CN113177220B - Service safety system capable of carrying out remote data protection - Google Patents

Service safety system capable of carrying out remote data protection Download PDF

Info

Publication number
CN113177220B
CN113177220B CN202110582354.1A CN202110582354A CN113177220B CN 113177220 B CN113177220 B CN 113177220B CN 202110582354 A CN202110582354 A CN 202110582354A CN 113177220 B CN113177220 B CN 113177220B
Authority
CN
China
Prior art keywords
information
data
inquirer
intelligent terminal
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110582354.1A
Other languages
Chinese (zh)
Other versions
CN113177220A (en
Inventor
徐胜旺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Digital Storage Technology Co ltd
Original Assignee
Shenzhen Digital Storage Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Digital Storage Technology Co ltd filed Critical Shenzhen Digital Storage Technology Co ltd
Priority to CN202110582354.1A priority Critical patent/CN113177220B/en
Publication of CN113177220A publication Critical patent/CN113177220A/en
Application granted granted Critical
Publication of CN113177220B publication Critical patent/CN113177220B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a business safety system capable of performing remote data protection, which is used for solving the problems that the business information in an enterprise is easy to obtain by the outside and the safety level is low because the encryption, storage and query processes of the information in the existing enterprise are simple; the system comprises a login selection module, a remote database, a local login client, an intelligent terminal, an uploader information analysis module, an inquirer information analysis module, an encryption module, a data storage module and a data inquiry module; the invention encrypts the service information uploaded by the login user through the encryption module by the intelligent terminal, improves the data security, stores the encrypted service information to the remote database through the data storage module according to the information analysis module of the login user, improves the data storage security, judges the query result output process of the querier according to the higher priority and the lower priority obtained by the querier information analysis module, and increases the data query security.

Description

Service safety system capable of carrying out remote data protection
Technical Field
The invention relates to the technical field of network application, in particular to a service safety system capable of performing remote data protection.
Background
With the development of informatization process and the expansion of industry user scale, the telecommunication service operation support system accumulates a large amount of user information, the mass user information is an important resource for operation of each industry and is also a target of a plurality of beneficiaries, and how to protect the safety of the user information and maintain the legal rights and interests of users becomes one of the problems that the telecommunication service operation support system of each company must solve.
The encryption, storage and query processes of the information in the existing enterprise are simple, so that the business information in the enterprise is easily acquired by the outside, and the security level of the enterprise is low.
In order to solve the above-mentioned drawbacks, a technical solution is now provided.
Disclosure of Invention
The invention aims to provide a service security system capable of performing remote data protection.
The technical problems to be solved by the invention are as follows:
the encryption, storage and query processes of the information in the existing enterprise are simple, so that the business information in the enterprise is easily acquired by the outside, and the security level of the enterprise is low.
The purpose of the invention can be realized by the following technical scheme:
a business safety system capable of performing remote data protection comprises a login selection module, a remote database, a local login client, an intelligent terminal, an uploader information analysis module, an inquirer information analysis module, an encryption module, a data storage module and a data inquiry module;
the login selection module is used for a login user to input the information of the uploader and the information of the inquirer through the intelligent terminal and send the information of the uploader and the information of the inquirer to the uploader information analysis module and the inquirer analysis module through the local login client;
the uploader information analysis module is used for analyzing the uploader information and generating a first comparison signal and a second comparison signal;
the inquirer information analysis module is used for analyzing inquirer information and generating a third comparison signal and a fourth comparison signal;
the encryption module is used for encrypting the service information uploaded by the uploader to obtain encrypted text data;
the information storage module is internally provided with an acquisition unit and is used for storing the information of the uploader, the information of the inquirer and the encrypted text data, storing the information of the uploader, the information of the inquirer and the encrypted text data and transmitting the information of the inquirer and the encrypted text data to a remote database;
the data query module is used for a querier to query the service information in the remote database.
Further, the login selection module comprises the following working steps:
the login selection module is used for completing registration and login, selection options are popped up during login, the selection options comprise an uploader and an inquirer, login is completed if the identity of the login user is selected as the uploader and the information of the uploader is input, and login is completed if the identity of the login user is selected as the inquirer and the information of the inquirer is input.
Further, the specific analysis steps of the uploader information analysis module are as follows:
s31, obtaining uploader information in the intelligent terminal, wherein the uploader information comprises position data, academic data, annual income data and intelligent terminal model data of the uploader;
s32, setting different uploading person position types to correspond to different position type preset values, matching the position types in the acquired position data with all position types to acquire corresponding position preset values, and setting the position types as first position preset values YZi, wherein i is 1,2, … and n;
s33, setting different calendar types of the uploaders to correspond to different calendar type preset values, and matching the calendar types in the acquired calendar data with all the calendar types to acquire corresponding calendar preset values YXi;
s34, setting different intelligent terminal model types of the uploader to correspond to different intelligent terminal model type preset values, and matching the intelligent terminal model types in the obtained intelligent terminal model data with all the intelligent terminal model types to obtain corresponding intelligent terminal model preset values YNI;
s35, setting the annual income value in the annual income data to YWi;
s36, passing formula
Figure BDA0003086487160000031
Acquiring a grade judgment value G, wherein a1, a2, a3 and a4 are all preset proportionality coefficients and are larger than zero,
Figure BDA0003086487160000032
determining a correction factor for a preset grade and greater than zero;
s37, comparing the grade judgment value G with a preset grade judgment threshold value G1, and when G is larger than or equal to G1, marking the uploaded person information as superior information and generating a first comparison signal; when G is smaller than G1, marking the uploaded person information as inferior information and generating a second comparison signal; and combining the first comparison signal and the second comparison signal to obtain a first comparison signal set.
Further, the specific analysis steps of the inquirer information analysis module are as follows:
s41, obtaining inquirer information in the intelligent terminal, wherein the inquirer information comprises position data, intelligent terminal position data, age data and registration duration data of the inquirer;
s42, matching the job types in the acquired job data with all job types to acquire corresponding job preset values, and setting the job preset values to second job preset values EZj, where j is 1,2, …, m;
s43, setting different intelligent terminal position types of inquirers to correspond to different intelligent terminal position type preset values, and matching the intelligent terminal position types in the obtained intelligent terminal position data with all the intelligent terminal position types to obtain corresponding intelligent terminal position preset values EZj;
s44, setting the age in the age data as ENj;
s45, setting the registration time length in the registration time length data to be EWj;
s46, passing formula
Figure BDA0003086487160000041
Acquiring an authority judgment value H, wherein b1, b2, b3 and b4 are all preset proportionality coefficients, and lambda is a preset authority judgment correction factor;
s47, comparing the permission judgment value H with a preset permission judgment threshold value H1, when H is larger than or equal to H1, marking the inquirer as high priority and generating a third comparison signal, and when H is smaller than H1, marking the inquirer as low priority and generating a fourth comparison signal; and combining the third comparison signal and the fourth comparison signal to obtain a second comparison signal set.
Further, the specific working steps of the data storage module are as follows:
b1, acquiring a stored memory and a residual memory in the remote data storage module through an acquisition unit, and respectively setting the stored memory and the residual memory of the data storage module as YN and SN, wherein m is 1,2,3.... n;
b2, passing formula
Figure BDA0003086487160000051
Acquiring a storable reference value CN in the data storage module, wherein mu is a preset stored reference correction factor, b1 and b2 are both preset proportionality coefficients, and b2 is not zero;
b3, comparing the storable reference value CN with a preset judgment threshold value C, judging that the residual memory corresponding to the storable reference value is available when CN is less than or equal to C, marking CN as a safe storage reference value and generating a first memory signal; when CN is larger than C, judging that the residual memory corresponding to the storable reference value is unavailable, marking CN as a dangerous storage reference value and generating a second memory signal; combining the first memory signal and the second memory signal to obtain a memory signal set;
b4, when the memory signal set contains the first memory signal, storing the encrypted text data and uploading the encrypted text data to a remote database;
b5, when the memory signal set contains a second memory signal, judging that the encrypted text data is uploaded by a login user with superior information, storing the encrypted text data and uploading the encrypted text data to the remote database intelligent terminal;
and B6, when the second comparison signal is identified, the encrypted text data is uploaded by a login user with inferior information, and the encrypted text data is not stored and insufficient storage is prompted at the intelligent terminal.
Further, the specific working process of the data query module is as follows:
h1: the login person selects the identity of the inquirer in the selection options through the login selection module and inputs the information of the inquirer, and a second comparison signal set is obtained through the inquirer information analysis module;
h2: if the second comparison signal set contains a third comparison signal, the priority of the inquirer is judged to be high, and the remote database directly outputs the service information;
h3: if the second comparison signal set contains a fourth comparison signal, the priority of the inquirer is judged to be low, the intelligent terminal is controlled by the controller to skip the verification interface for secondary verification, and after the verification is successful, the remote database outputs the service information.
The invention has the beneficial effects that:
the invention encrypts the service information uploaded by the login user through the encryption module by the intelligent terminal, improves the data security, stores the encrypted service information to the remote database through the data storage module according to the superior information and the inferior information obtained by the upload user information analysis module, improves the data storage security, judges the query result output process of the querier according to the higher priority and the lower priority obtained by the querier information analysis module, and increases the data query security.
Drawings
The invention is described in further detail below with reference to the figures and specific embodiments.
FIG. 1 is a functional block diagram of the present invention;
FIG. 2 is a schematic flow chart of class characterization transformation according to the present invention;
FIG. 3 is a schematic representation of a class characterization table of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-3, the present invention provides a technical solution:
a business safety system capable of performing remote data protection comprises a login selection module, a remote database, a local login client, an intelligent terminal, an uploader information analysis module, an inquirer information analysis module, an encryption module, a data storage module and a data inquiry module;
the local login client is in communication connection with the login selection module, the login selection module is in communication connection with the uploader information analysis module and the inquirer information analysis module, the uploader information analysis module and the inquirer information analysis module are both in communication connection with the data encryption module, the data encryption module is in communication connection with the data storage module, the data storage module is in communication connection with the data inquiry module, and the data inquiry module and the local login client are both in communication connection with the remote database;
the login selection module is used for a login user to input the information of the uploader and the information of the inquirer through the intelligent terminal and send the information of the uploader and the information of the inquirer to the uploader information analysis module and the inquirer analysis module through the local login client; the login users comprise leaders, managers and common persons of the company, and the identity options comprise uploaders and inquirers;
the uploader information analysis module is used for analyzing the uploader information and generating a first comparison signal and a second comparison signal;
the inquirer information analysis module is used for analyzing inquirer information and generating a third comparison signal and a fourth comparison signal;
the encryption module is used for encrypting the service information uploaded by the uploader to obtain encrypted text data; the service information comprises internal data of a company, personal files and the like;
the information storage module is internally provided with an acquisition unit and is used for storing the information of the uploader, the information of the inquirer and the encrypted text data, storing the information of the uploader, the information of the inquirer and the encrypted text data and transmitting the information of the inquirer and the encrypted text data to a remote database;
the data query module is used for a querier to query the service information in the remote database.
The specific working steps of the login selection module are as follows:
an image acquisition unit on the intelligent terminal is used for acquiring images of the human face;
identifying through a face identification algorithm to obtain an identification result, wherein the identification result comprises success data and failure data; the successful data indicates that the similarity of the two images reaches more than 99% and the matching is successful, and the failed data indicates that the similarity of the two images is lower than 99% and the matching is failed; the face recognition algorithm is the prior art, such as a face recognition algorithm based on an image sensor imaging system in a patent with an application number of CN 2012101945381;
if the identification result has failure data, skipping to a registration interface, uploading the acquired image to a registry, if the identification result has success data, automatically skipping to the login interface, inputting a user name, a user password and a first verification code and matching with the user data prestored in the database, and when at least one verification of the input user name, the user password and the first verification code fails, generating a verification failure prompt and re-inputting;
and when the input user name, the user password and the first verification code are verified successfully, popping up a selection option, wherein the selection option comprises an uploader and an inquirer, if the identity of the login user is selected as the uploader, the login is completed by inputting the information of the uploader, and if the identity of the login user is selected as the inquirer, the login is completed by inputting the information of the inquirer.
The specific analysis steps of the uploader information analysis module are as follows:
acquiring uploader information in the intelligent terminal, wherein the uploader information comprises position data, academic data, annual income data and intelligent terminal model data of the uploader;
setting different uploading person position types to correspond to different position type preset values, matching the position types in the obtained position data with all the position types to obtain corresponding position preset values, and setting the position types as first position preset values YZi, wherein i is 1,2, …, n;
setting different calendar types of the uploaders to correspond to different calendar type preset values, and matching the calendar types in the acquired calendar data with all the calendar types to acquire corresponding calendar preset values YXi;
setting different intelligent terminal model types of uploads and corresponding to different intelligent terminal model type preset values, and matching the intelligent terminal model types in the obtained intelligent terminal model data with all the intelligent terminal model types to obtain corresponding intelligent terminal model preset values YNi;
setting an annual revenue value in the annual revenue data to YWi;
by the formula
Figure BDA0003086487160000091
Acquiring a grade judgment value G, wherein a1, a2, a3 and a4 are all preset proportionality coefficients and are larger than zero,
Figure BDA0003086487160000092
determining a correction factor for a preset grade and greater than zero;
comparing the grade judgment value G with a preset grade judgment threshold value G1, and when G is greater than or equal to G1, marking the uploaded person information as superior information and generating a first comparison signal; when G is smaller than G1, marking the uploaded person information as inferior information and generating a second comparison signal; combining the first comparison signal and the second comparison signal to obtain a first comparison signal set;
the specific analysis steps of the inquirer information analysis module are as follows:
the method comprises the steps that inquirer information in an intelligent terminal is obtained, wherein the inquirer information comprises position data, intelligent terminal position data, age data and registration duration data of an inquirer;
matching the job types in the acquired job data with all job types to acquire corresponding job preset values, and setting the job preset values as second job preset values EZj;
setting different inquirer intelligent terminal position types corresponding to different intelligent terminal position type preset values, and matching the intelligent terminal position types in the acquired intelligent terminal position data with all the intelligent terminal position types to acquire corresponding intelligent terminal position preset values EZj;
setting the age in the age data to be ENj;
setting the registration time length in the registration time length data to EWj;
by the formula
Figure BDA0003086487160000101
Acquiring an authority judgment value H, wherein b1, b2, b3 and b4 are all preset proportionality coefficients, and lambda is a preset authority judgment correction factor;
comparing the permission judgment value H with a preset permission judgment threshold H1, marking the inquirer as a high priority and generating a third comparison signal when H is more than or equal to H1, and marking the inquirer as a low priority and generating a fourth comparison signal when H is less than H1; combining the third comparison signal and the fourth comparison signal to obtain a second comparison signal set;
the encryption module includes:
the text receiving unit is used for receiving the service information uploaded by the uploader on the intelligent terminal;
the text encryption unit encrypts the service information, and the specific encryption steps are as follows:
setting each character to correspond to a unique numerical value, acquiring the characters in the service information, matching each character in the service information with all the characters according to the sequence, and obtaining a numerical value Ym corresponding to each character, wherein m is 1,2,3.. n; sequentially arranging the matched numerical services according to the sequence of each character in the service information to obtain numerical text data after service information conversion;
obtaining a conversion value MAm of a numerical value in the numerical text data according to a formula MAm ═ (M1 × a1+ M2 × a2) Ym, where M is 1,2,3.. n; wherein a1 and a2 are both preset proportionality coefficients, M1 is the sum of the first three digits in the first verification code, and M2 is the sum of the last three digits in the first verification code;
sequentially arranging all conversion values according to the sequence in the numerical text information to obtain conversion text data, and converting the numerical values in the conversion text data into binary conversion text data according to the decimal system;
carrying out the grid conversion on the binary conversion text data, and the specific process is as follows:
selecting a standard number table, wherein the standard number table is composed of ten rows and a plurality of columns of rectangular grids, filling a first digit of a binary number value corresponding to a first conversion value in the binary conversion text data in a first row and a first column in the standard number table, filling a first digit of a binary number value corresponding to a second conversion value in the binary conversion text data in a first row and a second column in the standard number table, and so on until the first digits of the binary number values corresponding to all conversion values in the binary conversion text data are filled in the standard number table;
selecting a class token table which is composed of three rows and three columns of rectangular grids, wherein diagonal grids from left to right of the class token table contain numbers 1, and the rest number grids contain numbers 0, and performing class token conversion on the standard number grid table, wherein the specific process is as follows:
corresponding the class token table to a first numerical value table formed by the first three rows and the first three columns in the standard numerical table, and sequentially multiplying and summing the class token table and the corresponding numerical values in the first numerical value table to obtain a first new numerical value;
selecting a new number table, placing a first new numerical value in a first row and a first column in the new number table, translating the first numerical value table to the right in the standard number table to form a second numerical value table, sequentially multiplying and summing a class characterization table and corresponding numerical values in the second numerical value table to obtain a second new numerical value, placing the second new numerical value in a first row and a second column in the new number table, and repeating the steps until all numerical values in the standard number table are converted into new numerical values and placed in the new number table to form the first number table;
and continuously carrying out lattice conversion on the first lattice table to obtain a second lattice table, marking the numerical value in the second lattice table as encrypted text data, and sending the encrypted text data to the data storage module for storage.
The data storage module comprises the following specific working steps:
acquiring a stored memory and a residual memory in a remote data storage module through an acquisition unit, and respectively setting the stored memory and the residual memory of the data storage module as YN and SN, wherein m is 1,2,3.
By the formula
Figure BDA0003086487160000121
Acquiring a storable reference value CN in the data storage module, wherein mu is a preset stored reference correction factor, b1 and b2 are both preset proportionality coefficients, and b2 is not zero;
comparing the storable reference value CN with a preset judgment threshold value C, judging that the residual memory corresponding to the storable reference value is available when CN is less than or equal to C, marking CN as a safe storage reference value and generating a first memory signal; when CN is larger than C, judging that the residual memory corresponding to the storable reference value is unavailable, marking CN as a dangerous storage reference value and generating a second memory signal; combining the first memory signal and the second memory signal to obtain a memory signal set;
when the memory signal set comprises the first memory signal, judging that the residual memory corresponding to the storable reference value is available, storing the encrypted text data and uploading the encrypted text data to a remote database;
when the memory signal set contains a second memory signal, judging that the encrypted text data is uploaded by a login user with superior information, storing the encrypted text data and uploading the encrypted text data to a remote database intelligent terminal;
when the second comparison signal is identified, the encrypted text data is uploaded by a login user with inferior information, and the encrypted text data is not stored and insufficient storage is prompted at the intelligent terminal.
The specific working process of the data query module is as follows:
the login person selects the identity of the inquirer in the selection options through the login selection module and inputs the information of the inquirer, and a second comparison signal set is obtained through the inquirer information analysis module;
if the second comparison signal set contains a third comparison signal, the priority of the inquirer is judged to be high, and the remote database directly outputs the service information;
if the second comparison signal set contains a fourth comparison signal, the priority of the inquirer is judged to be low, the intelligent terminal is controlled by the controller to skip the verification interface for secondary verification, and after the verification is successful, the remote database outputs the service information.
The above formulas are all calculated by removing dimensions and taking numerical values thereof, the formula is a formula which is obtained by acquiring a large amount of data and performing software simulation to obtain the closest real situation, and the preset parameters and the preset threshold value in the formula are set by the technical personnel in the field according to the actual situation or obtained by simulating a large amount of data.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the accompanying claims.

Claims (1)

1. A business safety system capable of performing remote data protection is characterized by comprising a login selection module, a remote database, a local login client, an intelligent terminal, an uploader information analysis module, an inquirer information analysis module, an encryption module, a data storage module and a data inquiry module;
the login selection module is used for a login user to input the information of the uploader and the information of the inquirer through the intelligent terminal and respectively send the information of the uploader and the information of the inquirer to the uploader information analysis module and the inquirer analysis module through the local login client;
the uploader information analysis module is used for analyzing the uploader information and generating a first comparison signal and a second comparison signal;
the inquirer information analysis module is used for analyzing inquirer information and generating a third comparison signal and a fourth comparison signal;
the encryption module is used for encrypting the service information uploaded by the uploader to obtain encrypted text data;
the data storage module is internally provided with an acquisition unit and is used for storing the uploader information, the inquirer information and the encrypted text data, storing the uploader information, the inquirer information and the encrypted text data and transmitting the uploader information, the inquirer information and the encrypted text data to a remote database;
the data query module is used for a querier to query the service information in the remote database;
the specific analysis steps of the uploader information analysis module are as follows:
s31, obtaining uploader information in the intelligent terminal, wherein the uploader information comprises position data, academic data, annual income data and intelligent terminal model data of the uploader;
s32, setting different uploading person position types to correspond to different position type preset values, matching the position types in the acquired position data with all position types to acquire corresponding position preset values, and setting the position types as first position preset values YZi, wherein i is 1,2, … and n;
s33, setting different calendar types of the uploaders to correspond to different calendar type preset values, and matching the calendar types in the acquired calendar data with all the calendar types to acquire corresponding calendar preset values YXi;
s34, setting different intelligent terminal model types of the uploader to correspond to different intelligent terminal model type preset values, and matching the intelligent terminal model types in the obtained intelligent terminal model data with all the intelligent terminal model types to obtain a corresponding intelligent terminal model preset value YNi;
s35, setting the annual income value in the annual income data to YWi;
s36, passing formula
Figure FDA0003316898960000021
Acquiring a grade judgment value G, wherein a1, a2, a3 and a4 are all preset proportionality coefficients and are larger than zero,
Figure FDA0003316898960000022
determining a correction factor for a preset grade and greater than zero;
s37, comparing the grade judgment value G with a preset grade judgment threshold value G1, and when G is larger than or equal to G1, marking the uploaded person information as superior information and generating a first comparison signal; when G is smaller than G1, marking the uploaded person information as inferior information and generating a second comparison signal; combining the first comparison signal and the second comparison signal to obtain a first comparison signal set;
the specific analysis steps of the inquirer information analysis module are as follows:
s41, obtaining inquirer information in the intelligent terminal, wherein the inquirer information comprises position data, intelligent terminal position data, age data and registration duration data of the inquirer;
s42, matching the job types in the acquired job data with all job types to acquire corresponding job preset values, and setting the job preset values to second job preset values EZj, where j is 1,2, …, m;
s43, setting different intelligent terminal position types of inquirers to correspond to different intelligent terminal position type preset values, and matching the intelligent terminal position types in the obtained intelligent terminal position data with all the intelligent terminal position types to obtain corresponding intelligent terminal position preset values EXj;
s44, setting the age in the age data as ENj;
s45, setting the registration time length in the registration time length data to be EWj;
s46, passing formula
Figure FDA0003316898960000031
Acquiring an authority judgment value H, wherein b1, b2, b3 and b4 are all preset proportionality coefficients, and lambda is a preset authority judgment correction factor;
s47, comparing the permission judgment value H with a preset permission judgment threshold value H1, when H is larger than or equal to H1, marking the inquirer as high priority and generating a third comparison signal, and when H is smaller than H1, marking the inquirer as low priority and generating a fourth comparison signal; combining the third comparison signal and the fourth comparison signal to obtain a second comparison signal set;
the working steps of the login selection module are as follows:
the login selection module is used for completing registration and login, a selection option is popped up during login, the selection option comprises an uploader and an inquirer, if the identity of the login user is selected as the uploader, login is completed by inputting the information of the uploader, and if the identity of the login user is selected as the inquirer, login is completed by inputting the information of the inquirer;
the data storage module comprises the following specific working steps:
b1, acquiring a stored memory and a residual memory in the remote data storage module through an acquisition unit, and respectively setting the stored memory and the residual memory of the data storage module to be YNm and SNm, wherein m is 1,2,3.... n;
b2, passing formula
Figure FDA0003316898960000032
Acquiring a storable reference value CNm in the data storage module, wherein mu is a preset stored reference correction factor, b1 and b2 are both preset proportionality coefficients, and b2 is not zero;
b3, comparing the storable reference value CNm with a preset judgment threshold value C, judging that the residual memory corresponding to the storable reference value is available when the value is not less than CNm and C, marking CNm as a safe storage reference value and generating a first memory signal; when CNm > C, determining that the remaining memory corresponding to the storable reference value is unavailable, marking CNm as a dangerous storage reference value and generating a second memory signal; combining the first memory signal and the second memory signal to obtain a memory signal set;
b4, when the memory signal set contains the first memory signal, storing the encrypted text data and uploading the encrypted text data to a remote database;
b5, when the memory signal set contains a second memory signal, judging that the encrypted text data is uploaded by a login user with superior information, storing the encrypted text data and uploading the encrypted text data to the remote database intelligent terminal;
b6, when the second comparison signal is identified, the encrypted text data is uploaded by a login user with inferior information, and the encrypted text data is not stored and insufficient storage is prompted at the intelligent terminal;
the specific working process of the data query module is as follows:
h1: the login person selects the identity of the inquirer in the selection options through the login selection module and inputs the information of the inquirer, and a second comparison signal set is obtained through the inquirer information analysis module;
h2: if the second comparison signal set contains a third comparison signal, the priority of the inquirer is judged to be high, and the remote database directly outputs the service information;
h3: if the second comparison signal set contains a fourth comparison signal, the priority of the inquirer is judged to be low, the intelligent terminal is controlled by the controller to skip the verification interface for secondary verification, and after the verification is successful, the remote database outputs the service information.
CN202110582354.1A 2021-05-27 2021-05-27 Service safety system capable of carrying out remote data protection Active CN113177220B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110582354.1A CN113177220B (en) 2021-05-27 2021-05-27 Service safety system capable of carrying out remote data protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110582354.1A CN113177220B (en) 2021-05-27 2021-05-27 Service safety system capable of carrying out remote data protection

Publications (2)

Publication Number Publication Date
CN113177220A CN113177220A (en) 2021-07-27
CN113177220B true CN113177220B (en) 2021-12-17

Family

ID=76927094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110582354.1A Active CN113177220B (en) 2021-05-27 2021-05-27 Service safety system capable of carrying out remote data protection

Country Status (1)

Country Link
CN (1) CN113177220B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN106878264A (en) * 2016-12-21 2017-06-20 重庆华龙艾迪信息技术有限公司 A kind of data managing method and server
CN108171075A (en) * 2017-12-14 2018-06-15 北京金风科创风电设备有限公司 Data query authority management and query method and device
CN109597822A (en) * 2018-11-28 2019-04-09 中国联合网络通信集团有限公司 A kind of storage of user data and querying method and user data processing unit
CN110995657A (en) * 2019-11-11 2020-04-10 广州市品高软件股份有限公司 Data access method, server and system based on data label

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10922430B2 (en) * 2018-07-16 2021-02-16 Beijing Didi Infinity Technology And Development Co., Ltd. System and method for data security grading

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN106878264A (en) * 2016-12-21 2017-06-20 重庆华龙艾迪信息技术有限公司 A kind of data managing method and server
CN108171075A (en) * 2017-12-14 2018-06-15 北京金风科创风电设备有限公司 Data query authority management and query method and device
CN109597822A (en) * 2018-11-28 2019-04-09 中国联合网络通信集团有限公司 A kind of storage of user data and querying method and user data processing unit
CN110995657A (en) * 2019-11-11 2020-04-10 广州市品高软件股份有限公司 Data access method, server and system based on data label

Also Published As

Publication number Publication date
CN113177220A (en) 2021-07-27

Similar Documents

Publication Publication Date Title
US11599624B2 (en) Graphic pattern-based passcode generation and authentication
US11044106B2 (en) System for secure accelerated resource allocation
US11604867B2 (en) Graphic pattern-based authentication with adjustable challenge level
CN108234127A (en) A kind of Internet of Things method and device based on block chain
CN110362542B (en) Nuclear power station file encoding method and device, computer equipment and storage medium
CN111445212B (en) Enterprise talent information management system based on big data
CN114896634B (en) Data authority control method and system of enterprise report platform
CN112000977B (en) System for encrypting and keeping digital assets
CN111680480A (en) Template-based job approval method and device, computer equipment and storage medium
CN112165448B (en) Service processing method, device, system, computer equipment and storage medium
CN112637282A (en) Information pushing method and device, computer equipment and storage medium
CN113177220B (en) Service safety system capable of carrying out remote data protection
CN113918609A (en) Test paper creating method and device, computer equipment and storage medium
RU2309450C1 (en) Method for protecting private information of user in information processing system
CN114398441B (en) Data export method, device, computer equipment and storage medium
CN113259390B (en) Account safety protection system for recruitment platform
CN113888370A (en) Method for collecting personnel information and automatically distributing electronic test paper
CN113010865B (en) Big data base component safety management method and system of intelligent education platform
CN109034944A (en) With the data information maintaining method and device of people multi-user
CN114863430A (en) Automatic population information error correction method, device and storage medium thereof
CN109102616B (en) Verifiable computer ranking method
CN113420307A (en) Ciphertext data evaluation method and device, computer equipment and storage medium
CN111611563A (en) Task data processing method and device, computer equipment and storage medium
CN110417802B (en) E-commerce platform website data protection system
CN113282936A (en) Network security data management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant