CN112989383A - Data distribution method and device, computer equipment and storage medium - Google Patents
Data distribution method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN112989383A CN112989383A CN202110326948.6A CN202110326948A CN112989383A CN 112989383 A CN112989383 A CN 112989383A CN 202110326948 A CN202110326948 A CN 202110326948A CN 112989383 A CN112989383 A CN 112989383A
- Authority
- CN
- China
- Prior art keywords
- data
- target
- database
- attribute information
- feature data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000012545 processing Methods 0.000 claims abstract description 110
- 230000005540 biological transmission Effects 0.000 claims abstract description 10
- 238000004590 computer program Methods 0.000 claims description 10
- 238000000605 extraction Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 abstract description 4
- 238000004422 calculation algorithm Methods 0.000 description 29
- 230000008569 process Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013075 data extraction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present disclosure provides a data distribution method, apparatus, computer device and storage medium, wherein the method comprises: the data acquired from the first database is decrypted and stored, and the target characteristic data extracted from the second database and the corresponding target attribute information are encrypted and then sent to the third database, so that the third database can acquire the target characteristic data and the corresponding attribute information, the processing of the characteristic data is completed, the processing efficiency of the data can be improved through calculation and data sinking, the data processing pressure of the first database is solved, and the data security in the data transmission process can be ensured through corresponding encryption and decryption in the data transmission process.
Description
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a data distribution method and apparatus, a computer device, and a storage medium.
Background
With the continuous development of transportation industry, people's traveling modes become more and more diversified, and along with the going-out, study, work, migration, traveling and the like of people, the mobility of population is also more and more big, and data generated by the mobility of population is also exponentially increased, such as the action data of traveling and the like.
The data generated by the population flow can be used for counting and analyzing various factors such as preference, behavior, regularity and the like of people, but in the face of increasing large amount of data, due to the limitation of data processing capacity, the processing of all data is difficult to complete in time, data processing omission easily exists, data processing hysteresis easily occurs, and the data processing efficiency is low.
Disclosure of Invention
The embodiment of the disclosure at least provides a data distribution method, a data distribution device, computer equipment and a storage medium.
In a first aspect, an embodiment of the present disclosure provides a data distribution method, where the method includes:
decrypting first encrypted data acquired from a first database to obtain first characteristic data and first attribute information of the first characteristic data;
storing the first feature data and the first attribute information into a second database based on the first attribute information;
extracting target feature data corresponding to a target third database of a plurality of third databases and target attribute information of the target feature data from the first feature data and the first attribute information stored in the second database;
encrypting the target characteristic data and the target attribute information to obtain second encrypted data;
and sending the second encrypted data to the target third database.
In the embodiment of the disclosure, the first encrypted data acquired from the first database is decrypted and stored, the target characteristic data and the corresponding attribute information are extracted and sent to the third database, so that the third database can acquire the target characteristic data and the corresponding attribute information, the processing calculation of the characteristic data is completed, the processing efficiency of the data can be improved through calculation and data sinking, the data processing pressure of the first database is solved, and the data security in the data transmission process can be ensured through corresponding encryption and decryption in the data transmission process.
In an optional implementation manner, the decrypting the first encrypted data obtained from the first database to obtain the first feature data and the attribute information of the first feature data includes:
determining a first decryption mode corresponding to a first encryption mode based on the first encryption mode of the first database;
after first encrypted data are acquired from the first database, the first encrypted data are decrypted based on the first decryption mode, and the first characteristic data and attribute information of the first characteristic data are obtained.
In this optional embodiment, the first feature data and the first attribute information are obtained through decryption, which is convenient for subsequently sending the corresponding data to the third database, so that the third database can process the feature data based on the attribute information, and the efficiency of data processing is improved.
In an alternative embodiment, decrypting the first encrypted data includes:
and in the case that the first encrypted data contains sensitive data, decrypting non-sensitive data except the sensitive data in the first encrypted data.
In this optional embodiment, the sensitive data may not be processed, so that the security of the sensitive data in the data transmission process is ensured.
In an optional embodiment, the storing the first feature data and the first attribute information in a second database based on the first attribute information includes:
determining a plurality of second feature data in the first feature data and second attribute information corresponding to each second feature data in the first attribute information, wherein the second attribute information at least comprises processing party information for the second feature data, processing mode information for the second feature data and version attribute information of a processing mode indicated by the processing mode information;
determining the storage position of each second characteristic data in a second database based on the processing party information, the processing mode information and the version attribute information of each second characteristic data;
and storing each second characteristic data and the corresponding second attribute information to the corresponding storage position.
In this optional embodiment, different attribute information of the second feature data is stored in different positions, so that classified storage of data can be realized, and subsequent data search and data extraction are facilitated.
In an optional embodiment, extracting target feature data corresponding to a target third database among a plurality of third databases and target attribute information of the target feature data from the first feature data and the attribute information stored in the second database includes:
determining a target third database of data to be sent from a plurality of third databases;
determining target second feature data matched with the processing mode corresponding to the target third database from the plurality of second feature data according to the processing party information, the processing mode information and the version attribute information corresponding to each second feature data;
according to a preset calling period, extracting a preset number of target second feature data to be sent in the current calling period and second target attribute information of the target second feature data from a storage position corresponding to the target second feature data in the second database;
the target third database is used for processing the target characteristic data based on the attribute information of the target characteristic data.
In this optional embodiment, the feature data to be sent to the target third database is obtained by matching the attribute information, so as to extract the corresponding feature data and attribute information in the calling period, thereby realizing accurate matching between the data and the database and sending the data with pertinence.
In an optional implementation manner, the determining a target third database of data to be sent from a plurality of third databases includes:
and selecting a target third database with target registration information in the second database from a plurality of third databases.
In an optional implementation manner, the encrypting the target feature data and the target attribute information to obtain second encrypted data includes:
and encrypting the target characteristic data and the target attribute information based on a second encryption mode agreed with the target third database to obtain second encrypted data.
In this optional embodiment, the extracted third feature data of the target is encrypted and then sent to the third target database, so that the security of data in the data transmission process can be ensured.
In a second aspect, an embodiment of the present disclosure further provides a data distribution apparatus, where the apparatus includes:
the decryption module is used for decrypting first encrypted data acquired from a first database to obtain first characteristic data and first attribute information of the first characteristic data;
the storage module is used for storing the first characteristic data and the first attribute information into a second database based on the first attribute information;
an extraction module, configured to extract, from the first feature data and the first attribute information stored in the second database, target feature data corresponding to a target third database in the plurality of third databases and target attribute information of the target feature data;
the encryption module is used for encrypting the target characteristic data and the target attribute information to obtain second encrypted data;
and the transmission module is used for sending the second encrypted data to the target third database.
In an optional implementation manner, the decryption module is specifically configured to:
determining a first decryption mode corresponding to a first encryption mode based on the first encryption mode of the first database;
after first encrypted data are acquired from the first database, the first encrypted data are decrypted based on the first decryption mode, and the first characteristic data and first attribute information of the first characteristic data are obtained.
In an optional implementation manner, when decrypting the first encrypted data, the decryption module is specifically configured to:
and in the case that the first encrypted data contains sensitive data, decrypting non-sensitive data except the sensitive data in the first encrypted data.
In an optional implementation manner, the storage module is specifically configured to:
determining a plurality of second feature data in the first feature data and second attribute information corresponding to each second feature data in the first attribute information, wherein the second attribute information at least comprises processing party information for the second feature data, processing mode information for the second feature data and version attribute information of a processing mode indicated by the processing mode information;
determining the storage position of each second characteristic data in a second database based on the processing party information, the processing mode information and the version attribute information of each second characteristic data;
and storing each second characteristic data and the corresponding second attribute information to the corresponding storage position.
In an optional implementation manner, the extraction module is specifically configured to:
determining a target third database of data to be sent from a plurality of third databases;
determining target second feature data matched with the processing mode corresponding to the target third database from the plurality of second feature data according to the processing party information, the processing mode information and the version attribute information corresponding to each second feature data;
according to a preset calling period, extracting a preset number of target second feature data to be sent in the current calling period and second target attribute information of the target second feature data from a storage position corresponding to the target second feature data in the second database;
the target third database is used for processing the target characteristic data based on the attribute information of the target characteristic data.
In an optional implementation manner, when the extracting module is configured to determine a target third database of data to be sent from a plurality of third databases, the extracting module is specifically configured to:
and selecting a target third database with target registration information in the second database from a plurality of third databases.
In an optional implementation manner, the encryption module is specifically configured to:
and encrypting the target characteristic data and the target attribute information based on a second encryption mode agreed with the target third database to obtain second encrypted data.
In a third aspect, an embodiment of the present disclosure further provides a computer device, including: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating via the bus when the computer device is running, the machine-readable instructions when executed by the processor performing the steps of the first aspect described above, or any possible implementation of the first aspect.
In a fourth aspect, this disclosed embodiment also provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps in the first aspect or any one of the possible implementation manners of the first aspect.
For the description of the effects of the data distribution apparatus, the computer device, and the computer-readable storage medium, reference is made to the description of the data distribution method, and details are not repeated here.
The embodiment of the disclosure provides a data distribution method, a data distribution device, computer equipment and a storage medium, wherein the data distribution method comprises the following steps: decrypting first encrypted data acquired from a first database to obtain first characteristic data and first attribute information of the first characteristic data; storing the first feature data and the first attribute information into a second database based on the first attribute information; extracting target feature data corresponding to a target third database of a plurality of third databases and target attribute information of the target feature data from the first feature data and the first attribute information stored in the second database; encrypting the target characteristic data and the target attribute information to obtain second encrypted data; and sending the second encrypted data to the target third database.
The embodiment of the disclosure decrypts and stores the data acquired from the first database, encrypts the target feature data extracted from the second database and the corresponding target attribute information, and sends the encrypted target feature data and the corresponding target attribute information to the third database, so that the third database can acquire the target feature data and the corresponding attribute information to complete the processing of the feature data.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings required for use in the embodiments will be briefly described below, and the drawings herein incorporated in and forming a part of the specification illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the technical solutions of the present disclosure. It is appreciated that the following drawings depict only certain embodiments of the disclosure and are therefore not to be considered limiting of its scope, for those skilled in the art will be able to derive additional related drawings therefrom without the benefit of the inventive faculty.
Fig. 1 shows a flow chart of a data distribution method provided by an embodiment of the present disclosure;
FIG. 2 is a schematic diagram illustrating an application scenario of data distribution provided by an embodiment of the present disclosure;
fig. 3 shows a schematic diagram of a data distribution apparatus provided by an embodiment of the present disclosure;
fig. 4 shows a schematic diagram of a computer device provided by an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, not all of the embodiments. The components of the embodiments of the present disclosure, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present disclosure, presented in the figures, is not intended to limit the scope of the claimed disclosure, but is merely representative of selected embodiments of the disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the disclosure without making creative efforts, shall fall within the protection scope of the disclosure.
Research shows that with the continuous increase of data quantity, due to the fact that the data processing capacity has a limit, after data is summarized, all data is difficult to be processed in time, data processing omission easily exists, data processing hysteresis easily occurs, and data processing efficiency is low.
Based on the above research, the present disclosure provides a data distribution method, in which a first encrypted data obtained from a first database is decrypted and stored, and a target feature data and corresponding attribute information are extracted and sent to a third database, so that the third database can obtain the target feature data and the corresponding attribute information, and complete processing and calculation of the feature data.
The above-mentioned drawbacks are the results of the inventor after practical and careful study, and therefore, the discovery process of the above-mentioned problems and the solutions proposed by the present disclosure to the above-mentioned problems should be the contribution of the inventor in the process of the present disclosure.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
To facilitate understanding of the present embodiment, first, a data distribution method disclosed in the embodiments of the present disclosure is described in detail, where an execution subject of the data distribution method provided in the embodiments of the present disclosure is generally a computer device with certain computing capability, and the computer device includes, for example: a terminal device, which may be a User Equipment (UE), a mobile device, a User terminal, a cellular phone, a cordless phone, a Personal Digital Assistant (PDA), a handheld device, a computing device, a vehicle mounted device, a wearable device, or a server or other processing device. In some possible implementations, the data distribution method may be implemented by a processor calling computer readable instructions stored in a memory.
The data distribution method provided by the embodiment of the present disclosure is described below by taking an execution subject as a terminal device as an example.
Referring to fig. 1, a flowchart of a data distribution method provided in an embodiment of the present disclosure is shown, where the method includes steps S101 to S104, where:
s101: and decrypting the first encrypted data acquired from the first database to obtain first characteristic data and first attribute information of the first characteristic data.
In this step, after receiving the encrypted data transmitted by the first database, the encrypted data may be decrypted by a certain decryption method, and the first feature data included in the encrypted data and the attribute information of the first feature data may be acquired.
Referring to fig. 2, fig. 2 is a schematic view of an application scenario of data distribution provided by the embodiment of the present disclosure. The data distribution method provided by the embodiment of the disclosure may be applied to the cascading platform system shown in fig. 2, where the cascading platform system may include a plurality of platforms, and different authorities or different levels may be provided between different platforms, as shown in fig. 2 as an example, the cascading platform system may include a plurality of first platforms (only 1 is shown in the figure), a plurality of second platforms (only 1 is shown in the figure), and a plurality of third platforms, where the first platforms, the second platforms, and the third platforms have different authorities or different levels, and a plurality of first platforms, a plurality of second platforms, and a plurality of third platforms may have the same authority or the same level. The cascading platform system may be composed of different organizations, or may be composed of different parts in the same organization, for example, may be composed of different enterprise platforms, or may be composed of different departments in one enterprise.
The first platform corresponds to a first database for data storage and the like, correspondingly, the second platform corresponds to a second database, the third platform corresponds to a third database, and data can be transmitted in the databases.
For example, data collected by each platform, such as data collected by each third platform, needs to be collected to the first platform and stored in the first database, and as the amount of data increases, the data processing capability of the first platform is limited and is not enough to process and deal with changes of complex data in time, at this time, the data may be sent step by step to be sent to the second platform, and then the data may be forwarded to the third platform by the second platform, so that the platforms at different levels may be used to assist in processing the data, or assist in storing the data, so as to implement targeted processing of the data, and improve the processing efficiency of the data.
Correspondingly, the encrypted data transmitted by the first database may be data obtained by encrypting the data stored in the first database by the first platform corresponding to the first database, where the encryption method is usually an encryption mode specific to the data in the first database, so as to ensure data security during data issuing.
Specifically, the decrypting the first encrypted data obtained from the first database to obtain the first feature data and the first attribute information of the first feature data includes:
determining a first decryption mode corresponding to a first encryption mode based on the first encryption mode of the first database;
after first encrypted data are acquired from the first database, the first encrypted data are decrypted based on the first decryption mode, and the first characteristic data and first attribute information of the first characteristic data are obtained.
Since data in The first database is to be distributed, The first encryption mode is asymmetric algorithm (The asymmetric algorithm) encryption performed by The first platform corresponding to The first database on The data to be sent, which is also called inter-application encryption and asymmetric key algorithm encryption.
In particular, asymmetric algorithms refer to an encryption algorithm in which the encryption key and the decryption key are not identical, or in which one key cannot be derived from the other. Asymmetric key encryption, also known as public key encryption, is the use of two mathematically related keys to encode information. In this system, one of the keys, called the public key (public key), is optionally issued in anticipation of secure communication with the key holder. The public key is used to encrypt information. The second key is a private key (privatekey) belonging to the key holder, which is carefully kept. The key holder decrypts the received information with the private key. The public key and the private key are a pair, and if the public key is used for encrypting data, only the corresponding private key can be used for decrypting the data; if the data is encrypted with a private key, it can only be decrypted with the corresponding public key. This algorithm is called asymmetric encryption algorithm because two different keys are used for encryption and decryption.
After the encryption mode of the first database is determined, a first decryption mode corresponding to the first encryption mode can be reversely deduced, and after first encrypted data is obtained from the first database, the first encrypted data is decrypted based on the first decryption mode, so that the first characteristic data and first attribute information of the first characteristic data are obtained.
Specifically, the first decryption method may be a symmetric cryptographic algorithm, which is also called a traditional cryptographic algorithm, and the encryption key can be derived from the decryption key, and vice versa. In most symmetric algorithms, the encryption and decryption keys are the same. These algorithms, also called secret key algorithms or single key algorithms, require that the sender and receiver agree on a key before secure communication can take place. The security of the symmetric algorithm depends on the key, and the leakage of the key means that anyone can encrypt and decrypt the message. As long as the communication needs to be kept secret, the key must be kept secret.
For example, the second database is usually a database having communication permission for communication with the first database, and therefore, the second database usually holds a decryption key corresponding to the first database, so that encrypted data sent by the first database can be decrypted.
In the embodiment of the present disclosure, the feature data of the first database is not usually processed by the same data generator, for example, the data in the first database may be obtained by collecting and processing data acquired and processed by a plurality of third platforms or a plurality of processing parties to which the second platforms belong, and for the same processing party, at different data acquisition periods, or by using different algorithms, or by using the same algorithm, but different versions of the algorithms corresponding to different data are different, so when distributing the data, it is necessary to transmit the corresponding data attribute information to the corresponding processing parties, so that the processing parties can operate and process the corresponding feature data by using the corresponding attribute information. Therefore, after the first encrypted data is decrypted, not only the first feature data but also the first attribute information of the first feature data can be obtained, so as to facilitate the subsequent processing of the feature data.
Specifically, the attribute information may include processing information, processing mode information (for example, information about a used algorithm), and version attribute information (for example, information about a version of a used algorithm) of the feature data, and may further include other features and other attribute information related to the features. Correspondingly, the first attribute information of the first feature data may at least include the processing party information, the processing mode information, and the version attribute information of the first feature data, and the second attribute information of the subsequent second feature data may at least include the processing party information, the processing mode information, and the version attribute information of the second feature data.
In addition, in the embodiment of the present disclosure, some sensitive data may be included in the first encrypted data, and in order to ensure the security of the sensitive data, in general, no processing is performed on the sensitive data, and only non-sensitive data except for the sensitive data in the first encrypted data is decrypted.
S102: and storing the first characteristic data and the first attribute information into a second database based on the first attribute information.
In this step, the first feature data and the first attribute information may be stored in the second database in a corresponding manner according to the first attribute information.
Specifically, the storing the first feature data and the first attribute information into a second database based on the first attribute information includes:
determining a plurality of second feature data in the first feature data and second attribute information corresponding to each second feature data in the first attribute information, wherein the second attribute information at least comprises processing party information for the second feature data, processing mode information for the second feature data and version attribute information of a processing mode indicated by the processing mode information;
determining the storage position of each second characteristic data in a second database based on the processing party information, the processing mode information and the version attribute information of each second characteristic data;
and storing each second characteristic data and the corresponding second attribute information to the corresponding storage position.
The decrypted first feature data may be a data set existing in a data packet form, and since the data is provided by a plurality of processing parties when being summarized to the first database, the first feature data correspondingly includes a plurality of second feature data, and the second feature data also has corresponding processing party information, processing mode information, version attribute information, and the like.
Correspondingly, when data storage is performed, different second feature data can be stored in a targeted manner, that is, after the first feature data is obtained, a plurality of second feature data in the first feature data can be determined, and processing party information, processing mode information and version attribute information of each second feature data can be analyzed through the first attribute information, and for each second feature data, a corresponding storage location can be determined through the processing party information, the processing mode information and the version attribute information, so that each second feature data and second attribute information thereof (including the processing party information, the processing mode information and the version attribute information of the second feature data) can be stored in the corresponding storage location, and targeted storage for different second feature data can be realized, so as to facilitate subsequent data extraction and other processing.
The different second feature data has corresponding processing parties (such as a partner manufacturer providing data), processing modes (such as an algorithm for the data) and versions of the processing modes (such as algorithm versions), and accordingly, partner manufacturer information, algorithm information and algorithm version information of each second feature data can be analyzed from the decrypted first feature data and the decrypted first attribute information, and then log names corresponding to the feature data and the corresponding attribute information can be calculated according to the partner manufacturer information, the algorithm information and the algorithm version information and a dictionary from a predefined manufacturer algorithm to a database table, and the feature data and the corresponding attribute information are stored in the second database in the form of an operation log (oplog).
For example, for the second feature data and the second attribute information thereof, for example, the second attribute information indicates that the second feature data is data provided by the vendor of the a partner through the B version of the C algorithm, the second feature data corresponding to the log name stored in the second database may be generated through a dictionary of the database table from the predefined vendor algorithm according to the above information, and the corresponding data may be stored into the log with the corresponding log name in the second database according to the generated log name. The target log comprises the second characteristic data and the second attribute information, and the storage time of the second characteristic data and the like can be added, so that data calling can be conveniently performed according to the storage time corresponding to the data. The data are stored into the target log with the corresponding log name, so that the data are conveniently searched, and the subsequent process of distributing the data based on the attribute information of different data is facilitated.
S103: extracting target feature data corresponding to a target third database among the plurality of third databases and target attribute information of the target feature data from the first feature data and the first attribute information stored in the second database.
In this step, from the second database storing the first feature data and the corresponding first attribute information, the target feature data to be transmitted and the corresponding target attribute information thereof may be extracted, the target feature data corresponding to a target third database among a plurality of third databases associated with the second database.
Referring to fig. 2, the data in the first database may be provided and summarized by the third databases corresponding to the plurality of third platforms, and correspondingly, when data distribution is performed, the data may also be distributed to different third databases for processing by the corresponding third platforms.
Specifically, the extracting of the target feature data and the target attribute information from the second database may include the following steps:
determining a target third database of data to be sent from a plurality of third databases;
determining target second feature data matched with the processing mode corresponding to the target third database from the plurality of second feature data according to the processing party information, the processing mode information and the version attribute information corresponding to each second feature data;
encrypting the target characteristic data and the target attribute information to obtain second encrypted data;
and sending the second encrypted data to the target third database.
The third target database is configured to process the target feature data based on the attribute information of the target feature data, that is, the third target database may select a corresponding data processing method based on the attribute information of the target feature data and process the target feature data.
Accordingly, since different third databases have different active periods, for example, a possible third period may not exist or replace the database after providing data to the first database through the corresponding third database, information of the database registered in the first database may be stored in the second database, and when a target third database is selected, the target third database having target registration information may be selected from the plurality of third databases with respect to a registration information list of the first database in the third database owned by the second database, that is, the target third database having target registration information in the second database may be selected from the plurality of third databases.
As stated above, the third platforms corresponding to different third databases have different processing parties, different used processing manners and different version attributes of the processing manners, and specific data can be processed more specifically for sending to the corresponding processing parties, so that the matching of the second attribute information of the second feature data and the determined target third database can be performed, so as to select the matched second feature data from the second feature data included in the first feature data as the target feature data to be sent to the target third database, and determine the corresponding second attribute information as the target attribute information.
Accordingly, when data is extracted, the data can be extracted based on a certain calling period, for example: the period of sending data from the first database to the second database, the period of processing data sent from the second database by the third database, or the preset calling period after a certain comprehensive measurement.
In order to ensure timeliness of the data, a preset number of target feature data to be transmitted in the current call cycle and attribute information of the target feature data are generally extracted, so that the target third database can be processed based on the latest feature data, or the data is within the computing capability of the target third database.
S104: and encrypting the target characteristic data and the target attribute information to obtain second encrypted data.
In this step, after a preset number of target feature data and attribute information of the target feature data, which need to be sent in a current calling period, are extracted, the extracted target feature data and the target attribute information thereof need to be encrypted for data confidentiality, so as to obtain second encrypted data.
Specifically, the encrypting the target feature data and the target attribute information to obtain second encrypted data includes:
and encrypting the target characteristic data and the target attribute information based on a second encryption mode agreed with the target third database to obtain second encrypted data.
For example, the extracted target feature data and the target attribute information thereof may be encrypted by a symmetric algorithm to obtain second encrypted data including the encrypted target feature data and the target attribute information thereof.
S105: and sending the second encrypted data to the target third database.
In this step, the encrypted second encrypted data may be sent to a corresponding target third database.
Specifically, the second encrypted data after the encryption processing is sent to the corresponding target third database through a communication interface between the second database and the target third database which is established in advance.
The embodiment of the disclosure decrypts and stores the data acquired from the first database, encrypts the target characteristic data extracted from the second database and the corresponding attribute information, and sends the encrypted target characteristic data and the corresponding attribute information to the third database, so that the third database can acquire the target characteristic data and the corresponding attribute information to complete the processing of the characteristic data.
It will be understood by those skilled in the art that in the method of the present invention, the order of writing the steps does not imply a strict order of execution and any limitations on the implementation, and the specific order of execution of the steps should be determined by their function and possible inherent logic.
Based on the same inventive concept, a data distribution device corresponding to the data distribution method is also provided in the embodiments of the present disclosure, and as the principle of solving the problem of the device in the embodiments of the present disclosure is similar to the data distribution method in the embodiments of the present disclosure, the implementation of the device may refer to the implementation of the method, and repeated details are not repeated.
Referring to fig. 3, a schematic diagram of a data distribution apparatus provided in an embodiment of the present disclosure is shown, where the apparatus includes: a decryption module 310, a storage module 320, an extraction module 330, an encryption module 340, and a transmission module 350; wherein,
a decryption module 310, configured to decrypt first encrypted data obtained from a first database to obtain first feature data and first attribute information of the first feature data;
a storage module 320, configured to store the first feature data and the first attribute information in a second database based on the first attribute information;
an extracting module 330, configured to extract, from the first feature data and the first attribute information stored in the second database, target feature data corresponding to a target third database in the multiple third databases and target attribute information of the target feature data;
the encryption module 340 is configured to encrypt the target feature data and the target attribute information to obtain second encrypted data;
a transmission module 350, configured to send the second encrypted data to the target third database.
In an optional implementation manner, the decryption module 310 is specifically configured to:
determining a first decryption mode corresponding to a first encryption mode based on the first encryption mode of the first database;
after first encrypted data are acquired from the first database, the first encrypted data are decrypted based on the first decryption mode, and the first characteristic data and first attribute information of the first characteristic data are obtained.
In an optional implementation manner, when decrypting the first encrypted data, the decryption module 310 is specifically configured to:
and in the case that the first encrypted data contains sensitive data, decrypting non-sensitive data except the sensitive data in the first encrypted data.
In an optional implementation manner, the storage module 320 is specifically configured to:
determining a plurality of second feature data in the first feature data and second attribute information corresponding to each second feature data in the first attribute information, wherein the second attribute information at least comprises processing party information for the second feature data, processing mode information for the second feature data and version attribute information of a processing mode indicated by the processing mode information;
determining the storage position of each second characteristic data in a second database based on the processing party information, the processing mode information and the version attribute information of each second characteristic data;
and storing each second characteristic data and the corresponding second attribute information to the corresponding storage position.
In an optional implementation manner, the extracting module 330 is specifically configured to:
determining a target third database of data to be sent from a plurality of third databases;
determining target second feature data matched with the processing mode corresponding to the target third database from the plurality of second feature data according to the processing party information, the processing mode information and the version attribute information corresponding to each second feature data;
according to a preset calling period, extracting a preset number of target second feature data to be sent in the current calling period and second target attribute information of the target second feature data from a storage position corresponding to the target second feature data in the second database;
the target third database is used for processing the target characteristic data based on the attribute information of the target characteristic data.
In an optional implementation manner, when the extracting module 330 is configured to determine a target third database of data to be sent from a plurality of third databases, the extracting module is specifically configured to:
and selecting a target third database with target registration information in the second database from a plurality of third databases.
In an optional implementation manner, the encryption module 340 is specifically configured to:
and encrypting the target characteristic data and the target attribute information based on a second encryption mode agreed with the target third database to obtain second encrypted data.
The embodiment of the disclosure decrypts and stores the data acquired from the first database, encrypts the target characteristic data extracted from the second database and the corresponding attribute information, and sends the encrypted target characteristic data and the corresponding attribute information to the third database, so that the third database can acquire the target characteristic data and the corresponding attribute information to complete the processing of the characteristic data.
The description of the processing flow of each module in the device and the interaction flow between the modules may refer to the related description in the above method embodiments, and will not be described in detail here.
Based on the same technical concept, the embodiment of the disclosure also provides computer equipment. Referring to fig. 4, a schematic structural diagram of a computer device provided in the embodiment of the present disclosure includes a processor 401, a memory 402, and a bus 403. The memory 402 is used for storing execution instructions and includes a memory 4021 and an external memory 4022; the memory 4021 is also referred to as an internal memory, and is configured to temporarily store operation data in the processor 401 and data exchanged with the external memory 4022 such as a hard disk, the processor 401 exchanges data with the external memory 4022 through the memory 4021, and when the computer device operates, the processor 401 communicates with the memory 402 through the bus 403, so that the processor 401 executes the following instructions:
decrypting first encrypted data acquired from a first database to obtain first characteristic data and first attribute information of the first characteristic data;
storing the first feature data and the first attribute information into a second database based on the first attribute information;
extracting target feature data corresponding to a target third database of a plurality of third databases and target attribute information of the target feature data from the first feature data and the first attribute information stored in the second database;
encrypting the target characteristic data and the target attribute information to obtain second encrypted data;
and sending the second encrypted data to the target third database.
The embodiments of the present disclosure also provide a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the data distribution method described in the above method embodiments. The storage medium may be a volatile or non-volatile computer-readable storage medium.
The computer program product of the data distribution method provided in the embodiments of the present disclosure includes a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute steps of the data distribution method described in the above method embodiments, which may be referred to specifically for the above method embodiments, and are not described herein again.
The embodiments of the present disclosure also provide a computer program, which when executed by a processor implements any one of the methods of the foregoing embodiments. The computer program product may be embodied in hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied in a computer storage medium, and in another alternative embodiment, the computer program product is embodied in a Software product, such as a Software Development Kit (SDK), or the like.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. In the several embodiments provided in the present disclosure, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are merely specific embodiments of the present disclosure, which are used for illustrating the technical solutions of the present disclosure and not for limiting the same, and the scope of the present disclosure is not limited thereto, and although the present disclosure is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive of the technical solutions described in the foregoing embodiments or equivalent technical features thereof within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present disclosure, and should be construed as being included therein. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.
Claims (10)
1. A method for data distribution, the method comprising:
decrypting first encrypted data acquired from a first database to obtain first characteristic data and first attribute information of the first characteristic data;
storing the first feature data and the first attribute information into a second database based on the first attribute information;
extracting target feature data corresponding to a target third database of a plurality of third databases and target attribute information of the target feature data from the first feature data and the first attribute information stored in the second database;
encrypting the target characteristic data and the target attribute information to obtain second encrypted data;
and sending the second encrypted data to the target third database.
2. The data distribution method according to claim 1, wherein the decrypting the first encrypted data obtained from the first database to obtain the first feature data and the first attribute information of the first feature data includes:
determining a first decryption mode corresponding to a first encryption mode based on the first encryption mode of the first database;
after first encrypted data are acquired from the first database, the first encrypted data are decrypted based on the first decryption mode, and the first characteristic data and first attribute information of the first characteristic data are obtained.
3. The data distribution method according to claim 2, wherein decrypting the first encrypted data comprises:
and in the case that the first encrypted data contains sensitive data, decrypting non-sensitive data except the sensitive data in the first encrypted data.
4. The data distribution method according to claim 1, wherein the storing the first feature data and the first attribute information in a second database based on the first attribute information comprises:
determining a plurality of second feature data in the first feature data and second attribute information corresponding to each second feature data in the first attribute information, wherein the second attribute information at least comprises processing party information for the second feature data, processing mode information for the second feature data and version attribute information of a processing mode indicated by the processing mode information;
determining the storage position of each second characteristic data in a second database based on the processing party information, the processing mode information and the version attribute information of each second characteristic data;
and storing each second characteristic data and the corresponding second attribute information to the corresponding storage position.
5. The data distribution method according to claim 4, wherein extracting target feature data corresponding to a target third database among a plurality of third databases and target attribute information of the target feature data from the first feature data and the attribute information stored in the second database includes:
determining a target third database of data to be sent from a plurality of third databases;
determining target second feature data matched with the processing mode corresponding to the target third database from the plurality of second feature data according to the processing party information, the processing mode information and the version attribute information corresponding to each second feature data;
according to a preset calling period, extracting a preset number of target second feature data to be sent in the current calling period and second target attribute information of the target second feature data from a storage position corresponding to the target second feature data in the second database;
the target third database is used for processing the target characteristic data based on the attribute information of the target characteristic data.
6. The data distribution method according to claim 5, wherein the determining a target third database of data to be sent from the plurality of third databases comprises:
and selecting a target third database with target registration information in the second database from a plurality of third databases.
7. The data distribution method according to any one of claims 1 to 6, wherein the encrypting the target feature data and the target attribute information to obtain second encrypted data includes:
and encrypting the target characteristic data and the target attribute information based on a second encryption mode agreed with the target third database to obtain second encrypted data.
8. A data distribution apparatus, characterized in that the apparatus comprises:
the decryption module is used for decrypting first encrypted data acquired from a first database to obtain first characteristic data and first attribute information of the first characteristic data;
the storage module is used for storing the first characteristic data and the first attribute information into a second database based on the first attribute information;
an extraction module, configured to extract, from the first feature data and the first attribute information stored in the second database, target feature data corresponding to a target third database in the plurality of third databases and target attribute information of the target feature data;
the encryption module is used for encrypting the target characteristic data and the target attribute information to obtain second encrypted data;
and the transmission module is used for sending the second encrypted data to the target third database.
9. A computer device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when a computer device is run, the machine-readable instructions when executed by the processor performing the steps of the data distribution method of any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the data distribution method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110326948.6A CN112989383B (en) | 2021-03-26 | 2021-03-26 | Data distribution method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110326948.6A CN112989383B (en) | 2021-03-26 | 2021-03-26 | Data distribution method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112989383A true CN112989383A (en) | 2021-06-18 |
CN112989383B CN112989383B (en) | 2023-01-17 |
Family
ID=76333904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110326948.6A Active CN112989383B (en) | 2021-03-26 | 2021-03-26 | Data distribution method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112989383B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010262411A (en) * | 2009-04-30 | 2010-11-18 | Nec Corp | Information distribution device, information distribution method for the same and program |
CN111224851A (en) * | 2018-11-23 | 2020-06-02 | 阿里巴巴集团控股有限公司 | Data transmission equipment and processing system, and message distribution method and device |
CN111291024A (en) * | 2020-02-19 | 2020-06-16 | 京东方科技集团股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN112070479A (en) * | 2020-09-03 | 2020-12-11 | 中国平安财产保险股份有限公司 | Task distribution method, device, equipment and storage medium |
CN112235193A (en) * | 2020-10-12 | 2021-01-15 | 南威软件股份有限公司 | Data transmission method, device, equipment and medium based on cross-network multi-level routing |
-
2021
- 2021-03-26 CN CN202110326948.6A patent/CN112989383B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010262411A (en) * | 2009-04-30 | 2010-11-18 | Nec Corp | Information distribution device, information distribution method for the same and program |
CN111224851A (en) * | 2018-11-23 | 2020-06-02 | 阿里巴巴集团控股有限公司 | Data transmission equipment and processing system, and message distribution method and device |
CN111291024A (en) * | 2020-02-19 | 2020-06-16 | 京东方科技集团股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN112070479A (en) * | 2020-09-03 | 2020-12-11 | 中国平安财产保险股份有限公司 | Task distribution method, device, equipment and storage medium |
CN112235193A (en) * | 2020-10-12 | 2021-01-15 | 南威软件股份有限公司 | Data transmission method, device, equipment and medium based on cross-network multi-level routing |
Also Published As
Publication number | Publication date |
---|---|
CN112989383B (en) | 2023-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104486315B (en) | A kind of revocable key outsourcing decryption method based on contents attribute | |
CN112929172A (en) | System, method and device for dynamically encrypting data based on key bank | |
CN107078899B (en) | Method of obfuscating data | |
CN110100422B (en) | Data writing method and device based on block chain intelligent contract and storage medium | |
WO2017202025A1 (en) | Terminal file encryption method, terminal file decryption method, and terminal | |
CN110400164B (en) | Data determining method and device, storage medium and electronic device | |
JP6961324B2 (en) | Searchable cryptographic processing system | |
CN110061957A (en) | Data encryption, decryption method, user terminal, server and data management system | |
JP2016526851A (en) | System for sharing encryption keys | |
Mudepalli et al. | An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing | |
US20180294951A1 (en) | Methods and systems for enhanced data-centric scalar multiplicative homomorphic encryption systems using geometric algebra | |
CN111062052A (en) | Data query method and system | |
CN110505066A (en) | A kind of data transmission method, device, equipment and storage medium | |
CN111914264A (en) | Index creation method and device, and data verification method and device | |
CN114547082B (en) | Data aggregation method, related device, equipment and storage medium | |
US11784817B2 (en) | Systems and methods for secure identification retrieval | |
US11018857B2 (en) | Encryption scheme using multiple parties | |
CN113343255A (en) | Data interaction method based on privacy protection | |
CN112989383B (en) | Data distribution method and device, computer equipment and storage medium | |
Segal et al. | Privacy-Preserving Lawful Contact Chaining: [Preliminary Report] | |
CN112287371A (en) | Method and device for storing industrial data and computer equipment | |
CN115208630B (en) | Block chain-based data acquisition method and system and block chain system | |
JP2005208841A (en) | Communication system, portable terminal and program | |
KR20070062632A (en) | Mobile message and file security implementation by cryptography | |
CN115510490A (en) | Method, device, system and equipment for inquiring encrypted data shared by non-secret keys |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |