CN114723200A - Data value evaluation method and device - Google Patents

Data value evaluation method and device Download PDF

Info

Publication number
CN114723200A
CN114723200A CN202110005404.XA CN202110005404A CN114723200A CN 114723200 A CN114723200 A CN 114723200A CN 202110005404 A CN202110005404 A CN 202110005404A CN 114723200 A CN114723200 A CN 114723200A
Authority
CN
China
Prior art keywords
data
target
value
target data
updating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110005404.XA
Other languages
Chinese (zh)
Inventor
李春梅
耿慧拯
张星
杨亭亭
张鑫月
刘颖卿
郭斯栩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110005404.XA priority Critical patent/CN114723200A/en
Publication of CN114723200A publication Critical patent/CN114723200A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • G06Q30/0206Price or cost determination based on market factors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0278Product appraisal

Abstract

The invention provides a data value evaluation method and a data value evaluation device, wherein the data value evaluation method comprises the following steps: acquiring a target evaluation index associated with target data in a block chain; updating the target evaluation index based on the access request in the case of receiving the access request for the target data; updating the data value of the target data according to the updated target evaluation index to obtain an updated data value; and outputting the updated data value. The embodiment of the invention can improve the matching degree of the evaluated data value and the actual value of the data.

Description

Data value evaluation method and device
Technical Field
The invention relates to the technical field of block chains, in particular to a data value evaluation method and device.
Background
Today, with the rapid development of digital information, data resources are increasingly widely applied to network communication, and the importance of intangible assets generated by data resources for enterprises is not in a small amount.
Before the data is traded, whether the seller of the data or the buyer of the data, the data to be traded is priced according to a certain method. However, the existing data value evaluation method has more factors of human participation; for example, the purchaser of the data may over-rate the data due to the importance of the data to it; or the seller of the data may make an erroneous estimate of the data for various human reasons, which causes the estimated value to not match the actual value of the data.
Disclosure of Invention
Embodiments of the present invention provide a data value evaluation method and apparatus, which can evaluate and update a value of data of each node in a block chain, so as to uplink and share the evaluated data value.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a data value evaluation method, where the method includes:
acquiring a target evaluation index associated with target data in a block chain;
updating the target evaluation index based on the access request in the case of receiving the access request for the target data;
updating the data value of the target data according to the updated target evaluation index to obtain an updated data value;
and outputting the updated data value.
In a second aspect, an embodiment of the present invention provides a data value evaluation apparatus, where the apparatus includes:
the acquisition module is used for acquiring a target evaluation index associated with target data in the block chain;
the first updating module is used for updating the target evaluation index based on the access request when the access request to the target data is received;
the second updating module is used for updating the data value of the target data according to the updated target evaluation index to obtain an updated data value;
and the output module is used for outputting the updated data value.
In a third aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in the data value evaluation method according to the first aspect.
In the embodiment of the invention, a target evaluation index associated with target data in a block chain is obtained; in the case of receiving an access request for the target data, updating the target evaluation index based on the access request; updating the data value of the target data according to the updated target evaluation index to obtain an updated data value; and outputting the updated data value. Therefore, the evaluation index associated with the data can be obtained in advance, and the evaluation index and the value of the data can be updated in time according to the use condition of the data by the user, so that the data value evaluated by the data is more matched with the actual value of the data.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a flow chart of a method for evaluating data value according to an embodiment of the present invention;
FIG. 2 is a system architecture diagram of a data value evaluation method that can be used with embodiments of the present invention;
FIG. 3 is a data characteristic diagram of the frequency of target data being called in a data value evaluation method according to an embodiment of the present invention;
FIG. 4 is a flow chart of another method for evaluating data value according to an embodiment of the present invention;
fig. 5 is a block diagram of another data value evaluation apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, which is a flowchart illustrating a data value evaluation method according to an embodiment of the present invention, as shown in fig. 1, the method may include the following steps:
step 101, obtaining a target evaluation index associated with target data in a block chain.
In an implementation, the target data may be data that needs to be linked to the blockchain for an on-chain transaction. The target evaluation index associated with the target data may be an evaluation index determined by the user according to the attribute, the type, the application scenario, and the like of the target data, and the target evaluation index may reflect the actual value of the target data.
For example: the value assessment indicator of the target data comprises at least one of the following:
a sensitivity level of the target data, the sensitivity level of the target data associated with a privacy level of the target data;
the target data is called frequently, and the called frequency of the target data represents the frequency of accessing the target data;
and the scoring value of the target data is associated with feedback information of a data user after the target data is acquired, or the scoring value is associated with the data sensitivity level of the target data.
In application, the sensitivity level of the target data can reflect the security level (or referred to as privacy level) of the data, and in implementation, the sensitivity level of the target data can be determined according to the influence range, influence objects, influence levels and the like caused by data leakage, for example: the privacy level of the data of the gender of the user is lower than that of the data of the name of the user. In implementation, the higher the sensitivity level of the target data is, the larger the value of the corresponding evaluation index is. For example: it is assumed that the sensitivity level of the target data is divided into five levels according to the influence range, the influence object and the influence degree caused by data leakage. The value of the sensitivity level of the target data corresponding to the first level is 1; the sensitivity level of the target data corresponding to the second level takes a value of 2; the value of the sensitivity level of the target data corresponding to the third level is 3; the sensitivity level of the target data corresponding to the fourth level takes a value of 4; the sensitivity level of the target data corresponding to the fifth level takes a value of 5.
The target data is called frequently, and the degree of the user's demand for the data can be reflected, for example: in the case where the user has a large demand for the data, the number of times or frequency of accessing the data increases.
In implementation, the frequency of the target data being called is positively correlated to the number of times the target data is accessed. Meanwhile, under the condition that the target evaluation index includes the called frequency of the target data and other evaluation indexes, considering that the called frequency of the data is infinitely accumulated along with time, directly using the called accumulated frequency as the evaluation index will result in the reduction of the evaluation effect of the other evaluation indexes, and therefore the called frequency data and the other evaluation indexes need to be subjected to protocol processing. For example: assuming that the target evaluation index includes the called frequency of the target data and the data sensitivity level, and the maximum level of the data sensitivity level is 5, the maximum value of the target evaluation index also needs to be reduced to infinity to 5, and the specific reduction process is as follows: and (3) performing specification processing on the called frequency of the target data by adopting the following formula:
Figure BDA0002883111140000041
wherein Y represents the final calling frequency of the target data, and Y represents the accumulated calling frequency of the target data. The numerical relationship between Y and Y is shown in fig. 3, the abscissa in fig. 3 represents the value of Y, and the ordinate represents the value of Y, and it can be seen from fig. 3 that Y gradually approaches 5 as Y increases.
It should be noted that, in practical application, the above-mentioned specification calculation mode may be changed according to practical situations, so as to implement a specification process adapted to the evaluation index.
In addition, in practical applications, the target data is used, analyzed, mined, processed, and the like after being called by the data user, and therefore the data user has the right to speak to evaluate the data value. In implementation, the score of the data user may also be any integer from 1 to 5, which may specifically refer to the above-mentioned value of the sensitivity level of the target data, and is not described herein again.
In addition, in the case that the value evaluation indexes of the target data include at least two types, a corresponding weight value may be set for each evaluation index to adjust the degree of influence of the evaluation index on the value evaluation of the target data, for example: assuming that the sensitivity level of the target data is weighted by 50%, the frequency with which the target data is called is weighted by 40%, and the score value of the target data is weighted by 10%, the sensitivity level of the target data has the greatest influence on the value evaluation of the target data, and the score value of the target data has the least influence on the value evaluation of the target data.
It should be noted that, in practical application, a user may set a type of a target evaluation index associated with target data and set a weight value of each evaluation index according to actual needs, so that the data value evaluation method provided by the embodiment of the present invention may perform flexible evaluation index configuration and value calculation according to values that can be reflected by different data, and is not limited specifically herein.
And 102, under the condition that an access request for the target data is received, updating the target evaluation index based on the access request.
In an implementation, the access request may include: price query requests, data sharing requests, and the like. For example: the system architecture shown in fig. 2 includes: a block chain 21, a data sharing module 22, an evaluation index updating module 23 and a data value evaluation module 24.
The blockchain 21 includes a plurality of network nodes, wherein the data consumers 25 (i.e., data utilization nodes) and the data providers 26 (i.e., data providing nodes) may be the same or different network nodes in the blockchain 21. In the initialization stage of the system architecture, each starting member mechanism in the blockchain 21 builds a corresponding network node, and after each network node passes the identity authentication of the blockchain 21, each data can be stored in the data sharing module 22, and the data value evaluation module 24 performs initial value evaluation on each data in the data sharing module 22 to obtain the initial data value of each data of each network node, and then links the initial data value so that each network node in the blockchain 21 can view the initial data values of other network nodes, thereby providing a basis for sharing the data of each network node in the blockchain 21 through the data sharing module 22.
In an implementation, the access request may be sent by a data requesting node in the blockchain to a data providing node. In addition, the above-mentioned updating the target evaluation index based on the access request may be understood as: updating the values of the evaluation indexes affected by the access request, such as: in the case that the evaluation index includes the frequency of the data being called, the value of the number of times the data is called is increased by 1 each time the data is shared. For another example: in the case where the evaluation index includes the score value of the target data, the score value of the user using the target data may be received after each time the data is shared, and it is necessary to calculate the average of all the score values of the target data as the score value of the target data.
In implementation, the data value evaluation module 24 is used for evaluating the value of the data through a data value evaluation method; the evaluation index updating module 23 updates the value of the evaluation index of the data according to the last time the data is accessed (specifically, the data can be shared); the data sharing module 22 is used for storing data and executing data sharing action; the block chain 21 is used for storing and broadcasting the data value and the updated evaluation index among nodes.
Thus, when a network node (assumed to be network node a) acquires data, an initial value of an evaluation indicator of the data is acquired to determine an initial data value of the data based on the initial value of the evaluation indicator, and then the initial data value is linked up so that other network nodes in the block chain 21 can view the initial data value of the data. Specifically, when another network node (assumed to be network node B) views the initial data value of the data and sends a data sharing request to the provider of the data (i.e., network node a), the network node a performs authorization verification on the network node B, so as to allow the data sharing module 22 to send the data requested by the network node B to the network node B after the authorization verification is passed. At this time, the evaluation index updating module 23 further updates the evaluation index of the data based on the action of the data sharing module 22 sending the data to the network node B, and links the updated evaluation index to the blockchain 21 for storage, and after the updated evaluation index is linked, the data value evaluating module 24 can obtain the updated evaluation index, update the data value of the shared data based on the updated evaluation index, and link the updated data value to the blockchain 21 for storage, so that the data value of the data that can be queried by each network node in the blockchain 21 is the updated data value.
In actual use, the data value may not be visible to an unauthorized data user, and therefore, in practice, the data user needs to pass authentication of the data provider of the target data when accessing the target data.
As an optional implementation manner, in the case that an access request for the target data is received, updating the target evaluation index based on the access request includes:
under the condition that an access request of a data using node in a block chain to target data stored in a data providing node in the block chain is received, performing identity verification on the data using node;
and updating the target evaluation index based on the access condition of the access request to the target data under the condition that the verification result of the identity verification is verification pass.
In an implementation, assuming that the data provider is a network node on a federation chain or a private chain in a blockchain, the authentication may be used to determine whether the data consumer is a member of the federation chain or the private chain.
In this embodiment, the authentication process is triggered according to the access request of the data user to the target data, so that the data user who passes the authentication can access the related information of the target data or obtain the target data, and the data user who does not pass the authentication cannot access the related information of the target data or obtain the target data, thereby improving the security of the target data access.
As an optional implementation, the access request includes a data value query request and a data sharing request, and in the case that an access request for the target data is received, updating the target evaluation index based on the access request includes:
under the condition that a value query request of a data using node in the block chain to target data stored in a data providing node in the block chain is received, performing identity verification on the data using node;
under the condition that the authentication result of the identity authentication is that the authentication is passed, sending the data value of the target data to the data use node;
and under the condition that a data sharing request of the data using node for the target data is received, sending the target data to the data using node, and updating the target evaluation index based on the data sharing request.
In the above process of performing identity verification on the data using node, when an access request of the data using node in the blockchain to the target data of the data providing node stored in the blockchain is received, the identity verification performed on the data using node in the process of performing identity verification on the data using node has the same meaning, which is not described herein again.
In this embodiment, the authentication process is triggered according to the value query request of the data user for the target data, so that the data user who passes the authentication can query the value of the target data, and the data user who does not pass the authentication cannot query the value of the target data, thereby improving the security of data value query.
Certainly, in a specific implementation, the authentication process may also be triggered according to a data sharing request of a data user for target data, so that each data user can query the value of the target data, but the data user who only passes the authentication can share and obtain the target data, and the data user who does not pass the authentication cannot obtain the target data, thereby improving the security of data sharing.
And 103, updating the data value of the target data according to the updated target evaluation index to obtain the updated data value.
In an implementation, the updating the data value of the target data according to the updated target evaluation index may be understood as: calculating to obtain an updated data value based on the updated target evaluation index by adopting a preset data value calculation method; alternatively, it can also be understood as: and updating the original data value by adopting a preset data value updating method based on the updated target evaluation index, wherein the updating method is not specifically limited.
It should be noted that, in practical applications, there is a case that the target data does not have a data value before update before the data value of the target data is linked for the first time, and at this time, the initial value of the target data may be determined by user input or by using a data value evaluation method based on the data value determined by the initial evaluation index of the target data, so that when the data value of the target data is updated for the next time, the target evaluation index is updated, and the data value of the target data is updated according to the updated target evaluation index, so as to obtain the updated data value.
As an optional implementation, the method further comprises:
performing initial data value evaluation on the target data to obtain an initial data value of the target data, and linking the initial data value to the block chain for storage;
the updating the data value of the target data according to the updated target evaluation index to obtain the updated data value includes:
and updating the initialized data value according to the updated target evaluation index to obtain an updated data value.
The above-mentioned initial data value evaluation on the target data may be understood as: and determining the data value based on the initial evaluation index of the target data by adopting a data value evaluation method.
The initial evaluation index may be an attribute value carried by the target data itself, for example: correspondingly, the degree of matching between the initialized data value determined only according to the attribute value carried by the target data and the actual demand of the trading market is often low, so that after the initialized data value is linked up, the initialized data value needs to be updated iteratively according to the sharing condition of the target data, the feedback information of the data requester and the like.
In the iterative update process, the next iterative update is an update process of the data value obtained by the previous iterative update, in other words, the initialized data value is updated according to the updated target evaluation index, so as to obtain an updated data value, which may be specifically expressed as: updating the initialized data value according to the target evaluation index after the first updating so as to obtain the data value after the first updating; and in the second updating iteration process, updating the initialized data value according to the target evaluation index after the second updating so as to obtain the data value after the second updating.
In the embodiment, the initialized data value is continuously updated iteratively according to the updated target evaluation index, and the data value of the evaluated target data is continuously optimized, so that the data value of the target data is more matched with the current market environment, the requirements of users and the like.
And 104, outputting the updated data value.
In an implementation, the outputting the updated data value may include: chaining the updated data value to enable the data value viewed by each network node in the block chain to be the updated data value, namely, executing the data value evaluation process before chaining the data value; alternatively, the outputting the updated data value may further include: and after the updated data value is uplinked, broadcasting the updated data value to other network nodes by the block chain so as to store the updated data value in each network node in the block chain.
In this way, each network node can check the updated data value of the target data to determine whether to purchase the target data, and if the target data needs to be purchased, a reward corresponding to the updated data value needs to be paid to a provider of the target data.
After the other network nodes share the target data corresponding to the updated data value, the above steps 102 to 104 are repeatedly executed, that is, the target evaluation index of the target data is updated again according to the sharing behavior, the data value of the target data is updated based on the target evaluation index which is updated again, and the latest updated data value is output.
Therefore, the data value evaluation method provided by the embodiment of the invention is an iterative process, the data value of the data value evaluation method is updated and iterated according to the access condition of the data user to the data, and the final data value can be matched with the current market demand.
In the embodiment of the invention, a target evaluation index associated with target data in a block chain is obtained; updating the target evaluation index based on the access request in the case of receiving the access request for the target data; updating the data value of the target data according to the updated target evaluation index to obtain an updated data value; and outputting the updated data value. Therefore, the evaluation index associated with the data can be obtained in advance, and the evaluation index and the value of the data can be updated in time according to the use condition of the data by the user, so that the data value evaluated by the data is more matched with the actual value of the data.
Referring to fig. 4, a flow chart of another data value evaluation method according to an embodiment of the present invention is shown in fig. 4, where the method includes the following steps:
step 401, initializing the blockchain system.
Taking the embodiment shown in fig. 2 as an example, the initialization of the blockchain system specifically includes: each originating member organization in the blockchain 21 builds a respective corresponding network node.
Step 402, uploading data by each network node in the block chain.
Taking the embodiment shown in fig. 2 as an example, the step may specifically include: after passing through the identity authentication of the blockchain 21, each network node uploads respective data to the data sharing module 22 for storage.
And 403, evaluating the data value of the data.
Taking the embodiment shown in fig. 2 as an example, the step may specifically include: performing initialization value evaluation on each data uploaded to the data sharing module 22 in step 402 by the data value evaluation module 24 to obtain an initial data value of each data of each network node; alternatively, after each data sharing, the data value evaluation module 24 performs a data value evaluation on the shared data to update the data value of the shared data.
Step 404, chaining the evaluated data values.
Taking the embodiment shown in fig. 2 as an example, the step may specifically include: linking the initial data value or the updated data value obtained in step 403, so that each network node in the blockchain 21 can view the latest data value of the data of other network nodes, thereby providing a basis for sharing the data of each network node in the blockchain 21 through the data sharing module 22.
Step 405, receive a data value query request.
In implementation, the data value query request is used for querying the data value of the target data, and in application, the data value query request is sent to the data provider by the data user, so that the data provider triggers the verification of the identity of the data user based on the data value query request.
Step 406, authentication is performed.
In application, the performing of the authentication is used to determine whether the data user belongs to a member of the blockchain.
If the authentication result of the authentication in this step is that the authentication is passed, step 407 is executed, otherwise, the process of the data value evaluation method is ended, that is, data sharing is not executed.
When the authentication result of the authentication in this step is that the authentication is passed, the blockchain returns the data value information of the target data to the data user, and a timestamp is added to the access operation of the data value query request on the target data to generate a record, and the record is fed back to the uplink.
Step 407, data sharing is performed.
In application, after the authentication in step 406 is passed, the user may decide whether to purchase the corresponding target data based on the queried data value, and in case of determining to purchase the target data, perform the data sharing process in this step, that is: and sending a data sharing request to a data provider of the target data by the data user so that the data provider authorizes the data user and can acquire the target data from the data sharing module.
And step 408, updating the value of the target evaluation index.
In this step, the target evaluation index of the updated value is an evaluation index affected by the data sharing action, for example: frequency of data access, data user scoring, etc.
After the step is executed, step 403 is repeatedly executed to update the data value according to the value of the updated target evaluation index.
The other data value evaluation method provided by the embodiment of the invention has the same beneficial effects as the method embodiment shown in fig. 1, and a data user can query the data value of the target data provided by the data provider after passing the identity authentication of the data provider, so that the security of data value query can be improved.
Referring to fig. 5, which is a structural diagram of a data value evaluation apparatus according to an embodiment of the present application, as shown in fig. 5, the data value evaluation apparatus 500 includes:
an obtaining module 501, configured to obtain a target evaluation index associated with target data in a block chain;
a first updating module 502, configured to, in a case where an access request for the target data is received, update the target evaluation index based on the access request;
a second updating module 503, configured to update the data value of the target data according to the updated target evaluation index, so as to obtain an updated data value;
an output module 504, configured to output the updated data value.
Optionally, the data value evaluation apparatus 500 further includes:
the initial value evaluation module is used for carrying out initial data value evaluation on the target data to obtain the initial data value of the target data and linking the initial data value to the block chain for storage;
the second update module is specifically configured to:
and updating the initialized data value according to the updated target evaluation index to obtain an updated data value.
Optionally, the first updating module 502 includes:
the system comprises a first identity verification unit, a second identity verification unit and a third identity verification unit, wherein the first identity verification unit is used for verifying the identity of a data use node in a block chain when receiving an access request of the data use node to target data stored in a data supply node in the block chain;
and the updating unit is used for updating the target evaluation index based on the access condition of the access request to the target data under the condition that the verification result of the identity verification is that the verification is passed.
Optionally, the value evaluation index of the target data includes at least one of the following:
a sensitivity level of the target data, the sensitivity level of the target data associated with a privacy level of the target data;
the target data is called frequently, and the called frequency of the target data represents the frequency of accessing the target data;
and the scoring value of the target data is associated with feedback information of a data user after the target data is acquired, or the scoring value is associated with the data sensitivity level of the target data.
Optionally, the access request includes a data value query request and a data sharing request, and the first updating module 502 includes:
a first authentication unit, configured to authenticate a data usage node in the blockchain if a value query request for target data stored in the data providing node in the blockchain is received from the data usage node;
the sending module is used for sending the data value of the target data to the data using node under the condition that the verification result of the identity verification is that the verification is passed;
and the sharing and updating unit is used for sending the target data to the data using node under the condition of receiving a data sharing request of the data using node to the target data, and updating the target evaluation index based on the data sharing request.
The data value evaluation apparatus 500 provided in the embodiment of the present invention can implement each process in the method embodiments shown in fig. 1 or fig. 4, and can obtain the same beneficial effects, and for avoiding repetition, the details are not repeated here.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the method embodiment shown in fig. 1 or fig. 4, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The computer readable storage medium is, for example, ROM, RAM, magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (11)

1. A method for evaluating data value, the method comprising:
acquiring a target evaluation index associated with target data in a block chain;
updating the target evaluation index based on the access request in the case of receiving the access request for the target data;
updating the data value of the target data according to the updated target evaluation index to obtain an updated data value;
and outputting the updated data value.
2. The method of claim 1, further comprising:
performing initial data value evaluation on the target data to obtain an initial data value of the target data, and linking the initial data value to the block chain for storage;
the updating the data value of the target data according to the updated target evaluation index to obtain the updated data value includes:
and updating the initialized data value according to the updated target evaluation index to obtain an updated data value.
3. The method of claim 1, wherein updating the target evaluation index based on the access request if the access request for the target data is received comprises:
under the condition that an access request of a data using node in a block chain to target data stored in a data providing node in the block chain is received, performing identity verification on the data using node;
and updating the target evaluation index based on the access condition of the access request to the target data under the condition that the authentication result of the identity authentication is authentication pass.
4. The method of claim 1, wherein the value assessment indicators for the target data comprise at least one of:
a sensitivity level of the target data, the sensitivity level of the target data associated with a privacy level of the target data;
the target data is called frequently, and the called frequency of the target data represents the frequency of accessing the target data;
and the scoring value of the target data is associated with feedback information of a data user after the target data is acquired, or the scoring value is associated with the data sensitivity level of the target data.
5. The method of claim 1, wherein the access request comprises a data value query request and a data sharing request, and wherein updating the target evaluation index based on the access request when the access request for the target data is received comprises:
under the condition that a value query request of a data using node in the block chain to target data stored in a data providing node in the block chain is received, performing identity verification on the data using node;
under the condition that the authentication result of the identity authentication is that the authentication is passed, sending the data value of the target data to the data use node;
and under the condition that a data sharing request of the data using node for the target data is received, sending the target data to the data using node, and updating the target evaluation index based on the data sharing request.
6. A data value evaluation apparatus, characterized in that the apparatus comprises:
the acquisition module is used for acquiring a target evaluation index associated with target data in the block chain;
the first updating module is used for updating the target evaluation index based on the access request when the access request to the target data is received;
the second updating module is used for updating the data value of the target data according to the updated target evaluation index to obtain an updated data value;
and the output module is used for outputting the updated data value.
7. The apparatus of claim 6, further comprising:
the initial value evaluation module is used for carrying out initial data value evaluation on the target data to obtain the initial data value of the target data and linking the initial data value to the block chain for storage;
the second update module is specifically configured to:
and updating the initialized data value according to the updated target evaluation index to obtain an updated data value.
8. The apparatus of claim 6, wherein the first update module comprises:
the system comprises a first identity verification unit, a second identity verification unit and a third identity verification unit, wherein the first identity verification unit is used for verifying the identity of a data use node in a block chain when receiving an access request of the data use node to target data stored in a data supply node in the block chain;
and the updating unit is used for updating the target evaluation index based on the access condition of the access request to the target data under the condition that the verification result of the identity verification is that the verification is passed.
9. The apparatus of claim 6, wherein the value assessment indicators for the target data comprise at least one of:
a sensitivity level of the target data, the sensitivity level of the target data associated with a privacy level of the target data;
the target data is called frequently, and the called frequency of the target data represents the frequency of accessing the target data;
and the scoring value of the target data is associated with feedback information of a data user after the target data is acquired, or the scoring value is associated with the data sensitivity level of the target data.
10. The apparatus of claim 6, wherein the access request comprises a data value query request and a data sharing request, and wherein the first update module comprises:
a first authentication unit, configured to authenticate a data usage node in the blockchain if a value query request for target data stored in the data providing node in the blockchain is received from the data usage node;
the sending module is used for sending the data value of the target data to the data using node under the condition that the verification result of the identity verification is that the verification is passed;
and the sharing and updating unit is used for sending the target data to the data using node under the condition of receiving a data sharing request of the data using node to the target data, and updating the target evaluation index based on the data sharing request.
11. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the data value evaluation method according to any one of claims 1 to 5.
CN202110005404.XA 2021-01-05 2021-01-05 Data value evaluation method and device Pending CN114723200A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110005404.XA CN114723200A (en) 2021-01-05 2021-01-05 Data value evaluation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110005404.XA CN114723200A (en) 2021-01-05 2021-01-05 Data value evaluation method and device

Publications (1)

Publication Number Publication Date
CN114723200A true CN114723200A (en) 2022-07-08

Family

ID=82233498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110005404.XA Pending CN114723200A (en) 2021-01-05 2021-01-05 Data value evaluation method and device

Country Status (1)

Country Link
CN (1) CN114723200A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255610A (en) * 2018-09-26 2019-01-22 石帅 A kind of value assessment method of fictitious assets under internet block chain environment
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain
CN110516967A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 A kind of method and relevant apparatus of information evaluation
CN111242453A (en) * 2020-01-07 2020-06-05 通链(北京)科技有限公司 Financial evaluation method and system based on block chain
CN111259430A (en) * 2020-02-14 2020-06-09 北京哥伦布时代科技发展有限公司 Data processing method and device, electronic equipment and computer storage medium
CN111445162A (en) * 2020-04-15 2020-07-24 中国银行股份有限公司 Evaluation data sharing method and system
CN111461785A (en) * 2020-04-01 2020-07-28 支付宝(杭州)信息技术有限公司 Content value attribute evaluation method and device and copyright trading platform
CN111684443A (en) * 2017-12-20 2020-09-18 维恩知识产权有限公司 Decentralized autonomic intellectual property asset assessment engine

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111684443A (en) * 2017-12-20 2020-09-18 维恩知识产权有限公司 Decentralized autonomic intellectual property asset assessment engine
CN109255610A (en) * 2018-09-26 2019-01-22 石帅 A kind of value assessment method of fictitious assets under internet block chain environment
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain
CN110516967A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 A kind of method and relevant apparatus of information evaluation
CN111242453A (en) * 2020-01-07 2020-06-05 通链(北京)科技有限公司 Financial evaluation method and system based on block chain
CN111259430A (en) * 2020-02-14 2020-06-09 北京哥伦布时代科技发展有限公司 Data processing method and device, electronic equipment and computer storage medium
CN111461785A (en) * 2020-04-01 2020-07-28 支付宝(杭州)信息技术有限公司 Content value attribute evaluation method and device and copyright trading platform
CN111445162A (en) * 2020-04-15 2020-07-24 中国银行股份有限公司 Evaluation data sharing method and system

Similar Documents

Publication Publication Date Title
US8311907B2 (en) System and method for detecting fraudulent transactions
US20130185806A1 (en) Personal-information transmission/reception system, personal-information transmission/reception method, personal-information provision apparatus, preference management apparatus and computer program
US11188678B2 (en) Detection and prevention of privacy violation due to database release
CN108492188B (en) Client recommendation method, device, equipment and storage medium
CN107463675B (en) Data processing method and system
US20120239590A1 (en) Managing customer communications among a plurality of channels
CN109685536B (en) Method and apparatus for outputting information
CN107808314B (en) User recommendation method and device
CN110782286A (en) Advertisement pushing method and device, server and computer readable storage medium
CN111488616A (en) Method and device for realizing preplan machine of service data block chain
CN112446764A (en) Game commodity recommendation method and device and electronic equipment
CN108171520A (en) A kind of Transaction Information management method and server
CN111046078A (en) Block chain-based credit investigation query method and device and electronic equipment
CN110750658A (en) Recommendation method of media resource, server and computer readable storage medium
CN109525933B (en) Location privacy protection method and device
CN111865753B (en) Method and device for determining parameters of media information, storage medium and electronic device
JP7257172B2 (en) COMMUNICATION PROGRAM, COMMUNICATION DEVICE, AND COMMUNICATION METHOD
CN114723200A (en) Data value evaluation method and device
CN111402029B (en) Intelligent evaluation method and device based on blockchain and knowledge federation
CN109300055A (en) Investment-linked insurance profit and loss querying method, device, equipment and readable storage medium storing program for executing
Gutowska et al. Modelling the B2C Marketplace: Evaluation of a Reputation Metric for e-commerce
Duan et al. Building and managing reputation in the environment of chinese e-commerce: A case study on taobao
KR20220051937A (en) Method for Providing Analyzing Service on the Influencer Advertisement Result
CN113763080A (en) Method and device for determining recommended article, electronic equipment and storage medium
CN107451860B (en) Information pushing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination