CN112835902A - Data asset identification and use method and equipment - Google Patents

Data asset identification and use method and equipment Download PDF

Info

Publication number
CN112835902A
CN112835902A CN202110138545.9A CN202110138545A CN112835902A CN 112835902 A CN112835902 A CN 112835902A CN 202110138545 A CN202110138545 A CN 202110138545A CN 112835902 A CN112835902 A CN 112835902A
Authority
CN
China
Prior art keywords
data
database table
data asset
result
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110138545.9A
Other languages
Chinese (zh)
Inventor
徐岩
李博
郭义兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202110138545.9A priority Critical patent/CN112835902A/en
Publication of CN112835902A publication Critical patent/CN112835902A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The method comprises the steps of selecting a target database table according to database information; performing data asset identification on the target database table to obtain a data asset type; confirming the data asset type according to a data asset result confirmation list to obtain a confirmation result; and using the data in the target database table according to the confirmation result and the use authority of the actual use scene. Therefore, the data assets can be accurately identified and labeled, different use authorities can be set, and the protection of the data assets can be achieved.

Description

Data asset identification and use method and equipment
Technical Field
The present application relates to the field of computers, and in particular, to a method and apparatus for identifying and using data assets.
Background
Nowadays, we have entered the data age in the real sense, and various kinds of data are widely used in different fields, and have different requirements for the use of data in the face of various complex scenes. Under a certain scene, a data applicant requests to check a certain data, but the data contains various information such as names, telephones, identification numbers, bank card numbers and the like, and if the data is completely displayed to an applicant, the data is extremely unsafe. Therefore, the data needs to be identified and used to achieve the purpose of protecting the data.
Disclosure of Invention
An object of the present application is to provide a method and an apparatus for identifying and using a data asset, which solve the problem in the prior art that the data asset cannot be accurately identified and safely used in a plurality of data.
According to one aspect of the application, there is provided a method of data asset identification and use, the method comprising:
selecting a target database table according to the database information;
performing data asset identification on the target database table to obtain a data asset type;
confirming the data asset type according to a data asset result confirmation list to obtain a confirmation result;
and using the data in the target database table according to the confirmation result and the use authority of the actual use scene.
Further, using the data in the target database table according to the confirmation result and the usage right of the actual usage scenario includes:
adjusting the data type in the target database table according to the confirmation result to obtain a new database table;
and judging the permission of the acquired use request under the actual use scene according to the new database table, and using the data under the new database table according to the judgment result.
Further, selecting a target database table according to the database information includes:
and selecting a target database table according to the database type, the database name and the database table name of the database.
Further, the method comprises:
and dividing the data according to the current service scene, and confirming the data asset result confirmation list.
Further, adjusting the data type in the target database table according to the confirmation result to obtain a new database table, including:
if the confirmation result is that the data asset type is not consistent with the asset type in the data asset result confirmation list, the data asset type is adjusted to be the type in the data asset confirmation result list, and the data type in the target database table is updated to obtain a new database table.
Further, the permission judgment of the obtained use request in the actual use scene according to the new database table, and the use of the data in the new database table according to the judgment result includes:
and judging whether the application permission corresponding to the acquired use request in the actual use scene meets the data asset confirmation result of the new database table, if so, judging that the use request has the use permission, and using the data in the new database table.
According to yet another aspect of the present application, there is also provided an apparatus for data asset identification and use, the apparatus comprising:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
According to yet another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement the method as described above.
Compared with the prior art, the target database table is selected according to the database information; performing data asset identification on the target database table to obtain a data asset type; confirming the data asset type according to a data asset result confirmation list to obtain a confirmation result; and using the data in the target database table according to the confirmation result and the use authority of the actual use scene. Therefore, the data assets can be accurately identified and labeled, different use authorities can be set, and the protection of the data assets can be achieved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for data asset identification and use provided in accordance with an aspect of the present application;
FIG. 2 is a flow chart illustrating a method for identifying and using data assets based on a hybrid scenario in an exemplary embodiment of the present application;
fig. 3 is a schematic structural diagram of an apparatus for data asset identification and use provided in another aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change RAM (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic cassette tape, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
FIG. 1 illustrates a flow diagram of a method for data asset identification and use provided according to an aspect of the present application, the method comprising: step S11 to step S14, wherein, step S11, the target database table is selected according to the database information; step S12, identifying the data assets of the target database table to obtain the data asset types; step S13, confirming the data asset type according to the data asset result confirmation list to obtain a confirmation result; and step S14, using the data in the target database table according to the confirmation result and the use authority of the actual use scene. Therefore, data assets are accurately identified and labeled in a plurality of data, data asset confirmation is carried out according to an identification result, data are classified and classified, asset confirmation is carried out by a user according to an actual use scene, the data assets are used according to the use permission, and the use safety of the data assets is guaranteed.
Specifically, in step S11, a target database table is selected based on the database information; the data in the database table is identified, the database table to be identified is selected according to the database information, and the identification target is found.
In step S12, performing data asset identification on the target database table to obtain a data asset type; the selected target database table is subjected to data asset identification, the data assets are owned or controlled by individuals or enterprises and can bring future economic benefits to the enterprises, and data resources recorded in a physical or electronic mode, such as names, identity information and the like, have different types of data asset types due to different data types, so that after the data in the database table is identified, the identified data asset types are confirmed. The data category and the data level are divided according to different data types, and the data asset structure is clearly used.
In step S13, the data asset type is confirmed according to the data asset result confirmation list, and a confirmation result is obtained; and determining the determined data asset type according to the requirements in different scenes, and comparing the data asset type with the data in the data asset result determination list to obtain a comparison determination result. And the data assets automatically identify the classified data types and levels and assist in data asset result confirmation. And if the identification result is inconsistent with the data asset confirmation result, the inconsistency can be identified, and the inconsistency can be compared and checked, and the asset confirmation result is modified according to the checked inconsistency.
In step S14, the data in the target database table is used according to the confirmation result and the usage right of the actual usage scenario. And judging whether the user has the authority to use the data in the target database table by using the compared confirmation result and the actual scene needing to be used, and ensuring the use safety of the data assets by distributing the authority.
In an embodiment of the present application, in step S14, the data type in the target database table is adjusted according to the confirmation result, so as to obtain a new database table; and judging the permission of the acquired use request under the actual use scene according to the new database table, and using the data under the new database table according to the judgment result. And when the user requests to use the data in the new database table, judging whether the use request in the actual use scene has the authority, and if so, allowing the data in the new database table to be used.
In one embodiment of the present application, in step S11, the target database table is selected according to the database type, the database name, and the database table name of the database. Selecting a database type, a database name and a database table name to be subjected to data asset identification, and performing data asset identification according to the information; such as selecting mysql database, school database name, employyee table name.
In one embodiment of the application, the method comprises: and dividing the data according to the current service scene, and confirming the data asset result confirmation list. The data asset result confirmation list is set in advance according to the current business scene, the types of the data are divided according to the requirements of the current business scene, and the divided data types are stored in the data asset result confirmation list so as to be compared with the data types of the data in the identification database table, for example, a contact telephone is divided into personal information types and is secondary sensitive data.
In an embodiment of the present application, if the confirmation result indicates that the data asset type is not consistent with the asset type in the data asset result confirmation list, the data asset type is adjusted to the type in the data asset confirmation result list, and the data type in the target database table is updated to obtain a new database table. The method includes the steps that data asset identification is conducted according to selected target database table information, a data asset identification task is conducted, for example, when the data asset type in an employee table is identified, a user _ info field is identified to be a contact telephone and belongs to a contact class and primary sensitive data are identified, in a data asset result confirmation list, the contact telephone is divided into a personal information type and secondary sensitive data, the identified result is compared with data in the data asset result confirmation list, if the identified result is not consistent with the data in the data asset result confirmation list, for example, the contact telephone in the user _ info field in the employee table is a personal information class and is secondary sensitive data, the identification result is changed, the contact telephone in the user _ info field in the employee table of the target database table is modified into a personal information class and secondary sensitive data, and the target database table is updated to be a new database table.
In an embodiment of the application, whether the application permission corresponding to the obtained use request in the actual use scene meets the data asset confirmation result of the new database table is judged, if yes, the use request has the use permission, and the data in the new database table is used. Here, when a user needs to use data in a school database employee table under a mysql database in a certain actual use scene, the data is allocated to the data of the corresponding authority of the user according to the application data authority, if the application data authority meets the data asset confirmation result, the updated data in the database table can be used, and if the authority of the user is prompted to be incapable of accessing data of a certain data type, such as secondary sensitive data, the data in the database table cannot be used. Therefore, the usable data is strictly divided, and the data asset security is protected.
Fig. 2 is a schematic flow chart showing a method for identifying and using data assets in a hybrid scenario in an embodiment of the present application, in which data is analyzed and classified according to identification results of the data assets and manually entered data assets, and data asset result confirmation is performed, for data for which an asset confirmation result has been completed, when a data applicant applies for using a certain data, data of a corresponding authority is assigned to the data applicant according to the authority of the data applicant, whether the authority of the data applicant satisfies an asset confirmation result is determined, if yes, data usage authority is applied, the data is used after the usage authority is satisfied, and data asset security is protected.
Furthermore, the present application also provides a computer readable medium, on which computer readable instructions are stored, the computer readable instructions being executable by a processor to implement the aforementioned method for data asset identification and use.
In correspondence with the method described above, the present application also provides a terminal, which includes modules or units capable of executing the method steps described in fig. 1 or fig. 2 or various embodiments, and these modules or units can be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in an embodiment of the present application, there is also provided an apparatus for data asset identification and use, the apparatus including:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method as previously described.
For example, the computer readable instructions, when executed, cause the one or more processors to:
selecting a target database table according to the database information;
performing data asset identification on the target database table to obtain a data asset type;
confirming the data asset type according to a data asset result confirmation list to obtain a confirmation result;
and using the data in the target database table according to the confirmation result and the use authority of the actual use scene.
Fig. 3 is a schematic structural diagram of an apparatus for identifying and using data assets provided by another aspect of the present application, the apparatus including: the database management system comprises a selection device 11, an identification device 12, a confirmation device 13 and an identification device 14, wherein the selection device 11 is used for selecting a target database table according to database information; the identification device 12 is used for identifying the data assets of the target database table to obtain the data asset types; the confirmation device 13 is used for confirming the data asset type according to the data asset result confirmation list to obtain a confirmation result; the identification device 14 is used for using the data in the target database table according to the confirmation result and the use authority of the actual use scene.
It should be noted that the content executed by the selecting device 11, the identifying device 12, the confirming device 13 and the identifying device 14 is the same as or corresponding to the content executed in the above steps S11, S12, S13 and S14, respectively, and for the sake of brevity, the description thereof is omitted.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (8)

1. A method of data asset identification and use, wherein the method comprises:
selecting a target database table according to the database information;
performing data asset identification on the target database table to obtain a data asset type;
confirming the data asset type according to a data asset result confirmation list to obtain a confirmation result;
and using the data in the target database table according to the confirmation result and the use authority of the actual use scene.
2. The method of claim 1, wherein using the data in the target database table according to the confirmation result and the usage right of the actual usage scenario comprises:
adjusting the data type in the target database table according to the confirmation result to obtain a new database table;
and judging the permission of the acquired use request under the actual use scene according to the new database table, and using the data under the new database table according to the judgment result.
3. The method of claim 1, wherein selecting a target database table from database information comprises:
and selecting a target database table according to the database type, the database name and the database table name of the database.
4. The method of claim 1, wherein the method comprises:
and dividing the data according to the current service scene, and confirming the data asset result confirmation list.
5. The method of claim 2, wherein adjusting the data type in the target database table according to the validation result to obtain a new database table comprises:
if the confirmation result is that the data asset type is not consistent with the asset type in the data asset result confirmation list, the data asset type is adjusted to be the type in the data asset confirmation result list, and the data type in the target database table is updated to obtain a new database table.
6. The method of claim 2, wherein performing permission judgment on the obtained usage request in the actual usage scenario according to the new database table, and using data in the new database table according to a judgment result includes:
and judging whether the application permission corresponding to the acquired use request in the actual use scene meets the data asset confirmation result of the new database table, if so, judging that the use request has the use permission, and using the data in the new database table.
7. An apparatus for data asset identification and use, wherein the apparatus comprises:
one or more processors; and
memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 6.
8. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 6.
CN202110138545.9A 2021-02-01 2021-02-01 Data asset identification and use method and equipment Pending CN112835902A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110138545.9A CN112835902A (en) 2021-02-01 2021-02-01 Data asset identification and use method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110138545.9A CN112835902A (en) 2021-02-01 2021-02-01 Data asset identification and use method and equipment

Publications (1)

Publication Number Publication Date
CN112835902A true CN112835902A (en) 2021-05-25

Family

ID=75931491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110138545.9A Pending CN112835902A (en) 2021-02-01 2021-02-01 Data asset identification and use method and equipment

Country Status (1)

Country Link
CN (1) CN112835902A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825138A (en) * 2015-01-04 2016-08-03 北京神州泰岳软件股份有限公司 Sensitive data identification method and device
CN109284631A (en) * 2018-10-26 2019-01-29 中国电子科技网络信息安全有限公司 A kind of document desensitization system and method based on big data
CN110826006A (en) * 2019-11-22 2020-02-21 支付宝(杭州)信息技术有限公司 Abnormal collection behavior identification method and device based on privacy data protection
CN110895607A (en) * 2018-09-13 2020-03-20 中兴通讯股份有限公司 Method, device and storage medium for intelligent permission prompt
CN111177789A (en) * 2020-01-07 2020-05-19 江苏满运软件科技有限公司 Authority management method, system, device and storage medium
CN111914294A (en) * 2020-07-31 2020-11-10 中国建设银行股份有限公司 Database sensitive data identification method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825138A (en) * 2015-01-04 2016-08-03 北京神州泰岳软件股份有限公司 Sensitive data identification method and device
CN110895607A (en) * 2018-09-13 2020-03-20 中兴通讯股份有限公司 Method, device and storage medium for intelligent permission prompt
CN109284631A (en) * 2018-10-26 2019-01-29 中国电子科技网络信息安全有限公司 A kind of document desensitization system and method based on big data
CN110826006A (en) * 2019-11-22 2020-02-21 支付宝(杭州)信息技术有限公司 Abnormal collection behavior identification method and device based on privacy data protection
CN111177789A (en) * 2020-01-07 2020-05-19 江苏满运软件科技有限公司 Authority management method, system, device and storage medium
CN111914294A (en) * 2020-07-31 2020-11-10 中国建设银行股份有限公司 Database sensitive data identification method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘金: "基于数据特征的敏感数据识别方法", 《信息通信》, no. 02, 15 February 2016 (2016-02-15), pages 240 - 241 *
吴以雯: "金融电脑化信息系统", 中国物资出版社, pages: 274 *

Similar Documents

Publication Publication Date Title
CN108665946B (en) Service data access method and device
CN111898139B (en) Data reading and writing method and device and electronic equipment
CN112069536A (en) Method and equipment for realizing desensitization access of database data
CN106033461A (en) Sensitive information query method and apparatus
CN107092535B (en) Method and apparatus for data storage of test interface
US10192278B2 (en) Traceable data audit apparatus, method, and non-transitory computer readable storage medium thereof
CN106686104B (en) Method and equipment for operation and maintenance of target server
CN111435384B (en) Data security processing and data tracing method, device and equipment
WO2021208758A1 (en) Data permissions management
US11295027B2 (en) System and method for protecting electronic documents containing confidential information from unauthorized access
CN111008821A (en) Resume record management method, device and medium based on block chain
CN110930578A (en) Voting method, equipment and medium based on block chain
CN111489250A (en) Credit report sharing method, device, medium and system based on block chain
CN106161095B (en) Early warning method and device for data leakage
CN114186275A (en) Privacy protection method and device, computer equipment and storage medium
EP3958159A1 (en) Data recording methods and apparatuses, electronic devices, and storage media
CN114979067B (en) Determination method, device, equipment and medium of unit jurisdiction organization
CN111046267A (en) Method, device and medium for processing network rumors based on block chains
CN112835902A (en) Data asset identification and use method and equipment
CN111241547A (en) Detection method, device and system for unauthorized vulnerability
CN115827589A (en) Authority verification method and device, electronic equipment and storage medium
CN112835903A (en) Sensitive data identification method and equipment
CN112395591A (en) Encryption method and system
CN113742664B (en) Monitoring and auditing method, equipment and system
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210525