CN110399749B - Data asset management method and system - Google Patents

Data asset management method and system Download PDF

Info

Publication number
CN110399749B
CN110399749B CN201910719751.1A CN201910719751A CN110399749B CN 110399749 B CN110399749 B CN 110399749B CN 201910719751 A CN201910719751 A CN 201910719751A CN 110399749 B CN110399749 B CN 110399749B
Authority
CN
China
Prior art keywords
database
data
heat
preset
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910719751.1A
Other languages
Chinese (zh)
Other versions
CN110399749A (en
Inventor
邵宛岩
范渊
刘博�
龙文洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201910719751.1A priority Critical patent/CN110399749B/en
Publication of CN110399749A publication Critical patent/CN110399749A/en
Application granted granted Critical
Publication of CN110399749B publication Critical patent/CN110399749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention provides a data asset management method and a system, which relate to the technical field of network security and comprise the following steps: counting the information of the data assets in a preset time period, and determining the access amount of each data asset; determining the data assets with the access quantity meeting a first condition as heat data; extracting sensitive information in the heat data based on a preset rule; judging whether the sensitive information meets a preset condition or not; and protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule. According to the embodiment of the invention, the sensitive information is extracted according to the preset rule and the heat data corresponding to the sensitive information is protected, so that the orderliness and the efficiency of data asset management are improved.

Description

Data asset management method and system
Technical Field
The invention relates to the technical field of network security, in particular to a data asset management method and system.
Background
The universality, the sharing, the value-added property, the processability and the multiple utility of the data serving as an information resource make the data have particularly important significance for human beings.
In the later period of the 60's of the 20 th century, more and more data need to be managed, and the data is required to be shared, so that a database system management mode appears in order to meet the requirement of data management. Database Management Systems (DBMS) are the core of a Database system, software configured for the creation, use and maintenance of a Database, consisting of a collection of interrelated data and a set of programs for accessing the data.
With the rapid development of networks, various application systems come into play, and each application system is provided with a corresponding database management system. In a complex IT network environment, a plurality of database management systems are involved, the environments are maintained by a plurality of operators or internal operation and maintenance personnel, and multiple operators run around and maintain the environments over the years, so that the management of database assets is inevitably confused.
Disclosure of Invention
The invention aims to provide a data asset management method and a data asset management system so as to relieve the technical problem of disordered data asset management in the prior art.
The invention provides a data asset management method, which comprises the following steps: counting the information of the data assets in a preset time period, and determining the access amount of each data asset; wherein the data assets comprise at least one database; determining the data assets with the access quantity meeting a first condition as heat data; extracting sensitive information in the heat data based on a preset rule; the preset rule is that the heat data at least comprises a preset sensitive field; judging whether the sensitive information meets a preset condition or not; and protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule.
Further, the determining the data assets with the access quantity meeting the first condition as the heat data comprises: determining a heat value of the data asset according to the access amount of the data asset; and determining the data assets with the heat values larger than a preset threshold value as heat data.
Further, the heat value comprises one or more of the following data: database heat value, database operation heat value, database table heat value, and database table field heat value.
Further, the determining the heat value of the data asset according to the access amount of the data asset includes: analyzing SQL operation statements in the access quantity of the data assets according to a database protocol to obtain a database, database operations, a database table and database table fields corresponding to the SQL operation statements; the database protocol is obtained from a data packet generated when the database is connected with the server; and respectively obtaining the database heat value, the database operation heat value, the database table heat value and the database table field heat value based on a database, a database operation, a database table and a database table field corresponding to the SQL operation statement.
Further, before counting the information of the data assets within the preset time period, acquiring the information of the data assets within the preset time period, including: scanning the script by using the port to obtain a scanning result; labeling the port based on the scanning result to obtain a labeled port; and collecting information of the data assets in the IT network environment within a preset time period based on the port of the tag.
Further, the sensitive information includes one or more of the following information: sensitive tables, sensitive fields, and sensitive operations.
Further, the method further comprises: and determining the data assets with the access quantity less than or equal to a preset threshold value as redundant data, and sending the redundant data to a manager.
Further, the database comprises one or more of the following information: database IP, database system name, and database port.
The invention provides a data asset management system, which comprises: the first determining module is used for counting the information of the data assets in a preset time period and determining the access amount of each data asset; wherein the data assets comprise at least one database; the second determination module is used for determining the data assets with the access quantity meeting the first condition as the heat data; the extraction module is used for extracting the sensitive information in the heat data based on a preset rule; the preset rule is that the heat data at least comprises a preset sensitive field; the judging module is used for judging whether the sensitive information meets a preset condition or not; and the protection module is used for protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule.
The invention also provides an electronic device, which comprises a memory and a processor, wherein the memory stores a computer program capable of running on the processor, and the processor realizes the data asset management method when executing the computer program.
The embodiment of the invention provides a data asset management method and a system, comprising the following steps: counting the information of the data assets in a preset time period, and determining the access amount of each data asset; determining the data assets with the access quantity meeting a first condition as heat data; extracting sensitive information in the heat data based on a preset rule; judging whether the sensitive information meets a preset condition or not; and protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule. According to the embodiment of the invention, the access amount of the data assets can be determined through the information of the data assets, the sensitive information can be extracted according to the preset rule, and the heat data corresponding to the sensitive information is protected, so that the orderliness and the efficiency of the management of the data assets are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a database asset management method provided by an embodiment of the invention;
FIG. 2 is a flowchart of step S102 in FIG. 1;
FIG. 3 is a flowchart of step S201 in FIG. 2;
fig. 4 is a block diagram of a database asset management system according to an embodiment of the present invention.
Icon:
11-a first determination module; 12-a second determination module; 13-an extraction module; 14-a judgment module; 15-protection module.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Based on the fact that the data asset management is disordered, the data asset management method and the data asset management system provided by the embodiment of the invention can determine the access amount of the data asset through the information of the data asset, and can also extract the sensitive information according to the preset rule and protect the heat data corresponding to the sensitive information, so that the orderliness and the efficiency of the data asset management are improved.
The first embodiment is as follows:
to facilitate understanding of the embodiment, first, a detailed description is given of a data asset management method disclosed in the embodiment of the present invention, and referring to fig. 1, the data asset management method may include the following steps:
step S101, counting the information of the data assets in a preset time period, and determining the access amount of each data asset; wherein the data assets include at least one database.
In an embodiment of the invention, the database comprises one or more of the following information: database IP, database system name, and database port. The access amount may include one or more of the following times: database access times, database table access times, database/data table operation times and database table field access times; the number of database accesses may be displayed after the database port and the database name, for example: 192.168.10.34 db 25000 hr 12, 192.168.10.34 db 25000 supply 15, 192.168.10.34 db 25000 account 18, 192.168.10.34 db 25000 fs 0. The number of database table accesses can be as follows: user 28, hr. offer 19, hr. health 50, supply. address 20 or supply. detail 0. User select 28 may be the number of database/table operations and user ID 28 may be the number of database table field accesses.
Step S102, determining the data assets with the access quantity meeting a first condition as heat data;
in the embodiment of the present invention, the first condition may be that the access amount is greater than a preset access threshold, and the preset access threshold is customized by a manager and assigned with a specific numerical value. For example, the preset access threshold is 3000, and the data assets with access amount larger than 3000 are determined as the heat data. Or, the first condition may be that a heat value of the data asset is determined according to the access amount, and the data asset with the heat value greater than a preset threshold is determined as the heat data. In practical applications, a part of the database is often accessed by a person skilled in the art, while another part of the database is not accessed for various reasons, in which case the frequently accessed database needs to be determined, and then the frequently accessed database needs to be protected.
Step S103, extracting sensitive information in the heat data based on a preset rule; the preset rule is that the hot data at least comprises a preset sensitive field;
in the embodiment of the invention, the preset rule is a preset extraction rule, and a manager can configure the imported preset extraction rule according to requirements. For example, the preset rule may include at least one preset sensitive field for the heat data. Wherein, presetting the sensitive field comprises: a field containing identification card information, and a field containing a fund account number. The sensitive information comprises one or more of the following information: sensitive tables, sensitive fields, and sensitive operations. User is a sensitive table, for example. The sensitive operation is delete. User prohibits the use of sensitive operations delete.
Step S104, judging whether the sensitive information meets a preset condition;
and step S105, protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule.
In the embodiment of the invention, the sensitive information meeting the preset condition and the heat data sensitivity corresponding to the sensitive information meeting the preset condition are both protected. The preset protection rules can configure the imported protection rules according to actual requirements. By analyzing the data assets, the embodiment of the invention not only can automatically identify the data assets, but also can identify the sensitive items involved in the data assets, and the sensitive items can be replaced by other items, such as: the embodiment of the invention can identify the sensitive item and set a management scheme corresponding to the sensitive item.
The embodiment of the invention provides a data asset management method, which comprises the following steps: counting the information of the data assets in a preset time period, and determining the access amount of each data asset; determining the data assets with the access quantity meeting a first condition as heat data; extracting sensitive information in the heat data based on a preset rule; judging whether the sensitive information meets a preset condition or not; and protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule. According to the embodiment of the invention, the access amount of the data assets can be determined through the information of the data assets, the sensitive information can be extracted according to the preset rule, and the heat data corresponding to the sensitive information is protected, so that the orderliness and the efficiency of the management of the data assets are improved.
Further, referring to fig. 2, step S102 may include the steps of:
step S201, determining a heat value of the data asset according to the access amount of the data asset;
step S202, determining the data assets with the heat value larger than the preset threshold value as heat data.
In the embodiment of the invention, the heat value comprises one or more of the following data: database heat value, database operation heat value, database table heat value, and database table field heat value.
Further, referring to fig. 3, the method of claim 3, the step S201 may include the steps of:
step S301, analyzing SQL operation statements in the access volume of the data assets according to a database protocol to obtain a database, database operations, database tables and database table fields corresponding to the SQL operation statements; the database protocol is obtained from a data packet generated when the database is connected with the server;
step S302, based on the database, the database operation, the database table and the database table field corresponding to the SQL operation statement, respectively obtaining a database heat value, a database operation heat value, a database table heat value and a database table field heat value.
In the embodiment of the invention, the database table of the database operation can be extracted from the database operation instruction, and a mapping relation exists between the database table and the database.
Further, before the method proceeds to step S101, the method further includes: acquiring information of data assets in a preset time period, and specifically operating as follows:
scanning the script by using the port to obtain a scanning result;
labeling the port based on the scanning result to obtain a labeled port;
the tag-based port collects information for data assets that are within a preset time period in the IT network environment.
In the embodiment of the invention, the start-stop IP address and the port range are configured in the scanning script, and the port scanning script is used for scanning the IP of the database and the port of the database. For example, the database IP is 192.168.10.211521, 192.168.10.253306, or 192.168.10.345000. The scan results include, but are not limited to, database IP, database port, and database name. Labeling a manufacturer default port issued by a database management system according to a scanning result, and then confirming the labeled port by a manager in a distributed mode; for unlabeled database ports, the administrator supplements and confirms in a distributed fashion. For example, the port for the tag may be 192.168.10.211521 oracle, 192.168.10.253306 my sql or 192.168.10.345000 db 2.
The information of the data asset is the content of the scanning result, which is also called as the information of the database, including but not limited to the database IP, the database port and the database name. The database name may refer to an application name, and in the 192.168.10.34 db 25000 Hr description, the database name may refer to Hr. The invention utilizes the mode of automatically identifying the port and manually confirming to comprehensively search the data assets in the IT network environment, thereby ensuring comprehensive and omission-proof performance.
Further, the method further comprises: and determining the data assets with the access quantity less than or equal to a preset threshold value as redundant data, and sending the redundant data to a manager.
Further, the redundant data may include: first redundant data, second redundant data, third redundant data, and fourth redundant data; determining a database with a database heat value smaller than a first preset threshold value as first redundant data; determining the database operation with the database operation heat value smaller than a second preset threshold value as second redundant data; determining the database table with the database table heat value smaller than a third preset threshold value as third redundant data; and determining the database table with the field heat value of the database table smaller than a fourth preset threshold as fourth redundant data.
In the embodiment of the present invention, the redundant data is determined according to the preset threshold, specifically, the data asset whose access amount is less than or equal to the preset threshold is determined as the redundant data by using database comparison and database table comparison, and a prompt that the data asset is the redundant data is sent to the manager, so that the manager performs corresponding processing on the redundant data according to actual requirements. For example, a hint "192.168.10.34 db 25000 fs hotness 0 might be a redundant database". The embodiment of the invention can automatically comb data assets, reduce redundant data by reducing redundant databases and redundant database tables, save storage and improve utilization rate.
The embodiment of the invention can perform corresponding operation on the analyzed different data and protect the heat data corresponding to the sensitive information, thereby improving the orderliness and efficiency of the asset management of the database, prompting the redundant data, enabling a manager to operate, saving the storage and improving the utilization rate.
Example two:
referring to fig. 4, an embodiment of the present invention provides a data asset management system, where the system includes the following modules:
the first determining module 11 is configured to count information of data assets within a preset time period, and determine an access amount of each data asset; wherein the data assets include at least one database;
a second determining module 12, configured to determine, as the heat data, the data asset whose access amount satisfies the first condition;
the extraction module 13 is used for extracting the sensitive information in the heat data based on a preset rule; the preset rule is that the hot data at least comprises a preset sensitive field;
the judging module 14 is used for judging whether the sensitive information meets the preset condition;
and the protection module 15 is configured to protect the heat data corresponding to the sensitive information meeting the preset condition according to a preset protection rule.
Further, the second determination module 12 may include the following units:
a first determining unit, configured to determine a heat value of the data asset according to an access amount of the data asset; wherein, the heat value comprises one or more of the following data: the method comprises the following steps of (1) obtaining a database heat value, a database operation heat value, a database table heat value and a database table field heat value;
and the second determining unit is used for determining the data assets with the heat values larger than the preset threshold value as heat data.
Further, the sensitive information related to the system comprises one or more of the following information: sensitive tables, sensitive fields, and sensitive operations.
Further, the first determination unit may comprise the following sub-units:
the analysis subunit is used for analyzing the SQL operation statement in the access amount of the data asset according to the database protocol to obtain a database, database operation, a database table and database table fields corresponding to the SQL operation statement; the database protocol is obtained from a data packet generated when the database is connected with the server;
and the determining subunit is used for respectively obtaining a database heat value, a database operation heat value, a database table heat value and a database table field heat value based on the database, the database operation, the database table and the database table field corresponding to the SQL operation statement.
Further, the system further includes an obtaining module, where the obtaining module is configured to obtain information of the data asset in the preset time period, and the obtaining module may include the following units:
the scanning unit is used for scanning the script by using the port to obtain a scanning result;
the label unit is used for labeling the port based on the scanning result to obtain a labeled port;
and the acquisition unit is used for acquiring the information of the data assets in the IT network environment within a preset time period based on the port of the label.
Further, the system further comprises a third determining module, wherein the third determining module is used for determining the data assets with the access quantity smaller than or equal to the preset threshold value as redundant data and sending the redundant data to the manager.
Further, the redundant data may include: first redundant data, second redundant data, third redundant data, and fourth redundant data;
further, the third determining module includes the following units:
the third determining unit is used for determining the database with the database heat value smaller than the first preset threshold value as the first redundant data;
a fourth determining unit, configured to determine, as second redundant data, a database operation whose database operation heat value is smaller than a second preset threshold;
the fifth determining unit is used for determining the database table with the database table heat value smaller than a third preset threshold value as third redundant data;
and the sixth determining unit is used for determining the database table with the field heat value of the database table smaller than a fourth preset threshold as fourth redundant data.
The embodiment of the invention provides a data asset management system which comprises a first determining module, a second determining module, an extracting module, a judging module and a protecting module. According to the embodiment of the invention, the access amount of the data assets can be determined through the first determining module, the sensitive information can be extracted according to the extracting module, and the protecting module protects the heat data corresponding to the sensitive information, so that the orderliness and the efficiency of the management of the database assets are improved.
In another embodiment of the present invention, an electronic device is further provided, which includes a memory and a processor, where the memory stores a computer program operable on the processor, and the processor executes the computer program to implement the steps of the data asset management method according to the foregoing method embodiment.
It should be noted that the above-mentioned list is only the specific embodiment of the present invention. It is obvious that the present invention is not limited to the above embodiments, but many variations are possible. All modifications which can be derived or suggested by a person skilled in the art from the disclosure of the present invention are to be considered within the scope of the invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the system described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
In the description of the present invention, it should be noted that the terms "first", "second", and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. A method for data asset management, comprising:
counting the information of the data assets in a preset time period, and determining the access amount of each data asset; wherein the data assets comprise at least one database;
determining the data assets with the access quantity meeting a first condition as heat data;
extracting sensitive information in the heat data based on a preset rule; the preset rule is that the heat data at least comprises a preset sensitive field;
judging whether the sensitive information meets a preset condition or not;
protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule;
the determining the data assets with the access quantity meeting the first condition as the heat data comprises the following steps:
determining a heat value of the data asset according to the access amount of the data asset;
determining the data assets with the heat values larger than a preset threshold value as heat data;
the heat value comprises one or more of the following data: the method comprises the following steps of (1) obtaining a database heat value, a database operation heat value, a database table heat value and a database table field heat value;
the determining the heat value of the data asset according to the access amount of the data asset comprises:
analyzing SQL operation statements in the access quantity of the data assets according to a database protocol to obtain a database, database operations, a database table and database table fields corresponding to the SQL operation statements; the database protocol is obtained from a data packet generated when the database is connected with the server;
and respectively obtaining the database heat value, the database operation heat value, the database table heat value and the database table field heat value based on a database, a database operation, a database table and a database table field corresponding to the SQL operation statement.
2. The method of claim 1, wherein obtaining the information of the data assets in the preset time period before counting the information of the data assets in the preset time period comprises:
scanning the script by using the port to obtain a scanning result;
labeling the port based on the scanning result to obtain a labeled port;
and collecting information of the data assets in the IT network environment within a preset time period based on the port of the tag.
3. The method of claim 1, wherein the sensitive information comprises one or more of the following: sensitive tables, sensitive fields, and sensitive operations.
4. The method of claim 1, further comprising: and determining the data assets with the access quantity less than or equal to a preset threshold value as redundant data, and sending the redundant data to a manager.
5. The method of claim 1, wherein the database comprises one or more of the following: database IP, database system name, and database port.
6. A data asset management system, comprising:
the first determining module is used for counting the information of the data assets in a preset time period and determining the access amount of each data asset; wherein the data assets comprise at least one database;
the second determination module is used for determining the data assets with the access quantity meeting the first condition as the heat data;
the extraction module is used for extracting the sensitive information in the heat data based on a preset rule; the preset rule is that the heat data at least comprises a preset sensitive field;
the judging module is used for judging whether the sensitive information meets a preset condition or not;
the protection module is used for protecting the heat data corresponding to the sensitive information meeting the preset conditions according to a preset protection rule;
the second determination module includes the following units:
a first determining unit, configured to determine a heat value of the data asset according to an access amount of the data asset; wherein, the heat value comprises one or more of the following data: the method comprises the following steps of (1) obtaining a database heat value, a database operation heat value, a database table heat value and a database table field heat value;
the second determining unit is used for determining the data assets with the heat values larger than the preset threshold value as heat data;
the first determination unit comprises the following sub-units:
the analysis subunit is used for analyzing the SQL operation statement in the access amount of the data asset according to the database protocol to obtain a database, database operation, a database table and database table fields corresponding to the SQL operation statement; the database protocol is obtained from a data packet generated when the database is connected with the server;
and the determining subunit is used for respectively obtaining a database heat value, a database operation heat value, a database table heat value and a database table field heat value based on the database, the database operation, the database table and the database table field corresponding to the SQL operation statement.
7. An electronic device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method according to any of claims 1 to 5 when executing the computer program.
CN201910719751.1A 2019-08-05 2019-08-05 Data asset management method and system Active CN110399749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910719751.1A CN110399749B (en) 2019-08-05 2019-08-05 Data asset management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910719751.1A CN110399749B (en) 2019-08-05 2019-08-05 Data asset management method and system

Publications (2)

Publication Number Publication Date
CN110399749A CN110399749A (en) 2019-11-01
CN110399749B true CN110399749B (en) 2021-04-23

Family

ID=68327511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910719751.1A Active CN110399749B (en) 2019-08-05 2019-08-05 Data asset management method and system

Country Status (1)

Country Link
CN (1) CN110399749B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111078996A (en) * 2019-11-12 2020-04-28 北京币世界网络科技有限公司 Block chain digital currency real-time heat monitoring method, device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899690A (en) * 2017-03-16 2017-06-27 福建星瑞格软件有限公司 Database line and protection total management system
EP3170110A4 (en) * 2014-09-17 2017-07-19 Huawei Technologies Co. Ltd. Method and system for adaptively building a column store database from a temporal row store database based on query demands
CN107194270A (en) * 2017-04-07 2017-09-22 广东精点数据科技股份有限公司 A kind of system and method for realizing data desensitization
CN107291831A (en) * 2017-05-27 2017-10-24 杭州清本科技有限公司 The data managing method and computer-readable medium of distributed data base
CN108959967A (en) * 2018-07-16 2018-12-07 杭州安恒信息技术股份有限公司 A kind of method and system of anti-database sensitive data leakage
CN109413036A (en) * 2018-09-12 2019-03-01 全球能源互联网研究院有限公司 Sensitive information outflow monitoring method, device and server extremely
CN110020553A (en) * 2019-04-12 2019-07-16 山东浪潮云信息技术有限公司 A kind of method and system for protecting sensitive data

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10339157B2 (en) * 2013-02-13 2019-07-02 Facebook, Inc. Hive table links
CN110059081A (en) * 2019-03-13 2019-07-26 深圳壹账通智能科技有限公司 Data output method, device and the computer equipment shown based on data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3170110A4 (en) * 2014-09-17 2017-07-19 Huawei Technologies Co. Ltd. Method and system for adaptively building a column store database from a temporal row store database based on query demands
CN106899690A (en) * 2017-03-16 2017-06-27 福建星瑞格软件有限公司 Database line and protection total management system
CN107194270A (en) * 2017-04-07 2017-09-22 广东精点数据科技股份有限公司 A kind of system and method for realizing data desensitization
CN107291831A (en) * 2017-05-27 2017-10-24 杭州清本科技有限公司 The data managing method and computer-readable medium of distributed data base
CN108959967A (en) * 2018-07-16 2018-12-07 杭州安恒信息技术股份有限公司 A kind of method and system of anti-database sensitive data leakage
CN109413036A (en) * 2018-09-12 2019-03-01 全球能源互联网研究院有限公司 Sensitive information outflow monitoring method, device and server extremely
CN110020553A (en) * 2019-04-12 2019-07-16 山东浪潮云信息技术有限公司 A kind of method and system for protecting sensitive data

Also Published As

Publication number Publication date
CN110399749A (en) 2019-11-01

Similar Documents

Publication Publication Date Title
CN108427705B (en) Electronic device, distributed system log query method and storage medium
CN111506559B (en) Data storage method, device, electronic equipment and storage medium
CN107169094B (en) Information aggregation method and device
CN108388675A (en) Circulation method and terminal device are drawn in a kind of identity
CN109542741B (en) Automatic log grouping storage method and device, computer equipment and storage medium
CN110502546A (en) A kind of data processing method and device
WO2019085307A1 (en) Data sampling method, terminal, and device, and computer readable storage medium
CN111198976B (en) Cloud asset association analysis system, method, electronic equipment and medium
CN111339171B (en) Data query method, device and equipment
CN104636240B (en) A kind of acquisition methods and terminal of information report
CN110147470B (en) Cross-machine-room data comparison system and method
WO2019136812A1 (en) Electronic device, data calling log generation and query method, and storage medium
US11762879B2 (en) Information traceability method and system based on blockchain
CN111061802B (en) Power data management processing method, device and storage medium
JPWO2010047170A1 (en) Calculation device, system management device, calculation method, and program
CN111488594A (en) Authority checking method and device based on cloud server, storage medium and terminal
CN110399749B (en) Data asset management method and system
CN111914101B (en) File association relationship abnormality identification method and device and computer equipment
CN110119396A (en) Data managing method and Related product
CN113553341A (en) Multidimensional data analysis method, multidimensional data analysis device, multidimensional data analysis equipment and computer readable storage medium
CN111414528B (en) Method and device for determining equipment identification, storage medium and electronic equipment
CN113076231A (en) Server application scene setting method, system, terminal and storage medium
CN112487251A (en) User ID data association method and device
CN108197253B (en) Equipment query method, device and equipment of cloud monitoring platform
CN115185778A (en) Database monitoring method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant