CN112035458A - Data isolation method, device and equipment - Google Patents

Data isolation method, device and equipment Download PDF

Info

Publication number
CN112035458A
CN112035458A CN202010903985.4A CN202010903985A CN112035458A CN 112035458 A CN112035458 A CN 112035458A CN 202010903985 A CN202010903985 A CN 202010903985A CN 112035458 A CN112035458 A CN 112035458A
Authority
CN
China
Prior art keywords
user
isolated
database
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010903985.4A
Other languages
Chinese (zh)
Other versions
CN112035458B (en
Inventor
张康洁
蔡震
张阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010903985.4A priority Critical patent/CN112035458B/en
Publication of CN112035458A publication Critical patent/CN112035458A/en
Application granted granted Critical
Publication of CN112035458B publication Critical patent/CN112035458B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides a data isolation method, a data isolation device and data isolation equipment, wherein the method comprises the following steps: acquiring a form information set of a user to be isolated; the form information set of the user to be isolated is used for representing the information of the form related to the user to be isolated; determining an isolation data set in a first database according to the user form information set to be isolated; wherein the isolated data set comprises user information of the user to be isolated; synchronizing data in the isolated data set from the first database to a second database; removing data in the isolated data set from the first database. In the embodiment of the specification, effective classification isolation management can be realized through the first database and the second database aiming at the user information of the user to be isolated.

Description

Data isolation method, device and equipment
Technical Field
The embodiment of the specification relates to the technical field of data processing, in particular to a data isolation method, a data isolation device and data isolation equipment.
Background
The bank users usually include some disabled customers and customers with missing certificate information, such as: for the individual users with pseudonyms and anonymity, in the prior art, the batch marking is usually performed on the non-standard data according to the non-standard data list, for example, a field in the client table is enabled to identify whether the client is a non-standard client, if the record in the non-standard list is matched, the identification field of the client is set to be Y or other value, the clients outside the list are regarded as standard clients, and the corresponding indication field is N or other value. However, the marking isolation in the prior art is essentially a transaction limitation, data isolation is not performed, and information of non-standard customers and standard customers is stored in a database of the same system and shares the same data table. Therefore, the existing technical scheme can not realize effective classification isolation management aiming at the client information.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the specification provides a data isolation method, a data isolation device and data isolation equipment, and aims to solve the problem that effective classification isolation management cannot be realized for client information in the prior art.
An embodiment of the present specification provides a data isolation method, including: acquiring a form information set of a user to be isolated; the form information set of the user to be isolated is used for representing the information of the form related to the user to be isolated; determining an isolation data set in a first database according to the user form information set to be isolated; wherein the isolated data set comprises user information of the user to be isolated; synchronizing data in the isolated data set from the first database to a second database; removing data in the isolated data set from the first database.
An embodiment of the present specification further provides a data isolation apparatus, including: the first acquisition module is used for acquiring a form information set of a user to be isolated; the form information set of the user to be isolated is used for representing the information of the form related to the user to be isolated; the second acquisition module is used for determining an isolation data set in the first database according to the user form information set to be isolated; wherein the isolated data set comprises user information of the user to be isolated; a synchronization module to synchronize data in the isolated dataset from the first database to a second database; a removal module to remove data in the isolated dataset from the first database.
Embodiments of the present specification further provide a data isolation device, which includes a processor and a memory for storing processor-executable instructions, and when the processor executes the instructions, the steps of the data isolation method are implemented.
Embodiments of the present specification also provide a computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the data isolation method.
The embodiment of the specification provides a data isolation method, which can determine information representing forms related to a user to be isolated by acquiring a form information set of the user to be isolated. According to the form information set of the user to be isolated, an isolated data set in the first database can be determined, and therefore the user information of the user to be isolated can be determined. Furthermore, in order to ensure effective isolation of the user information of the user to be isolated, the data in the isolated data set can be synchronized from the first database to the second database, and the data in the isolated data set can be removed from the first database, so that effective classification isolation management can be realized through the first database and the second database aiming at the user information of the user to be isolated.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the disclosure, are incorporated in and constitute a part of this specification, and are not intended to limit the embodiments of the disclosure. In the drawings:
FIG. 1 is a schematic diagram illustrating steps of a data isolation method provided in accordance with an embodiment of the present disclosure;
FIG. 2 is a schematic structural diagram of a data isolation device provided in an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a data isolation device provided in an embodiment of the present specification.
Detailed Description
The principles and spirit of the embodiments of the present specification will be described with reference to a number of exemplary embodiments. It should be understood that these embodiments are presented merely to enable those skilled in the art to better understand and to implement the embodiments of the present description, and are not intended to limit the scope of the embodiments of the present description in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As will be appreciated by one skilled in the art, implementations of the embodiments of the present description may be embodied as a system, an apparatus, a method, or a computer program product. Therefore, the disclosure of the embodiments of the present specification can be embodied in the following forms: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
Although the flow described below includes operations that occur in a particular order, it should be appreciated that the processes may include more or less operations that are performed sequentially or in parallel (e.g., using parallel processors or a multi-threaded environment).
Referring to fig. 1, the present embodiment can provide a data isolation method. The data isolation method can be used for effectively classifying and managing the user information of the user to be isolated. The data isolation method may include the following steps.
S101: acquiring a form information set of a user to be isolated; the information set of the form of the user to be isolated is used for representing the information of the form related to the user to be isolated.
In this embodiment, before isolating the user information of the user to be isolated, the form information set of the user to be isolated may be obtained. The user to be isolated can be a user whose user information does not meet a preset rule and needs to be subjected to data isolation, and the form information set of the user to be isolated can be used for representing the information of the form related to the user to be isolated.
In this embodiment, the preset rule may be preset from multiple dimensions, such as integrity of user information, accuracy of user information, user activity, financial assets, and the like, and the preset rule may be used to characterize whether a user is an irregular user, and if the user is determined to be an irregular user, the user may be used as a user to be isolated, so that a form information set of the user to be isolated may be obtained according to the determined user to be isolated.
In the present embodiment, since the isolation for the non-standard user is actually the isolation for the user information, the user information relates to 3 types of related data tables of the user, the account, and the card. Therefore, the form related to the user to be isolated may include a user isolation list table, an account isolation list table, a card number isolation list table, and the like, and it is understood that the form related to the user to be isolated may also include other forms, which may be determined according to actual situations, and the embodiment of the present specification does not limit this.
In one embodiment, there may be an association relationship between the user isolation list table, the account isolation list table, and the card number isolation list table, for example, the association may be performed through a user number. Of course, the way of associating the user isolation list table, the account isolation list table, and the card number isolation list table is not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the embodiments of the present disclosure, but all the functions and effects achieved by the embodiments of the present disclosure are covered by the scope of the embodiments of the present disclosure.
In one embodiment, since the data or types of data related to different forms are different, the information of different forms related to the users to be isolated is also different, for example, the partition identification (last account number), user number, isolation status, isolation type, isolation reason of the account of each user to be isolated may be included in the user isolation list table; the account isolation list table may include account partition identifiers (the last digit of the account), accounts, user numbers, isolation states, isolation types, and isolation reasons of each user to be isolated; the card number isolation list table may include PARTITION identifiers of the card numbers of the users to be isolated (the last digit after the card number is counted down, i.e. the last digit after the check digit is removed), the card numbers, the user numbers, PARTITION _ IDs (card number PARTITION identifiers), isolation states, isolation types, and isolation reasons. Of course, the information of the form related to the user to be isolated is not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the embodiments of the present disclosure, but the functions and effects achieved by the embodiments of the present disclosure are all covered by the scope of the embodiments of the present disclosure.
In an embodiment, the form information set of the user to be isolated may be displayed in a form of a table, or may be displayed in a form of an image, which may be determined according to actual situations, and this is not limited in this specification. Presenting a set of form information of a user to be isolated in a tabular form may be as shown in table 1:
TABLE 1
Figure BDA0002660745650000041
In one embodiment, the manner of obtaining the information set of the user form to be isolated may include: and receiving a user form information set to be isolated, which is input by a user, or obtaining the user form information set by querying according to a preset path. It is understood that, the above-mentioned user form information set to be isolated may also be obtained in other possible manners, for example, the user form information to be isolated is searched in a web page according to a certain search condition, which may be determined specifically according to an actual situation, and this is not limited in this description embodiment.
In one embodiment, the determining manner of the user to be isolated may include: and (3) carrying out user information quality grading and classification on various users such as individuals, enterprises and financial institutions managed in the core bank system according to preset rules by using the user information system. Furthermore, a user range needing to be brought into isolation management is screened out by integrating various factors such as user information quality level and category, user asset condition, user recent transaction condition, user signed service and the like.
Wherein, the user information quality level may include: the user information quality is higher when the level is higher, and users with low levels can be taken as users needing isolation. It is understood that other modes of classification may be adopted, and the specific classification may be determined according to practical situations, which are not limited by the embodiments of the present specification. The information quality categories may be classified in different manners to represent different liveness degrees, financial asset levels, and the like, which may be determined according to actual situations, and this is not limited in this specification.
In this embodiment, after determining the user scope that needs to be included in the isolation management, the core bank system may generate the user form information set to be isolated in a manner of using the screening script based on the user scope that needs to be included in the isolation management.
In this embodiment, the user to be isolated may be a person, an enterprise, a financial institution, or other various users managed in a core banking system, and the core banking system is a part of a bank that processes core user information, deposit products, loan products, payment services, and a core general ledger. The user information system provides a user-centered complete user relationship view on the basis of an advanced data structure, and provides data support for users and account information of the users in banks for front-line business personnel through efficient data display, wherein the data support comprises financial products purchased by the users and user grade information.
In this embodiment, the preset rule may include: the individual user: no transaction and no property (financial property balance + credit line conversion + loan balance) within two years, and the certificate expires for 90 days, or the name is not compliant, or the certificate type is not compliant, or the certificate number is not compliant. Of course, the preset rules are not limited to the above examples, and other modifications are possible for those skilled in the art in light of the technical spirit of the embodiments of the present disclosure, and all that can be achieved by the present disclosure is encompassed by the protection scope of the embodiments of the present disclosure as long as the functions and effects achieved by the present disclosure are the same as or similar to the embodiments of the present disclosure.
S102: determining an isolation data set in a first database according to the form information set of the user to be isolated; the isolation data set comprises user information of users to be isolated.
In this embodiment, since the form information set of the user to be isolated includes information of a form related to the user to be isolated, an isolated data set in the first database may be determined according to the form information set of the user to be isolated, where the isolated data set includes user information of the user to be isolated, and data in the isolated data set is data that needs to be isolated.
In this embodiment, the first database may be a database that is used by the system to store user information on a daily basis, for example, a database that is used by a core banking system to store user information.
In this embodiment, since the user information of the same user may be stored in the data tables of different types according to different related services, a list of the data tables related to the user to be isolated in the first database may be mapped according to the form information set of the user to be isolated, that is, a list of the data tables related to the user to be isolated in the first database may be mapped according to the account number, the user number, and the card number of the user to be isolated, which are recorded in the form information set of the user to be isolated. Further, the user information data recorded in the list of the data table related to the user to be isolated may be determined from the first database, and the determined data may be used as the data to be isolated.
In one example scenario, a list of data tables related to the user to be isolated in the first database may be filtered according to table 1, and the list of data tables related to the user to be isolated may be as shown in table 2:
TABLE 2
Figure BDA0002660745650000061
Figure BDA0002660745650000071
The fields in table 2 are used as business modules in a divided manner, so that business personnel of different teams can analyze and track the fields conveniently, and no other effect is caused. The batch processing refers to that the core bank system carries out processing and the like on a large amount of data regularly in a batch processing mode.
S103: data in the isolated data set is synchronized from the first database to the second database.
In this embodiment, the data recorded in the isolated dataset may be synchronized from the first database to the second database. The second database may be a database used as an isolation area, the second database is different from the first database, and the second database is not a database used for storing data in the core bank system, but a database used for storing data in the user account information management system is not standardized.
S104: data in the isolated data set is removed from the first database.
In this embodiment, in order to ensure effective isolation of user information of users to be isolated, after synchronizing data in the isolated data set from the first database to the second database, the data in the isolated data set may be physically deleted from the first database, so as to ensure that the first database does not have regular user data and irregular user data at the same time.
In this embodiment, there is no traffic between the first database and the second database, i.e. the first database and the second database are completely isolated in traffic. After the migration of the user information is completed, the user to be isolated becomes an isolated user, and after the data in the isolated data set stored in the first database is deleted, the isolation condition of each user can be identified by assigning the isolation state.
From the above description, it can be seen that the embodiments of the present specification achieve the following technical effects: by obtaining the information set of the form of the user to be isolated, the information characterizing the form related to the user to be isolated can be determined. According to the form information set of the user to be isolated, an isolated data set in the first database can be determined, and therefore the user information of the user to be isolated can be determined. Furthermore, in order to ensure effective isolation of the user information of the user to be isolated, the data in the isolated data set can be synchronized from the first database to the second database, and the data in the isolated data set can be removed from the first database, so that effective classification isolation management can be realized through the first database and the second database aiming at the user information of the user to be isolated.
In one embodiment, after deleting the data in the isolated data set stored in the first database, the service authority of the user to be isolated may be further narrowed from the first service authority range to the second service authority range. And the second service authority range is smaller than the first service authority range. For example: the first service authority range contains all service authorities, the second service authority range can only contain service authorities for user fund security and user sales processing, and the second service authority range can include automatic processing such as interest counting, interest bearing, automatic unfreezing and special counter transactions such as freezing, unfreezing and user sales. Of course, the second service right range and the first service right range are not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the embodiments of the present disclosure, but all the functions and effects of the embodiments of the present disclosure should be covered by the scope of the embodiments of the present disclosure.
In this embodiment, in order to facilitate the first database to accurately correspond to the service request of the user and the recovery of the user to be isolated, before deleting the data in the isolated data set stored in the first database, the form information set of the user to be isolated may also be stored in the first database.
In this embodiment, when receiving a service request of a user, the first database may determine whether the user is an isolated user according to the form information set of the user to be isolated, and if the user is a standard user, the first database may respond to the service request normally; if the service request is in the second service authority range, the service request can be judged, if yes, the service request is responded normally and isolation prompt information is sent, and if not, the isolation prompt information is fed back to the user. Wherein, the isolation prompt message may include: user account, user card number, isolation status, isolation type, and isolation reason, etc.
In one embodiment, in order to ensure that users who have been isolated and have performed user information entry can restore service permissions in time, after deleting data in an isolated data set stored in a first database, a batch polling method may be used to determine whether users to be restored meeting a restoration condition exist in users of a form information set of users to be isolated, and when it is determined that users to be restored exist, user information of the users to be restored is synchronized from a second database to the first database. Further, the user information of the user to be restored may be removed from the second database, and the service authority of the user to be restored may be restored from the second service authority range to the first service authority range.
In this embodiment, the recovery condition may be that the user satisfies the preset rule, and the user satisfying the preset rule does not need to isolate the user, so that the user information of the user to be recovered may be recovered. The polling is a way for a CPU (central processing unit) to decide how to provide peripheral device services, and is also called program control input/output. The polling method is characterized in that a CPU sends out inquiries at regular time, each peripheral device is inquired whether to need the service or not in sequence, if so, the peripheral device gives the service, the next peripheral device is inquired after the service is finished, and then the polling is repeated continuously, wherein the batch polling refers to that the inquiries are sent out at a certain time interval in a concurrent mode.
In one example, after the isolated user completes information entry through multiple channels (e.g., non-over-the-counter channels such as internet banking), the form information set of the user to be isolated can be queried in the core banking system through the interface bus, if the isolated user is checked to be in accordance with the recovery condition, the user information of the user to be recovered is automatically migrated back to the first database of the core banking system from the second database of the non-standard user account information management system by the system polling batch, and a migration transaction is initiated through a teller if the isolated user is checked to be failed. After the migration is completed, a recovery identifier is set for each user to be recovered in the non-standard user account information management system, the migrated data in the second database are deleted in batches every day, and the deleted migrated data are deleted before the data are downloaded on the same day. The core bank system downloads the change information of the isolation state of the user to be recovered every day through a data bus of a downloading platform for the credit card system to use, and completes the change of the isolation state of the isolation user in the credit card system according to a user information synchronization mechanism of the core bank system and the credit card system so as to keep the core bank system and other peripheral systems (such as the credit card system and the like) synchronous and completely remove the isolation limit.
In one embodiment, in order to ensure that a user who has been isolated and has performed user information entry can recover service authority in time, after deleting data in an isolated data set stored in a first database, a processing object of a target channel may initiate a user information relocation request when determining that a target isolated user completes user information entry, and user information of the target isolated user may be synchronized from a second database to the first database in response to the user information relocation request. Therefore, the user information of the target isolated user can be removed from the second database, and the service authority of the target isolated user is restored from the second service authority range to the first service authority range.
In this embodiment, the target channel may be a counter channel, and the target channel may be a processing person corresponding to each counter. The recovery operation can be directly carried out by a processing person of the counter under the condition that the user carries out information supplement through a counter channel, and the recovery operation is carried out by adopting a batch polling mode if the user carries out information supplement through other channels.
In one scenario example, after a user completes information entry through a counter channel, a teller initiates a user information migration request, and in response to the user information migration request of a target isolated user, the user information of the target isolated user is migrated back to a first database of a core bank system from a second database of an unspecified user account information management system, which is equivalent to non-batch migration. After the user information of the target isolated user is migrated back, a recovery identifier is set for each target isolated user in the non-standard user account information management system, migrated data in the second database are deleted in batches every day, and deletion of migrated data is completed before the data on the day is downloaded. The core bank system downloads the change information of the isolation state of the user to be recovered every day through a data bus of a downloading platform for the credit card system to use, and completes the change of the isolation state of the isolation user in the credit card system according to a user information synchronization mechanism of the core bank system and the credit card system so as to keep the core bank system and other peripheral systems (such as the credit card system and the like) synchronous and completely remove the isolation limit.
In the embodiment, the isolated user counter channel and the peripheral interface bus can be targeted, so that the isolated user who has supplemented the user information can be recovered to be a normal user in real time.
In one embodiment, the set of user form information to be isolated may include: user number, account, card number, quarantine status, quarantine reason, quarantine type. Each user can be distinguished by assigning a value to the isolation state, wherein an isolation state value of 0 indicates that the user is isolated, and an isolation state value of 1 indicates that the user is recovered and can be used as a recovery identifier. The normal canonical user information may not include the quarantine state information or the quarantine state value is null. The isolation status may also include other values, such as: 00 (to be isolated), 01 (to be restored), etc. Of course, the setting of the isolation state is not limited to the above examples, and other modifications are possible for those skilled in the art in light of the technical spirit of the embodiments of the present disclosure, and the functions and effects achieved by the embodiments of the present disclosure are all within the scope of the embodiments of the present disclosure.
In this embodiment, when data in the isolated data set is migrated from the first database to the second database, the isolation state of each user in the to-be-isolated user form information set may be assigned to 0, so as to represent that the user information of the to-be-isolated user is isolated. After the isolated user is confirmed to complete information supplementary recording, the isolation state of each user in the form information set of the user to be isolated can be modified to be 1. The isolation reason and the isolation type may be determined according to a quality level and a category of the user information in the user information system, and the isolation reason may include: incomplete user information, disabled users, low user activity, inaccurate user information, and the like; the above-mentioned isolation types may include: transaction isolation, card isolation, and the like, which may be determined according to actual conditions, and is not limited in this application.
In one embodiment, in order to ensure that the user can perform information entry in time, after deleting data in the isolated data set stored in the first database, isolation prompt information may be sent to each isolated user in the form information set of the user to be isolated, so as to prompt the user to perform information entry. Wherein, the isolation prompt message may include: user account, user card number, isolation status, isolation type, and isolation reason, etc. When the data in the isolated data set is migrated from the first database to the second database, the original business of processing the data related to the isolated user by the core bank system can be executed compatibly and uninterruptedly, so that the multiplexing degree is high, the isolated user supports the business function to multiplex the business function corresponding to the core bank system, and the financial transaction processing supported in the non-standard user account information management system are consistent with those of the core bank system.
In the embodiment, the non-standard user accounts in the core bank system can be effectively isolated, the second database in the non-standard user account information management system is matched for cooperative management, the business authority of the non-standard users is displayed, so that the supervision requirement is met, the influence on host resources is small, and the storage space required to be increased by physical isolation data is within a controllable range.
Based on the same inventive concept, the embodiment of the present specification further provides a data isolation device, such as the following embodiments. Because the principle of the data isolation device for solving the problem is similar to that of the data isolation method, the implementation of the data isolation device can refer to the implementation of the data isolation method, and repeated details are not repeated. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated. Fig. 2 is a block diagram of a structure of a data isolation apparatus according to an embodiment of the present disclosure, and as shown in fig. 2, the data isolation apparatus may include: a first obtaining module 201, a second obtaining module 202, a synchronizing module 203, and a removing module 204, which are described below.
A first obtaining module 201, configured to obtain a to-be-isolated user form information set; wherein, the information set of the form of the user to be isolated is used for representing the information of the form related to the user to be isolated
The second obtaining module 202 may be configured to determine an isolated data set in the first database according to the user form information set to be isolated; the isolation data set comprises user information of users to be isolated;
a synchronization module 203, which may be configured to synchronize data in the isolated data set from the first database to the second database;
a removal module 204 may be configured to remove data in the isolated data set from the first database.
The embodiment of the present specification further provides an electronic device, which may specifically refer to a schematic structural diagram of the electronic device based on the data isolation method provided by the embodiment of the present specification, shown in fig. 3, and the electronic device may specifically include an input device 31, a processor 32, and a memory 33. The input device 31 may be specifically configured to input a set of form information of a user to be isolated. The processor 32 may be specifically configured to obtain a to-be-isolated user form information set; the form information set of the user to be isolated is used for representing the information of the form related to the user to be isolated; determining an isolation data set in a first database according to the form information set of the user to be isolated; the isolation data set comprises user information of users to be isolated; synchronizing data in the isolated dataset from the first database to the second database; data in the isolated data set is removed from the first database. The memory 33 may be specifically configured to store parameters such as a user form information set to be isolated, an isolated data set, and the like.
In this embodiment, the input device may be one of the main apparatuses for information exchange between a user and a computer system. The input devices may include a keyboard, mouse, camera, scanner, light pen, handwriting input panel, voice input device, etc.; the input device is used to input raw data and a program for processing the data into the computer. The input device can also acquire and receive data transmitted by other modules, units and devices. The processor may be implemented in any suitable way. For example, the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, an embedded microcontroller, and so forth. The memory may in particular be a memory device used in modern information technology for storing information. The memory may include multiple levels, and in a digital system, memory may be used as long as binary data can be stored; in an integrated circuit, a circuit without a physical form and with a storage function is also called a memory, such as a RAM, a FIFO and the like; in the system, the storage device in physical form is also called a memory, such as a memory bank, a TF card and the like.
In this embodiment, the functions and effects specifically realized by the electronic device can be explained by comparing with other embodiments, and are not described herein again.
Embodiments of the present specification further provide a computer storage medium based on a data isolation method, where the computer storage medium stores computer program instructions, and when the computer program instructions are executed, the computer storage medium may implement: acquiring a form information set of a user to be isolated; the form information set of the user to be isolated is used for representing the information of the form related to the user to be isolated; determining an isolation data set in a first database according to the form information set of the user to be isolated; the isolation data set comprises user information of users to be isolated; synchronizing data in the isolated dataset from the first database to the second database; data in the isolated data set is removed from the first database.
In this embodiment, the storage medium includes, but is not limited to, a Random Access Memory (RAM), a Read-Only Memory (ROM), a Cache (Cache), a Hard Disk Drive (HDD), or a Memory Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set in accordance with a standard prescribed by a communication protocol.
In this embodiment, the functions and effects specifically realized by the program instructions stored in the computer storage medium can be explained by comparing with other embodiments, and are not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the embodiments of the present specification described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed over a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different from that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, embodiments of the present description are not limited to any specific combination of hardware and software.
Although the embodiments herein provide method steps as in the embodiments or flowcharts described above, more or fewer steps may be included in a method based on conventional or non-inventive efforts. In the case of steps where no causal relationship is logically necessary, the order of execution of the steps is not limited to that provided by the embodiments of the present description. When implemented in an actual apparatus or end product, the methods of (1) can be performed sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the figures.
It is to be understood that the above description is intended to be illustrative, and not restrictive. Many embodiments and many applications other than the examples provided will be apparent to those of skill in the art upon reading the above description. Thus, the scope of embodiments of the present specification should not be determined with reference to the above description, but should instead be determined with reference to the following claims, along with the full scope of such claims
The full range of equivalents to which such equivalents are entitled.
The above description is only a preferred embodiment of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure, and it will be apparent to those skilled in the art that various modifications and variations can be made in the embodiments of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the embodiments of the present disclosure should be included in the protection scope of the embodiments of the present disclosure.

Claims (10)

1. A method of data isolation, comprising:
acquiring a form information set of a user to be isolated; the form information set of the user to be isolated is used for representing the information of the form related to the user to be isolated;
determining an isolation data set in a first database according to the user form information set to be isolated; wherein the isolated data set comprises user information of the user to be isolated;
synchronizing data in the isolated data set from the first database to a second database;
removing data in the isolated data set from the first database.
2. The method of claim 1, further comprising, after deleting data in the isolated data set stored in the first database:
and reducing the service authority of the user to be isolated from a first service authority range to a second service authority range.
3. The method of claim 2, further comprising, prior to deleting data in the isolated data set stored in the first database:
and storing the user form information set to be isolated into the first database.
4. The method of claim 3, further comprising, after deleting data in the isolated data set stored in the first database:
determining whether users to be recovered meeting recovery conditions exist in the users of the form information set of the users to be isolated in a batch polling mode;
under the condition that the user to be recovered is determined to exist, synchronizing the user information of the user to be recovered from the second database into the first database;
removing the user information of the user to be recovered from the second database;
and restoring the service authority of the user to be restored from the second service authority range to the first service authority range.
5. The method of claim 3, further comprising, after deleting data in the isolated data set stored in the first database:
a processing object of a target channel initiates a user information migration request under the condition that a target isolated user is determined to finish user information supplement;
synchronizing user information of the target isolated user from the second database into the first database in response to the user information migration request;
removing the user information of the target isolated user from the second database;
and restoring the service authority of the target isolated user from the second service authority range to the first service authority range.
6. The method of claim 1, wherein migrating data in the isolated dataset from the first database to a second database comprises:
when the data in the isolation data set is migrated from the first database to the second database, assigning an isolation state in the user information of each user to be isolated in the isolation data set; and the isolation state after assignment represents that the user information of the user to be isolated is isolated.
7. The method of claim 1, further comprising, after deleting data in the isolated data set stored in the first database:
sending isolation prompt information to each isolated user in the form information set of the users to be isolated; wherein, the isolation prompt message includes: user account, user card number, quarantine status, quarantine type, and quarantine reason.
8. A data isolation device, comprising:
the first acquisition module is used for acquiring a form information set of a user to be isolated; the form information set of the user to be isolated is used for representing the information of the form related to the user to be isolated;
the second acquisition module is used for determining an isolation data set in the first database according to the user form information set to be isolated; wherein the isolated data set comprises user information of the user to be isolated;
a synchronization module to synchronize data in the isolated dataset from the first database to a second database;
a removal module to remove data in the isolated dataset from the first database.
9. A data isolation device comprising a processor and a memory for storing processor-executable instructions which, when executed by the processor, implement the steps of the method of any one of claims 1 to 7.
10. A computer-readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the method of any one of claims 1 to 7.
CN202010903985.4A 2020-09-01 2020-09-01 Data isolation method, device and equipment Active CN112035458B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010903985.4A CN112035458B (en) 2020-09-01 2020-09-01 Data isolation method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010903985.4A CN112035458B (en) 2020-09-01 2020-09-01 Data isolation method, device and equipment

Publications (2)

Publication Number Publication Date
CN112035458A true CN112035458A (en) 2020-12-04
CN112035458B CN112035458B (en) 2024-02-23

Family

ID=73590800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010903985.4A Active CN112035458B (en) 2020-09-01 2020-09-01 Data isolation method, device and equipment

Country Status (1)

Country Link
CN (1) CN112035458B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113205406A (en) * 2021-05-27 2021-08-03 中国工商银行股份有限公司 Abnormal area data service isolation method, device, electronic equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015039564A1 (en) * 2013-09-18 2015-03-26 Tencent Technology (Shenzhen) Company Limited Method and apparatus for data migration
CN108449327A (en) * 2018-02-27 2018-08-24 平安科技(深圳)有限公司 A kind of account method for cleaning, device, terminal device and storage medium
CN109656965A (en) * 2018-10-30 2019-04-19 平安科技(深圳)有限公司 A kind of account method for cleaning and device
CN110750584A (en) * 2019-09-18 2020-02-04 苏宁云计算有限公司 Data management method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015039564A1 (en) * 2013-09-18 2015-03-26 Tencent Technology (Shenzhen) Company Limited Method and apparatus for data migration
CN108449327A (en) * 2018-02-27 2018-08-24 平安科技(深圳)有限公司 A kind of account method for cleaning, device, terminal device and storage medium
CN109656965A (en) * 2018-10-30 2019-04-19 平安科技(深圳)有限公司 A kind of account method for cleaning and device
CN110750584A (en) * 2019-09-18 2020-02-04 苏宁云计算有限公司 Data management method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113205406A (en) * 2021-05-27 2021-08-03 中国工商银行股份有限公司 Abnormal area data service isolation method, device, electronic equipment and medium

Also Published As

Publication number Publication date
CN112035458B (en) 2024-02-23

Similar Documents

Publication Publication Date Title
CN111209346B (en) Block chain data archiving method and device and computer readable storage medium
JP7103345B2 (en) Analysis system, analysis method and program
US11775560B1 (en) Method and system for using before images of changes for continuously comparing two databases which are actively being kept synchronized
CN108304554B (en) File splitting method and device, computer equipment and storage medium
CN103634144B (en) The configuration file management method of many IDC clusters, system and equipment
WO2022048357A1 (en) Transaction endorsement method and apparatus, and storage medium
CN112291372B (en) Asynchronous posting method, device, medium and electronic equipment for block chain
US11880356B1 (en) Multi-processor transaction-based validation architecture that compares indicia associated with matching transaction tags
WO2020051312A1 (en) Blockchain timeclock system
CN113204598A (en) Data synchronization method, system and storage medium
CN112035458B (en) Data isolation method, device and equipment
CN113112344B (en) Service processing method, device, storage medium and computer program product
CN109005167B (en) Authentication data processing method and device, server and storage medium
CN106708879B (en) Service data processing method and device
CN107526759B (en) Information processing apparatus and information processing method
CN114372293A (en) Block chain based data approval method, device, equipment and storage medium
US20230050048A1 (en) Isolating And Reinstating Nodes In A Distributed Ledger Using Proof Of Innocence
WO2019210624A1 (en) Feature screening method and apparatus, computer device and storage medium
CN111797590B (en) Data checking method, device and equipment
CN112750043A (en) Business data pushing method and device and server
CN112417459A (en) Large-scale terminal equipment safety assessment method and system and computer equipment
CN107123051B (en) Resource synchronization method and device
CN114896430A (en) Image data management method and device
WO2020071938A1 (en) Method and system for flagging actions of a user for subsequent analysis and storage
CN113849566B (en) Litigation evidence storage system based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant