Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is, however, susceptible of embodiment in many other ways than those herein described and similar generalizations can be made by those skilled in the art without departing from the spirit of the application and the application is therefore not limited to the specific embodiments disclosed below.
The terminology used in one or more embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of one or more embodiments of the application. As used in this application in one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present application refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of the present application to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
In the present application, a data asset segmentation verification method is provided, and the present application relates to a data asset segmentation verification device, a computing device, and a computer readable storage medium, which are described in detail in the following embodiments one by one.
The embodiment of the data asset segmentation verification method provided by the application is as follows:
FIG. 1 illustrates a flow chart of a data asset segmentation verification method according to an embodiment of the present application, and FIG. 2 illustrates a data asset map of a data asset topic provided according to an embodiment of the present application; wherein fig. 1 includes steps S102 to S106.
Step S102, detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time.
The data asset theme refers to business scenes possibly related to financial projects, and the business scenes are various, specifically include online payment, overseas business, deposit business, loan business and the like, in practical application, one data asset theme generally corresponds to at least one data asset type, each data asset type has a corresponding data asset, and the data assets under the same data asset theme are not independent from each other but are related to each other through one or more data fields in the data asset.
The data asset types are data types under the data asset topics, each data asset topic has corresponding business data, and the data asset types can be classified into different business data types according to different types of the business data, namely, the data asset types under the data asset topics are online payment, and the data asset types under the online payment data asset topics have payment account information, order information and payment details.
The data asset is a specific data record corresponding to the data asset type, for example, the data asset comprises a payment account record corresponding to the payment account information, an order record corresponding to the order information, and a payment record corresponding to the payment detail, and the data records can be stored in the same database or different databases.
In addition, when the data asset is pulled, the data asset pulling theme and the data asset pulling type are related to the data asset theme and the data asset type corresponding to the data asset which needs to be pulled when the data asset is pulled, and the data asset pulling type refers to the data asset type corresponding to the data asset which needs to be pulled when the data asset is pulled.
The data asset segmentation check instruction refers to an instruction for performing segmentation check on a data asset corresponding to a data asset theme, specifically, the instruction carries the data asset theme and segmentation time, so as to identify which data asset corresponding to the data asset theme needs to be subjected to segmentation check with what segmentation time as an upper time limit, the instruction is usually triggered or invoked periodically, specifically, the period can be one day, one week and the like, and the period can be configured according to data volume and business requirements.
The splitting time refers to the upper time limit of splitting verification of the data asset corresponding to the data asset theme, namely: the data asset for performing the slicing verification needs to be earlier than or equal to the slicing time, for example, the slicing time is 2019/6/5 3:00, 2019/6/5 3:00 is the upper time limit, and the generation time in the data assets corresponding to the data asset theme is earlier than or equal to 2019/6/5 3:00, the ungragged data asset is sliced.
Specifically, the splitting refers to marking the data asset in the time interval corresponding to the data asset theme, and the marking modes can be various, for example, a field is set for each data asset to mark whether the splitting is completed or not, when the splitting is not completed, the field value is empty, after the splitting, the field value is marked as split, and in addition, other various marking modes are not repeated here.
Step S104, according to the segmentation time, the data asset corresponding to the data asset theme is segmented.
According to the splitting time carried in the data asset splitting verification instruction, splitting the data asset corresponding to the data asset theme refers to splitting the data asset which is generated in the data asset corresponding to the data asset theme and has the generating time earlier than or equal to the splitting time and the generating time later than the last splitting time, namely: and splitting the data assets corresponding to the data asset topics, which are generated in the data assets and have the time which is earlier than or equal to the splitting time.
Taking the detected data asset theme carried in the data asset segmentation check instruction as online payment, wherein the segmentation time is 2019/6/5 3:00 is taken as an example, the last time the data asset corresponding to the online payment data asset theme is segmented is 2019/6/43:00, then according to the slicing time 2019/6/5 3:00, earlier than or equal to 2019/6/5 3 in the data assets corresponding to the online payment data asset theme: 00, later than 2019/6/43:00, splitting the ungragged data asset, and after splitting is completed, carrying out
The online payment data asset topic corresponds to a data asset earlier than or equal to 2019/6/5 3:00, later than 2019/6/4 3: the field value in the data asset of 00 that marks whether the split is complete is updated to split.
Further, in an optional implementation manner provided in the embodiment of the present application, the splitting of the data asset corresponding to the data asset theme according to the splitting time is implemented specifically by adopting the following method:
acquiring a data asset corresponding to a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
and splitting the data asset corresponding to the data asset type according to the splitting time.
The data asset map is a map for describing a correspondence between a data asset theme and a data asset type and a relationship between data assets corresponding to the data asset type, and the data asset type corresponding to the data asset theme and the relationship between the data asset corresponding to the data asset type can be obtained according to the data asset theme.
According to the data asset segmentation verification method and device, according to the data asset topics carried in the data asset segmentation verification instructions, the data assets corresponding to the data asset topics are obtained in the data asset map rapidly, and the data asset management efficiency and the data asset segmentation verification efficiency are improved.
Further, in an optional implementation manner provided in the embodiment of the present application, the data asset map is constructed by the following manner on the basis of the data asset map obtaining a data asset corresponding to a data asset type corresponding to the data asset theme:
1) A set of data asset topics is obtained.
The data asset theme collection refers to all business scenes existing in a financial project, namely, all data asset themes existing in a financial project, for example, two types of data asset themes existing in a certain financial project are: on-line payment and savings services, the set of data asset topics is a set of two data asset topics described above.
2) And acquiring the data asset type corresponding to each data asset theme in the data asset theme set from the data asset type set.
The data asset type collection refers to a collection of existing data asset types in a financial project, such as five types of existing digital asset types in a financial project: the collection of data asset types is a collection of the five data asset types described above.
Taking the data asset theme collection and the data asset type collection as examples, the obtained data asset theme collection is an online payment and deposit service, the data asset type collection is payment account information, order information, payment details, deposit account information and deposit and withdrawal details, the data asset type corresponding to the online payment data asset theme is obtained in the data asset type collection and is payment account information, order information and payment details, and the data asset type corresponding to the deposit service data asset theme is obtained in the data asset type collection and is deposit account information and deposit and withdrawal details.
3) And constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
The association relationship between the data assets corresponding to each data asset type refers to an association relationship between the data assets corresponding to each data asset type, specifically, the association relationship between the data assets is an association relationship between data fields, further, there may be a one-to-one association relationship or a one-to-many association relationship between the data assets, where the one-to-one association relationship refers to that one data asset corresponding to a certain data asset type may be associated with a certain data field of one data asset corresponding to another data asset type through a certain data field, the one-to-many association relationship refers to that one data asset corresponding to a data asset type may be associated with a certain data field of at least one data asset corresponding to another data asset type through a certain data field, names of the data fields associated with each other may be the same or different in different data assets, for example, a payment account identifier of a user a first payment account in a payment account record corresponding to payment account information may be a001, a payment account identifier of a user a first 50 element in a payment account record corresponding to a payment account identifier of a payment account of a001, and a payment account identifier of a corresponding to a payment account identifier of a payment record corresponding to a payment account identifier of a corresponding to a payment record of a payment record corresponding to a payment identifier of a corresponding to a payment record of a corresponding identifier of a user identifier of a corresponding record.
Taking the example of constructing a data asset map for each data asset topic in the data asset topic collection, firstly, constructing a data asset map of an online payment data asset topic by using the corresponding relationship between three data asset types of payment account information, order information and payment details corresponding to the online payment data asset topic and the online payment data asset topic in the data asset type collection, the one-to-many association relationship between a payment account identification field in a payment account record corresponding to the payment account information and a payment identification field in a payment record corresponding to the payment details, and the one-to-one association relationship between an order identification field in an order record corresponding to the order information and an order identification field in a payment record corresponding to the payment details, wherein the data asset map of the online payment data asset topic is specifically shown in fig. 2, and 1: n represents a one-to-many association relationship, 1:1 represents a one-to-one association.
Then, the corresponding relation between the deposit business data asset theme in the data asset theme set and the deposit account information and deposit and withdrawal detail corresponding to the deposit business data asset theme in the data asset type set, and the corresponding relation between the deposit account identification field in the deposit account record corresponding to the deposit account information and the deposit account identification field in the deposit and withdrawal record corresponding to the deposit and withdrawal detail are 1: and (5) constructing a data asset map of the deposit business data asset theme according to the association relation of N.
In practical application, when a new data asset theme exists, the data asset type corresponding to the new data asset theme is acquired from the data asset type set according to the new data asset theme, and a data asset map of the new data asset theme is constructed according to the corresponding relation between the new data asset theme and the data asset types and the association relation between the data assets corresponding to the data asset types.
According to the embodiment of the application, the data asset types needed by the data asset topics are acquired through the data asset type set, the construction efficiency of the data asset topics is increased, the data asset map is constructed according to the corresponding relation between the data asset topics and the data asset types and the association relation between the data assets corresponding to the data asset types, so that the relation between the data assets is more visual, and the management of the data assets is facilitated.
Further, in an optional implementation manner provided in the embodiment of the present application, after the step of constructing the data asset map of each data asset topic according to the correspondence between each data asset topic and its corresponding data asset type and the association between the data assets corresponding to each data asset type, the method further includes:
Merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
Taking the online payment and deposit business data asset topics in the data asset topic collection as an example, the constructed online payment data asset topic data asset map and deposit business data asset topic data asset map are combined to construct the data asset map of the data asset topic collection.
In addition, there may be an association relationship between the data asset topics and the data asset topics, and if there is an association relationship between the data asset topics and the data asset topics, the association relationship may be added to the data asset map of the constructed data asset topic set, which is not described herein.
According to the embodiment of the application, the data asset maps of the data asset topics are combined to construct the data asset maps of the data asset topic sets, so that the relationship between the data asset topics and the data assets is more visual, and the data assets are convenient to manage.
And step S106, verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
The data asset verification rule refers to a preset verification rule of the data asset according to information such as one-to-one or one-to-many association relation of association fields among the data assets corresponding to the data asset topics, integrity among the data assets corresponding to the presence service execution association of the data asset topics, association relation among the data assets corresponding to the presence service execution sequence association of the data asset topics, and the like, and after the preset data asset verification rule is set, newly generated data records in the data asset corresponding to the data asset topics can be verified according to the preset verification rule;
if the data asset accords with the preset data asset checking rule, namely, the checking result of checking according to the data asset checking rule is passing, the abnormal data does not exist, and if the data asset does not accord with the preset data asset checking rule, namely, the checking result of checking according to the data asset checking rule is not passing, the abnormal data exists, and an error reporting prompt is output.
The integrity between the data assets related to the execution of the presence service refers to whether the data assets generated in the execution process of the service are complete, for example, the user b purchases the mobile phone online, when the user b completes the purchase, the purchase service has two steps of submitting an order and paying for the goods, a corresponding data asset is generated after the execution of the two steps is completed, the two data assets are related to the execution of the presence service, the service of the user b purchases the mobile phone online, and when the purchase is completed, the integrity between the data assets related to the execution of the presence service refers to the unavailability of two data assets, namely, an order record and a payment record, generated according to the action of the user b purchasing the mobile phone online.
The association relationship between data assets related to the existing service execution sequence refers to an association relationship between data assets generated in a service execution process, taking the service execution process of purchasing a mobile phone on line by the user b as an example, when the user b completes purchasing, the purchasing service has two steps of submitting an order and paying a goods, the two steps can generate a corresponding data asset after the execution is completed, an order record is generated first according to the execution sequence of the steps, a payment record is generated again, the two data assets are associated by an order identification field, and then the association relationship between the data assets related to the existing service execution sequence refers to an association relationship between the order record generated first and the payment record generated later according to the action of purchasing the mobile phone on line by the user b when the purchasing is completed.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset integrity verification rules, and data asset traceability verification rules.
Specifically, the preset check rule according to the one-to-one or one-to-many association relation of the association fields between the data assets corresponding to the data asset topics is a data asset association check rule, the preset check rule according to the integrity between the data assets corresponding to the presence service execution association of the data asset topics is a data asset integrity check rule, and the preset check rule according to the association relation between the data assets corresponding to the presence service execution sequence association of the data asset topics is a data asset traceability check rule.
In practical application, the data asset verification rules are various, and in the first optional implementation manner provided in the embodiment of the present application, if the data asset verification rule is the data asset relevance verification rule, and correspondingly, the data asset verification rule corresponding to the data asset theme is used for verifying the data asset after being segmented, specifically, the method is implemented as follows:
And verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Taking the data asset subject to online payment as an example, the corresponding data asset is subjected to the segmentation time 2019/6/5 3:00 is earlier than or equal to 2019/6/5 3 in the data asset theme online pays for the corresponding data asset: 00, later than 2019/6/4 3: and after the data asset of 00 is segmented, a data asset relevance verification rule corresponding to the online payment data asset theme is that a one-to-many incidence relation exists between a payment account identification field in an account payment account record and a payment identification field in a payment record, and if a one-to-one incidence relation exists between an order identification field in an order record and an order identification field in a payment record, the segmented data asset theme is verified according to the data asset relevance verification rule corresponding to the online payment data asset theme, if a one-to-many incidence relation exists between the payment account identification field in the account payment account record and the payment identification field in the payment record, the verification passes, and if the incidence relation exists between the payment account identification field in the account payment account record and the payment identification field in the payment record, or if the incidence relation exists between the order identification field in the order record and the order identification field in the order record, the verification fails, abnormal data is indicated, and error reporting information is output.
According to the embodiment of the application, the relevance of the data assets is checked, so that abnormal data assets can be found conveniently, the relevance of the data assets is ensured, and the accuracy of the data assets is improved.
In a second optional implementation manner provided in this embodiment of the present application, if the data asset verification rule is the data asset integrity verification rule, and correspondingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme is implemented specifically by adopting the following method:
and verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Taking the data asset subject of online payment as an example, the time for purchasing a mobile phone online by the user b is 2019/6/5 2:30, in case the purchase is completed by the user b, according to the cut time 2019/6/5 3:00 is earlier than or equal to 2019/6/5 3 in the data asset theme online pays for the corresponding data asset: 00, later than 2019/6/4 3: after 00 data assets are segmented, a user B purchases on line whether field values of the data assets corresponding to the mobile phone, which are marked to be segmented, are updated to segmented values;
And checking the integrity of the order record and the payment record generated by the online buying mobile phone of the user B according to the data asset integrity checking rule corresponding to the online buying data asset theme, if the two data records exist in the data asset, checking to pass, if at least one record does not exist in the order record or the payment record, checking to not pass, indicating that abnormal data exists, and outputting error reporting information.
According to the embodiment of the application, the integrity of the data asset is checked, so that abnormal data assets can be found conveniently, the integrity of the data asset is ensured, and the accuracy of the data asset is improved.
In a third optional implementation manner provided in this embodiment of the present application, if the data asset verification rule is the asset traceability verification rule, and correspondingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme is implemented specifically by adopting the following method:
And verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Taking checking the order record and the payment record generated by the online purchasing mobile phone of the user B as an example, under the condition that the user B completes purchasing, the data asset traceability checking rule corresponding to the online purchasing data asset theme is that the order record and the payment record which are related in the order execution sequence exist and are related by an order identification field, if the order record and the payment record which are related in the order execution sequence exist between the order record and the payment record generated by the online purchasing mobile phone of the user B are related in the order execution sequence, the association relation between the order record and the payment record generated by the online purchasing mobile phone of the user B is checked according to the data asset traceability checking rule corresponding to the online purchasing data asset theme, if the order record and the payment record exist and are related by the order identification field, the checking is passed, if at least one record does not exist, or the two records cannot be related by the order identification field, the checking is failed, the abnormal data exists, and the error reporting information is output.
According to the embodiment of the application, the data asset traceability verification rule is verified on the data asset, so that the abnormal data asset can be found conveniently, the continuity of the data asset is guaranteed, and the accuracy of the data asset is improved.
In practical application, the data asset verification rule may be a set of multiple verification rules, in this case, the data asset needs to be verified from different sides sequentially according to a preset verification sequence of the verification rule, and in the fourth optional implementation manner provided in the embodiment of the present application, the verification of the data asset after the segmentation is performed according to the data asset verification rule corresponding to the data asset theme is implemented specifically by adopting the following method:
checking one-to-one or one-to-many association relations of association fields among the data assets which are subjected to segmentation according to the data asset association checking rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passed, indicating that relevance abnormal data does not exist, checking the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity checking rule corresponding to the data asset theme;
If the verification result of the verification according to the data asset relevance verification rule is not passed, indicating that relevance abnormal data exist, and outputting an error reporting prompt;
if the verification result of the verification according to the data asset integrity verification rule is that the verification result is that the integrity abnormal data does not exist, verifying the association relationship between the data assets with business execution sequence association in the data assets which are subjected to segmentation according to the data asset traceability verification rule corresponding to the data asset theme;
if the checking result of the checking according to the data asset integrity checking rule is not passed, indicating that the integrity abnormal data exists, and outputting an error reporting prompt;
if the verification result of the verification according to the data asset traceability verification rule is passed, the fact that traceability abnormal data does not exist is indicated, and the verification is completed;
and if the verification result of the data asset traceability verification rule is not passed, indicating that traceability abnormal data exist, and outputting an error reporting prompt.
The verification process of the embodiment of the present application is similar to the above-mentioned process of performing data asset relevance verification rule verification, data asset integrity verification rule verification and data asset traceability verification rule verification on the data asset, and the specific implementation is referred to the above-mentioned verification process, and will not be described herein.
According to the embodiment of the application, the data asset relevance verification rule verification, the data asset integrity verification rule verification and the data asset traceability verification rule verification are carried out on the data asset, so that abnormal data assets can be found conveniently, relevance, integrity and continuity of the data asset are guaranteed, and accuracy of the data asset is improved.
In addition, a need for pulling a data asset under some data asset topics may be faced, and in an alternative implementation manner provided in the embodiment of the present application, after performing the verification step on the data asset that has been subjected to segmentation according to the data asset verification rule corresponding to the data asset topic, the method further includes:
1) And acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval.
The pulling refers to pulling the data asset corresponding to the data asset pulling subject, and in practical application, the corresponding data asset which is required to be pulled according to the requirement of the supervision party is provided for the supervision party to supervise.
The data asset pulling time interval refers to a pulling time range of a data asset corresponding to a data asset pulling subject, for example, the data asset pulling time interval is 2019/5/5 3:00 to 2019/6/5 3:00, pulling the data asset corresponding to the theme from the data asset at a later time than or equal to 2019/5/5 3:00 and earlier than or equal to 2019/6/5 3: data assets between 00 are pulled.
The data asset pulling instruction refers to an instruction for pulling a data asset corresponding to a data asset pulling subject according to the requirement of a supervisor, and specifically, the instruction carries the data asset pulling subject and a data asset pulling time interval, so as to identify which data asset corresponding to the data asset subject in which time interval is specifically required to be pulled.
2) And acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction.
3) And pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
In practical applications, data assets corresponding to different data asset pulling types may be stored in different databases, and the types of the databases may also be various, such as an Oracle database, a DB2 database, etc., so that it is required to obtain access interfaces of the databases corresponding to the data asset pulling types according to the data asset pulling types, and then pull data assets corresponding to the data pulling types in the databases according to the obtained access interfaces of the databases.
Taking the online payment as an example of the data asset pulling theme, the obtained data asset pulling theme carried in the data asset pulling instruction is online payment, and the data asset pulling time interval is 2019/5/53:00 to 2019/6/5 3:00, firstly, according to an online payment data asset pulling theme carried in a data asset pulling instruction, the obtained data asset pulling type under the online payment data asset pulling theme is payment account information, order information and payment details, and secondly, according to a data asset pulling time interval of 2019/5/53:00 to 2019/6/5 3:00, respectively pulling the data asset pulling types from databases corresponding to payment account information, order information and payment details at a later time than or equal to 2019/5/53:00 and earlier than or equal to 2019/6/5 3: and (3) taking the corresponding payment account record, order record and payment record in the time period of 00 as data to be supervised provided to the supervision party.
In addition, an access interface or an access interface can be set according to different data asset pulling topics, and a user selects a data asset corresponding to the data asset pulling topic to be pulled through the provided access interface or access interface, so that browsing or obtaining of the data asset is performed, and details are omitted.
According to the embodiment of the application, after the data asset theme is subjected to segmentation verification, the data asset required by the supervisory party is pulled, so that the efficiency of pulling the data asset is improved, and the accuracy of the pulled data asset is improved.
The following description will further explain the data asset segmentation verification method by taking the application of the data asset segmentation verification method provided in the present application to financial projects as an example, where the data asset segmentation verification method specifically includes steps S302 to S316.
In step S302, in the financial project, a data asset segmentation check instruction is detected, where the data asset segmentation check instruction includes a data asset theme and a segmentation time.
And step S304, cutting the data asset corresponding to the data asset theme according to the cutting time.
Step S306, according to the data asset relevance verification rule corresponding to the data asset theme, verifying the one-to-one or one-to-many relevance of the relevance fields between the data assets which have been subjected to segmentation.
Step S308, if the verification result of the verification according to the data asset relevance verification rule is passed, the integrity of the data assets related to the business execution existing in the data assets which are subjected to segmentation is verified according to the data asset integrity verification rule corresponding to the data asset theme.
And step S310, if the verification result of the verification according to the data asset integrity verification rule is passed, verifying the association relationship between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Step S312, a data asset pulling instruction is obtained, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval.
Step S314, according to the data asset pulling theme carried in the data asset pulling instruction, the data asset pulling type corresponding to the data asset pulling theme is obtained.
Step S316, according to the data asset pulling time interval carried in the data asset pulling instruction, pulling the corresponding data asset in the database corresponding to the data asset pulling type, and taking the data asset as the data asset to be supervised submitted to the supervision party.
In summary, according to the data asset segmentation verification method provided by the application, the data asset subject and the segmentation time carried in the data asset segmentation verification instruction are used for firstly segmenting the data asset corresponding to the data asset subject, so that the data asset with a specific data asset subject and a certain time range is obtained, the effectiveness and the efficiency of data asset management are improved, and the segmented data asset is verified according to the data asset verification rule corresponding to the data asset subject, so that the accuracy of the data asset is improved.
The embodiment of the data asset segmentation verification device provided by the application is as follows:
corresponding to the method embodiment, the application further provides a data asset segmentation check device embodiment, and fig. 4 shows a schematic structural diagram of the data asset segmentation check device of the application embodiment. As shown in fig. 4, the apparatus includes:
a detection module 402 configured to detect a data asset segmentation check instruction, the data asset segmentation check instruction comprising a data asset topic and a segmentation time;
the segmentation module 404 is configured to segment the data asset corresponding to the data asset theme according to the segmentation time;
and the verification module 406 is configured to verify the data asset which has been subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
Optionally, the segmentation module 404 includes:
the data asset type acquisition sub-module is configured to acquire a data asset type corresponding to the data asset theme in a data asset map according to the data asset theme;
and the segmentation module is configured to segment the data asset corresponding to the data asset type according to the segmentation time.
Optionally, the data asset map is constructed by running the following modules:
the data asset theme collection acquisition module is configured to acquire a data asset theme collection;
the system comprises a data asset type acquisition module, a data asset type acquisition module and a data asset type generation module, wherein the data asset type acquisition module is configured to acquire a data asset type corresponding to each data asset topic in a data asset topic set in the data asset type set;
the data asset map module is used for constructing the data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the association relation between the data assets corresponding to each data asset type.
Optionally, the data asset segmentation verification device further includes:
a merge map module configured to merge the data asset maps of each data asset topic to construct a data asset map of the set of data asset topics.
Optionally, the data asset segmentation verification device further includes:
the acquisition instruction module is configured to acquire a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
The data asset pulling type acquisition module is configured to acquire a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
and the pulling module is configured to pull the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and the data asset is used as the data asset to be monitored, which is submitted to the monitor.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
Optionally, the verification module 406 is specifically configured to: and verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Optionally, the verification module 406 is specifically configured to: and verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Optionally, the verification module 406 is specifically configured to: and verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Optionally, the verification module 406 includes:
the relevance verification sub-module is configured to verify the one-to-one or one-to-many relevance relation of the relevance fields between the data assets which are subjected to segmentation according to the data asset relevance verification rule corresponding to the data asset theme;
an integrity verification sub-module, configured to verify the integrity of the data assets related to the business execution existing in the data assets subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset subject if the verification result of the verification according to the data asset relevance verification rule is passed;
and the traceability verification sub-module is configured to verify the association relationship between the data assets with business execution sequence association in the segmented data assets according to the traceability verification rule of the data asset corresponding to the data asset subject if the verification result of the verification according to the integrity verification rule of the data asset is passed.
The foregoing is a schematic scheme of a data asset segmentation check device of this embodiment. It should be noted that, the technical solution of the data asset segmentation and verification device and the technical solution of the data asset segmentation and verification method belong to the same concept, and details of the technical solution of the data asset segmentation and verification device which are not described in detail can be referred to the description of the technical solution of the data asset segmentation and verification method.
An embodiment of a computing device provided herein is as follows:
fig. 5 illustrates a block diagram of a computing device 500, according to an embodiment of the present application. The components of the computing device 500 include, but are not limited to, a memory 510 and a processor 520. Processor 520 is coupled to memory 510 via bus 530 and database 550 is used to hold data.
Computing device 500 also includes access device 540, access device 540 enabling computing device 500 to communicate via one or more networks 560. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. The access device 540 may include one or more of any type of network interface, wired or wireless (e.g., a Network Interface Card (NIC)), such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present application, the other components of computing device 500 described above and not shown in FIG. 5 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 5 is for exemplary purposes only and is not intended to limit the scope of the present application. Those skilled in the art may add or replace other components as desired.
Computing device 500 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 500 may also be a mobile or stationary server.
The present application provides a computing device comprising a memory 510, a processor 520, and computer instructions stored on the memory and executable on the processor, the processor 520 for executing computer executable instructions to:
detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
According to the segmentation time, segmenting the data asset corresponding to the data asset theme;
and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
Optionally, the splitting the data asset corresponding to the data asset theme according to the splitting time includes:
acquiring a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
and splitting the data asset corresponding to the data asset type according to the splitting time.
Optionally, the data asset map is constructed by:
acquiring a data asset theme collection;
acquiring a data asset type corresponding to each data asset topic in the data asset topic collection from the data asset type collection;
and constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
Optionally, after the data asset map instruction of each data asset theme is constructed according to the corresponding relationship between the data asset theme and the corresponding data asset type and the association relationship between the data assets corresponding to the data asset types, the method further includes:
Merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
Optionally, after the verifying step is performed on the data asset that has been cut according to the data asset verification rule corresponding to the data asset theme, the method further includes:
acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
and pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
Optionally, if the data asset verification rule is the data asset relevance verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
And verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the data asset integrity verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the asset traceability verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Optionally, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
checking one-to-one or one-to-many association relations of association fields among the data assets which are subjected to segmentation according to the data asset association checking rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passing, verifying the integrity of the data assets related to the business execution existing in the data assets subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme;
and if the verification result of the verification according to the data asset integrity verification rule is passing, verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
The foregoing is a schematic illustration of a computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the data asset segmentation verification method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the data asset segmentation verification method.
An embodiment of a computer readable storage medium provided in the present application is as follows:
the present application provides a computer readable storage medium storing computer instructions that when executed by a processor are configured to:
detecting a data asset segmentation check instruction, wherein the data asset segmentation check instruction comprises a data asset theme and segmentation time;
according to the segmentation time, segmenting the data asset corresponding to the data asset theme;
and verifying the data asset which is subjected to segmentation according to the data asset verification rule corresponding to the data asset theme.
Optionally, the splitting the data asset corresponding to the data asset theme according to the splitting time includes:
acquiring a data asset type corresponding to the data asset theme from a data asset map according to the data asset theme;
and splitting the data asset corresponding to the data asset type according to the splitting time.
Optionally, the data asset map is constructed by:
acquiring a data asset theme collection;
acquiring a data asset type corresponding to each data asset topic in the data asset topic collection from the data asset type collection;
And constructing a data asset map of each data asset theme according to the corresponding relation between each data asset theme and the corresponding data asset type and the associated relation between the data assets corresponding to each data asset type.
Optionally, after the step of constructing the data asset map of each data asset theme according to the correspondence between the data asset theme and the corresponding data asset type and the association between the data assets corresponding to the data asset types, the method further includes:
merging the data asset maps of each data asset topic to construct the data asset map of the data asset topic set.
Optionally, after the verifying step is performed on the data asset that has been cut according to the data asset verification rule corresponding to the data asset theme, the method further includes:
acquiring a data asset pulling instruction, wherein the data asset pulling instruction carries a data asset pulling theme and a data asset pulling time interval;
acquiring a data asset pulling type corresponding to the data asset pulling theme according to the data asset pulling theme carried in the data asset pulling instruction;
And pulling the corresponding data asset in the database corresponding to the data asset pulling type according to the data asset pulling time interval carried in the data asset pulling instruction, and taking the corresponding data asset as the data asset to be supervised submitted to the supervision party.
Optionally, the data asset verification rule includes at least one of:
data asset relevance verification rules, data asset traceability verification rules, and data asset integrity verification rules.
Optionally, if the data asset verification rule is the data asset relevance verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the one-to-one or one-to-many association relation of the association fields between the data assets which are subjected to segmentation according to the data asset association verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the data asset integrity verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
And verifying the integrity of the data assets which are associated with the business execution in the data assets which are subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme.
Optionally, if the data asset verification rule is the asset traceability verification rule, and accordingly, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
and verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
Optionally, the verifying the segmented data asset according to the data asset verification rule corresponding to the data asset theme includes:
checking one-to-one or one-to-many association relations of association fields among the data assets which are subjected to segmentation according to the data asset association checking rules corresponding to the data asset topics;
if the verification result of the verification according to the data asset relevance verification rule is passing, verifying the integrity of the data assets related to the business execution existing in the data assets subjected to segmentation according to the data asset integrity verification rule corresponding to the data asset theme;
And if the verification result of the verification according to the data asset integrity verification rule is passing, verifying the association relation between the data assets with business execution sequence association in the segmented data assets according to the data asset traceability verification rule corresponding to the data asset theme.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the data asset segmentation verification method belong to the same concept, and details of the technical solution of the storage medium which are not described in detail can be referred to the description of the technical solution of the data asset segmentation verification method.
The foregoing describes specific embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for the sake of simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all necessary for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The above-disclosed preferred embodiments of the present application are provided only as an aid to the elucidation of the present application. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of this application. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This application is to be limited only by the claims and the full scope and equivalents thereof.