CN112035458B - Data isolation method, device and equipment - Google Patents

Data isolation method, device and equipment Download PDF

Info

Publication number
CN112035458B
CN112035458B CN202010903985.4A CN202010903985A CN112035458B CN 112035458 B CN112035458 B CN 112035458B CN 202010903985 A CN202010903985 A CN 202010903985A CN 112035458 B CN112035458 B CN 112035458B
Authority
CN
China
Prior art keywords
isolated
user
database
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010903985.4A
Other languages
Chinese (zh)
Other versions
CN112035458A (en
Inventor
张康洁
蔡震
张阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010903985.4A priority Critical patent/CN112035458B/en
Publication of CN112035458A publication Critical patent/CN112035458A/en
Application granted granted Critical
Publication of CN112035458B publication Critical patent/CN112035458B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the specification provides a data isolation method, a device and equipment, wherein the method comprises the following steps: acquiring a user form information set to be isolated; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user; determining an isolated data set in a first database according to the to-be-isolated user form information set; wherein the isolated data set comprises user information of the users to be isolated; synchronizing data in the isolated dataset from the first database to a second database; data in the isolated dataset is removed from the first database. In the embodiment of the specification, effective classified isolation management can be realized through the first database and the second database aiming at the user information of the user to be isolated.

Description

Data isolation method, device and equipment
Technical Field
Embodiments of the present disclosure relate to the field of data processing technologies, and in particular, to a data isolation method, apparatus, and device.
Background
Some customers of the bank will typically include customers who have been disabled, customers who have had no credentials, such as: pseudonyms, anonymous individual users, for which the non-canonical data is usually marked in batches according to a list of non-canonical data in the prior art, for example, one column in the client list is enabled to identify whether the client is a non-canonical client, if the client is matched with a record in the non-canonical list, the identification column of the client is located at Y or other values, the clients outside the list are considered to be canonical clients, and the corresponding representation column is N or other values. However, the marking type isolation in the prior art is essentially a transaction limitation, and is not data isolation, and the non-standard customer information and the standard customer information are stored in databases of the same system and share the same data table. Therefore, the prior technical scheme cannot realize effective classification isolation management for the client information.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the specification provides a data isolation method, device and equipment, which are used for solving the problem that effective classification isolation management cannot be realized aiming at client information in the prior art.
The embodiment of the specification provides a data isolation method, which comprises the following steps: acquiring a user form information set to be isolated; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user; determining an isolated data set in a first database according to the to-be-isolated user form information set; wherein the isolated data set comprises user information of the users to be isolated; synchronizing data in the isolated dataset from the first database to a second database; data in the isolated dataset is removed from the first database.
The embodiment of the specification also provides a data isolation device, which comprises: the first acquisition module is used for acquiring a to-be-isolated user form information set; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user; the second acquisition module is used for determining an isolated data set in the first database according to the to-be-isolated user form information set; wherein the isolated data set comprises user information of the users to be isolated; a synchronization module for synchronizing data in the isolated dataset from the first database to a second database; and the removing module is used for removing the data in the isolated data set from the first database.
The embodiment of the specification also provides a data isolation device, which comprises a processor and a memory for storing instructions executable by the processor, wherein the processor realizes the steps of the data isolation method when executing the instructions.
The present description also provides a computer-readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the data isolation method.
The embodiment of the specification provides a data isolation method, which can determine information representing a form related to a user to be isolated by acquiring a form information set of the user to be isolated. According to the form information set of the user to be isolated, an isolated data set in the first database can be determined, so that the user information of the user to be isolated can be determined. Furthermore, in order to ensure effective isolation of user information of the user to be isolated, data in the isolated data set can be synchronized from the first database to the second database, and the data in the isolated data set can be removed from the first database, so that effective classified isolation management can be realized through the first database and the second database aiming at the user information of the user to be isolated.
Drawings
The accompanying drawings, which are included to provide a further understanding of embodiments of the present specification, are incorporated in and constitute a part of this specification and do not limit the embodiments of the present specification. In the drawings:
FIG. 1 is a schematic diagram of steps of a data isolation method provided according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a data isolation device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a data isolation device according to an embodiment of the present disclosure.
Detailed Description
The principles and spirit of the embodiments of the present specification will be described below with reference to several exemplary implementations. It should be understood that these embodiments are presented merely to enable one skilled in the art to better understand and implement the present description embodiments and are not intended to limit the scope of the present description embodiments in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Those skilled in the art will appreciate that the implementations of the embodiments of the present description may be implemented as a system, apparatus, method, or computer program product. Accordingly, the present disclosure may be embodied in the following forms, namely: complete hardware, complete software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
While the flow described below includes a number of operations occurring in a particular order, it should be apparent that these processes may include more or fewer operations, which may be performed sequentially or in parallel (e.g., using a parallel processor or a multi-threaded environment).
Referring to fig. 1, the present embodiment may provide a data isolation method. The data isolation method can be used for effectively classifying and managing the user information of the users to be isolated. The data isolation method may include the following steps.
S101: acquiring a user form information set to be isolated; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user.
In this embodiment, the user form information set to be isolated may be acquired before user information of the user to be isolated is isolated. The user to be isolated can be a user whose user information does not accord with a preset rule and needs to conduct data isolation, and the form information set of the user to be isolated can be used for representing information of forms related to the user to be isolated.
In this embodiment, the preset rule may be preset from multiple dimensions such as integrity of user information, accuracy of user information, user activity, financial assets, etc., and the preset rule may be used to characterize whether the user is an irregular user, and if the user is determined to be an irregular user, the irregular user may be used as the user to be isolated, so that the form information set of the user to be isolated may be obtained according to the determined user to be isolated.
In this embodiment, since the isolation for the unnormalized user is actually the isolation for the user information, the user information relates to 3 types of related data tables of the user, the account and the card. Therefore, the forms related to the user to be isolated may include a user isolation list table, an account isolation list table, a card number isolation list table, etc., and it is understood that the forms related to the user to be isolated may also include other forms, which may be specifically determined according to actual situations, and the embodiment of the present disclosure is not limited to this.
In one embodiment, the user isolation list table, the account isolation list table, and the card number isolation list table may have an association relationship, for example, the association may be performed by a user number. Of course, the manner of association among the user isolation list table, the account isolation list table, and the card number isolation list table is not limited to the above examples, and other modifications may be made by those skilled in the art in light of the technical spirit of the embodiments of the present specification, but all the functions and effects achieved are included in the protection scope of the embodiments of the present specification as long as they are the same or similar to the embodiments of the present specification.
In one embodiment, since the data or the types of the data related to the different forms are different, the information related to the different forms related to the user to be isolated is also different, for example, the user isolation list table may include the partition identification (last digit of the account number), the user number, the isolation state, the isolation type and the isolation reason of the account of each user to be isolated; the account isolation list table can comprise account partition identifiers (last account) of the users to be isolated, accounts, user numbers, isolation states, isolation types and isolation reasons; the card number isolation list table may include a PARTITION identifier (the last digit of the card number after the check digit is removed), a card number, a user number, a parameter_id (card number PARTITION identifier), an isolation status, an isolation type, and an isolation reason of each card number of the user to be isolated. Of course, the information of the form related to the user to be isolated is not limited to the above examples, and other modifications are possible by those skilled in the art in light of the technical spirit of the embodiments of the present disclosure, but all the functions and effects implemented by the information are the same or similar to those of the embodiments of the present disclosure, and are included in the protection scope of the embodiments of the present disclosure.
In an embodiment, the to-be-isolated user form information set may be displayed in a form of a table or may be displayed in a form of an image, which may be specifically determined according to practical situations, and the embodiment of the present specification is not limited to this. The presentation of the user form information set to be isolated in the form of a table may be as shown in table 1:
TABLE 1
In one embodiment, the manner of obtaining the user form information set to be isolated may include: and receiving the information set of the user form to be isolated, which is input by the user, or inquiring according to a preset path. It will be understood that, of course, other possible ways may be used to obtain the above-mentioned user form information set to be isolated, for example, searching the web page for the user form information to be isolated according to a certain search condition, which may be specifically determined according to the actual situation, which is not limited in the embodiment of the present disclosure.
In one embodiment, the determination manner of the user to be isolated may include: and classifying the quality of the user information of various users such as individuals, enterprises, financial institutions and the like managed in the core banking system by utilizing the user information system according to preset rules. Further, the user range needing to be included in the isolation management is screened out by integrating various factors such as the quality level and the category of the user information, the user asset condition, the recent transaction condition of the user, the service subscribed by the user and the like.
The level of the user information quality may include: the higher the level the higher the quality of the user information, the lower the level the user may be as the user who needs to be isolated. It will be understood that the classification may be performed in other manners, and may be specifically determined according to actual situations, which is not limited by the embodiment of the present specification. The above information quality categories may be classified in different manners, so as to represent different liveness, financial asset levels, etc., and may be specifically determined according to practical situations, which is not limited in this embodiment of the present disclosure.
In this embodiment, after determining the user scope needing to be included in the isolation management, the core banking system may generate the user form information set to be isolated by using the filtering script based on the user scope needing to be included in the isolation management.
In this embodiment, the user to be isolated may be various users such as individuals, enterprises, financial institutions, etc. managed in a core banking system, which is a part of a bank that processes core user information, deposit products, loan products, payment services, and core general ledgers. The user information system provides a complete user relation view centered on a user on the basis of an advanced data structure, and provides data support of account information of the user and the user at a bank for first-line business personnel through efficient data presentation, wherein the data support comprises financial products purchased by the user and user grade information.
In this embodiment, the preset rule may include: personal user: no transactions and no assets (financial asset balance + credit card line conversion + loan balance) are made within two years, and the credentials expire for 90 days, or the name is not compliant, or the credentials type is not compliant, or the credentials number is not compliant, etc. Of course, the preset rules are not limited to the above examples, and other modifications may be made by those skilled in the art in light of the technical spirit of the embodiments of the present disclosure, and all the functions and effects achieved by the preset rules are included in the protection scope of the embodiments of the present disclosure as long as they are the same as or similar to the embodiments of the present disclosure.
S102: determining an isolated data set in a first database according to the to-be-isolated user form information set; wherein the isolated dataset comprises user information of users to be isolated.
In this embodiment, since the form information set of the user to be isolated includes information of a form related to the user to be isolated, an isolated data set in the first database may be determined according to the form information set of the user to be isolated, where the isolated data set includes user information of the user to be isolated, and data in the isolated data set is data to be isolated.
In this embodiment, the first database may be a database that is used by the system to store user information daily, for example, a database that is used by the core banking system to store user information.
In this embodiment, since the user information of the same user may be stored in different types of data tables according to the related services, the list of the data table related to the user to be isolated in the first database may be mapped according to the user form information set to be isolated, that is, the list of the data table related to the user to be isolated in the first database may be mapped according to the account number, the user number and the card number of the user to be isolated, which are recorded in the user form information set to be isolated. Further, user information data recorded in a list of a data table related to the user to be isolated can be determined from the first database, and the determined data is used as the data to be isolated.
In one example scenario, a list of data tables related to users to be isolated in the first database may be screened out according to table 1, where the list of data tables related to users to be isolated may be as shown in table 2:
TABLE 2
The fields in the table 2 are used as business modules for division, so that business personnel of different teams can analyze and track conveniently, and other functions are avoided. "batch" refers to a batch processing mode adopted by a core banking system to process a large amount of data regularly.
S103: data in the isolated data set is synchronized from the first database to the second database.
In this embodiment, the data recorded in the isolated data set may be synchronized from the first database to the second database. The second database may be a database used as an isolation area, and is different from the first database, and the second database is not a database used for storing data in the core banking system, but is a database used for storing data in the user account information management system.
S104: data in the isolated data set is removed from the first database.
In this embodiment, in order to ensure effective isolation of user information of users to be isolated, after synchronizing data in the isolated data set from the first database to the second database, the data in the isolated data set may be physically deleted from the first database, so as to ensure that data of normal users and data of non-normal users do not exist in the first database at the same time.
In this embodiment, there is no traffic between the first database and the second database, i.e. the first database and the second database are completely traffic-isolated. The user to be isolated becomes an isolated user after the migration of the user information is completed, and after deleting the data in the isolated data set stored in the first database, the isolation condition of each user can be identified by assigning a value to the isolation state.
From the above description, it can be seen that the following technical effects are achieved in the embodiments of the present specification: by acquiring the form information set of the user to be isolated, information characterizing the form related to the user to be isolated can be determined. According to the form information set of the user to be isolated, an isolated data set in the first database can be determined, so that the user information of the user to be isolated can be determined. Furthermore, in order to ensure effective isolation of user information of the user to be isolated, data in the isolated data set can be synchronized from the first database to the second database, and the data in the isolated data set can be removed from the first database, so that effective classified isolation management can be realized through the first database and the second database aiming at the user information of the user to be isolated.
In one embodiment, after deleting the data in the isolated data set stored in the first database, the service authority of the user to be isolated may be further reduced from the first service authority range to the second service authority range. Wherein, the second service authority range is smaller than the first service authority range. For example: the first service authority range contains all service authorities, the second service authority range can only contain the service authorities which are processed with the fund safety and the sales of the user, and the second service authority range can comprise automatic processing such as information, information accumulation, automatic thawing and the like, and special counter transactions of freezing, thawing and sales of the user. Of course, the second service authority range and the first service authority range are not limited to the above examples, and other modifications may be made by those skilled in the art in light of the technical spirit of the embodiments of the present disclosure, but all the functions and effects achieved by the embodiments are included in the protection scope of the embodiments of the present disclosure as long as they are the same as or similar to the embodiments of the present disclosure.
In this embodiment, in order to facilitate the first database to accurately respond to the service request of the user and recover the user to be isolated, before deleting the data in the isolated data set stored in the first database, the form information set of the user to be isolated may also be stored in the first database.
In this embodiment, when the first database receives a service request of a user, whether the user is an isolated user or not may be determined according to a to-be-isolated user form information set, and if the user is a standard user, the first database may normally respond to the service request; if the user is the isolated user, judging whether the service request is in the second service authority range, if yes, normally responding to the service request and sending the isolated prompt information, and if not, feeding back the isolated prompt information to the user. The isolating prompt information may include: user account, user card number, quarantine status, quarantine type, quarantine reason, etc.
In one embodiment, in order to ensure that the user which is isolated and performs user information complement can timely restore service authority, after deleting data in the isolated data set stored in the first database, a batch polling mode can be adopted to determine whether a user to be restored which meets restoration conditions exists in the users of the form information set of the user to be isolated, and if the user to be restored exists, user information of the user to be restored is synchronized from the second database to the first database. Further, the user information of the user to be restored can be removed from the second database, and the service authority of the user to be restored can be restored from the second service authority range to the first service authority range.
In this embodiment, the recovery condition may be that the user satisfies the preset rule, and the user who satisfies the preset rule does not need to isolate the user, so that the user information of the user to be recovered may be recovered. The polling is a way for a CPU (central processing unit) to decide how to provide services to peripheral devices, and is also called as "program control input/output". The concept of the polling method is that a CPU issues a query at regular time, sequentially queries whether each peripheral device needs its service, gives the service immediately, and then asks the next periphery after the service is finished, and then the polling is repeated continuously, and the batch polling is that the queries are issued concurrently at a certain time interval.
In one example scenario, after the isolated user can complete information re-recording through various channels (such as non-counter channels like an online bank, etc.), the form information set of the user to be isolated can be queried in the core bank system through the interface bus, if the isolated user is checked to meet the recovery condition, the user information of the user to be recovered is automatically migrated from the second database of the non-standard user account information management system to the first database of the core bank system in batches by the system polling, and the non-passing check needs to initiate a migration transaction through a teller. After the migration is completed, a recovery identifier is set for each user to be recovered in the non-standard user account information management system, the migrated data in the second database are deleted in batches every day, and the deletion of the migrated data is completed before the data downloading in the same day. The core bank system downloads the change information of the isolation state of the user to be recovered to the credit card system through the downloading platform data bus every day, and the change of the isolation state of the user in the credit card system is completed according to the information synchronization mechanism of the core bank system and the credit card system, so that the synchronization of the core bank system and other peripheral systems (such as the credit card system) is maintained, and the isolation limit is completely relieved.
In one embodiment, to ensure that users who have been isolated and subjected to user information re-recording can timely restore service rights, after deleting data in the isolated data set stored in the first database, the processing object of the target channel may initiate a user information re-entry request if it is determined that the target isolated user completes user information re-recording, and user information of the target isolated user may be synchronized from the second database into the first database in response to the user information re-entry request. Therefore, the user information of the target isolated user can be removed from the second database, and the service authority of the target isolated user is restored from the second service authority range to the first service authority range.
In this embodiment, the target channel may be a counter channel, and the processing target of the target channel may be a processing person corresponding to each counter. Under the condition that the user carries out information complement through the counter channel, the processing personnel of the counter can directly carry out recovery operation, and if the user carries out information complement through other channels, the recovery operation is carried out in a batch polling mode.
In one scenario example, after a user completes information re-recording through a counter channel, a teller initiates a user information re-entry request, and in response to the user information re-entry request of the target isolated user, the user information of the target isolated user is re-entered from a second database of the non-standard user account information management system into a first database of the core banking system, which is equivalent to non-batch mode re-entry. After the user information of the target isolated user is returned, a recovery mark is set for each target isolated user in the non-standard user account information management system, the returned data in the second database is deleted in batches every day, and the deletion of the returned data is completed before the data is downloaded on the same day. The core bank system downloads the change information of the isolation state of the user to be recovered to the credit card system through the downloading platform data bus every day, and the change of the isolation state of the user in the credit card system is completed according to the information synchronization mechanism of the core bank system and the credit card system, so that the synchronization of the core bank system and other peripheral systems (such as the credit card system) is maintained, and the isolation limit is completely relieved.
In this embodiment, the isolated user of the information of the user can be restored to the normal user in real time by aiming at the isolated user counter channel and the peripheral interface bus.
In one embodiment, the user form information set to be isolated may include: user number, account, card number, quarantine status, quarantine reason, quarantine type. Each user can be distinguished by assigning a value to the isolation state, an isolation state value of 0 indicating that the user is isolated, and an isolation state value of 1 indicating that the user has been restored can be used as a restoration identifier. The normal standard user information may not include isolation status information or the isolation status value is null (null). The above isolation state may also include other values such as: 00 (to be isolated), 01 (to be restored), etc. Of course, the setting of the isolation state is not limited to the above examples, and other modifications are possible by those skilled in the art in light of the technical spirit of the embodiments of the present disclosure, but all the functions and effects achieved are the same or similar to those of the embodiments of the present disclosure, and are included in the protection scope of the embodiments of the present disclosure.
In this embodiment, when data in the isolated data set is migrated from the first database to the second database, the isolation status of each user in the to-be-isolated user form information set may be assigned to 0, so as to represent that the user information of the to-be-isolated user is isolated. And after confirming that the isolated user completes information complement, modifying the isolation state of each user in the to-be-isolated user form information set to be 1. The reason for the isolation and the type of the isolation may be determined according to the quality level and the category of the user information in the user information system, and the reason for the isolation may include: imperfect user information, deactivated users, low user activity, inaccurate user information and the like; the above isolation types may include: transaction isolation, card isolation, etc., may be specifically determined according to practical situations, which is not limited in this application.
In one embodiment, to ensure that the user can perform information repair in time, after deleting the data in the isolated data set stored in the first database, the isolated prompt information may be sent to each isolated user in the to-be-isolated user form information set to prompt the user to perform information repair. The isolating prompt information may include: user account, user card number, quarantine status, quarantine type, quarantine reason, etc. When data in the isolated data set is migrated from the first database to the second database, the original processing of the core banking system relates to the execution of the business of the isolated user data in a compatible and uninterrupted manner, so that the multiplexing degree is high, the isolated user support business function multiplexes the business functions corresponding to the core banking system, and financial transactions and accounting processes supported in the non-standard user account information management system are consistent with those of the core banking system.
In the embodiment, the non-standard user account in the core bank system can be effectively isolated, the second database in the non-standard user account information management system is matched for collaborative management, the non-standard user is displayed with service authority so as to meet the supervision requirement, the influence on the host resource is small, and the storage space required to be increased by the physical isolation data is within the controllable range.
Based on the same inventive concept, a data isolation device is also provided in the embodiments of the present specification, such as the following embodiments. Because the principle of the data isolation device for solving the problem is similar to that of the data isolation method, the implementation of the data isolation device can be referred to the implementation of the data isolation method, and the repetition is omitted. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements the intended function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated. FIG. 2 is a block diagram of a data isolation device according to an embodiment of the present disclosure, as shown in FIG. 2, may include: the first acquisition module 201, the second acquisition module 202, the synchronization module 203, and the removal module 204 are described below.
A first obtaining module 201, configured to obtain a to-be-isolated user form information set; wherein the to-be-isolated user form information set is used for representing information of forms related to-be-isolated users
A second obtaining module 202, configured to determine an isolated data set in the first database according to the to-be-isolated user form information set; the isolated data set comprises user information of users to be isolated;
a synchronization module 203 operable to synchronize data in the isolated dataset from the first database to the second database;
the removal module 204 may be used to remove data in the isolated data set from the first database.
The embodiment of the present disclosure further provides an electronic device, which may specifically refer to a schematic structural diagram of an electronic device based on the data isolation method provided in the embodiment of the present disclosure shown in fig. 3, where the electronic device may specifically include an input device 31, a processor 32, and a memory 33. Wherein the input device 31 may be used for inputting in particular a set of user form information to be isolated. The processor 32 may be specifically configured to obtain a user form information set to be isolated; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user; determining an isolated data set in a first database according to the to-be-isolated user form information set; the isolated data set comprises user information of users to be isolated; synchronizing data in the isolated data set from the first database to the second database; data in the isolated data set is removed from the first database. The memory 33 may be used to store parameters such as the user form information set to be isolated, the isolated data set, etc.
In this embodiment, the input device may specifically be one of the main means for exchanging information between the user and the computer system. The input device may include a keyboard, mouse, camera, scanner, light pen, handwriting input board, voice input apparatus, etc.; the input device is used to input raw data and a program for processing these numbers into the computer. The input device may also obtain data transmitted from other modules, units, and devices. The processor may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor, and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a programmable logic controller, and an embedded microcontroller, among others. The memory may in particular be a memory device for storing information in modern information technology. The memory may comprise a plurality of levels, and in a digital system, may be memory as long as binary data can be stored; in an integrated circuit, a circuit with a memory function without a physical form is also called a memory, such as a RAM, a FIFO, etc.; in the system, the storage device in physical form is also called a memory, such as a memory bank, a TF card, and the like.
In this embodiment, the specific functions and effects of the electronic device may be explained in comparison with other embodiments, which are not described herein.
The embodiment of the present specification further provides a computer storage medium based on a data isolation method, where the computer storage medium stores computer program instructions, where the computer program instructions when executed may implement: acquiring a user form information set to be isolated; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user; determining an isolated data set in a first database according to the to-be-isolated user form information set; the isolated data set comprises user information of users to be isolated; synchronizing data in the isolated data set from the first database to the second database; data in the isolated data set is removed from the first database.
In the present embodiment, the storage medium includes, but is not limited to, a random access Memory (Random Access Memory, RAM), a Read-Only Memory (ROM), a Cache (Cache), a Hard Disk (HDD), or a Memory Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set in accordance with a standard prescribed by a communication protocol.
In this embodiment, the functions and effects of the program instructions stored in the computer storage medium may be explained in comparison with other embodiments, and are not described herein.
It will be apparent to those skilled in the art that the modules or steps of the embodiments described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may alternatively be implemented in program code executable by computing devices, so that they may be stored in a storage device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than herein, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, embodiments of the present specification are not limited to any specific combination of hardware and software.
Although the present description provides method operational steps as described in the above embodiments or flowcharts, more or fewer operational steps may be included in the method based on routine or non-inventive labor. In steps where there is logically no necessary causal relationship, the execution order of the steps is not limited to the execution order provided in the embodiments of the present specification. When implemented in an actual device or end product, the methods of (a) may be performed sequentially or in parallel (e.g., in a parallel processor or a multithreaded environment) as shown in the embodiments or figures.
It is to be understood that the above description is intended to be illustrative, and not restrictive. Many embodiments and many applications other than the examples provided will be apparent to those of skill in the art upon reading the above description. The scope of the embodiments of the specification should, therefore, be determined not with reference to the above description, but instead with reference to the appended claims, along with the full scope of such claims
All equivalents are intended to be encompassed.
The above description is only of the preferred embodiments of the present embodiments and is not intended to limit the present embodiments, and various modifications and variations can be made to the present embodiments by those skilled in the art. Any modification, equivalent replacement, improvement, or the like made within the spirit and principles of the embodiments of the present specification should be included in the protection scope of the embodiments of the present specification.

Claims (9)

1. A method of data isolation, comprising:
acquiring a user form information set to be isolated; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user;
determining an isolated data set in a first database according to the to-be-isolated user form information set; wherein the isolated data set comprises user information of the users to be isolated;
synchronizing data in the isolated dataset from the first database to a second database;
removing data in the isolated dataset from the first database;
reducing the service authority of the user to be isolated from a first service authority range to a second service authority range; the second service authority range is smaller than the first service authority range.
2. The method of claim 1, further comprising, prior to deleting data in the isolated dataset stored in the first database:
and storing the to-be-isolated user form information set into the first database.
3. The method of claim 2, further comprising, after deleting the data in the isolated dataset stored in the first database:
determining whether the users of the to-be-isolated user form information set have to-be-recovered users meeting recovery conditions or not in a batch polling mode;
synchronizing user information of the user to be restored from the second database to the first database under the condition that the user to be restored exists;
removing the user information of the user to be restored from the second database;
and recovering the service authority of the user to be recovered from the second service authority range to the first service authority range.
4. The method of claim 2, further comprising, after deleting the data in the isolated dataset stored in the first database:
under the condition that the processing object of the target channel determines that the target isolated user completes the user information supplementary record, initiating a user information migration request;
synchronizing user information of the target isolated user from the second database into the first database in response to the user information relocation request;
removing user information of the target isolated user from the second database;
and recovering the service authority of the target isolated user from the second service authority range to the first service authority range.
5. The method of claim 1, wherein synchronizing data in the isolated dataset from the first database to a second database comprises:
assigning an isolation state in user information of each user to be isolated in the isolated data set when data in the isolated data set is migrated from the first database to the second database; the assigned isolation state represents that user information of the user to be isolated is isolated.
6. The method of claim 1, further comprising, after deleting the data in the isolated dataset stored in the first database:
sending isolation prompt information to each isolated user in the to-be-isolated user form information set; wherein, the isolation prompt message comprises: user account, user card number, quarantine status, quarantine type, and quarantine reason.
7. A data isolation device, comprising:
the first acquisition module is used for acquiring a to-be-isolated user form information set; the to-be-isolated user form information set is used for representing information of forms related to the to-be-isolated user;
the second acquisition module is used for determining an isolated data set in the first database according to the to-be-isolated user form information set; wherein the isolated data set comprises user information of the users to be isolated;
a synchronization module for synchronizing data in the isolated dataset from the first database to a second database;
a removal module for removing data in the isolated dataset from the first database;
the service authority range reduction module is used for reducing the service authority of the user to be isolated from the first service authority range to the second service authority range; the second service authority range is smaller than the first service authority range.
8. A data isolation device comprising a processor and a memory for storing processor-executable instructions which when executed by the processor implement the steps of the method of any one of claims 1 to 6.
9. A computer readable storage medium having stored thereon computer instructions which when executed implement the steps of the method of any of claims 1 to 6.
CN202010903985.4A 2020-09-01 2020-09-01 Data isolation method, device and equipment Active CN112035458B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010903985.4A CN112035458B (en) 2020-09-01 2020-09-01 Data isolation method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010903985.4A CN112035458B (en) 2020-09-01 2020-09-01 Data isolation method, device and equipment

Publications (2)

Publication Number Publication Date
CN112035458A CN112035458A (en) 2020-12-04
CN112035458B true CN112035458B (en) 2024-02-23

Family

ID=73590800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010903985.4A Active CN112035458B (en) 2020-09-01 2020-09-01 Data isolation method, device and equipment

Country Status (1)

Country Link
CN (1) CN112035458B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015039564A1 (en) * 2013-09-18 2015-03-26 Tencent Technology (Shenzhen) Company Limited Method and apparatus for data migration
CN108449327A (en) * 2018-02-27 2018-08-24 平安科技(深圳)有限公司 A kind of account method for cleaning, device, terminal device and storage medium
CN109656965A (en) * 2018-10-30 2019-04-19 平安科技(深圳)有限公司 A kind of account method for cleaning and device
CN110750584A (en) * 2019-09-18 2020-02-04 苏宁云计算有限公司 Data management method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015039564A1 (en) * 2013-09-18 2015-03-26 Tencent Technology (Shenzhen) Company Limited Method and apparatus for data migration
CN108449327A (en) * 2018-02-27 2018-08-24 平安科技(深圳)有限公司 A kind of account method for cleaning, device, terminal device and storage medium
CN109656965A (en) * 2018-10-30 2019-04-19 平安科技(深圳)有限公司 A kind of account method for cleaning and device
CN110750584A (en) * 2019-09-18 2020-02-04 苏宁云计算有限公司 Data management method and system

Also Published As

Publication number Publication date
CN112035458A (en) 2020-12-04

Similar Documents

Publication Publication Date Title
CN103634144B (en) The configuration file management method of many IDC clusters, system and equipment
WO2019097322A1 (en) Optimization of high volume transaction performance on a blockchain
CN108647357B (en) Data query method and device
CN110188103A (en) Data account checking method, device, equipment and storage medium
WO2022048357A1 (en) Transaction endorsement method and apparatus, and storage medium
EP3905172A1 (en) Blockchain-based invoice voiding method and apparatus, and electronic device
WO2017105882A1 (en) Dynamic data normalitzation and duplicate analysis
US11373006B2 (en) Processing system using natural language processing for performing dataset filtering and sanitization
US11816163B2 (en) Systems and methods for improved transactional mainframes
CN112035458B (en) Data isolation method, device and equipment
US20180295145A1 (en) Multicomputer Digital Data Processing to Provide Information Security Control
WO2023093079A1 (en) Consistency check method and apparatus for distributed edge cloud edge nodes
CN113112344B (en) Service processing method, device, storage medium and computer program product
US10291700B2 (en) Network optimized scan with dynamic fallback recovery
EP3503011A1 (en) Data analytics engine
CN111797590A (en) Data checking method, device and equipment
CN117195256B (en) Financial data processing method and system
CN112035486B (en) Partition establishing method, device and equipment of partition table
CN114896430A (en) Image data management method and device
CN117493466B (en) Financial data synchronization method and system
RU2775167C2 (en) System of centralized directory of reference client data and method for combining client data from accounting systems
EP3786825B1 (en) Natural language processing systems and methods for automatic reduction of false positives in domain discovery
US20190115095A1 (en) Methods for more accurately managing processing of medical bill data and devices thereof
CN116521674A (en) Data processing method, device, equipment and storage medium
CN114372111A (en) Service data uploading method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant