CN112765266A - Method, device and equipment for managing data assets and computer storage medium - Google Patents
Method, device and equipment for managing data assets and computer storage medium Download PDFInfo
- Publication number
- CN112765266A CN112765266A CN202011617722.3A CN202011617722A CN112765266A CN 112765266 A CN112765266 A CN 112765266A CN 202011617722 A CN202011617722 A CN 202011617722A CN 112765266 A CN112765266 A CN 112765266A
- Authority
- CN
- China
- Prior art keywords
- data
- assets
- server
- block
- data assets
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/283—Multi-dimensional databases or data warehouses, e.g. MOLAP or ROLAP
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the application provides a method, a device, equipment and a computer storage medium for managing data assets, wherein the data assets are obtained from a data warehouse, the data assets are stored and linked up to obtain block data, the safety of the data assets is improved by using the continuity and traceability of the block chain technical support, the block data is distributed to a server, return data sent by the server is received, the return data is operation data of a user using the data assets according to the block data received by the server, the use condition of the data assets is intelligently analyzed according to the operation data, the data assets are automatically processed, manual evaluation and analysis are not needed, the process of obtaining, evaluating and analyzing the operation data is simplified, the labor cost is reduced, and the management efficiency of the data assets is improved.
Description
Technical Field
The present application relates to the field of block chaining technologies, and in particular, to a method, an apparatus, a device, and a computer storage medium for data asset management.
Background
The concept of data being an asset has become a common industry consensus, with data asset management throughout the entire life cycle of data acquisition, storage, application, and offline. After data distribution and transmission, the data asset management system at the present stage evaluates and analyzes the data assets by manually inquiring operation information such as data asset calling times, calling results and the like. Especially, for unused data assets within a certain period, the operation data of the data assets needs to be manually acquired, and offline processing is performed after the data assets are evaluated, so that the labor cost is high, and the data assets cannot be processed in time, so that the data asset management efficiency is low.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a computer storage medium for data asset management, which can perform asset data evaluation according to return data, automatically process asset data which is not used for a long time, simplify the processes of acquiring, evaluating and analyzing operation data, reduce labor cost and improve data asset management efficiency.
In a first aspect, an embodiment of the present application provides a method for data asset management, where the method includes:
obtaining data assets from a data warehouse;
saving the uplink of the data assets to obtain block data;
distributing the block data to a server;
receiving returned data sent by the server, wherein the returned data is operation data of a user using data assets according to the block data received by the server;
the data assets are processed according to the operational data.
In one possible implementation, the operation data includes operation actions, operation times and operation time; processing the data asset according to the operational data, comprising:
obtaining operation analysis data according to the operation action, the operation times and the operation time;
and processing the data assets according to the operational analysis data.
In one possible implementation, the method further includes: and sending the operation data to the data warehouse so that the data warehouse can acquire the use information of the data assets by the user according to the operation data.
In one possible implementation, the data asset is digitally signed and encrypted after the data asset is acquired and before the data asset is stored on the chain.
In one possible implementation, the method further includes: and receiving a random sequence sent by the server, wherein the random sequence represents a timestamp of the number of the receiving blocks of the server.
In a second aspect, an embodiment of the present application provides an apparatus for data asset management, where the apparatus includes:
the acquisition module is used for acquiring data assets from the data warehouse;
the storage module is used for storing and chaining the data assets to obtain block data;
the distribution module is used for distributing the block data to the server;
the receiving module is used for receiving returned data distributed by the server, and the returned data is operation data of a user using data assets according to the block data received by the server;
and the processing module is used for processing the data assets according to the operation data.
In one possible implementation, the operation data includes operation actions, operation times and operation time; the processing module is specifically used for obtaining operation analysis data according to the operation actions, the operation times and the operation time;
and processing the data assets according to the operational analysis data.
In one possible implementation, the apparatus further includes: and the sending module is used for sending the operation data to the data warehouse so that the data warehouse can acquire the use information of the user on the data assets according to the operation data.
In one possible implementation, the apparatus further includes: and the encryption module is used for carrying out digital signature encryption on the data assets before the data assets are stored and linked.
In a possible implementation manner, the receiving module is further configured to receive a random sequence sent by the server, where the random sequence represents a timestamp of the data received by the server.
In a third aspect, an embodiment of the present application provides a data asset management device, including: a processor, and a memory storing computer program instructions; the processor reads and executes the computer program instructions to implement the method of data asset management of the first aspect or any one of the possible implementations of the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer storage medium, on which computer program instructions are stored, and the computer program instructions, when executed by a processor, implement the method for data asset management in the first aspect or any one of the possible implementation manners of the first aspect.
The method, the device, the equipment and the computer storage medium for managing the data assets provided by the embodiment of the application acquire the data assets from a data warehouse, store and chain the data assets, obtain block data, improve the safety of the data assets by utilizing the continuity and traceability of the technical guarantee authority of the block chain, distribute the block data to a server, receive return data sent by the server, wherein the return data is operation data of a user using the data assets according to the block data received by the server, intelligently analyze the use condition of the data assets according to the operation data, automatically process the data assets, do not need to perform manual evaluation and analysis, simplify the process of acquiring, evaluating and analyzing the operation data, reduce the labor cost and improve the management efficiency of the data assets.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method for data asset management provided by an embodiment of the present application;
fig. 2 is a schematic flowchart of a digital signature encryption method provided in an embodiment of the present application;
fig. 3 is a schematic flowchart of a digital signature decryption method according to an embodiment of the present application;
FIG. 4 is a schematic structural diagram of a data asset management device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data asset management device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Data asset safety management, sharing management and value management are three important links in a data asset management system.
At the present stage, there are two main ways for data asset security management, sharing management and value management.
The first mode is to carry out classified encryption processing according to asset sensitive information and real-time monitoring and auditing of sensitive assets according to manual experience. After data distribution and transmission, information such as the number of times of calling and calling results of evaluation data assets is manually inquired for evaluation and analysis, unused assets in a certain period are manually evaluated and offline processed.
The second mode is to adopt artificial intelligence, and the system of revealing is prevented to intelligence based on data security and sharing formation, mainly includes: s1, classifying and identifying the sensitive information; s2, sensitive data transmission processing and management and control; and S3, intelligent data monitoring and auditing.
However, the existing data asset management mode has certain risks, such as auditing and monitoring of sensitive information according to manual experience, and omission risks of sensitive information, sensitive actions and the like. If the data asset sensitive information and the data processing management and control are identified through artificial intelligence, but the non-sensitive information is not managed and controlled, the data asset sensitive information and the data processing management and control are easily tampered in the transmission process, so that the risk of data failure is caused.
In order to solve the prior art problems, embodiments of the present application provide a method, an apparatus, a device, and a computer storage medium for data asset management.
In the embodiment of the application, data assets are obtained from a data warehouse, the data assets are stored and linked up to obtain block data, the block data are distributed to a server, the data distribution condition and the use process of a user are recorded in the form of a block chain, return data sent by the server are received, the return data are operation data of the user using the data assets according to the block data received by the server, data value evaluation, data analysis and visual display are automatically performed according to the operation data, the data assets which are not used for a long time and do not generate data values are automatically processed, manual evaluation and analysis are not needed, the labor cost is reduced, and the data asset management efficiency is improved.
The following first describes a method for managing data assets provided by the embodiments of the present application.
FIG. 1 illustrates a flow diagram of a method for data asset management provided by an embodiment of the present application. As shown in fig. 1, the method may include the steps of:
and S110, acquiring the data assets from the data warehouse.
The data assets are digital assets of common individuals and enterprises, for example, various data which are obtained by taking photos, videos, edited documents and the like at ordinary times and take files as carriers belong to the data assets of individuals. For an enterprise or organization, design drawings, contract orders, and any business that involves the use of documents as carriers belong to the data assets of the enterprise or organization. Particularly for enterprises or organizations, data assets provide reasonable basis for management control and scientific decision-making of the enterprises or organizations.
Enterprises or organizations can acquire data assets from internal data warehouses through data asset management devices, and can also acquire data assets from external data warehouses through cooperation, lease and other means.
S120, the data assets are stored and linked up to obtain block data.
And the data asset management device stores and chains the data assets acquired from the data warehouse by adopting a block chain technology, and packs the data assets into blocks according to a chain data structure to be stored, so as to obtain block data.
In some embodiments, after the data asset is obtained, the data asset is encrypted with a digital signature prior to being stored on the chain.
Digital signatures are a method for authenticating digital information using encryption techniques that use public keys. In the block chain technology, the digital signature relates to tools such as a public key and a private key, and has two functions: firstly, the message is proved to be actually signed and sent out by a message sender, and secondly, the integrity of the message is determined and the message is not tampered. Sensitive information is not tampered in the transmission of the digital signature, and people without authentication and authorization can not see original data, so that the security of sensitive data in the transmission of the digital signature is realized.
Taking data a as an example, as shown in fig. 2, the digital signature encryption method includes the following steps:
s210, calculating the hash value of the data A to be transmitted through a hash algorithm.
And S220, generating a digital summary H according to the hash value of the data A to be transmitted.
And S230, encrypting the digital abstract H through a private key to generate a digital signature C.
And S240, sending the data A to be transmitted and the digital signature C to the server.
It should be noted that the user information is private data, such as the name, age, and phone number of the user, and this part of information is encrypted and shielded for data verification in the data asset, but is not transmitted as sharable data. The user data is stored, associated and transmitted by the user unique code.
The data assets comprise sensitive asset information and non-sensitive asset information, the sensitive asset information and the non-sensitive asset information which are subjected to digital signature encryption are integrally subjected to data encapsulation to form a chain-type data object, and the uniqueness of the data assets is ensured through a unique coding mechanism so that the data assets cannot be copied and tampered, thereby ensuring the safety of the data assets.
S130, distributing the block data to the server.
The data asset management device controls the authority to determine the transmission object. The data asset management device may specify a block chain of write permissions in only one organizer's hand, and read permissions may be open to the outside or read permissions of arbitrary programs may be restricted.
And according to system scheduling, appointing a data asset requirement period according to an opposite end, distributing the block data to an opposite-end usable service end, and distributing the block data to a plurality of service ends at the same time.
The distribution process records information and uses another set of encryption rules, so that users cannot decrypt the information, such as events, state data and the like generated by operation. The part is a private chain, only the block chain technology is adopted for recording, the recording is not public, and only the internal circulation is recorded and is shared by an asset manager.
And recording events, states and time generated by the integral operation of the data is the right to confirm so as to ensure that the integral flow of the data is traceable and safe to use and is valuable.
S140, receiving the returned data sent by the server, where the returned data is the operation data of the user using the data asset according to the block data received by the server.
After distributing the block data to the server, the server first decrypts the block data. And when the server receives the data a to be transmitted and the digital signature C sent to the server in the step S240, decrypting the data a and the digital signature C. As shown in fig. 3, the digital signature decryption method includes the following steps:
s310, calculating a hash value of the received data a through a hash algorithm.
S320, a digital digest H1 is generated according to the hash value of the received data a.
S330, the digital signature C is decrypted through the public key to obtain a digital digest H2.
And S340, when the contents of the digital summary H1 and the digital summary H2 are consistent, verifying that the received data A is correct information.
After verifying that the received data A is correct information, the user can use the data assets at the server side. The user can use the data in the public chain block, but the events, state data and the like generated by the data asset operation in the private chain are encrypted independently and cannot be decrypted for use.
When the user uses the data assets at the server side, the sensitive action triggers a security auditing mechanism. The safety auditing mechanism is controlled according to the safety authority, the use of the block chain by the user is limited to the reading use by authorized participants, the data calling, the association analysis, the modeling training, the flexible and comprehensive inquiry and analysis of the data and the like can be carried out, but the data cannot be copied, modified and detailed information inquiry operation cannot be carried out due to the appointed authorization limitation, so that the safety of the data assets is ensured. And starting the whole process from decryption to data use from the server, recording the whole operation action, the operation times, the operation time stamp and the like of the user on the block, recording action trigger information, and returning the private chain block recording the whole action to the data asset management device.
In addition, the block data can be transmitted to the next-level server, and the server compresses all information recorded in the previous block, records all user operation data, encrypts and transmits the operation data to the data asset management device. The block structure of the block data is very important, the block header of each block contains the compressed value of all transaction information of the previous block, so that a chain is formed from the starting block to the current block, and the complete block chain records all operation records in the data transmission process. Wherein, each block contains a plurality of attribute information, for example, block size information, which records the size of the current block; the block header information records the header information of the current block, and the hash value of the block header information is a parameter of the next new block; transaction counting information, which records the flow number recorded by the current block; a timestamp recording the time of current block generation, in accordance with the UNIX time format of UNIX; and transmitting information, wherein all transmission details stored in the current block are recorded.
The data asset management device receives the returned data, namely the operation data, sent by the server side, so that the use condition of the data asset can be conveniently evaluated and analyzed, corresponding processing measures are taken, manual evaluation and analysis are not needed, the process of obtaining the operation data and the evaluation and analysis data is simplified, the labor cost is reduced, and the management efficiency of the data asset is improved.
And S150, processing the data assets according to the operation data.
And the data asset management device decrypts the operation data returned by the server, evaluates and analyzes the data asset according to the decrypted operation data, and takes corresponding processing measures.
In some embodiments, the operation data includes operation actions, operation times, operation time, wherein the operation actions include operation actions of merging, splitting, copying, deleting and the like. Through the operation actions, the operation time and the operation times, the data asset use condition of the user can be obtained, the data asset use condition of the user is analyzed, the data asset life cycle is evaluated, and the operation analysis data is obtained. The operation analysis data comprises evaluation data of data asset redundancy conditions, assets which are not used for a long time and do not generate data value are intelligently analyzed, automatic distribution stopping processing, automatic offline processing and the like are achieved, asset redundancy is avoided, resource input cost is reduced, and the life cycle of the data is managed.
Aiming at the sensitive action of the user, the data asset management device triggers a sensitive operation safety auditing mechanism to audit the sensitive information, and the non-safe action is forbidden to be used.
In the embodiment of the application, data assets are obtained from a data warehouse, the data assets are stored and linked up to obtain block data, the block data are distributed to a server, the data distribution condition and the use process of a user are recorded in the form of a block chain, return data sent by the server are received, the return data are operation data of the user using the data assets according to the block data received by the server, data value evaluation, data analysis and visual display are automatically performed according to the operation data, the data assets which are not used for a long time and do not generate data values are automatically processed, manual evaluation and analysis are not needed, the process of obtaining, evaluating and analyzing the operation data is simplified, the labor cost is reduced, and the data asset management efficiency is improved.
In some embodiments, the method further comprises: and sending the operation data to the data warehouse so that the data warehouse can acquire the use information of the data assets by the user according to the operation data.
And the data asset management device sends the operation data to the data warehouse, stores the operation data in the data warehouse, stores the operation data for at least 5 years, and is used for tracing the use information of the data assets of the user in the data warehouse at any time to perform analysis and positioning.
In some embodiments, the method further comprises: and receiving a random sequence sent by the server, wherein the random sequence represents a timestamp of the data of the receiving block of the server.
After the server receives the block data, the server puts the block data into a block, adds a timestamp by performing random hashing on a group of data in the form of the block, the timestamp represents the time when the server receives the block data, encrypts the random hashing and transmits the information back to the data asset management device for storage and recording, and the data asset management device is convenient to inquire which server the block data are sent to when.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present disclosure. As shown in fig. 4, the data asset management device 400 may include an obtaining device 410, a storing device 420, a distributing device 430, a receiving device 440 and a processing device 450.
An acquisition module 410 for acquiring data assets from a data warehouse;
a saving module 420, configured to save the uplink data to obtain block data;
a distribution module 430, configured to distribute the block data to the server;
the receiving module 440 is configured to receive return data distributed by the server, where the return data is operation data of a user using data assets according to the block data received by the server;
a processing module 450 for processing the data assets according to the operational data.
In the embodiment of the application, the asset data can be evaluated according to the returned data, the asset data which is not used for a long time is automatically processed, the processes of acquiring, evaluating and analyzing the operation data are simplified, the labor cost is reduced, and the data asset management efficiency is improved
In some embodiments, the operation data includes operation actions, operation times, and operation time; the processing module 450 is specifically configured to obtain operation analysis data according to the operation actions, the operation times, and the operation time;
and processing the data assets according to the operational analysis data.
In some embodiments, the apparatus further comprises: the sending module 460 sends the operation data to the data warehouse, so that the data warehouse obtains the use information of the data assets by the user according to the operation data.
In some embodiments, the apparatus further comprises: and an encryption module 470, configured to encrypt the digital signature of the data asset after the data asset is acquired and before the data asset is stored and linked.
In some embodiments, the receiving module 440 is further configured to receive a random sequence sent by the server, where the random sequence represents a timestamp of the data of the block received by the server.
Each module in the apparatus shown in fig. 4 has a function of implementing each step in fig. 1, and can achieve the corresponding technical effect, and for brevity, is not described again here.
Fig. 5 is a schematic diagram illustrating a hardware structure of a data asset management device according to an embodiment of the present application.
The data asset management device may comprise a processor 501 and a memory 502 in which computer program instructions are stored.
Specifically, the processor 501 may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement the embodiments of the present Application.
In one example, memory 502 may include Read Only Memory (ROM), Random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory 502 comprises one or more tangible (non-transitory) computer-readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform operations described with reference to the methods according to an aspect of the present application.
The processor 501 reads and executes the computer program instructions stored in the memory 502 to implement steps S110 to S150 in the embodiment shown in fig. 1, and achieves the corresponding technical effect achieved by executing the steps in the example shown in fig. 1, which is not described herein again for brevity.
In one example, the data asset management device may also include a communication interface 503 and a bus 510. As shown in fig. 5, the processor 501, the memory 502, and the communication interface 503 are connected via a bus 510 to complete communication therebetween.
The communication interface 503 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present application.
The data asset management device may execute the method for data asset management in the embodiment of the present application from the data assets acquired by the data warehouse and the return data sent by the server, so as to implement the method for data asset management described in conjunction with fig. 1.
In addition, in combination with the method for data asset management in the foregoing embodiments, the embodiments of the present application may provide a computer storage medium to implement. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement a method of data asset management as in any of the above embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentality described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic Circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.
Claims (12)
1. A method of data asset management, comprising:
obtaining data assets from a data warehouse;
saving and chaining the data assets to obtain block data;
distributing the block data to a server;
receiving return data sent by the server, wherein the return data is operation data of a user using data assets according to the block data received by the server;
processing the data asset according to the operational data.
2. The method of claim 1, wherein the operation data comprises operation actions, operation times, operation time; said processing said data asset in accordance with said operational data comprising:
obtaining operation analysis data according to the operation action, the operation times and the operation time;
and processing the data assets according to the operational analysis data.
3. The method of claim 2, further comprising:
and sending the operation data to the data warehouse so that the data warehouse can acquire the use information of the data assets by the user according to the operation data.
4. The method of claim 1, wherein the data asset is encrypted with a digital signature after the data asset is obtained and before the data asset is stored on a chain.
5. The method of claim 1, further comprising: and receiving a random sequence sent by the server, wherein the random sequence represents a timestamp for receiving the block number by the server.
6. An apparatus for data asset management, the apparatus comprising:
the acquisition module is used for acquiring data assets from the data warehouse;
the storage module is used for storing the uplink of the data assets to obtain block data;
the distribution module is used for distributing the block data to a server;
the receiving module is used for receiving return data distributed by the server, wherein the return data is operation data of a user using data assets according to the block data received by the server;
and the processing module is used for processing the data assets according to the operation data.
7. The apparatus of claim 6, wherein the operation data comprises operation actions, operation times, operation time; the processing module is particularly used for
Obtaining operation analysis data according to the operation action, the operation times and the operation time;
and processing the data assets according to the operational analysis data.
8. The apparatus of claim 6, further comprising: and the sending module is used for sending the operation data to the data warehouse so that the data warehouse can obtain the use information of the data assets by the user according to the operation data.
9. The apparatus of claim 6, further comprising: and the encryption module is used for carrying out digital signature encryption on the data assets after the data assets are obtained and before the data assets are stored and linked.
10. The apparatus of claim 6, wherein the receiving module is further configured to receive a random sequence sent by the server, and the random sequence characterizes a timestamp of receiving the block data by the server.
11. A data asset management device, characterized in that the data asset management device comprises: a processor, and a memory storing computer program instructions; the processor reads and executes the computer program instructions to implement a method of data asset management as claimed in any one of claims 1 to 5.
12. A computer storage medium having computer program instructions stored thereon which, when executed by a processor, implement a method of data asset management as claimed in any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011617722.3A CN112765266A (en) | 2020-12-30 | 2020-12-30 | Method, device and equipment for managing data assets and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011617722.3A CN112765266A (en) | 2020-12-30 | 2020-12-30 | Method, device and equipment for managing data assets and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112765266A true CN112765266A (en) | 2021-05-07 |
Family
ID=75697992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011617722.3A Pending CN112765266A (en) | 2020-12-30 | 2020-12-30 | Method, device and equipment for managing data assets and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112765266A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114881802A (en) * | 2022-07-11 | 2022-08-09 | 湖南三湘银行股份有限公司 | Metadata-based data asset management method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110769035A (en) * | 2019-09-23 | 2020-02-07 | 北京海益同展信息科技有限公司 | Block chain asset issuing method, platform, service node and storage medium |
CN111177275A (en) * | 2020-01-02 | 2020-05-19 | 肖光昱 | Block chain-based management method, terminal, device and storage medium |
CN111260468A (en) * | 2020-01-08 | 2020-06-09 | 阿尔法云计算(深圳)有限公司 | Block chain based data operation method and related equipment and storage medium |
CN111538784A (en) * | 2020-04-21 | 2020-08-14 | 全球能源互联网研究院有限公司 | Block chain-based digital asset transaction method and device and storage medium |
US20220237326A1 (en) * | 2019-06-04 | 2022-07-28 | Qohash Inc. | System and method for certifying integrity of data assets |
-
2020
- 2020-12-30 CN CN202011617722.3A patent/CN112765266A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220237326A1 (en) * | 2019-06-04 | 2022-07-28 | Qohash Inc. | System and method for certifying integrity of data assets |
CN110769035A (en) * | 2019-09-23 | 2020-02-07 | 北京海益同展信息科技有限公司 | Block chain asset issuing method, platform, service node and storage medium |
CN111177275A (en) * | 2020-01-02 | 2020-05-19 | 肖光昱 | Block chain-based management method, terminal, device and storage medium |
CN111260468A (en) * | 2020-01-08 | 2020-06-09 | 阿尔法云计算(深圳)有限公司 | Block chain based data operation method and related equipment and storage medium |
CN111538784A (en) * | 2020-04-21 | 2020-08-14 | 全球能源互联网研究院有限公司 | Block chain-based digital asset transaction method and device and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114881802A (en) * | 2022-07-11 | 2022-08-09 | 湖南三湘银行股份有限公司 | Metadata-based data asset management method and system |
CN114881802B (en) * | 2022-07-11 | 2022-10-04 | 湖南三湘银行股份有限公司 | Metadata-based data asset management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10880732B2 (en) | Authentication of phone caller identity | |
US9875374B2 (en) | System and method for collecting, storing, and securing data | |
CN103189872B (en) | Safety in networked environment and the effectively method and apparatus of Content Selection | |
US9674156B2 (en) | Event-triggered release through third party of pre-encrypted digital data from data owner to data assignee | |
CA2899014C (en) | Policy enforcement with associated data | |
CN112182644A (en) | Data processing method and device and electronic equipment | |
CN109660346B (en) | Information hosting method, device, equipment and computer storage medium | |
CN110636043A (en) | File authorization access method, device and system based on block chain | |
CN110611657A (en) | File stream processing method, device and system based on block chain | |
CN114697048B (en) | Block chain-based carbon emission data sharing method and system | |
CN115203749A (en) | Data transaction method and system based on block chain | |
CN110955921A (en) | Electronic signature method, device, equipment and storage medium | |
CN108390857B (en) | Method and device for exporting file from high-sensitivity network to low-sensitivity network | |
CN110737905B (en) | Data authorization method, data authorization device and computer storage medium | |
CN115002141B (en) | File storage method and device based on block chain | |
CN114239044B (en) | Decentralizing device retrospective shared access system | |
CN112765266A (en) | Method, device and equipment for managing data assets and computer storage medium | |
KR101497067B1 (en) | Electric document transfer method and apparatus based digital forensic | |
CN102819695A (en) | Authorization method and application server based on java archive (Jar) | |
Lee et al. | Remote data integrity check for remotely acquired and stored stream data | |
CN110232570A (en) | A kind of information monitoring method and device | |
Uddin et al. | Blockchain and IFPS based Secure System for Managing e-FIR | |
US20220020010A1 (en) | Decentralized electronic contract attestation platform | |
CN114666063A (en) | Traditional Hash algorithm-based digital asset tracing method | |
CN113132109B (en) | Electronic deposit certificate management method and device based on block chain and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |