority credentials of user, the user right table packet Include the user account, the corresponding relationship with the authority credentials of user.
5. the method according to claim 1, wherein the current authority credentials of the determination user be greater than or After the permission consumption value, further includes:
The current authority credentials of the user is updated according to the permission consumption value.
6. the method according to claim 1, wherein institute is written in the modification data by first data block After stating in the current data block on data-link, further includes:
Modification label, the data that the modification label is used to indicate in the current data block are generated according to first data block For the modification data of first data block;
The block head in the current data block is written into the modification label.
7. the method according to claim 1, wherein the method also includes:
Permission reward value is obtained, the permission reward value is for increasing the current authority credentials of the user;
The current authority credentials of the user is updated according to the permission reward value.
8. a kind of data administrator, which is characterized in that described device includes:
First determination unit needs to modify the first data block of data for determining on data-link;
First acquisition unit, for obtaining the permission consumption value of modification data, the permission consumption value indicates modification described first Cost required for data in data block;
Second acquisition unit, for obtaining the current authority credentials of user according to user account;
Second determination unit, for determining that the current authority credentials of the user is more than or equal to the permission consumption value, by institute The modification data for stating the first data block are written in the current data block on the data-link.
9. a kind of data administrator, which is characterized in that described device includes network interface, memory and processor;Wherein,
The network interface, the connection communication being arranged for carrying out between component;
The memory is configured to the computer program that storage can be run on the processor;
The processor is configured to when running the computer program, and perform claim requires any one of 1 to 7 the method.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, works as institute It states when computer program is executed by least one processor and realizes such as any one of claims 1 to 7 the method.
CN201910578884.1A 2019-06-28 2019-06-28 Data management method and device and computer storage medium Active CN110427760B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910578884.1A CN110427760B (en) 2019-06-28 2019-06-28 Data management method and device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910578884.1A CN110427760B (en) 2019-06-28 2019-06-28 Data management method and device and computer storage medium

Publications (2)

Publication Number Publication Date
CN110427760A true CN110427760A (en) 2019-11-08
CN110427760B CN110427760B (en) 2021-09-10

Family

ID=68408865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910578884.1A Active CN110427760B (en) 2019-06-28 2019-06-28 Data management method and device and computer storage medium

Country Status (1)

Country Link
CN (1) CN110427760B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070142948A1 (en) * 2005-12-21 2007-06-21 Schmale Michael D Manufacturing analysis using a part-process matrix
CN103412950A (en) * 2013-08-28 2013-11-27 浙江大学 Method for increasing read-write speed of spatial big data files
CN103609050A (en) * 2012-09-07 2014-02-26 华为技术有限公司 Air interface transmission method and relevant device and system
CN108830453A (en) * 2018-05-07 2018-11-16 中国科学院力学研究所 A kind of appraisal procedure and system remotely operating effect
CN109460675A (en) * 2018-10-26 2019-03-12 温州博盈科技有限公司 A kind of enterprise information security management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070142948A1 (en) * 2005-12-21 2007-06-21 Schmale Michael D Manufacturing analysis using a part-process matrix
CN103609050A (en) * 2012-09-07 2014-02-26 华为技术有限公司 Air interface transmission method and relevant device and system
CN103412950A (en) * 2013-08-28 2013-11-27 浙江大学 Method for increasing read-write speed of spatial big data files
CN108830453A (en) * 2018-05-07 2018-11-16 中国科学院力学研究所 A kind of appraisal procedure and system remotely operating effect
CN109460675A (en) * 2018-10-26 2019-03-12 温州博盈科技有限公司 A kind of enterprise information security management method

Also Published As

Publication number Publication date
CN110427760B (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN104866434B (en) Towards data-storage system and data storage, the call method applied more
US7447870B2 (en) Device for identifying data characteristics for flash memory
CN107122682B (en) Data processing method and system based on the storage of block chain
US7844422B2 (en) Method and system for changing a description for a state transition function of a state machine engine
US8171403B2 (en) System and method for managing acronym expansions
CN107423387A (en) The method and apparatus of table is divided in a kind of point storehouse based on middleware
CN109165266A (en) List generation method, device, computer equipment and storage medium
CN107861991B (en) Receipt data processing method and device, computer equipment and storage medium
US20210200760A1 (en) Data versioning in a multi-datacenter topology
CN105373541A (en) Processing method and system for data operation request of database
CN114372006A (en) Method and system for automatically generating test case, computer equipment and storage medium
CN114020790A (en) Data query method and device
CN107391535A (en) The method and device of document is searched in document application
CN110442571A (en) A kind of data processing method, device and computer storage medium
US8954838B2 (en) Presenting data in a tabular format
US20080183766A1 (en) Methods and systems for inductive data transformation
US6915248B1 (en) Method and apparatus for transforming test stimulus
CN111259017B (en) Order retrieval method, computer device, and storage medium
CN109446268A (en) A kind of method of data synchronization and device
CN110427760A (en) A kind of data managing method, device and computer storage medium
DE19957612A1 (en) Memory access management, e.g. for synchronous dynamic random access memories, involves comparing accessed memory location in access request with locations in page index
CN110515970B (en) Service processing method, device, computer equipment and storage medium
US7197445B1 (en) Atomic transaction processing for logic simulation
CN107741951A (en) Page data processing method, device and electronic equipment
TWI783773B (en) Method for establishing variation model related to circuit characteristics for performing circuit simulation, and associated circuit simulation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant