CN110414186B - Data asset segmentation verification method and device - Google Patents

Data asset segmentation verification method and device Download PDF

Info

Publication number
CN110414186B
CN110414186B CN201910539224.2A CN201910539224A CN110414186B CN 110414186 B CN110414186 B CN 110414186B CN 201910539224 A CN201910539224 A CN 201910539224A CN 110414186 B CN110414186 B CN 110414186B
Authority
CN
China
Prior art keywords
data asset
data
theme
asset
segmentation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910539224.2A
Other languages
Chinese (zh)
Other versions
CN110414186A (en
Inventor
吴甲城
于君泽
刘旭华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201910539224.2A priority Critical patent/CN110414186B/en
Publication of CN110414186A publication Critical patent/CN110414186A/en
Application granted granted Critical
Publication of CN110414186B publication Critical patent/CN110414186B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Multimedia (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a data asset segmentation verification method and a device, wherein the data asset segmentation verification method comprises the following steps: detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time; according to the segmentation time, segmenting the data asset corresponding to the data asset theme; and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme. According to the data asset segmentation verification method, after the data asset is segmented according to the segmentation time and the data asset theme, the segmented data asset is verified according to the data asset verification rule, so that the effectiveness and the efficiency of data asset management are improved, and the accuracy of the data asset is improved.

Description

Data asset segmentation verification method and device
Technical Field
The application relates to the technical field of data processing, in particular to a data asset segmentation verification method. The application also relates to a data asset segmentation verification device, a computing device and a computer readable storage medium.
Background
With the innovation and development of financial services, more and more financial services are developed through networks, and the integration level of the financial services is also higher and higher. Many different types of financial transactions can be handled in one financial project platform, and a third party platform is also required to be docked in the process of performing transaction processing, so that data assets are relatively scattered, and it is difficult to meet the demand of taking the number of authorities in a short time.
At present, in the face of the demand of the supervision authorities for fetching, data needs to be fetched through scattered scripts, and after the data is fetched, the data rule hidden in the fetched data needs to be understood, and a long time is required to verify whether the data in the fetched time range meets the data rule, so that the whole process is very long, difficult to maintain and manage and easy to make mistakes.
Disclosure of Invention
In view of this, the present application provides a data asset segmentation verification method. The application also relates to a data asset segmentation verification device, a computing device and a computer readable storage medium, so as to solve the technical defects in the prior art.
According to a first aspect of an embodiment of the present application, there is provided a data asset segmentation check method, including:
Detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
according to the segmentation time, segmenting the data asset corresponding to the data asset theme;
and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
Optionally, the splitting the data asset corresponding to the data asset theme according to the splitting time includes:
acquiring a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
and splitting the data asset corresponding to the data asset type according to the splitting time.
Optionally, the data asset map is constructed by:
acquiring a data asset theme collection;
acquiring a data asset type corresponding to each data asset topic in the data asset topic collection from the data asset type collection;
and constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
Optionally, after the step of constructing the data asset map of each data asset theme according to the correspondence between the data asset theme and the corresponding data asset type and the association between the data assets corresponding to the data asset types, the method further includes:
merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
Optionally, after the verifying step is performed on the data asset that has been cut according to the data asset verification rule corresponding to the data asset theme, the method further includes:
acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
and pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
Optionally, if the data asset verification rule is the data asset relevance verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the data asset integrity verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the asset traceability verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Optionally, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
checking one-to-one or one-to-many association relations of association fields among the data assets which are subjected to segmentation according to the data asset association checking rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passing, verifying the integrity of the data assets related to the business execution existing in the data assets subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme;
And if the verification result of the verification according to the data asset integrity verification rule is passing, verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
According to a second aspect of an embodiment of the present application, there is provided a data asset segmentation check device, including:
the detection module is configured to detect a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
the segmentation module is configured to segment the data asset corresponding to the data asset theme according to the segmentation time;
and the verification module is configured to verify the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
According to a third aspect of embodiments of the present application, there is provided a computing device comprising:
a memory and a processor;
the memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
According to the segmentation time, segmenting the data asset corresponding to the data asset theme;
and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
According to a fourth aspect of embodiments of the present application, there is provided a computer readable storage medium storing computer executable instructions which, when executed by a processor, implement the steps of any one of the data asset segmentation check methods.
Compared with the prior art, the application has the following advantages:
the application provides a data asset segmentation verification method, which comprises the following steps: detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time; according to the segmentation time, segmenting the data asset corresponding to the data asset theme; and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
According to the data asset segmentation verification method, the data asset corresponding to the data asset theme is segmented firstly through the data asset theme and the segmentation time carried in the data asset segmentation verification instruction, so that the data asset with a specific data asset theme and a certain time range is obtained, the effectiveness and the efficiency of data asset management are improved, and the segmented data asset is verified according to the data asset verification rule corresponding to the data asset theme, so that the accuracy of the data asset is improved.
Drawings
FIG. 1 is a flowchart of a data asset segmentation verification method provided in an embodiment of the present application;
FIG. 2 is a data asset map of a data asset topic provided by an embodiment of the present application;
FIG. 3 is a process flow diagram of a data asset segmentation check method applied to a financial project according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data asset segmentation checking device according to an embodiment of the present application;
fig. 5 is a block diagram of a computing device provided in an embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is, however, susceptible of embodiment in many other ways than those herein described and similar generalizations can be made by those skilled in the art without departing from the spirit of the application and the application is therefore not limited to the specific embodiments disclosed below.
The terminology used in one or more embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of one or more embodiments of the application. As used in this application in one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present application refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of the present application to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
In the present application, a data asset segmentation verification method is provided, and the present application relates to a data asset segmentation verification device, a computing device, and a computer readable storage medium, which are described in detail in the following embodiments one by one.
The embodiment of the data asset segmentation verification method provided by the application is as follows:
FIG. 1 illustrates a flow chart of a data asset segmentation verification method according to an embodiment of the present application, and FIG. 2 illustrates a data asset map of a data asset topic provided according to an embodiment of the present application; wherein fig. 1 includes steps S102 to S106.
Step S102, detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time.
The data asset theme refers to business scenes possibly related to financial projects, and the business scenes are various, specifically include online payment, overseas business, deposit business, loan business and the like, in practical application, one data asset theme generally corresponds to at least one data asset type, each data asset type has a corresponding data asset, and the data assets under the same data asset theme are not independent from each other but are related to each other through one or more data fields in the data asset.
The data asset types are data types under the data asset topics, each data asset topic has corresponding business data, and the data asset types can be classified into different business data types according to different types of the business data, namely, the data asset types under the data asset topics are online payment, and the data asset types under the online payment data asset topics have payment account information, order information and payment details.
The data asset is a specific data record corresponding to the data asset type, for example, the data asset comprises a payment account record corresponding to the payment account information, an order record corresponding to the order information, and a payment record corresponding to the payment detail, and the data records can be stored in the same database or different databases.
In addition, when the data asset is pulled, the data asset pulling theme and the data asset pulling type are related to the data asset theme and the data asset type corresponding to the data asset which needs to be pulled when the data asset is pulled, and the data asset pulling type refers to the data asset type corresponding to the data asset which needs to be pulled when the data asset is pulled.
The data asset segmentation check instruction refers to an instruction for performing segmentation check on a data asset corresponding to a data asset theme, specifically, the instruction carries the data asset theme and segmentation time, so as to identify which data asset corresponding to the data asset theme needs to be subjected to segmentation check with what segmentation time as an upper time limit, the instruction is usually triggered or invoked periodically, specifically, the period can be one day, one week and the like, and the period can be configured according to data volume and business requirements.
The splitting time refers to the upper time limit of splitting verification of the data asset corresponding to the data asset theme, namely: the data asset for performing the slicing verification needs to be earlier than or equal to the slicing time, for example, the slicing time is 2019/6/5 3:00, 2019/6/5 3:00 is the upper time limit, and the generation time in the data assets corresponding to the data asset theme is earlier than or equal to 2019/6/5 3:00, the ungragged data asset is sliced.
Specifically, the splitting refers to marking the data asset in the time interval corresponding to the data asset theme, and the marking modes can be various, for example, a field is set for each data asset to mark whether the splitting is completed or not, when the splitting is not completed, the field value is empty, after the splitting, the field value is marked as split, and in addition, other various marking modes are not repeated here.
Step S104, according to the segmentation time, the data asset corresponding to the data asset theme is segmented.
According to the splitting time carried in the data asset splitting verification instruction, splitting the data asset corresponding to the data asset theme refers to splitting the data asset which is generated in the data asset corresponding to the data asset theme and has the generating time earlier than or equal to the splitting time and the generating time later than the last splitting time, namely: and splitting the data assets corresponding to the data asset topics, which are generated in the data assets and have the time which is earlier than or equal to the splitting time.
Taking the detected data asset theme carried in the data asset segmentation check instruction as online payment, wherein the segmentation time is 2019/6/5 3:00 is taken as an example, the last time the data asset corresponding to the online payment data asset theme is segmented is 2019/6/43:00, then according to the slicing time 2019/6/5 3:00, earlier than or equal to 2019/6/5 3 in the data assets corresponding to the online payment data asset theme: 00, later than 2019/6/43:00, splitting the ungragged data asset, and after splitting is completed, carrying out
The online payment data asset topic corresponds to a data asset earlier than or equal to 2019/6/5 3:00, later than 2019/6/4 3: the field value in the data asset of 00 that marks whether the split is complete is updated to split.
Further, in an optional implementation manner provided in the embodiment of the present application, the splitting of the data asset corresponding to the data asset theme according to the splitting time is implemented specifically by adopting the following method:
acquiring a data asset corresponding to a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
and splitting the data asset corresponding to the data asset type according to the splitting time.
The data asset map is a map for describing a correspondence between a data asset theme and a data asset type and a relationship between data assets corresponding to the data asset type, and the data asset type corresponding to the data asset theme and the relationship between the data asset corresponding to the data asset type can be obtained according to the data asset theme.
According to the data asset segmentation verification method and device, according to the data asset topics carried in the data asset segmentation verification instructions, the data assets corresponding to the data asset topics are obtained in the data asset map rapidly, and the data asset management efficiency and the data asset segmentation verification efficiency are improved.
Further, in an optional implementation manner provided in the embodiment of the present application, the data asset map is constructed by the following manner on the basis of the data asset map obtaining a data asset corresponding to a data asset type corresponding to the data asset theme:
1) A set of data asset topics is obtained.
The data asset theme collection refers to all business scenes existing in a financial project, namely, all data asset themes existing in a financial project, for example, two types of data asset themes existing in a certain financial project are: on-line payment and savings services, the set of data asset topics is a set of two data asset topics described above.
2) And acquiring the data asset type corresponding to each data asset theme in the data asset theme set from the data asset type set.
The data asset type collection refers to a collection of existing data asset types in a financial project, such as five types of existing digital asset types in a financial project: the collection of data asset types is a collection of the five data asset types described above.
Taking the data asset theme collection and the data asset type collection as examples, the obtained data asset theme collection is an online payment and deposit service, the data asset type collection is payment account information, order information, payment details, deposit account information and deposit and withdrawal details, the data asset type corresponding to the online payment data asset theme is obtained in the data asset type collection and is payment account information, order information and payment details, and the data asset type corresponding to the deposit service data asset theme is obtained in the data asset type collection and is deposit account information and deposit and withdrawal details.
3) And constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
The association relationship between the data assets corresponding to each data asset type refers to an association relationship between the data assets corresponding to each data asset type, specifically, the association relationship between the data assets is an association relationship between data fields, further, there may be a one-to-one association relationship or a one-to-many association relationship between the data assets, where the one-to-one association relationship refers to that one data asset corresponding to a certain data asset type may be associated with a certain data field of one data asset corresponding to another data asset type through a certain data field, the one-to-many association relationship refers to that one data asset corresponding to a data asset type may be associated with a certain data field of at least one data asset corresponding to another data asset type through a certain data field, names of the data fields associated with each other may be the same or different in different data assets, for example, a payment account identifier of a user a first payment account in a payment account record corresponding to payment account information may be a001, a payment account identifier of a user a first 50 element in a payment account record corresponding to a payment account identifier of a payment account of a001, and a payment account identifier of a corresponding to a payment account identifier of a payment record corresponding to a payment account identifier of a corresponding to a payment record of a payment record corresponding to a payment identifier of a corresponding to a payment record of a corresponding identifier of a user identifier of a corresponding record.
Taking the example of constructing a data asset map for each data asset topic in the data asset topic collection, firstly, constructing a data asset map of an online payment data asset topic by using the corresponding relationship between three data asset types of payment account information, order information and payment details corresponding to the online payment data asset topic and the online payment data asset topic in the data asset type collection, the one-to-many association relationship between a payment account identification field in a payment account record corresponding to the payment account information and a payment identification field in a payment record corresponding to the payment details, and the one-to-one association relationship between an order identification field in an order record corresponding to the order information and an order identification field in a payment record corresponding to the payment details, wherein the data asset map of the online payment data asset topic is specifically shown in fig. 2, and 1: n represents a one-to-many association relationship, 1:1 represents a one-to-one association.
Then, the corresponding relation between the deposit business data asset theme in the data asset theme set and the deposit account information and deposit and withdrawal detail corresponding to the deposit business data asset theme in the data asset type set, and the corresponding relation between the deposit account identification field in the deposit account record corresponding to the deposit account information and the deposit account identification field in the deposit and withdrawal record corresponding to the deposit and withdrawal detail are 1: and (5) constructing a data asset map of the deposit business data asset theme according to the association relation of N.
In practical application, when a new data asset theme exists, the data asset type corresponding to the new data asset theme is acquired from the data asset type set according to the new data asset theme, and a data asset map of the new data asset theme is constructed according to the corresponding relation between the new data asset theme and the data asset types and the association relation between the data assets corresponding to the data asset types.
According to the embodiment of the application, the data asset types needed by the data asset topics are acquired through the data asset type set, the construction efficiency of the data asset topics is increased, the data asset map is constructed according to the corresponding relation between the data asset topics and the data asset types and the association relation between the data assets corresponding to the data asset types, so that the relation between the data assets is more visual, and the management of the data assets is facilitated.
Further, in an optional implementation manner provided in the embodiment of the present application, after the step of constructing the data asset map of each data asset topic according to the correspondence between each data asset topic and its corresponding data asset type and the association between the data assets corresponding to each data asset type, the method further includes:
Merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
Taking the online payment and deposit business data asset topics in the data asset topic collection as an example, the constructed online payment data asset topic data asset map and deposit business data asset topic data asset map are combined to construct the data asset map of the data asset topic collection.
In addition, there may be an association relationship between the data asset topics and the data asset topics, and if there is an association relationship between the data asset topics and the data asset topics, the association relationship may be added to the data asset map of the constructed data asset topic set, which is not described herein.
According to the embodiment of the application, the data asset maps of the data asset topics are combined to construct the data asset maps of the data asset topic sets, so that the relationship between the data asset topics and the data assets is more visual, and the data assets are convenient to manage.
And step S106, verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
The data asset verification rule refers to a preset verification rule of the data asset according to information such as one-to-one or one-to-many association relation of association fields among the data assets corresponding to the data asset topics, integrity among the data assets corresponding to the presence service execution association of the data asset topics, association relation among the data assets corresponding to the presence service execution sequence association of the data asset topics, and the like, and after the preset data asset verification rule is set, newly generated data records in the data asset corresponding to the data asset topics can be verified according to the preset verification rule;
if the data asset accords with the preset data asset checking rule, namely, the checking result of checking according to the data asset checking rule is passing, the abnormal data does not exist, and if the data asset does not accord with the preset data asset checking rule, namely, the checking result of checking according to the data asset checking rule is not passing, the abnormal data exists, and an error reporting prompt is output.
The integrity between the data assets related to the execution of the presence service refers to whether the data assets generated in the execution process of the service are complete, for example, the user b purchases the mobile phone online, when the user b completes the purchase, the purchase service has two steps of submitting an order and paying for the goods, a corresponding data asset is generated after the execution of the two steps is completed, the two data assets are related to the execution of the presence service, the service of the user b purchases the mobile phone online, and when the purchase is completed, the integrity between the data assets related to the execution of the presence service refers to the unavailability of two data assets, namely, an order record and a payment record, generated according to the action of the user b purchasing the mobile phone online.
The association relationship between data assets related to the existing service execution sequence refers to an association relationship between data assets generated in a service execution process, taking the service execution process of purchasing a mobile phone on line by the user b as an example, when the user b completes purchasing, the purchasing service has two steps of submitting an order and paying a goods, the two steps can generate a corresponding data asset after the execution is completed, an order record is generated first according to the execution sequence of the steps, a payment record is generated again, the two data assets are associated by an order identification field, and then the association relationship between the data assets related to the existing service execution sequence refers to an association relationship between the order record generated first and the payment record generated later according to the action of purchasing the mobile phone on line by the user b when the purchasing is completed.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset integrity verification rules, and data asset traceability verification rules.
Specifically, the preset check rule according to the one-to-one or one-to-many association relation of the association fields between the data assets corresponding to the data asset topics is a data asset association check rule, the preset check rule according to the integrity between the data assets corresponding to the presence service execution association of the data asset topics is a data asset integrity check rule, and the preset check rule according to the association relation between the data assets corresponding to the presence service execution sequence association of the data asset topics is a data asset traceability check rule.
In practical application, the data asset verification rules are various, and in the first optional implementation manner provided in the embodiment of the present application, if the data asset verification rule is the data asset relevance verification rule, and correspondingly, the data asset verification rule corresponding to the data asset theme is used for verifying the data asset after being segmented, specifically, the method is implemented as follows:
And verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Taking the data asset subject to online payment as an example, the corresponding data asset is subjected to the segmentation time 2019/6/5 3:00 is earlier than or equal to 2019/6/5 3 in the data asset theme online pays for the corresponding data asset: 00, later than 2019/6/4 3: and after the data asset of 00 is segmented, a data asset relevance verification rule corresponding to the online payment data asset theme is that a one-to-many incidence relation exists between a payment account identification field in an account payment account record and a payment identification field in a payment record, and if a one-to-one incidence relation exists between an order identification field in an order record and an order identification field in a payment record, the segmented data asset theme is verified according to the data asset relevance verification rule corresponding to the online payment data asset theme, if a one-to-many incidence relation exists between the payment account identification field in the account payment account record and the payment identification field in the payment record, the verification passes, and if the incidence relation exists between the payment account identification field in the account payment account record and the payment identification field in the payment record, or if the incidence relation exists between the order identification field in the order record and the order identification field in the order record, the verification fails, abnormal data is indicated, and error reporting information is output.
According to the embodiment of the application, the relevance of the data assets is checked, so that abnormal data assets can be found conveniently, the relevance of the data assets is ensured, and the accuracy of the data assets is improved.
In a second optional implementation manner provided in this embodiment of the present application, if the data asset verification rule is the data asset integrity verification rule, and correspondingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme is implemented specifically by adopting the following method:
and verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Taking the data asset subject of online payment as an example, the time for purchasing a mobile phone online by the user b is 2019/6/5 2:30, in case the purchase is completed by the user b, according to the cut time 2019/6/5 3:00 is earlier than or equal to 2019/6/5 3 in the data asset theme online pays for the corresponding data asset: 00, later than 2019/6/4 3: after 00 data assets are segmented, a user B purchases on line whether field values of the data assets corresponding to the mobile phone, which are marked to be segmented, are updated to segmented values;
And checking the integrity of the order record and the payment record generated by the online buying mobile phone of the user B according to the data asset integrity checking rule corresponding to the online buying data asset theme, if the two data records exist in the data asset, checking to pass, if at least one record does not exist in the order record or the payment record, checking to not pass, indicating that abnormal data exists, and outputting error reporting information.
According to the embodiment of the application, the integrity of the data asset is checked, so that abnormal data assets can be found conveniently, the integrity of the data asset is ensured, and the accuracy of the data asset is improved.
In a third optional implementation manner provided in this embodiment of the present application, if the data asset verification rule is the asset traceability verification rule, and correspondingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme is implemented specifically by adopting the following method:
And verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Taking checking the order record and the payment record generated by the online purchasing mobile phone of the user B as an example, under the condition that the user B completes purchasing, the data asset traceability checking rule corresponding to the online purchasing data asset theme is that the order record and the payment record which are related in the order execution sequence exist and are related by an order identification field, if the order record and the payment record which are related in the order execution sequence exist between the order record and the payment record generated by the online purchasing mobile phone of the user B are related in the order execution sequence, the association relation between the order record and the payment record generated by the online purchasing mobile phone of the user B is checked according to the data asset traceability checking rule corresponding to the online purchasing data asset theme, if the order record and the payment record exist and are related by the order identification field, the checking is passed, if at least one record does not exist, or the two records cannot be related by the order identification field, the checking is failed, the abnormal data exists, and the error reporting information is output.
According to the embodiment of the application, the data asset traceability verification rule is verified on the data asset, so that the abnormal data asset can be found conveniently, the continuity of the data asset is guaranteed, and the accuracy of the data asset is improved.
In practical application, the data asset verification rule may be a set of multiple verification rules, in this case, the data asset needs to be verified from different sides sequentially according to a preset verification sequence of the verification rule, and in the fourth optional implementation manner provided in the embodiment of the present application, the verification of the data asset after the segmentation is performed according to the data asset verification rule corresponding to the data asset theme is implemented specifically by adopting the following method:
checking one-to-one or one-to-many association relations of association fields among the data assets which are subjected to segmentation according to the data asset association checking rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passed, indicating that relevance abnormal data does not exist, checking the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity checking rule corresponding to the data asset theme;
If the verification result of the verification according to the data asset relevance verification rule is not passed, indicating that relevance abnormal data exist, and outputting an error reporting prompt;
if the verification result of the verification according to the data asset integrity verification rule is that the verification result is that the integrity abnormal data does not exist, verifying the association relationship between the data assets with business execution sequence association in the data assets which are subjected to segmentation according to the data asset traceability verification rule corresponding to the data asset theme;
if the checking result of the checking according to the data asset integrity checking rule is not passed, indicating that the integrity abnormal data exists, and outputting an error reporting prompt;
if the verification result of the verification according to the data asset traceability verification rule is passed, the fact that traceability abnormal data does not exist is indicated, and the verification is completed;
and if the verification result of the data asset traceability verification rule is not passed, indicating that traceability abnormal data exist, and outputting an error reporting prompt.
The verification process of the embodiment of the present application is similar to the above-mentioned process of performing data asset relevance verification rule verification, data asset integrity verification rule verification and data asset traceability verification rule verification on the data asset, and the specific implementation is referred to the above-mentioned verification process, and will not be described herein.
According to the embodiment of the application, the data asset relevance verification rule verification, the data asset integrity verification rule verification and the data asset traceability verification rule verification are carried out on the data asset, so that abnormal data assets can be found conveniently, relevance, integrity and continuity of the data asset are guaranteed, and accuracy of the data asset is improved.
In addition, a need for pulling a data asset under some data asset topics may be faced, and in an alternative implementation manner provided in the embodiment of the present application, after performing the verification step on the data asset that has been subjected to segmentation according to the data asset verification rule corresponding to the data asset topic, the method further includes:
1) And acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval.
The pulling refers to pulling the data asset corresponding to the data asset pulling subject, and in practical application, the corresponding data asset which is required to be pulled according to the requirement of the supervision party is provided for the supervision party to supervise.
The data asset pulling time interval refers to a pulling time range of a data asset corresponding to a data asset pulling subject, for example, the data asset pulling time interval is 2019/5/5 3:00 to 2019/6/5 3:00, pulling the data asset corresponding to the theme from the data asset at a later time than or equal to 2019/5/5 3:00 and earlier than or equal to 2019/6/5 3: data assets between 00 are pulled.
The data asset pulling instruction refers to an instruction for pulling a data asset corresponding to a data asset pulling subject according to the requirement of a supervisor, and specifically, the instruction carries the data asset pulling subject and a data asset pulling time interval, so as to identify which data asset corresponding to the data asset subject in which time interval is specifically required to be pulled.
2) And acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction.
3) And pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
In practical applications, data assets corresponding to different data asset pulling types may be stored in different databases, and the types of the databases may also be various, such as an Oracle database, a DB2 database, etc., so that it is required to obtain access interfaces of the databases corresponding to the data asset pulling types according to the data asset pulling types, and then pull data assets corresponding to the data pulling types in the databases according to the obtained access interfaces of the databases.
Taking the online payment as an example of the data asset pulling theme, the obtained data asset pulling theme carried in the data asset pulling instruction is online payment, and the data asset pulling time interval is 2019/5/53:00 to 2019/6/5 3:00, firstly, according to an online payment data asset pulling theme carried in a data asset pulling instruction, the obtained data asset pulling type under the online payment data asset pulling theme is payment account information, order information and payment details, and secondly, according to a data asset pulling time interval of 2019/5/53:00 to 2019/6/5 3:00, respectively pulling the data asset pulling types from databases corresponding to payment account information, order information and payment details at a later time than or equal to 2019/5/53:00 and earlier than or equal to 2019/6/5 3: and (3) taking the corresponding payment account record, order record and payment record in the time period of 00 as data to be supervised provided to the supervision party.
In addition, an access interface or an access interface can be set according to different data asset pulling topics, and a user selects a data asset corresponding to the data asset pulling topic to be pulled through the provided access interface or access interface, so that browsing or obtaining of the data asset is performed, and details are omitted.
According to the embodiment of the application, after the data asset theme is subjected to segmentation verification, the data asset required by the supervisory party is pulled, so that the efficiency of pulling the data asset is improved, and the accuracy of the pulled data asset is improved.
The following description will further explain the data asset segmentation verification method by taking the application of the data asset segmentation verification method provided in the present application to financial projects as an example, where the data asset segmentation verification method specifically includes steps S302 to S316.
In step S302, in the financial project, a data asset segmentation check instruction is detected, where the data asset segmentation check instruction includes a data asset theme and a segmentation time.
And step S304, cutting the data asset corresponding to the data asset theme according to the cutting time.
Step S306, according to the data asset relevance verification rule corresponding to the data asset theme, verifying the one-to-one or one-to-many relevance of the relevance fields between the data assets which have been subjected to segmentation.
Step S308, if the verification result of the verification according to the data asset relevance verification rule is passed, the integrity of the data assets related to the business execution existing in the data assets which are subjected to segmentation is verified according to the data asset integrity verification rule corresponding to the data asset theme.
And step S310, if the verification result of the verification according to the data asset integrity verification rule is passed, verifying the association relationship between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Step S312, a data asset pulling instruction is obtained, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval.
Step S314, according to the data asset pulling theme carried in the data asset pulling instruction, the data asset pulling type corresponding to the data asset pulling theme is obtained.
Step S316, according to the data asset pulling time interval carried in the data asset pulling instruction, pulling the corresponding data asset in the database corresponding to the data asset pulling type, and taking the data asset as the data asset to be supervised submitted to the supervision party.
In summary, according to the data asset segmentation verification method provided by the application, the data asset subject and the segmentation time carried in the data asset segmentation verification instruction are used for firstly segmenting the data asset corresponding to the data asset subject, so that the data asset with a specific data asset subject and a certain time range is obtained, the effectiveness and the efficiency of data asset management are improved, and the segmented data asset is verified according to the data asset verification rule corresponding to the data asset subject, so that the accuracy of the data asset is improved.
The embodiment of the data asset segmentation verification device provided by the application is as follows:
corresponding to the method embodiment, the application further provides a data asset segmentation check device embodiment, and fig. 4 shows a schematic structural diagram of the data asset segmentation check device of the application embodiment. As shown in fig. 4, the apparatus includes:
a detection module 402 configured to detect a data asset segmentation check instruction, the data asset segmentation check instruction comprising a data asset topic and a segmentation time;
the segmentation module 404 is configured to segment the data asset corresponding to the data asset theme according to the segmentation time;
and the verification module 406 is configured to verify the data asset which has been subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
Optionally, the segmentation module 404 includes:
the data asset type acquisition sub-module is configured to acquire a data asset type corresponding to the data asset theme in a data asset map according to the data asset theme;
and the segmentation module is configured to segment the data asset corresponding to the data asset type according to the segmentation time.
Optionally, the data asset map is constructed by running the following modules:
the data asset theme collection acquisition module is configured to acquire a data asset theme collection;
the system comprises a data asset type acquisition module, a data asset type acquisition module and a data asset type generation module, wherein the data asset type acquisition module is configured to acquire a data asset type corresponding to each data asset topic in a data asset topic set in the data asset type set;
the data asset map module is used for constructing the data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the association relation between the data assets corresponding to each data asset type.
Optionally, the data asset segmentation verification device further includes:
a merge map module configured to merge the data asset maps of each data asset topic to construct a data asset map of the set of data asset topics.
Optionally, the data asset segmentation verification device further includes:
the acquisition instruction module is configured to acquire a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
The data asset pulling type acquisition module is configured to acquire a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
and the pulling module is configured to pull the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and the data asset is used as the data asset to be monitored, which is submitted to the monitor.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
Optionally, the verification module 406 is specifically configured to: and verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Optionally, the verification module 406 is specifically configured to: and verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Optionally, the verification module 406 is specifically configured to: and verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Optionally, the verification module 406 includes:
the relevance verification sub-module is configured to verify the one-to-one or one-to-many relevance relation of the relevance fields between the data assets which are subjected to segmentation according to the data asset relevance verification rule corresponding to the data asset theme;
an integrity verification sub-module, configured to verify the integrity of the data assets related to the business execution existing in the data assets subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset subject if the verification result of the verification according to the data asset relevance verification rule is passed;
and the traceability verification sub-module is configured to verify the association relationship between the data assets with business execution sequence association in the segmented data assets according to the traceability verification rule of the data asset corresponding to the data asset subject if the verification result of the verification according to the integrity verification rule of the data asset is passed.
The foregoing is a schematic scheme of a data asset segmentation check device of this embodiment. It should be noted that, the technical solution of the data asset segmentation and verification device and the technical solution of the data asset segmentation and verification method belong to the same concept, and details of the technical solution of the data asset segmentation and verification device which are not described in detail can be referred to the description of the technical solution of the data asset segmentation and verification method.
An embodiment of a computing device provided herein is as follows:
fig. 5 illustrates a block diagram of a computing device 500, according to an embodiment of the present application. The components of the computing device 500 include, but are not limited to, a memory 510 and a processor 520. Processor 520 is coupled to memory 510 via bus 530 and database 550 is used to hold data.
Computing device 500 also includes access device 540, access device 540 enabling computing device 500 to communicate via one or more networks 560. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. The access device 540 may include one or more of any type of network interface, wired or wireless (e.g., a Network Interface Card (NIC)), such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present application, the other components of computing device 500 described above and not shown in FIG. 5 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 5 is for exemplary purposes only and is not intended to limit the scope of the present application. Those skilled in the art may add or replace other components as desired.
Computing device 500 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 500 may also be a mobile or stationary server.
The present application provides a computing device comprising a memory 510, a processor 520, and computer instructions stored on the memory and executable on the processor, the processor 520 for executing computer executable instructions to:
detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
According to the segmentation time, segmenting the data asset corresponding to the data asset theme;
and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
Optionally, the splitting the data asset corresponding to the data asset theme according to the splitting time includes:
acquiring a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
and splitting the data asset corresponding to the data asset type according to the splitting time.
Optionally, the data asset map is constructed by:
acquiring a data asset theme collection;
acquiring a data asset type corresponding to each data asset topic in the data asset topic collection from the data asset type collection;
and constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
Optionally, after the data asset map instruction of each data asset theme is constructed according to the corresponding relationship between the data asset theme and the corresponding data asset type and the association relationship between the data assets corresponding to the data asset types, the method further includes:
Merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
Optionally, after the verifying step is performed on the data asset that has been cut according to the data asset verification rule corresponding to the data asset theme, the method further includes:
acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
and pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
Optionally, if the data asset verification rule is the data asset relevance verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
And verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the data asset integrity verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the asset traceability verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Optionally, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
checking one-to-one or one-to-many association relations of association fields among the data assets which are subjected to segmentation according to the data asset association checking rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passing, verifying the integrity of the data assets related to the business execution existing in the data assets subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme;
and if the verification result of the verification according to the data asset integrity verification rule is passing, verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
The foregoing is a schematic illustration of a computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the data asset segmentation verification method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the data asset segmentation verification method.
An embodiment of a computer readable storage medium provided in the present application is as follows:
the present application provides a computer readable storage medium storing computer instructions that when executed by a processor are configured to:
detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
according to the segmentation time, segmenting the data asset corresponding to the data asset theme;
and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
Optionally, the splitting the data asset corresponding to the data asset theme according to the splitting time includes:
acquiring a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
and splitting the data asset corresponding to the data asset type according to the splitting time.
Optionally, the data asset map is constructed by:
acquiring a data asset theme collection;
acquiring a data asset type corresponding to each data asset topic in the data asset topic collection from the data asset type collection;
And constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
Optionally, after the step of constructing the data asset map of each data asset theme according to the correspondence between the data asset theme and the corresponding data asset type and the association between the data assets corresponding to the data asset types, the method further includes:
merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
Optionally, after the verifying step is performed on the data asset that has been cut according to the data asset verification rule corresponding to the data asset theme, the method further includes:
acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
And pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
Optionally, if the data asset verification rule is the data asset relevance verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the data asset integrity verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
And verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the asset traceability verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Optionally, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
checking one-to-one or one-to-many association relations of association fields among the data assets which are subjected to segmentation according to the data asset association checking rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passing, verifying the integrity of the data assets related to the business execution existing in the data assets subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme;
And if the verification result of the verification according to the data asset integrity verification rule is passing, verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the data asset segmentation verification method belong to the same concept, and details of the technical solution of the storage medium which are not described in detail can be referred to the description of the technical solution of the data asset segmentation verification method.
The foregoing describes specific embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for the sake of simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all necessary for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The above-disclosed preferred embodiments of the present application are provided only as an aid to the elucidation of the present application. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of this application. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This application is to be limited only by the claims and the full scope and equivalents thereof.

Claims (13)

1. A data asset segmentation verification method, comprising:
detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
marking data assets corresponding to the data asset topics in the database according to the segmentation time;
and verifying the marked data asset according to the data asset verification rule corresponding to the data asset theme, and pulling the verified data asset.
2. The method for verifying the segmentation of the data asset according to claim 1, wherein marking the data asset corresponding to the data asset subject in the database according to the segmentation time comprises:
acquiring a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
marking the data assets corresponding to the data asset types in the database according to the segmentation time.
3. The data asset segmentation verification method of claim 2, wherein the data asset map is constructed by:
acquiring a data asset theme collection;
acquiring a data asset type corresponding to each data asset topic in the data asset topic collection from the data asset type collection;
and constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
4. The method for verifying the segmentation of data assets according to claim 3, wherein the step of constructing a data asset map of each data asset topic according to the correspondence between the data asset topic and the corresponding data asset type and the association between the data assets corresponding to each data asset type further comprises:
Merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
5. The method for verifying the segmentation of the data asset according to claim 1, wherein after the step of verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme is performed, the method further comprises:
acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
and pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
6. The data asset segmentation verification method of claim 1, wherein the data asset verification rules comprise at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
7. The method of claim 6, wherein if the data asset verification rule is the data asset relevance verification rule, and the verifying the marked data asset according to the data asset verification rule corresponding to the data asset theme comprises:
and verifying the one-to-one or one-to-many association relation of the association fields between the marked data assets according to the data asset association verification rule corresponding to the data asset theme.
8. The method of claim 6, wherein if the data asset verification rule is the data asset integrity verification rule, and the verifying the marked data asset according to the data asset verification rule corresponding to the data asset theme comprises:
and verifying the integrity of the data assets related to business execution in the marked data assets according to the data asset integrity verification rule corresponding to the data asset theme.
9. The method for data asset segmentation and verification according to claim 6, wherein if the data asset verification rule is the asset traceability verification rule, and correspondingly, the verifying the marked data asset according to the data asset verification rule corresponding to the data asset theme comprises:
And verifying the association relation between the data assets with business execution sequence association in the marked data assets according to the data asset traceability verification rule corresponding to the data asset theme.
10. The method for verifying the segmentation of the data asset according to claim 6, wherein verifying the marked data asset according to the data asset verification rule corresponding to the data asset theme comprises:
verifying one-to-one or one-to-many association relations of association fields among the marked data assets according to the data asset association verification rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passing, verifying the integrity of the data assets which are related to the business execution in the marked data assets according to the data asset integrity verification rule corresponding to the data asset theme;
and if the verification result of the verification according to the data asset integrity verification rule is passing, verifying the association relation between the data assets with business execution sequence association in the marked data assets according to the data asset traceability verification rule corresponding to the data asset theme.
11. A data asset segmentation verification device, comprising:
the detection module is configured to detect a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
the segmentation module is configured to mark the data assets corresponding to the data asset topics in the database according to the segmentation time;
and the verification module is configured to verify the marked data asset according to the data asset verification rule corresponding to the data asset theme and pull the verified data asset.
12. A computing device, comprising:
a memory and a processor;
the memory is for storing computer-executable instructions, and the processor is for executing the computer-executable instructions:
detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
marking data assets corresponding to the data asset topics in the database according to the segmentation time;
and verifying the marked data asset according to the data asset verification rule corresponding to the data asset theme, and pulling the verified data asset.
13. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the data asset segmentation check method of any one of claims 1 to 10.
CN201910539224.2A 2019-06-20 2019-06-20 Data asset segmentation verification method and device Active CN110414186B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910539224.2A CN110414186B (en) 2019-06-20 2019-06-20 Data asset segmentation verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910539224.2A CN110414186B (en) 2019-06-20 2019-06-20 Data asset segmentation verification method and device

Publications (2)

Publication Number Publication Date
CN110414186A CN110414186A (en) 2019-11-05
CN110414186B true CN110414186B (en) 2023-06-30

Family

ID=68359436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910539224.2A Active CN110414186B (en) 2019-06-20 2019-06-20 Data asset segmentation verification method and device

Country Status (1)

Country Link
CN (1) CN110414186B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165538A1 (en) * 2015-04-13 2016-10-20 阿里巴巴集团控股有限公司 Address data management method and device
CN108280767A (en) * 2017-08-28 2018-07-13 平安科技(深圳)有限公司 Method, apparatus, storage medium and the terminal of list cutting
CN109214906A (en) * 2018-11-01 2019-01-15 山东浪潮商用系统有限公司 Tax data assets classes management method and system based on the layering of big data warehouse
CN109299074A (en) * 2018-10-30 2019-02-01 珠海伟诚科技股份有限公司 A kind of data verification method and system based on templating data base view
CN109325862A (en) * 2018-09-25 2019-02-12 北京京东金融科技控股有限公司 Assets disposition method and device, storage medium and electronic equipment
CN109600373A (en) * 2018-12-11 2019-04-09 深圳市网心科技有限公司 A kind of live data transmission method, device, system and readable storage medium storing program for executing

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001288644A1 (en) * 2000-09-01 2002-04-08 International Interactive Commerce, Ltd. System, method, uses, products, program products, and business methods for distributed internet and distributed network services
CN100550021C (en) * 2007-10-12 2009-10-14 中兴通讯股份有限公司 The method of calibration of resource file and system
CN107819743B (en) * 2017-10-24 2021-04-02 中国平安财产保险股份有限公司 Resource access control method and terminal equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165538A1 (en) * 2015-04-13 2016-10-20 阿里巴巴集团控股有限公司 Address data management method and device
CN108280767A (en) * 2017-08-28 2018-07-13 平安科技(深圳)有限公司 Method, apparatus, storage medium and the terminal of list cutting
CN109325862A (en) * 2018-09-25 2019-02-12 北京京东金融科技控股有限公司 Assets disposition method and device, storage medium and electronic equipment
CN109299074A (en) * 2018-10-30 2019-02-01 珠海伟诚科技股份有限公司 A kind of data verification method and system based on templating data base view
CN109214906A (en) * 2018-11-01 2019-01-15 山东浪潮商用系统有限公司 Tax data assets classes management method and system based on the layering of big data warehouse
CN109600373A (en) * 2018-12-11 2019-04-09 深圳市网心科技有限公司 A kind of live data transmission method, device, system and readable storage medium storing program for executing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谌迅 ; .大数据资产管理系统的设计与实现.软件.2016,(第02期),第58-61页. *

Also Published As

Publication number Publication date
CN110414186A (en) 2019-11-05

Similar Documents

Publication Publication Date Title
CN110352425B (en) Cognitive regulatory compliance automation for blockchain transactions
CN109344170B (en) Stream data processing method, system, electronic device and readable storage medium
CN110659318A (en) Big data based strategy pushing method and system and computer equipment
CN112990281A (en) Abnormal bid identification model training method, abnormal bid identification method and abnormal bid identification device
CN112799722A (en) Command recognition method, device, equipment and storage medium
CN114418714A (en) 5G base station operation and maintenance management system and method
CN111367531A (en) Code processing method and device
CN115774707B (en) Object attribute-based data processing method and device, electronic equipment and storage medium
CN110414186B (en) Data asset segmentation verification method and device
CN112000862A (en) Data processing method and device
CN111639903A (en) Review processing method for architecture change and related equipment
CN107016028A (en) Data processing method and its equipment
CN115983902A (en) Information pushing method and system based on user real-time event
CN111427900B (en) Label library updating method, device, equipment and readable storage medium
CN114581130A (en) Bank website number assigning method and device based on customer portrait and storage medium
CN113052509A (en) Model evaluation method, model evaluation apparatus, electronic device, and storage medium
CN113450208A (en) Loan risk change early warning and model training method and device
CN112286976A (en) Order processing method, device, equipment and storage medium
CN111611099A (en) Method, device, equipment and storage medium for repairing lost user information
CN110765006A (en) Flow testing method and device, computer readable storage medium and electronic device
CN118134665A (en) Automated metering method, apparatus, device, medium and program product
CN113744066A (en) Information pushing method and device
CN115617462A (en) Test script generation method, device, equipment and storage medium
CN114553684A (en) Network operation and maintenance method, device, computer equipment and storage medium
CN114648206A (en) Organization process management method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201010

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201010

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant