CN115587392B - Method, device, equipment and medium for preventing power loss - Google Patents

Method, device, equipment and medium for preventing power loss Download PDF

Info

Publication number
CN115587392B
CN115587392B CN202211470432.XA CN202211470432A CN115587392B CN 115587392 B CN115587392 B CN 115587392B CN 202211470432 A CN202211470432 A CN 202211470432A CN 115587392 B CN115587392 B CN 115587392B
Authority
CN
China
Prior art keywords
information
data
user
certification
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211470432.XA
Other languages
Chinese (zh)
Other versions
CN115587392A (en
Inventor
李浩天
杨海波
郝增
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fangzhou Technology Co ltd
Original Assignee
Hangzhou Fangzhou Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fangzhou Technology Co ltd filed Critical Hangzhou Fangzhou Technology Co ltd
Priority to CN202211470432.XA priority Critical patent/CN115587392B/en
Publication of CN115587392A publication Critical patent/CN115587392A/en
Application granted granted Critical
Publication of CN115587392B publication Critical patent/CN115587392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06395Quality analysis or management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Educational Administration (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a method, a device, equipment and a medium for preventing power failure, which comprise the following steps: the method comprises the steps of obtaining network data information and user data information, analyzing the network data information and the user data information to obtain target user information, determining certification time information and certification data information of a user based on the target user information, judging whether the certification time information exceeds preset time information, if so, verifying information integrity of the certification data information according to the network data information to obtain information integrity of the certification data information, judging whether the information integrity meets the preset integrity, if not, generating alarm information, and sending the alarm information to target equipment, wherein the target equipment is the user and equipment of the user. The method and the device have the effect of reducing the data storage capacity decline.

