WO2023005862A1 - 数据治理装置、方法、计算机设备及存储介质 - Google Patents

数据治理装置、方法、计算机设备及存储介质 Download PDF

Info

Publication number
WO2023005862A1
WO2023005862A1 PCT/CN2022/107571 CN2022107571W WO2023005862A1 WO 2023005862 A1 WO2023005862 A1 WO 2023005862A1 CN 2022107571 W CN2022107571 W CN 2022107571W WO 2023005862 A1 WO2023005862 A1 WO 2023005862A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
module
target
governance
target data
Prior art date
Application number
PCT/CN2022/107571
Other languages
English (en)
French (fr)
Inventor
郭震
谢永恒
万月亮
Original Assignee
北京锐安科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京锐安科技有限公司 filed Critical 北京锐安科技有限公司
Publication of WO2023005862A1 publication Critical patent/WO2023005862A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the embodiments of the present application relate to the technical field of data governance, for example, to a data governance device, method, computer equipment, and storage medium.
  • Data governance refers to a process from using scattered data to using unified master data, from little or no organizational and process governance to comprehensive data governance within a certain range, and from master data chaos to master data orderly.
  • Data governance is a data management concept that involves enabling organizations to ensure that high data quality exists throughout the lifecycle of data. Data governance is critical to ensuring that data is accurate, shared and protected appropriately.
  • An effective Data governance program delivers value back to the business through improved decision-making, reduced costs, reduced risk, and improved security compliance, which ultimately translates into increased revenue and profits.
  • the single-point deployment data governance platform has potential problems in data maintenance, data expansion, and data security. Its generation and utilization of data for current data standards only stays in a closed environment, and it cannot efficiently utilize industry resources. The security strategy cannot effectively deal with single-point attacks.
  • the embodiment of the present application provides a data governance device, method, computer equipment, and storage medium to effectively prevent single-point attacks, improve data reliability and security, and provide a multi-party collaboration path for the data governance device to facilitate maintenance and expansion.
  • An embodiment of the present application provides a data governance device, including: a data governance module, a data standard module, a metadata management module, a data quality management module, and a data service module; wherein:
  • the data governance module is deployed on the block chain, and is configured to verify and store the target data through the distributed ledger of the block chain, and generate and update the target data through the consensus mechanism of the block chain performing safe transmission and safe access to the target data through the encryption algorithm of the block chain, and performing target data operations through the smart contract of the block chain;
  • the data standard module is configured to provide the data governance module with the data standard of the target data, so that the data governance module can verify and store the target data;
  • the metadata management module is configured to manage and analyze the metadata of the target data stored in the data governance module
  • the data quality management module is configured to perform data quality management on the target data stored in the data governance module according to the data standard provided by the data standard module;
  • the data service module is configured to provide a data transmission interface for the data governance module.
  • the embodiment of the present application also provides a data governance method applied to a data governance device, including:
  • the distributed ledger based on the block chain is used to verify and store the target data, the target data is generated and updated based on the consensus mechanism of the block chain, and the encryption algorithm based on the block chain is used to The target data is safely transmitted and accessed, and the target data operation is performed based on the smart contract of the block chain; wherein, the data governance module is deployed on the block chain;
  • a data transmission interface is provided for the data governance module through the data service module.
  • the embodiment of the present application also provides a computer device, and the computer device includes:
  • a storage device configured to store at least one program
  • the data management apparatus provided by any embodiment of the present application is realized.
  • the embodiment of the present application also provides a computer storage medium, on which a computer program is stored, and when the program is executed by a processor, the data management device provided in any embodiment of the present application is realized.
  • FIG. 1 is a schematic structural diagram of a data governance device provided in Embodiment 1 of the present application;
  • FIG. 2 is a schematic structural diagram of a data platform provided in Embodiment 1 of the present application.
  • FIG. 3 is a schematic structural diagram of a data governance device provided in Embodiment 2 of the present application.
  • FIG. 4 is a schematic structural diagram of a data governance module provided in Embodiment 2 of the present application.
  • FIG. 5 is a schematic diagram of a data governance model provided in Embodiment 2 of the present application.
  • Fig. 6 is a schematic diagram of the review time for an alternative term application as a standard term provided in Embodiment 2 of the present application;
  • FIG. 7 is a flow chart of a data governance method provided in Embodiment 3 of the present application.
  • FIG. 8 is a schematic structural diagram of a computer device provided in Embodiment 4 of the present application.
  • FIG. 1 is a schematic structural diagram of a data governance device provided in Embodiment 1 of the present application. This embodiment is applicable to the situation of data governance, which can be realized by software and/or hardware, and can generally be integrated in computer equipment middle. As shown in FIG. 1 , the device includes: a data governance module 110 , a data standard module 120 , a metadata management module 130 , a data quality management module 140 and a data service module 150 .
  • the data governance module 110 is deployed on the block chain, and is configured to verify and store the target data through the distributed ledger of the block chain, and generate and update the target data through the consensus mechanism of the block chain, The target data is safely transmitted and accessed through the encryption algorithm of the block chain, and the target data operation is performed through the smart contract of the block chain.
  • the data standard module 120 is configured to provide the data standard of the target data to the data governance module 110, so that the data governance module 110 can verify and store the target data.
  • the metadata management module 130 is configured to manage and analyze the metadata of the target data stored in the data governance module 110 .
  • the data quality management module 140 is configured to perform data quality management on the target data stored in the data governance module 110 according to the data standard provided by the data standard module 120 .
  • the data service module 150 is configured to provide a data transmission interface for the data governance module 110 .
  • Target data can be any data that is the object of data governance, and it can be data in any industry, which is not limited here.
  • the data governance module 110 is deployed on the block chain.
  • the block chain has a block chain structure.
  • the distributed ledger can perform distributed management on the target data of the block chain structure.
  • Multiple network nodes in the block chain network can The target data is verified and stored, so that the decentralized storage of the target data can be realized.
  • the target data stored in the data governance module 110 changes, the change caused by any node needs to be approved by other nodes.
  • the consensus mechanism can be an algorithm that reaches a consensus on the sequence of transactions of the blockchain network within the same time window between the nodes of the blockchain network, and the target data stored in the data governance module 110 is generated and update, which can ensure the authenticity and integrity of the target data.
  • the encryption algorithm can be used to encrypt the target data that is originally plain text, which can ensure that the target data will not be illegally obtained during the transmission and access process, and realize the safe transmission and safe access of the target data.
  • Smart contracts can be used to automatically execute the terms in the contract when the specified conditions are obtained, and then the corresponding target data operations can be automatically executed when the conditions are met.
  • the target data operation can be a data processing operation for the target data triggered when the specified conditions are met , the trigger condition and operation content of the target data operation can be correspondingly set in advance, which is not limited here.
  • the data standard module 120 can manage the data standard of the target data.
  • the data standard can be used to describe the characteristics of any dimension of the target data, and can be preset according to the need of data governance for the target data, which is not limited here. For example, if the target data is an ID card number, the data standard may be that the character length is 16 bits.
  • the data standard module 120 and the data governance module 110 can communicate with each other, so that the data standard module 120 provides the data standard to the data governance module 110 .
  • the data governance module 110 can judge whether the target data to be verified and stored meets the data standard, so that the target data meeting the data standard can be stored.
  • the target data that does not meet the data standard can also be corrected so that the corrected target data meets the data standard, and the corrected target data can be stored.
  • Metadata can be data used to describe target data and its environment, for example, it can include data tables, names and types of fields, and physical locations.
  • Data relationship analysis can be the operation of tracing the source of metadata and/or analyzing the influence and relationship between target data.
  • data relationship analysis may include data impact analysis and data blood relationship analysis.
  • the data quality management module 140 and the data governance module 110 can visit each other, so that the data quality management module 140 can read the target data stored in the data governance module 110, and perform data quality management on the target data according to a preset policy, so as to Make the quality of the target data stored in the data governance module 110 meet the requirements of data governance, and improve data reliability.
  • the data quality management module 140 may also perform data quality management on the target data according to the data standard provided by the data standard module 120, so as to ensure that the target data stored in the data governance module 110 meets the data standard.
  • the data service module 150 and the data governance module 110 can access each other, so that the data governance module 110 can call the data transmission interface provided by the data service module 150 to access the data source to collect target data, or access to the data sharing channel to provide target data, or to access any other channel and transmit target data, which is not limited here.
  • FIG. 2 is a schematic structural diagram of a data platform provided in Embodiment 1 of the present application.
  • the data platform includes a blockchain system and a data governance system that can be deployed in the blockchain system.
  • the data standard module, metadata management module, data quality management module and data service module can access each other with the data governance system to provide services to the data governance system, so that the data governance system can call these services, and based on the area Blockchain system for data governance.
  • An embodiment of the present application provides a data governance device, in which a data governance module, a data standard module, a metadata management module, a data quality management module, and a data service module are provided, wherein the data governance module is deployed in the On the block chain, use the distributed ledger of the block chain to verify and store data, use the consensus mechanism of the block chain to generate and update data, use the encryption algorithm of the block chain for secure transmission and secure access to data, and use the block chain
  • the smart contract of the block chain performs data operations
  • the data standard module can provide the data standard of the target data
  • the metadata management module can manage the metadata of the target data and analyze the data relationship
  • the data quality management module can manage the data quality of the target data
  • the data service module can provide a data transmission interface for the data governance module.
  • the above devices use blockchain technology to achieve efficient and secure data governance, which solves the disadvantages of low efficiency and poor security of data governance in single-point deployment in related technologies, effectively prevents single-point attacks, improves data reliability and security, and Provides a multi-party collaboration path for data management devices to facilitate maintenance and expansion.
  • FIG. 3 is a schematic structural diagram of a data governance device provided in Embodiment 2 of the present application. As shown in FIG. 3 , the embodiment of the present application is based on the above embodiments, and optionally, the internal structure of the data governance module is described.
  • the data governance module 110 includes a data specification submodule 1101 and a data integration submodule 1102 .
  • the data specification sub-module 1101 is configured to unify the naming, definition, type and calculation method of the target data, and unify the classification process, compression process and encryption process of the target data from different data sources.
  • the data integration sub-module 1102 is configured to store and share the target data according to the unified result of the data specification sub-module 1101 .
  • the data synthesis submodule 1102 can be connected with the data specification submodule 1101 .
  • the data governance process requires a unified naming, definition, type, and calculation method so that the target data can meet the requirements for data labeling and data quality.
  • the target data can come from different data sources.
  • the data governance process needs to carry out unified classification, compression and encryption, so that the target data from different data sources can meet the data standards and quality requirements.
  • the data synthesis sub-module 1102 can determine the naming, definition, type and calculation method of the target data in the data governance process, as well as the process of classifying, compressing and encrypting the target data from different data sources , so that the target data can be stored and shared.
  • FIG. 4 is a schematic structural diagram of a data governance module provided in Embodiment 2 of the present application.
  • the data integration sub-module 1102 may include: a data source unit, a data access unit, a data storage unit, a data integration unit, a data sharing unit, and a data security unit.
  • the data source unit is configured to integrate and store all the data sources; the data access unit is configured to collect the target data in the stored data sources, and perform the collected target data according to the data standard.
  • the data access unit can be connected to the data source unit; the data storage unit is set to store the target data after standardized processing, and the data storage unit can be connected to the data access unit; the data integration unit is set to be a data application
  • the task provides target associated data, and the data integration unit can be connected to the data storage unit;
  • the data sharing unit is configured to perform data value conversion on the target data, and share the target data after the data value conversion, and the data sharing unit can It is connected with the data storage unit;
  • the data security unit is configured to perform encryption protection and tamper protection on the target data, and the data security unit can be connected with the data storage unit and/or the data sharing unit.
  • the target data can come from different data sources, all data sources can be integrated through the data source unit first, and the integrated data sources can be stored in the data governance module 110 . Then, the integrated and stored data source can be accessed through the data access unit, the target data in different data sources can be collected, and the collected target data can be standardized so that the target data meets the data standard. For the target data that has met the data standard after standardized processing, it is stored by the data storage unit, so that it is distributed and stored in the blockchain.
  • the data integration unit receives the data application task, it can obtain the target associated data required by the data application task from the stored target data, and provide the target associated data to the data application task.
  • the data application task can be any specific target data
  • the target-associated data may be specific target data that needs to be applied.
  • the data sharing unit can perform data value conversion on the target data.
  • the data value conversion can be an operation of converting the target data into data or indicators that can be used.
  • the data sharing unit can also perform data value conversion on the target data. Sharing, for example, the target data after data value conversion can be provided to the business layer of the data platform.
  • the data security unit can perform encryption protection and tamper protection on the target data. Encryption protection can encrypt the target data based on an encryption algorithm, and tamper protection can increase the tampering cost of the target data based on a tamper-resistant algorithm.
  • the device may further include: a data governance model.
  • the data governance model is deployed on the block chain, and is configured to provide the data governance strategy of the target industry to which the target data belongs.
  • the data governance strategy can be any data processing strategy set according to the application requirements of the target data in the target industry.
  • the model structure of the data governance model can be realized, and the effective governance of data can be realized according to the distributed ledger, encryption algorithm, consensus mechanism and smart contract of the blockchain, as well as the data governance strategy provided by the data governance model, so that the target The data can meet the application needs in the target industry.
  • FIG. 5 is a schematic diagram of a data governance model provided in Embodiment 2 of the present application.
  • the model structure based on blockchain deployment includes a data security compliance model structure based on user identity authentication and encryption and decryption mechanisms, a data standardization model structure based on smart contracts and user data updates, and a consensus model based on consensus mechanisms and
  • the distributed ledger responds to the user's data quality management model structure, as well as the collaborative governance model structure among the data security compliance model structure, data standardization model structure, and data quality management model structure.
  • the data governance module 110 may also be configured to: apply for alternative terms as standard terms on the blockchain.
  • Alternative terms may be the name identifiers used by some people in the target industry to which the target data belongs.
  • the standard term may be a common name identifier of the target data in the target industry to which it belongs.
  • the data governance module 110 can apply for alternative terms as standard terms in the blockchain it deploys, so that the alternative terms can be commonly used by nodes in the blockchain network, and the data governance module 110 can Choose words for data governance.
  • an alternative term as a standard term, it is necessary to verify the alternative term. After determining that it is not an invalid term or a missing term, and that there is no synonym or duplication with the currently existing standard term In some cases, the alternative term can be determined as the standard term.
  • alternate terms can be submitted as a document. For example, it is possible to obtain a data table of alternative words that need to be applied to become a standard word, and organize and complete the data table into a file.
  • the data governance module 110 may include: an industry selection submodule, a conversion management submodule, a verification submodule, a counting submodule, an industry standard lexicon, a reading submodule and a writing submodule. into submodules.
  • the industry selection sub-module is set to determine the target industry to which the alternative words belong; the conversion management sub-module is set to standardize the alternative words; the verification sub-module is set to verify all The alternative words after the standardization process are used for legality verification, and the verification submodule can be connected with the conversion management submodule; the counting submodule is set to provide the general standard words of the whole industry to the verification submodule, so that the The verification submodule performs the legality verification, and the counting submodule can be connected with the verification submodule; the industry standard lexicon is set to store the industry standard words of the target industry; the reading submodule is set to read the industry standard words, and provide the industry standard words to the verification submodule, so that the verification submodule can perform the legality verification, and the reading submodule can be connected with the industry standard lexicon and the verification submodule; The reading submodule can also be connected with the industry selection submodule, set to read the industry standard words of the target industry according to the target industry to which the
  • the conversion management sub-module can standardize the submitted candidate words, that is, process the candidate words according to the requirements for standard words, deal with the existing problems, and unify the format of the candidate words.
  • the verification sub-module can call smart contracts for legality verification for each candidate word after standardization processing, so as to determine whether the candidate word can be stored in the blockchain as a standard word.
  • the counting sub-module can efficiently and completely count the general standard words used in the whole industry, and provide them to the verification sub-module.
  • Industry standard terms of the target industry are stored in the industry standard lexicon.
  • the reading sub-module can perform a reading operation on the industry standard thesaurus, read the industry standard words therein, and provide the read industry standard words to the verification sub-module.
  • the verification sub-module verifies the legitimacy of the candidate words, it can compare and verify the candidate words according to the general standard words of the whole industry and the industry standard words of the target industry.
  • alternative words that have passed the legality verification they can be determined as standard words and stored in the blockchain, and the alternative words that have passed the legality verification can be written into the industry standard library by writing into the submodule , to update the standard terms stored in the industry standard library to ensure the integrity of the standard terms in the industry standard library.
  • the data governance module 110 is configured to: apply for alternative terms as standard terms on the blockchain within the application time.
  • the application time can be calculated by the following formula:
  • T is the time of application
  • (n 3 +n 4 ) is the total number of alternative words
  • n 3 is the total number of alternative words that have passed the legality verification
  • n 4 is failed
  • t3 is the time for calling the smart contract once
  • tx is the number of concurrency per second
  • t4 is the block generation time of the blockchain .
  • the total number of all submitted alternative words is (n 3 +n 4 ), it is necessary to call the smart contract for all alternative words for verification and comparison, and then for n 3 alternative words that meet the requirements, The smart contract needs to be called again to write to the blockchain. If the time required to call a smart contract is t 3 , and considering that the number of concurrency per second is tx, and the generation time of the block is t 4 , the calculation formula for the above application time can be obtained.
  • T is the application time
  • t 1 is the time used for examination
  • n 1 is the number of alternative words
  • n 2 is the number of alternative words sorted out
  • Fig. 6 is a schematic diagram of the application time for an alternative word to apply for a standard word provided in Embodiment 2 of the present application.
  • the abscissa corresponding to each point in the figure indicates the number of alternative words, and the ordinate indicates the required application time. It is estimated by actual operation that the number of n 1 , n 2 , n 3 and n 4 in the two models all account for 50% of the total number of candidate words for review, and t 1 is 1 minute in the related technology.
  • t 3 is 0.012 seconds
  • the average time of generating a block is used to obtain t 4 in this application is 13.55 seconds.
  • the above-mentioned embodiment can effectively shorten the time for the alternative words to be used as standard words when applying for the alternative words as standard words, shorten the time for the data platform to process data, and improve the efficiency of the data platform. It avoids the hidden danger of excessive authority of reviewers in the manual review mode in related technologies, brings convenience to the use of personnel, reduces the burden on the data platform, prolongs the running time of the data platform, and facilitates the use of personnel.
  • An embodiment of the present application provides a data governance device, in which a data governance module, a data standard module, a metadata management module, a data quality management module, and a data service module are provided, wherein the data governance module is deployed in the On the block chain, use the distributed ledger of the block chain to verify and store data, use the consensus mechanism of the block chain to generate and update data, use the encryption algorithm of the block chain for secure transmission and secure access to data, and use the block chain
  • the smart contract of the block chain performs data operations
  • the data standard module can provide the data standard of the target data
  • the metadata management module can manage the metadata of the target data and analyze the data relationship
  • the data quality management module can manage the data quality of the target data
  • the data service module can provide a data transmission interface for the data governance module.
