CN116305218A - Data link tracking and data updating method, device and data management system - Google Patents

Data link tracking and data updating method, device and data management system Download PDF

Info

Publication number
CN116305218A
CN116305218A CN202310551946.6A CN202310551946A CN116305218A CN 116305218 A CN116305218 A CN 116305218A CN 202310551946 A CN202310551946 A CN 202310551946A CN 116305218 A CN116305218 A CN 116305218A
Authority
CN
China
Prior art keywords
data
user
owner
target
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310551946.6A
Other languages
Chinese (zh)
Other versions
CN116305218B (en
Inventor
陈甜妹
徐天天
陈枫
李海弘
吴臻
柳志军
张莹
沈琦
李明
董元龙
包江雪
俞晨玺
马骏
翁慧颖
林明晖
岳衡
马新强
杨建党
刘勇
黄敏
王莎
吴海朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Zhedian Tendering Consulting Co ltd
Zhejiang University ZJU
State Grid Zhejiang Electric Power Co Ltd
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Materials Branch of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Zhedian Tendering Consulting Co ltd
Zhejiang University ZJU
State Grid Zhejiang Electric Power Co Ltd
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Materials Branch of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Zhedian Tendering Consulting Co ltd, Zhejiang University ZJU, State Grid Zhejiang Electric Power Co Ltd, Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd, Materials Branch of State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Zhedian Tendering Consulting Co ltd
Priority to CN202310551946.6A priority Critical patent/CN116305218B/en
Publication of CN116305218A publication Critical patent/CN116305218A/en
Application granted granted Critical
Publication of CN116305218B publication Critical patent/CN116305218B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data link tracking and data updating method, a device and a data management system, firstly, responding to a use number request of a data user, and carrying out authority verification on the data user; then, after the right verification is successful, the data owner is controlled to send the data corresponding to the user number request to the data user, and a data call record is generated; when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record so as to update the data at the corresponding data user according to the updated data. By adopting the embodiment of the invention, the data transmission can be carried out after the authority verification of the data user is successful, the data calling record is generated, and the data calling record is utilized to update the corresponding data user when the data of the data owner is updated, so that the effective control of the data application is realized, the data safety is improved, and the defect of information lag of the data user is overcome.

Description

Data link tracking and data updating method, device and data management system
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and apparatus for tracking a data link and updating data, and a data management system.
Background
In the Internet age, the data has the characteristics of easy copying and easy transmission, the data of the data owner is easily applied to a large scale by the data user, the data security is difficult to ensure, and when the data of the data owner is updated, the data in the data user is difficult to synchronously update, so that information lag is caused.
Disclosure of Invention
The embodiment of the invention provides a data link tracking and data updating method, a device and a data management system, which can realize effective control of data application, improve data security and overcome the defect of information lag of a data user by carrying out data transmission and generating a data calling record after the authority verification of the data user is successful and carrying out data updating on the corresponding data user by utilizing the data calling record when the data of the data owner is updated.
In order to achieve the above objective, an embodiment of the present invention provides a method for tracking and updating data of a data link, including:
responding to a use number request of a data user, and performing authority verification on the data user;
after the right verification is successful, the data owner is controlled to send the data corresponding to the number use request to the data user, and a data call record is generated; wherein the data is stored in the data owner;
when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record, and taking the data user as a target data user;
and sending the updated data to the target data user so as to enable the target data user to update the data.
As an improvement of the above-mentioned scheme, when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record, as a target data user; transmitting the updated data to the target data consumer so that the target data consumer can update the data, comprising:
inquiring the data call record according to the received update information, determining the ID of a data user corresponding to the update information as a target ID, and sending the target ID to the data owner; wherein the update information is information generated by the data owner according to the updated data;
and controlling the data owner to send updated data to the data user according to the target ID so as to enable the data user to update the data.
As an improvement of the above solution, the performing authority verification on the data user in response to the usage request of the data user includes:
responding to a use number request of a data user, and analyzing the use number request to obtain a target data source, a target use number range and a target use number destination;
inquiring a preset data calling authority table according to the target data source, the target use number range and the target use number so as to verify the authority of the data user; the data calling authority table records the permitted usage number of each data stored by the data owner.
As an improvement of the above scheme, the data calling authority table further records at least one of a time limit of usage and a number of times of usage allowed for each data stored by the data owner;
after the data calling record is generated, subtracting one from the corresponding available times in the data calling authority table according to the data calling record;
and if the current time exceeds the time limit of the use number or the available frequency is zero, deleting the corresponding permission record in the data calling permission table.
As an improvement of the above solution, after the right verification is successful, the controlling the data owner to send the data corresponding to the usage request to the data user, and generating a data call record includes:
after the authority verification is successful, performing performance test on the data owner;
when the test result of the data owner is busy, determining an alternative list according to the data call record of the number request inquiry history; the candidate list is a historical data user who has acquired corresponding data;
the alternative bill is sent to the data owner so that the data owner can select a data substitute sender from the alternative bill according to a preset screening rule, the use number request is sent to the data substitute sender so that the data substitute sender can send corresponding data to the data user, and a data calling record is generated;
and when the test result of the data owner is not busy, controlling the data owner to send the data corresponding to the use number request to the data user, and generating a data call record.
As an improvement of the above solution, before the sending the usage request to the data proxy to enable the data proxy to send the corresponding data to the data user, the method further includes:
and when the test result of the data substitution sender is busy, removing the data substitution sender from the alternative list and resending the alternative list to the data owner so that the data owner selects a new data substitution sender until the test result of the data substitution sender is not busy or the test result of the data owner is not busy.
As an improvement of the above-mentioned scheme, after transmitting the data to the data consumer, further comprising:
transmitting a data export request of the data user to the data owner so that the data owner generates an authorization verification result according to the data export request;
when the authorization verification result is that authorization is obtained, generating an identifier according to the data export request and sending the identifier to the data consumer so as to enable the data exported by the data consumer to be attached with the identifier; the identification comprises a watermark identification and a two-dimensional code identification, wherein the watermark identification comprises brief information of a data source and node time, and the two-dimensional code identification comprises detailed information of the data source and the node time;
and when the authorization verification result is unauthorized, controlling the export function of the data user to be unable to be online.
In order to achieve the above objective, an embodiment of the present invention further provides a data link tracking and data updating device, configured to execute the data link tracking and data updating method according to any one of the embodiments.
In order to achieve the above objective, an embodiment of the present invention further provides a data management system, which includes a data consumer, a data owner, and the data link tracking and data updating device described in the above embodiment.
As an improvement of the above solution, the data link tracking and data updating device includes a code management module, a data management module, a function management module, and a task scheduling module, where the task scheduling module is configured to execute the data link tracking and data updating method according to any one of the above embodiments;
the code management module is used for providing a development environment and storing the running codes of the data user and the data owner;
the data management module is used for storing field catalogues and application paths of the data tables of the data user and the data owner;
the function management module is used for storing and uniquely encoding the menus and functions of the data user and the data owner.
Compared with the prior art, the data link tracking and data updating method, the data link tracking and data updating device and the data management system provided by the embodiment of the invention are characterized in that firstly, the authority verification is carried out on a data user in response to a use number request of the data user; then, after the right verification is successful, the data owner is controlled to send the data corresponding to the number using request to the data user, and a data calling record is generated; wherein the data is stored in the data owner; and when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record so as to update the data at the corresponding data user according to the updated data. According to the embodiment of the invention, the data is transmitted and the data calling record is generated after the authority verification of the data user is successful, and the data calling record is utilized to update the corresponding data user when the data of the data owner is updated, so that the effective control of the data application is realized, the data safety is improved, and the defect of information lag of the data user is overcome.
Drawings
FIG. 1 is a flowchart of a method for data link tracking and data updating according to an embodiment of the present invention;
fig. 2 is a system frame diagram according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flow chart of a method for tracking and updating data of a data link according to an embodiment of the invention is shown. The method comprises the steps of S11-S14:
s11, responding to a use number request of a data user, and performing authority verification on the data user;
s12, after the right verification is successful, controlling a data owner to send the data corresponding to the number using request to the data user, and generating a data calling record; wherein the data is stored in the data owner;
s13, when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record, and taking the data user as a target data user;
and S14, the updated data is sent to the target data user, so that the target data user can update the data.
It should be noted that the method may be performed by the data owner or the data manager, which is not limited herein. The data management party is a third party except the data owner and the data user and is used for managing the information interaction of the whole system.
For example, taking a data manager as an execution subject of the method, referring to a system frame diagram shown in fig. 2, the data manager is a B system, the data owner is an a system, the data consumer is a C system and a D system, and conditions related to authority verification are preset in the B system. Firstly, a first data application request (namely a use number request) is sent to a B system by a C system, after the B system receives the first data application request, the first data application request initiated by the C system is subjected to authority verification by utilizing conditions related to the authority verification, after the authority verification is successful, the first data application request initiated by the C system is forwarded to an A system by the B system so as to enable the A system to respond to the first data application request to send corresponding data to the C system, specifically, the data can be provided for the C system by utilizing an API (Application Programming Interface) and an application programming interface), the B system can record the action that the data of the A system is transmitted to the C system, and a data application record table (data call record) is formed, wherein the data application record table mainly comprises information such as a data owner, a data table where the sent data belongs, a field number, an active name, a great name, a user name, a menu and functions, a user name, a contact mode and an authorization time, a data call number and the like. The data application record table is updated along with the data table and the application condition is adjusted in real time. In the subsequent application process, if the authorized data table in the A system is changed, the A system informs the B system, and the B system searches the data application record table to automatically push the change information to the corresponding data user (target data user), so that the purpose of updating the data of the corresponding data user when the A system updates the data is achieved, and the defect of information lag of the data user is overcome. When the authority verification fails, the B system does not perform an operation of transmitting the first data application request to the a system, and further, the B system feeds back verification failure information (not shown in the figure) to the C system. Therefore, the method realizes the functions of unified data scheduling, application link record tracking, updating and the like of different systems, ensures that the data is used in a specified range, improves the data safety, and overcomes the defect of information lag of a data user.
It will be appreciated that the specific generation occasion of the data call record may be: after the system A finishes the operation of transmitting the data to the system C, generating feedback information to the system B, and generating a data calling record when the system B receives the feedback information; the specific generation timing may be that the data call record may be generated after the authority verification is passed, which is not limited herein.
In one embodiment, when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record as a target data user; transmitting the updated data to the target data consumer so that the target data consumer can update the data, comprising:
inquiring the data call record according to the received update information, determining the ID of a data user corresponding to the update information as a target ID, and sending the target ID to the data owner; wherein the update information is information generated by the data owner according to the updated data;
and controlling the data owner to send updated data to the data user according to the target ID so as to enable the data user to update the data.
For example, referring to fig. 2, the a system is used as a data owner, the B system is used as a data manager, the C system and the D system are used as data users, each of the a system, the B system, the C system and the D system is allocated with a unique ID, when the data of the a system is updated, the a system generates update information according to the updated data, the update information includes information such as an ID (identifier) of the a system and an index of the updated data, and after receiving the update information sent by the a system, the B system searches a data call record, finds an ID of the data user corresponding to the updated data as a target ID, and feeds back to the a system, so that the a system sends the updated data to the corresponding data user.
In one embodiment, the performing authority verification on the data user in response to the usage request of the data user includes:
responding to a use number request of a data user, and analyzing the use number request to obtain a target data source, a target use number range and a target use number destination;
inquiring a preset data calling authority table according to the target data source, the target use number range and the target use number so as to verify the authority of the data user; the data calling authority table records the permitted usage number of each data stored by the data owner.
The use number request includes information such as a target data source (a data owner, i.e. a system a), a target use number range (a table required to be used and a field thereof), a target use number destination (e.g. a C system and a menu function thereof), an applicant (including an account number, a name, a unit, a contact way, etc.), a use number frequency, a use number time limit, or a use number, etc., a data call permission table (a condition related to permission verification) is set in the B system, and the data call permission table is queried according to the information in the use number request to determine whether the C system has the data call permission.
In one embodiment, the data call authority table further records at least one of a time limit of usage and a number of times of usage allowed for each data stored by the data owner;
after the data calling record is generated, subtracting one from the corresponding available times in the data calling authority table according to the data calling record;
and if the current time exceeds the time limit of the use number or the available frequency is zero, deleting the corresponding permission record in the data calling permission table.
For example, the data call authority table records that the C system can call the data under a certain index of the a system for 5 times within the preset date, when the C system initiates the corresponding application number request, if the current time does not exceed the preset date and the historical call number is less than 5 times (the available number is not 0), the application number request is successfully verified. And if the current time exceeds the time limit of the use number or the number of times of the use is zero, deleting the corresponding permission record in the data calling permission table so as to inhibit the subsequent corresponding data transmission.
In one embodiment, after the right verification is successful, the controlling the data owner to send the data corresponding to the usage request to the data user, and generating a data call record includes:
after the authority verification is successful, performing performance test on the data owner;
when the test result of the data owner is busy, determining an alternative list according to the data call record of the number request inquiry history; the candidate list is a historical data user who has acquired corresponding data;
the alternative bill is sent to the data owner so that the data owner can select a data substitute sender from the alternative bill according to a preset screening rule, the use number request is sent to the data substitute sender so that the data substitute sender can send corresponding data to the data user, and a data calling record is generated;
and when the test result of the data owner is not busy, controlling the data owner to send the data corresponding to the use number request to the data user, and generating a data call record.
When the system a as the data owner receives a large amount of application of usage, in order to avoid difficulty in timely response, the system B matches the authorized system and user with usage rights according to the usage requirements, provides information such as API call amount to the data owner, so that the system a designates a data user as a data sender for data transmission, see fig. 2, after receiving a second data application request sent by the system D and successful in authority verification, the system B performs performance test on the system a, if the test result is busy, queries the stored data call record, finds out the data user who has called the corresponding data, such as the system C and other data users (not shown in the figure), generates an alternative list according to the found data user, sends the alternative list to the system a for the system a to select the data sender, such as the system C, feeds back the information authorizing the system C to provide data to the system B, then determines the specific position of the data to be sent in the system C according to the data call record, provides the data to the system C in combination with the second data application request to the system C to provide the data to the system D, controls the system B to provide the data to the system instead of the system B to track the current condition of the system, and the system B provides data to the system instead of the API system.
Optionally, the preset screening rule may be a random screening rule, or may use a data user who recently acquired data as a data sender, or may be other rules, which are not limited herein.
In one embodiment, before the use number request is sent to the data proxy party to enable the data proxy party to send the corresponding data to the data user party, the method further includes:
and when the test result of the data substitution sender is busy, removing the data substitution sender from the alternative list and resending the alternative list to the data owner so that the data owner selects a new data substitution sender until the test result of the data substitution sender is not busy or the test result of the data owner is not busy.
It can be understood that, in order to further improve the timeliness of data transmission, performance test is performed on the data sender so as to screen out the party with lower busyness to perform data transmission, thereby improving the data acquisition efficiency of the data user initiating the request for use.
In one embodiment, after sending the data to the data consumer, the method further comprises:
transmitting a data export request of the data user to the data owner so that the data owner generates an authorization verification result according to the data export request;
when the authorization verification result is that authorization is obtained, generating an identifier according to the data export request and sending the identifier to the data consumer so as to enable the data exported by the data consumer to be attached with the identifier; the identification comprises a watermark identification and a two-dimensional code identification, wherein the watermark identification comprises brief information of a data source and node time, and the two-dimensional code identification comprises detailed information of the data source and the node time;
and when the authorization verification result is unauthorized, controlling the export function of the data user to be unable to be online.
The system C is used as a data user to acquire data of the system a in a manner shown in fig. 2, if the system C needs data export, the system B feeds back to the system a according to an export request of the system C, the system a feeds back an authorization result to the system B according to preset permissions, the system B forwards to the system C to obtain authorization, the system B generates an identifier according to the export request and sends the identifier to the system C, so that when the system C exports the data, the system C carries out watermark and two-dimensional code identifier on an export data list, the watermark identifier displays brief information such as a data source (such as the system a), a data user (system C), a data export account number, an export time and the like, and detailed information such as the data owner, the data user, the data authorization use time, the data authorization export time, the data export time and the like is integrated in the two-dimensional code; if the corresponding export function in the C system is not authorized, the export function cannot be released to be online.
An embodiment of the present invention further provides a data link tracking and data updating apparatus, where the apparatus is configured to perform the data link tracking and data updating method according to any one of the foregoing embodiments.
It should be noted that, the working process of the data link tracking and data updating device may refer to the working process of the data link tracking and data updating method in the above embodiment, which is not described herein.
An embodiment of the present invention further provides a data management system, which includes a data user, a data owner, and a data link tracking and data updating device as described in the foregoing embodiments.
In one embodiment, the data link tracking and data updating device includes a code management module, a data management module, a function management module, and a task scheduling module, where the task scheduling module is configured to execute the data link tracking and data updating method according to any one of the foregoing embodiments;
the code management module is used for providing a development environment and storing the running codes of the data user and the data owner;
the data management module is used for storing field catalogues and application paths of the data tables of the data user and the data owner;
the function management module is used for storing and uniquely encoding the menus and functions of the data user and the data owner.
The data management system includes a data user, a data owner and a data link tracking and data updating device according to the above embodiment, and as shown in fig. 2, the data user includes a C system and a D system, the data owner includes an a system, and the data link tracking and data updating device is a B system. The system B is provided with a data management module, a function management module, a code management module and a task scheduling module.
The code management module provides a development environment and stores the running codes of the systems. After the new development code is tested and verified completely, the new development code is released to each system for deployment. For example, in the B-system code management module, the data providing codes are respectively developed for the data providing and the data using, the data providing codes are generated by the B-system according to the use number request of the data using party (such as the C-system) and are deployed in the a-system, so that the data provided by the a-system are subjected to API encapsulation, and the data of the a-system are forwarded to the data using party by using API technology. The code management module automatically detects available tables and fields, early warning prompt is carried out on the tables and fields in an unauthorized range, so that the tables and fields cannot be deployed correspondingly, for example, if the C system needs data export, the B system generates a use number function code and is deployed on the C system when the C system is determined to be allowed to execute data export operation, so that the C system carries out data export according to the use number function code, if the B system determines that the C system is not allowed to execute data export operation, the use number function code cannot be deployed on the C system, and the export function of the C system cannot be released online.
The data management module stores the data table, the field catalogue and the application path of each system, and can provide data copying and backup storage functions for accessed systems such as an A system, a C system and the like. The data management module performs unique coding on the applicable data tables and fields in each system, such as independent coding of the data tables, independent coding of the data fields (by establishing a field library and repeating the unified coding of the fields), and synchronizing coding information to a data source system, such as an A system shown in fig. 2, so that the A system realizes coding of the data tables and the fields.
The function management module stores menus and functions of the access service system and the like, respectively carries out unique codes on the system, the menus and the functions, and synchronizes the coded information to a data source system, such as an A system.
And the task scheduling module is responsible for instruction transmission and task allocation among multiple systems.
Compared with the prior art, the data link tracking and data updating method, the data link tracking and data updating device and the data management system provided by the embodiment of the invention are characterized in that firstly, the authority verification is carried out on a data user in response to a use number request of the data user; then, after the right verification is successful, the data owner is controlled to send the data corresponding to the number using request to the data user, and a data calling record is generated; wherein the data is stored in the data owner; and when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record so as to update the data at the corresponding data user according to the updated data. According to the embodiment of the invention, the data is transmitted and the data calling record is generated after the authority verification of the data user is successful, and the data calling record is utilized to update the corresponding data user when the data of the data owner is updated, so that the effective control of the data application is realized, the data safety is improved, and the defect of information lag of the data user is overcome.
The data link tracking and data updating apparatus, the data user and the data owner may be computing devices such as a desktop computer, a notebook computer, a palm computer and a cloud server, where the computing devices may include, but are not limited to, a processor, a memory, an input/output device, a network access device, a bus, and the like.
The processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like,
the memory may be used to store the computer program and/or modules, and the processor may implement various functions of the computing device by running or executing the computer program and/or modules stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the operation of the controller, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
Wherein the modules of the computing device integration, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), or the like.
While the foregoing is directed to the preferred embodiments of the present invention, it will be appreciated by those skilled in the art that changes and modifications may be made without departing from the principles of the invention, such changes and modifications are also intended to be within the scope of the invention.

Claims (10)

1. A method for data link tracking and data updating, comprising:
responding to a use number request of a data user, and performing authority verification on the data user;
after the right verification is successful, the data owner is controlled to send the data corresponding to the number use request to the data user, and a data call record is generated; wherein the data is stored in the data owner;
when the data stored by the data owner is updated, determining a data user corresponding to the updated data according to the data call record, and taking the data user as a target data user;
and sending the updated data to the target data user so as to enable the target data user to update the data.
2. The data link tracking and data updating method according to claim 1, wherein when the data stored by the data owner is updated, determining a data user corresponding to the updated data as a target data user according to the data call record; transmitting the updated data to the target data consumer so that the target data consumer can update the data, comprising:
inquiring the data call record according to the received update information, determining the ID of a data user corresponding to the update information as a target ID, and sending the target ID to the data owner; wherein the update information is information generated by the data owner according to the updated data;
and controlling the data owner to send updated data to the data user according to the target ID so as to enable the data user to update the data.
3. The data link tracking and data updating method of claim 1, wherein said authenticating the data consumer in response to the request for usage by the data consumer comprises:
responding to a use number request of a data user, and analyzing the use number request to obtain a target data source, a target use number range and a target use number destination;
inquiring a preset data calling authority table according to the target data source, the target use number range and the target use number so as to verify the authority of the data user; the data calling authority table records the permitted usage number of each data stored by the data owner.
4. The data link tracking and data updating method according to claim 3, wherein the data call authority table further records at least one of a time limit of use and a number of times of use allowed for each data stored by the data owner;
after the data calling record is generated, subtracting one from the corresponding available times in the data calling authority table according to the data calling record;
and if the current time exceeds the time limit of the use number or the available frequency is zero, deleting the corresponding permission record in the data calling permission table.
5. The method for tracking and updating data according to any one of claims 1 to 4, wherein after the right verification is successful, controlling the data owner to send the data corresponding to the usage request to the data user, and generating a data call record includes:
after the authority verification is successful, performing performance test on the data owner;
when the test result of the data owner is busy, determining an alternative list according to the data call record of the number request inquiry history; the candidate list is a historical data user who has acquired corresponding data;
the alternative bill is sent to the data owner so that the data owner can select a data substitute sender from the alternative bill according to a preset screening rule, the use number request is sent to the data substitute sender so that the data substitute sender can send corresponding data to the data user, and a data calling record is generated;
and when the test result of the data owner is not busy, controlling the data owner to send the data corresponding to the use number request to the data user, and generating a data call record.
6. The data link tracking and data updating method according to claim 5, wherein before sending the use request to the data proxy so that the data proxy sends the corresponding data to the data consumer, further comprising:
and when the test result of the data substitution sender is busy, removing the data substitution sender from the alternative list and resending the alternative list to the data owner so that the data owner selects a new data substitution sender until the test result of the data substitution sender is not busy or the test result of the data owner is not busy.
7. The data link tracking and data updating method according to claim 4, further comprising, after transmitting data to the data consumer:
transmitting a data export request of the data user to the data owner so that the data owner generates an authorization verification result according to the data export request;
when the authorization verification result is that authorization is obtained, generating an identifier according to the data export request and sending the identifier to the data consumer so as to enable the data exported by the data consumer to be attached with the identifier; the identification comprises a watermark identification and a two-dimensional code identification, wherein the watermark identification comprises brief information of a data source and node time, and the two-dimensional code identification comprises detailed information of the data source and the node time;
and when the authorization verification result is unauthorized, controlling the export function of the data user to be unable to be online.
8. A data link tracking and data updating apparatus for performing the data link tracking and data updating method according to any one of claims 1 to 7.
9. A data management system comprising a data consumer, a data owner and a data link tracking and data updating device according to claim 8.
10. The data management system according to claim 9, wherein the data link tracking and data updating device includes a code management module, a data management module, a function management module, and a task scheduling module, and the task scheduling module is configured to execute the data link tracking and data updating method according to any one of claims 1 to 7;
the code management module is used for providing a development environment and storing the running codes of the data user and the data owner;
the data management module is used for storing field catalogues and application paths of the data tables of the data user and the data owner;
the function management module is used for storing and uniquely encoding the menus and functions of the data user and the data owner.
CN202310551946.6A 2023-05-17 2023-05-17 Data link tracking and data updating method, device and data management system Active CN116305218B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310551946.6A CN116305218B (en) 2023-05-17 2023-05-17 Data link tracking and data updating method, device and data management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310551946.6A CN116305218B (en) 2023-05-17 2023-05-17 Data link tracking and data updating method, device and data management system

Publications (2)

Publication Number Publication Date
CN116305218A true CN116305218A (en) 2023-06-23
CN116305218B CN116305218B (en) 2023-08-11

Family

ID=86798121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310551946.6A Active CN116305218B (en) 2023-05-17 2023-05-17 Data link tracking and data updating method, device and data management system

Country Status (1)

Country Link
CN (1) CN116305218B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100272050A1 (en) * 2009-04-28 2010-10-28 Samsung Electronics Co., Ltd. Method and apparatus for managing user equipment history information in wireless communication network
CN103488948A (en) * 2013-09-17 2014-01-01 北京思特奇信息技术股份有限公司 Method and device for achieving data security of operation system
CN111949731A (en) * 2020-08-14 2020-11-17 厦门美图之家科技有限公司 Data synchronization method and device, electronic equipment and storage medium
WO2020248603A1 (en) * 2019-06-11 2020-12-17 创新先进技术有限公司 Blockchain-based virtual resource allocation method and device
CN112149080A (en) * 2020-11-24 2020-12-29 国网江苏省电力有限公司苏州供电分公司 Authorization information verification system and method
US20220107777A1 (en) * 2021-12-16 2022-04-07 Intel Corporation Content fidelity adjustment based on user interaction
CN114331441A (en) * 2021-01-26 2022-04-12 长威信息科技发展股份有限公司 Data tracing and circulating method and system based on network trust
CN114513373A (en) * 2022-04-20 2022-05-17 北京掌趣无限科技有限公司 Trusted data exchange method, device, system, electronic equipment and storage medium
CN115687374A (en) * 2021-07-30 2023-02-03 腾讯科技(深圳)有限公司 Data publishing method, device, storage medium and computer equipment
CN115758435A (en) * 2021-09-03 2023-03-07 国网冀北电力有限公司计量中心 External sharing security processing method for company marketing data and related equipment
CN115827778A (en) * 2022-11-17 2023-03-21 中国联合网络通信集团有限公司 Data acquisition method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100272050A1 (en) * 2009-04-28 2010-10-28 Samsung Electronics Co., Ltd. Method and apparatus for managing user equipment history information in wireless communication network
CN103488948A (en) * 2013-09-17 2014-01-01 北京思特奇信息技术股份有限公司 Method and device for achieving data security of operation system
WO2020248603A1 (en) * 2019-06-11 2020-12-17 创新先进技术有限公司 Blockchain-based virtual resource allocation method and device
CN111949731A (en) * 2020-08-14 2020-11-17 厦门美图之家科技有限公司 Data synchronization method and device, electronic equipment and storage medium
CN112149080A (en) * 2020-11-24 2020-12-29 国网江苏省电力有限公司苏州供电分公司 Authorization information verification system and method
CN114331441A (en) * 2021-01-26 2022-04-12 长威信息科技发展股份有限公司 Data tracing and circulating method and system based on network trust
CN115687374A (en) * 2021-07-30 2023-02-03 腾讯科技(深圳)有限公司 Data publishing method, device, storage medium and computer equipment
CN115758435A (en) * 2021-09-03 2023-03-07 国网冀北电力有限公司计量中心 External sharing security processing method for company marketing data and related equipment
US20220107777A1 (en) * 2021-12-16 2022-04-07 Intel Corporation Content fidelity adjustment based on user interaction
CN114513373A (en) * 2022-04-20 2022-05-17 北京掌趣无限科技有限公司 Trusted data exchange method, device, system, electronic equipment and storage medium
CN115827778A (en) * 2022-11-17 2023-03-21 中国联合网络通信集团有限公司 Data acquisition method and device, electronic equipment and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
SAAYAN MITRA 等: "A reliable buffered approach for measuring usage of web video", 《2014 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU)》, pages 40 - 45 *
TIANTIAN XU 等: "Optimization of Material Distribution Route Based on Green Logistics and Ant Colony Algorithm", 《2022 6TH INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROL (ISCSIC)》, pages 250 - 254 *
赵佳: "智慧协同网络资源动态适配机制研究", 《中国博士学位论文全文数据库信息科技辑》, no. 10, pages 139 - 1 *
陈甜妹: "基于区块链技术的招标采购新模式探索", 《企业管理》, no. 2, pages 68 - 69 *

Also Published As

Publication number Publication date
CN116305218B (en) 2023-08-11

Similar Documents

Publication Publication Date Title
JP7222036B2 (en) Model training system and method and storage medium
JP2022000757A5 (en)
CN108289098B (en) Authority management method and device of distributed file system, server and medium
US8484309B2 (en) Owner controlled access to shared data resource
US11876802B2 (en) Loading and unloading data at an external storage location
CN107948203A (en) A kind of container login method, application server, system and storage medium
CN110944046B (en) Control method of consensus mechanism and related equipment
JP6161827B2 (en) Preliminary authentication of client application accessing user account on content management system
CN110289965B (en) Application program service management method and device
CN102947797A (en) Online service access controls using scale out directory features
CN110765484A (en) Credit investigation data processing method and electronic equipment
CN111526111A (en) Control method, device and equipment for logging in light application and computer storage medium
CN111783050A (en) Role and authority control system of website user
CN111737232A (en) Database management method, system, device, equipment and computer storage medium
US20140007259A1 (en) Methods for governing the disclosure of restricted data
CN116305218B (en) Data link tracking and data updating method, device and data management system
CN116566656A (en) Resource access method, device, equipment and computer storage medium
CN110929269B (en) System authority management method, device, medium and electronic equipment
CN112800066A (en) Index management method, related device and storage medium
CN112311716A (en) Data access control method and device based on openstack and server
US11316949B2 (en) Access management to user related data
US11169864B2 (en) Systems, methods and computer program products for application environment synchronization between remote devices and on-premise devices
CN111131254B (en) File processing method, block chain node, block chain and storage medium
CN111767524B (en) Authority management method, device, system, server and medium
CN107133505B (en) Authority management method, authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant