CN113190408A - Data operation and maintenance system - Google Patents

Data operation and maintenance system Download PDF

Info

Publication number
CN113190408A
CN113190408A CN202110496293.7A CN202110496293A CN113190408A CN 113190408 A CN113190408 A CN 113190408A CN 202110496293 A CN202110496293 A CN 202110496293A CN 113190408 A CN113190408 A CN 113190408A
Authority
CN
China
Prior art keywords
data
maintenance
data operation
unit
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110496293.7A
Other languages
Chinese (zh)
Other versions
CN113190408B (en
Inventor
王雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Financial Assets Exchange Co ltd
Original Assignee
Beijing Financial Assets Exchange Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Financial Assets Exchange Co ltd filed Critical Beijing Financial Assets Exchange Co ltd
Priority to CN202110496293.7A priority Critical patent/CN113190408B/en
Publication of CN113190408A publication Critical patent/CN113190408A/en
Application granted granted Critical
Publication of CN113190408B publication Critical patent/CN113190408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses data operation and maintenance system includes: the management module is used for managing users, templates and system settings; the task module is used for managing data operation and maintenance tasks; the statistical module is used for checking the data operation and maintenance tasks; the data module is used for analyzing and/or desensitizing the data to be operated and maintained; and the monitoring module is used for recording the operation and maintenance operation of the data. The data operation and maintenance system can standardize the data operation and maintenance flow, reduce errors of the service system and improve the operation and maintenance efficiency.

Description

Data operation and maintenance system
Technical Field
The application relates to the field of data operation and maintenance, in particular to a data operation and maintenance system applied to a business system.
Background
Specific business systems (such as an account receivable and debt financing planning system and a centralized book filing system) are built according to established business requirements and business rules, and after online, due to artificial entry operation errors, extreme scenes or boundary conditions, the preset targets of the business systems cannot be achieved, so that data operation and maintenance are needed to correct errors, such as modifying mistakenly entered data, replacing uploaded files and the like.
The existing data operation and maintenance usually directly connects to a database (e.g., SQL database) to modify data, a database scripting language (e.g., SQL script reason) needs to be written to complete the data operation and maintenance work, which has a high requirement on the quality of operation and maintenance personnel, and the operation and maintenance personnel must know the association relationship between data items in a business system, and in most cases, the operation and maintenance personnel also need to cooperate with developers of the business system to complete the data modification. This mode has a number of drawbacks: firstly, the efficiency is low, the error is easy to occur, and no log file can be traced and rolled back. Secondly, data leakage is easily caused.
Moreover, there are some sensitive data in the entered data, and if the sensitive data are not desensitized, a certain loss can be caused once the sensitive data are leaked.
Therefore, an adaptive data operation and maintenance system is needed to perform data operation and maintenance in a normalized and standardized manner, so as to reduce errors and ensure the stability of the service system.
Disclosure of Invention
The present application is proposed to solve the above-mentioned technical problems. The embodiment of the application provides a data operation and maintenance system applied to a business system, which can standardize a data operation and maintenance flow, reduce errors and improve operation and maintenance efficiency.
According to an aspect of the present application, there is provided a data operation and maintenance system applied to a business system, including: the management module is used for managing users, templates and system settings; the task module is used for managing data operation and maintenance tasks; the statistical module is used for checking the data operation and maintenance tasks; the data module is used for analyzing and/or desensitizing the data to be operated and maintained; and the monitoring module is used for recording the operation and maintenance operation of the data.
In the data operation and maintenance system according to the application, the management module includes: the user management unit is used for newly adding, modifying and checking users; the template management unit is used for adding, modifying, deleting and viewing templates; the system management unit is used for adding, modifying and viewing system settings; the authority management unit is used for managing the operation authorities of different users; and the process management unit is used for examining and approving the data operation and maintenance process.
In the data operation and maintenance system according to the application, the task module includes: the task creating unit is used for creating a data operation and maintenance task; the rechecking task unit is used for auditing the tasks; the task list unit is used for displaying the data operation and maintenance task; the task rollback unit is used for rolling back the data operation and maintenance task; and the task query unit is used for querying the data operation and maintenance task.
In the data operation and maintenance system according to the application, the statistical module includes: the system statistical unit is used for inquiring the data operation and maintenance task based on system setting; the template counting unit is used for inquiring the data operation and maintenance task based on the template; and the user counting unit is used for inquiring the data operation and maintenance task based on the user.
In the data operation and maintenance system according to the application, the data module includes: the data desensitization unit is used for desensitizing sensitive data in the data to be operated and maintained; and the data analysis unit is used for analyzing the data to be operated and maintained.
In the data operation and maintenance system according to the application, the data desensitization unit is further configured to encrypt sensitive data in the data to be operated and maintained by using an encryption algorithm to perform desensitization.
In the data operation and maintenance system according to the present application, the data module further includes: and the data searching unit is used for searching the template and the data operation and maintenance task and extracting a searching result.
In the data operation and maintenance system according to the application, the encryption algorithm comprises bidirectional encryption and unidirectional encryption.
In the data operation and maintenance system according to the application, the data analysis unit is further configured to perform blood-related analysis and influence relationship analysis on the data to be operated and maintained.
In the data operation and maintenance system according to the application, the monitoring module includes: the log unit is used for recording data operation and maintenance operation; the log query unit is used for querying logs; and the report generating unit is used for generating a data operation and maintenance flow audit report.
According to the data operation and maintenance system provided by the application, the data operation and maintenance flow can be standardized, errors are reduced, and the operation and maintenance efficiency is improved.
Drawings
The above and other objects, features and advantages of the present application will become more apparent by describing in more detail embodiments of the present application with reference to the attached drawings. The accompanying drawings are included to provide a further understanding of the embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application. In the drawings, like reference numbers generally represent like parts or steps.
Fig. 1 is a block diagram illustrating a data operation and maintenance system according to an embodiment of the present application.
Fig. 2 is a schematic block diagram illustrating a management module in the data operation and maintenance system according to an embodiment of the present application.
Fig. 3 is a schematic block diagram illustrating a task module in the data operation and maintenance system according to an embodiment of the present application.
FIG. 4 is a schematic block diagram illustrating a statistical module in the data operation and maintenance system according to an embodiment of the present application.
Fig. 5 is a schematic block diagram illustrating a data module in the data operation and maintenance system according to an embodiment of the application.
Fig. 6 is a schematic block diagram illustrating a monitoring module in the data operation and maintenance system according to an embodiment of the present application.
FIG. 7 is a schematic flow chart illustrating a data operation and maintenance operation according to an embodiment of the present application.
Detailed Description
Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be understood that the described embodiments are only some embodiments of the present application and not all embodiments of the present application, and that the present application is not limited by the example embodiments described herein.
Exemplary data operation and maintenance System
As described above, existing data operation and maintenance usually directly connect to a database (e.g., SQL database) to modify data, which is inefficient, prone to error, has no log file to trace back and roll back, and is prone to data leakage. The inventor of the application designs the data operation and maintenance system by taking the defined data operation and maintenance template as a core idea based on the research on the business system and the specific needs of daily operation and maintenance. More specifically, by defining a data operation and maintenance template, queryable fields and modifiable fields are defined, so that the subsequent data operation and maintenance work can be carried out based on the template, for example, related data can be directly queried and operated in a system page. By the method, daily data operation and service logic in the operation and maintenance service system can be decoupled, so that the operation and maintenance process is separated from a development tool, the query, addition and modification of structured data are realized, the efficiency of data operation and maintenance is improved, the risk of data leakage caused by directly modifying database information can be effectively avoided, and the modification difficulty is reduced.
Fig. 1 is a block diagram illustrating a data operation and maintenance system according to an embodiment of the present application. As shown in fig. 1, the data operation and maintenance system according to the embodiment of the present application includes: the system comprises a management module 110, a task module 120, a statistic module 130, a data module 140 and a monitoring module 150, wherein the management module 110 is used for managing users, templates and system settings; the task module 120 is configured to manage a data operation and maintenance task; the statistical module 130 is used for checking data operation and maintenance tasks; the data module 140 is configured to analyze and/or desensitize data to be operated and maintained; the monitoring module 150 is used for recording data operation and maintenance operations.
Fig. 2 is a schematic block diagram illustrating the management module 110 in the data operation and maintenance system according to an embodiment of the present application. As shown in fig. 2, the management module 110 includes: the system comprises a user management unit 111, a template management unit 112, a system management unit 113, a right management unit 114 and a process management unit 115, wherein the user management unit 111 is used for adding, modifying and viewing users; the template management unit 112 is used for adding, modifying, deleting and viewing templates; the system management unit 113 is used for adding, modifying and viewing system settings; the authority management unit 114 is used for managing the operation authorities of different users; the process management unit 115 is configured to examine and approve the data operation and maintenance process.
Specifically, based on the function modules and specific operations, the users of the system include operators, administrators and statisticians, and each role configures different operation authorities. Accordingly, the user management unit 111 is configured to manage the user, and perform operations such as adding, modifying, and viewing of the user. In the embodiment of the present application, different users have different operation rights, and the partial functions are managed by the rights management module 110. Specifically, in the embodiment of the application, the authority possessed by the operator includes login system, password modification, data query, new task addition, task modification, task review, task rollback, task deletion, task detail and the like; the administrator has the authority including login system, password modification, user management, template management, system management and the like; the statistics personnel have the authority which comprises login system, password modification, data query, system statistics, template statistics, user statistics and the like. It should be understood that in the specific implementation, the operation authority for the operator, the administrator and the statistics administrator can be dynamically adjusted, and other operation authorities can be added along with the iterative development of the system, which is not limited by the present application. Meanwhile, the specific contents of the operation permissions configured by the operator, the administrator and the statistics staff will be specifically described in the following description, wherein specific descriptions are not provided for a part of common operation permissions.
Specifically, the template management unit 112 is configured to manage the data operation and maintenance template, and perform operations such as adding, modifying, deleting, and viewing the template. It should be understood that the data operation and maintenance template is a core idea of the data operation and maintenance system in the embodiment of the present application, and the queryable field and the modifiable field are determined by defining the data operation and maintenance template, so that the subsequent data operation and maintenance work can be performed based on the template, thereby implementing query, addition and modification of structured data, which is not only beneficial to improving the efficiency of data operation and maintenance, but also can effectively avoid the risk of data leakage caused by directly modifying database information, and reduce the modification difficulty.
Specifically, the process management unit 115 is configured to approve a data operation and maintenance process, for example, to perform an audit, data lookup, and extraction of an approval process on a workflow engine component. That is to say, the data operation and maintenance system according to the embodiment of the application has an approval function, and can realize online approval of the data operation and maintenance to improve the normative of the data operation and maintenance.
Fig. 3 is a schematic block diagram illustrating the task module 120 in the data operation and maintenance system according to an embodiment of the present application. As shown in fig. 3, the task module 120 includes: the system comprises a creating task unit 121, a reviewing task unit 122, a task list unit 123, a task rollback unit 124 and a task query unit 125, wherein the creating task unit 121 is used for creating a data operation and maintenance task; the review task unit 122 is configured to review tasks; the task list unit 123 is configured to display a data operation and maintenance task; the task rollback unit 124 is configured to rollback the data operation and maintenance task; the task query unit 125 is configured to query a data operation and maintenance task.
Specifically, the task creating unit is used for an operator to add a specific data operation and maintenance task. The created data operation and maintenance task is reviewed by another operator through the review task unit 122. The task list unit 123 is intended to display the data operation and maintenance task, wherein the operator may perform modification, deletion, uploading a review receipt and the like for the task which is created by the operator and is not checked. The task rollback unit 124 is configured to perform a rollback operation on the task to reduce a risk of erroneously modifying data. The task query unit 125 is used for checking the data operation and maintenance task and supporting the checking of the task details.
Fig. 4 is a schematic block diagram illustrating the statistics module 130 in the data operation and maintenance system according to an embodiment of the present application. As shown in fig. 4, the statistic module 130 includes: the system comprises a system statistical unit 131, a template statistical unit 132 and a user statistical unit 133, wherein the system statistical unit 131 is used for querying a data operation and maintenance task based on system setting; the template counting unit 132 is configured to query the data operation and maintenance task based on a template; the user statistic unit 133 is configured to query the data operation and maintenance task based on the user.
Fig. 5 is a schematic block diagram illustrating a data module 140 in the data operation and maintenance system according to an embodiment of the present application. As shown in fig. 5, the data module 140 includes: the data desensitization unit 141 is used for desensitizing sensitive data in the data to be operated and maintained; the data analysis unit 142 is configured to analyze data to be operated and maintained; the data retrieving unit 143 is configured to query the template and the data operation and maintenance task, and extract a query result.
Specifically, in the data operation and maintenance system, for example, user login information, connection configuration information of a database, and connection configuration information of a file server all belong to sensitive information, and encryption processing needs to be performed first when saving the sensitive information to the database to ensure data security. Namely, the desensitization unit is further configured to encrypt the sensitive data in the data to be run and maintained by using an encryption algorithm to perform desensitization.
Encryption is to change the original information data by a special algorithm, so that even if an unauthorized user obtains the encrypted information, the content of the information cannot be known because the unauthorized user does not know the decryption method. The two-way encryption is largely classified into two-way encryption and one-way encryption, and the two-way encryption is classified into symmetric encryption and asymmetric encryption.
Bidirectional encryption generally means that plaintext is encrypted to form ciphertext, and the ciphertext can be restored to plaintext through an algorithm. The one-way encryption only performs summary calculation on the information and cannot generate a plaintext through an algorithm.
1) Symmetric encryption
The encryption method using the single-key cryptosystem is a method in which the same key can be used for both encryption and decryption of information, and this encryption method is called symmetric encryption, also called single-key encryption. Symmetry means that both parties using this encryption method use the same key for encryption and decryption. A key is an instruction that controls the encryption and decryption process.
Commonly used symmetric encryption is: DES, 3DEA, AES algorithm, among them, DES algorithm is the symmetric cryptosystem in the cryptosystem, and is also becoming the American data encryption standard, it is the symmetric cryptosystem encryption algorithm developed by the American IBM corporation in 1972. The plaintext is grouped according to 64 bits, the key length is 64 bits, the key is actually 56 bits and participates in DES operation (8 th, 16 th, 24 th, 32 th, 40 th, 48 th, 56 th and 64 th bits are check bits, so that each key has an odd number of 1), and the plaintext group after grouping and the 56-bit key form an encryption method of a ciphertext group by a bit substitution or exchange method. The 3DES, also called TripleDES, is a mode of DES encryption algorithm, which uses 3 keys of 56 bits to encrypt 3DES data three times. The Data Encryption Standard (DES) is a long-standing encryption standard in the united states that uses symmetric key cryptography and was specified by ANSI organization as ansix.3.92 in 1981. DES uses a 56-bit key and cipher block approach, where text is divided into 64-bit sized blocks of text and then encrypted. Compared with the original DES, 3DES is more secure. 3DES (i.e., TripleDES) is a DES-to-AES transitional encryption algorithm (NIST, 1999, designates 3-DES as a transitional encryption standard), a more secure variant of DES. It takes DES as basic module, and designs a block encryption algorithm by a combined block method. The AES encryption algorithm, also known as the Rijndael encryption method, is a block encryption standard adopted by the federal government in the united states. This standard, which is used to replace the original DES, has been analyzed by many parties and is widely used throughout the world. Through the five-year selection process, the advanced encryption standard was released by National Institute of Standards and Technology (NIST) in FIPSPUB197 at 11/26/2001 and became an effective standard at 26/5/2002. In 2006, the advanced encryption standard has become one of the most popular algorithms in symmetric key encryption.
2) Asymmetric encryption
Commonly used asymmetric encryption is: RSA, DSA algorithms, etc. Among them, the RSA public key encryption algorithm was developed in 1977 by RonRivest, AdiShamirh, and lenaddleman (american institute of technology and engineering, ma usa). RSA naming comes from developing their three names. RSA is currently the most influential public key encryption algorithm that is able to resist all cryptographic attacks known so far, and has been recommended by ISO as the public key data encryption standard. The RSA algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is very difficult to factor their products at that time, so the products can be disclosed as encryption keys.
Common one-way encryption is: MD5, SHA, RIPEMD, and HAVAL algorithms, etc. The MD5 Algorithm, namely Message-Digest Algorithm5 (Message-Digest Algorithm 5), is used to ensure the integrity and consistency of information transmission. Is one of the hash algorithms (also known as digest algorithm and hash algorithm) widely used by computers, and the mainstream programming language is generally realized by MD 5. The operation of data (such as Chinese characters) into another fixed length value is the basic principle of the hash algorithm, and the precursors of MD5 include MD2, MD3 and MD 4. MD5 functions to allow large volumes of information to be "compressed" into a secure format (i.e., a string of bytes of arbitrary length is converted into a fixed-length hexadecimal digital string) before the private key is signed by digital signature software.
Further, the data analysis unit 142 is configured to analyze the data to be operated and maintained. Before the data operation and maintenance is submitted, the data analysis unit 142 can analyze the data blood relationship and influence of the operation and maintenance to be modified, an operator can select whether to modify the upstream and downstream related data, and a data modification report can be generated and printed for the condition that the external docking mechanism is possibly influenced. Of course, other forms of data analysis, such as relevance analysis, may be performed based on the requirements of the actual application scenario.
Further, the data retrieving unit 143 is configured to query the template and the data operation and maintenance task, and extract a query result. Specifically, in the embodiment of the present application, the data consulting and extracting includes: data consulting template management, data consulting task management, data consulting result extraction, data batch extracting template management, data extracting task management and the like.
It should be noted that, in the embodiment of the present application, more functional units may be developed for the data module 140 based on the actual application scenario requirement, for example, an automatic parsing function of a database table structure, a related processing function of data in an associated file, and the like, which is not limited in the present application.
Fig. 6 is a schematic block diagram illustrating a monitoring module 150 in the data operation and maintenance system according to an embodiment of the present application. As shown in fig. 6, the monitoring module 150 includes: the system comprises a log unit 151, a log query unit 152 and a report generation unit 153, wherein the log unit 151 is used for recording data operation and maintenance operations; the log query unit 152 is configured to query a log; the report generating unit 153 is configured to generate an audit report of the data operation and maintenance process.
That is, the data operation and maintenance system has the operation trace and monitoring functions, wherein the operation trace comprises recording all data operation and maintenance operation logs, operation log query, audit report generation and printing and the like; and operation monitoring, including system supervisor management, short message platform access, short message notification of related operations and the like.
FIG. 7 is a schematic flow chart illustrating a data operation and maintenance operation according to an embodiment of the present application. As shown in fig. 7, first, the administrator adds database information to be maintained; then, the administrator adds an operation and maintenance template according to the operation and maintenance requirements; then, adding an operator for carrying out operation and maintenance tasks by the administrator; then, the operator adds a specific operation and maintenance task based on the operation and maintenance template; then, the operator executes the operation and maintenance task; then, another operator rechecks the task to determine that the operation and maintenance task is completed; then, the operator can perform task rollback as needed; then, another operator rechecks and the rollback is finished; the statist then reviews the statistics.
In summary, the data operation and maintenance system based on the embodiment of the application is clarified, and the data operation and maintenance process can be standardized, so that errors are reduced, and the operation and maintenance efficiency is improved.
Moreover, through a rechecking mechanism, a trace retaining mechanism and a backtracking mechanism, the probability of errors caused by directly and manually modifying the fields of the database is reduced, data leakage is prevented, and the safety is improved.
In addition, the data operation and maintenance system adopts an independent intranet application system, establishes strict user authority control, a standard data modification process, a flexible file uploading path and detailed log records, reduces human misoperation and risks, improves the working efficiency and meets the auditing requirement.
Here, it will be understood by those skilled in the art that the specific functions and operations of the respective units and modules in the above data operation and maintenance system have been described in detail in the above description, and thus, a repetitive description thereof will be omitted.
As described above, the data operation and maintenance system according to the embodiment of the present application may be implemented in various terminal devices, such as a large-screen smart device, or a computer independent of a large-screen smart device. In one example, the data operation and maintenance system according to the embodiment of the present application may be integrated into the terminal device as a software module and/or a hardware module. For example, the data operation and maintenance system may be a software module in the operating system of the terminal device, or may be an application developed for the terminal device; of course, the data operation and maintenance system may also be one of many hardware modules of the terminal device.
Alternatively, in another example, the data operation and maintenance system and the terminal device may also be separate devices, and the data operation and maintenance system may be connected to the terminal device through a wired and/or wireless network and transmit the interaction information according to an agreed data format.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the application to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (10)

1. A data operation and maintenance system, comprising:
the management module is used for managing users, templates and system settings;
the task module is used for managing data operation and maintenance tasks;
the statistical module is used for checking the data operation and maintenance tasks;
the data module is used for analyzing and/or desensitizing the data to be operated and maintained; and
and the monitoring module is used for recording data operation and maintenance operation.
2. The data operation and maintenance system of claim 1, wherein the management module comprises:
the user management unit is used for newly adding, modifying and checking users;
the template management unit is used for adding, modifying, deleting and viewing templates;
the system management unit is used for adding, modifying and viewing system settings;
the authority management unit is used for managing the operation authorities of different users; and
and the process management unit is used for examining and approving the data operation and maintenance process.
3. The data operation and maintenance system of claim 2, wherein the task module comprises:
the task creating unit is used for creating a data operation and maintenance task;
the rechecking task unit is used for auditing the tasks;
the task list unit is used for displaying the data operation and maintenance task;
the task rollback unit is used for rolling back the data operation and maintenance task; and
and the task query unit is used for querying the data operation and maintenance task.
4. The data operation and maintenance system of claim 3, wherein the statistics module comprises:
the system statistical unit is used for inquiring the data operation and maintenance task based on system setting;
the template counting unit is used for inquiring the data operation and maintenance task based on the template; and
and the user counting unit is used for inquiring the data operation and maintenance task based on the user.
5. The data operation and maintenance system of claim 4, wherein the data module comprises:
the data desensitization unit is used for desensitizing sensitive data in the data to be operated and maintained; and
and the data analysis unit is used for analyzing the data to be operated and maintained.
6. The data operation and maintenance system of claim 5, wherein the data desensitization unit is further configured to encrypt sensitive data in the data to be operated and maintained through an encryption algorithm for desensitization.
7. The data operation and maintenance system of claim 6, wherein the encryption algorithm comprises bidirectional encryption and unidirectional encryption.
8. The data operation and maintenance system of claim 7, wherein the data analysis unit is further configured to perform blood-related analysis and influence relationship analysis on the data to be operated and maintained.
9. The data operation and maintenance system of claim 5, wherein the data module further comprises: and the data searching unit is used for searching the template and the data operation and maintenance task and extracting a searching result.
10. The data operation and maintenance system of claim 1, wherein the monitoring module comprises:
the log unit is used for recording data operation and maintenance operation;
the log query unit is used for querying logs; and
and the report generating unit is used for generating a data operation and maintenance flow audit report.
CN202110496293.7A 2021-05-07 2021-05-07 Data operation and maintenance system Active CN113190408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110496293.7A CN113190408B (en) 2021-05-07 2021-05-07 Data operation and maintenance system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110496293.7A CN113190408B (en) 2021-05-07 2021-05-07 Data operation and maintenance system

Publications (2)

Publication Number Publication Date
CN113190408A true CN113190408A (en) 2021-07-30
CN113190408B CN113190408B (en) 2024-03-26

Family

ID=76984087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110496293.7A Active CN113190408B (en) 2021-05-07 2021-05-07 Data operation and maintenance system

Country Status (1)

Country Link
CN (1) CN113190408B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425778A (en) * 2013-08-16 2013-12-04 国家电网公司 Intelligent development platform for database application system
CN104200402A (en) * 2014-09-11 2014-12-10 国家电网公司 Publishing method and system of source data of multiple data sources in power grid
CN105357055A (en) * 2015-11-30 2016-02-24 深圳联友科技有限公司 Operation management system used for database server and method
CN106371975A (en) * 2016-08-31 2017-02-01 国信优易数据有限公司 Automatic operation and maintenance early-warning method and system
CN107832392A (en) * 2017-10-31 2018-03-23 链家网(北京)科技有限公司 A kind of metadata management system
CN107870814A (en) * 2016-09-23 2018-04-03 伊姆西Ip控股有限责任公司 Method and apparatus for Content Management batch processing
CN109688008A (en) * 2018-12-27 2019-04-26 安徽长泰信息安全服务有限公司 A kind of operation management system for database server
CN110443048A (en) * 2019-07-04 2019-11-12 广州海颐信息安全技术有限公司 Data center looks into number system
CN110674161A (en) * 2019-09-20 2020-01-10 上海擎感智能科技有限公司 Method, system, storage medium and SQL operation platform for online SQL
CN110941630A (en) * 2019-10-25 2020-03-31 泰康保险集团股份有限公司 Database operation and maintenance method, device and system
CN112416710A (en) * 2020-11-19 2021-02-26 京东数字科技控股股份有限公司 User operation recording method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425778A (en) * 2013-08-16 2013-12-04 国家电网公司 Intelligent development platform for database application system
CN104200402A (en) * 2014-09-11 2014-12-10 国家电网公司 Publishing method and system of source data of multiple data sources in power grid
CN105357055A (en) * 2015-11-30 2016-02-24 深圳联友科技有限公司 Operation management system used for database server and method
CN106371975A (en) * 2016-08-31 2017-02-01 国信优易数据有限公司 Automatic operation and maintenance early-warning method and system
CN107870814A (en) * 2016-09-23 2018-04-03 伊姆西Ip控股有限责任公司 Method and apparatus for Content Management batch processing
CN107832392A (en) * 2017-10-31 2018-03-23 链家网(北京)科技有限公司 A kind of metadata management system
CN109688008A (en) * 2018-12-27 2019-04-26 安徽长泰信息安全服务有限公司 A kind of operation management system for database server
CN110443048A (en) * 2019-07-04 2019-11-12 广州海颐信息安全技术有限公司 Data center looks into number system
CN110674161A (en) * 2019-09-20 2020-01-10 上海擎感智能科技有限公司 Method, system, storage medium and SQL operation platform for online SQL
CN110941630A (en) * 2019-10-25 2020-03-31 泰康保险集团股份有限公司 Database operation and maintenance method, device and system
CN112416710A (en) * 2020-11-19 2021-02-26 京东数字科技控股股份有限公司 User operation recording method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113190408B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
US11777712B2 (en) Information management in a database
CN109525608B (en) Log reporting method and device, log management method and device and terminal equipment
US8156553B1 (en) Systems and methods for correlating log messages into actionable security incidents and managing human responses
US9825925B2 (en) Method and apparatus for securing sensitive data in a cloud storage system
US8819807B2 (en) Apparatus and method for analyzing and monitoring sap application traffic, and information protection system using the same
US8079081B1 (en) Systems and methods for automated log event normalization using three-staged regular expressions
JP5536067B2 (en) Apparatus, system, method and corresponding software component for encrypting and processing data
US8625642B2 (en) Method and apparatus of network artifact indentification and extraction
CN108256340B (en) Data acquisition method and device, terminal equipment and storage medium
CN101944168B (en) Electronic file authority control and management system
US11316669B2 (en) Audit result data storage method and device, audit result data query method and device, and audit item storage method and device
US20140331338A1 (en) Device and method for preventing confidential data leaks
CN111934879A (en) Data transmission encryption method, device, equipment and medium for internal and external network system
US9953184B2 (en) Customized trusted computer for secure data processing and storage
JPH05244150A (en) Method and device for intelligent information processing
JP2012164031A (en) Data processor, data storage device, data processing method, data storage method and program
CN113194081A (en) One-way message transmission system and method suitable for physical isolation environment
CN110830500B (en) Network attack tracking method and device, electronic equipment and readable storage medium
CN113162943A (en) Method, device, equipment and storage medium for dynamically managing firewall policy
US9853817B2 (en) Generating enhanced digital signatures for artifacts
CN109254893B (en) Service data auditing method, device, server and storage medium
CN113190408B (en) Data operation and maintenance system
CN108629164A (en) The generation method for encrypting the page and the retroactive method after encryption page leakage
Zhang et al. Do you know where your data’s been?–tamper-evident database provenance
CN116738482A (en) Sensitive data processing method, system, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant