CN109783482B - Data violation monitoring method and device - Google Patents

Data violation monitoring method and device Download PDF

Info

Publication number
CN109783482B
CN109783482B CN201811624632.XA CN201811624632A CN109783482B CN 109783482 B CN109783482 B CN 109783482B CN 201811624632 A CN201811624632 A CN 201811624632A CN 109783482 B CN109783482 B CN 109783482B
Authority
CN
China
Prior art keywords
data
metadata
data object
judgment
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811624632.XA
Other languages
Chinese (zh)
Other versions
CN109783482A (en
Inventor
卫洁
张允君
黄少洪
林群仰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sdic Suzhou Shared Services Co ltd
Yuanguang Software Co Ltd
Original Assignee
Yuanguang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanguang Software Co Ltd filed Critical Yuanguang Software Co Ltd
Priority to CN201811624632.XA priority Critical patent/CN109783482B/en
Publication of CN109783482A publication Critical patent/CN109783482A/en
Application granted granted Critical
Publication of CN109783482B publication Critical patent/CN109783482B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method and a device for monitoring violation of rules of data, belongs to the technical field of data monitoring, and solves the problems of high development cost, low working efficiency and the like caused by compiling corresponding verification rules according to metadata in the existing violation monitoring process. The method comprises the following steps: acquiring data objects and data information of the data objects including metadata, inter-table relations and mapping relations; according to the metadata of the data object, a verification rule base and a verification rule packet aiming at the current data object are established through a configuration condition judgment template and a verification rule template; inputting the main data of the data object; and according to the judgment condition of the verification rule, when all metadata in the main data of the data object are verified to be qualified, inputting the verified main data into a database. The invention can meet the requirement of automatic generation of various verification rules for specified rules to obtain violation monitoring results, does not need to write special codes and reduces the development cost.

Description

Data violation monitoring method and device
Technical Field
The invention relates to the technical field of data monitoring, in particular to a method and a device for monitoring violation of data.
Background
With the development and the deepening of information technology, data gradually become valuable strategic assets of enterprises. The main data management is to capture key data which have high business value and are reused by each business department in an enterprise from the disordered data of the enterprise for management, and construct a single, accurate and authoritative data source, so that the overall data quality of the enterprise is improved, the data asset value is improved, the business innovation is promoted, and the enterprise competitiveness is comprehensively enhanced.
With the continuous development of informatization, the data condition is more and more complex, and higher requirements are put forward for data monitoring stored daily. In the past, data maintenance is a practical problem which is difficult to solve, a specific person needs to be arranged to complete monitoring work, and due to the fact that abnormal conditions are easily ignored in a manual monitoring mode, the data violation monitoring function needs to be developed and researched in a targeted mode.
In the existing data violation monitoring process, a corresponding check rule is set for each item of metadata, and a special code needs to be written for the check rule of each data object. When the demand changes, the code development is required to be carried out continuously, the development cost is increased, unnecessary waste is caused, and the data monitoring efficiency is reduced. Therefore, the mode cannot meet the requirement that data violation monitoring changes caused by continuous increase of data objects and continuous conversion of business objects in the enterprise development process.
Disclosure of Invention
In view of the foregoing analysis, the present invention aims to provide a method and an apparatus for monitoring violation of rules of data, so as to solve the problem of low monitoring efficiency caused by writing a corresponding check rule according to metadata in the existing violation monitoring process.
The purpose of the invention is mainly realized by the following technical scheme:
a data violation monitoring method comprises the following steps:
acquiring data objects and data information of the data objects including metadata, inter-table relations and mapping relations;
generating N judgment conditions for carrying out conditional resource classification on the data objects by configuring a condition judgment template according to the metadata of the data objects; each judgment condition corresponds to one check rule by configuring a check rule template; thus establishing a check rule base;
screening out one or more check rules corresponding to each metadata of the data object from the check rule base to obtain a check rule packet aiming at the current data object;
inputting the main data of the data object; and judging the metadata of the data object in sequence according to the judgment condition of each verification rule corresponding to each metadata in the verification rule packet, and when all the metadata in the main data of the data object are verified to be qualified, inputting the verified main data into a database.
The invention has the following beneficial effects: the condition judgment template and the verification rule template are set to generate the verification rule base, the verification rule packet generated by the verification rule base is used for monitoring the main data of the data object, and a special code does not need to be written for each metadata, so that the development cost is reduced; meanwhile, the data packet for the data object, which is set in the invention, can complete the inspection of all metadata in the data object and all check rules corresponding to the metadata at one time, thereby effectively improving the accuracy and the monitoring efficiency of the data violation monitoring.
On the basis of the scheme, the invention is further improved as follows:
further, the method for establishing the check rule base comprises the following steps:
step S201, screening metadata information in data information of a data object;
step S202, parameter setting is carried out on the set condition judgment template, N judgment conditions are generated, and the classification of the metadata is judged;
step S203, setting parameters of the set check rule template to enable each judgment condition to correspond to one check rule;
and step S204, summarizing and storing the metadata information, the N judgment conditions and the verification rules corresponding to the judgment conditions to form a verification rule base for the metadata of the data object.
The beneficial effect of adopting the further scheme is that: by giving a specific mode of establishing a verification rule base, the incidence relation among metadata, a condition judgment template and a rule verification template can be established, various verification rules can be met through rule configuration without compiling special codes, and the development cost is reduced;
further, the condition judging template is used for,
acquiring a subject object judged by conditions;
providing a function operation relation;
providing a comprehensive operation relation symbol;
providing a judgment constant value comprising numerical values, characters, dates and reference relations;
and setting a condition judgment template, selecting a judgment constant value and an operation relation character provided in the template to establish an operation relation formula for condition judgment, and classifying the subject object subjected to condition judgment.
Further, the verification rule template at least comprises:
6) and (4) integrity checking: the field value is not null;
7) and (3) checking uniqueness: checking the field repeatedly;
8) authority verification: whether the field value meets the requirements of format and length;
9) and (3) validity checking: the field value is required in the corresponding reference relationship;
10) and (3) consistency checking: the field value is equal to an item value.
Further, the check rule template further comprises a self-defined template, the self-defined template is realized by setting an expression, and the expression is obtained by randomly combining the following controls:
and, or, alternatively, if, exactly, otherwise, inclusive, exclusive, non, null, non-null.
The beneficial effect of adopting the further scheme is that: when the common rule template can not meet the application requirements, the rule verification can be realized through the user-defined template, and the rule verification requirements on the metadata under different scenes and different services are met.
Further, the method for performing rule check on the data object comprises the following steps:
step S401, inputting main data of a data object;
s402, sequentially acquiring metadata of an input data object main body;
step S403, judging whether the metadata meets one or more corresponding verification rules according to the verification rule packet, if so, inputting the verified main data of the data object into a database, wherein the main data of the data object is qualified in verification.
The beneficial effect of adopting the further scheme is that: by utilizing the data packet aiming at the data object, the verification of all metadata in the data object and all verification rules corresponding to the metadata can be completed at one time, and the accuracy and the monitoring efficiency of data violation monitoring are effectively improved.
Further, when the data object main data is unqualified in verification, caching the main data failed in storage, and carrying out violation prompt on the metadata in the main data failed in verification according to the verification rule corresponding to the metadata failed in verification.
And further, modifying the metadata of the violation main data according to the violation prompt, re-inputting the main data of the data object, and verifying the data object.
A data violation monitoring device comprises a data object acquisition module, a verification rule base generation module, a verification rule packet generation module and a data object monitoring module;
the data object acquisition module is used for acquiring data objects and data information of the data objects including metadata, inter-table relations and mapping relations;
the verification rule base generation module is connected with the data object acquisition module, and generates N judgment conditions for carrying out conditional resource classification on the data object through configuring a condition judgment template according to the metadata of the data object; each judgment condition corresponds to one check rule by configuring a check rule template; thus establishing a check rule base;
the verification rule packet generating module is connected with the verification rule base generating module and is used for screening out one or more verification rules corresponding to each metadata of the data object from the verification rule base to obtain a verification rule packet for the current data object;
the data object monitoring module is connected with the data object acquisition module and the verification rule packet generation module and is used for inputting the main data of the data object; and judging the metadata of the data object in sequence according to the judgment condition of each verification rule corresponding to each metadata in the verification rule packet, and when all the metadata in the main data of the data object are verified to be qualified, inputting the verified main data into a database.
Further, the check rule base generation module includes: a data information acquisition module, a condition judgment template, a condition setting module and a check rule template,
the data information acquisition module is used for acquiring metadata information in the data information of the data object by a user;
the condition judgment template is preset and internally comprises all elements for generating a condition judgment formula;
the condition setting module is used for setting a condition judgment template and generating N judgment conditions to judge the classification of the metadata;
the checking rule template is preset and internally comprises all elements for generating the checking rule;
the check rule setting module is used for setting the check rule template so that each judgment condition corresponds to one check rule;
and the summarizing storage module is used for summarizing and storing the metadata information, the N judging conditions and the verification rules corresponding to the judging conditions to form a verification rule base for the metadata of the data object.
In the invention, the technical schemes can be combined with each other to realize more preferable combination schemes. Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The drawings are only for purposes of illustrating particular embodiments and are not to be construed as limiting the invention, wherein like reference numerals are used to designate like parts throughout.
FIG. 1 is a flow chart of a method for monitoring data violations in an embodiment of the present invention;
FIG. 2 is a flowchart of a method for establishing a verification rule base according to an embodiment of the present invention;
fig. 3 is a schematic connection diagram of a data violation monitoring apparatus according to an embodiment of the present invention.
Detailed Description
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate preferred embodiments of the invention and together with the description, serve to explain the principles of the invention and not to limit the scope of the invention.
A specific embodiment of the present invention discloses a data violation monitoring method, as shown in fig. 1, the steps are as follows:
step S1: acquiring data objects and data information of the data objects including metadata, inter-table relations and mapping relations;
step S2: generating N judgment conditions for carrying out conditional resource classification on the data objects by configuring a condition judgment template according to the metadata of the data objects; each judgment condition corresponds to one check rule by configuring a check rule template; thus establishing a check rule base;
step S3: screening out one or more check rules corresponding to each metadata of the data object from the check rule base to obtain a check rule packet aiming at the current data object;
step S4: inputting the main data of the data object; and judging the metadata of the data object in sequence according to the judgment condition of each verification rule corresponding to each metadata in the verification rule packet, and when all the metadata in the main data of the data object are verified to be qualified, inputting the verified main data into a database.
Compared with the prior art, the data violation monitoring method provided by the embodiment has the advantages that the condition judgment template and the verification rule template are set to generate the verification rule base, the verification rule packet generated by the verification rule base is used for monitoring the main data of the data object, a special code does not need to be written for each metadata, and the development cost is reduced; meanwhile, the data packet for the data object, which is set in the invention, can complete the inspection of all metadata in the data object and all check rules corresponding to the metadata at one time, thereby effectively improving the accuracy and the monitoring efficiency of the data violation monitoring.
Preferably, as shown in fig. 2, the method for establishing the verification rule base includes:
step S201, screening metadata information in data information of a data object;
step S202, parameter setting is carried out on the set condition judgment template, N judgment conditions are generated, and the classification of the metadata is judged;
specifically, the condition judging template is used for,
acquiring a subject object judged by conditions;
providing a function operation relation;
providing a comprehensive operation relation symbol;
providing a judgment constant value comprising numerical values, characters, dates and reference relations;
and setting a condition judgment template, selecting a judgment constant value and an operation relation character provided in the template to establish an operation relation formula for condition judgment, and classifying the subject object subjected to condition judgment.
Step S203, setting parameters of the set check rule template to enable each judgment condition to correspond to one check rule;
specifically, the check rule template may include the following form:
1) and (4) integrity checking: the field value is not null;
2) and (3) checking uniqueness: checking the field repeatedly;
3) authority verification: whether the field value meets the requirements of format and length;
4) and (3) validity checking: the field value is required in the corresponding reference relationship;
5) and (3) consistency checking: the field value is equal to an item value.
Other verification rule templates can also be designed according to the requirements of the data object.
And step S204, summarizing and storing the metadata information, the N judgment conditions and the verification rules corresponding to the judgment conditions to form a verification rule base for the metadata of the data object.
Under a certain judgment condition, a verification format corresponding to the judgment condition is formed by setting parameters in the verification rule template, and the specific parameter setting is arbitrarily set according to the requirements of a user, which is not the protection point of the invention.
The method is used for expanding the application range of the method and meeting the control on data under different scenes and different services. The check rule template can also comprise a self-defined template, the self-defined template is realized by setting an expression, and the expression is obtained by randomly combining the following controls: and, or, alternatively, if, exactly, otherwise, inclusive, exclusive, non, null, non-null. The 9 controls can be freely combined to set various rules. For example, to set that when a person belongs to a unit, his department cannot be null, we can set the expression [ if the organization type is a unit, then the department is not null ].
Preferably, the method for rule checking of the data object includes:
step S401, inputting main data of a data object;
s402, sequentially acquiring metadata of an input data object main body;
step S403, judging whether the metadata meets one or more corresponding verification rules according to the verification rule packet, if so, inputting the verified main data of the data object into a database, wherein the main data of the data object is qualified in verification.
Preferably, when the data object main data is unqualified in verification, caching the main data failed to be put in storage, and carrying out violation prompt on the metadata in the main data failed to be verified according to the verification rule corresponding to the metadata failed to be verified.
Preferably, the metadata of the violation main data is modified according to the violation prompt, the main data of the data object is re-entered, and the data object is verified.
And when the main data which are failed to be continuously put in storage exceed a certain number, stopping receiving the main data to be put in storage, analyzing the reason of the failure of putting the main data in storage according to the violation prompt, and continuously receiving the main data to be put in storage after subsequent data are modified.
In another embodiment of the present invention, a data violation monitoring apparatus is provided, as shown in fig. 3, including a data object obtaining module, a verification rule base generating module, a verification rule packet generating module, and a data object monitoring module;
the data object acquisition module is used for acquiring data objects and data information of the data objects including metadata, inter-table relations and mapping relations;
the verification rule base generation module is connected with the data object acquisition module, and generates N judgment conditions for carrying out conditional resource classification on the data object through configuring a condition judgment template according to the metadata of the data object; each judgment condition corresponds to one check rule by configuring a check rule template; thus establishing a check rule base;
the verification rule packet generating module is connected with the verification rule base generating module and is used for screening out one or more verification rules corresponding to each metadata of the data object from the verification rule base to obtain a verification rule packet for the current data object;
the data object monitoring module is connected with the data object acquisition module and the verification rule packet generation module and is used for inputting the main data of the data object; and judging the metadata of the data object in sequence according to the judgment condition of each verification rule corresponding to each metadata in the verification rule packet, and when all the metadata in the main data of the data object are verified to be qualified, inputting the verified main data into a database.
Preferably, the check rule base generation module includes: a data information acquisition module, a condition judgment template, a condition setting module and a check rule template,
the data information acquisition module is used for acquiring metadata information in the data information of the data object by a user;
the condition judgment template is preset and internally comprises all elements for generating a condition judgment formula;
the condition setting module is used for setting a condition judgment template and generating N judgment conditions to judge the classification of the metadata;
the checking rule template is preset and internally comprises all elements for generating the checking rule;
the check rule setting module is used for setting the check rule template so that each judgment condition corresponds to one check rule;
and the summarizing storage module is used for summarizing and storing the metadata information, the N judging conditions and the verification rules corresponding to the judging conditions to form a verification rule base for the metadata of the data object.
The method embodiment and the device embodiment are based on the same principle, and the related parts can be referenced mutually, and the same technical effect can be achieved.
Those skilled in the art will appreciate that all or part of the flow of the method implementing the above embodiments may be implemented by hardware associated with computer program instructions, and the program may be stored in a computer readable storage medium. The computer readable storage medium is a magnetic disk, an optical disk, a read-only memory or a random access memory.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.

Claims (7)

1. A data violation monitoring method is characterized by comprising the following steps:
acquiring data objects and data information of the data objects including metadata, inter-table relations and mapping relations;
generating N judgment conditions for carrying out conditional resource classification on the data objects by configuring a condition judgment template according to the metadata of the data objects; each judgment condition corresponds to one check rule by configuring a check rule template; thus establishing a check rule base; the method for establishing the verification rule base comprises the following steps:
step S201, screening metadata information in data information of a data object;
step S202, parameter setting is carried out on the set condition judgment template, N judgment conditions are generated, and the classification of the metadata is judged;
step S203, setting parameters of the set check rule template to enable each judgment condition to correspond to one check rule;
step S204, summarizing and storing the metadata information, the N judgment conditions and the check rules corresponding to the judgment conditions to form a check rule base for the metadata of the data object;
the condition judging template is used for judging whether the condition is correct,
acquiring a subject object judged by conditions;
providing a function operation relation;
providing a comprehensive operation relation symbol;
providing a judgment constant value comprising numerical values, characters, dates and reference relations;
setting a condition judgment template, selecting a judgment constant value and an operation relation character provided in the template to establish an operation relation formula for condition judgment, and classifying a main object for condition judgment;
screening out one or more check rules corresponding to each metadata of the data object from the check rule base to obtain a check rule packet aiming at the current data object;
inputting the main data of the data object; and judging the metadata of the data object in sequence according to the judgment condition of each verification rule corresponding to each metadata in the verification rule packet, and when all the metadata in the main data of the data object are verified to be qualified, inputting the verified main data into a database.
2. The data violation monitoring method of claim 1,
the verification rule template at least comprises:
1) and (4) integrity checking: the field value is not null;
2) and (3) checking uniqueness: checking the field repeatedly;
3) authority verification: whether the field value meets the requirements of format and length;
4) and (3) validity checking: the field value is required in the corresponding reference relationship;
5) and (3) consistency checking: the field value is equal to an item value.
3. The data violation monitoring method according to claim 2, wherein the check rule template further comprises a self-defined template, the self-defined template is implemented by setting an expression, and the expression is obtained by arbitrarily combining the following controls:
and, or, alternatively, if, exactly, otherwise, inclusive, exclusive, non, null, non-null.
4. The data violation monitoring method according to claim 2 or 3, wherein the method for performing rule checking on the data object comprises:
step S401, inputting main data of a data object;
s402, sequentially acquiring metadata of an input data object main body;
step S403, judging whether the metadata meets one or more corresponding verification rules according to the verification rule packet, if so, inputting the verified main data of the data object into a database, wherein the main data of the data object is qualified in verification.
5. The data violation monitoring method according to claim 4, wherein when the data object main data is unqualified for verification, the main data which fails to be put in storage is cached, and violation prompt is performed on the metadata in the main data which fails to be verified according to the verification rule corresponding to the metadata which fails to be verified.
6. The data violation monitoring method according to claim 5, wherein the violation body data metadata is modified according to the violation prompt, and the data object body data is re-entered and verified.
7. A data violation monitoring device is characterized by comprising a data object acquisition module, a verification rule base generation module, a verification rule packet generation module and a data object monitoring module;
the data object acquisition module is used for acquiring data objects and data information of the data objects including metadata, inter-table relations and mapping relations;
the verification rule base generation module is connected with the data object acquisition module, and generates N judgment conditions for carrying out conditional resource classification on the data object through configuring a condition judgment template according to the metadata of the data object; each judgment condition corresponds to one check rule by configuring a check rule template; thus establishing a check rule base; wherein, the check rule base generation module comprises: the system comprises a data information acquisition module, a condition judgment template, a condition setting module, a check rule template, a check rule setting module and a summarizing storage module;
the data information acquisition module is used for acquiring metadata information in the data information of the data object by a user;
the condition judgment template is preset and internally comprises all elements for generating a condition judgment formula, and is used for,
acquiring a subject object judged by conditions;
providing a function operation relation;
providing a comprehensive operation relation symbol;
providing a judgment constant value comprising numerical values, characters, dates and reference relations;
setting a condition judgment template, selecting a judgment constant value and an operation relation character provided in the template to establish an operation relation formula for condition judgment, and classifying a main object for condition judgment;
the condition setting module is used for setting a condition judgment template and generating N judgment conditions to judge the classification of the metadata;
the checking rule template is preset and internally comprises all elements for generating the checking rule;
the check rule setting module is used for setting the check rule template so that each judgment condition corresponds to one check rule;
the summarizing storage module is used for summarizing and storing the metadata information, the N judging conditions and the verification rules corresponding to the judging conditions to form a verification rule base for the metadata of the data object;
the verification rule packet generating module is connected with the verification rule base generating module and is used for screening out one or more verification rules corresponding to each metadata of the data object from the verification rule base to obtain a verification rule packet for the current data object;
the data object monitoring module is connected with the data object acquisition module and the check rule packet generation module and is used for inputting the main data of the data object; and judging the metadata of the data object in sequence according to the judgment condition of each verification rule corresponding to each metadata in the verification rule packet, and when all the metadata in the main data of the data object are verified to be qualified, inputting the verified main data into a database.
CN201811624632.XA 2018-12-28 2018-12-28 Data violation monitoring method and device Active CN109783482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811624632.XA CN109783482B (en) 2018-12-28 2018-12-28 Data violation monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811624632.XA CN109783482B (en) 2018-12-28 2018-12-28 Data violation monitoring method and device

Publications (2)

Publication Number Publication Date
CN109783482A CN109783482A (en) 2019-05-21
CN109783482B true CN109783482B (en) 2021-08-17

Family

ID=66498758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811624632.XA Active CN109783482B (en) 2018-12-28 2018-12-28 Data violation monitoring method and device

Country Status (1)

Country Link
CN (1) CN109783482B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414739B (en) * 2020-02-27 2023-04-14 北京中亦安图科技股份有限公司 Excel data entry component, entry method and device
CN111815270A (en) * 2020-06-29 2020-10-23 北京汽车集团越野车有限公司 Data verification method, device, system, terminal and readable storage medium
CN111984640A (en) * 2020-08-04 2020-11-24 中国科学技术大学智慧城市研究院(芜湖) Portrait construction method based on multi-element heterogeneous data
CN112183952A (en) * 2020-09-08 2021-01-05 支付宝(杭州)信息技术有限公司 Index quality supervision processing method and device and electronic equipment
CN112215466A (en) * 2020-09-08 2021-01-12 支付宝(杭州)信息技术有限公司 Transaction data supervision processing method and device and electronic equipment
CN117369866A (en) * 2023-09-22 2024-01-09 中科驭数(北京)科技有限公司 Parameter verification method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364240A (en) * 2008-10-14 2009-02-11 杭州华三通信技术有限公司 Metadata management method and device
CN107103025A (en) * 2017-01-05 2017-08-29 北京亚信智慧数据科技有限公司 A kind of data processing method and data processing platform (DPP)
CN108595563A (en) * 2018-04-13 2018-09-28 林秀丽 A kind of data quality management method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8712979B2 (en) * 2010-03-26 2014-04-29 Bmc Software, Inc. Statistical identification of instances during reconciliation process
IL226057A (en) * 2013-04-28 2017-07-31 Verint Systems Ltd System and method for automated configuration of intrusion detection systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364240A (en) * 2008-10-14 2009-02-11 杭州华三通信技术有限公司 Metadata management method and device
CN107103025A (en) * 2017-01-05 2017-08-29 北京亚信智慧数据科技有限公司 A kind of data processing method and data processing platform (DPP)
CN108595563A (en) * 2018-04-13 2018-09-28 林秀丽 A kind of data quality management method and device

Also Published As

Publication number Publication date
CN109783482A (en) 2019-05-21

Similar Documents

Publication Publication Date Title
CN109783482B (en) Data violation monitoring method and device
CN109816327B (en) Contract data processing method, apparatus, computer device and storage medium
CN104391934B (en) Data verification method and device
CN103559118A (en) Security auditing method based on aspect oriented programming (AOP) and annotation information system
CN104731816A (en) Method and device for processing abnormal business data
US10698639B2 (en) Method and system of provisioning electronic forms
CN106293891B (en) Multidimensional investment index monitoring method
US20220129816A1 (en) Methods and arrangements to manage requirements and controls, and data at the intersection thereof
CN110223127A (en) Bill data backing method and system
CN113158189B (en) Method, device, equipment and medium for generating malicious software analysis report
CN116541372A (en) Data asset management method and system
CN107770151A (en) A kind of enterprise's integrated work management system and its method
CN110865806B (en) Code processing method, device, server and storage medium
US20100106541A1 (en) Analyzing the Readiness of a Template
CN113434542B (en) Data relationship identification method and device, electronic equipment and storage medium
CN107729541A (en) A kind of data processing method, device and computer-readable recording medium
CN111190814A (en) Software test case generation method and device, storage medium and terminal
CN107423035B (en) Product data management system in software development process
CN111858636A (en) Data acquisition method and system based on configuration management
CN112130823A (en) Platform development method and device, computer equipment and storage medium
CN105577424A (en) Data asset quality monitoring method based on data traceability graph
CN111639478B (en) Automatic data auditing method and system based on EXCEL document
CN115828251A (en) Method and device for evaluating data risk
CN112598226B (en) Equipment checking method, device, equipment and storage medium
Maiti Capturing, Eliciting, and Prioritizing (CEP) Non-Functional Requirements Metadata during the Early Stages of Agile Software Development

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211215

Address after: 519000 Guangdong Zhuhai science and technology innovation coastal high beam Software Park

Patentee after: YGSOFT Inc.

Patentee after: CLP (Suzhou) shared services Co.,Ltd.

Address before: 519085 Zhuhai science and Technology Innovation Software Park, Guangdong Province

Patentee before: YGSOFT Inc.

TR01 Transfer of patent right
CP01 Change in the name or title of a patent holder

Address after: 519000 Guangdong Zhuhai science and technology innovation coastal high beam Software Park

Patentee after: YGSOFT Inc.

Patentee after: SDIC (Suzhou) Shared Services Co.,Ltd.

Address before: 519000 Guangdong Zhuhai science and technology innovation coastal high beam Software Park

Patentee before: YGSOFT Inc.

Patentee before: CLP (Suzhou) shared services Co.,Ltd.

CP01 Change in the name or title of a patent holder