Description

Method, device, equipment and medium for preventing power loss
Technical Field
The present application relates to the field of computers, and in particular, to a method, an apparatus, a device, and a medium for preventing power loss.
Background
The web3.0 network is a decentralized storage market developed on the basis of the IPFS (InterPlanetary File System) technology. It constructs the decentralized consensus bottom layer through blockchain technology, so that people can participate in providing storage and free trading storage space. Meanwhile, the data storage method adopts the copy certification and the space-time certification to ensure the safety of the stored data, and the verifiability of the data storage is achieved under the condition that no centralized trust mechanism exists.
A Proof-of-space (PoSt) which proposes a data structure of a Proof chain formed by a challenge (challenge) and a Proof (Proof) linked together, a time period is added on the basis of the Proof chain, thus obtaining a Proof that a user stores data for a period of time, namely a Proof-of-space (PoSt) which allows a verifier to check whether the storage user stores his/her outsource data for a period of time, a Proof-of-space (PoSt) scheme which allows the verifier to convince the verifier that the storage user stores data for a period of time, the Proof-of-space being understood as a continuous Proof-of-replication, the user having to continuously generate the Proof and submit the Proof within a submission period, the challenger performing N rounds repeatedly in a porp loop, inputting a random challenge parameter C, for example C equal to 10, the challenge parameter being recursively calculated, that the last output is input for the next time, and the last result of the Proof is accepted as a Proof of space-time.
With respect to the above-mentioned related art, the inventors believe that the space-time proof is difficult to guarantee continuous storage of data due to the higher complexity of the web3.0 network, and thus have a defect of reduced data storage capacity.
Disclosure of Invention
In order to reduce the occurrence of data storage capacity decline, the application provides a method, a device, equipment and a medium for preventing the storage capacity decline.
In a first aspect, the present application provides a method for preventing power loss, which adopts the following technical scheme:
a method of preventing memory loss, comprising:
acquiring network data information and user data information;
analyzing the network data information and the user data information to obtain target user information;
sending the network data information to a user corresponding to the target user information for data storage;
determining certification time information and certification data information of a user based on the target user information, and judging whether the certification time information exceeds preset time information or not, wherein the certification time information is time information spent on submitting certification, and the certification data information is certification data information submitted by the user along with the certification time information;
if the network data information exceeds the network data information, carrying out information integrity verification on the certification data information according to the network data information to obtain the information integrity of the certification data information;
and judging whether the information integrity degree meets a preset integrity degree, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and equipment of the user.
By adopting the technical scheme, when data transferred to a network is stored, network data information imported into a network node by a user and user data information connected with the network are respectively obtained, then the network data information and the user data information are analyzed to obtain target user information, the network data information is sent to the user corresponding to the target user information for data storage, then the certification time information and the certification data information of the user are determined based on the target user information, whether the certification time information exceeds the preset time information or not is judged, the certification time information is time information spent on submitting certification, the certification data information is the certification data information submitted by the user along with the certification time information, when the certification time information exceeds the preset time information, information integrity verification is carried out on the certification data information according to the network data information to obtain information integrity of the certification data information, whether the information integrity meets the preset integrity or not is judged, when the information integrity does not meet the preset integrity, alarm information is generated and sent to the user and target equipment of the user, and when the network storage problem occurs, the user and the user have sufficient processing time to solve the problem of storage reduction caused by the reduction of the storage.
In another possible implementation manner, the analyzing the network data information and the user data information to obtain the target user information includes:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
According to the technical scheme, when the target user information is confirmed, the network data information is disassembled to obtain the data identification information and the data storage information, and then the user data information is subjected to user screening according to the data storage information to obtain the optimal target user information, so that the effect of screening the user is achieved.
In another possible implementation manner, the analyzing the network data information and the user data information to obtain target user information further includes:
and binding the target user information with the data identification information.
By adopting the technical scheme, after the target user information is obtained, the data identification information is bound with the target user information, so that the user can search the target user information according to the data identification information.
In another possible implementation manner, the performing user screening on the user data information according to the data storage information to obtain target user information includes:
identifying the data storage information to obtain data category information and data storage capacity of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively carrying out data comparison on the storage residual quantity of each user in the matched user information and the data storage quantity to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the comparison user information to obtain target user information meeting a preset sequence.
By adopting the technical scheme, when the target user information is screened, the data storage information is identified to obtain the data type information and the data storage amount of the data storage information, then the storage data type, the historical service quality and the storage residual amount of each user are determined based on the user data information, the data type information is matched with the storage data type to determine the matched user information matched with the data type information, then the storage residual amount of each user in the matched user information is compared with the data storage amount respectively to obtain the comparison user information meeting the preset condition, and then the historical service quality corresponding to the comparison user information is subjected to quality sequencing to obtain the target user information meeting the preset sequence order, so that the effect of screening the target user information is achieved.
In another possible implementation manner, the determining, based on the user data information, a type of stored data, a historical quality of service, and a remaining amount of storage of each user further includes:
acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
performing data sorting on the historical service information according to the type of the stored data and the integrity degree of the certificate to obtain service matrix data;
performing data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating historical service quality of each user;
and adding the historical service quality into the user data information for updating to obtain updated user data information.
By adopting the technical scheme, when the historical service quality is confirmed, the historical service information of each user in the user data information in a preset time period is obtained, then the historical service information is analyzed, the stored data types of each user in the historical service information in different time periods and the corresponding proof integrity of the stored data types are obtained, the historical service information is subjected to data sorting according to the stored data types and the proof integrity to obtain service matrix data, then data processing is carried out on data contained in the service matrix data to obtain corresponding user service data, meanwhile, the user service data is input into a preset algorithm model to carry out data operation to generate a historical service instruction of each user, then the historical service quality is added into the user data information to be updated, and the updated user data information is obtained, so that the effect of confirming the historical service quality is achieved.
In another possible implementation manner, the analyzing the historical service information to obtain the stored data type of each user in different time periods in the historical service information and the integrity of the certificate corresponding to the stored data type includes:
determining at least one set of service handling data based on the historical service information;
respectively performing label acquisition on the at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is completely processed according to the service processing time data, if not, performing data disruption on the service processing data, and if so, performing corresponding binding on the user data and the service processing time data to obtain user binding data;
and performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
By adopting the technical scheme, when the historical service information is specifically analyzed, at least one group of service processing data is determined according to the historical service information, at least one group of service processing data tags are respectively obtained, user data and service processing time information in each group of service processing data are obtained, whether the service processing data are processed completely is determined according to the service processing time data, when the processing is not completed, the service processing data are subjected to data collapse so as to improve the accuracy of the service processing data, when the processing is completed, the user data and the service processing time data are correspondingly bound so as to obtain user binding data, then the user binding data are subjected to data combination screening, the stored data types of each user in the historical service information in different time periods and the proof integrity corresponding to the stored data types are obtained, and therefore the accuracy of the proof integrity is achieved.
In another possible implementation manner, the adding the historical quality of service to the user data information for updating to obtain updated user data information further includes:
acquiring actual service quality corresponding to the current user data information;
and updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
By adopting the technical scheme, when the historical service quality is updated, the actual service quality corresponding to the obtained current user data information is added to the historical service quality for updating, and the updated historical service quality is obtained, so that the effect of updating the historical service quality in real time is achieved.
In a second aspect, the present application provides a device for preventing power from falling off, which adopts the following technical scheme:
an anti-dropout force means comprising:
the information acquisition module is used for acquiring network data information and user data information;
the information analysis module is used for analyzing the network data information and the user data information to obtain target user information;
the information sending module is used for sending the network data information to a user corresponding to the target user information for data storage;
the time judging module is used for determining the certification time information and the certification data information of the user based on the target user information and judging whether the certification time information exceeds the preset time information or not, wherein the certification time information is the time information spent on submitting the certification, and the certification data information is the certification data information submitted by the user along with the certification time information;
the information verification module is used for verifying the information integrity of the certification data information according to the network data information when the certification time information exceeds preset time information to obtain the information integrity of the certification data information;
and the integrity judgment module is used for judging whether the information integrity meets the preset integrity, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and the equipment of the user.
By adopting the technical scheme, when data transferred to a network is stored, the information acquisition module respectively acquires network data information imported into a network node by a user and user data information establishing connection with the network, the information analysis module analyzes the network data information and the user data information to obtain target user information, the information sending module sends the network data information to the user corresponding to the target user information for data storage, the time judgment module determines the proving time information and the proving data information of the user based on the target user information and judges whether the proving time information exceeds the preset time information or not, the proving time information is time information spent on submitting the proving, the proving data information is proving data information submitted by the user along with the proving time information, when the proving time information exceeds the preset time information, the information verification module verifies the information integrity of the proving data information according to the network data information to obtain the information integrity of the proving data information, the integrity judgment module judges whether the information integrity meets the preset integrity or not, and when the information integrity does not meet the preset integrity, the warning information is sent to the user information and the warning information is sent to the user equipment, and the problem that the user has enough storage time for the user and the problem caused by the reduction of the storage and the problem of the network storage caused by the reduction of the network storage.
In a possible implementation manner, when the information analysis module analyzes the network data information and the user data information to obtain target user information, the information analysis module is specifically configured to:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
In another possible implementation manner, the apparatus further includes: an information binding module, wherein,
and the information binding module is used for binding the target user information with the data identification information.
In another possible implementation manner, when the information analysis module performs user screening on the user data information according to the data storage information to obtain target user information, the information analysis module is specifically configured to:
identifying the data storage information to obtain data category information and data storage capacity of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively carrying out data comparison on the storage residual quantity of each user in the matched user information and the data storage quantity to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the comparison user information to obtain target user information meeting a preset sequence.
In another possible implementation manner, the apparatus further includes: a service acquisition module, a service analysis module, an information arrangement module, a data operation module and a data update module, wherein,
the service acquisition module is used for acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
the service analysis module is used for analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
the information sorting module is used for sorting the historical service information according to the type of the stored data and the integrity of the certificate to obtain service matrix data;
the data operation module is used for carrying out data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating the historical service quality of each user;
and the data updating module is used for adding the historical service quality into the user data information for updating to obtain updated user data information.
In another possible implementation manner, when the service analysis module analyzes the historical service information to obtain the stored data type of each user in the historical service information in different time periods and the proof integrity corresponding to the stored data type, the service analysis module is specifically configured to:
determining at least one set of service handling data based on the historical service information;
respectively obtaining tags of the at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is processed completely according to the service processing time data, if not, performing data disruption on the service processing data, and if so, correspondingly binding the user data and the service processing time data to obtain user binding data;
and performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
In another possible implementation manner, the apparatus further includes: a quality acquisition module and a quality update module, wherein,
the quality obtaining module is used for obtaining the actual service quality corresponding to the current user data information;
and the quality updating module is used for updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
In a third aspect, the present application provides an electronic device, which adopts the following technical solutions:
an electronic device, comprising:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: a method of preventing power down is performed as shown in any one of the possible implementations of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium, comprising: there is stored a computer program that can be loaded by a processor and that executes a method of preventing power loss as shown in any of the possible implementations of the first aspect.
In summary, the present application includes at least one of the following beneficial technical effects:
1. when data transferred to a network is stored, network data information led into a network node by a user and user data information connected with the network are respectively obtained, then the network data information and the user data information are analyzed to obtain target user information, then the network data information is sent to a user corresponding to the target user information for data storage, then certification time information and certification data information of the user are determined based on the target user information, whether the certification time information exceeds preset time information or not is judged, the certification time information is time information spent on submitting certification, the certification data information is certification data information submitted by the user along with the certification time information, when the certification time information exceeds the preset time information, information integrity verification is carried out on the certification data information according to the network data information, information integrity of the certification data information is obtained, whether the information integrity satisfies the preset integrity or not is judged, when the information integrity does not satisfy the preset integrity, alarm information is generated, and the alarm information is sent to the user and target equipment of the user, when the network storage problem occurs, the user and the user have sufficient time to solve the problem, and the storage problem is reduced, and the storage condition of the network storage caused by the network storage is reduced;
2. when the historical service quality is confirmed, the historical service information of each user in the user data information in a preset time period is obtained, then the historical service information is analyzed, the stored data types of each user in the historical service information in different time periods and the corresponding proof integrity of the stored data types are obtained, data sorting is carried out on the historical service information according to the stored data types and the proof integrity to obtain service matrix data, then data processing is carried out on data contained in the service matrix data to obtain corresponding user service data, meanwhile, the user service data are input into a preset algorithm model to carry out data operation to generate a historical service instruction of each user, then the historical service quality is added into the user data information to be updated to obtain updated user data information, and therefore the effect of confirming the historical service quality is achieved.
Drawings
FIG. 1 is a schematic flow chart of a method for preventing power loss according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an anti-crash device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-3.
A person skilled in the art, after reading the present description, may make modifications to the embodiments as required, without any inventive contribution thereto, but shall be protected by the patent laws within the scope of the claims of the present application.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship, unless otherwise specified.
The embodiments of the present application will be described in further detail with reference to the drawings.
The embodiment of the application provides a method for preventing power loss, which is executed by electronic equipment, wherein the electronic equipment can be a server or terminal equipment, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The terminal device may be a smart phone, a tablet computer, a notebook computer, a desktop computer, and the like, but is not limited thereto, the terminal device and the server may be directly or indirectly connected through a wired or wireless communication manner, and an embodiment of the present application is not limited thereto, as shown in fig. 1, the method includes:
and step S10, acquiring network data information and user data information.
The network data information is data information imported into a network node by a user, and the user data information is user data information establishing connection with a network.
Specifically, after a user wants to import stored data information into a network node, the electronic device obtains the data information in the corresponding network node, and the specific obtaining manner includes: the user sends a RetrievalQuery request to the network node, the data to be uploaded is sent to the network node, the electronic equipment sends a RetrievalQuery response request to the network node, and the data which is just uploaded is intercepted and acquired.
And step S11, analyzing the network data information and the user data information to obtain target user information.
In the embodiment of the application, the network data information includes data identification information and data storage information, where the data identification information is a data CID-content identifier generated when a user imports data into its local node, that is, an ID uniquely describing content, and when the data storage information is subsequently stored at the user, the data stored by the specified user can be queried according to the ID.
And S12, sending the network data information to a user corresponding to the target user information for data storage.
Specifically, when the network data information is sent to the user corresponding to the target user information, the network transmits the data to the user in an online or offline manner. The online transmission is suitable for small-scale data volume, such as point-to-point transmission using ipfs (interplanetary file system) mining protocol. Offline transfer of large amounts of data suitable for PB levels (storage units: 1pb = 1024tb), for example hard disks to storage users.
And S13, determining the certification time information and the certification data information of the user based on the target user information, and judging whether the certification time information exceeds the preset time information, wherein the certification time information is the time information spent on submitting the certification, and the certification data information is the certification data information submitted by the user along with the certification time information.
In the embodiment of the present application, after the network data information is sent to the user, the user often submits a series of certificates to the network data information in order to ensure the storage stability of the data of the sector of the user, and the certificates are sent to the network. During the attestation process, data anomalies often occur, such as: when the certification time information spent by the certification process of the user exceeds the preset time information, when the certification time information exceeds the preset time information, the situation that data abnormality exists is indicated, and for the embodiment of the application, the preset time information is 7 minutes.
And S14, if the network data information exceeds the network data information, carrying out information integrity verification on the certification data information according to the network data information to obtain the information integrity of the certification data information.
Specifically, when the certification time information spent in the certification process of the user exceeds the preset time information, the information integrity of the certification data information is verified according to the network data information, and the specific verification mode comprises the following steps: obtaining a simulation certification mode by obtaining a certification mode of a user, then carrying out certification simulation on the network data information according to the simulation certification mode to obtain simulated certification data information, and comparing and calculating the two pieces of certification data information to obtain the final information integrity.
And S15, judging whether the information integrity degree meets the preset integrity degree, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is a user and equipment of the user.
In the embodiment of the present application, the preset integrity is 100%, and when the information integrity does not satisfy 100%, the warning information is generated, for example: if the current information is proved to be abnormal, the maintenance is required in time. And sending the alarm information to the user and target equipment of the user, wherein for the embodiment of the application, the target equipment comprises equipment such as a mobile phone, a tablet and a computer.
The embodiment of the application provides a method for preventing memory loss, when data transferred to a network is stored, network data information imported into a network node by a user and user data information connected with the network are respectively obtained, the network data information and the user data information are analyzed to obtain target user information, the network data information is sent to the user corresponding to the target user information for data storage, then certification time information and certification data information of the user are determined based on the target user information, whether the certification time information exceeds preset time information or not is judged, the certification time information is time information spent on submitting certification, the certification data information is certification data information submitted by the user along with the certification time information, when the certification time information exceeds the preset time information, information integrity verification is carried out on the certification data information according to the network data information, information integrity of the certification data information is obtained, whether the information integrity meets the preset integrity or not is judged, when the information integrity does not meet the preset integrity, alarm information is generated, and the alarm information is sent to the user and target equipment of the user, when the problem of the network storage problem occurs, the problem of sufficient memory loss and the problem of the user due to the network storage is solved.
In a possible implementation manner of the embodiment of the present application, step S11 specifically includes step S111 (not shown in the figure) and step S112 (not shown in the figure), wherein,
and step S111, performing information disassembly on the network data information to obtain data identification information and data storage information.
And step S112, performing user screening on the user data information according to the data storage information to obtain target user information.
In a possible implementation manner of the embodiment of the present application, step S11 is followed by step S113 (not shown in the figure), wherein,
step S113, binding the target user information with the data identification information.
Specifically, the data identification information is bound with the target user information, and when the stored data is abnormal and the stored data is retrieved, the user can inquire the stored data according to the data identification information, so that the capability of tracing and retrieving the stored data information is improved.
In a possible implementation manner of the embodiment of the present application, the step S112 specifically includes a step S121 (not shown), a step S122 (not shown), a step S123 (not shown), a step S124 (not shown), and a step S125 (not shown), wherein,
step S121, identifying the data storage information to obtain the data type information and the data storage amount of the data storage information.
In an embodiment of the present application, the data category information includes: integer type [ byte, short, int, long ]; floating-point number type [ float, double ]; the character type char; boolean type coolean; picture format type [ gif ]. The data storage amount is used to indicate the data size of each category data in the data category information.
Step S122, determining the type of stored data, the historical quality of service and the storage remaining amount of each user based on the user data information.
Specifically, generally, users are divided into storage users and retrieval users, and the storage users provide data storage for clients. To become a storage consumer, the consumer must mortgage with a collateral (FIL) proportional to the storage space. Storage users respond to user Put requests by storing data at a particular time, in the process generating a "spatiotemporal proof" and submitting to the blockchain network to prove that they have stored the client's target data at a particular time. If the proof is invalid or missing, the storage user will receive a penalty and some of their collateral will be deducted by the network.
Among a plurality of storage users, the data types which are responsible for storage of each storage user are different, some storage users are used for storing data of picture types, and some storage users are used for storing data of character types, so that the storage data types of the storage users comprise character types, integer types, floating point types, boolean types and picture types according to the storage properties.
In the embodiment of the application, the historical service quality is the quality information of each stored user which is served in a certain historical period, and is embodied in the credit number of the user.
The retrieval user provides data retrieval services for the client. The interstellar magic cube (ipfs) looks up the data needed by the retrieving user by providing the client Get request. Unlike the storage user: the retrieval user does not need to provide a mortgage, submit the stored data, and provide the storage certificate.
And step S123, matching the data type information with the stored data type to obtain matched user information.
Step S124, respectively performing data comparison on the storage residual amount and the data storage amount of each user in the matched user information to obtain comparison user information meeting preset conditions.
For the embodiment of the application, the preset condition is that the ratio of the storage remaining amount of the user to the data storage amount is greater than or equal to 2.
Step S125, the historical service quality corresponding to the compared user information is subjected to quality sorting to obtain the target user information meeting the preset sequence.
Specifically, the preset sequence bit represents the first sequence of the user sequence corresponding to the user information to be compared, that is, the user with the best service quality.
In a possible implementation manner of the embodiment of the present application, step S122 (not shown in the figure) further includes step S221 (not shown in the figure), step S222 (not shown in the figure), step S223 (not shown in the figure), step S224 (not shown in the figure), and step S225 (not shown in the figure), wherein,
step S221, obtains history service information.
The historical service information is service information of each user in the user data information within a preset time period.
For the embodiment of the application, the preset time period is input by a worker through a designated terminal device, and the designated terminal device comprises a tablet, a mobile phone, a computer and the like.
Specifically, the staff inputs a preset time period (for example, no. 1/2020/10/3/2021) in the designated terminal device, and then the designated terminal device sends the preset time period to the electronic device for processing, and after the electronic device receives the preset time period, the service information of each user in the user data information in the preset time period is obtained.
Specifically, one possible implementation manner of obtaining the historical service information is a big data obtaining manner, all the historical service information is obtained through a big data technology, and then all the historical service information is screened according to a preset time period to obtain the historical service information in the preset time period
Step S222, analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the integrity of the certificate corresponding to the stored data types.
And step S223, performing data sorting on the historical service information according to the type of the stored data and the integrity of the certificate to obtain service matrix data.
Specifically, according to the type of the stored data and the integrity of the certificate, data sorting is performed on the historical service information of the user each time, and the final service matrix data is obtained:
Figure 155621DEST_PATH_IMAGE002
wherein m is the type of stored data, and n is the integrity of the certificate.
Step S224, data processing is carried out on the data contained in the service matrix data to obtain user service data, the user service data is input into a preset algorithm model to carry out data operation, and historical service quality of each user is generated.
Specifically, the preset algorithm model is a data averaging algorithm. Accumulating the integrity of the single user service data, and carrying out ratio operation on the accumulated value and the service times in the user service data to obtain the historical service quality of the user.
Step S225, add the historical service quality to the user data information for updating, so as to obtain updated user data information.
In a possible implementation manner of the embodiment of the present application, step S222 (not shown in the figure) specifically includes step Sa (not shown in the figure), step Sb (not shown in the figure), step Sc (not shown in the figure), and step Sd (not shown in the figure), wherein,
and a step Sa of determining at least one set of service processing data based on the historical service information.
Specifically, the service processing data included in the history service information is obtained by collecting data of each service of the user by the electronic device.
And step Sb, respectively obtaining the labels of at least one group of service processing data to obtain user data and service processing time data in each group of service processing data.
Specifically, tag acquisition is performed according to data tags in at least one set of service processing data, and specified tag content, namely time for acquiring historical services, service users, service end time, service amount and the like, is acquired.
Step Sc, determining whether the service processing data is completely processed according to the service processing time data, if not, performing data disruption on the service processing data, and if so, correspondingly binding the user data and the service processing time data to obtain user binding data;
specifically, whether the processing of the current service processing data is finished is determined through the acquired information corresponding to the service end time tag, if the service end time tag does not have corresponding time information, it is indicated that the service processing data is still in the processing process, so that the service processing data is subjected to data disruption, and if the service end time tag has corresponding time information, the user data and the service processing time data are correspondingly bound.
And Sd, performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
In a possible implementation manner of the embodiment of the present application, step S225 (not shown in the figure) further includes step S251 (not shown in the figure) and step S252 (not shown in the figure), wherein,
step S251, obtaining the actual service quality corresponding to the current user data information.
Step S252, the historical service quality is updated based on the actual service quality, and the updated historical service quality is obtained.
The foregoing embodiments describe a method for preventing power from falling in terms of method flow, and the following embodiments describe a device for preventing power from falling in terms of virtual modules or virtual units, which are described in detail in the following embodiments.
The embodiment of the present application provides a device for preventing power from falling off, as shown in fig. 2, the device 20 for preventing power from falling off specifically may include: an information acquisition module 21, an information analysis module 22, an information transmission module 23, a time judgment module 24, an information verification module 25, and an integrity judgment module 26, wherein,
an information obtaining module 21, configured to obtain network data information and user data information, where the network data information is data information imported into a network node by a user, and the user data information is user data information establishing connection with a network;
the information analysis module 22 is configured to analyze the network data information and the user data information to obtain target user information;
the information sending module 23 is configured to send the network data information to a user corresponding to the target user information for data storage;
the time judging module 24 is configured to determine certification time information and certification data information of the user based on the target user information, and judge whether the certification time information exceeds preset time information, where the certification time information is time information taken for submitting a certification, and the certification data information is certification data information submitted by the user along with the certification time information;
the information verification module 25 is configured to verify the information integrity of the certification data information according to the network data information when the certification time information exceeds the preset time information, so as to obtain the information integrity of the certification data information;
and an integrity judging module 26, configured to judge whether the information integrity satisfies the preset integrity, and if the information integrity does not satisfy the preset integrity, generate an alarm message and send the alarm message to a target device, where the target device is a user and a device of the user.
In a possible implementation manner of the embodiment of the present application, when analyzing the network data information and the user data information to obtain the target user information, the information analysis module 22 is specifically configured to:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: an information binding module, wherein,
and the information binding module is used for binding the target user information with the data identification information.
In another possible implementation manner of the embodiment of the present application, when the information analysis module 22 performs user screening on user data information according to the data storage information to obtain target user information, the information analysis module is specifically configured to:
identifying the data storage information to obtain data type information and data storage amount of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively comparing the storage residual amount of each user in the matched user information with the data storage amount to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the compared user information to obtain target user information meeting the preset sequence.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: a service acquisition module, a service analysis module, an information arrangement module, a data operation module and a data update module, wherein,
the service acquisition module is used for acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
the service analysis module is used for analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
the information arrangement module is used for carrying out data arrangement on the historical service information according to the type of the stored data and the integrity degree of the certificate to obtain service matrix data;
the data operation module is used for carrying out data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating the historical service quality of each user;
and the data updating module is used for adding the historical service quality into the user data information for updating to obtain the updated user data information.
In another possible implementation manner of the embodiment of the present application, when the service analysis module analyzes the historical service information to obtain the stored data type of each user in different time periods in the historical service information and the integrity of the certificate corresponding to the stored data type, the service analysis module is specifically configured to:
determining at least one set of service handling data based on the historical service information;
respectively obtaining tags of at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is completely processed according to the service processing time data, if not, performing data disruption on the service processing data, and if so, performing corresponding binding on the user data and the service processing time data to obtain user binding data;
and carrying out data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: a quality acquisition module and a quality update module, wherein,
the quality acquisition module is used for acquiring the actual service quality corresponding to the current user data information;
and the quality updating module is used for updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The embodiment of the present application also introduces an electronic apparatus from the perspective of a physical device, as shown in fig. 3, an electronic apparatus 300 shown in fig. 3 includes: a processor 301 and a memory 303. Wherein processor 301 is coupled to memory 303, such as via bus 302. Optionally, the electronic device 300 may also include a transceiver 304. It should be noted that the transceiver 304 is not limited to one in practical applications, and the structure of the electronic device 300 is not limited to the embodiment of the present application.
The Processor 301 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 301 may also be a combination of computing functions, e.g., comprising one or more microprocessors in combination, a DSP and a microprocessor in combination, or the like.
Bus 302 may include a path that transfers information between the above components. The bus 302 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 302 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 3, but this does not mean only one bus or one type of bus.
The Memory 303 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 303 is used for storing application program codes for executing the scheme of the application, and the processor 301 controls the execution. The processor 301 is configured to execute application program code stored in the memory 303 to implement the aspects illustrated in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. But also a server, etc. The electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
The following describes a computer-readable storage medium provided by embodiments of the present application, and the computer-readable storage medium described below and the method described above may be referred to correspondingly.
An embodiment of the present application provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above base station device management and control method are implemented.
Since embodiments of the computer-readable storage medium section correspond to embodiments of the method section, reference is made to the description of the embodiments of the method section for embodiments of the computer-readable storage medium section.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (10)

1. A method of preventing survivability, comprising:
acquiring network data information and user data information;
analyzing the network data information and the user data information to obtain target user information;
sending the network data information to a user corresponding to the target user information for data storage;
determining certification time information and certification data information of a user based on the target user information, and judging whether the certification time information exceeds preset time information or not, wherein the certification time information is time information spent on submitting certification, and the certification data information is certification data information submitted by the user along with the certification time information;
if the network data information exceeds the network data information, carrying out information integrity verification on the certification data information according to the network data information to obtain the information integrity of the certification data information;
and judging whether the information integrity degree meets a preset integrity degree, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and equipment of the user.
2. The method of claim 1, wherein the analyzing the network data information and the user data information to obtain the target user information comprises:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
3. The method of claim 2, wherein the analyzing the network data information and the user data information to obtain the target user information further comprises:
and binding the target user information with the data identification information.
4. The method of claim 2, wherein the performing user screening on the user data information according to the data storage information to obtain target user information comprises:
identifying the data storage information to obtain data category information and data storage capacity of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively carrying out data comparison on the storage residual quantity of each user in the matched user information and the data storage quantity to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the comparison user information to obtain target user information meeting the preset sequence.
5. The method of claim 4, wherein the determining the type of data stored, the historical quality of service, and the remaining amount of data stored for each user based on the user data information further comprises:
acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
performing data sorting on the historical service information according to the type of the stored data and the integrity degree of the certificate to obtain service matrix data;
performing data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating historical service quality of each user;
and adding the historical service quality into the user data information for updating to obtain updated user data information.
6. The method according to claim 5, wherein the analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the integrity of the certification corresponding to the stored data types comprises:
determining at least one set of service handling data based on the historical service information;
respectively performing label acquisition on the at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is completely processed according to the service processing time data, if not, performing data disruption on the service processing data, and if so, performing corresponding binding on the user data and the service processing time data to obtain user binding data;
and performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
7. The method of claim 5, wherein the adding the historical quality of service to the user data information for updating results in updated user data information, further comprising:
acquiring actual service quality corresponding to the current user data information;
and updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
8. An anti-crash device, comprising:
the information acquisition module is used for acquiring network data information and user data information;
the information analysis module is used for analyzing the network data information and the user data information to obtain target user information;
the information sending module is used for sending the network data information to a user corresponding to the target user information for data storage;
the time judging module is used for determining the certification time information and the certification data information of the user based on the target user information and judging whether the certification time information exceeds the preset time information or not, wherein the certification time information is the time information spent on submitting the certification, and the certification data information is the certification data information submitted by the user along with the certification time information;
the information verification module is used for verifying the information integrity of the certification data information according to the network data information when the certification time information exceeds preset time information to obtain the information integrity of the certification data information;
and the integrity judgment module is used for judging whether the information integrity meets the preset integrity, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and the equipment of the user.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: performing the method of preventing dropout according to any of the claims 1-7.
10. A computer-readable storage medium on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of preventing power down according to any one of claims 1 to 7.
CN202211470432.XA 2022-11-22 2022-11-22 Method, device, equipment and medium for preventing power loss Active CN115587392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211470432.XA CN115587392B (en) 2022-11-22 2022-11-22 Method, device, equipment and medium for preventing power loss

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211470432.XA CN115587392B (en) 2022-11-22 2022-11-22 Method, device, equipment and medium for preventing power loss

Publications (2)

Publication Number Publication Date
CN115587392A CN115587392A (en) 2023-01-10
CN115587392B true CN115587392B (en) 2023-04-07

Family

ID=84783483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211470432.XA Active CN115587392B (en) 2022-11-22 2022-11-22 Method, device, equipment and medium for preventing power loss

Country Status (1)

Country Link
CN (1) CN115587392B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110648243A (en) * 2019-08-20 2020-01-03 中国平安财产保险股份有限公司 Data processing method and device, computer equipment and storage medium
CN111914269A (en) * 2020-07-07 2020-11-10 华中科技大学 Data security sharing method and system under block chain and cloud storage environment
CN112416263A (en) * 2020-12-10 2021-02-26 从法信息科技有限公司 Space-time certification blocking storage method and device based on random verification and electronic equipment
CN113382061A (en) * 2021-06-08 2021-09-10 中国工商银行股份有限公司 Service processing method, device and system based on cloud environment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875327A (en) * 2018-05-28 2018-11-23 阿里巴巴集团控股有限公司 One seed nucleus body method and apparatus
CN110727712B (en) * 2019-10-15 2021-06-04 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110648243A (en) * 2019-08-20 2020-01-03 中国平安财产保险股份有限公司 Data processing method and device, computer equipment and storage medium
CN111914269A (en) * 2020-07-07 2020-11-10 华中科技大学 Data security sharing method and system under block chain and cloud storage environment
CN112416263A (en) * 2020-12-10 2021-02-26 从法信息科技有限公司 Space-time certification blocking storage method and device based on random verification and electronic equipment
CN113382061A (en) * 2021-06-08 2021-09-10 中国工商银行股份有限公司 Service processing method, device and system based on cloud environment

Also Published As

Publication number Publication date
CN115587392A (en) 2023-01-10

Similar Documents

Publication Publication Date Title
CN101169714B (en) System and method for accelerating application execution in computer environment
CN112035879B (en) Information processing method and system for improving confidentiality of automatic logistics of cell
US10469571B2 (en) Block allocation based on server utilization
CN111698303A (en) Data processing method and device, electronic equipment and storage medium
CN114862571A (en) Service simulation method, device, equipment and storage medium of ESOP system
CN115587392B (en) Method, device, equipment and medium for preventing power loss
CN112162859A (en) Data processing method and device, computer readable medium and electronic equipment
CN112529400A (en) Data processing method, device, terminal and readable storage medium
CN113516065B (en) Data weight measuring and calculating method and device based on block chain, server and storage medium
CN109800138B (en) CPU testing method, electronic device and storage medium
CN115358894A (en) Intellectual property life cycle trusteeship management method, device, equipment and medium
US10452792B1 (en) Simulating demand and load on storage servers
CN112685199B (en) Message queue repairing method and device, computer equipment and storage medium
CN113052509A (en) Model evaluation method, model evaluation apparatus, electronic device, and storage medium
CN116150470A (en) Content recommendation method, device, apparatus, storage medium and program product
CN112738213A (en) Block chain-based task demand response method, device, system and storage medium
CN116506333B (en) Transaction system production inversion detection method and equipment
CN109471790A (en) Send nuclear parameter comparison method and device, computer installation and readable storage medium storing program for executing
CN109409922A (en) Data aggregate modeling method, device, computer equipment and storage medium
CN112468541B (en) Data processing method, device and system based on Internet of things
CN115731047B (en) Batch order processing method, equipment and medium
CN116662208B (en) Transaction testing method, device and medium based on distributed baffle
CN116414366B (en) Middleware interface generation method, device, equipment and medium
CN116881726A (en) Data processing method, device, equipment and medium for transportation practice operation
CN116610465A (en) Event notification-based message sending method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant