CN113190408B - Data operation and maintenance system - Google Patents

Data operation and maintenance system Download PDF

Info

Publication number
CN113190408B
CN113190408B CN202110496293.7A CN202110496293A CN113190408B CN 113190408 B CN113190408 B CN 113190408B CN 202110496293 A CN202110496293 A CN 202110496293A CN 113190408 B CN113190408 B CN 113190408B
Authority
CN
China
Prior art keywords
data
maintenance
task
unit
data operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110496293.7A
Other languages
Chinese (zh)
Other versions
CN113190408A (en
Inventor
王雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Financial Assets Exchange Co ltd
Original Assignee
Beijing Financial Assets Exchange Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Financial Assets Exchange Co ltd filed Critical Beijing Financial Assets Exchange Co ltd
Priority to CN202110496293.7A priority Critical patent/CN113190408B/en
Publication of CN113190408A publication Critical patent/CN113190408A/en
Application granted granted Critical
Publication of CN113190408B publication Critical patent/CN113190408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a data operation and maintenance system, including: the management module is used for managing the user, the template and the system setting; the task module is used for managing the data operation and maintenance task; the statistics module is used for checking the data operation and maintenance task; the data module is used for analyzing and/or desensitizing the data to be operated and maintained; and the monitoring module is used for recording data operation and maintenance operation. The data operation and maintenance system can standardize the data operation and maintenance flow, reduce errors of the service system and improve operation and maintenance efficiency.

