CN111522785A - Data extraction auditing method, device and equipment - Google Patents

Data extraction auditing method, device and equipment Download PDF

Info

Publication number
CN111522785A
CN111522785A CN202010303590.0A CN202010303590A CN111522785A CN 111522785 A CN111522785 A CN 111522785A CN 202010303590 A CN202010303590 A CN 202010303590A CN 111522785 A CN111522785 A CN 111522785A
Authority
CN
China
Prior art keywords
data
request
export
target data
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010303590.0A
Other languages
Chinese (zh)
Other versions
CN111522785B (en
Inventor
许文雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhongtongji Network Technology Co Ltd
Original Assignee
Shanghai Zhongtongji Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhongtongji Network Technology Co Ltd filed Critical Shanghai Zhongtongji Network Technology Co Ltd
Priority to CN202010303590.0A priority Critical patent/CN111522785B/en
Publication of CN111522785A publication Critical patent/CN111522785A/en
Application granted granted Critical
Publication of CN111522785B publication Critical patent/CN111522785B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a data extraction auditing method, a data extraction auditing device and data extraction auditing equipment, wherein the method can receive a data export request, the data export request carries a request log, the approval grade corresponding to the data export request is determined according to a data sensitivity grade and a preset approval mode, and a data identifier corresponding to the data export request is obtained after approval is passed; and according to the data identification, target data corresponding to the data export request is exported, the request log and the retention log in the steps are associated into the target data, and finally the target data is subjected to feedback processing according to a data feedback mode. By adopting the technical scheme of the invention, after the leaked data is determined, the associated retention log and request log are determined according to the leaked data, and then the information of a requester, the corresponding approval mode and the export process of the data are determined, so that the source of the data leakage is traced back, the loss of a company is recovered, and the normal operation of the company is ensured.

Description

Data extraction auditing method, device and equipment
Technical Field
The invention relates to the technical field of computers, in particular to a data extraction auditing method, device and equipment.
Background
Various items of data of a company are an important part for supporting the operation of business of the company. The data is required to be exported and used by each department of the company and staff at each level according to the working requirements. After the staff acquires the corresponding authority, the data system can automatically export the data required by the staff.
However, there is a part of important confidential data in all data of a company, and once leakage occurs, a certain loss is caused to the company. Moreover, after data leakage occurs at present, only the content of the leaked data can be determined, and the source of the leaked data cannot be found, so that the loss cannot be recovered, and the loss can be further enlarged, so that a company cannot normally operate.
Disclosure of Invention
In view of this, the present invention aims to provide a data extraction auditing method, apparatus and device to overcome the problem that after data leakage occurs at present, only the content of the leaked data can be determined, and the source of the leaked data cannot be found, so that the loss cannot be recovered, and the loss can be further expanded, so that a company cannot operate normally.
In order to achieve the purpose, the invention adopts the following technical scheme:
a data extraction auditing method, comprising:
receiving a data export request; the data export request carries a request log, wherein the request log comprises basic information of a data requester, a data sensitivity level and a data feedback mode;
determining an approval grade corresponding to the data export request according to the data sensitivity grade and a preset approval mode;
after the approval is passed, acquiring a data identifier corresponding to the data export request;
exporting target data corresponding to the data export request according to the data identification;
associating the request log and the persisted log of the above steps into the target data so that the request log and the persisted log associated with the target data can be determined after the target data is received;
and performing feedback processing on the target data according to the data feedback mode.
Further, in the data extraction auditing method, the data identifier includes SQL, a database address and a derived identifier of derived personnel;
the exporting, according to the data identifier, target data corresponding to the data export request includes:
judging whether the export identification meets the export level of the target data;
if yes, the target data is automatically exported according to the SQL and the database address.
Further, the above data extraction auditing method, where performing feedback processing on the target data according to the data feedback manner, includes:
and if the data export mode is direct feedback to the requester, sending the target data to a receiving platform of the requester, and sending an access link and an access password corresponding to the target data to the receiving platform.
Further, the above data extraction auditing method, where performing feedback processing on the target data according to the data feedback manner, includes:
and if the data export mode is data retention, storing the target data locally.
Further, the data extraction auditing method described above further includes:
and if the data sensitivity level reaches a preset level, taking the data export request as a special request to carry out deep monitoring.
Further, the data extraction auditing method described above, where deep monitoring is performed by using the data export request as a special request, includes:
and saving target data corresponding to the special request to the retention log.
The invention also provides a data extraction auditing device, which comprises:
a receiving module for receiving a data export request; the data export request carries a request log, wherein the request log comprises basic information of a data requester, a data sensitivity level and a data feedback mode;
the determining module is used for determining an approval grade corresponding to the data export request according to the data sensitivity grade and a preset approval mode;
the acquisition module is used for acquiring the data identification corresponding to the data export request after the approval is passed;
the export module is used for exporting the target data corresponding to the data export request according to the data identification;
an associating module, configured to associate the request log and the retention log of the foregoing steps into the target data, so that after receiving the target data, the request log and the retention log associated with the target data can be determined;
and the feedback module is used for carrying out feedback processing on the target data according to the data feedback mode.
Further, in the above data extraction auditing apparatus, the data identifier includes SQL, a database address, and a derived identifier of a derived person;
the export module is specifically configured to determine whether the export identifier satisfies an export level of the target data;
if yes, the target data is automatically exported according to the SQL and the database address.
Further, the feedback module of the data extraction auditing apparatus is specifically configured to send the target data to a receiving platform of the requesting party and send an access link and an access password corresponding to the target data to the receiving platform if the data export manner is direct feedback to the requesting party.
The invention also provides data extraction auditing equipment, which comprises a processor and a memory, wherein the processor is connected with the memory:
the processor is used for calling and executing the program stored in the memory;
the memory for storing the program for performing at least the data extraction auditing method of any preceding claim.
The data extraction auditing method, the device and the equipment receive a data export request, wherein the data export request carries a request log, then an approval grade corresponding to the data export request is determined according to a data sensitive grade and a preset approval mode, and after approval is passed, a data identifier corresponding to the data export request is obtained; and according to the data identification, target data corresponding to the data export request is exported, the request log and the retention log in the steps are associated into the target data, and finally the target data is subjected to feedback processing according to a data feedback mode. By adopting the technical scheme of the invention, after the leaked data is determined, the associated retention log and request log are determined according to the leaked data, and then the information of a requester, the corresponding approval mode and the export process of the data are determined, so that the source of the data leakage is traced back, the loss of a company is recovered, and the normal operation of the company is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart provided by one embodiment of a data extraction auditing method of the present invention;
FIG. 2 is a schematic structural diagram provided by an embodiment of the data extraction auditing apparatus of the present invention;
fig. 3 is a schematic structural diagram provided by an embodiment of the data extraction auditing device of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
FIG. 1 is a flow chart provided by one embodiment of the data extraction auditing method of the present invention. Referring to fig. 1, the data extraction auditing method of the present embodiment may include the following steps:
s101, receiving a data export request;
if the data requester has the need of exporting data, the data requester can send a data export request first. The data export request carries a request log, wherein the request log generally comprises a requester, a data sensitivity level, a data feedback mode and the like.
The requestor may be the name, identity information, job title, reason for data requirements, etc. of the person requesting the export data. The data feedback mode can include two modes, one mode is that data is directly sent to a requester after being exported, and then the requester needs to include the address of a receiving platform. And the other is that the request party can copy or download the data by itself if the request party is kept locally.
S102, determining an approval grade corresponding to the data export request according to the data sensitivity grade and a preset approval mode;
different approval modes can be correspondingly set for data with different sensitivity levels. For example, the lowest level of data need not be approved, and can be passed directly; the data of the middle level is examined and approved by the direct leader of the requester, and the data of the highest level is examined and approved by the highest leader of the department of the requester.
S103, acquiring a data identifier corresponding to the data export request after the approval is passed;
if the approval fails, the data does not have to be exported and the process terminates.
If the approval is passed, a database administrator or system developer may enter the data identification. Wherein the data identification at least comprises a Structured Query Language (SQL), a database address and an export identification of an export person. In this embodiment, SQL, the database address, and the export identifier of the exporter are obtained.
S104, exporting target data corresponding to the data export request according to the data identification;
and exporting the target data corresponding to the data export request according to the data identification acquired in the step.
The process of exporting the target data may include the steps of:
a: judging whether the export identification meets the export level of the target data;
b: if yes, automatically exporting the target data according to the SQL and the database address.
In particular, to further ensure the security of data information, different permissions may be given to the database administrator. The target data can only continue to be exported if the database administrator meets the export level of the target data.
When the data is exported, the target data in the target database can be determined according to the SQL and the database address.
S105, associating the request log and the retention log in the step into target data;
in this embodiment, the working logs generated in the above steps are all kept as the retained log, and the retained log and the request log are associated with the target data together, so that the request log and the retained log associated with the target data can be determined after the target data is received.
Therefore, once data leakage occurs, the related retention log and the request log can be reversely determined according to the leaked data, so that a requester and an auditing condition can be found, a leakage source can be traced back, and the loss of a company can be recovered.
And S106, performing feedback processing on the target data according to a data feedback mode.
And after the target data are exported, processing the target data according to a data feedback mode.
Specifically, if the target data is directly sent to the requester after being derived, the target data is sent to the receiving platform of the requester according to the address of the receiving platform, the access link and the access password corresponding to the target data are sent to the receiving platform, and the requester can download the target data according to the access link and the access password.
If the data export mode is data retention, the target data is stored locally, and the requester can copy or download the target data from the local.
The data extraction auditing method of the embodiment comprises the steps of receiving a data export request, determining an approval grade corresponding to the data export request according to a data sensitive grade and a preset approval mode, and acquiring a data identifier corresponding to the data export request after approval is passed; and according to the data identification, target data corresponding to the data export request is exported, the request log and the retention log in the steps are associated into the target data, and finally the target data is subjected to feedback processing according to a data feedback mode. By adopting the technical scheme of the invention, after the leaked data is determined, the associated retention log and request log are determined according to the leaked data, and then the information of a requester, the corresponding approval mode and the export process of the data are determined, so that the source of the data leakage is traced back, the loss of a company is recovered, and the normal operation of the company is ensured.
Further, on the basis of the above embodiment, the present embodiment may further include the following steps:
and if the data sensitivity level reaches a preset level, taking the data export request as a special request to carry out deep monitoring.
In particular, data of high sensitivity level is significant to companies, and once leaked, may bring huge risk to the companies. Therefore, a preset grade can be set, when the data sensitivity grade reaches the preset grade, the data export request is used as a special request, export monitoring of target data corresponding to the special request can be used as a special item, a flow with a prominent priority is listed, and besides retention of a common working log, specific export content of high-grade data also needs to be retained.
The invention also provides a data extraction auditing device which is used for realizing the method embodiment. Fig. 2 is a schematic structural diagram provided by an embodiment of a data extraction auditing apparatus of the present invention, please refer to fig. 2, the data extraction auditing apparatus of the present embodiment includes:
a receiving module 11, configured to receive a data export request; the data export request carries a request log, wherein the request log comprises basic information of a data requester, a data sensitivity level and a data feedback mode;
the determining module 12 is configured to determine an approval level corresponding to the data export request according to the data sensitivity level and a preset approval manner;
the obtaining module 13 is configured to obtain a data identifier corresponding to the data export request after the approval is passed;
the export module 14 is used for exporting the target data corresponding to the data export request according to the data identification;
the association module 15 is configured to associate the request log and the persistent log in the foregoing steps with the target data, so that after the target data is received, the request log and the persistent log associated with the target data can be determined;
and the feedback module 16 is configured to perform feedback processing on the target data according to a data feedback manner.
Further, the data identification comprises SQL, a database address and a derived identification of derived personnel;
the export module is specifically used for judging whether the export identification meets the export grade of the target data;
if yes, automatically exporting the target data according to the SQL and the database address.
Further, the feedback module is specifically configured to send the target data to a receiving platform of the requester and send the access link and the access password corresponding to the target data to the receiving platform if the data derivation manner is direct feedback to the requester.
Further, the feedback module is specifically configured to perform deep monitoring by using the data export request as a special request if the data sensitivity level reaches a preset level.
Further, the embodiment further comprises a depth monitoring module;
and the deep monitoring module is used for taking the data export request as a special request to carry out deep monitoring if the data sensitivity level reaches a preset level.
Further, the deep monitoring module is specifically configured to save target data corresponding to the special request to the retention log.
The invention also provides data extraction auditing equipment which is used for realizing the method embodiment. Fig. 3 is a schematic structural diagram provided by an embodiment of a data extraction auditing device of the present invention, please refer to fig. 3, the data extraction auditing device of the present embodiment includes a processor 21 and a memory 22, the processor 21 is connected to the memory 22, wherein the processor 21 is configured to call and execute a program stored in the memory 22, and the memory 22 is configured to store the program, and the program is at least configured to execute the data extraction auditing method according to the above embodiment.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A data extraction auditing method is characterized by comprising the following steps:
receiving a data export request; the data export request carries a request log, wherein the request log comprises basic information of a data requester, a data sensitivity level and a data feedback mode;
determining an approval grade corresponding to the data export request according to the data sensitivity grade and a preset approval mode;
after the approval is passed, acquiring a data identifier corresponding to the data export request;
exporting target data corresponding to the data export request according to the data identification;
associating the request log and the persisted log of the above steps into the target data so that the request log and the persisted log associated with the target data can be determined after the target data is received;
and performing feedback processing on the target data according to the data feedback mode.
2. The data extraction auditing method of claim 1 where the data identification comprises Structured Query Language (SQL), a database address, and a derived identification of a derived person;
the exporting, according to the data identifier, target data corresponding to the data export request includes:
judging whether the export identification meets the export level of the target data;
if yes, the target data is automatically exported according to the SQL and the database address.
3. The data extraction auditing method of claim 1, where the feedback processing of the target data according to the data feedback manner comprises:
and if the data export mode is direct feedback to the requester, sending the target data to a receiving platform of the requester, and sending an access link and an access password corresponding to the target data to the receiving platform.
4. The data extraction auditing method of claim 1, where the feedback processing of the target data according to the data feedback manner comprises:
and if the data export mode is data retention, storing the target data locally.
5. The data extraction auditing method of claim 1, the method further comprising:
and if the data sensitivity level reaches a preset level, taking the data export request as a special request to carry out deep monitoring.
6. The data extraction auditing method of claim 5, where said deep monitoring of the data export request as an ad-hoc request comprises:
and saving target data corresponding to the special request to the retention log.
7. A data extraction auditing device, characterized by comprising:
a receiving module for receiving a data export request; the data export request carries a request log, wherein the request log comprises basic information of a data requester, a data sensitivity level and a data feedback mode;
the determining module is used for determining an approval grade corresponding to the data export request according to the data sensitivity grade and a preset approval mode;
the acquisition module is used for acquiring the data identification corresponding to the data export request after the approval is passed;
the export module is used for exporting the target data corresponding to the data export request according to the data identification;
an associating module, configured to associate the request log and the retention log of the foregoing steps into the target data, so that after receiving the target data, the request log and the retention log associated with the target data can be determined;
and the feedback module is used for carrying out feedback processing on the target data according to the data feedback mode.
8. The data extraction auditing apparatus of claim 7 where the data identification comprises SQL, a database address, and a derived identification of a derived person;
the export module is specifically configured to determine whether the export identifier satisfies an export level of the target data;
if yes, the target data is automatically exported according to the SQL and the database address.
9. The data extraction auditing apparatus of claim 7, wherein the feedback module is specifically configured to send the target data to a receiving platform of the requesting party and send an access link and an access password corresponding to the target data to the receiving platform if the data export manner is direct feedback to the requesting party.
10. A data extraction auditing device, comprising a processor and a memory, the processor coupled to the memory:
the processor is used for calling and executing the program stored in the memory;
the memory for storing the program for performing at least the data extraction auditing method of any one of claims 1-6.
CN202010303590.0A 2020-04-17 2020-04-17 Data extraction auditing method, device and equipment Active CN111522785B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010303590.0A CN111522785B (en) 2020-04-17 2020-04-17 Data extraction auditing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010303590.0A CN111522785B (en) 2020-04-17 2020-04-17 Data extraction auditing method, device and equipment

Publications (2)

Publication Number Publication Date
CN111522785A true CN111522785A (en) 2020-08-11
CN111522785B CN111522785B (en) 2024-04-09

Family

ID=71902920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010303590.0A Active CN111522785B (en) 2020-04-17 2020-04-17 Data extraction auditing method, device and equipment

Country Status (1)

Country Link
CN (1) CN111522785B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113010708A (en) * 2021-03-11 2021-06-22 上海麦糖信息科技有限公司 Verification method and system for illegal friend circle content and illegal chat content
CN113672903A (en) * 2021-10-22 2021-11-19 深圳市信润富联数字科技有限公司 Password management method, electronic device, device and readable storage medium
CN114124542A (en) * 2021-11-25 2022-03-01 合芯科技(苏州)有限公司 Method for exporting confidential data to shared security area after approval of research and development network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762803B (en) * 2018-04-17 2021-09-10 平安科技(深圳)有限公司 Configuration management method, device, terminal equipment and storage medium
CN108712385A (en) * 2018-04-18 2018-10-26 平安科技(深圳)有限公司 Data capture method, device, computer equipment and storage medium
CN109542857B (en) * 2018-11-26 2021-06-29 杭州迪普科技股份有限公司 Audit log storage method, audit log query method, audit log storage device, audit log query device and related equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113010708A (en) * 2021-03-11 2021-06-22 上海麦糖信息科技有限公司 Verification method and system for illegal friend circle content and illegal chat content
CN113010708B (en) * 2021-03-11 2023-08-25 上海麦糖信息科技有限公司 Method and system for auditing illegal friend circle content and illegal chat content
CN113672903A (en) * 2021-10-22 2021-11-19 深圳市信润富联数字科技有限公司 Password management method, electronic device, device and readable storage medium
CN114124542A (en) * 2021-11-25 2022-03-01 合芯科技(苏州)有限公司 Method for exporting confidential data to shared security area after approval of research and development network
CN114124542B (en) * 2021-11-25 2024-03-15 合芯科技(苏州)有限公司 Method for exporting confidential data to shared security area after approval by research and development network

Also Published As

Publication number Publication date
CN111522785B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
US11741100B2 (en) Providing matching security between data stores in a database system
CN111522785A (en) Data extraction auditing method, device and equipment
US7971231B2 (en) Configuration management database (CMDB) which establishes policy artifacts and automatic tagging of the same
US10761960B2 (en) Code assessment platform
CN110795257A (en) Method, device and equipment for processing multi-cluster operation records and storage medium
US10911447B2 (en) Application error fingerprinting
US10353723B2 (en) PL/SQL language parsing at a virtual machine
US9514176B2 (en) Database update notification method
US10552642B2 (en) Dynamic data-use restrictions
US11870645B1 (en) Configuration drift management tool
WO2020015116A1 (en) Database monitoring method and terminal device
CN112560090A (en) Data detection method and device
US11481493B2 (en) Systems and methods for generating an inventory of software applications for optimized analysis
CN112068874B (en) Continuous integration method and device for software items, terminal equipment and storage medium
US20120173572A1 (en) Concurrent Long Spanning Edit Sessions using Change Lists with Explicit Assumptions
CN116932072A (en) Service configuration method, device, computer readable storage medium and terminal equipment
US8527446B2 (en) Information integrity rules framework
CA3048699C (en) Join pattern agnostic aggregate computation in database query operations
CN115329395A (en) Database data processing method, device, system, equipment and storage medium
CN111552703A (en) Data processing method and device
CN111813880A (en) Method, system and storage medium for managing territorial space planning project
CN113127578A (en) Entity reference processing method and related equipment
CN111090835B (en) Method and device for constructing file derivative graph
US11663324B2 (en) Obtaining information for security configuration
CN117195204B (en) Abnormal data detection method, device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant