CN111090879A - Data processing method, device, readable storage medium, electronic equipment and system - Google Patents

Data processing method, device, readable storage medium, electronic equipment and system Download PDF

Info

Publication number
CN111090879A
CN111090879A CN201911235813.8A CN201911235813A CN111090879A CN 111090879 A CN111090879 A CN 111090879A CN 201911235813 A CN201911235813 A CN 201911235813A CN 111090879 A CN111090879 A CN 111090879A
Authority
CN
China
Prior art keywords
data
target
user
data processing
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911235813.8A
Other languages
Chinese (zh)
Other versions
CN111090879B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Robotics Co Ltd
Original Assignee
Cloudminds Chengdu Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Chengdu Technologies Co ltd filed Critical Cloudminds Chengdu Technologies Co ltd
Priority to CN201911235813.8A priority Critical patent/CN111090879B/en
Publication of CN111090879A publication Critical patent/CN111090879A/en
Application granted granted Critical
Publication of CN111090879B publication Critical patent/CN111090879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The disclosure relates to a data processing method, a data processing device, a readable storage medium, an electronic device and a data processing system. The method comprises the following steps: determining a target data processing application to be used by a data demander; acquiring application requirement information configured by a data demander for a target data processing application, wherein the application requirement information at least indicates a user data type required by the target data processing application; determining target users capable of being accessed according to the application demand information; accessing target user data of a target user, which belongs to the user data type, and performing target data statistical operation on the target user data; and sending the statistical result to the data demand side. Therefore, the data processing virtual machine executes target data statistics operation on the user data of the target user only according to the requirement of the data demander, and sends the statistics result to the data demander, the user data of the target user does not need to be provided for the data demander, so that the user data leakage can be effectively avoided, and the safety of the user data is improved.

Description

Data processing method, device, readable storage medium, electronic equipment and system
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data processing method, an apparatus, a readable storage medium, an electronic device, and a system.
Background
Generally, when a user uses some services on a network, user data set during registration, use of the services, and generated are managed and used by a service provider, which results in the service provider applying the user data of the user to other services unrelated to the services without informing the user. For example, a user inputs his/her physiological data in the health service a to determine whether he/she is in a healthy state, and the provider of the service a uses the physiological data of the user, or even provides the physiological data to a third-party service for big data analysis, user portrayal, and the like. Thus, the following problems occur: (1) the user cannot really own or manage the user data, and the service provider is the real owner of the user data, (2) when the service provider provides the user data for the third-party service, the user data can be leaked to a certain extent.
Disclosure of Invention
The purpose of the present disclosure is to provide a data processing method, apparatus, readable storage medium, electronic device and system to avoid leakage of user data.
In order to achieve the above object, a first aspect of the present disclosure provides a data processing method, including:
determining a target data processing application to be used by a data demander, wherein the target data processing application is used for executing target data statistical operation on access data;
acquiring application requirement information configured by the data demander for the target data processing application, wherein the application requirement information at least indicates a user data type required by the target data processing application;
determining target users capable of being accessed according to the application demand information;
accessing target user data of the target user, which belongs to the user data type, and performing target data statistics operation on the target user data;
and sending a statistical result to the data demand party.
Optionally, the determining, according to the application requirement information, target users that can be accessed includes:
determining candidate users having the target user data;
sending an authorization request to the user equipment of each of the candidate users to request authorization from the candidate user for access to the target user data;
and determining the candidate user corresponding to the user equipment which sends the authorization instruction as the target user.
Optionally, the application requirement information further indicates a required user type of the target data processing application; and the number of the first and second groups,
the determining candidate users having the target user data comprises:
and determining candidate users with the target user data from the users belonging to the demand user type.
Optionally, the application requirement information further indicates a lower limit of a required user number and/or a lower limit of a required user data number of the target data processing application;
the determining the target users which can be accessed according to the application requirement information comprises the following steps:
determining whether the lower limit of the required user number is greater than a preset minimum user number limit and/or whether the lower limit of the required user data number is greater than a preset minimum user data number limit;
and determining the target user under the condition that the lower limit of the required user number is larger than the minimum user number limit and/or the lower limit of the required user data number is larger than the minimum user data number limit.
Optionally, before the step of accessing the target user data of the target user belonging to the user data type, the method further comprises:
determining whether the number of the target users is smaller than the lower limit of the number of the required users and/or whether the total amount of the target user data of the target users is smaller than the lower limit of the number of the required user data;
and under the condition that the number of the target users is not less than the lower limit of the number of the required users and/or the total amount of the target user data of the target users is not less than the lower limit of the number of the required users, the step of accessing the target user data of the target users, which belong to the user data type, is executed.
Optionally, the method further comprises:
acquiring a newly created data processing application;
auditing the newly created data processing application;
and storing the newly created data processing application into a data processing application library when the newly created data processing application passes the audit, wherein the target data processing application is one of the data processing applications stored in the data processing application library.
The second aspect of the present disclosure also provides a data processing apparatus, including:
the system comprises a first determination module, a second determination module and a third determination module, wherein the first determination module is used for determining a target data processing application to be used by a data demander, and the target data processing application is used for executing target data statistical operation on access data;
a first obtaining module, configured to obtain application requirement information configured by the data demander for the target data processing application, where the application requirement information at least indicates a user data type required by the target data processing application;
the second determining module is used for determining target users which can be accessed according to the application demand information;
the statistical module is used for accessing the target user data of the target user, belonging to the user data type, and executing the target data statistical operation on the target user data;
and the sending module is used for sending the statistical result to the data demander.
Optionally, the second determining module includes:
a first determining sub-module for determining candidate users having the target user data;
a sending submodule, configured to send an authorization request to user equipment of each candidate user, so as to request the candidate user to authorize access to the target user data;
and the second determining submodule is used for determining the candidate user corresponding to the user equipment which sends the authorization instruction as the target user.
Optionally, the application requirement information further indicates a required user type of the target data processing application; and the number of the first and second groups,
the first determining submodule is used for determining candidate users with the target user data from the users belonging to the demand user type.
Optionally, the application requirement information further indicates a lower limit of a required user number and/or a lower limit of a required user data number of the target data processing application;
the second determining module includes:
a third determining submodule, configured to determine whether the lower limit of the required user number is greater than a preset minimum user number limit and/or whether the lower limit of the required user data number is greater than a preset minimum user data number limit;
a fourth determining sub-module, configured to determine the target user when the lower limit of the required user number is greater than the minimum user number limit and/or the lower limit of the required user data number is greater than the minimum user data number limit.
Optionally, the apparatus further comprises:
a third determining module, configured to determine whether the number of the target users is less than the lower limit of the number of the required users and/or whether the total amount of the target user data of the target users is less than the lower limit of the number of the required user data;
and the driving module is used for driving the counting module to execute the step of accessing the target user data of the target user, which belongs to the user data type, under the condition that the number of the target users is not less than the lower limit of the number of the required users and/or the total amount of the target user data of the target users is not less than the lower limit of the number of the required users.
Optionally, the apparatus further comprises:
the second acquisition module is used for acquiring the newly created data processing application;
the auditing module is used for auditing the newly created data processing application;
and the storage module is used for storing the newly created data processing application into a data processing application library under the condition that the newly created data processing application passes the audit, wherein the target data processing application is one of the data processing applications stored in the data processing application library.
A third aspect of the present disclosure provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method provided by the first aspect of the present disclosure.
A fourth aspect of the present disclosure provides an electronic device, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the method provided by the first aspect of the present disclosure.
A fifth aspect of the present disclosure provides a data processing system, the system comprising: the data processing system comprises a first user device serving as a data demand side, a second user device serving as a user data provider side and a data processing virtual machine, wherein the data processing virtual machine is respectively connected with the first user device and the second user device;
the first user equipment is used for sending an identifier of a target data processing application to be used to the data processing virtual machine and receiving a statistical result sent by the data processing virtual machine;
the second user equipment is used for providing user data;
the data processing virtual machine is configured to execute the method provided by the first aspect of the present disclosure.
By adopting the technical scheme, the data processing virtual machine can determine the target user which can be accessed according to the application demand information configured by the data demand party for the target data processing application, accesses the target user data of the target user, which belongs to the user data type required by the data demand party, and sends the statistical result to the data demand party after performing the target data statistical operation on the target user data. Therefore, the data processing virtual machine executes target data statistics operation on the user data of the target user only according to the requirement of the data demander, and sends the statistics result to the data demander, the user data of the target user does not need to be provided for the data demander, so that the user data leakage can be effectively avoided, and the safety of the user data is improved.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
FIG. 1 is a schematic diagram illustrating a data processing system in accordance with an exemplary embodiment.
FIG. 2 is a flow chart illustrating a method of data processing according to an exemplary embodiment.
FIG. 3 is a flow chart illustrating a method of determining a target user in accordance with an exemplary embodiment.
FIG. 4 is a block diagram illustrating a data processing apparatus according to an example embodiment.
FIG. 5 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
The following detailed description of specific embodiments of the present disclosure is provided in connection with the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
First, a data processing system provided by the present disclosure is explained. FIG. 1 is a schematic diagram illustrating a data processing system in accordance with an exemplary embodiment. As shown in fig. 1, the system may include a first user device 11 (taking a notebook computer as an example) as a data demand side, a second user device 12 (taking a desktop computer as an example) as a user data supply side, and a data processing virtual machine 13. The data processing virtual machine 13 is connected to the first user equipment 11 and the second user equipment 12, respectively. The data processing virtual machine 13 may also be connected to a database of the second user equipment 12 via a gateway to access user data stored in the database, for example.
The first user equipment 11 is configured to send an identifier of a target data processing application to be used to the data processing virtual machine 13, so that the data processing virtual machine 13 determines the target data processing application according to the identifier, and the first user equipment 11 is further configured to receive a statistical result sent by the data processing virtual machine 13. The second user devices 12 are used for providing user data, wherein the number of the second user devices 12 is usually multiple to meet the requirement of the data demander for the user data, and for convenience of description, only one second user device 12 is shown in fig. 1. In the present disclosure, data processing can be realized by the data processing virtual machine 13, and the data processing method provided by the present disclosure will be explained in detail below.
FIG. 2 is a flow chart illustrating a method of data processing that may be applied to a data processing virtual machine in the data processing system described above, according to an example embodiment. As shown in fig. 2, the data processing method may include steps 201 to 205.
In step 201, a target data processing application to be used by the data demander is determined, wherein the target data processing application is used for performing a target data statistics operation on the access data.
Specifically, the data demander may click an icon of a target data processing application to be used on the first user equipment, and the first user equipment may send, to the data processing virtual machine, an identifier of the target data processing application when detecting a click operation of the data demander. Or, the data demanding party inputs the identifier of the target data processing application to be used by voice, so that the data processing virtual machine can receive the identifier of the target data processing application sent by the data demanding party, and further determine the target data processing application according to the identifier of the target data processing application.
The data processing application library stores a plurality of data processing applications. The data processing application may characterize the application of operations (e.g., summation application, averaging application, variance application, etc.) or statistics (e.g., statistics of the proportions of financial products a, statistics of users with lung disease, etc.), among others. In this way, after receiving the identifier of the target data processing application sent by the first user equipment as the data demand side, the data processing virtual machine may determine the target data processing application from the data processing application library according to the identifier. The data processing application library may be a database located in the data processing virtual machine, or may be an external database accessible by the data processing virtual machine, and in any case, the data processing virtual machine may determine the target data processing application according to the identifier of the target data processing application.
Further, in the present disclosure, anyone can develop a new data processing application using the instruction set provided by the data processing virtual machine, and can store the data processing application in the above-described data processing application library. Specifically, the data processing method may further include: acquiring a newly created data processing application; auditing the newly created data processing application; and in the case that the newly created data processing application passes the audit, storing the newly created data processing application into the data processing application library, wherein the target data processing application determined in step 201 is one of the data processing applications stored in the data processing application library.
The data processing application may be created by anyone who, after it has created the data processing application, writes the data processing application into the data processing virtual machine. Furthermore, the data processing virtual machine performs auditing on the data processing application, and illustratively, auditing can be performed from two aspects, namely, auditing whether the created data processing application can successfully execute the target data statistical operation on one hand, and auditing whether the data processing application belongs to a forward cracking data processing application on the other hand, wherein the forced cracking data processing application refers to a data processing application capable of forcibly cracking the target data. The data processing virtual machine will only store the newly created data processing application in the data processing application library if the newly created data processing application passes the audit.
In step 202, application requirement information configured for the target data processing application by the data demander is obtained, wherein the application requirement information at least indicates a user data type required by the target data processing application.
The data demanding party can send the identifier of the target data processing application to the data processing virtual machine, and can also send application demand information configured by the data demanding party for the target data processing application to the data processing virtual machine. The data demander may configure application requirement information for the target data processing application in the first user equipment according to a requirement of the data demander, and may also configure application requirement information for the target data processing application through voice, which is not specifically limited by the present disclosure.
In the present disclosure, the application requirement information indicates at least the type of user data required by the target data processing application. Among other things, the user data type may be indicative of a user data size (e.g., less than 500), a user data category (e.g., indicative of a lung shadow area greater than a threshold, or indicative of an exam performance greater than 60), and so forth.
In step 203, the target users that can be accessed are determined according to the application requirement information.
After the data processing virtual machine acquires the application requirement information, a target user can be determined from n user data providers corresponding to n second user devices connected to the data processing virtual machine according to the user requirement information.
In one embodiment, as shown in fig. 3, step 203 may specifically include step 2031 and step 2033.
In step 2031, candidate users having the target user data are determined.
For example, assuming that the user data type represents user data with a lung shadow area larger than a threshold, the number of the second user devices 12 in fig. 1 is 1000, wherein 200 user data providers provide user data with a lung shadow area larger than a threshold, and therefore, the data processing virtual machine may determine the 200 user data providers as candidate users.
Further, in the present disclosure, the application requirement information may also indicate a required user type of the target data processing application, considering that the data requiring party may require the required user type in addition to the required user data type. Wherein the type of the demanding user may characterize the gender of the user, the age of the user, the occupation of the user or the type of illness of the patient, etc.
In the case that the application requirement information may also indicate a requirement user type of the target data processing application, a specific implementation of determining the candidate user with the target user data may be: candidate users having the target user data are determined from users belonging to the demanding user type.
Illustratively, following the above example, if the application demand information further indicates that the demand user type of the target data processing application is a user engaged in mining work, i.e., the data consumer needs to use user data provided by the user engaged in mining work that has a characteristic lung shadow area greater than a threshold value, the data processing virtual machine determines a candidate user from the users engaged in mining work that has user data characteristic lung shadow area greater than the threshold value.
In step 2032, an authorization request is sent to the user device of each candidate user to request authorization from the candidate user for access to the target user data.
In order to further improve the security of the user data and avoid the user data from being leaked, in the present disclosure, after determining the candidate users, the data processing virtual machine may further send an authorization request to the user equipment of each candidate user. Illustratively, continuing with the example above, the data processing virtual machine may send an authorization request to the second user device of the 200 determined user data providers having user data characterizing that the lung shadow area is greater than the threshold value to request authorization of access to the target user data from the 200 user data providers.
In step 2033, the candidate user corresponding to the user equipment sending the authorization instruction is determined as the target user.
After receiving an authorization request sent by the data processing virtual machine through user equipment of the candidate user, the candidate user can authorize the data processing virtual machine to access target user data, and can also refuse the data processing virtual machine to access the target user data. Illustratively, the candidate user includes a confirm icon and a decline icon in the authorization request received via his user device. The candidate user can click the confirmation icon and send an authorization instruction to the data processing virtual machine; or clicking the rejection icon, sending an access prohibition instruction to the data processing virtual machine, or sending the access prohibition instruction to the data processing virtual machine when the user equipment of the candidate user does not detect the user operation within the preset time length, and the like. In this way, when receiving an authorization instruction sent by the user equipment, the data processing virtual machine determines the candidate user corresponding to the user equipment as the target user.
By adopting the method, when the target user which can be accessed is determined, the authorization request is firstly sent to the candidate user with the target user data, so that the candidate user can determine whether to allow the access, and when the candidate user is determined to be accessible, the data processing virtual machine can determine the candidate user as the target user which can be accessed, so that the user can really own or control the authority of the data of the user, and the user data is prevented from being leaked by a service provider.
In another embodiment, considering that the data demander may also request the number of demanded users and the number of demanded user data, in the present disclosure, the application demand information may further indicate a lower limit of the number of demanded users and/or a lower limit of the number of demanded user data of the target data processing application.
In this embodiment, according to the application requirement information, the specific implementation manner of determining the target users that can be accessed may be: firstly, determining whether the lower limit of the number of required users is greater than a preset minimum user number limit and/or whether the lower limit of the number of required user data is greater than a preset minimum user data number limit; then, in the case that the lower limit of the required user number is larger than the minimum user number limit and/or the lower limit of the required user data number is larger than the minimum user data number limit, the target user is determined.
Considering that when the lower limit of the number of the required users and/or the lower limit of the number of the required user data are smaller, the data demander may break the user data, resulting in leakage of the user data. For example, the lower limit of the number of required users is 2, the lower limit of the number of required user data is 2, and the data demander can break the user data by respectively using a summation application and a difference application. Therefore, in the present disclosure, before determining the target user, it is further determined whether the lower limit of the required user number is greater than a preset minimum user number limit and/or whether the lower limit of the required user data number is greater than a preset minimum user data number limit, and in a case that the lower limit of the required user number is greater than the minimum user number limit and/or the lower limit of the required user data number is greater than the minimum user data number limit, the target user is determined, so as to further avoid the problem of user data leakage.
It should be noted that, in the case that the application requirement information further indicates a lower limit of the required user number of the target data processing application, the number of the target users determined by the data processing virtual machine should be greater than or equal to the lower limit of the required user number.
In step 204, target user data of the target user belonging to the user data type is accessed, and a target data statistics operation is performed on the target user data.
After the accessible target user is determined according to the above manner, the data processing virtual machine may access the target user data belonging to the user data type in the database of the target user through the gateway. For example, the target user data type represents user data with a lung shadow area larger than a threshold, the user data stored in the database of the target user and representing the lung shadow area larger than the threshold is the target user data, and the data processing virtual machine only needs to access the target user data. When the data processing virtual machine accesses the target user data, the target data processing application can execute target data statistical operation on the target user data.
For example, if the target data processing application is a statistical-characterized application and the user data type is a user data type that characterizes a lung shadow area greater than a threshold, the data processing virtual machine may perform a statistical operation on the target user data to determine a number of users whose lung shadow area is greater than the threshold.
In addition, in the case that the application requirement information further indicates a lower limit of the required user number and/or a lower limit of the required user data number of the target data processing application, in order to ensure that the data processing virtual machine can access the number of target users and/or the number of target user data meeting the requirement of the data demander, before executing the above step 204, the data processing virtual machine further needs to determine whether the number of candidate users sending the authorization instruction (i.e., the number of target users) is less than the lower limit of the required user number and/or whether the target user data of the candidate users sending the authorization instruction (i.e., the number of target users) is less than the lower limit of the required user data number.
Specifically, before the step 204 is executed, the data processing method provided by the present disclosure may further include:
determining whether the number of the target users is smaller than the lower limit of the number of the required users and/or whether the total amount of the target user data of the target users is smaller than the lower limit of the number of the required users;
and under the condition that the number of the target users is not less than the lower limit of the number of the required users and/or the total amount of the target user data of the target users is not less than the lower limit of the number of the required users, accessing the target user data of the target users, which belong to the user data type.
In one embodiment, the application requirement information further indicates a lower limit on the required number of users of the target data processing application, and the lower limit on the required number of users is K1, where K1 is an integer greater than 1. After the data processing virtual machine determines the candidate users with the target user data in the above manner, if the candidate users are far greater than the lower limit K1 of the required user number, in order to reduce workload, the data processing virtual machine may first send authorization instructions to K1 candidate users, and if the authorization instructions sent by the K1 candidate users are received within a preset time period, the data processing virtual machine may access the target user data of the target user belonging to the user data type without sending authorization instructions like other candidate users, and perform target data statistics on the target user data.
If the authorization instructions sent by the K1 candidate users are not completely received within the preset time length, the authorization requests are sent to other candidate users which have not sent authorization requests according to the number of the currently received authorization instructions sent by the candidate users. For example, if only the authorization instructions sent by N1(N1< K1) candidate users are received within the preset time duration, the authorization instructions need to be sent to other K1-N1 candidate users, and until the authorization instructions sent by K1 candidate users are received, the target user data of the target user belonging to the user data type is accessed, and the target user data statistics operation is performed on the target user data.
In another embodiment, the application requirements information further indicates a lower limit on the required amount of user data for the target data processing application. After the data processing virtual machine determines the target users according to the above mode, it is determined whether the total amount of the target user data of all the target users is smaller than the lower limit of the amount of the required user data, if so, the target data counting operation may not be executed temporarily, and when the total amount of the target user data of the target users is not smaller than the lower limit of the amount of the required user data, the target user data of the target users belonging to the user data type is accessed, and the target data counting operation is executed on the target user data.
In yet another embodiment, the application requirement information further indicates a lower limit of the required user number and a lower limit of the required user data number of the target data processing application, wherein the lower limit of the required user number is K2, the lower limit of the required user data number is K3, and K2 and K3 are both integers greater than 1. For example, K2-100 and K3-1000. And the data processing virtual machine respectively determines whether the number of the determined target users is less than 100 and the total amount of the target user data of the target users is less than 1000, and executes the step of accessing the target user data of the target users belonging to the user data type under the condition that the number of the target users is not less than 100 and the total amount of the target user data of the target users is not less than 1000. If the number of the target users is less than 100, or the total amount of the target user data of the target users is less than 1000, the step of accessing the target user data of the target users belonging to the user data type is not executed for the moment, until the number of the target users is not less than 100 and the total amount of the target user data of the target users is not less than 1000, the step of accessing the target user data of the target users belonging to the user data type is executed again.
It should be noted that, when the number of the target users is smaller than the lower limit of the number of the required users, or the total amount of the target user data of the target users is smaller than the lower limit of the number of the required user data, on one hand, the data processing virtual machine does not execute accessing the target user data temporarily, and on the other hand, prompt information representing that accessing the target user data is not executed temporarily may be sent to the first user equipment of the data demander, so that the data demander obtains the progress of the target data statistics operation.
In step 205, the statistical result is sent to the data demander.
After the data processing virtual machine executes the target data statistical result on the target user data, the statistical result can be sent to the data demand side. Illustratively, the statistical result is sent to a second user device of the data demander.
By adopting the technical scheme, the data processing virtual machine can determine the target user which can be accessed according to the application demand information configured by the data demand party for the target data processing application, accesses the target user data of the target user, which belongs to the user data type required by the data demand party, and sends the statistical result to the data demand party after performing the target data statistical operation on the target user data. Therefore, the data processing virtual machine executes target data statistics operation on the user data of the target user only according to the requirement of the data demander, and sends the statistics result to the data demander, the user data of the target user does not need to be provided for the data demander, so that the user data leakage can be effectively avoided, and the safety of the user data is improved.
Based on the same inventive concept, the present disclosure also provides a data processing apparatus. FIG. 4 is a block diagram illustrating a data processing apparatus according to an example embodiment. As shown in fig. 4, the data processing apparatus 400 may include:
a first determining module 401, configured to determine a target data processing application to be used by a data demander, where the target data processing application is configured to perform a target data statistics operation on access data;
a first obtaining module 402, configured to obtain application requirement information configured by the data demander for the target data processing application, where the application requirement information at least indicates a user data type required by the target data processing application;
a second determining module 403, configured to determine, according to the application requirement information, a target user that can be accessed;
a statistic module 404, configured to access target user data of the target user, where the target user data belongs to the user data type, and perform a target data statistic operation on the target user data;
a sending module 405, configured to send the statistical result to the data demander.
Optionally, the second determining module 403 may include:
a first determining sub-module for determining candidate users having the target user data;
a sending submodule, configured to send an authorization request to user equipment of each candidate user, so as to request the candidate user to authorize access to the target user data;
and the second determining submodule is used for determining the candidate user corresponding to the user equipment which sends the authorization instruction as the target user.
Optionally, the application requirement information further indicates a required user type of the target data processing application; and the number of the first and second groups,
the first determining sub-module may be configured to determine a candidate user having the target user data from users belonging to the demanded user type.
Optionally, the application requirement information further indicates a lower limit of a required user number and/or a lower limit of a required user data number of the target data processing application;
the second determining module 403 may include:
a third determining submodule, configured to determine whether the lower limit of the required user number is greater than a preset minimum user number limit and/or whether the lower limit of the required user data number is greater than a preset minimum user data number limit;
a fourth determining sub-module, configured to determine the target user when the lower limit of the required user number is greater than the minimum user number limit and/or the lower limit of the required user data number is greater than the minimum user data number limit.
Optionally, the apparatus may further include:
a third determining module, configured to determine whether the number of the target users is less than the lower limit of the number of the required users and/or whether the total amount of the target user data of the target users is less than the lower limit of the number of the required user data;
and the driving module is used for driving the counting module to execute the step of accessing the target user data of the target user, which belongs to the user data type, under the condition that the number of the target users is not less than the lower limit of the number of the required users and/or the total amount of the target user data of the target users is not less than the lower limit of the number of the required users.
Optionally, the apparatus may further include:
the second acquisition module is used for acquiring the newly created data processing application;
the auditing module is used for auditing the newly created data processing application;
and the storage module is used for storing the newly created data processing application into a data processing application library under the condition that the newly created data processing application passes the audit, wherein the target data processing application is one of the data processing applications stored in the data processing application library.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 5 is a block diagram illustrating an electronic device 500 in accordance with an example embodiment. As shown in fig. 5, the electronic device 500 may include: a processor 501 and a memory 502. The electronic device 500 may also include one or more of a multimedia component 503, an input/output (I/O) interface 504, and a communication component 505.
The processor 501 is configured to control the overall operation of the electronic device 500, so as to complete all or part of the steps in the data processing method. The memory 502 is used to store various types of data to support operation at the electronic device 500, such as instructions for any application or method operating on the electronic device 500 and application-related data, such as contact data, messaging, pictures, audio, video, and so forth. The Memory 502 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia component 503 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 502 or transmitted through the communication component 505. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 504 provides an interface between the processor 501 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 505 is used for wired or wireless communication between the electronic device 500 and other devices. Wireless communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, 4G, NB-IOT, eMTC, or other 5G, etc., or a combination of one or more of them, which is not limited herein. The corresponding communication component 505 may thus comprise: Wi-Fi module, Bluetooth module, NFC module, etc.
In an exemplary embodiment, the electronic Device 500 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components for executing the above-mentioned data Processing method.
In another exemplary embodiment, there is also provided a computer readable storage medium comprising program instructions which, when executed by a processor, implement the steps of the data processing method described above. For example, the computer readable storage medium may be the memory 502 described above comprising program instructions that are executable by the processor 501 of the electronic device 500 to perform the data processing method described above.
In another exemplary embodiment, a computer program product is also provided, which comprises a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-mentioned data processing method when executed by the programmable apparatus.
The preferred embodiments of the present disclosure are described in detail with reference to the accompanying drawings, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all belong to the protection scope of the present disclosure.
It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. In order to avoid unnecessary repetition, various possible combinations will not be separately described in this disclosure.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.

Claims (10)

1. A data processing method, comprising:
determining a target data processing application to be used by a data demander, wherein the target data processing application is used for executing target data statistical operation on access data;
acquiring application requirement information configured by the data demander for the target data processing application, wherein the application requirement information at least indicates a user data type required by the target data processing application;
determining target users capable of being accessed according to the application demand information;
accessing target user data of the target user, which belongs to the user data type, and performing target data statistics operation on the target user data;
and sending a statistical result to the data demand party.
2. The method according to claim 1, wherein the determining accessible target users according to the application requirement information comprises:
determining candidate users having the target user data;
sending an authorization request to the user equipment of each of the candidate users to request authorization from the candidate user for access to the target user data;
and determining the candidate user corresponding to the user equipment which sends the authorization instruction as the target user.
3. The method of claim 2, wherein the application requirements information further indicates a type of required user of the target data processing application; and the number of the first and second groups,
the determining candidate users having the target user data comprises:
and determining candidate users with the target user data from the users belonging to the demand user type.
4. The method according to any of claims 1-3, wherein the application requirement information further indicates a lower limit on the number of required users and/or a lower limit on the number of required user data for the target data processing application;
the determining the target users which can be accessed according to the application requirement information comprises the following steps:
determining whether the lower limit of the required user number is greater than a preset minimum user number limit and/or whether the lower limit of the required user data number is greater than a preset minimum user data number limit;
and determining the target user under the condition that the lower limit of the required user number is larger than the minimum user number limit and/or the lower limit of the required user data number is larger than the minimum user data number limit.
5. The method of claim 4, wherein prior to the step of accessing target user data of the target user that belongs to the user data type, the method further comprises:
determining whether the number of the target users is smaller than the lower limit of the number of the required users and/or whether the total amount of the target user data of the target users is smaller than the lower limit of the number of the required user data;
and under the condition that the number of the target users is not less than the lower limit of the number of the required users and/or the total amount of the target user data of the target users is not less than the lower limit of the number of the required users, the step of accessing the target user data of the target users, which belong to the user data type, is executed.
6. The method of claim 1, further comprising:
acquiring a newly created data processing application;
auditing the newly created data processing application;
and storing the newly created data processing application into a data processing application library when the newly created data processing application passes the audit, wherein the target data processing application is one of the data processing applications stored in the data processing application library.
7. A data processing apparatus, comprising:
the system comprises a first determination module, a second determination module and a third determination module, wherein the first determination module is used for determining a target data processing application to be used by a data demander, and the target data processing application is used for executing target data statistical operation on access data;
a first obtaining module, configured to obtain application requirement information configured by the data demander for the target data processing application, where the application requirement information at least indicates a user data type required by the target data processing application;
the second determining module is used for determining target users which can be accessed according to the application demand information;
the statistical module is used for accessing the target user data of the target user, belonging to the user data type, and executing the target data statistical operation on the target user data;
and the sending module is used for sending the statistical result to the data demander.
8. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
9. An electronic device, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to carry out the steps of the method of any one of claims 1 to 6.
10. A data processing system, characterized in that the system comprises: the data processing system comprises a first user device serving as a data demand side, a second user device serving as a user data provider side and a data processing virtual machine, wherein the data processing virtual machine is respectively connected with the first user device and the second user device;
the first user equipment is used for sending an identifier of a target data processing application to be used to the data processing virtual machine and receiving a statistical result sent by the data processing virtual machine;
the second user equipment is used for providing user data;
the data processing virtual machine configured to perform the method of any one of claims 1-6.
CN201911235813.8A 2019-12-05 2019-12-05 Data processing method, device, readable storage medium, electronic equipment and system Active CN111090879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911235813.8A CN111090879B (en) 2019-12-05 2019-12-05 Data processing method, device, readable storage medium, electronic equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911235813.8A CN111090879B (en) 2019-12-05 2019-12-05 Data processing method, device, readable storage medium, electronic equipment and system

Publications (2)

Publication Number Publication Date
CN111090879A true CN111090879A (en) 2020-05-01
CN111090879B CN111090879B (en) 2023-07-21

Family

ID=70394695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911235813.8A Active CN111090879B (en) 2019-12-05 2019-12-05 Data processing method, device, readable storage medium, electronic equipment and system

Country Status (1)

Country Link
CN (1) CN111090879B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113177143A (en) * 2021-03-31 2021-07-27 东软集团股份有限公司 Time sequence data access method and device, storage medium and electronic equipment

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6308328B1 (en) * 1997-01-17 2001-10-23 Scientific-Atlanta, Inc. Usage statistics collection for a cable data delivery system
CN1996955A (en) * 2006-12-15 2007-07-11 华为技术有限公司 Access method for user data and management server for user archive
US20090031006A1 (en) * 2000-06-07 2009-01-29 Johnson William J System and method for alerting a first mobile data processing system nearby a second mobile data processing system
CN102467533A (en) * 2010-11-10 2012-05-23 腾讯科技(深圳)有限公司 Method and device for processing product statistical data
CN102546788A (en) * 2011-12-29 2012-07-04 北京新媒传信科技有限公司 Cloud platform management method and cloud platform
US20140137237A1 (en) * 2012-11-15 2014-05-15 Microsoft Corporation Single system image via shell database
CN104199848A (en) * 2014-08-08 2014-12-10 亿赞普(北京)科技有限公司 Relevance method and device for user data under different domains
CN105046601A (en) * 2015-07-09 2015-11-11 传成文化传媒(上海)有限公司 User data processing method and system
CN105554094A (en) * 2015-12-11 2016-05-04 北京奇虎科技有限公司 Method and device for data interaction
CN106168956A (en) * 2016-06-24 2016-11-30 乐视控股(北京)有限公司 data statistical analysis method and system for intelligent terminal
CN106250480A (en) * 2016-08-01 2016-12-21 浪潮软件集团有限公司 Metadata-based visual statistical analysis method
CN106294090A (en) * 2016-08-03 2017-01-04 五八同城信息技术有限公司 A kind of data statistical approach and device
CN107633347A (en) * 2017-08-22 2018-01-26 阿里巴巴集团控股有限公司 A kind of data target statistical method and device
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain
CN110210246A (en) * 2019-05-31 2019-09-06 阿里巴巴集团控股有限公司 A kind of personal data method of servicing and system based on safety calculating
CN110232104A (en) * 2019-06-13 2019-09-13 腾讯科技(深圳)有限公司 A kind of data display method, device, storage medium and computer equipment

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6308328B1 (en) * 1997-01-17 2001-10-23 Scientific-Atlanta, Inc. Usage statistics collection for a cable data delivery system
US20090031006A1 (en) * 2000-06-07 2009-01-29 Johnson William J System and method for alerting a first mobile data processing system nearby a second mobile data processing system
CN1996955A (en) * 2006-12-15 2007-07-11 华为技术有限公司 Access method for user data and management server for user archive
CN102467533A (en) * 2010-11-10 2012-05-23 腾讯科技(深圳)有限公司 Method and device for processing product statistical data
CN102546788A (en) * 2011-12-29 2012-07-04 北京新媒传信科技有限公司 Cloud platform management method and cloud platform
US20140137237A1 (en) * 2012-11-15 2014-05-15 Microsoft Corporation Single system image via shell database
CN104199848A (en) * 2014-08-08 2014-12-10 亿赞普(北京)科技有限公司 Relevance method and device for user data under different domains
CN105046601A (en) * 2015-07-09 2015-11-11 传成文化传媒(上海)有限公司 User data processing method and system
CN105554094A (en) * 2015-12-11 2016-05-04 北京奇虎科技有限公司 Method and device for data interaction
CN106168956A (en) * 2016-06-24 2016-11-30 乐视控股(北京)有限公司 data statistical analysis method and system for intelligent terminal
CN106250480A (en) * 2016-08-01 2016-12-21 浪潮软件集团有限公司 Metadata-based visual statistical analysis method
CN106294090A (en) * 2016-08-03 2017-01-04 五八同城信息技术有限公司 A kind of data statistical approach and device
CN107633347A (en) * 2017-08-22 2018-01-26 阿里巴巴集团控股有限公司 A kind of data target statistical method and device
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain
CN110210246A (en) * 2019-05-31 2019-09-06 阿里巴巴集团控股有限公司 A kind of personal data method of servicing and system based on safety calculating
CN110232104A (en) * 2019-06-13 2019-09-13 腾讯科技(深圳)有限公司 A kind of data display method, device, storage medium and computer equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113177143A (en) * 2021-03-31 2021-07-27 东软集团股份有限公司 Time sequence data access method and device, storage medium and electronic equipment
CN113177143B (en) * 2021-03-31 2023-10-27 东软集团股份有限公司 Time sequence data access method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN111090879B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN107222331B (en) method and device for monitoring performance of distributed application system, storage medium and equipment
CN109165157B (en) Method for testing application program and test platform
US11924247B1 (en) Access control policy simulation and testing
US11243688B1 (en) Bi-directional application switching with contextual awareness
CN110830234B (en) User traffic distribution method and device
CN111177112A (en) Database blocking method and device based on operation and maintenance management system and electronic equipment
CN108762760A (en) Software interface customizing method, device, computer equipment and storage medium
US10168878B1 (en) Dashboard generation based on user interaction
US20130305335A1 (en) Electronic transaction notification system and method
CN110661665B (en) Alarming method based on Internet of things cloud platform, computer storage medium and equipment
US10225152B1 (en) Access control policy evaluation and remediation
CN110908862A (en) Monitoring method and device, electronic equipment and storage medium
CN104635543A (en) Method and device for carrying out management operation
CN111090879B (en) Data processing method, device, readable storage medium, electronic equipment and system
CN112395568A (en) Interface authority configuration method, device, equipment and storage medium
CN112383470B (en) Communication friend adding method and device, computer equipment and storage medium
CN113191889A (en) Wind control configuration method, configuration system, electronic device and readable storage medium
CN112041818A (en) System for adjusting application performance based on platform horizontal benchmarking
CN111414191A (en) Gray scale publishing method and device for small program
US9785711B2 (en) Online location sharing through an internet service search engine
CN114302351A (en) Short message service processing method and device, computer equipment and storage medium
US11816173B2 (en) Method and apparatus for managing user profile
CN114157627B (en) Group processing method, device, electronic equipment and medium
CN111930736B (en) Data verification method and device
CN111026650B (en) Method and device for testing software, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210702

Address after: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Applicant after: Dalu Robot Co.,Ltd.

Address before: No.3, 7th floor, unit 1, building 5, No.399, Fucheng Avenue West, Chengdu, Sichuan 610094

Applicant before: CLOUDMINDS (CHENGDU) TECHNOLOGIES Co.,Ltd.

CB02 Change of applicant information
CB02 Change of applicant information

Address after: 201111 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant after: Dayu robot Co.,Ltd.

Address before: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Applicant before: Dalu Robot Co.,Ltd.

GR01 Patent grant
GR01 Patent grant