Description

Data operation and maintenance system
Technical Field
The present disclosure relates to the field of data operation and maintenance, and in particular, to a data operation and maintenance system applied to a service system.
Background
A specific business system (such as a payable money and creditor financing planning system and a centralized book filing system) is built according to established business requirements and business rules, and after the business system is online, the preset target of the business system cannot be realized due to manual recording operation errors, extreme scenes or boundary conditions, so that data operation and maintenance are required to correct errors, such as error recorded data modification, uploaded file replacement and the like.
The existing data operation and maintenance is usually directly connected with a database (for example, an SQL database) to modify data, and a database script language (for example, an SQL script reason) needs to be written to complete the data operation and maintenance work, which has high requirements on the quality of operation and maintenance personnel, and the operation and maintenance personnel must know the association relation between data items in a service system, and in most cases, the operation and maintenance can be completed only by the cooperation of the developer of the service system. This mode has a number of drawbacks: first, the efficiency is low, error prone, and no log file can be traced back and rolled back yet. Second, data leakage is easily caused.
In addition, in the recorded data, there are some sensitive data, and if the sensitive data is not subjected to desensitization treatment, a certain loss is caused once leakage occurs.
Therefore, an adaptive data operation and maintenance system is required to perform data operation and maintenance in a standardized and standardized way so as to reduce errors and ensure the stability of a service system.
Disclosure of Invention
The present application has been made in order to solve the above technical problems. The embodiment of the application provides a data operation and maintenance system applied to a business system, which can standardize a data operation and maintenance flow, reduce errors and improve operation and maintenance efficiency.
According to an aspect of the present application, there is provided a data operation and maintenance system applied to a service system, including: the management module is used for managing the user, the template and the system setting; the task module is used for managing the data operation and maintenance task; the statistics module is used for checking the data operation and maintenance task; the data module is used for analyzing and/or desensitizing the data to be operated and maintained; and the monitoring module is used for recording data operation and maintenance operation.
In a data operation and maintenance system according to the present application, the management module includes: the user management unit is used for newly adding, modifying and viewing users; the template management unit is used for adding, modifying, deleting and viewing templates; a system management unit for adding, modifying and viewing system settings; the authority management unit is used for managing the operation authorities of different users; and the flow management unit is used for examining and approving the data operation and maintenance flow.
In a data operation and maintenance system according to the present application, the task module includes: the creating task unit is used for creating a data operation task; the review task unit is used for reviewing tasks; the task list unit is used for displaying data operation and maintenance tasks; the task rollback unit is used for rollback the data operation and maintenance task; and the task query unit is used for querying the data operation and maintenance task.
In the data operation and maintenance system according to the present application, the statistics module includes: the system statistics unit is used for inquiring the data operation and maintenance task based on system setting; the template statistics unit is used for inquiring the data operation and maintenance task based on the template; and the user statistics unit is used for inquiring the data operation and maintenance task based on the user.
In a data operation and maintenance system according to the present application, the data module includes: the data desensitization unit is used for desensitizing sensitive data in the data to be operated and maintained; and the data analysis unit is used for analyzing the data to be operated and maintained.
In the data operation and maintenance system according to the present application, the data desensitization unit is further configured to encrypt sensitive data in the data to be operated and maintained by an encryption algorithm, so as to perform desensitization.
In the data operation and maintenance system according to the present application, the data module further includes: and the data searching unit is used for searching the template and the data operation and maintenance task and extracting a searching result.
In a data manipulation system according to the present application, the encryption algorithm includes both bidirectional encryption and unidirectional encryption.
In the data operation and maintenance system according to the application, the data analysis unit is further used for performing blood margin analysis and influence relation analysis on the data to be operated and maintained.
In the data operation and maintenance system according to the present application, the monitoring module includes: the log unit is used for recording data operation and maintenance operation; the log query unit is used for querying logs; and the report generating unit is used for generating a data operation and maintenance flow audit report.
According to the data operation and maintenance system, the data operation and maintenance flow can be standardized, errors are reduced, and operation and maintenance efficiency is improved.
Drawings
The foregoing and other objects, features and advantages of the present application will become more apparent from the following more particular description of embodiments of the present application, as illustrated in the accompanying drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 illustrates a block diagram schematic of a data manipulation and maintenance system according to an embodiment of the present application.
Fig. 2 illustrates a block diagram of a management module in the data operation and maintenance system according to an embodiment of the present application.
Fig. 3 illustrates a block diagram schematic of task modules in the data manipulation system according to an embodiment of the present application.
Fig. 4 illustrates a block diagram schematic of a statistics module in the data operation and maintenance system according to an embodiment of the present application.
Fig. 5 illustrates a block diagram of data modules in the data manipulation system according to an embodiment of the present application.
Fig. 6 illustrates a block diagram of a monitoring module in the data operation and maintenance system according to an embodiment of the present application.
Fig. 7 illustrates a flow diagram of a data manipulation operation according to an embodiment of the present application.
Detailed Description
Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application and not all of the embodiments of the present application, and it should be understood that the present application is not limited by the example embodiments described herein.
Exemplary data manipulation System
As described above, existing data operations are typically directly connected to a database (e.g., an SQL database) for data modification, which is inefficient, error-prone, has no log files that can be traced back and rolled back, and is prone to data leakage. The inventor designs the data operation and maintenance system based on the research of the business system and the specific needs of daily operation and maintenance by taking the definition data operation and maintenance template as a core idea. More specifically, by defining the data operation and maintenance template to define the inquired field and the modifiable field, the subsequent data operation and maintenance work can be performed based on the template, for example, related data can be directly inquired and operated in a system page. By the method, business logic in a daily data operation and maintenance business system can be decoupled, so that the operation and maintenance process is separated from a development tool, inquiry, addition and modification of structured data are realized, the efficiency of data operation and maintenance is improved, the risk of data leakage caused by direct modification of database information can be effectively avoided, and the modification difficulty is reduced.
Fig. 1 illustrates a block diagram schematic of a data manipulation and maintenance system according to an embodiment of the present application. As shown in fig. 1, a data operation and maintenance system according to an embodiment of the present application includes: the system comprises a management module 110, a task module 120, a statistics module 130, a data module 140 and a monitoring module 150, wherein the management module 110 is used for managing users, templates and system settings; the task module 120 is configured to manage a data operation task; the statistics module 130 is configured to view a data operation task; the data module 140 is configured to analyze and/or desensitize data to be operated and maintained; the monitoring module 150 is configured to record data operation and maintenance operations.
Fig. 2 illustrates a block diagram representation of the management module 110 in the data manipulation and maintenance system according to an embodiment of the present application. As shown in fig. 2, the management module 110 includes: a user management unit 111, a template management unit 112, a system management unit 113, a rights management unit 114, and a flow management unit 115, wherein the user management unit 111 is used for adding, modifying, and viewing users; the template management unit 112 is configured to add, modify, delete, and view templates; the system management unit 113 is configured to add, modify, and view system settings; the rights management unit 114 is used for managing the operation rights of different users; the process management unit 115 is configured to examine and approve the data operation and maintenance process.
Specifically, based on the functional modules and specific operations, the users of the system include operators, administrators, and statistics, and each role configures different operation rights. Accordingly, the user management unit 111 is configured to manage the user, and perform operations such as adding, modifying, and viewing of the user. Also, in the embodiment of the present application, the unused users have different operation rights, and the part of the functions are managed by the rights management module 110. Specifically, in the embodiment of the application, the authority of the operator includes login system, password modification, data inquiry, task addition, task modification, task rechecking, task rollback, task deletion, task detail and the like; the administrator has rights including login to the system, password modification, user management, template management, system management, etc.; the rights of the statistics staff include login system, password modification, data query, system statistics, template statistics, user statistics and the like. It should be understood that in the implementation, the operation rights of the operators, administrators and statistics can be dynamically adjusted, and other operation rights may be added with the iterative development of the system, which is not limited in this application. Meanwhile, the specific content of the operation rights configured by the operators, the administrators and the statistics staff will be specifically described in the following description, wherein the specific description is not made for a part of common operation rights.
Specifically, the template management unit 112 is configured to manage the data operation and maintenance template, and perform operations such as adding, modifying, deleting, and viewing the template. It should be understood that the data operation and maintenance template is a core idea of the data operation and maintenance system in the embodiment of the present application, and the queriable fields and the modifiable fields are definitely defined by defining the data operation and maintenance template, so that the subsequent data operation and maintenance work can be performed based on the template, thereby realizing the query, the addition and the modification of the structured data, which is not only beneficial to improving the efficiency of the data operation and maintenance, but also effectively avoiding the risk of data leakage caused by directly modifying the database information, and reducing the modification difficulty.
Specifically, the flow management unit 115 is configured to examine and approve the data operation and maintenance flow, for example, examine and approve the workflow engine component, review the data, extract and examine the flow, and so on. That is, the data operation and maintenance system according to the embodiment of the application has an approval function, and can implement on-line approval of the data operation and maintenance to improve the normalization of the data operation and maintenance.
Fig. 3 illustrates a block diagram schematic of the task module 120 in the data manipulation system according to an embodiment of the present application. As shown in fig. 3, the task module 120 includes: a task creation unit 121, a rechecking task unit 122, a task list unit 123, a task rollback unit 124 and a task query unit 125, wherein the task creation unit 121 is configured to create a data operation task; the review task unit 122 is configured to review tasks; the task list unit 123 is configured to display a data operation task; the task rollback unit 124 is configured to rollback a data operation task; the task query unit 125 is configured to query a data operation task.
Specifically, the task creation unit is used for an operator to add specific data operation and maintenance tasks. The created data manipulation task is reviewed by another operator through the review task unit 122. The task list unit 123 is for displaying data operation tasks, in which an operator can perform modification, deletion, upload of a review batch, and the like for an uncore task created by himself. The task rollback unit 124 is configured to rollback the task to reduce the risk of modifying the data by mistake. The task query unit 125 is configured to view the data operation task and support viewing of task details.
Fig. 4 illustrates a block diagram schematic of the statistics module 130 in the data operation and maintenance system according to an embodiment of the present application. As shown in fig. 4, the statistics module 130 includes: a system statistics unit 131, a template statistics unit 132 and a user statistics unit 133, wherein the system statistics unit 131 is used for inquiring the data operation and maintenance task based on system settings; the template statistics unit 132 is used for querying the data operation and maintenance task based on the template; the user statistics unit 133 is configured to query the data operation and maintenance task based on a user.
Fig. 5 illustrates a block diagram representation of a data module 140 in the data manipulation system according to an embodiment of the present application. As shown in fig. 5, the data module 140 includes: the data desensitizing unit 141, the data analyzing unit 142 and the data retrieving unit 143, wherein the data desensitizing unit 141 is used for desensitizing sensitive data in the data to be operated and maintained; the data analysis unit 142 is configured to analyze data to be operated and maintained; the data searching unit 143 is configured to search the template and the data operation task, and extract a search result.
Specifically, in the data operation and maintenance system, the connection configuration information of the user login information, the connection configuration information of the database and the connection configuration information of the file server belong to sensitive information, and when the data operation and maintenance system is stored in the database, encryption processing needs to be performed first to ensure data security, where in the embodiment of the present application, desensitizing the sensitive information is equivalent to encrypting the sensitive information. That is, the desensitization unit is further configured to encrypt sensitive data in the data to be operated and maintained by an encryption algorithm, so as to perform desensitization.
Encryption is to change original information data by a special algorithm, so that even if an unauthorized user obtains encrypted information, the content of the information can not be known due to the unknown decryption method. Two-way encryption is largely classified into two-way encryption and one-way encryption, and two-way encryption is classified into symmetric encryption and asymmetric encryption.
Bidirectional encryption generally means that a plaintext is encrypted to form a ciphertext, which can be restored to a plaintext by an algorithm. The unidirectional encryption only carries out digest calculation on the information, and a plaintext cannot be generated through an algorithm.
1) Symmetric encryption
The same key can be used for both encryption and decryption of information using an encryption method of a single key cryptosystem, which is called symmetric encryption, also called single key encryption. The term "symmetric" means that both sides using this encryption method use the same key to encrypt and decrypt. The key is an instruction that controls the encryption and decryption process.
Common symmetric encryption is: DES, 3DEA, AES algorithm, etc., wherein the DES algorithm is a symmetric cryptosystem in the cryptosystem, and is also called as the american data encryption standard, and is a symmetric cryptosystem encryption algorithm developed by IBM corporation in the united states in 1972. The plaintext is grouped according to 64 bits, the key is 64 bits long, the key is actually 56 bits to participate in the DES operation (8 th, 16 th, 24 th, 32 th, 40 th, 48 th, 56 th and 64 th bits are check bits, so that each key has an odd number of 1 th) and the 56 th bit of the key are substituted or exchanged according to the bits to form the encryption method of the ciphertext group. 3DES, also known as triple DES, is a mode of DES encryption algorithm that encrypts 3DES data three times using 3-bar 56-bit keys. The Data Encryption Standard (DES) is a well-established encryption standard in the united states that uses symmetric key cryptography and was specified by ANSI organizations as ansix.3.92 in 1981. DES uses a 56-bit key and cipher block approach, where text is divided into 64-bit sized text blocks and then encrypted. 3DES is more secure than the original DES. 3DES (i.e., triple DES) is the encryption algorithm for DES to AES transition (NIST designates 3-DES as the transitional encryption standard in 1999), a safer variant of DES. The method takes DES as a basic module and designs a packet encryption algorithm by a combined packet method. The AES encryption algorithm, also known as the advanced encryption standard Rijndael encryption, is a block encryption standard adopted by the federal government in the united states. This standard is used to replace the original DES, has been analyzed by multiple parties and is widely used worldwide. Through five years of screening, advanced encryption standards were issued by the National Institute of Standards and Technology (NIST) in FIPSPUB197 at month 11 and 26 of 2001 and became valid standards at month 5 and 26 of 2002. Advanced encryption standards have become one of the most popular algorithms in symmetric key encryption in 2006.
2) Asymmetric encryption
Common asymmetric encryption is: RSA, DSA algorithms, etc. Among them, RSA public key encryption algorithm was developed in 1977 by RonRivest, adiShamirh and LenADleman (American society of Otsugae). RSA derives its name from developing their three names. RSA is currently the most powerful public key encryption algorithm that is resistant to all cryptographic attacks known so far and has been recommended by ISO as the public key data encryption standard. The RSA algorithm is based on a very simple number theory fact: multiplying two large primes is easy, but it is extremely difficult to factor the product thereof at that time, so the product can be disclosed as an encryption key.
Common one-way encryption is: MD5, SHA, RIPEMD, HAVAL algorithm, etc. The MD5 Algorithm, i.e., message-Digest algorism 5 (Message-Digest Algorithm 5), is used to ensure that the information transmission is completely consistent. Is one of hash algorithms (a digest algorithm and a hash algorithm) widely used by computers, and the mainstream programming language is commonly realized by MD 5. The operation of data (e.g. Chinese characters) as another fixed length value is the basic principle of the hashing algorithm, and the precursors of MD5 are MD2, MD3 and MD4.MD5 functions to allow large volumes of information to be "compressed" into a secure format (i.e., converting a string of bytes of arbitrary length into a string of hexadecimal digits of certain length) prior to signing the private key with digital signature software.
Further, the data analysis unit 142 is configured to analyze data to be operated and maintained. Before the data operation and maintenance is submitted, the data analysis unit 142 may analyze and influence the data blood edges to be modified and operated and the operator may choose whether to modify the upstream and downstream related data, and may generate and print data modification reports for the case that may influence the external docking mechanism. Of course, other forms of data analysis, such as relevance analysis, etc., may be performed based on the needs of the actual application scenario.
Further, the data retrieving unit 143 is configured to query the template and the data operation task, and extract a query result. Specifically, in the embodiment of the present application, the data review and extraction includes: data reference template management, data reference task management, data reference result extraction, data batch extraction template management, data extraction task management and the like.
It should be noted that in the embodiment of the present application, more functional units may be developed for the data module 140 based on the actual application scenario requirements, for example, a database table structure automatic parsing function, a related processing function of data in a related file, etc., which is not limited in this application.
Fig. 6 illustrates a block diagram of the monitoring module 150 in the data operation and maintenance system according to an embodiment of the present application. As shown in fig. 6, the monitoring module 150 includes: a log unit 151, a log inquiry unit 152, and a report generation unit 153, wherein the log unit 151 is used for recording data operation and maintenance operations; the log query unit 152 is configured to query a log; the report generating unit 153 is configured to generate a data operation and maintenance flow audit report.
That is, the data operation and maintenance system has operation trace and monitoring functions, wherein the operation trace comprises recording all data operation and maintenance operation logs, inquiring the operation logs, generating and printing an audit report and the like; the operation monitoring comprises system supervisor management, short message platform access, short message notification by related operation and the like.
Fig. 7 illustrates a flow diagram of a data manipulation operation according to an embodiment of the present application. As shown in fig. 7, first, an administrator adds database information to be maintained; then, an administrator adds an operation and maintenance template according to operation and maintenance requirements; then, the administrator adds an operator for operation and maintenance tasks; then, the operator adds specific operation and maintenance tasks based on the operation and maintenance template; then, the operator performs the operation and maintenance task; then, another operator reviews the task to determine that the operation and maintenance task is complete; then, the operator can roll back tasks as required; then, another operator rechecks, and rollback is completed; the statistics are then reviewed by the statistics operator.
In summary, the data operation and maintenance system according to the embodiments of the present application is illustrated, which can normalize the data operation and maintenance flow, reduce errors and improve operation and maintenance efficiency.
And through rechecking, trace remaining and backtracking mechanisms, the probability of error occurrence of directly and artificially modifying the database fields is reduced, data leakage is prevented, and the safety is improved.
And the data operation and maintenance system adopts an independent intranet application system, establishes strict user authority control and a standard data modification process, flexible file uploading way and detailed log record, reduces human misoperation and risk, improves the working efficiency and meets the auditing requirement.
Here, it will be understood by those skilled in the art that specific functions and operations of the respective units and modules in the above data manipulation and maintenance system have been described in detail in the above description, and thus, repetitive descriptions thereof will be omitted.
As described above, the data operation and maintenance system according to the embodiment of the present application may be implemented in various terminal devices, such as a large-screen smart device, or a computer independent of a large-screen smart device, or the like. In one example, a data manipulation and maintenance system according to embodiments of the present application may be integrated into a terminal device as one software module and/or hardware module. For example, the data manipulation system may be a software module in the operating system of the terminal device, or may be an application developed for the terminal device; of course, the data operation system may also be one of a plurality of hardware modules of the terminal device.
Alternatively, in another example, the data manipulation system and the terminal device may be separate devices, and the data manipulation system may be connected to the terminal device through a wired and/or wireless network and transmit the interactive information in a agreed data format.
The basic principles of the present application have been described above in connection with specific embodiments, however, it should be noted that the advantages, benefits, effects, etc. mentioned in the present application are merely examples and not limiting, and these advantages, benefits, effects, etc. are not to be considered as necessarily possessed by the various embodiments of the present application. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, as the application is not intended to be limited to the details disclosed herein as such.
The block diagrams of the devices, apparatuses, devices, systems referred to in this application are only illustrative examples and are not intended to require or imply that the connections, arrangements, configurations must be made in the manner shown in the block diagrams. As will be appreciated by one of skill in the art, the devices, apparatuses, devices, systems may be connected, arranged, configured in any manner. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
It is also noted that in the apparatus, devices and methods of the present application, the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent to the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the application to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.

Claims (9)

1. A data manipulation and maintenance system, comprising:
the management module is used for managing the user, the template and the system setting;
the task module is used for managing the data operation and maintenance task;
the statistics module is used for checking the data operation and maintenance task;
the data module is used for analyzing and/or desensitizing the data to be operated and maintained; and
the monitoring module is used for recording data operation and maintenance operation;
wherein, the management module includes:
the user management unit is used for newly adding, modifying and viewing users;
the template management unit is used for adding, modifying, deleting and viewing templates;
a system management unit for adding, modifying and viewing system settings;
the authority management unit is used for managing the operation authorities of different users; and
the flow management unit is used for examining and approving the data operation and maintenance flow;
wherein the templates specify fields which can be queried and modified, and the data operation and maintenance task is performed based on the templates.
2. The data manipulation and maintenance system of claim 1, wherein the task module comprises:
the creating task unit is used for creating a data operation task;
the review task unit is used for reviewing tasks;
the task list unit is used for displaying data operation and maintenance tasks;
the task rollback unit is used for rollback the data operation and maintenance task; and
and the task query unit is used for querying the data operation and maintenance task.
3. The data manipulation and maintenance system of claim 2, wherein the statistics module comprises:
the system statistics unit is used for inquiring the data operation and maintenance task based on system setting;
the template statistics unit is used for inquiring the data operation and maintenance task based on the template; and
and the user statistics unit is used for inquiring the data operation and maintenance task based on the user.
4. A data manipulation and maintenance system according to claim 3, wherein the data module comprises:
the data desensitization unit is used for desensitizing sensitive data in the data to be operated and maintained; and
and the data analysis unit is used for analyzing the data to be operated and maintained.
5. The data manipulation and maintenance system according to claim 4, wherein the data desensitization unit is further used for encrypting sensitive data in the data to be manipulated by an encryption algorithm to perform desensitization.
6. The data manipulation and maintenance system of claim 5 wherein the encryption algorithm comprises two-way encryption and one-way encryption.
7. The data manipulation and maintenance system of claim 6, wherein the data analysis unit is further configured to perform a blood-lineage analysis and an impact relationship analysis on the data to be manipulated.
8. The data manipulation and maintenance system of claim 1, wherein the data module further comprises: and the data searching unit is used for searching the template and the data operation and maintenance task and extracting a searching result.
9. The data manipulation and maintenance system of claim 1, wherein the monitoring module comprises:
the log unit is used for recording data operation and maintenance operation;
the log query unit is used for querying logs; and
and the report generating unit is used for generating an audit report of the data operation and maintenance flow.
CN202110496293.7A 2021-05-07 2021-05-07 Data operation and maintenance system Active CN113190408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110496293.7A CN113190408B (en) 2021-05-07 2021-05-07 Data operation and maintenance system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110496293.7A CN113190408B (en) 2021-05-07 2021-05-07 Data operation and maintenance system

Publications (2)

Publication Number Publication Date
CN113190408A CN113190408A (en) 2021-07-30
CN113190408B true CN113190408B (en) 2024-03-26

Family

ID=76984087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110496293.7A Active CN113190408B (en) 2021-05-07 2021-05-07 Data operation and maintenance system

Country Status (1)

Country Link
CN (1) CN113190408B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425778A (en) * 2013-08-16 2013-12-04 国家电网公司 Intelligent development platform for database application system
CN104200402A (en) * 2014-09-11 2014-12-10 国家电网公司 Publishing method and system of source data of multiple data sources in power grid
CN105357055A (en) * 2015-11-30 2016-02-24 深圳联友科技有限公司 Operation management system used for database server and method
CN106371975A (en) * 2016-08-31 2017-02-01 国信优易数据有限公司 Automatic operation and maintenance early-warning method and system
CN107832392A (en) * 2017-10-31 2018-03-23 链家网(北京)科技有限公司 A kind of metadata management system
CN107870814A (en) * 2016-09-23 2018-04-03 伊姆西Ip控股有限责任公司 Method and apparatus for Content Management batch processing
CN109688008A (en) * 2018-12-27 2019-04-26 安徽长泰信息安全服务有限公司 A kind of operation management system for database server
CN110443048A (en) * 2019-07-04 2019-11-12 广州海颐信息安全技术有限公司 Data center looks into number system
CN110674161A (en) * 2019-09-20 2020-01-10 上海擎感智能科技有限公司 Method, system, storage medium and SQL operation platform for online SQL
CN110941630A (en) * 2019-10-25 2020-03-31 泰康保险集团股份有限公司 Database operation and maintenance method, device and system
CN112416710A (en) * 2020-11-19 2021-02-26 京东数字科技控股股份有限公司 User operation recording method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425778A (en) * 2013-08-16 2013-12-04 国家电网公司 Intelligent development platform for database application system
CN104200402A (en) * 2014-09-11 2014-12-10 国家电网公司 Publishing method and system of source data of multiple data sources in power grid
CN105357055A (en) * 2015-11-30 2016-02-24 深圳联友科技有限公司 Operation management system used for database server and method
CN106371975A (en) * 2016-08-31 2017-02-01 国信优易数据有限公司 Automatic operation and maintenance early-warning method and system
CN107870814A (en) * 2016-09-23 2018-04-03 伊姆西Ip控股有限责任公司 Method and apparatus for Content Management batch processing
CN107832392A (en) * 2017-10-31 2018-03-23 链家网(北京)科技有限公司 A kind of metadata management system
CN109688008A (en) * 2018-12-27 2019-04-26 安徽长泰信息安全服务有限公司 A kind of operation management system for database server
CN110443048A (en) * 2019-07-04 2019-11-12 广州海颐信息安全技术有限公司 Data center looks into number system
CN110674161A (en) * 2019-09-20 2020-01-10 上海擎感智能科技有限公司 Method, system, storage medium and SQL operation platform for online SQL
CN110941630A (en) * 2019-10-25 2020-03-31 泰康保险集团股份有限公司 Database operation and maintenance method, device and system
CN112416710A (en) * 2020-11-19 2021-02-26 京东数字科技控股股份有限公司 User operation recording method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113190408A (en) 2021-07-30

Similar Documents

Publication Publication Date Title
US8625642B2 (en) Method and apparatus of network artifact indentification and extraction
CN101944168B (en) Electronic file authority control and management system
US20110113050A1 (en) Data masking with an encrypted seed
DE102013203126B4 (en) System, method and program product for transparent access to encrypted non-relational data in real time
CN110489985B (en) Data processing method and device, computer readable storage medium and electronic equipment
US20140331338A1 (en) Device and method for preventing confidential data leaks
US9953184B2 (en) Customized trusted computer for secure data processing and storage
US11068845B2 (en) Crowd-sourced incident management
US20220130282A1 (en) Method, apparatus, and computer-readable medium for format preserving encryption of a numerical value
JP2012164031A (en) Data processor, data storage device, data processing method, data storage method and program
JP2009510628A (en) Processing of protective electronic communication
CN108881327A (en) A kind of computer internet information safety control system based on cloud computing
DE112012002332T5 (en) Protecting a control vector in a cryptographic system
CN110598193B (en) Audit offline document management system
US9853817B2 (en) Generating enhanced digital signatures for artifacts
CN113190408B (en) Data operation and maintenance system
Gui et al. Security Analysis of {MongoDB} Queryable Encryption
CN108629164A (en) The generation method for encrypting the page and the retroactive method after encryption page leakage
US8074267B1 (en) Computer communications monitor
CN114510734A (en) Data access control method, device and computer readable storage medium
CN106471510A (en) Compound document accesses
CN110611674B (en) Protocol interaction method, system and storage medium between different computer systems
US7006629B2 (en) Method and system for processing a data set
CN101321062B (en) Real-time information safety control method
CN113190407A (en) Data operation and maintenance system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant