CN116628640A - User data asset management method and device - Google Patents

User data asset management method and device Download PDF

Info

Publication number
CN116628640A
CN116628640A CN202310253681.1A CN202310253681A CN116628640A CN 116628640 A CN116628640 A CN 116628640A CN 202310253681 A CN202310253681 A CN 202310253681A CN 116628640 A CN116628640 A CN 116628640A
Authority
CN
China
Prior art keywords
user data
target user
software program
storage node
acquisition request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310253681.1A
Other languages
Chinese (zh)
Inventor
苏羽
顾费勇
曹崇瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN202310253681.1A priority Critical patent/CN116628640A/en
Publication of CN116628640A publication Critical patent/CN116628640A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The present disclosure provides a method and an apparatus for managing user data assets, wherein a storage node of the user data assets is managed by a user; the method comprises the following steps: acquiring a first acquisition request for target user data in the user data asset, which is sent by a first software program; responding to an authorization instruction for the first acquisition request, and obtaining authorization information; and acquiring the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program. By the method and the device, the possession and control of the user on the user data asset are realized, and the safety and privacy of the user data are improved.

Description

User data asset management method and device
Technical Field
The present disclosure relates to the field of electronic computer technologies, and in particular, to a method and an apparatus for managing user data assets.
Background
This section is intended to provide a background or context to the embodiments of the disclosure recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
The software program is implemented to run based on program logic and program data to provide services to the user. The program data comprises user data, namely user data uploaded by a user actively and user data generated by running a software program.
However, in general, user data, particularly user data resulting from the running of a software program, is managed by a service provider of the software program, and the user cannot manage this portion of user data.
Disclosure of Invention
Accordingly, an objective of the present disclosure is to provide a method and an apparatus for managing user data assets, which at least solve one of the technical problems in the related art to a certain extent.
In view of the above, a first aspect of exemplary embodiments of the present disclosure provides a method of managing user data assets, storage nodes of the user data assets being managed by a user; the method comprises the following steps:
acquiring a first acquisition request for target user data in the user data asset, which is sent by a first software program;
responding to an authorization instruction for the first acquisition request, and obtaining authorization information;
and acquiring the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program.
Based on the same inventive concept, a second aspect of exemplary embodiments of the present disclosure provides a management apparatus of a user data asset, a storage node of the user data asset being managed by a user; the device comprises:
a request information acquisition module configured to acquire a first acquisition request for target user data in the user data asset sent by a first software program;
an authorization information acquisition module configured to obtain authorization information in response to an authorization instruction for the first acquisition request;
and a data information acquisition module configured to acquire the target user data from a storage node of the user data asset according to the authorization information and to send the target user data to the first software program.
Based on the same inventive concept, a third aspect of exemplary embodiments of the present disclosure provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method according to the first aspect when executing the program.
Based on the same inventive concept, a fourth aspect of the exemplary embodiments of the present disclosure provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method according to the first aspect.
Based on the same inventive concept, a fifth aspect of exemplary embodiments of the present disclosure provides a computer program product comprising computer program instructions which, when run on a computer, cause the computer to perform the method as described in the first aspect.
From the above, it can be seen that the method and apparatus for managing user data assets provided in the embodiments of the present disclosure, where a storage node of the user data assets is managed by a user; the method comprises the following steps: acquiring a first acquisition request for target user data in the user data asset, which is sent by a first software program; responding to an authorization instruction for the first acquisition request, and obtaining authorization information; and acquiring the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program. By the method and the device, the possession and control of the user on the user data asset are realized, and the safety and privacy of the user data are improved.
Drawings
In order to more clearly illustrate the technical solutions of the present disclosure or related art, the drawings required for the embodiments or related art description will be briefly described below, and it is apparent that the drawings in the following description are only embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to those of ordinary skill in the art.
FIG. 1 is a flow chart of a method for managing user data assets provided by an embodiment of the present disclosure;
FIG. 2 is a schematic illustration of a graphical user interface provided by an embodiment of the present disclosure;
FIG. 3 is another schematic illustration of a graphical user interface provided by an embodiment of the present disclosure;
FIG. 4 is another flow chart of a method of managing user data assets provided by an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of a configuration of a user data asset management device according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
For purposes of making the objects, technical solutions, and advantages of the present disclosure more apparent, the principle and spirit of the present disclosure will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are presented merely to enable one skilled in the art to better understand and practice the present disclosure and are not intended to limit the scope of the present disclosure in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In this document, it should be understood that any number of elements in the drawings is for illustration and not limitation, and that any naming is used only for distinction and not for any limitation.
The principles and spirit of the present disclosure are explained in detail below with reference to several representative embodiments thereof.
In the related art, a software program is implemented to run based on program logic and program data to provide services to users. The program data comprises user data, namely user data uploaded by a user actively and user data generated by running a software program.
However, the inventors of the present disclosure have found that, in general, user data, particularly user data resulting from the running of a software program, is owned and controlled by the service provider of the software program, and that users cannot manage this portion of user data. For example, a user performs physical exercise and health monitoring using a first software program, and during the use of the first software program, a series of data is generated regarding the physical constitution and health of the user; however, when the user wants to perform physical exercise and health monitoring using the second software program, it is impossible to transfer user data generated during the use of the first software program to the second software program, and the user can only discard his own history data. As described above for example, which is common in current program software, users cannot own and control their own user data.
In order to solve the above-mentioned problems, the present disclosure provides a management scheme for user data assets, which specifically includes: acquiring a first acquisition request for target user data in the user data asset, which is sent by a first software program; responding to an authorization instruction for the first acquisition request, and obtaining authorization information; and acquiring the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program. Wherein the storage nodes of the user data assets are managed by a user. In the present disclosure, the software program provides program logic, and the user keeps and provides program data, which realizes the possession and control of the user to the user data asset, and improves the security and privacy of the user data.
Having described the basic principles of the present disclosure, various non-limiting embodiments of the present disclosure are specifically described below.
In the management method of the user data assets provided by the present disclosure, the storage nodes of the user data assets are managed by users, namely, the user data assets are owned and controlled by users, and are not owned and controlled by service providers of software programs as in the prior art.
In some example embodiments, the storage nodes of the user data asset include at least one of a local storage node, a cloud storage node, a blockchain storage node, an interplanetary file system (InterPlanetary File System, IPFS), or other storage device capable of performing the above functions.
Among the advantages of using a local storage node to store user data assets are: the security and privacy of the user data are high, the user can completely master the authority of the user data for reading and storing and the like, the speed of the user data transmission and reading is higher, and the delay is lower.
The adoption of the cloud storage node for storing the user data asset has the advantages that: the user data is more expandable and less costly than solutions employing local storage nodes.
The advantage of using a blockchain storage node or interstellar file system to store user data assets is that: the user data can be effectively prevented from being tampered by decentralization, and the security is high; the distributed storage can effectively avoid single-point faults.
In some exemplary embodiments, user data is stored in a data structure of a tree structure directory (multi-level directory) in a storage node.
The user data with different data types correspond to different storage addresses in the storage node.
Alternatively, the data type of the user data may be divided according to the data content, including, for example, traffic data, health data, shopping data, schedule data, and the like.
Alternatively, the data type of the user data may be divided according to a data format, for example, including text data, audio data, image data, video data, and the like.
Referring to fig. 1, a method of managing user data assets, comprising the steps of:
step S110, acquiring a first acquisition request sent by a first software program for target user data in the user data asset.
Wherein, the user realizes the management of the user data assets through the terminal.
In some exemplary embodiments, the terminal includes, but is not limited to, a desktop computer, a mobile phone, a mobile computer, a tablet computer, a media player, a smart wearable device, a personal digital assistant (personal digital assistant, PDA) or other electronic device capable of performing the above functions, and the like.
The client side of the software program is installed in the terminal, and program logic is provided through the client side of the software program.
In some exemplary embodiments, the software program is restricted from uploading user data by specifying a protocol, i.e., the software program can only run locally, processing the acquired user data, and not uploading the acquired user data and the data resulting from processing the user data to a database of the software program. In this disclosure, software programs are used only to provide program logic, and are not capable of owning and controlling user data.
Wherein when the software program needs to obtain user data in the user data asset, a request needs to be sent to the user.
Referring to fig. 2, in some exemplary embodiments, a graphical user interface is provided by a terminal;
after the first acquisition request sent by the first software program for the target user data in the user data asset is acquired, the method further includes:
generating a message popup according to the first acquisition request;
and controlling the graphical user interface to display the message popup window.
The request message can be displayed to the user in a message popup mode.
In some exemplary embodiments, the message popup includes at least a name of the first software program and a name of the target user data.
Optionally, the message popup window further includes the purpose of target user data.
And step S120, obtaining authorization information in response to the authorization instruction for the first acquisition request.
In some exemplary embodiments, an agreement control for characterizing an agreement authorization is included in the message popup;
the method further comprises the steps of:
and responding to the triggering operation of the user on the consent control, and generating the authorization instruction for the first acquisition request.
In some exemplary embodiments, a reject control for characterizing reject authorization is included in the message popup;
the method further comprises the steps of:
and responding to the triggering operation of the user on the rejection control, and stopping the current flow.
In some exemplary embodiments, a signature control for signing is also included in the message popup;
the method further comprises the steps of:
and generating the authorization instruction for the first acquisition request in response to the triggering operation of the user for the consent control and the signature control.
Optionally, in response to a triggering operation of the user on the consent control, controlling the graphical user interface to display the signature control.
In some exemplary embodiments, the triggering operation for the signature control includes at least one of a handwritten signature and a digital signature.
Referring to fig. 3, optionally, different signature controls are provided corresponding to different triggering operations. Providing a handwritten signature input text box corresponding to the handwritten signature; corresponding to the digital signature, a digital signature input text box is provided.
In some exemplary embodiments, a preconfigured software program whitelist and/or a user data whitelist is obtained; and responding to the software program which sends the request for acquiring the user data as the software program in the software program white list, or automatically submitting the digital signature for realizing the noninductive operation by requesting the targeted user data as the user data in the user data white list, thereby facilitating the user.
In some exemplary embodiments, the authorization information includes user signature information.
In some exemplary embodiments, the authorization information further includes an identity of the software program and an identity of the target user data.
In some exemplary embodiments, the authorization information further includes a time stamp.
Optionally, the time stamp includes a time stamp of the user triggering the consent control and a time stamp of the user triggering the signature control.
The use time of the authorization information can be limited through the time stamp, so that abuse of the authorization information is avoided.
Step S130, obtaining the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program.
In some exemplary embodiments, the authorization information includes an identity of the target user data; the obtaining the target user data from the storage node of the user data asset according to the authorization information and sending the target user data to the first software program comprises:
inquiring a storage address of the target user data in a storage node of the user data asset according to the identity of the target user data;
acquiring the target user data from the storage address;
and sending the target user data to the first software program.
Optionally, a pre-built comparison table or mapping table representing the corresponding relation between the identity of the user data and the storage address is obtained; and inquiring the storage address of the target user data in the storage node of the user data asset according to the identity of the target user data based on the comparison table or the mapping table.
In some exemplary embodiments, after the obtaining the target user data from the storage node of the user data asset according to the authorization information and sending the target user data to the first software program, the method further comprises:
acquiring updated target user data sent by the first software program; wherein the updated target user data is obtained by processing the target user data by program logic in the first software program;
storing the updated target user data to a storage node of the user data asset.
The software program can operate based on the program logic provided by the software program itself and the user data obtained through user authorization to obtain updated user data, and based on the limitation described in the foregoing embodiment, the software program can not send the obtained user data and the updated user data to a database provided by a server of the software program, and can only send the obtained user data and the updated user data to the database provided by the user, so as to update and maintain the data in the user database, thereby realizing the user to own and control the user data asset and avoiding the user data from being owned and controlled by the server of the software program.
In some exemplary embodiments, after the storing the updated target user data to the storage node of the user data asset, the method further comprises:
acquiring a second acquisition request for target user data in the user data asset, which is sent by a second software program;
responding to an authorization instruction for the second acquisition request to obtain authorization information;
and acquiring the updated target user data from the storage node of the user data asset according to the authorization information, and sending the updated target user data to the second software program.
For different software programs, user data are acquired from the storage nodes of the user data assets, so that the situation that one software program can not acquire and utilize the user data obtained by processing is avoided, and the user is enabled to own and control the user data assets.
As can be seen from the foregoing, the method for managing user data assets provided by the embodiments of the present disclosure, wherein a storage node of the user data assets is managed by a user; the method comprises the following steps: acquiring a first acquisition request for target user data in the user data asset, which is sent by a first software program; responding to an authorization instruction for the first acquisition request, and obtaining authorization information; and acquiring the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program. By the method and the device, the possession and control of the user on the user data asset are realized, and the safety and privacy of the user data are improved.
Referring to fig. 4, a method of managing user data assets, comprising the steps of:
step S410, acquiring a first acquisition request sent by a first software program for target user data in the user data asset.
Wherein the storage node of the user data asset is managed by a user;
in some exemplary embodiments, a storage node for a user data asset includes:
at least one of a local storage node, a cloud storage node, a blockchain storage node, and an interstellar file system.
In some exemplary embodiments, a graphical user interface is provided by a terminal;
after the first acquisition request sent by the first software program for the target user data in the user data asset is acquired, the method further includes:
generating a message popup according to the first acquisition request;
and controlling the graphical user interface to display the message popup window.
Step S420, obtaining authorization information in response to the authorization instruction for the first acquisition request.
In some exemplary embodiments, an agreement control for characterizing an agreement authorization is included in the message popup;
the method further comprises the steps of:
and responding to the triggering operation of the user on the consent control, and generating the authorization instruction for the first acquisition request.
In some exemplary embodiments, a signature control for signing is also included in the message popup;
the method further comprises the steps of:
and generating the authorization instruction for the first acquisition request in response to the triggering operation of the user for the consent control and the signature control.
Step S430, obtaining the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program.
In some exemplary embodiments, the authorization information includes an identity of the target user data;
the obtaining the target user data from the storage node of the user data asset according to the authorization information and sending the target user data to the first software program comprises:
inquiring a storage address of the target user data in a storage node of the user data asset according to the identity of the target user data;
acquiring the target user data from the storage address;
and sending the target user data to the first software program.
Step S440, obtaining updated target user data sent by the first software program; wherein the updated target user data is obtained by processing the target user data by program logic in the first software program.
In some of the exemplary embodiments of the present invention,
step S450, storing the updated target user data to a storage node of the user data asset.
The software program can operate based on the program logic provided by the software program itself and the user data obtained through user authorization to obtain updated user data, and based on the limitation described in the foregoing embodiment, the software program can not send the obtained user data and the updated user data to a database provided by a server of the software program, and can only send the obtained user data and the updated user data to the database provided by the user, so as to update and maintain the data in the user database, thereby realizing the user to own and control the user data asset and avoiding the user data from being owned and controlled by the server of the software program.
Step S460, obtaining a second obtaining request sent by a second software program for the target user data in the user data asset.
In some exemplary embodiments, after the acquiring the second acquisition request for the target user data in the user data asset sent by the second software program, the method further comprises:
generating a message popup according to the second acquisition request;
and controlling the graphical user interface to display the message popup window.
Step S470, obtaining authorization information in response to the authorization instruction for the second acquisition request.
In some exemplary embodiments, an agreement control for characterizing an agreement authorization is included in the message popup;
the method further comprises the steps of:
and responding to the triggering operation of the user on the consent control, and generating the authorization instruction for the second acquisition request.
In some exemplary embodiments, a signature control for signing is also included in the message popup;
the method further comprises the steps of:
and generating the authorization instruction for the second acquisition request in response to the triggering operation of the user for the consent control and the signature control.
Step S480, obtaining the updated target user data from the storage node of the user data asset according to the authorization information, and sending the updated target user data to the second software program.
In some exemplary embodiments, the authorization information includes an identity of the target user data;
the obtaining the updated target user data from the storage node of the user data asset according to the authorization information and sending the updated target user data to the second software program, comprising:
inquiring a storage address of the target user data in a storage node of the user data asset according to the identity of the target user data;
acquiring the updated target user data from the storage address;
and sending the updated target user data to the second software program.
According to the method and the device, the user data are acquired from the storage nodes of the user data assets for different software programs, so that the user data obtained by processing one software program can be acquired and utilized by the other software program, and the user can own and control the user data assets.
It should be noted that the method of the embodiments of the present disclosure may be performed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene, and is completed by mutually matching a plurality of devices. In the case of such a distributed scenario, one of the devices may perform only one or more steps of the methods of embodiments of the present disclosure, the devices interacting with each other to accomplish the methods.
It should be noted that the foregoing describes some embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
Based on the same inventive concept, the present disclosure also provides a management apparatus for user data assets, corresponding to the method of any embodiment described above.
In the management device for user data assets provided by the disclosure, a storage node of the user data assets is managed by a user.
Referring to fig. 5, a management apparatus of user data assets, comprising:
a request information acquisition module 510 configured to acquire a first acquisition request for target user data in the user data asset sent by a first software program;
an authorization information acquisition module 520 configured to obtain authorization information in response to an authorization instruction for the first acquisition request;
a data information acquisition module 530 configured to acquire the target user data from the storage node of the user data asset according to the authorization information and to send the target user data to the first software program.
In some exemplary embodiments, a graphical user interface is provided by a terminal; the request information acquisition module 510 is further configured to:
generating a message popup according to the first acquisition request;
and controlling the graphical user interface to display the message popup window.
In some exemplary embodiments, an agreement control for characterizing an agreement authorization is included in the message popup; the authorization information acquisition module 520 is further configured to:
and responding to the triggering operation of the user on the consent control, and generating the authorization instruction for the first acquisition request.
In some exemplary embodiments, a signature control for signing is also included in the message popup; the authorization information acquisition module 520 is configured to:
and generating the authorization instruction for the first acquisition request in response to the triggering operation of the user for the consent control and the signature control.
In some exemplary embodiments, the user data asset management apparatus is further configured to:
acquiring updated target user data sent by the first software program; wherein the updated target user data is obtained by processing the target user data by program logic in the first software program;
storing the updated target user data to a storage node of the user data asset.
In some exemplary embodiments, the user data asset management apparatus is further configured to:
acquiring a second acquisition request for target user data in the user data asset, which is sent by a second software program;
responding to an authorization instruction for the second acquisition request to obtain authorization information;
and acquiring the updated target user data from the storage node of the user data asset according to the authorization information, and sending the updated target user data to the second software program.
In some exemplary embodiments, the authorization information includes an identity of the target user data; the data information acquisition module 530 is specifically configured to:
inquiring a storage address of the target user data in a storage node of the user data asset according to the identity of the target user data;
acquiring the target user data from the storage address;
and sending the target user data to the first software program.
In some exemplary embodiments, the storage node of the user data asset comprises:
at least one of a local storage node, a cloud storage node, a blockchain storage node, and an interstellar file system.
For convenience of description, the above devices are described as being functionally divided into various modules, respectively. Of course, the functions of the various modules may be implemented in the same one or more pieces of software and/or hardware when implementing the present disclosure.
The device of the foregoing embodiment is configured to implement the corresponding method for managing user data assets in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which is not described herein.
Based on the same inventive concept, the present disclosure also provides an electronic device corresponding to the method of any embodiment, including a memory, a processor, and a computer program stored on the memory and capable of running on the processor, where the processor implements the method of managing user data assets according to any embodiment when executing the program.
Fig. 6 shows a more specific hardware architecture of an electronic device according to this embodiment, where the device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 implement communication connections therebetween within the device via a bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit ), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc. for executing relevant programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory ), static storage device, dynamic storage device, or the like. Memory 1020 may store an operating system and other application programs, and when the embodiments of the present specification are implemented in software or firmware, the associated program code is stored in memory 1020 and executed by processor 1010.
The input/output interface 1030 is used to connect with an input/output module for inputting and outputting information. The input/output module may be configured as a component in a device (not shown in the figure) or may be external to the device to provide corresponding functionality. Wherein the input devices may include a keyboard, mouse, touch screen, microphone, various types of sensors, etc., and the output devices may include a display, speaker, vibrator, indicator lights, etc.
Communication interface 1040 is used to connect communication modules (not shown) to enable communication interactions of the present device with other devices. The communication module may implement communication through a wired manner (such as USB, network cable, etc.), or may implement communication through a wireless manner (such as mobile network, WIFI, bluetooth, etc.).
Bus 1050 includes a path for transferring information between components of the device (e.g., processor 1010, memory 1020, input/output interface 1030, and communication interface 1040).
It should be noted that although the above-described device only shows processor 1010, memory 1020, input/output interface 1030, communication interface 1040, and bus 1050, in an implementation, the device may include other components necessary to achieve proper operation. Furthermore, it will be understood by those skilled in the art that the above-described apparatus may include only the components necessary to implement the embodiments of the present description, and not all the components shown in the drawings.
The electronic device of the foregoing embodiment is configured to implement the corresponding method for managing user data assets in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which is not described herein.
Based on the same inventive concept, corresponding to any of the above-described embodiment methods, the present disclosure also provides a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the user data asset management method according to any of the above-described embodiments.
The non-transitory computer readable storage media described above can be any available media or data storage device that can be accessed by a computer, including, but not limited to, magnetic storage (e.g., floppy disks, hard disks, magnetic tapes, magneto-optical disks (MOs), etc.), optical storage (e.g., CD, DVD, BD, HVD, etc.), and semiconductor storage (e.g., ROM, EPROM, EEPROM, nonvolatile storage (NAND FLASH), solid State Disk (SSD)), etc.
The storage medium of the above embodiments stores computer instructions for causing the computer to perform the method for managing user data assets according to any one of the above exemplary method portions, and has the advantages of the corresponding method embodiments, which are not described herein.
Those skilled in the art will appreciate that embodiments of the present disclosure may be implemented as a system, method, or computer program product. Accordingly, the present disclosure may be embodied in the following forms, namely: all hardware, all software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software, is generally referred to herein as a "circuit," module, "or" system. Furthermore, in some embodiments, the present disclosure may also be embodied in the form of a computer program product in one or more computer-readable media, which contain computer-readable program code.
Any combination of one or more computer readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive example) of the computer-readable storage medium could include, for example: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer, for example, through the internet using an internet service provider.
It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Furthermore, although the operations of the methods of the present disclosure are depicted in the drawings in a particular order, this is not required to or suggested that these operations must be performed in this particular order or that all of the illustrated operations must be performed in order to achieve desirable results. Rather, the steps depicted in the flowcharts may change the order of execution. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform.
It should be noted that unless otherwise defined, technical or scientific terms used in the embodiments of the present disclosure should be given the ordinary meaning as understood by one of ordinary skill in the art to which the present disclosure pertains. The terms "first," "second," and the like, as used in embodiments of the present disclosure, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that elements or items preceding the word are included in the element or item listed after the word and equivalents thereof, but does not exclude other elements or items. The terms "connected" or "connected," and the like, are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", etc. are used merely to indicate relative positional relationships, which may also be changed when the absolute position of the object to be described is changed. The article "a" or "an" preceding an element does not exclude the presence of a plurality of such elements.
While the spirit and principles of the present disclosure have been described with reference to several particular embodiments, it is to be understood that this disclosure is not limited to the particular embodiments disclosed nor does it imply that features in these aspects are not to be combined to benefit from this division, which is done for convenience of description only. The disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures and functions.

Claims (12)

1. A method of managing user data assets, wherein storage nodes of the user data assets are managed by a user; the method comprises the following steps:
acquiring a first acquisition request for target user data in the user data asset, which is sent by a first software program;
responding to an authorization instruction for the first acquisition request, and obtaining authorization information;
and acquiring the target user data from the storage node of the user data asset according to the authorization information, and sending the target user data to the first software program.
2. The method of claim 1, wherein the graphical user interface is provided by a terminal;
after the first acquisition request sent by the first software program for the target user data in the user data asset is acquired, the method further includes:
generating a message popup according to the first acquisition request;
and controlling the graphical user interface to display the message popup window.
3. The method of claim 2, wherein the message popup includes an consent control for characterizing consent grants;
the method further comprises the steps of:
and responding to the triggering operation of the user on the consent control, and generating the authorization instruction for the first acquisition request.
4. The method of claim 3, wherein the message popup also includes a signature control for signing;
the method further comprises the steps of:
and generating the authorization instruction for the first acquisition request in response to the triggering operation of the user for the consent control and the signature control.
5. The method of claim 1, wherein after the obtaining the target user data from the storage node of the user data asset based on the authorization information and sending the target user data to the first software program, the method further comprises:
acquiring updated target user data sent by the first software program; wherein the updated target user data is obtained by processing the target user data by program logic in the first software program;
storing the updated target user data to a storage node of the user data asset.
6. The method of claim 5, wherein after storing the updated target user data to the storage node of the user data asset, the method further comprises:
acquiring a second acquisition request for target user data in the user data asset, which is sent by a second software program;
responding to an authorization instruction for the second acquisition request to obtain authorization information;
and acquiring the updated target user data from the storage node of the user data asset according to the authorization information, and sending the updated target user data to the second software program.
7. The method according to claim 1, wherein the authorization information includes an identity of the target user data;
the obtaining the target user data from the storage node of the user data asset according to the authorization information and sending the target user data to the first software program comprises:
inquiring a storage address of the target user data in a storage node of the user data asset according to the identity of the target user data;
acquiring the target user data from the storage address;
and sending the target user data to the first software program.
8. The method of claim 1, wherein the storage node of the user data asset comprises:
at least one of a local storage node, a cloud storage node, a blockchain storage node, and an interstellar file system.
9. A management apparatus for user data assets, wherein storage nodes of said user data assets are managed by a user; the device comprises:
a request information acquisition module configured to acquire a first acquisition request for target user data in the user data asset sent by a first software program;
an authorization information acquisition module configured to obtain authorization information in response to an authorization instruction for the first acquisition request;
and a data information acquisition module configured to acquire the target user data from a storage node of the user data asset according to the authorization information and to send the target user data to the first software program.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 8 when the program is executed.
11. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1 to 8.
12. A computer program product comprising computer program instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 8.
CN202310253681.1A 2023-03-09 2023-03-09 User data asset management method and device Pending CN116628640A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310253681.1A CN116628640A (en) 2023-03-09 2023-03-09 User data asset management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310253681.1A CN116628640A (en) 2023-03-09 2023-03-09 User data asset management method and device

Publications (1)

Publication Number Publication Date
CN116628640A true CN116628640A (en) 2023-08-22

Family

ID=87590878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310253681.1A Pending CN116628640A (en) 2023-03-09 2023-03-09 User data asset management method and device

Country Status (1)

Country Link
CN (1) CN116628640A (en)

Similar Documents

Publication Publication Date Title
US11652821B2 (en) One step security system in a network storage system
JP7351907B2 (en) Online document sharing methods, devices, electronic devices and storage media
US10606881B2 (en) Sharing container images between mulitple hosts through container orchestration
US9760723B2 (en) Techniques for in-app user data authorization
US9716720B2 (en) Unregistered user account generation for content item sharing
CN104572278B (en) The method, device and equipment of light application calling local side ability
CN111133461A (en) Block chain enabled crowdsourcing
US20140195663A1 (en) Method and System for Providing Cloud-Based Common Distribution Applications
US9712622B2 (en) Techniques to manage state information for a web service
CN107209678B (en) System and method for adaptive cloning of mobile devices
US10902851B2 (en) Relaying voice commands between artificial intelligence (AI) voice response systems
US20220366066A1 (en) Display method, display device, and electronic device
KR102245358B1 (en) Techniques to transform network resource requests to zero rated network requests
US9886572B2 (en) Lie vault
CN114885024B (en) Routing method, device, equipment and medium of application instance
CN116628640A (en) User data asset management method and device
CN112632016A (en) File editing method and device
CN113641966B (en) Application integration method, system, equipment and medium
KR102166211B1 (en) Messenger service system, method and apparatus for messenger user authentication in the system
US11074223B2 (en) Orphaned content remediation
KR20220069771A (en) Electronic device and method for controlling thereof
CN116455652A (en) Processing method, device, equipment and medium based on authentication routing rule
CN114185811A (en) Test method, test device, storage medium and electronic equipment
CN117459484A (en) Message group processing method and related equipment
CN116795339A (en) Service interface generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination