Disclosure of Invention
The embodiment of the application provides a Connector-based data exchange method, device and medium, which are used for solving the following technical problems: many conventional data exchange schemes lack sufficient encryption protection during data transmission such that the privacy and integrity of the data pose a serious threat.
The embodiment of the application adopts the following technical scheme:
The embodiment of the application provides a data exchange method based on a Connector. The method comprises the steps of acquiring required data through a Connector based on meta-component configuration or ODBC based data access configuration; preprocessing the acquired required data, and masking the preprocessed data by a specific field; acquiring an identity credential corresponding to a user, and determining that the user has permission to access a Connector under the condition that the identity credential passes detection; determining a data access range corresponding to a user with the authority to access the Connector based on a preset access rule; the preset access rule is related to the user identity, the user role and the user authority level; and inquiring the required data subjected to specific field covering processing based on the data access range so as to display the data meeting the requirements to a user.
The embodiment of the application realizes non-invasive data acquisition and retrieval through the mutual communication and cooperation of connectors, avoids direct operation and modification of the original system, and reduces secondary development of the system. And secondly, the integration of multi-source heterogeneous data is realized based on the data acquisition and retrieval of the components and the data access based on the ODBC. In addition, the embodiment of the application introduces a security authentication and access control mechanism, supports various identity verification modes, and ensures the security and data protection in the data exchange process. The non-invasive data exchange method based on the Connector provides key components such as efficient data collection, access control, security authentication, data processing and the like, ensures that the flow and interaction of data are seamless, enables a system to efficiently utilize the data, and has high efficiency and controllability.
In one implementation of the present application, the acquiring, through the Connector, the required data based on the meta-component configuration or the ODBC-based data access configuration specifically includes: when the required data is acquired through the component configuration, determining a corresponding component in a component pool based on the acquired metadata; determining a corresponding analysis method based on a data structure and a data format stored by a data source;
based on the components and the corresponding analysis method, the required data are acquired in the data storage system through the Connector.
In one implementation of the present application, the acquiring, through the Connector, the required data based on the meta-component configuration or the ODBC-based data access configuration specifically includes: when the required data is acquired through the ODBC-based data access configuration, establishing connection with a data source through configuration of ODBC data source information; based on the obtained query content, query type matching is carried out, and an SQL query request is sent to a data source through a Connector; determining query data in a data source based on the query type; optimizing the queried information to take the processed data as required data; the optimization processing at least comprises one of information selection, information filtering and information arrangement.
In one implementation manner of the present application, preprocessing is performed on acquired required data, and specific field covering processing is performed on the preprocessed data, which specifically includes: preprocessing required data; wherein the preprocessing at least comprises one of date formatting processing and data cleaning; determining a data source system and a target system corresponding to the preprocessed data, and performing format conversion on the preprocessed data based on data formats respectively corresponding to the data source system and the target system so as to map the preprocessed data to the target system; determining a data type corresponding to the preprocessed data, and determining a corresponding shielding field in a preset shielding content table based on the data type; and performing specific field covering processing on the preprocessed data based on the mask field.
In one implementation of the present application, specific field covering processing is performed on the preprocessed data based on the mask field, which specifically includes: determining a shielding type corresponding to the shielding field based on the field type corresponding to the shielding field; wherein the mask type comprises at least one of fixed character substitution, random character generation, partial character reservation, and character encryption; determining an encryption grade corresponding to the field type, and superposing the shielding type based on the encryption grade; and covering the mask field based on the overlapped mask type.
In one implementation manner of the application, an identity credential corresponding to a user is obtained, and when the identity credential passes detection, the user is determined to have the right to access the Connector, which specifically comprises the following steps: acquiring an identity credential corresponding to a user; the identity certificate is encrypted through a preset encryption algorithm; decrypting the identity credential based on a decryption algorithm corresponding to a preset encryption algorithm to obtain a reference identity credential and a reference timestamp; carrying out hash value calculation on the reference identity certificate, and comparing the calculated hash value with a prestored hash value; performing validity detection on the reference timestamp; and under the condition that the comparison results are consistent and the effectiveness detection is passed, carrying out data query permission allocation on the user based on the reference identity certificate, and determining the permission of the user to access the Connector based on the data query permission.
In one implementation of the present application, determining a data access range corresponding to a user having a right to access a Connector based on a preset access rule specifically includes: determining a reference data access range corresponding to a user based on a preset access rule, a user identity and a user role; determining abnormal access information and normal access information based on historical access information corresponding to a user, and determining initial confidence corresponding to the user based on a numerical value ratio between the abnormal access information and the normal access information; acquiring reference users with association relation with the users, and acquiring reference confidence degrees respectively corresponding to the reference users; and determining final confidence corresponding to the user based on the initial confidence and each reference confidence, and adjusting the reference data access range based on the final confidence to obtain the data access range.
In one implementation manner of the present application, based on a data access range, the method queries required data after specific field covering processing to display the required data to a user, specifically includes: acquiring query information sent by a user, and querying in a data access range based on the query information to obtain data to be displayed; based on user permission, determining a viewable field, matching the viewable field with the covered specific field, and displaying the covered specific field in the data to be displayed based on a matching result; acquiring historical query information corresponding to a user, and sorting the historical query information based on the query times; matching the data after the display processing with the historical query information to determine a display sequence corresponding to the data after the display processing; and displaying the data after the display processing to a user based on the display sequence.
The embodiment of the application provides a Connector-based data exchange device, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to: acquiring required data through a Connector based on meta-component configuration or ODBC based data access configuration; preprocessing the acquired required data, and masking the preprocessed data by a specific field; acquiring an identity credential corresponding to a user, and determining that the user has permission to access a Connector under the condition that the identity credential passes detection; determining a data access range corresponding to a user with the authority to access the Connector based on a preset access rule; the preset access rule is related to the user identity, the user role and the user authority level; and inquiring the required data subjected to specific field covering processing based on the data access range so as to display the data meeting the requirements to a user.
The non-volatile computer storage medium provided by the embodiment of the application stores computer executable instructions, and the computer executable instructions are set as follows: acquiring required data through a Connector based on meta-component configuration or ODBC based data access configuration; preprocessing the acquired required data, and masking the preprocessed data by a specific field; acquiring an identity credential corresponding to a user, and determining that the user has permission to access a Connector under the condition that the identity credential passes detection; determining a data access range corresponding to a user with the authority to access the Connector based on a preset access rule; the preset access rule is related to the user identity, the user role and the user authority level; and inquiring the required data subjected to specific field covering processing based on the data access range so as to display the data meeting the requirements to a user.
The above at least one technical scheme adopted by the embodiment of the application can achieve the following beneficial effects: the embodiment of the application realizes non-invasive data acquisition and retrieval through the mutual communication and cooperation of connectors, avoids direct operation and modification of the original system, and reduces secondary development of the system. And secondly, the integration of multi-source heterogeneous data is realized based on the data acquisition and retrieval of the components and the data access based on the ODBC. In addition, the embodiment of the application introduces a security authentication and access control mechanism, supports various identity verification modes, and ensures the security and data protection in the data exchange process. The non-invasive data exchange method based on the Connector provides key components such as efficient data collection, access control, security authentication, data processing and the like, ensures that the flow and interaction of data are seamless, enables a system to efficiently utilize the data, and has high efficiency and controllability.
Detailed Description
The embodiment of the application provides a Connector-based data exchange method, device and medium.
In order to make the technical solution of the present application better understood by those skilled in the art, the technical solution of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
The following describes the technical scheme provided by the embodiment of the invention in detail through the attached drawings.
Fig. 1 is a flowchart of a data exchange method based on a Connector according to an embodiment of the present application.
As shown in fig. 1, the data exchange method includes the steps of:
S101, acquiring required data through a Connector based on meta-component configuration or ODBC based data access configuration.
In one embodiment of the application, when the required data is acquired through the meta-component configuration, the corresponding meta-component is determined in the component pool based on the acquired meta-data. Based on the data structure and data format stored by the data source, a corresponding parsing method is determined. Based on the components and the corresponding analysis method, the required data are acquired in the data storage system through the Connector.
In particular, metadata-based data collection and retrieval obtains data from a variety of different data storage modalities, including warehouse management systems, supplier databases, transportation management systems, files, and file systems, etc., through Connector connectors, reflecting the diversity and complexity of the data sources. In the process of data acquisition and retrieval, the data structure and format stored by the data sources are considered to ensure that the data can be correctly analyzed and processed, the characteristics of different data sources are deeply understood, and proper data processing and analysis methods are adopted. Data sources mainly refer to databases, files, web services, user inputs and the like. For relational databases, SQL (structured query language) is used for querying, inserting, updating and deleting data. For different text files, file manipulation functions or libraries in the programming language may be used to read and parse the file contents. For websites that do not provide an API interface, UIPath is utilized to crawl the web page content and extract the required data. And verifying the data input by the user through the form, and ensuring the accuracy and the integrity of the data.
Further, the metadata-based data collection and retrieval does not rely solely on a single data element, but rather is represented in terms of a higher level of metadata and reorganization of the data elements. The core idea is to access the data by reorganizing and utilizing the meta-members instead of directly accessing the original data elements. The meta-members are supported by various data elements, and typically contain a richer association between information and data elements, thereby providing a more comprehensive data representation and processing capability.
Further, the data elements are basic building blocks of the meta-component, they represent the minimum unit of data, and the data elements may be different types of data such as numbers, text, dates, etc. In the meta-component, one or more data elements are interrelated, together forming a larger data entity. During data access, the system utilizes meta-members corresponding to the data elements in the member pool to perform data access. The component pool is a central storage area for storing and managing the components, so that the data requirements can be responded quickly, and the efficiency and accuracy of data access can be improved. Fig. 2 is a schematic diagram of a relationship among a component pool, a component and a data element, where, as shown in fig. 2, the component is searched according to metadata, where a plurality of different components are stored in the component pool, and different components respectively include different data elements, and data extraction is performed according to the components, for example, data extraction may be performed in a logistics information system.
In one embodiment of the present application, when the required data is acquired through the ODBC-based data access configuration, a connection with the data source is established through configuration of ODBC data source information. And carrying out query type matching based on the acquired query content, and sending an SQL query request to a data source through a Connector. Query data is determined in the data source based on the query type. Optimizing the queried information to take the processed data as required data; the optimization processing at least comprises one of information selection, information filtering and information arrangement.
In particular, ODBC-based data access is another collection approach. The Connector establishes a connection with a data source by configuring ODBC data source information. The Connector can automatically identify the type, structure and parameters of the data source and generate corresponding connection configuration, so that intelligent configuration is realized. The Connector can intelligently identify the type and parameters of the data source and automatically complete the configuration of the connection. The user does not need to manually input complicated connection information, but enables the Connector to automatically complete connection setting according to the characteristics of the data source, so that time and energy are saved.
Further, once a connection is established with a data source, the Connector can send an SQL query request to obtain the required data. The Connector in the embodiment of the application can be optimized according to the query requirement of the user, and comprises the operations of selection, filtering, sorting and the like so as to ensure that only required data is retrieved. Therefore, the data retrieval efficiency can be improved, unnecessary data transmission and processing are reduced, and the data acquisition speed is further increased.
Further, the obtained data is returned in a structured mode after being processed by a Connector. The embodiment of the application also provides a data processing function, which can further process and convert the data so as to adapt to the data standard and format requirement of a target system. This includes data mapping, data cleansing, data conversion, etc., to ensure the quality and consistency of the data. Such data processing functionality enables a user to integrate data directly into a target system without additional data processing effort.
S102, preprocessing the acquired required data, and masking the preprocessed data by a specific field.
In one embodiment of the application, the required data is preprocessed; wherein the preprocessing includes at least one of date formatting and data cleansing. Determining a data source system and a target system corresponding to the preprocessed data, and performing format conversion on the preprocessed data based on data formats respectively corresponding to the data source system and the target system so as to map the preprocessed data to the target system. And determining a data type corresponding to the preprocessed data, and determining a corresponding mask field in a preset mask content table based on the data type. And performing specific field covering processing on the preprocessed data based on the mask field.
Specifically, preprocessing in embodiments of the present application refers to an important sequence of normalization, cleaning, and conversion steps performed on the collected data. In the process of logistics data, various operations need to be carried out on the data so as to ensure that the data are uniform in format, clear in content and meet the requirements of a target system. First, the date format needs to be standardized so that date data from different sources can be correctly identified and processed by the system.
Second, duplicate items or erroneous data in the data need to be cleared to ensure that analysis and decision-making is based on accurate information.
Further, the data conversion is to map the data to the data standard adopted by the target system, so that the data can be transferred and applied seamlessly between different systems. Thereby ensuring the accuracy and consistency of the data and providing a reliable basis for the subsequent data analysis and service application.
Further, in order to ensure the security and privacy of the data, the preprocessed data needs to be covered. In particular in the field of logistics, data processing is particularly important, as logistics data may relate to information that is not authorized to be accessed. Specifically, the data hiding is a blurring process for hiding part of the content of the data to prevent information leakage. And determining corresponding shielding fields in a preset shielding content table according to the types of the preprocessed data, wherein the preset shielding content table comprises a plurality of data types and shielding fields respectively corresponding to different data types. In combination, data processing plays a vital role in the logistics industry, so that not only can data security be protected, but also the availability and applicability of the data can be improved.
In one embodiment of the application, the mask type corresponding to the mask field is determined based on the field type corresponding to the mask field; wherein the mask type includes at least one of fixed character substitution, random character generation, partial character reservation, and character encryption. And determining an encryption grade corresponding to the field type, and superposing the shielding type based on the encryption grade. And covering the mask field based on the overlapped mask type.
In particular, common types of sensitive fields include personal identity information: such as name, identification card number, passport number, etc., financial information: such as bank card number, transaction amount, etc., contact means: such as telephone numbers, email boxes, etc. Each field type requires a different masking approach because of the different sensitivity and format of the information it contains. For example, replacing all or part of the characters in the field with a specific character (e.g., an asterisk), replacing sensitive information in the field with a randomly generated sequence of characters, retaining part of the characters in the field (e.g., the beginning and ending characters), replacing the remaining part with a specific character, or encrypting the field using an encryption algorithm to render the sensitive information unreadable ciphertext.
Further, an encryption level corresponding to the field is determined, wherein the encryption level reflects the data sensitivity and the degree of protection. Different field types may correspond to different encryption levels. For example, highly sensitive information such as identification numbers, bank card numbers, etc. may require a higher encryption level, while some relatively less sensitive fields (e.g., telephone numbers) may employ a lower encryption level. In some cases, a single mask type may not be sufficient to meet the data protection requirements. At this time, the superimposition processing may be performed on the mask type according to the encryption level. For example, for highly sensitive fields, character encryption may be first performed, and then the encrypted result may be subjected to fixed character substitution or partial character processing reserved to increase the level and difficulty of data protection. And carrying out actual covering treatment on the sensitive fields according to the determined shielding type and encryption level.
Furthermore, the application automatically covers the sensitive information by adopting the RPA technology, and only displays necessary information. For example UiPath may automatically mask sensitive information, only showing the necessary information. UiPath can automatically shield specific fields in files such as PDF, excel and the like, so that sensitive information is ensured to be visible only to personnel with specific rights. UiPath the automated process can obtain information from a variety of data sources and through a series of preprocessing steps, ensure data consistency and accuracy. After data acquisition and processing, the user with access rights can search the processed data through the Connector. Before access, the user needs to confirm and control the access through the security mechanism such as UiPath Orchestrator, so as to ensure the security of the data.
Specifically, users with different authorities can retrieve different information conforming to the roles and authorities of the users according to the set access rules. For example, a warehouse manager may access inventory data without being able to view real information. Data hiding is a widely used technique in data sharing and display, and its main purpose is to hide or obscure the restricted access portion in the data to limit the access range of the information. In the field of logistics, data hiding is often applied to processing information such as logistics orders and goods tracking. Through data coverage, only authorized users can view complete data, and other people can only see partial information or fuzzy information, so that the security and privacy of sensitive data are protected.
For example, assuming a logistics company needs to share cargo tracking information to customers, but does not want customers to be able to see a specific cargo location, a data mask may be used to display only obscured location information or to hide a portion of sensitive cargo information to customers. Therefore, even if the data is accessed by unauthorized persons, important information cannot be revealed, and the safety and privacy of the data are guaranteed.
S103, acquiring an identity credential corresponding to the user, and determining that the user has the authority to access the Connector under the condition that the identity credential passes detection.
In one embodiment of the application, an identity credential corresponding to a user is obtained; wherein the identity credential has been encrypted by a preset encryption algorithm. And decrypting the identity credential based on a decryption algorithm corresponding to a preset encryption algorithm to obtain a reference identity credential and a reference timestamp. And carrying out hash value calculation on the reference identity certificate, and comparing the calculated hash value with a prestored hash value. And performing validity detection on the reference timestamp. And under the condition that the comparison results are consistent and the effectiveness detection is passed, carrying out data query permission allocation on the user based on the reference identity certificate, and determining the permission of the user to access the Connector based on the data query permission.
Specifically, a user identity credential is obtained, where the identity credential in the embodiment of the present application is identity information, such as a user name, a password, a token, etc., that a user holds in order to access a system or perform some operation. The identity credentials are encrypted by a preset encryption algorithm to protect the security of the data during transmission or storage. The encrypted identity credentials are restored to the original information by a decryption algorithm corresponding to the preset encryption algorithm. The decrypted information typically contains the user's identity credential (e.g., a user name) and a timestamp. And carrying out hash value calculation on the decrypted reference identity certificate, and comparing the calculated hash value with a prestored hash value to verify whether the identity certificate submitted by the user is true and effective. And if the comparison results are consistent, indicating that the identity certificate submitted by the user is legal.
Further, by comparing the reference time stamp with the current time, it is determined whether the encryption operation is completed within a certain valid time range. If the time difference exceeds a preset threshold (e.g., minutes, hours, etc.), the identity credential is deemed to have expired and is no longer valid. And under the condition that the comparison results are consistent and the validity detection is passed, the system distributes corresponding data query authorities according to the reference identity credentials (actually, the user identity). These rights may include the range of data that the user can query, the level of detail of the query, etc.
Further, security authentication is the first line of defense to ensure Connector security and data protection. Only authenticated users or components may enter the system, thereby reducing unauthorized access and potential security vulnerabilities. It is the process in the Connector that confirms the validity of the user identity or component, which is typically done before access control is implemented. Security authentication in embodiments of the present application is supported by UiPath Orchestrator for managing access rights of users, robots, or other components connected to the Connector. UiPath Orchestrator also support various ways of identity verification including user name and password, single sign-on authentication, multi-factor authentication, etc., the user or component can perform identity verification by providing UiPath Orchestrator supported identity credentials. During the security authentication process UiPath Orchestrator may indicate that the user or component has been authenticated by issuing a temporary access token (Access Tokens), with the right to access the Connector. Second, the centralized identity management function of UiPath Orchestrator may be utilized to assign appropriate rights to a user or component. In the data exchange method based on the non-invasive data acquisition and retrieval of the Connector, the security authentication can also prevent unauthorized data access, ensure the security of the connection to different systems or data sources, and jointly construct a secure Connector architecture.
S104, determining a data access range corresponding to the user with the authority of accessing the Connector based on a preset access rule.
In one embodiment of the application, the reference data access range corresponding to the user is determined based on preset access rules, user identity and user role. Based on the historical access information corresponding to the user, abnormal access information and normal access information are determined, and based on the numerical value ratio between the abnormal access information and the normal access information, initial confidence corresponding to the user is determined. And obtaining reference users with association relation with the users, and obtaining the reference confidence degrees respectively corresponding to the reference users. And determining final confidence coefficient corresponding to the user by the initial confidence coefficient and each reference confidence coefficient, and adjusting the reference data access range based on the final confidence coefficient to obtain the data access range.
Specifically, the embodiment of the application presets a series of access rules which define the data ranges which can be accessed by different identities (such as staff and management layers) and roles (such as department manager and project manager). Based on the identity information (such as employee number, name) and role information (such as post, responsibility) of the user, the data access rights that the user should enjoy, i.e. the reference data access scope, can be preliminarily determined. The embodiment of the application records the past data access behaviors of the user, including the type, time, frequency and the like of the accessed data. By analyzing the historical access information, abnormal access behaviors of the user, such as frequent access to data in non-functional areas, access to sensitive data at irregular times, and normal access behaviors, are identified. By calculating the proportion between the abnormal access information and the normal access information, the compliance and risk of the user access behavior can be evaluated, and then the initial confidence of the user can be determined.
Further, reference users having direct or indirect associations with the user are identified, which associations may be based on work relationships (e.g., colleagues, superordinates), social network relationships, etc., and for each reference user, a reference confidence level is also calculated in a similar manner (based on their identity, roles, historical access behaviors, etc.), indicating the trustworthiness of the user's access behavior. And comprehensively evaluating the initial confidence coefficient of the user and the reference confidence coefficient of each reference user through a certain algorithm (such as weighted average, machine learning model and the like) to obtain the final confidence coefficient of the user. And dynamically adjusting the data access range of the user by the system according to the final confidence level of the user. If the final confidence is higher, the access behavior of the user is more compliant and credible, and the data access authority of the user can be possibly enlarged; conversely, if the final confidence is low, the system may restrict or reduce its data access rights to reduce potential security risks.
Furthermore, in the data exchange method based on the non-invasive data acquisition and retrieval of the Connector, the access control is a key component for ensuring the safety of system data and functions, and is also a second defense line of the Connector. The access control in the embodiments of the present application aims to define who can access the system, and the data and functional scope that can be accessed. The realization of the target depends on preset rules and the safety authentication passed by the user or the component, and meanwhile, a semantic-based access control reasoning method is adopted to ensure the accuracy and the high efficiency of the access control. Wherein the formulation of the access control rules involves consideration of a number of factors, all of which are determined by the data holder.
Specifically, the identity of the user, the role played, the level of authority, etc. are all important factors affecting the setting of access control rules. When rules are formulated, flexible adjustment can be performed according to different requirements and scenes so as to ensure that only authorized users can access the system. For example, a rule may define a particular type of data that a user can access or perform a particular operation, with its access rights being dynamically determined based on a particular attribute of the user or system. The rule can be deduced according to semantic information, so that access control can be effectively implemented under various situations, for example, a user is taken as an A warehouse manager, and has the authority to view information of goods in the A warehouse and manage the goods, and in this case, the manager has the authority to view information of fragile goods, dangerous goods and the like, and the access control is deduced through set semantics. In particular, these rules can be combined with the user's role and current context information, such as the system can dynamically determine whether the user has the right to perform an operation or access specific data by accessing information it obtains and information that is inferred later or attributes that the user has. This means that the data holder can update the rules to clarify the ownership of the data according to new traffic requirements or security considerations without modifying the code of the application. The flexible access control mechanism enables the system to be better suitable for different application scenes, like in a logistics scene, warehouse staff can access inventory data according to the self manager attribute, but cannot see order data or transportation data, and a carrier can check the transportation data of goods by taking the carrier as the attribute of an operator of a transportation means, so that the safety of the system is improved, and the convenience of use of a user is also improved.
S105, inquiring the required data subjected to specific field covering processing based on the data access range so as to display the data meeting the requirements to a user.
In one embodiment of the application, query information sent by a user is acquired, and based on the query information, the query is performed within a data access range to obtain data to be displayed. Based on the user permission, determining a viewable field, matching the viewable field with the covered specific field, and displaying the covered specific field in the data to be displayed based on a matching result. And acquiring historical query information corresponding to the user, and sorting the historical query information based on the query times. And matching the data after the display processing with the historical query information to determine the display sequence corresponding to the data after the display processing. And displaying the data after the display processing to a user based on the display sequence.
Specifically, first it is necessary to receive query information entered by a user, typically through a Web form, API request, or other user interface element. The query information may include specific search terms, filter terms, data ranges, and the like. And executing the query operation within the allowed data access range according to the query information provided by the user. The user's rights are checked to determine which data fields the user is entitled to view. The user's rights may be based on their role, position, or other security policy. All specific fields (e.g., sensitive information, private data, etc.) that need to be obscured are identified and then matched to fields viewable by the user. For fields which the user has no authority to view, the system can adopt a mode of covering, hiding or replacing with placeholders and the like to process, so that the data displayed to the user is ensured to accord with the authority range of the user, and sensitive information is protected from being revealed.
Further, historical query information of the user is recorded and maintained, including query content, time stamps, and the like. These historical query information are ranked according to the number of queries or other ranking criteria (e.g., chronological order). And matching the data after the display processing with the historical query information of the user to determine the optimal display sequence. And displaying the processed data to a user in a user-friendly mode according to the determined display sequence.
Fig. 3 is a schematic structural diagram of a Connector-based data exchange device according to an embodiment of the present application. As shown in fig. 3, the Connector-based data exchange device includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to: acquiring required data through a Connector based on meta-component configuration or ODBC based data access configuration; preprocessing the acquired required data, and masking the preprocessed data by a specific field; acquiring an identity credential corresponding to a user, and determining that the user has permission to access a Connector under the condition that the identity credential passes detection; determining a data access range corresponding to a user with the authority to access the Connector based on a preset access rule; the preset access rule is related to the user identity, the user role and the user authority level; and inquiring the required data subjected to specific field covering processing based on the data access range so as to display the data meeting the requirements to a user.
The non-volatile computer storage medium provided by the embodiment of the application stores computer executable instructions, and the computer executable instructions are set as follows: acquiring required data through a Connector based on meta-component configuration or ODBC based data access configuration; preprocessing the acquired required data, and masking the preprocessed data by a specific field; acquiring an identity credential corresponding to a user, and determining that the user has permission to access a Connector under the condition that the identity credential passes detection; determining a data access range corresponding to a user with the authority to access the Connector based on a preset access rule; the preset access rule is related to the user identity, the user role and the user authority level; and inquiring the required data subjected to specific field covering processing based on the data access range so as to display the data meeting the requirements to a user.
The embodiments of the present application are described in a progressive manner, and the same and similar parts of the embodiments are all referred to each other, and each embodiment is mainly described in the differences from the other embodiments. In particular, for apparatus, devices, non-volatile computer storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the section of the method embodiments being relevant.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the embodiments of the application by those skilled in the art. Such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.