CN117668102A - Private data synchronization method, system and computer equipment - Google Patents

Private data synchronization method, system and computer equipment Download PDF

Info

Publication number
CN117668102A
CN117668102A CN202211062785.6A CN202211062785A CN117668102A CN 117668102 A CN117668102 A CN 117668102A CN 202211062785 A CN202211062785 A CN 202211062785A CN 117668102 A CN117668102 A CN 117668102A
Authority
CN
China
Prior art keywords
data
privacy
privacy management
database modeling
indication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211062785.6A
Other languages
Chinese (zh)
Inventor
凌云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Cloud Computing Technologies Co Ltd
Original Assignee
Huawei Cloud Computing Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Cloud Computing Technologies Co Ltd filed Critical Huawei Cloud Computing Technologies Co Ltd
Priority to CN202211062785.6A priority Critical patent/CN117668102A/en
Publication of CN117668102A publication Critical patent/CN117668102A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a privacy data synchronization method, a privacy data synchronization system and computer equipment, which are applied to the field of database modeling. The method comprises the steps that a database modeling system acquires a data list; the method comprises the steps that a database modeling system obtains privacy indication information, wherein the privacy indication information is used for indicating that target data is privacy data, and the target data is data in a data list; the database modeling system sends the privacy indication information to the privacy management system; and the database modeling system performs database modeling according to the modeling instruction of the developer and the data list. In the method, after the database modeling system acquires the data list, the database modeling system can not only perform database modeling according to the data list, but also receive privacy indication information input by a developer and synchronize the privacy indication information to the privacy management system, so that the problem that the developer needs to operate both the database modeling system and the privacy management system in the data modeling process is avoided, and the problem that the privacy management of data is ignored due to complex operation is reduced.

Description

Private data synchronization method, system and computer equipment
Technical Field
The present disclosure relates to the field of database modeling, and in particular, to a method, a system, and a computer device for synchronizing private data.
Background
With the increase of the events and the expansion of the influence of network attacks, the security related tools and specifications are more complete, but the privacy data management is still a matter which is easy to be missed by software practitioners, and even part of enterprises can obtain and reveal the privacy data of users intentionally.
In the aspect of privacy design, a general and universal software engineering method is difficult to form, and the main reason is that the tool chain related to privacy design is incomplete, and the existing tools are not intuitive and easy to use. In the process of designing and developing application software, more frequent functions and data changes exist frequently, and database changes are frequent. Every time data is changed, a developer/System Engineer (SE) is required to synchronously change the data in the privacy management system, so that the automatic requirements on the developer are high, if the developer forgets to update the data in the privacy management system, the data in the privacy management system is inaccurate, and the privacy management system cannot manage the updated privacy data.
Thus, privacy data management is still a weak loop in software system development.
Disclosure of Invention
The embodiment of the application provides a private data synchronization method, a private data synchronization system and computer equipment, which are used for simplifying the operation of managing private data by developers, so that the security of the private data is improved.
In a first aspect, an embodiment of the present application provides a method for synchronizing private data, where the method includes: the database modeling system acquires a data list, wherein the data list comprises one or more items of data; the database modeling system acquires privacy indication information, wherein the privacy indication information is used for indicating that target data is privacy data, and the target data is data in the data list; the database modeling system sends the privacy indication information to a privacy management system; and the database modeling system performs database modeling according to the modeling instruction of the developer and the data list.
In the traditional software development process, a developer inputs a data list in a privacy management system and synchronizes the data list into a database modeling system, and then the developer needs to perform database modeling through the database modeling system and set which data are privacy data in the privacy management system so that the privacy management system performs privacy management on the privacy data. By adopting the method provided by the embodiment of the application, after the database modeling system acquires the data list, a developer can not only perform database modeling according to the data list in the database modeling system, but also input privacy indication information of private data in the database modeling system, and then the database modeling system synchronizes the privacy indication information to the privacy management system, so that the situation that the developer needs to operate the database modeling system and the privacy management system in the data modeling process is avoided, and the problem that the privacy management of the data is ignored due to complex operation is reduced.
In one possible implementation, the method further includes: the database modeling system acquires a privacy management strategy of the target data; the database modeling system sends the privacy management policy to the privacy management system. In the implementation manner, the developer not only can input the privacy indication information in the database modeling system, but also can further indicate the privacy management policy, so that more comprehensive and personalized management of the privacy data is realized, and the developer does not need to operate in the privacy management system, namely, the operation of the developer is simplified, and meanwhile, more comprehensive privacy management is realized.
In one possible implementation, the method further includes: and the database modeling system tests whether the target data meets the privacy management policy according to the test indication information of the developer. After development is completed, a developer often needs to test the developed software, so as to discover problems in the software in time. In the method, a developer can also test the privacy management and detect whether the privacy data meets the privacy management policy, so that the security of the privacy data is further ensured. The testing process can be directly carried out in a database modeling system, and a developer can realize the testing process without switching the system.
In one possible implementation, the database modeling system obtains a privacy management policy of the target data, including: the database modeling system displays candidate privacy management policies; the candidate privacy management policies are preconfigured in the database modeling system; and the database modeling system acquires a privacy management policy selected by a developer from the displayed candidate privacy management policies as the privacy management policy of the target data. In the implementation mode, the developer can select the required privacy management strategy from the database modeling system, so that the operation flow of the developer is further simplified.
In one possible implementation, the database modeling system obtains a data list, including: the database modeling system obtains a data manifest from the privacy management system. At present, the development of the privacy management system is perfect, and software developers are used to record a data list in the privacy management system. When a developer has entered a data manifest in the privacy management system, the database modeling system may obtain the data manifest from the privacy management system.
In one possible implementation, the database modeling system obtains privacy indication information, including: the database modeling system displays options that the target data is private data; and when the option is selected by a developer, the database modeling system determines privacy indication information of the acquired target data. The method is more convenient for a developer to operate, and privacy indication information is input into the database modeling system through a selection method.
In a second aspect, embodiments of the present application provide a private data synchronization system, the system including: the system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring a data list and privacy indication information, the data list comprises one or more items of data, the privacy indication information is used for indicating that target data is privacy data, and the target data is data in the data list; the sending module is used for sending the privacy indication information to a privacy management system; and the modeling module is used for carrying out database modeling according to the modeling instruction of the developer and the data list.
In one possible implementation, the obtaining module is further configured to: acquiring a privacy management policy of the target data; the sending module is further configured to: and sending the privacy management policy to the privacy management system.
In one possible implementation, the system further includes: and the test module is used for testing whether the target data meets the privacy management policy according to the test indication information of the developer.
In one possible implementation manner, the obtaining module is specifically configured to, when obtaining the privacy management policy of the target data: displaying candidate privacy management policies; the candidate privacy management policies are preconfigured in the database modeling system; and acquiring a privacy management policy selected by a developer from the displayed candidate privacy management policies as the privacy management policy of the target data.
In one possible implementation manner, the acquiring module is specifically configured to, when acquiring the data list: a data manifest is obtained from the privacy management system.
In one possible implementation manner, the obtaining module is specifically configured to, when obtaining the privacy indication information: displaying the option that the target data is private data; and when the developer selects the option, determining privacy indication information of the acquired target data.
In a third aspect, embodiments of the present application provide a computer device comprising a memory and a processor; the memory stores a computer program; the processor is configured to invoke a computer program stored in the memory to perform the method according to the first aspect and any implementation manner of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer device comprising a processor; the processor is configured to invoke a computer program stored in a memory to perform the method according to the first aspect and any implementation of the first aspect. In the alternative, both the processor and the memory may be located in the computer device. Alternatively, the memory may be located external to the computer device. Provided that the processor and the memory are coupled or capable of information transfer.
In a fifth aspect, embodiments of the present application provide a computer-readable storage medium having instructions stored therein, which when run on a computer, cause the computer to perform the method according to any one of the first aspect and the implementation manner of the first aspect.
In a sixth aspect, embodiments of the present application provide a cluster of computing devices, comprising at least one computing device, each computing device comprising a processor and a memory; the processor of the at least one computing device is configured to execute instructions stored in the memory of the at least one computing device to cause the cluster of computing devices to perform the method of any one of the first aspect and the first aspect.
In a seventh aspect, embodiments of the present application provide a computer program product comprising instructions which, when executed by a computing device or cluster of computing devices, cause the computing device or cluster of computing devices to perform the method of any of the first aspect and the first aspect.
The technical effects that may be achieved by any one of the possible implementation manners of the second aspect to the seventh aspect are referred to for a description of the technical effects that may be achieved by the corresponding implementation manner of the first aspect, and the descriptions are omitted here.
Drawings
Fig. 1 is a flow chart of a private data synchronization method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a private data option provided in an embodiment of the present application;
FIG. 3 is a schematic diagram of a developer operation flow provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a private data synchronization system according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
When designing a database, the real world is analyzed, abstracted, and the internal links are found out from the real world, so as to determine the structure of the database, and the process is called database modeling.
Conceptual model design, logical model design, physical model design are the main steps in the database modeling process.
The conceptual model is a model which is used for describing the service requirements of the user after analyzing, summarizing and refining after knowing the requirements of the user and the service field working conditions of the user. For example, clients and orders, goods and operators in sales business are described by use case: the business person places an order with the customer for the purchase of the merchandise. The conceptual model is represented using an entity-relationship graph (entity relationship diagram, E-R graph), which is composed mainly of three elements, entity, attribute, and relationship.
The logic model is a process of converting a conceptual model into a specific data model, namely, a basic E-R diagram established according to a conceptual structural design stage is converted into a corresponding logic model according to a data model (hierarchy/mesh/relationship/object oriented) supported by selected management system software, and the conversion is in accordance with the principle of a relationship data model. Still taking sales service as an example, customer information may include attributes such as unit name, contact phone, address, etc.; the commodity information may include attributes such as commodity name, type, specification, unit price, etc.; order information may include date and time attributes; in addition, the order has an association relationship with the customer, and the salesman has an association relationship with the commodity.
The physical model is the content of the logic model, and is implemented on a specific physical database engine. The physical model is a description of a real database, such as on a database MySQL, oracle, mongoDB, the logical model entity relationship is implemented by a physical table, a view, a field, a primary key, a foreign key, and the like.
Database modeling systems, such as various database modeling tools (DBDesigner, ERWin, powerDesigner, datablau, etc.), may be used to implement database design, database modeling. However, database modeling and privacy data management are performed separately.
In the existing privacy data management method, a single privacy management system is adopted, and a data list (DI) is defined (such as name, identity card number, bank card number, geographic position and the like), data attributes (such as acquisition mode, storage time length, failure condition, encryption mode and the like) are associated with database fields of an application (1-to-many), so that the privacy design and the database design development connection of the application system are realized. The privacy management system may also automatically generate privacy protocols, support general data protection regulations (general data protection regulation, GDPR), and the like.
Since the operations of data modeling and privacy data management are performed separately in different systems, whether a developer performs privacy data definition in the privacy data management system can only depend on autonomy. Therefore, the developer is likely to forget to define the private data in the private data management system due to busy work, or miss part of the private data, so that the missed private data cannot be restrained by the private data management system, and potential safety hazards exist.
In view of this, the embodiments of the present application provide a private data synchronization method, which is used to simplify the operation of managing private data by a developer, so as to improve the security of the private data.
Referring to fig. 1, a flowchart of a method for synchronizing private data according to an embodiment of the present application is shown, and the method may include the following steps:
step 101, a database modeling system acquires a Data Inventory (DI). The data list includes one or more items of data, which may be data that may be involved in the developed software, such as a user name, password, bank account number, contact phone, user address, etc.
The database modeling system described above may be a system with database design/modeling functionality, such as DBDesigner, mySQL, oracle, mongoDB, etc.
In one possible implementation, the database modeling system may obtain a data manifest from the privacy management system. At present, the development of the privacy management system is perfect, and software developers are used to record a data list in the privacy management system. When a developer has entered a data manifest in the privacy management system, the database modeling system may obtain the data manifest from the privacy management system. The privacy management system in the embodiment of the present application is a system having a function of managing private data, for example OneTrust, trustARC, privitar or the like.
In another possible implementation manner, the developer may also enter a data list into the database modeling system, and after the database modeling system determines which data in the data list is private data, send information such as the data list and the private data to the private data management system.
Step 102, the database modeling system acquires privacy indication information, wherein the privacy indication information is used for indicating that target data is privacy data.
In the conventional privacy data management manner, the database modeling system does not need to know which data are privacy data, and a developer only inputs in the privacy management system which data in the data list are privacy data indicated by the privacy indication information. In the data modeling process, a developer needs to open a database modeling system to perform modeling operation and a privacy management system to perform privacy data management operation, so that the developer is complex in operation and easy to miss. The developer forgets to perform the private data management operation, and the function implementation and the normal operation of the software to be developed are not affected, so that a large potential safety hazard of private data can be caused.
In the embodiment of the application, the developer can directly input the privacy indication information into the database modeling system to indicate the target data selected by the developer as the privacy data, so that in the data modeling process, the developer only needs to operate the database modeling system, the operation of the developer is simplified, the situations of misoperation and omission of privacy data management are reduced, and the potential safety hazard of the privacy data is reduced.
In one possible implementation, after the database modeling system obtains the data list, when the data list is displayed, an option of whether the data list is private data may be displayed for each data in the data list. For example, an option for the data to be private data may be displayed for each data, and if the developer clicks the option, the data is indicated as private data, otherwise, the data is considered as non-private data. For another example, a private data option and a non-private data option may be displayed for each data, and if the private data option is checked by the developer, the corresponding data is indicated as private data, and if the non-private data option is checked, the corresponding data is indicated as non-private data. Thus, a developer can conveniently input privacy indication information to the database modeling system in a selection mode.
Further, the privacy data option may include several sub-options representing the type of privacy data, such as the user's real name, identification card number, home address, bank card number, etc. For example, the database modeling system may first display a private data option and a non-private data option for each data in the data list, and when the developer selects the private data option, then further display sub-options of the private data for the developer to select. For another example, the database modeling system may also directly display the non-private data option and several sub-options of the private data option, so that the developer may select once, as shown in fig. 2, the developer may select "do not involve personal privacy" in a drop-down menu provided by the associated DI for the data with the field name "time", or may also select the user real name, the identification card number, the home address, the bank card number, etc., where the options of the user real name, the identification card number, the home address, the bank card number, etc. all belong to the sub-options of the private data.
In addition, the database modeling system may also provide a batch mode of operation. The developer can select whether the data is private data and what type of private data belongs to the private data when the data is private data by checking a plurality of data in the data list and then selecting the data to be checked for the plurality of data by a batch operation mode, as shown in fig. 2, the developer can perform batch operation of selecting private/non-private data for the data numbered 1, 2 and 3.
Alternatively, when the database modeling system displays the privacy option and the non-privacy option, the option of whether the data is private data may be set as a necessary option, that is, if the developer does not select whether the data is private data, the operation of subsequent data modeling cannot be performed. The existing private data management mode can only generate potential safety hazards of private data because the private data management operation is not needed, and database modeling and other software development steps can be completed without the private data management operation. If the option of whether the privacy data is the necessary option can be used in the database modeling system, the developer must execute the management operation of the privacy data, and if the management operation is not executed, the database modeling operation cannot be executed.
The database modeling system may further acquire a privacy management policy of the target data (i.e., the privacy data) in addition to the privacy indication information, and send the acquired privacy management policy to the privacy management system, so that the privacy management system manages the privacy data according to the privacy management policy. For example, the privacy management policy may be that the retention period of the privacy data a after the user is sold is X months, and when the user is sold, the privacy management system deletes the privacy data a of the user when the user is sold for X months; the privacy management policy may also include whether to encrypt the target data, and the corresponding encryption algorithm. After the implementation mode is adopted, a developer can not only input privacy indication information in the database modeling system, but also further indicate privacy management strategies, so that more comprehensive and personalized management of privacy data is realized, and operation in the privacy management system is not needed, that is, more comprehensive privacy management is realized while operation of the developer is simplified.
In one possible design, after the developer selects the target data as the privacy data, i.e., after the database modeling system obtains the privacy indication information, candidate privacy management policies may be displayed for the target data. These candidate privacy management policies may be preconfigured in the database modeling system. When the developer selects the target privacy management policy from the candidate privacy management policies, the database modeling system takes the target privacy management policy selected by the developer as the privacy management policy of the target data.
For example, the database modeling system may display an option of whether to encrypt the target data, and further may display candidate encryption algorithms; for another example, the database modeling system may display a candidate persistence period for the private data after the user has sold.
Step 103, the database modeling system sends the privacy indication information to the privacy management system.
After the database modeling system acquires the privacy indication information, the privacy indication information can be sent to the privacy management system, so that the privacy management system can determine which data are privacy data according to the privacy indication information, and privacy management is needed.
If the data list acquired by the database modeling system is acquired from the privacy management system, the database modeling system sends the privacy indication information to the privacy management system; if the data list acquired by the database modeling system is recorded by a developer, the database modeling system can send the data list and the privacy indication information to the privacy management system so that the privacy management system can conduct privacy management according to the data list and the privacy indication information.
Alternatively, the database modeling system may send the privacy indication information and/or the privacy management policy to the privacy management system via a representational state transfer (RESTful) interface, or may also send the privacy indication information and/or the privacy management policy to the privacy management system via a message queue service (message queue service, MQS) message.
And 104, the database modeling system performs database modeling according to the modeling instruction of the developer and the data list.
As previously described, the database modeling system may set the option of whether or not it is private data as a necessary option, in which case the database modeling system needs to be able to perform step 104 after the developer selects the option of private data, i.e., after step 102 described above. Alternatively, the database modeling system may perform step 104 after performing step 103; alternatively, the database modeling system may perform step 103 and step 104 simultaneously after the privacy indication information is obtained, or may perform step 104 first and then step 103, which is not limited in the embodiment of the present application.
The database is modeled according to the data list, so that a physical model can be obtained, and a developer can perform software development and privacy management development based on the obtained physical model. For example, a developer may develop a privacy data lifetime based on the obtained physical model and a privacy management policy, and may also develop a cross-border requirement, because the management requirements for the privacy data may be different in different regions outside the country.
After the software development is completed, the database modeling system can also test the developed software according to the instruction of the developer, and specifically can test whether the target data (i.e. the privacy data) meets the privacy management policy and the like. After development is completed, a developer usually needs to test the developed software so as to discover problems in the software in time, and in the embodiment of the application, the developer can also test privacy management to detect whether the privacy data meets a privacy management policy or not, so that the security of the privacy data is further ensured. For example, if the privacy management policy defines that the lifetime of the privacy data a after the user is sold is Y days, then in the testing phase, the database modeling system may test whether the privacy data a of the user is deleted for Y days after the user is sold. The testing process can be directly carried out in a database modeling system, and a developer can realize the testing process without switching the system.
For a clearer understanding of the above embodiments of the present application, the following description will be given with reference to the developer operation flow shown in fig. 3.
In the developer operation flow shown in fig. 3, the developer is subdivided, and the developer may include a privacy system engineer (privacy SE), a privacy representative, a product system engineer (product SE), a development post person, a test post person, a privacy auditor, and the like.
The privacy system engineer (privacy SE) may first enter the data manifest in the privacy management system (dtjust) and then the entered data manifest may be reviewed by the privacy representative.
If the review passes, the database manifest may be input from the privacy management system to a database modeling system (DBDesigner), step 101, the product system engineer (product SE) performs a database model design according to the database manifest, and the database model design may include a database association database manifest and a database manifest retention period setting. The step 102 described above, i.e., the step of the database modeling system obtaining privacy indication information, may be performed when the database associates a data list.
A database modeling system (DBDesigner) synchronizes the associated privacy data, the data list after the privacy management policy, to a privacy management system (Dtrust), and a test list (checklist) is generated by a development or test post personnel from the associated data list. The test list (checklist) may include a test of whether the privacy data satisfies the privacy management policy (e.g., whether the retention period of the privacy data satisfies the retention period design), and a test of whether the privacy data satisfies the overseas privacy requirements.
Development personnel perform software development according to the designed database model in a database modeling system (DBDesigner). In the software development process, the privacy management aspect of the privacy data can be designed according to the privacy management policy, so that the generated database can meet the privacy management policy of the privacy data.
After development is completed, a test post personnel can test whether the privacy data meets the privacy management policy (such as whether the retention period of the privacy data meets the retention period design) according to a test list (checklist), and test whether the privacy data meets the overseas privacy requirement.
If the test is passed, the developed software can be released to the user. After release, the privacy SE can also review whether the privacy data related to the software meets the overseas privacy requirements; the privacy audit can also audit whether the privacy data related to the software meets the design of the retention period.
In the conventional software development process, a developer usually inputs a data list in a privacy management system and synchronizes the data list to a database modeling system, and then the developer needs to perform database modeling through the database modeling system and needs to set which data are privacy data in the privacy management system so that the privacy management system performs privacy management on the privacy data, that is to say, the developer needs to operate in two systems, and because of complicated operation, the developer easily omits and forgets management operation on the privacy data. By adopting the method provided by the embodiment of the application, after the database modeling system acquires the data list, a developer can not only perform database modeling according to the data list in the database modeling system, but also input privacy indication information of private data in the database modeling system, and then the database modeling system synchronizes the privacy indication information to the privacy management system, so that the situation that the developer needs to operate the database modeling system and the privacy management system in the data modeling process is avoided, and the problem that the privacy management of the data is ignored due to complex operation is reduced.
Based on the same technical concept, the embodiment of the application also provides a privacy data synchronization system for realizing the functions of the database modeling system in the embodiment of the method. The system may comprise modules/units performing any one of the possible implementations of the method embodiments described above; these modules/units may be implemented by hardware, or may be implemented by hardware executing corresponding software.
By way of example, the system may, as shown in fig. 4, comprise: an acquisition module 401, a transmission module 402 and a modeling module 403. An obtaining module 401, configured to obtain a data list and privacy indication information, where the data list includes one or more items of data, and the privacy indication information is used to indicate that target data is private data, and the target data is data in the data list; a sending module 402, configured to send the privacy indication information to a privacy management system; the modeling module 403 is configured to perform database modeling according to the modeling instruction of the developer and the data list.
In one possible implementation, the obtaining module 401 may further obtain a privacy management policy of the target data; correspondingly, the sending module 402 is further configured to send the privacy management policy to the privacy management system.
In one possible implementation manner, the system further includes a testing module, configured to test whether the target data meets the privacy management policy according to test indication information of a developer.
In one possible implementation manner, the obtaining module 401 is specifically configured to, when obtaining the privacy management policy of the target data: displaying candidate privacy management policies; the candidate privacy management strategies are preconfigured in the privacy data synchronization system; and then acquiring a privacy management policy selected by the developer from the displayed candidate privacy management policies as the privacy management policy of the target data.
In one possible implementation manner, the obtaining module 401 is specifically configured to, when obtaining the data list: a data manifest is obtained from the privacy management system.
In one possible implementation manner, the obtaining module 401 is specifically configured to, when obtaining the privacy indication information: displaying the option that the target data is private data; and when the developer selects the option, determining privacy indication information of the acquired target data.
The acquiring module, the sending module, the modeling module and the like can be realized by software or can be realized by hardware. By way of example, a module may include code running on a computing instance as an example of a software functional unit. The computing instance may include at least one of a physical host (computing device), a virtual machine, and a container, among others. Further, the above-described computing examples may be one or more. For example, the modeling module may include code that runs on multiple hosts/virtual machines/containers. It should be noted that, multiple hosts/virtual machines/containers for running the code may be distributed in the same region (region), or may be distributed in different regions.
Based on the same technical concept, the embodiment of the application also provides a computer device for realizing the functions of the database modeling system in the embodiment of the method. The computer device comprises a processor 501 as shown in fig. 5, and a memory 502 connected to the processor 501. Further, the computer device may also include a communication interface 503 and a communication bus 504.
The processor 501 may be a general purpose processor, microprocessor, application specific integrated circuit (application specific integrated circuit, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic device, discrete gate or transistor logic device, or one or more integrated circuits for controlling program execution in accordance with aspects of the present application, or the like. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution.
A communication interface 503 for communicating with other devices, such as a PCI bus interface, ethernet, wireless local area network (wireless local area networks, WLAN), radio access network (radio access network, RAN), etc.
In the embodiment of the present application, the processor 501 is configured to invoke the communication interface 503 to perform the functions of receiving and/or transmitting and to perform the method as described in any of the previous possible implementations.
Further, the computer device may also include a memory 502 and a communication bus 504.
The memory 502 is configured to store program instructions and/or data, so that the processor 501 invokes the instructions and/or data stored in the memory 502 to implement the above-described functions of the processor 501. Memory 502 may be, but is not limited to, read-only memory (ROM) or other type of static storage device that can store static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM) or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 502 may be a stand-alone memory, such as an off-chip memory, coupled to the processor 501 via a communication bus 504. Memory 502 may also be integrated with processor 501.
Communication bus 504 may include a path for communicating information between the components.
Furthermore, the memory 502 may also be located outside the computer device, as long as the processor 501 can transmit and exchange information with the memory 502 outside the computer device.
By way of example, the processor 501 may perform the following steps via the communication interface 503: acquiring a data list, wherein the data list comprises one or more items of data; acquiring privacy indication information, wherein the privacy indication information is used for indicating that target data is privacy data, and the target data is data in the data list; sending the privacy indication information to a privacy management system; and carrying out database modeling according to the modeling instruction of the user and the data list.
In one possible implementation, the processor 501 may also perform the following steps through the communication interface 503: acquiring a privacy management policy of the target data; and sending the privacy management policy to the privacy management system.
In one possible implementation, the processor 501 may also perform the following steps through the communication interface 503: and testing whether the target data meets the privacy management policy according to the test indication information of the user.
In one possible implementation, the processor 501, when executing the privacy management policy for obtaining the target data through the communication interface 503, is specifically configured to: displaying candidate privacy management policies; the candidate privacy management policies may be preconfigured in the computer device; and acquiring a privacy management policy selected by a user from the displayed candidate privacy management policies as the privacy management policy of the target data.
In one possible implementation, the processor 501, when executing the acquisition data list through the communication interface 503, is specifically configured to: a data manifest is obtained from the privacy management system.
In one possible implementation, the processor 501, when executing the acquisition of the privacy indication information through the communication interface 503, is specifically configured to: displaying the option that the target data is private data; and when the user selects the option, determining privacy indication information of the acquired target data.
The embodiment of the application also provides a computing device cluster, which comprises at least one computing device, wherein each computing device comprises a processor and a memory; the processor of the at least one computing device is configured to execute instructions stored in the memory of the at least one computing device to cause the cluster of computing devices to perform the foregoing method embodiments. The computing device may be a server, such as a central server, an edge server, or a local server in a local data center. In some embodiments, the computing device may also be a terminal device such as a desktop, notebook, or smart phone.
In some possible implementations, some instructions for performing the private data synchronization method may also be stored in a memory of one or more computing devices in the computing device cluster. In other words, a combination of one or more computing devices may collectively execute instructions for performing the private data synchronization method.
It should be noted that, the memories in different computing devices in the computing device cluster may store different instructions for performing part of the functions of the private data synchronization system, respectively. That is, the instructions stored by the memory in the different computing devices may implement the functionality of one or more of the acquisition module, the transmission module, and the modeling module.
In some possible implementations, one or more computing devices in a cluster of computing devices may be connected through a network. Wherein the network may be a wide area network or a local area network, etc.
Based on the same technical idea, the embodiments of the present application further provide a computer program product containing instructions, which, when executed by a computing device cluster, cause the computing device cluster to perform the above-described method embodiments.
Based on the same technical concept, the embodiments of the present application also provide a computer-readable storage medium having computer-readable instructions stored therein, which when executed on a computer, cause the above-described method embodiments to be performed.
Based on the same technical idea, the present application provides a computer program product comprising instructions which, when run on a computer, cause the above-described method embodiments to be performed.
It should be appreciated that in the description herein, the words "first," "second," and the like are used solely for distinguishing between the descriptions and not necessarily for indicating or implying a relative importance or order. Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to encompass such modifications and variations.

Claims (14)

1. A method of private data synchronization, the method comprising:
the database modeling system acquires a data list, wherein the data list comprises one or more items of data;
the database modeling system acquires privacy indication information, wherein the privacy indication information is used for indicating that target data is privacy data, and the target data is data in the data list;
the database modeling system sends the privacy indication information to a privacy management system;
and the database modeling system performs database modeling according to the modeling instruction of the user and the data list.
2. The method according to claim 1, wherein the method further comprises:
the database modeling system acquires a privacy management strategy of the target data;
the database modeling system sends the privacy management policy to the privacy management system.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
and the database modeling system tests whether the target data meets the privacy management policy according to the test indication information of the user.
4. The method of claim 2, wherein the database modeling system obtains a privacy management policy for the target data, comprising:
the database modeling system displays candidate privacy management policies; the candidate privacy management policies are preconfigured in the database modeling system;
and the database modeling system acquires a privacy management policy selected by a user from the displayed candidate privacy management policies as the privacy management policy of the target data.
5. A method according to any one of claims 1-3, wherein the database modeling system obtains a data manifest comprising:
the database modeling system obtains a data manifest from the privacy management system.
6. The method of any of claims 1-4, wherein the database modeling system obtaining privacy indication information comprises:
the database modeling system displays options that the target data is private data;
And when the user selects the option, the database modeling system determines to acquire the privacy indication information of the target data.
7. A database modeling system, the system comprising:
the system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring a data list and privacy indication information, the data list comprises one or more items of data, the privacy indication information is used for indicating that target data is private data, and the target data is data in the data list;
the sending module is used for sending the privacy indication information to a privacy management system;
and the modeling module is used for carrying out database modeling according to the modeling instruction of the user and the data list.
8. The system of claim 7, wherein the acquisition module is further configured to: acquiring a privacy management policy of the target data;
the sending module is further configured to: and sending the privacy management policy to the privacy management system.
9. The system according to claim 7 or 8, characterized in that the system further comprises:
and the test module is used for testing whether the target data meets the privacy management policy according to the test indication information of the user.
10. The system according to claim 8, wherein the obtaining module, when obtaining the privacy management policy of the target data, is specifically configured to:
displaying candidate privacy management policies; the candidate privacy management policies are preconfigured in the database modeling system;
and acquiring a privacy management policy selected by a user from the displayed candidate privacy management policies as the privacy management policy of the target data.
11. The system according to any one of claims 7-10, wherein the obtaining module, when obtaining the data list, is specifically configured to:
a data manifest is obtained from the privacy management system.
12. The system according to any one of claims 7-11, wherein the obtaining module, when obtaining the privacy indication information, is specifically configured to:
displaying the option that the target data is private data;
and when the user selects the option, determining privacy indication information of the acquired target data.
13. A computer device comprising a memory and a processor;
the memory stores a computer program;
the processor is configured to invoke a computer program stored in the memory to perform the method of any of claims 1-6.
14. A computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the method of any of claims 1-6.
CN202211062785.6A 2022-08-31 2022-08-31 Private data synchronization method, system and computer equipment Pending CN117668102A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211062785.6A CN117668102A (en) 2022-08-31 2022-08-31 Private data synchronization method, system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211062785.6A CN117668102A (en) 2022-08-31 2022-08-31 Private data synchronization method, system and computer equipment

Publications (1)

Publication Number Publication Date
CN117668102A true CN117668102A (en) 2024-03-08

Family

ID=90079523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211062785.6A Pending CN117668102A (en) 2022-08-31 2022-08-31 Private data synchronization method, system and computer equipment

Country Status (1)

Country Link
CN (1) CN117668102A (en)

Similar Documents

Publication Publication Date Title
US11704618B2 (en) Application mapping and alerting based on data dependencies
US11449633B2 (en) Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US10872029B1 (en) System, apparatus and method for deploying infrastructure to the cloud
CN106844372B (en) Logistics information query method and device
US10785128B1 (en) System, apparatus and method for deploying infrastructure to the cloud
JP7097958B2 (en) Systems and methods for integrating cloud applications into cloud service broker platforms using the Automatic Universal Connector Package
CA2878451C (en) Collaborative due diligence review system
JP2017514218A (en) Running third-party applications
CN107797918B (en) Test method and test device
US20220269819A1 (en) Application privacy scanning systems and related methods
CN114817022A (en) Railway electronic payment platform test method, system, equipment and storage medium
US11222309B2 (en) Data processing systems for generating and populating a data inventory
CN117668102A (en) Private data synchronization method, system and computer equipment
KR102344661B1 (en) Method for providing information based on expected result value and computing device using the same
CN113434397B (en) Task system testing method and device, electronic equipment and storage medium
CN112348403B (en) Wind control model construction method and device and electronic equipment
CN112000746B (en) Data management method and device and server
CN115904527A (en) Data processing method, device, equipment and medium
CN113867700A (en) Model construction method, display platform, server and storage medium
US20170060647A1 (en) Event-based data management method and device
WO2021237075A1 (en) Data processing systems and methods for automatic discovery and assessment of mobile software development kits
CN110955599A (en) Object creation method and device, electronic equipment and computer-readable storage medium
US11831487B2 (en) System, method, and computer program product for diagnosing faulty components in networked computer systems
JP2010122756A (en) Edi integration system, edi integration method, and edi integration program
CN117472617A (en) Message processing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication