CN112765248A - SQL-based data extraction method and equipment - Google Patents

SQL-based data extraction method and equipment Download PDF

Info

Publication number
CN112765248A
CN112765248A CN202110033160.6A CN202110033160A CN112765248A CN 112765248 A CN112765248 A CN 112765248A CN 202110033160 A CN202110033160 A CN 202110033160A CN 112765248 A CN112765248 A CN 112765248A
Authority
CN
China
Prior art keywords
data
sql
source
temporary table
sql query
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110033160.6A
Other languages
Chinese (zh)
Inventor
马佩
任养超
徐岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202110033160.6A priority Critical patent/CN112765248A/en
Publication of CN112765248A publication Critical patent/CN112765248A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The method comprises the steps of reading SQL query statements to obtain source data in a source database, and storing the source data in a temporary table; desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; and storing the desensitized data into a target data table according to a table mapping relation. The data source is limited through the SQL statement, so that the extraction effect is realized, the data source is flexibly limited, the complex combination of multiple tables is realized, and the configuration process is simplified.

Description

SQL-based data extraction method and equipment
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for extracting data based on SQL.
Background
At present, large data is widely applied, and personal information protection is challenged never before. People enjoy the appropriate services brought to their lives by data analysis, and are also seriously troubled by personal information leakage and even disturbance, so that the data desensitization use is very important. The common extraction or desensitization operation is to operate the whole table of the source database, the selection of the data source is not flexible, and if the field to be extracted and the sorting mode of the data are limited or the contents of a plurality of tables are extracted to one table, special configuration needs to be added, so that the operation is complicated.
Disclosure of Invention
An object of the present application is to provide a method and a device for extracting data based on SQL, which solve the problem in the prior art that the selection of a data source is not flexible enough in the data desensitization and extraction processes.
According to an aspect of the present application, there is provided a method for SQL-based data extraction, the method comprising:
reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table;
desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data;
and storing the desensitized data into a target data table according to a table mapping relation.
Further, before reading the SQL query statement, the method includes:
selecting a source database connection, and compiling a corresponding SQL query statement;
and configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relation between the temporary table and the target data table.
Further, writing a corresponding SQL query statement includes:
determining a data table, a field, data content and a sequencing mode to be extracted according to the selected source database connection;
and writing a corresponding SQL query statement according to the data table, the field, the data content and the sorting mode to be extracted.
Further, configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relationship between the temporary table and the target data table includes:
configuring a desensitization algorithm corresponding to the data according to each field contained in the data in the temporary table;
and selecting a user of the target database and a target data table, and establishing a table mapping relation with the temporary table according to the user and the target data table.
Further, reading the SQL query statement to obtain source data in the source database, and storing the source data in a temporary table, including:
reading a plurality of SQL query statements corresponding to each source database, acquiring a query result of each SQL query statement, and storing each query result in a corresponding temporary table.
According to another aspect of the present application, there is also provided an apparatus for SQL-based data extraction, the apparatus including:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
According to yet another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement the method as described above.
Compared with the prior art, the method and the device have the advantages that the source data in the source database are obtained by reading the SQL query statement, and the source data are stored in the temporary table; desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; and storing the desensitized data into a target data table according to a table mapping relation. The data source is limited through the SQL statement, so that the extraction effect is realized, the data source is flexibly limited, the complex combination of multiple tables is realized, and the configuration process is simplified.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a schematic flow chart of a method for SQL based data extraction according to an aspect of the present application;
FIG. 2 is a schematic flow chart illustrating SQL-based data desensitization and extraction according to an embodiment of the present application;
fig. 3 is a schematic structural diagram illustrating an apparatus for SQL-based data extraction according to another aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change RAM (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic cassette tape, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 is a schematic flow chart illustrating a method for SQL-based data extraction according to an aspect of the present application, where the method includes: step S11-step S13, wherein in step S11, the SQL query statement is read to obtain the source data in the source database, and the source data is stored in the temporary table; in step S12, desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; in step S13, the desensitized data is stored in the target data table according to the table mapping relationship. Therefore, the configuration process of the extraction mode can be greatly simplified in an SQL mode, and the method is more flexible.
Specifically, in step S11, the SQL query statement is read to obtain source data in the source database, and the source data is stored in the temporary table; the SQL is a structured query statement, the SQL query statement is read to obtain a query result, the query result is source data obtained by querying a source database, the read result is stored in a temporary table, the data source is flexibly limited, and accordingly desensitization and extraction are performed on the temporary table subsequently.
Specifically, in step S12, desensitize the data in the temporary table according to a desensitization algorithm of the data, to obtain desensitized data; and reading configuration information of a desensitization algorithm of the data, and desensitizing the source data stored in the temporary table by using the desensitization algorithm to obtain desensitized data.
Specifically, in step S13, the desensitized data is stored in the target data table according to the table mapping relationship. The desensitized data is extracted and then mapped from the temporary table to the target data table according to the table mapping relation, so that the extraction configuration process is simplified and more flexible.
In an embodiment of the present application, before reading the SQL query statement, a source database connection may be selected, and the corresponding SQL query statement is written; and configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relation between the temporary table and the target data table. Selecting a source database, compiling an SQL query statement, firstly selecting which database to acquire data from, selecting according to the connection of the source database, performing operations such as increasing, deleting, checking, modifying and the like on the source database according to the connection of the source database, and selecting connection according to requirements in the subsequent desensitization and extraction processes so as to select a corresponding database. Storing the data read by SQL in a temporary table, desensitizing and extracting the temporary table, configuring desensitization rules and table mapping relations for the temporary table, so as to desensitize the data in the temporary table according to the desensitization rules, finding a target data table according to the table mapping relations for the desensitized data, and storing the data in the target data table.
In an embodiment of the application, when writing a corresponding SQL query statement, determining a data table, a field, data contents and an ordering mode to be extracted according to a selected source database connection; and writing a corresponding SQL query statement according to the data table, the field, the data content and the sorting mode to be extracted. After the database connection is established, a source database which needs to be queried is selected, and information such as a data table, a field, data content and an ordering mode of data in the source database which needs to be extracted is determined according to the selected source database connection, so that SQL statements are written according to the information in a targeted manner, and the data table, the field, the data content and the ordering mode which need to be extracted are limited through the SQL statements.
In an embodiment of the present application, a desensitization algorithm corresponding to data in the temporary table may be configured according to each field included in the data; and selecting a user of the target database and a target data table, and establishing a table mapping relation with the temporary table according to the user and the target data table. Here, the desensitization algorithm used for the temporary table is set, and the corresponding desensitization algorithm may be configured according to information of each field included in the data in the temporary table, for example, the temporary table a includes two fields, name (deposit name) and address (deposit address), and then the desensitization rule may be set to "randomly generate name" and "randomly generate address", for example, for the name field, the desensitization algorithm that "reserve surname, replace first name with" may also be used. Selecting a corresponding desensitization algorithm according to the requirements of a user, for example, desensitizing a name field in a temporary table and then generating a name, replacing original data with the randomly generated name regardless of whether the data stored in a database is information such as age, address and the like, wherein the desensitization algorithm of the name uses the original data as a random factor, and different names are generated by different original data. Similarly, desensitization can be performed on the address field in the temporary table, and the data after desensitization is address data. When configuring the table mapping relationship, each temporary table data is extracted into the target data table of the target database, and during configuration, a user and a data table of the target database need to be selected, for example, data in the temporary table is extracted into a table under an oracle user of the target database.
In an embodiment of the present application, in step S11, a plurality of SQL query statements corresponding to each source database are read, a query result of each SQL query statement is obtained, and each query result is stored in a corresponding temporary table. Here, a database may have a plurality of SQL query statements, for example, data in database a needs to be extracted into database B, and the SQL statements are query statements for database a in order to extract which data in database a is extracted into database B. The query result of each SQL statement forms a temporary table, so that subsequent desensitization and table mapping relation configuration can be performed on the temporary table, and complex combination of multiple tables is realized.
Fig. 2 shows a schematic flow diagram of data desensitization and extraction based on SQL in an embodiment of the present application, where a source database is selected for connection, an SQL query statement is compiled, a desensitization policy and a mapping relationship of a configuration table are configured, extraction is performed, the SQL statement is read to obtain a query result, if the query result is not empty, configuration information of the desensitization policy is read, if the desensitization policy is configured in a temporary table, desensitization is performed on data in the temporary table, mapping relationship information of the table is read, it is determined whether a target data table exists, a target data table is obtained, and the desensitized data is written in the target data table. For example, for two tables, table _ src1(id, name, age), table _ src2(id, name, job) in the source database and data table _ dest (id, name) in the target database, data whose age is greater than 30 in table _ src1 and data whose job is equal to "teacher" in table _ src2 need to be extracted into target data table _ dest at the same time. Writing an SQL statement:
select id,name from table_src1 where age>30
union select id,name from table_src2 where job='teacher'order by name desc;
the result of the SQL query is extracted into the table _ dest table, so that the configuration process is greatly simplified in an SQL mode, the limitation condition of configuring a data source when a traditional extraction mode is used is avoided, and the data source is more flexible.
When desensitization or extraction source data is selected, a data table selection mode is replaced by a written SQL (structured query language) form, SQL sentences can be nested for use, and great flexibility is achieved. By writing SQL, the desired desensitized or extracted data tables, fields, sorting modes, etc. can be defined, and simultaneously, data of multiple tables can be combined and extracted into one table.
In addition, a computer readable medium is provided in the embodiments of the present application, and computer readable instructions are stored thereon, and the computer readable instructions can be executed by a processor to implement the foregoing SQL-based data extraction method.
In correspondence with the method described above, the present application also provides a terminal, which includes modules or units capable of executing the method steps described in fig. 1 or fig. 2 or various embodiments, and these modules or units can be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in an embodiment of the present application, there is further provided an apparatus for SQL-based data extraction, where the apparatus includes:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
For example, the computer readable instructions, when executed, cause the one or more processors to:
reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table;
desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data;
and storing the desensitized data into a target data table according to a table mapping relation.
Fig. 3 is a schematic structural diagram of an apparatus for SQL-based data extraction according to another aspect of the present application, where the apparatus includes: the device comprises a reading device 11, a desensitization device 12 and a storage device 13, wherein the reading device 11 is used for reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table; the desensitization device 12 is used for desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data; the storage device 13 is used for storing the desensitized data into the target data table according to the table mapping relationship.
It should be noted that the content executed by the reading device 11, the desensitizing device 12, and the storing device 13 is the same as or corresponding to the content in the above steps S11, S12, and S13, respectively, and for the sake of brevity, the description thereof is omitted here.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (7)

1. A method of SQL-based data extraction, wherein the method comprises:
reading an SQL query statement to obtain source data in a source database, and storing the source data in a temporary table;
desensitizing the data in the temporary table according to a desensitization algorithm of the data to obtain desensitized data;
and storing the desensitized data into a target data table according to a table mapping relation.
2. The method of claim 1, wherein reading the SQL query statement comprises:
selecting a source database connection, and compiling a corresponding SQL query statement;
and configuring a desensitization algorithm of the data in the temporary table and configuring a table mapping relation between the temporary table and the target data table.
3. The method of claim 2, wherein writing a corresponding SQL query statement comprises:
determining a data table, a field, data content and a sequencing mode to be extracted according to the selected source database connection;
and writing a corresponding SQL query statement according to the data table, the field, the data content and the sorting mode to be extracted.
4. The method of claim 2, wherein configuring a desensitization algorithm of data in the temporary table and configuring a table mapping relationship between the temporary table and a target data table comprises:
configuring a desensitization algorithm corresponding to the data according to each field contained in the data in the temporary table;
and selecting a user of the target database and a target data table, and establishing a table mapping relation with the temporary table according to the user and the target data table.
5. The method of claim 1, wherein reading the SQL query statement to obtain source data in a source database, and storing the source data in a temporary table comprises:
reading a plurality of SQL query statements corresponding to each source database, acquiring a query result of each SQL query statement, and storing each query result in a corresponding temporary table.
6. An apparatus for SQL-based data extraction, wherein the apparatus comprises:
one or more processors; and
memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 5.
7. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 5.
CN202110033160.6A 2021-01-11 2021-01-11 SQL-based data extraction method and equipment Pending CN112765248A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110033160.6A CN112765248A (en) 2021-01-11 2021-01-11 SQL-based data extraction method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110033160.6A CN112765248A (en) 2021-01-11 2021-01-11 SQL-based data extraction method and equipment

Publications (1)

Publication Number Publication Date
CN112765248A true CN112765248A (en) 2021-05-07

Family

ID=75701414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110033160.6A Pending CN112765248A (en) 2021-01-11 2021-01-11 SQL-based data extraction method and equipment

Country Status (1)

Country Link
CN (1) CN112765248A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312382A (en) * 2021-05-31 2021-08-27 上海万物新生环保科技集团有限公司 Method, device and system for database paging query
CN113486101A (en) * 2021-07-01 2021-10-08 公安部第三研究所 Method, device, processor and storage medium for realizing eID data storage, extraction and desensitization processing based on big data technology
CN116796361A (en) * 2023-03-15 2023-09-22 深圳优钱信息技术有限公司 Sensitive data desensitization method based on Guoman hash function

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140164405A1 (en) * 2012-12-12 2014-06-12 Institute For Information Industry Dynamic data masking method and database system
CN108446570A (en) * 2018-02-28 2018-08-24 四川新网银行股份有限公司 A kind of data desensitization method and device
CN110598451A (en) * 2019-09-19 2019-12-20 中国银行股份有限公司 Data desensitization method and device
CN111159754A (en) * 2019-12-12 2020-05-15 浙江华云信息科技有限公司 Data desensitization method and device for reverse analysis
CN111177788A (en) * 2020-01-07 2020-05-19 北京启明星辰信息安全技术有限公司 Hive dynamic desensitization method and dynamic desensitization system
CN111191276A (en) * 2019-12-05 2020-05-22 平安银行股份有限公司 Data desensitization method and device, storage medium and computer equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140164405A1 (en) * 2012-12-12 2014-06-12 Institute For Information Industry Dynamic data masking method and database system
CN108446570A (en) * 2018-02-28 2018-08-24 四川新网银行股份有限公司 A kind of data desensitization method and device
CN110598451A (en) * 2019-09-19 2019-12-20 中国银行股份有限公司 Data desensitization method and device
CN111191276A (en) * 2019-12-05 2020-05-22 平安银行股份有限公司 Data desensitization method and device, storage medium and computer equipment
CN111159754A (en) * 2019-12-12 2020-05-15 浙江华云信息科技有限公司 Data desensitization method and device for reverse analysis
CN111177788A (en) * 2020-01-07 2020-05-19 北京启明星辰信息安全技术有限公司 Hive dynamic desensitization method and dynamic desensitization system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
焦伟等: "测试数据脱敏技术框架的研究与探讨", 《中国金融电脑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312382A (en) * 2021-05-31 2021-08-27 上海万物新生环保科技集团有限公司 Method, device and system for database paging query
CN113486101A (en) * 2021-07-01 2021-10-08 公安部第三研究所 Method, device, processor and storage medium for realizing eID data storage, extraction and desensitization processing based on big data technology
CN116796361A (en) * 2023-03-15 2023-09-22 深圳优钱信息技术有限公司 Sensitive data desensitization method based on Guoman hash function

Similar Documents

Publication Publication Date Title
CN112765248A (en) SQL-based data extraction method and equipment
US20180144061A1 (en) Edge store designs for graph databases
CN110019111B (en) Data processing method, data processing device, storage medium and processor
US11829388B2 (en) System and method for identifying questions of users of a data management system
Behrang et al. Automated test migration for mobile apps
US20220004532A1 (en) Generation of realistic mock data
US20140090049A1 (en) Context-based database security
US8359592B2 (en) Identifying groups and subgroups
CN109033456B (en) Condition query method and device, electronic equipment and storage medium
CN112162982A (en) Data query method, device, equipment and medium
CN106557586B (en) Database access processing method and device
CN107220265A (en) A kind of database statement compiling and execution method and device
US11580251B1 (en) Query-based database redaction
CN105786478A (en) Data processing method and device
CN112948389A (en) MD 5-based database table data comparison method and equipment
US20150006578A1 (en) Dynamic search system
CN112463896B (en) Archive catalogue data processing method, archive catalogue data processing device, computing equipment and storage medium
CN112835903A (en) Sensitive data identification method and equipment
CN114707180A (en) Log desensitization method and device
CN113312373A (en) Method and equipment for analyzing data structured query statement
CN113282631A (en) Method and equipment for determining target user based on user portrait data
CN108228604B (en) Model construction method based on memory object, information query method and device
CN111723104A (en) Method, device and system for syntax analysis in data processing system
CN114595229A (en) Method and equipment for extracting table object
CN111159205A (en) Data processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210507

RJ01 Rejection of invention patent application after publication