  • the above device uses blockchain technology to achieve efficient and safe data governance, which solves the disadvantages of low efficiency and poor security of data governance in single-point deployment in related technologies, and effectively It prevents single-point attacks, improves data reliability and security, and provides a multi-party collaboration path for data governance devices to facilitate maintenance and expansion.
  • Fig. 7 is a flow chart of a data governance method provided in Embodiment 3 of the present application. This embodiment can be adapted to perform data governance.
  • the method can be executed by the data governance device provided in the embodiment of the present application.
  • the device can It is realized by means of software and/or hardware, and generally can be integrated in computer equipment. As shown in Figure 7, the method includes the following operations:
  • S310 through the data governance module, verify and store the target data based on the distributed ledger of the block chain, generate and update the target data based on the consensus mechanism of the block chain, and encrypt the target data based on the block chain
  • the algorithm performs safe transmission and safe access to the target data, and executes target data operations based on the smart contract of the block chain; wherein, the data governance module is deployed on the block chain.
  • S320 Provide the data governance module with the data standard of the target data through the data standard module, so that the data governance module can verify and store the target data.
  • the present application does not limit the execution order of S310-S350, which may be determined based on the cooperative working process among multiple modules.
  • storing and sharing the target data according to the unified result of the data specification submodule through the data synthesis submodule may include: using the data source unit to store and share all The data source is integrated and stored; the target data in the stored data source is collected through the data access unit, and the collected target data is standardized according to the data standard; the standardized processing is performed through the data storage unit store the target data; provide target associated data for data application tasks through the data integration unit; perform data value conversion on the target data through the data sharing unit, and share the target data after the data value conversion;
  • the data security unit performs encryption protection and tamper protection on the target data.
  • the method may further include: using a data governance model to provide the data governance policy of the target industry to which the target data belongs; wherein, the data governance model is deployed on the blockchain.
  • the method may further include: using the data governance module to apply for alternative terms as standard terms on the blockchain.
  • applying the alternative words as standard words on the block chain through the data governance module may include: determining the alternative words through the industry selection sub-module The target industry to which the term belongs; through the conversion management sub-module, the alternative term is standardized; through the verification sub-module, the legality of the standardized alternative term is verified based on the smart contract; through The counting submodule provides the general standard words of the whole industry to the verification submodule, so that the verification submodule can perform the legality verification; store the industry standard words of the target industry through the industry standard lexicon; The fetching submodule reads the industry standard wording, and provides the industry standard wording to the verification submodule, so that the verification submodule performs the legality verification; The alternative words for the above-mentioned legality verification are written into the industry standard thesaurus.
  • applying the alternative words as standard words on the block chain through the data governance module may include: within the application time, in the block chain Alternative terms are applied on the chain as standard terms; the application time is calculated by the following formula:
  • T is the time of application
  • (n 3 +n 4 ) is the total number of the alternative words
  • n 3 is the total number of alternative words that have passed the legality verification
  • n 4 is the failed
  • t3 is the time for calling the smart contract once
  • tx is the number of concurrency per second
  • t4 is the block generation time of the blockchain .
  • the embodiment of the present application provides a data governance method, by setting a data governance module, a data standard module, a metadata management module, a data quality management module and a data service module in the data governance device.
  • the data governance module is deployed on the blockchain to use the distributed ledger of the blockchain to verify and store data
  • the consensus mechanism of the blockchain is used to generate and update data
  • the encryption algorithm of the blockchain is used for security. Transfer and securely access data, and perform data operations using blockchain's smart contracts.
  • the data standard module can provide the data standard of the target data
  • the metadata management module can manage the metadata of the target data and analyze the data relationship
  • the data quality management module can manage the data quality of the target data
  • the data service module can provide data governance
  • the module provides data transmission interface.
  • This application uses blockchain technology to achieve efficient and secure data governance, which solves the disadvantages of low efficiency and poor security of data governance in single-point deployment in related technologies, effectively prevents single-point attacks, improves data reliability and security, and Provides a multi-party collaboration path for data management devices to facilitate maintenance and expansion.
  • FIG. 8 is a schematic structural diagram of a computer device provided in Embodiment 4 of the present application.
  • FIG. 8 shows a block diagram of an exemplary computer device 12 suitable for implementing embodiments of the present application.
  • the computer device 12 shown in FIG. 8 is only an example, and should not limit the functions and scope of use of the embodiment of the present application.
  • computer device 12 takes the form of a general-purpose computing device.
  • Components of computer device 12 may include, but are not limited to, one or more processors 16, memory 28, bus 18 connecting various system components including memory 28 and processor 16.
  • Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus structures.
  • these architectures include but are not limited to Industry Standard Architecture (Industry Standard Architecture, ISA) bus, Micro Channel Architecture (MicroChannel Architecture, MAC) bus, Enhanced ISA bus, Video Electronics Standards Association (Video Electronics Standards Association) , VESA) local bus and peripheral component interconnect (Peripheral Component Interconnect, PCI) bus.
  • Computer device 12 typically includes a variety of computer system readable media. These media can be any available media that can be accessed by computer device 12 and include both volatile and nonvolatile media, removable and non-removable media.
  • Memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32 .
  • Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media.
  • storage system 34 may be configured to read and write to non-removable, non-volatile magnetic media (not shown in FIG. 8, commonly referred to as a "hard drive”).
  • a disk drive for reading and writing to a removable nonvolatile disk such as a "floppy disk”
  • a disk drive for removable nonvolatile disks such as a Compact Disc ROM (Compact Disc).
  • Memory 28 may include at least one program product having a set (eg, at least one) of program modules configured to perform the functions of various embodiments of the present application.
  • a program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including but not limited to an operating system, one or more application programs, other program modules, and program data , each or some combination of these examples may include implementations of network environments.
  • the program modules 42 generally perform the functions and/or methods of the embodiments described herein.
  • the computer device 12 may also communicate with one or more external devices 14 (e.g., a keyboard, pointing device, display 24, etc.), and with one or more devices that enable a user to interact with the computer device 12, and/or with Any device (eg, network card, modem, etc.) that enables the computing device 12 to communicate with one or more other computing devices. This communication can be performed through an input/output (Input/Output, I/O) interface 22 .
  • the computer device 12 can also communicate with one or more networks (such as a local area network (Local Area Network, LAN), a wide area network (Wide Area Network, WAN) and/or a public network, such as the Internet) through the network adapter 20.
  • networks such as a local area network (Local Area Network, LAN), a wide area network (Wide Area Network, WAN) and/or a public network, such as the Internet
  • network adapter 20 communicates with other modules of computer device 12 via bus 18 .
  • other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, disk arrays (Redundant Arrays of Independent Disks, RAID) systems, tape drives, and data backup storage systems.
  • the processor 16 implements the data governance device provided by the embodiment of the present application by running the program stored in the memory 28, including: a data governance module, a data standard module, a metadata management module, a data quality management module and a data service module;
  • the data governance module is deployed on the block chain, and is set to verify and store the target data through the distributed ledger of the block chain, and generate the target data through the consensus mechanism of the block chain and update, carry out secure transmission and safe access to the target data through the encryption algorithm of the block chain, and perform target data operations through the smart contract of the block chain
  • the data standard module is set to be the The data governance module provides the data standard of the target data, so that the data governance module verifies and stores the target data
  • the metadata management module is set to the target data stored in the data governance module Metadata management and data relationship analysis
  • the data quality management module is configured to perform data quality management on the target data stored in the data governance module
  • the data service module is configured to be the data governance module Provide data transmission interface.
  • Embodiment 5 of the present application provides a computer-readable storage medium on which a computer program is stored.
  • the data governance device provided in the embodiment of the present application is realized, including: a data governance module, a data standard module, a metadata management module, a data quality management module, and a data service module; wherein: the data governance module is deployed on the block chain, and is configured to verify and store the target data through the distributed ledger of the block chain, The target data is generated and updated through the consensus mechanism of the block chain, the target data is safely transmitted and accessed through the encryption algorithm of the block chain, and the smart contract of the block chain Execute target data operations; the data standard module is configured to provide the data standard of the target data for the data governance module, so that the data governance module can verify and store the target data; the metadata management module, configured to manage the metadata of the target data stored in the data governance module, and perform data relationship analysis; the data quality management module, configured to perform data quality management on the target data stored in the data governance module Management; the data
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof.
  • Computer-readable storage media may also include (a non-exhaustive list): electrical connections with one or more conductors, portable computer disks, hard disks, RAM, ROM, Erasable Programmable Read-Only Memory (Erasable Programmable Read-Only Memory) Memory, EPROM) or flash memory, optical fiber, CD-ROM, optical storage device, magnetic storage device, or any suitable combination of the above.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a data signal carrying computer readable program code in baseband or as part of a carrier wave. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device. .
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • Computer program codes for performing the operations of the present application may be written in one or more programming languages or combinations thereof, including object-oriented programming languages such as Java, Smalltalk, C++, and conventional Procedural Programming Language - such as "C" or a similar programming language.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or computing device.
  • the remote computer can be connected to the user computer through any kind of network, including a LAN or WAN, or it can be connected to an external computer (for example via the Internet using an Internet service provider).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本申请实施例公开了一种数据治理装置、方法、设备及存储介质。其中,装置包括:数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块;数据治理模块部署于区块链上,设置为通过区块链的分布式账本对目标数据进行验证和存储,通过区块链的共识机制对目标数据进行生成和更新,通过区块链的加密算法对目标数据进行安全传输和安全访问,通过区块链的智能合约执行目标数据操作;数据标准模块设置为提供数据标准;元数据管理模块设置为对元数据进行管理和数据关系分析;数据质量管理模块设置为数据质量管理;数据服务模块设置为提供数据传输接口。

Description

数据治理装置、方法、计算机设备及存储介质
本申请要求在2021年07月30日提交中国专利局、申请号为202110875003.X的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及数据治理技术领域,例如涉及一种数据治理装置、方法、计算机设备及存储介质。
背景技术
数据治理是指从使用零散数据变为使用统一主数据、从很少或没有组织和流程治理到确定范围内的综合数据治理、从主数据混乱状况到主数据井井有条的一个过程。数据治理是一种数据管理概念,涉及使组织能够确保在数据的整个生命周期中存在高数据质量的能力。数据治理对于确保数据的准确、适度分享和保护是至关重要的。有效的数据治理计划会通过改进决策、缩减成本、降低风险和提高安全合规等方式,将价值回馈于业务,并最终体现为增加收入和利润。
单点部署的数据治理平台在数据维护、数据扩展和数据安全方面具有潜在的问题,其针对当前数据标准的数据的产生和利用仅停留在封闭环境之内,无法高效利用行业资源,且在数据安全策略上无法有效应对单点攻击。
发明内容
本申请实施例提供一种数据治理装置、方法、计算机设备及存储介质,以有效的防止单点攻击,提升数据可靠性和安全性,且提供数据治理装置的多方协作路径,方便维护与扩展。
本申请实施例提供了一种数据治理装置,包括:数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块;其中:
所述数据治理模块部署于区块链上,设置为通过所述区块链的分布式账本对目标数据进行验证和存储,通过所述区块链的共识机制对所述目标数据进行生成和更新,通过所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及通过所述区块链的智能合约执行目标数据操作;
所述数据标准模块,设置为为所述数据治理模块提供所述目标数据的数据标准,以使所述数据治理模块对所述目标数据进行验证和存储;
所述元数据管理模块,设置为对所述数据治理模块中存储的目标数据的元 数据进行管理和数据关系分析;
所述数据质量管理模块,设置为根据所述数据标准模块提供的所述数据标准,对所述数据治理模块中存储的目标数据进行数据质量管理;
所述数据服务模块,设置为为所述数据治理模块提供数据传输接口。
本申请实施例还提供了一种数据治理方法,应用于数据治理装置,包括:
通过数据治理模块,基于区块链的分布式账本对目标数据进行验证和存储,基于所述区块链的共识机制对所述目标数据进行生成和更新,基于所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及基于所述区块链的智能合约执行目标数据操作;其中,所述数据治理模块部署于所述区块链上;
通过数据标准模块为所述数据治理模块提供所述目标数据的数据标准,以使所述数据治理模块对所述目标数据进行验证和存储;
通过元数据管理模块对所述数据治理模块中存储的目标数据的元数据进行管理,并进行数据关系分析;
通过数据质量管理模块,根据所述数据标准模块提供的所述数据标准,对所述数据治理模块中存储的目标数据进行数据质量管理;
通过数据服务模块为所述数据治理模块提供数据传输接口。
本申请实施例还提供了一种计算机设备,所述计算机设备包括:
至少一个处理器;
存储装置,设置为存储至少一个程序;
当所述至少程序被所述至少一个处理器执行时,实现本申请任意实施例所提供的数据治理装置。
本申请实施例还提供了一种计算机存储介质,其上存储有计算机程序,该程序被处理器执行时实现本申请任意实施例所提供的数据治理装置。
附图说明
图1为本申请实施例一提供的一种数据治理装置的结构示意图;
图2为本申请实施例一提供的一种数据平台的结构示意图;
图3为本申请实施例二提供的一种数据治理装置的结构示意图;
图4为本申请实施例二提供的一种数据治理模块的结构示意图;
图5为本申请实施例二提供的一种数据治理模型的示意图;
图6为本申请实施例二提供的一种备选用词申请为标准用词的审核时间的示意图;
图7为本申请实施例三提供的一种数据治理方法的流程图;
图8为本申请实施例四提供的一种计算机设备的结构示意图。
具体实施方式
下面结合附图和实施例对本申请作说明。可以理解的是,此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。
另外还需要说明的是,为了便于描述,附图中仅示出了与本申请相关的部分而非全部内容。在讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将多项操作(或步骤)描述成顺序的处理,但是其中的许多操作可以被并行地、并发地或者同时实施。此外,多项操作的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。
实施例一
图1为本申请实施例一提供的一种数据治理装置的结构示意图,本实施例可适用于进行数据治理的情况,可以由软件和/或硬件的方式来实现,并一般可集成在计算机设备中。如图1所示,所述装置包括:数据治理模块110、数据标准模块120、元数据管理模块130、数据质量管理模块140和数据服务模块150。
数据治理模块110部署于区块链上,设置为通过所述区块链的分布式账本对目标数据进行验证和存储,通过所述区块链的共识机制对所述目标数据进行生成和更新,通过所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及通过所述区块链的智能合约执行目标数据操作。
数据标准模块120,设置为为数据治理模块110提供所述目标数据的数据标准,以使数据治理模块110对所述目标数据进行验证和存储。
元数据管理模块130,设置为对数据治理模块110中存储的所述目标数据的元数据进行管理和数据关系分析。
数据质量管理模块140,设置为根据数据标准模块120提供的所述数据标准,对数据治理模块110中存储的所述目标数据进行数据质量管理。
数据服务模块150,设置为为数据治理模块110提供数据传输接口。
目标数据可以是作为数据治理对象的任意数据,可以是任意行业中的数据,在此不做限定。数据治理模块110部署于区块链上,区块链具有块链式结构,分布式账本可以对块链式结构的目标数据进行分布式管理,区块链网络中的多个网络节点均可以对目标数据进行验证并存储,从而可以实现目标数据的去中心化存储,当数据治理模块110中存储的目标数据发生变化时,任意节点引起的变化均需要通过其他节点的认可。共识机制可以是在区块链网络的节点之间对同一时间窗口内的区块链网络的事务的先后顺序达成共识的算法,则通过共识机制对数据治理模块110中存储的目标数据进行生成和更新,可以确保目标数据的真实性和完整性。加密算法可以用于对原本为明文的目标数据进行加密处理,则可以确保目标数据在传输和访问过程中不会被非法获取,实现目标数据的安全传输和安全访问。智能合约可以用于在得到规定条件时自动执行合约中的条款,则可以在条件满足时自动执行对应的目标数据操作,目标数据操作可以是在满足规定条件下触发的针对目标数据的数据处理操作,目标数据操作的触发条件和操作内容可以预先对应设置,在此不做限定。
数据标准模块120可以管理目标数据的数据标准,数据标准可以是用于描述目标数据的任意维度的特征的数据,可以根据对目标数据进行数据治理的需要预先设定,在此不做限定。例如目标数据为身份证号码,则数据标准可以是字符长度为16位。数据标准模块120与数据治理模块110之间可以互相进行访问,从而数据标准模块120将数据标准提供至数据治理模块110。数据治理模块110根据数据标准模块120提供的数据标准,可以判断需要验证并存储的目标数据是否满足数据标准,从而可以对满足数据标准的目标数据进行存储。可选的,还可以对不满足数据标准的目标数据进行修正使得修正后的目标数据满足数据标准,并将修正后的目标数据进行存储。
元数据管理模块130与数据治理模块110之间可以互相进行访问,从而元数据管理模块130可以对数据治理模块110中存储的所述目标数据的元数据进行管理。元数据可以是用于描述目标数据及其环境的数据,例如可以包括数据表、字段的名称和类型,以及物理位置等。数据关系分析可以是对元数据进行溯源和/或分析目标数据之间的影响和关系的操作。可选的,数据关系分析可以包括数据影响分析和数据血缘分析。
数据质量管理模块140与数据治理模块110之间可以互相进行访问,从而数据质量管理模块140可以读取数据治理模块110中存储的目标数据,并根据预设策略对目标数据进行数据质量管理,以使数据治理模块110中存储的目标数据的质量满足数据治理的需要,提升数据可靠性。可选的,数据质量管理模块140还可以根据数据标准模块120提供的数据标准对目标数据进行数据质量管理,以二次确保数据治理模块110中存储的目标数据满足数据标准。
数据服务模块150与数据治理模块110之间可以互相进行访问,从而数据治理模块110可以调用数据服务模块150提供的数据传输接口,以接入至数据源以采集目标数据,或接入至数据共享渠道以提供目标数据,或接入其他任意渠道并进行对目标数据的传输,在此不做限定。
可选的,数据治理装置可以部署于数据平台中,用于对数据平台中的数据进行数据治理。图2为本申请实施例一提供的一种数据平台的结构示意图。在一个例子中,如图2所示,数据平台中包括区块链系统,和可以部署于区块链系统中的数据治理系统。数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块与数据治理系统之间可以互相进行访问,从而向数据治理系统提供服务,以使数据治理系统可以调用该些服务,并基于区块链系统进行数据治理。
本申请实施例提供了一种数据治理装置,在数据治理装置中设置有数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块,其中,将数据治理模块部署于区块链上,以利用区块链的分布式账本进行验证和存储数据,利用区块链的共识机制进行生成和更新数据,利用区块链的加密算法进行安全传输和安全访问数据,以及利用区块链的智能合约执行数据操作,数据标准模块可以提供目标数据的数据标准,元数据管理模块可以对目标数据的元数据进行管理和数据关系分析,数据质量管理模块可以对目标数据进行数据质量管理,以及数据服务模块可以为数据治理模块提供数据传输接口。上述装置利用区块链技术实现高效、安全的数据治理,解决了相关技术中单点部署的数据治理的效率低、安全性差的弊端,有效防止单点攻击,提升数据可靠性和安全性,且提供了数据治理装置的多方协作路径,方便维护与扩展。
实施例二
图3为本申请实施例二提供的一种数据治理装置的结构示意图。如图3所示,本申请实施例以上述实施例为基础,可选的,对数据治理模块的内部结构进行说明。本实施例中,数据治理模块110包括数据规范子模块1101和数据综合子模块1102。
数据规范子模块1101,设置为对所述目标数据的命名、定义、类型及计算方法进行统一,并对来自不同数据源的所述目标数据的分类流程、压缩流程和加密流程进行统一。
数据综合子模块1102,设置为根据数据规范子模块1101的统一结果,对所述目标数据进行存储和共享。数据综合子模块1102可以与数据规范子模块1101 连接。
数据治理过程需要统一的命名、定义、类型及计算方法,以使目标数据满足数据标注以及对数据质量的需求。目标数据可以来自于不同的数据源,则对于来自不同数据源的目标数据,数据治理过程需要进行统一的分类、压缩和加密,从而使来自不同数据源的目标数据满足数据标准和质量需求。
根据数据规范子模块1101的统一结果,数据综合子模块1102可以确定数据治理过程中目标数据的命名、定义、类型及计算方法,以及对来自不同数据源的目标数据进行分类、压缩和加密的流程,从而可以对目标数据进行存储和共享。
图4为本申请实施例二提供的一种数据治理模块的结构示意图。如图4所示,在本申请实施例的一个可选实施方式中,数据综合子模块1102,可以包括:数据源单元、数据接入单元、数据存储单元、数据集成单元、数据共享单元和数据安全单元。
数据源单元,设置为对全部所述数据源进行整合和存储;数据接入单元,设置为对存储后的数据源中的目标数据进行采集,并根据所述数据标准对采集到的目标数据进行标准化处理,数据接入单元可以与数据源单元连接;数据存储单元,设置为对标准化处理后的目标数据进行存储,数据存储单元可以与数据接入单元连接;数据集成单元,设置为为数据应用任务提供目标关联数据,数据集成单元可与数据存储单元连接;数据共享单元,设置为对所述目标数据进行数据价值转换,并对所述数据价值转换后的目标数据进行共享,数据共享单元可以与数据存储单元连接;数据安全单元,设置为对所述目标数据进行加密防护和篡改防护,数据安全单元可以与数据存储单元和/或数据共享单元连接。
由于目标数据可以来自于不同的数据源,则可以先通过数据源单元对全部数据源进行整合,并将整合后的数据源存储在数据治理模块110中。继而可以通过数据接入单元访问整合并存储的数据源,对不同数据源中的目标数据进行采集,并对采集到的目标数据进行标准化处理,以使目标数据满足数据标准。对于标准化处理后的已满足数据标准的目标数据,再通过数据存储单元进行存储,使其分布式存储于区块链中。数据集成单元可以在接收到数据应用任务时,在存储的目标数据中获取数据应用任务需要的目标关联数据,并向数据应用任务提供目标关联数据,数据应用任务可以是任意需要对特定的目标数据进行应用的任务,目标关联数据可以是需要应用的特定的目标数据。数据共享单元可以对所述目标数据进行数据价值转换,数据价值转换可以是将目标数据转化为可以被利用的数据或指标的操作,数据共享单元还可以在对目标数据进行数据价值转换后进行数据共享,例如可以将数据价值转换后的目标数据提供至数据 平台的业务层。数据安全单元可以对目标数据进行加密防护和篡改防护,加密防护可以是基于加密算法对目标数据进行加密处理,篡改防护可以是基于防篡改算法提高对目标数据的篡改成本。
在本申请实施例的一个可选实施方式中,所述装置还可以包括:数据治理模型。
数据治理模型部署于所述区块链,设置为提供所述目标数据所属的目标行业的数据治理策略。数据治理策略可以是根据目标行业中对目标数据的应用需求所设定的任意对数据进行处理的策略。
基于区块链可以实现数据治理模型的模型结构,根据区块链的分布式账本、加密算法、共识机制和智能合约以及数据治理模型所提供的数据治理策略实现对数据的有效治理,以使目标数据可以满足目标行业中的应用需求。
示例性的,图5为本申请实施例二提供的一种数据治理模型的示意图。如图5所示,基于区块链部署的模型结构中包括基于用户的身份认证和加解密机制的数据安全合规模型结构,基于智能合约以及用户数据更新的数据标准化模型结构,基于共识机制和分布式账本响应于用户的数据质量管理模型结构,以及数据安全合规模型结构、数据标准化模型结构和数据质量管理模型结构之间的协同治理模型结构。
在本申请实施例的一个可选实施方式中,数据治理模块110,还可以设置为:在所述区块链上将备选用词申请为标准用词。
备选用词可以是目标数据在所属的目标行业中被部分人群采用的名称标识。标准用词可以是目标数据在所属的目标行业中所通用的名称标识。
数据治理模块110可以在其所部署的区块链中,将备选用词申请为标准用词,以使备选用词可以被区块链网络中的节点通用,数据治理模块110根据该备选用词进行数据治理。将备选用词申请为标准用词,需要对备选用词进行验证,在确定其不属于无效用词或缺损用词,且与当前存在的标准用词之间不存在同义或重复的情况下,可以将该备选用词确定为标准用词。
可选的,备选用词可以以文件的形式提交。例如,可以获取需要申请成为标准用词的备选用词的数据表,并将数据表整理完善至文件中。
在本申请实施例的一个可选实施方式中,数据治理模块110,可以包括:行业选择子模块、转换管理子模块、验证子模块、计数子模块、行业标准词库、读取子模块和写入子模块。
行业选择子模块,设置为确定所述备选用词所属的目标行业;转换管理子模块,设置为对所述备选用词进行标准化处理;验证子模块,设置为通过所述 智能合约对所述标准化处理后的备选用词进行合法性验证,验证子模块可以与转换管理子模块连接;计数子模块,设置为提供全行业的通用标准用词至所述验证子模块,以使所述验证子模块进行所述合法性验证,计数子模块可以与验证子模块连接;行业标准词库,设置为存储所述目标行业的行业标准用词;读取子模块,设置为读取所述行业标准用词,并将所述行业标准用词提供至所述验证子模块,以使所述验证子模块进行所述合法性验证,读取子模块可以与行业标准词库以及验证子模块连接;读取子模块还可以与行业选择子模块连接,设置为根据所述行业选择子模块确定的备选用词所属的目标行业,读取所述目标行业的行业标准用词,并将所述行业标准用词提供至所述验证子模块,以使所述验证子模块进行合法性验证;写入子模块,设置为将通过所述合法性验证的备选用词写入至所述行业标准词库,写入子模块可以与行业标准词库以及验证子模块连接。
可以首先提交需要申请为标准用词的备选用词,并通过行业选择子模块选择备选用词所属目标行业。转换管理子模块可以对提交的备选用词进行标准化处理,即根据对标准用词的需求对备选用词进行处理,将其中存在的问题进行处理,并统一备选用词的格式。验证子模块可以针对标准化处理后的每个备选用词,调用智能合约进行合法性验证,以判断备选用词是否可以作为标准用词存储至区块链中。
计数子模块可以高效完整地统计全行业的通用标准用词,并提供至验证子模块。行业标准词库中存储有目标行业的行业标准用词。读取子模块则可以对行业标准词库执行读取操作,读取其中的行业标准用词,并将读取的行业标准用词提供至所述验证子模块。验证子模块对备选用词进行合法性验证时,可以根据全行业的通用标准用词和目标行业的行业标准用词,以对备选用词进行比对和验证。对于通过合法性验证的备选用词,可以被确定为标准用词并存储至区块链中,则可以通过写入子模块,将通过合法性验证的备选用词写入至行业标准库,以更新行业标准库中存储的标准用词,确保行业标准库中标准用词的完整性。
在本申请实施例的一个可选实施方式中,数据治理模块110,是设置为:在申请时间内,在所述区块链上将备选用词申请为标准用词。
其中,所述申请时间可以通过以下公式计算:
Figure PCTCN2022107571-appb-000001
其中,T为所述申请时间,(n 3+n 4)为所述备选用词的总数量,n 3为通过所述合法性验证的备选用词的总数量,n 4为未通过所述合法性验证的备选用词的 总数量,t 3为调用一次所述智能合约的时间,tx为每秒并发数,t 4为所述区块链的区块生成时间。
所有被提交的备选用词的总数量为(n 3+n 4),则需要依次针对所有备选用词调用智能合约进行验证对比,然后针对符合要求的n 3数量的备选用词,需要再次调用智能合约写入区块链中。若调用一次智能合约所用时间为t 3,并考虑到每秒的并发数为tx,区块的生成时间为t 4,即可得到上述申请时间的计算公式。
在相关技术所提供的数据治理装置中,将备选用词申请为标准用词需要由审查人员进行审查,其申请时间的计算公式如下:
Figure PCTCN2022107571-appb-000002
其中,T为申请时间,t 1为审查所用时间,n 1为备选用词的数量,n 2为备选用词梳理量,
Figure PCTCN2022107571-appb-000003
为审核所需要的时间,取时间指数函数的积分,其概率密度函数为f(t)=e -(0.08t-0.08)
图6为本申请实施例二提供的一种备选用词申请为标准用词的申请时间的示意图。如图6所示,其中图中每个点对应的横坐标表示备选用词的数量,纵坐标表示需要的申请时间。经实际操作估算,两种模型中的n 1、n 2、n 3和n 4的数量均占总审核备选用词数量的50%,相关技术中t 1为1分钟,根据实验监测得到的本申请中t 3为0.012秒,以一个区块生成的平均时间得到本申请中t 4为13.55秒,当用户将相同数量备选用词申请为标准用词时,本申请中区块链所用的审核时间明显比相关技术中所用时间短,且申请的备选用词数量越多,两者耗时差距越明显;本申请在申请验证过程中时间效率显然优于相关技术。
因此,上述实施方式在对备选用词申请为标准用词时,能够有效的缩短备选用词申请为标准用词的时间,缩短了数据平台处理数据的时间,提高了数据平台的效率,避免了相关技术中的人工审核模式审查人员的权威性过大的隐患,为人员的使用带来了便捷,减轻了数据平台的负担,延长了数据平台的运行时间,方便人员的使用。
本申请实施例提供了一种数据治理装置,在数据治理装置中设置有数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块,其中,将数据治理模块部署于区块链上,以利用区块链的分布式账本进行验证和存储数据,利用区块链的共识机制进行生成和更新数据,利用区块链的加密算法进行安全传输和安全访问数据,以及利用区块链的智能合约执行数据操作,数据标准模块可以提供目标数据的数据标准,元数据管理模块可以对目标数据的元数据进行管理和数据关系分析,数据质量管理模块可以对目标数据进行数 据质量管理,以及数据服务模块可以为数据治理模块提供数据传输接口上述装置利用区块链技术实现高效、安全的数据治理,解决了相关技术中单点部署的数据治理的效率低、安全性差的弊端,有效防止单点攻击,提升数据可靠性和安全性,且提供了数据治理装置的多方协作路径,方便维护与扩展。
实施例三
图7是本申请实施例三提供的一种数据治理方法的流程图,本实施例可适设置为进行数据治理的情况,该方法可以由本申请实施例提供的数据治理装置来执行,该装置可以由软件和/或硬件的方式来实现,并一般可集成在计算机设备中。如图7所示,该方法包括如下操作:
S310、通过数据治理模块,基于区块链的分布式账本对目标数据进行验证和存储,基于所述区块链的共识机制对所述目标数据进行生成和更新,基于所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及基于所述区块链的智能合约执行目标数据操作;其中,所述数据治理模块部署于所述区块链上。
S320、通过数据标准模块为所述数据治理模块提供所述目标数据的数据标准,以使所述数据治理模块对所述目标数据进行验证和存储。
S330、通过元数据管理模块对所述数据治理模块中存储的目标数据的元数据进行管理和数据关系分析。
S340、通过数据质量管理模块对所述数据治理模块中存储的目标数据进行数据质量管理。
S350、通过数据服务模块为所述数据治理模块提供数据传输接口。
本申请对S310~S350之间的执行顺序不做限定,其可以基于多个模块之间的协同工作过程确定。
在本申请实施例的一个可选实施方式中,通过数据治理模块,基于区块链的分布式账本对目标数据进行验证和存储,基于所述区块链的共识机制对所述目标数据进行生成和更新,基于所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及基于所述区块链的智能合约执行目标数据操作,可以包括:通过数据规范子模块对所述目标数据的命名、定义、类型及计算方法进行统一,并对来自不同数据源的目标数据的分类流程、压缩流程和加密流程进行统一;通过数据综合子模块,根据所述数据规范子模块的统一结果,对所述目标数据进行存储和共享。
在本申请实施例的一个可选实施方式中,通过数据综合子模块,根据所述数据规范子模块的统一结果,对所述目标数据进行存储和共享,可以包括:通过数据源单元对全部所述数据源进行整合和存储;通过数据接入单元对存储后的数据源中的目标数据进行采集,并根据所述数据标准对采集到的目标数据进行标准化处理;通过数据存储单元对标准化处理后的目标数据进行存储;通过数据集成单元为数据应用任务提供目标关联数据;通过数据共享单元对所述目标数据进行数据价值转换,并对所述数据价值转换后的所述目标数据进行共享;通过数据安全单元对所述目标数据进行加密防护和篡改防护。
在本申请实施例的一个可选实施方式中,所述方法,还可以包括:通过数据治理模型提供所述目标数据所属的目标行业的数据治理策略;其中,所述数据治理模型部署于所述区块链。
在本申请实施例的一个可选实施方式中,所述方法,还可以包括:通过所述数据治理模块在所述区块链上将备选用词申请为标准用词。
在本申请实施例的一个可选实施方式中,通过所述数据治理模块在所述区块链上将备选用词申请为标准用词,可以包括:通过行业选择子模块确定所述备选用词所属的目标行业;通过转换管理子模块对所述备选用词进行标准化处理;通过验证子模块,基于所述智能合约对所述标准化处理后的备选用词进行合法性验证;通过计数子模块提供全行业的通用标准用词至所述验证子模块,以使所述验证子模块进行所述合法性验证;通过行业标准词库存储所述目标行业的行业标准用词;通过读取子模块读取所述行业标准用词,并将所述行业标准用词提供至所述验证子模块,以使所述验证子模块进行所述合法性验证;通过写入子模块将通过所述合法性验证的备选用词写入至所述行业标准词库。
在本申请实施例的一个可选实施方式中,通过所述数据治理模块在所述区块链上将备选用词申请为标准用词,可以包括:在申请时间内,在所述区块链上将备选用词申请为标准用词;所述申请时间通过以下公式计算:
Figure PCTCN2022107571-appb-000004
其中,T为所述申请时间,(n 3+n 4)为所述备选用词的总数量,n 3为通过所述合法性验证的备选用词的总数量,n 4为未通过所述合法性验证的备选用词的总数量,t 3为调用一次所述智能合约的时间,tx为每秒并发数,t 4为所述区块链的区块生成时间。
本申请实施例提供了一种数据治理方法,通过在数据治理装置中设置有数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务 模块。其中,将数据治理模块部署于区块链上,以利用区块链的分布式账本进行验证和存储数据,利用区块链的共识机制进行生成和更新数据,利用区块链的加密算法进行安全传输和安全访问数据,以及利用区块链的智能合约执行数据操作。数据标准模块可以提供目标数据的数据标准,元数据管理模块可以对目标数据的元数据进行管理和数据关系分析,数据质量管理模块可以对目标数据进行数据质量管理,以及数据服务模块可以为数据治理模块提供数据传输接口。本申请利用区块链技术实现高效、安全的数据治理,解决了相关技术中单点部署的数据治理的效率低、安全性差的弊端,有效防止单点攻击,提升数据可靠性和安全性,且提供了数据治理装置的多方协作路径,方便维护与扩展。
实施例四
图8为本申请实施例四提供的一种计算机设备的结构示意图。图8示出了适于用来实现本申请实施方式的示例性计算机设备12的框图。图8显示的计算机设备12仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图8所示,计算机设备12以通用计算设备的形式表现。计算机设备12的组件可以包括但不限于:一个或者多个处理器16,存储器28,连接不同系统组件(包括存储器28和处理器16)的总线18。
总线18表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。举例来说,这些体系结构包括但不限于工业标准体系结构(Industry Standard Architecture,ISA)总线,微通道体系结构(MicroChannel Architecture,MAC)总线,增强型ISA总线、视频电子标准协会(Video Electronics Standards Association,VESA)局域总线以及外围组件互连(Peripheral Component Interconnect,PCI)总线。
计算机设备12典型地包括多种计算机系统可读介质。这些介质可以是任何能够被计算机设备12访问的可用介质,包括易失性和非易失性介质,可移动的和不可移动的介质。
存储器28可以包括易失性存储器形式的计算机系统可读介质,例如随机存取存储器(Random Access Memory,RAM)30和/或高速缓存存储器32。计算机设备12可以进一步包括其它可移动/不可移动的、易失性/非易失性计算机系统存储介质。仅作为举例,存储系统34可以设置为读写不可移动的、非易失性磁介质(图8未显示,通常称为“硬盘驱动器”)。尽管图8中未示出,可以 提供用于对可移动非易失性磁盘(例如“软盘”)读写的磁盘驱动器,以及对可移动非易失性光盘(例如光盘只读存储器(Compact Disc Read-Only Memory,CD-ROM),数字视频光盘只读存储器(Digital Video Disc Read-Only Memory,DVD-ROM)或者其它光介质)读写的光盘驱动器。在这些情况下,每个驱动器可以通过一个或者多个数据介质接口与总线18相连。存储器28可以包括至少一个程序产品,该程序产品具有一组(例如至少一个)程序模块,这些程序模块被配置以执行本申请多个实施例的功能。
具有一组(至少一个)程序模块42的程序/实用工具40,可以存储在例如存储器28中,这样的程序模块42包括但不限于操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。程序模块42通常执行本申请所描述的实施例中的功能和/或方法。
计算机设备12也可以与一个或多个外部设备14(例如键盘、指向设备、显示器24等)通信,还可与一个或者多个使得用户能与该计算机设备12交互的设备通信,和/或与使得该计算机设备12能与一个或多个其它计算设备进行通信的任何设备(例如网卡,调制解调器等等)通信。这种通信可以通过输入/输出(Input/Output,I/O)接口22进行。并且,计算机设备12还可以通过网络适配器20与一个或者多个网络(例如局域网(Local Area Network,LAN),广域网(Wide Area Network,WAN)和/或公共网络,例如因特网)通信。如图所示,网络适配器20通过总线18与计算机设备12的其它模块通信。应当明白,尽管图8中未示出,可以结合计算机设备12使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、磁盘阵列(Redundant Arrays of Independent Disks,RAID)系统、磁带驱动器以及数据备份存储系统等。
处理器16通过运行存储在存储器28中的程序,从而实现本申请实施例所提供的数据治理装置,包括:数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块;其中:所述数据治理模块部署于区块链上,设置为通过所述区块链的分布式账本对目标数据进行验证和存储,通过所述区块链的共识机制对所述目标数据进行生成和更新,通过所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及通过所述区块链的智能合约执行目标数据操作;所述数据标准模块,设置为为所述数据治理模块提供所述目标数据的数据标准,以使所述数据治理模块对所述目标数据进行验证和存储;所述元数据管理模块,设置为对所述数据治理模块中存储的目标数据的元数据进行管理,并进行数据关系分析;所述数据质量管理模块,设置为对所述数据治理模块中存储的目标数据进行数据质量管理;所述数据服务模块,设置为为 所述数据治理模块提供数据传输接口。
实施例五
本申请实施例五提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时,实现本申请实施例所提供的数据治理装置,包括:数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块;其中:所述数据治理模块部署于区块链上,设置为通过所述区块链的分布式账本对目标数据进行验证和存储,通过所述区块链的共识机制对所述目标数据进行生成和更新,通过所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及通过所述区块链的智能合约执行目标数据操作;所述数据标准模块,设置为为所述数据治理模块提供所述目标数据的数据标准,以使所述数据治理模块对所述目标数据进行验证和存储;所述元数据管理模块,设置为对所述数据治理模块中存储的目标数据的元数据进行管理,并进行数据关系分析;所述数据质量管理模块,设置为对所述数据治理模块中存储的目标数据进行数据质量管理;所述数据服务模块,设置为为所述数据治理模块提供数据传输接口。
可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质还可以(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、RAM、ROM、可擦式可编程只读存储器(Erasable Programmable Read-Only Memory,EPROM)或闪存、光纤、CD-ROM、光存储器件、磁存储器件、或者上述的任意合适的组合。在本文件中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、电线、光缆、RF等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言或其组合来编写用于执行本申请操作的计算机程序代码,所述程序设计语言包括面向对象的程序设计语言,诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或计算机设备上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络,包括LAN或WAN,连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。

Claims (10)

  1. 一种数据治理装置,包括:数据治理模块、数据标准模块、元数据管理模块、数据质量管理模块和数据服务模块;其中:
    所述数据治理模块部署于区块链上,设置为通过所述区块链的分布式账本对目标数据进行验证和存储,通过所述区块链的共识机制对所述目标数据进行生成和更新,通过所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及通过所述区块链的智能合约执行目标数据操作;
    所述数据标准模块,设置为为所述数据治理模块提供所述目标数据的数据标准,以使所述数据治理模块对所述目标数据进行验证和存储;
    所述元数据管理模块,设置为对所述数据治理模块中存储的目标数据的元数据进行管理和数据关系分析;
    所述数据质量管理模块,设置为对所述数据治理模块中存储的目标数据进行数据质量管理;
    所述数据服务模块,设置为为所述数据治理模块提供数据传输接口。
  2. 根据权利要求1所述的装置,其中,所述数据治理模块,包括:数据规范子模块和数据综合子模块;其中:
    所述数据规范子模块,设置为对所述目标数据的命名、定义、类型及计算方法进行统一,并对来自不同数据源的目标数据的分类流程、压缩流程和加密流程进行统一;
    所述数据综合子模块,设置为根据所述数据规范子模块的统一结果,对所述目标数据进行存储和共享。
  3. 根据权利要求2所述的装置,其中,所述数据综合子模块,包括:数据源单元、数据接入单元、数据存储单元、数据集成单元、数据共享单元和数据安全单元;其中:
    所述数据源单元,设置为对全部所述数据源进行整合和存储;
    所述数据接入单元,设置为对存储后的数据源中的目标数据进行采集,并根据所述数据标准对采集到的目标数据进行标准化处理;
    所述数据存储单元,设置为对标准化处理后的目标数据进行存储;
    所述数据集成单元,设置为为数据应用任务提供目标关联数据;
    所述数据共享单元,设置为对所述目标数据进行数据价值转换,并对所述数据价值转换后的目标数据进行共享;
    所述数据安全单元,设置为对所述目标数据进行加密防护和篡改防护。
  4. 根据权利要求1所述的装置,还包括:数据治理模型;
    所述数据治理模型部署于所述区块链,设置为提供所述目标数据所属的目标行业的数据治理策略。
  5. 根据权利要求1所述的装置,其中,所述数据治理模块,还设置为:在所述区块链上将备选用词申请为标准用词。
  6. 根据权利要求5所述的装置,其中,所述数据治理模块,包括:行业选择子模块、转换管理子模块、验证子模块、计数子模块、行业标准词库、读取子模块和写入子模块;其中:
    所述行业选择子模块,设置为确定所述备选用词所属的目标行业;
    所述转换管理子模块,设置为对所述备选用词进行标准化处理;
    所述验证子模块,设置为通过所述智能合约对所述标准化处理后的备选用词进行合法性验证;
    所述计数子模块,设置为提供全行业的通用标准用词至所述验证子模块,以使所述验证子模块进行所述合法性验证;
    所述行业标准词库,设置为存储所述目标行业的行业标准用词;
    所述读取子模块,设置为读取所述行业标准用词,并将所述行业标准用词提供至所述验证子模块,以使所述验证子模块进行所述合法性验证;
    所述写入子模块,设置为将通过所述合法性验证的备选用词写入至所述行业标准词库。
  7. 根据权利要求6所述的装置,其中,所述数据治理模块,是设置为:在申请时间内,在所述区块链上将备选用词申请为标准用词;
    所述申请时间通过以下公式计算:
    Figure PCTCN2022107571-appb-100001
    其中,T为所述申请时间,(n 3+n 4)为所述备选用词的总数量,n 3为通过所述合法性验证的备选用词的总数量,n 4为未通过所述合法性验证的备选用词的总数量,t 3为调用一次所述智能合约的时间,tx为每秒并发数,t 4为所述区块链的区块生成时间。
  8. 一种数据治理方法,应用于数据治理装置,包括:
    通过数据治理模块,基于区块链的分布式账本对目标数据进行验证和存储,基于所述区块链的共识机制对所述目标数据进行生成和更新,基于所述区块链的加密算法对所述目标数据进行安全传输和安全访问,以及基于所述区块链的智能合约执行目标数据操作;其中,所述数据治理模块部署于所述区块链上;
    通过数据标准模块为所述数据治理模块提供所述目标数据的数据标准,以使所述数据治理模块对所述目标数据进行验证和存储;
    通过元数据管理模块对所述数据治理模块中存储的目标数据的元数据进行管理和数据关系分析;
    通过数据质量管理模块对所述数据治理模块中存储的目标数据进行数据质 量管理;
    通过数据服务模块为所述数据治理模块提供数据传输接口。
  9. 一种计算机设备,包括:
    至少一个处理器;
    存储装置,设置为存储至少一个程序;
    所述至少一个程序被所述至少一个处理器执行时,实现如权利要求1-7中任一所述的数据治理装置。
  10. 一种计算机存储介质,其上存储有计算机程序,该程序被处理器执行时实现如权利要求1-7中任一所述的数据治理装置。
PCT/CN2022/107571 2021-07-30 2022-07-25 数据治理装置、方法、计算机设备及存储介质 WO2023005862A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110875003.X 2021-07-30
CN202110875003.XA CN113612766B (zh) 2021-07-30 2021-07-30 数据治理装置、方法、计算机设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023005862A1 true WO2023005862A1 (zh) 2023-02-02

Family

ID=78306304

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/107571 WO2023005862A1 (zh) 2021-07-30 2022-07-25 数据治理装置、方法、计算机设备及存储介质

Country Status (2)

Country Link
CN (1) CN113612766B (zh)
WO (1) WO2023005862A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117376444A (zh) * 2023-08-30 2024-01-09 长江水上交通监测与应急处置中心 一种基于智能合约的长江航运数据上链方法及系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113612766B (zh) * 2021-07-30 2023-04-28 北京锐安科技有限公司 数据治理装置、方法、计算机设备及存储介质
CN117312331B (zh) * 2023-12-01 2024-03-29 浪潮云信息技术股份公司 一种元数据血缘分析方法、装置、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111967988A (zh) * 2020-07-10 2020-11-20 广州汇通国信科技有限公司 一种基于区块链技术的智能电网数据治理架构
CN112181922A (zh) * 2020-10-22 2021-01-05 中山大学 一种区块链数据共享方法、系统、装置及介质
CN112702402A (zh) * 2020-12-16 2021-04-23 普元信息技术股份有限公司 基于区块链技术实现政务信息资源共享和交换的系统、方法、装置、处理器及其存储介质
CN113034281A (zh) * 2021-03-16 2021-06-25 中国工商银行股份有限公司 基于区块链的业务数据处理方法、相关系统及节点
CN113612766A (zh) * 2021-07-30 2021-11-05 北京锐安科技有限公司 数据治理装置、方法、计算机设备及存储介质

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11196551B2 (en) * 2018-06-27 2021-12-07 International Business Machines Corporation Automated task management on a blockchain based on predictive and analytical analysis
US11354669B2 (en) * 2018-06-28 2022-06-07 International Business Machines Corporation Collaborative analytics for fraud detection through a shared public ledger
CN110166442B (zh) * 2019-04-30 2022-09-06 创新先进技术有限公司 一种基于区块链的数据处理方法和装置
CN110069295B (zh) * 2019-05-06 2022-06-17 百度在线网络技术(北京)有限公司 区块链处理方法、装置、设备和介质
CN110809058B (zh) * 2019-11-13 2020-10-27 北京物资学院 一种基于特征码标识及验证技术的区块链溯源系统及方法
CN111291339B (zh) * 2020-02-19 2024-02-06 上海方付通商务服务有限公司 一种区块链数据的处理方法、装置、设备及存储介质
CN111787090B (zh) * 2020-06-28 2021-06-15 成都无右区块链科技有限公司 一种基于区块链技术的智慧法治平台
CN111831750A (zh) * 2020-07-09 2020-10-27 恒安嘉新(北京)科技股份公司 一种区块链数据分析方法、装置、计算机设备及存储介质
CN112632135A (zh) * 2020-11-18 2021-04-09 北京天源迪科信息技术有限公司 一种大数据平台
CN112287379B (zh) * 2020-12-24 2021-08-20 北京百度网讯科技有限公司 业务数据使用方法、装置、设备、存储介质和程序产品

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111967988A (zh) * 2020-07-10 2020-11-20 广州汇通国信科技有限公司 一种基于区块链技术的智能电网数据治理架构
CN112181922A (zh) * 2020-10-22 2021-01-05 中山大学 一种区块链数据共享方法、系统、装置及介质
CN112702402A (zh) * 2020-12-16 2021-04-23 普元信息技术股份有限公司 基于区块链技术实现政务信息资源共享和交换的系统、方法、装置、处理器及其存储介质
CN113034281A (zh) * 2021-03-16 2021-06-25 中国工商银行股份有限公司 基于区块链的业务数据处理方法、相关系统及节点
CN113612766A (zh) * 2021-07-30 2021-11-05 北京锐安科技有限公司 数据治理装置、方法、计算机设备及存储介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117376444A (zh) * 2023-08-30 2024-01-09 长江水上交通监测与应急处置中心 一种基于智能合约的长江航运数据上链方法及系统

Also Published As

Publication number Publication date
CN113612766B (zh) 2023-04-28
CN113612766A (zh) 2021-11-05

Similar Documents

Publication Publication Date Title
WO2023005862A1 (zh) 数据治理装置、方法、计算机设备及存储介质
US9286187B2 (en) Static enforcement of process-level security and compliance specifications for cloud-based systems
US8793781B2 (en) Method and system for analyzing policies for compliance with a specified policy using a policy template
CN103559118B (zh) 一种基于aop与注解信息系统的安全审计方法
JP2022529967A (ja) ブロックチェーン・ネットワークからのデータの抽出
US8990149B2 (en) Generating a predictive model from multiple data sources
CN107113183A (zh) 大数据的受控共享的系统和方法
US8826024B2 (en) Trusted compliance operations inside secure computing boundaries
CN111639914A (zh) 区块链案件信息管理方法、装置、电子设备和存储介质
Sadoughi et al. Health information system in a cloud computing context.
US20190347660A1 (en) System and method for protection of confidential information
CN111680313B (zh) 一种数据处理方法、装置、设备及存储介质
CN110096542A (zh) 去中心化的数据验证处理方法、装置、系统和介质
US8176019B2 (en) Extending the sparcle privacy policy workbench methods to other policy domains
US9058470B1 (en) Actual usage analysis for advanced privilege management
Accorsi et al. Towards forensic data flow analysis of business process logs
CN111625532A (zh) 数据血缘关系处理方法、装置、计算机设备及存储介质
CN110830428A (zh) 区块链金融大数据处理方法及系统
US11966710B2 (en) System and method for implementing an open digital rights language (ODRL) visualizer
US20130268642A1 (en) Application data layer coverage discovery and gap analysis
Mazeika et al. Identifying security issues with mbse while rebuilding legacy software systems
Kunz et al. Finding risk patterns in cloud system models
Zhang Blockchain-based solutions for clinical trial data management: a systematic review
Azumah et al. Scheduling in the hybrid cloud constrained by process mining
JP5269722B2 (ja) セキュリティ設計支援装置及びプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22848467

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE