CN102945352B - Analyze in computer systems, which and the method for the information that performs an action - Google Patents

Analyze in computer systems, which and the method for the information that performs an action Download PDF

Info

Publication number
CN102945352B
CN102945352B CN201210437591.XA CN201210437591A CN102945352B CN 102945352 B CN102945352 B CN 102945352B CN 201210437591 A CN201210437591 A CN 201210437591A CN 102945352 B CN102945352 B CN 102945352B
Authority
CN
China
Prior art keywords
information
query
action
action message
analysis result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210437591.XA
Other languages
Chinese (zh)
Other versions
CN102945352A (en
Inventor
马华杰
邱梅
庞占星
赵晓雪
郎需栋
高继轩
陈万强
刘刚
王孝帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
STATE GRID SHANDONG LINQU POWER SUPPLY Co Ltd
State Grid Corp of China SGCC
Weifang Power Supply Co of State Grid Shandong Electric Power Co Ltd
Original Assignee
STATE GRID SHANDONG LINQU POWER SUPPLY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by STATE GRID SHANDONG LINQU POWER SUPPLY Co Ltd filed Critical STATE GRID SHANDONG LINQU POWER SUPPLY Co Ltd
Priority to CN201210437591.XA priority Critical patent/CN102945352B/en
Publication of CN102945352A publication Critical patent/CN102945352A/en
Application granted granted Critical
Publication of CN102945352B publication Critical patent/CN102945352B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

Provide a kind of analysis in computer systems, which and the method for the information that performs an action, described method comprises: receiving action information; Analyze described action message and generate analysis result information; The type of described action message is judged according to analysis result information; If the type of described action message is for arranging, then performs and action is set, release is set and returns the information of being provided with; If the type of described action message is for calculating, then performs and calculate action, calculate release and return result of calculation information; If the type of described action message is inquiry, then perform query actions, query actions terminates to return Query Result information.

Description

Analyze in computer systems, which and the method for the information that performs an action
Technical field
The present invention relates generally to computer system, particularly relates to a kind of analysis in computer systems, which and the method for the information that performs an action.
Background technology
The process of Contemporary computer systems, display and communication capacity all significantly strengthen, and such computer system user gets more and more task of using these computer system devices to perform larger quantity.Such as, except function of voice communication and internet browsing function, even navigation feature and satellite positioning functions, and the network application service of various complexity.But although the process of computer system, communication and display capabilities make such task become possibility, it is only owing to often needing the quantity of information that inputted by computer system data input mechanism by user and remaining unpractical.
In addition, enterprise usually by one group of discrete feature binding in software product, to attempt meeting the needs of particular customer group and to be distinguished from each other to software product.But client mostly just needs the relatively small subset asking these these features, and the purposes of all the other features is less or do not have for client.In addition, these supplementary features generally increase the complicacy of user interface and use in given software product, and may reduce the overall customer experience of software product thus.
Summary of the invention
The invention provides a kind of analysis in computer systems, which and the method for the information that performs an action, described method comprises: receiving action information; Analyze described action message and generate analysis result information; The type of described action message is judged according to analysis result information; If the type of described action message is for arranging, then performs and action is set, release is set and returns the information of being provided with; If the type of described action message is for calculating, then performs and calculate action, calculate release and return result of calculation information; If the type of described action message is inquiry, then perform query actions, query actions terminates to return Query Result information.
Preferably, wherein, if the type of described action message is for calculating, then perform and calculate action, security strategy classification is judged further according to described analysis result, if security strategy is senior, then after calculating release after calculating release, result of calculation information is carried out buffer memory to return calculating simultaneously and complete information, and do not return result of calculation information; If security strategy is rudimentary, then, after calculating release, returns calculating and complete information and return result of calculation information simultaneously.
Preferably, wherein, if the type of described action message is inquiry, then perform query actions, query actions terminates to judge security strategy classification further according to described analysis result afterwards, if security strategy is senior: carry out security verification according to analysis result, if by checking, return Query Result information, if not by checking, return failure; If security strategy is rudimentary: return Query Result information.
Preferably, search an object information according to analysis result, perform based on described object information and action, calculating action or query actions are set.Wherein, link according to analysis result identification one, search described object information according to described link.
Preferably, the action message received is encrypted action message, and before analyzing described action message, first decipher the encrypted action message received.
Invention also provides a kind of analysis in computer systems, which and the method for the information that performs an action, described method comprises: receive the first action message; Analyze described first action message and generate the first analysis result information; Resolve the first analysis result acquisition of information computing information, and perform according to described computing information and calculate action, after calculating release, buffer memory result of calculation information also returns calculating and completes information; Receive the second action message; Analyze described second action message and generate the second analysis result information; Resolve the second analysis result acquisition of information Query Information, and perform query actions according to described Query Information, poll-final returns Query Result information.Wherein also comprised before parsing first analysis result acquisition of information computing information: resolve the first analysis result acquisition of information configuration information, and action is set according to described configuration information execution.
Preferably, wherein said Query Result information is described result of calculation information, and described in buffer memory, result of calculation information is to an impact damper, and described query actions is the described impact damper of inquiry.
Preferably, wherein, resolve the second analysis result acquisition of information Query Information, and perform query actions according to described Query Information, the second analysis result is resolved further to obtain security strategy classification information after poll-final, if security strategy classification information is senior: resolve further the second analysis result and obtain security verification information and also verify, then return Query Result information if the verification passes, if checking not by; return failure; If security strategy is rudimentary: return Query Result information.
Preferably, search an object information respectively according to the first analysis result information or the second analysis result information, perform based on described object information and action, calculating action or query actions are set.Wherein, link according to the first analysis result information or the second analysis result information identification one, search described object information according to described link.
Preferably, the first action message received or the second action message are encrypted action messages, and before analyzing described first action message or the second action message, first decipher encrypted first action message or the second action message that receive.
Accompanying drawing explanation
Fig. 1 analyzes in the preferred embodiment of the present invention and the process flow diagram of the method for the information that performs an action in computer systems, which.
Fig. 2 analyzes in another preferred embodiment of the present invention and the process flow diagram of the method for the information that performs an action in computer systems, which.
Embodiment
The instructions provided hereafter is to enable those skilled in the art manufacture and using the present invention, and instructions provides in the context of application-specific and demand thereof.Various amendments for disclosed embodiment are easily shown in those skilled in the art, and can be applied to other embodiments and application in the General Principle of this definition, and do not depart from the spirit and scope of the present invention.Thus, the present invention not intended to be is limited to shown embodiment, but meet the most widely scope consistent with principle disclosed herein and feature.
These technology that the present invention relates to can be implemented as independent utility, or the subroutine be embodied as in Another Application or functional module.In addition, can function be configured at client computer (such as at least partly, personal computer, laptop computer, cell phone, PDA or can other equipment of operating computer readable data) above to perform, or by network (such as, internet, Intranet, LAN, WAN, MAN or network combination or be supported in the other technologies communicated between computing system) via the computing system be associated from client computer long-distance support.Thus, buy information, software product and configuration-direct and local storage (such as, (such as, on the computing machine of accessing via network or server) can be stored on the local computer) and/or remotely.
Generally speaking, functional module comprises the routine, program, object, assembly, data structure etc. that perform particular task or realize particular abstract data type.In addition, those skilled in the art will recognize that: computer system may not be limited to conventional personal computer, and comprise other calculating configuration, this comprise handheld device, multicomputer system, based on microprocessor or programmable electronic equipment for consumption, network PC, microcomputer, mainframe computer etc.Similarly, computing equipment is not necessarily limited to independent computing equipment, because these mechanism also can realize in a distributed computing environment, and utilizes in a distributed computing environment and is executed the task by the remote processing devices of communication network links.In a distributed computing environment, functional module can be arranged in local and remote both memory storage devices.
With reference to figure 1, computer system receiving action information; Action message can come from user operation, can come from network request, or the request of inside computer system parts.After receiving action message, analyze described action message by analysis module and generate analysis result information; Described analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in a record sheet after analyzing described analysis result information, so that inquiry and access.Computer system judges the type of described action message according to the analysis result information obtained after above-mentioned analysis; Such as, search the type information corresponding to record sheet determination corresponding actions information when needing.Further described type information is judged, if the type of described action message is for arranging, then performs and action is set, release is set and returns the information of being provided with; Wherein arranging action is webpage setting, page setup, window setting, application setting etc.If the type of described action message is for calculating, then performs and calculate action, calculate release and return result of calculation information; Described calculating action is flow rate calculation, power consumption calculation, calculation of capacity, computation etc.If the type of described action message is inquiry, then adjust and perform query actions, query actions terminates to return Query Result information; Wherein query actions is access queries, information inquiry, network inquiry, caching query etc.
According to one preferred embodiment of the present invention, in order to security consideration, wherein, if the type of described action message is for calculating, then performs and calculate action, after calculating release, judge security strategy classification further according to described analysis result, if security strategy is senior, then after calculating release, result of calculation information is carried out buffer memory and return calculating simultaneously and complete information, and do not return result of calculation information; If security strategy is rudimentary, then, after calculating release, return calculating and complete information and return result of calculation information simultaneously, wherein result of calculation information cache is in impact damper.Wherein, if the type of described action message is inquiry, then perform query actions, query actions terminates to judge security strategy classification further according to described analysis result afterwards, if security strategy is senior: carry out security verification according to analysis result, if by checking, return Query Result information, if not by checking, return failure; If security strategy is rudimentary: return Query Result information.
According to one preferred embodiment of the present invention, after analysis module analyzes described action message, computer system is determined an object information according to analysis result information or in record sheet, is searched an object information, and arranges action based on described object information execution, calculate action or query actions.According to another embodiment of the present invention, described computer system links according to analysis result information identification one or in record sheet, searches a link, described object information is searched according to described link, particularly, according to memory location or the document location of the address location object information of described link, and object information is searched on this memory location or document location, then perform based on found object information and action, calculating action or query actions are set.Wherein action is set for performing on described object based on described object information, calculates action or query actions.One of ordinary skill in the art will readily recognize that above-mentioned object can be various hardware resource in computer system or software resource or function or class etc.Above-mentioned process information can be various address information, function pointer, function, data message etc.Above-mentioned setting can be the various settings to window, as maximized, minimizing, close, open, create example etc., also can be to application, as opened, closing etc., also can be to webpage, as rollback, advances etc.Above-mentioned calculating can be computational resource, computing time, computing power, calculating power consumption, computation period etc.Above-mentioned inquiry can be query buffer, query webpage information, data query base resource, inquiry system resource, query text, inquiry hardware resource etc.Sometimes in order to security, the action message received is encrypted action message, and before analyzing described action message, first decipher the encrypted action message received, and described decryption oprerations can be carried out according to PKI or private key.
With reference to figure 2, computer system receives the first action message; First action message can come from user operation, can come from network request, or the request of inside computer system parts.After receiving the first action message, analyze described first action message by analysis module and generate the first analysis result information; First analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in a record sheet after analyzing described first analysis result information, so that inquiry and access; Resolve the first analysis result acquisition of information computing information, and perform calculating action according to described computing information, calculate after release, buffer memory result of calculation information also returns calculating and completes information, and described calculating action is flow rate calculation, power consumption calculation, calculation of capacity, computation etc.; Receive the second action message, the second action message can come from user operation, can come from network request, or the request of inside computer system parts; Analyze described second action message and generate the second analysis result information, the second analysis result information comprises type information, security policy information, link information, object information, process information etc.; Analysis module is recorded in described record sheet after analyzing described second analysis result information, so that inquiry and access; Resolve the second analysis result acquisition of information Query Information, and perform query actions according to described Query Information, poll-final returns Query Result information, and wherein query actions is access queries, information inquiry, network inquiry, caching query etc.Wherein said Query Result information is described result of calculation information, and described in buffer memory, result of calculation information is to an impact damper, and described query actions is the described impact damper of inquiry.Wherein also comprised before parsing first analysis result acquisition of information computing information: resolve the first analysis result acquisition of information configuration information, and action is set according to described configuration information execution, wherein arranging action is webpage setting, page setup, window setting, application setting etc.
According to one preferred embodiment of the present invention, in order to security consideration, wherein, resolve the second analysis result acquisition of information Query Information, and perform query actions according to described Query Information, the second analysis result is resolved further to obtain security strategy classification information after poll-final, if security strategy classification information is senior: resolve the second analysis result further and obtain security verification information and verify, then return Query Result information if the verification passes, if checking not by; return failure; If security strategy is rudimentary: return Query Result information.Wherein obtain security verification information to comprise, obtain user right information, digital signature information or encrypted message etc., after obtaining security verification information, this security verification Information Pull authentication module is carried out described checking, such as, authentication module inquiring and authenticating table verify whether user right information legal, verify whether digital signature matches success, verify that whether password is correct etc.Those skilled in the art can know that above-mentioned proof procedure is only exemplary illustration, and checking herein can adopt all solutions that can realize described checking.
According to one preferred embodiment of the present invention, after analysis module analyzes described first action message or the second action message, generate the first analysis result information or the second analysis result information, then, computer system is determined an object information according to the first analysis result information or the second analysis result information or in record sheet, searches an object information, and arranges action based on described object information execution, calculate action or query actions.According to another embodiment of the present invention, described computer system links according to the first analysis result information or the second analysis result information identification one, described object information is searched according to described link, particularly, according to memory location or the document location of the address location object information of described link, and object information is searched on this memory location or document location, then perform based on found object information and action, calculating action or query actions are set.Wherein action is set for performing on described object based on described object information, calculates action or query actions.One of ordinary skill in the art will readily recognize that above-mentioned object can be various hardware resource in computer system or software resource or function or class etc.Above-mentioned process information can be various address information, function pointer, function, data message etc.Above-mentioned setting can be the various settings to window, as maximized, minimizing, close, open, create example etc., also can be to application, as opened, closing etc., also can be to webpage, as rollback, advances etc.Above-mentioned calculating can be computational resource, computing time, computing power, calculating power consumption, computation period etc.Above-mentioned inquiry can be query buffer, query webpage information, data query base resource, inquiry system resource, query text, inquiry hardware resource etc.Sometimes in order to security, the first action message received and/or the second action message are encrypted action messages, and first deciphered encrypted first action message received and/or the second action message before analyzing described first action message and/or the second action message, described decryption oprerations can be carried out according to PKI or private key.It will be understood by those skilled in the art that and can equally be applied to the second action message to the process of the first action action message, similarly, equally can be applied to the second analysis result information to the process of the first analysis result information.
While the present invention allows various improvement and alternative structure, show some embodiment illustrated of the present invention in accompanying drawing and be described in detail.But, it should be appreciated that this is not attempt the present invention to be limited to the form or disclosed form of specifying, and just the opposite, the present invention covers all improvement and substitutes and various merging and combination, and all equivalents all within the spirit and scope of the present invention.

Claims (5)

1. analyze in computer systems, which and a method for the information that performs an action, described method comprises:
A) receiving action information;
B) analyze described action message and generate described analysis result information;
C) analytic results information judges the type of described action message;
If d) type of described action message is for arranging, then performs and action is set, release is set and returns the information of being provided with;
If e) type of described action message is for calculating, then performs and calculate action, calculate release and return result of calculation information;
If f) type of described action message is inquiry, then perform query actions, query actions terminates to return Query Result information;
Described step e) specifically comprise the following steps: if the type of described action message is for calculating, then perform and calculate action, security strategy classification is judged further according to described analysis result after calculating release, if security strategy is senior, then after calculating release, result of calculation information is carried out buffer memory to return calculating simultaneously and complete information, and do not return result of calculation information; If security strategy is rudimentary, then, after calculating release, returns calculating and complete information and return result of calculation information simultaneously;
Described step f) specifically comprise the following steps: if the type of described action message is inquiry, then perform query actions, query actions terminates to judge security strategy classification further according to described analysis result afterwards, if security strategy is senior: carry out security verification according to analysis result, if by checking, return Query Result information, if not by checking, return failure; If security strategy is rudimentary: return Query Result information.
2. the method for claim 1, also comprises, and searches an object information according to analysis result, performs arrange action, calculating action or query actions based on described object information.
3. method as claimed in claim 2, also comprises, links according to analysis result identification one, search described object information according to described link.
4. the method for claim 1, also comprises, and the action message received is encrypted action message, and before analyzing described action message, first decipher the encrypted action message received.
5. analyze in computer systems, which and a method for the information that performs an action, described method comprises:
A) the first action message is received;
B) analyze described first action message and generate the first analysis result information;
C) resolve the first analysis result acquisition of information computing information, and perform according to described computing information and calculate action, after calculating release, buffer memory result of calculation information also returns calculating and completes information;
D) the second action message is received;
E) analyze described second action message and generate the second analysis result information;
F) resolve the second analysis result acquisition of information Query Information, and perform query actions according to described Query Information, poll-final returns Query Result information;
Wherein said Query Result information is described result of calculation information;
Wherein said query actions is query buffer;
Described step f) specifically comprise: resolve the second analysis result acquisition of information Query Information, and perform query actions according to described Query Information, the second analysis result is resolved further to obtain security strategy classification information after poll-final, if security strategy classification information is senior: resolve the second analysis result further and obtain security verification information and verify, then return Query Result information if the verification passes, if checking not by; return failure; If security strategy is rudimentary: return Query Result information.
CN201210437591.XA 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action Expired - Fee Related CN102945352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210437591.XA CN102945352B (en) 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210437591.XA CN102945352B (en) 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action

Publications (2)

Publication Number Publication Date
CN102945352A CN102945352A (en) 2013-02-27
CN102945352B true CN102945352B (en) 2016-04-13

Family

ID=47728293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210437591.XA Expired - Fee Related CN102945352B (en) 2012-11-06 2012-11-06 Analyze in computer systems, which and the method for the information that performs an action

Country Status (1)

Country Link
CN (1) CN102945352B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1109400A1 (en) * 1999-12-16 2001-06-20 CANAL+ Société Anonyme Transmission of a command to a receiver or to a decoder
CN101562622A (en) * 2009-06-05 2009-10-21 杭州华三通信技术有限公司 Method for executing user request and corresponding server thereof
CN102457565A (en) * 2010-11-03 2012-05-16 中国电信股份有限公司 Method for accessing network by mobile terminal, and agency server
CN102594899A (en) * 2011-12-31 2012-07-18 成都市华为赛门铁克科技有限公司 Storage service method and storage server using the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1109400A1 (en) * 1999-12-16 2001-06-20 CANAL+ Société Anonyme Transmission of a command to a receiver or to a decoder
CN101562622A (en) * 2009-06-05 2009-10-21 杭州华三通信技术有限公司 Method for executing user request and corresponding server thereof
CN102457565A (en) * 2010-11-03 2012-05-16 中国电信股份有限公司 Method for accessing network by mobile terminal, and agency server
CN102594899A (en) * 2011-12-31 2012-07-18 成都市华为赛门铁克科技有限公司 Storage service method and storage server using the same

Also Published As

Publication number Publication date
CN102945352A (en) 2013-02-27

Similar Documents

Publication Publication Date Title
CN110495132B (en) System and method for generating, uploading and executing code blocks within distributed network nodes
EP3596642B1 (en) Privacy-preserving identity verification
KR101850677B1 (en) Method and system for determining whether a terminal logging into a website is a mobile terminal
US8898764B2 (en) Authenticating user through web extension using token based authentication scheme
CN111164632A (en) Information processing method and device based on block chain and block chain network
US9934229B2 (en) Telemetry file hash and conflict detection
CN107852412A (en) For phishing and the system and method for brand protection
CN109190353B (en) Method and computing device for automatically generating certificate document
US20200213331A1 (en) Data service system
US20150089300A1 (en) Automated risk tracking through compliance testing
CN112328486A (en) Interface automation test method and device, computer equipment and storage medium
CN111770072B (en) Method and device for accessing function page through single sign-on
CN113709181A (en) Website login method, device, equipment and storage medium based on browser plug-in
US20170264625A1 (en) Security test tool
CN102945352B (en) Analyze in computer systems, which and the method for the information that performs an action
US9787658B2 (en) Login system based on server, login server, and verification method thereof
TWI750252B (en) Method and device for recording website access log
WO2019062184A1 (en) Bank insurance policy data interfacing method and insurance policy data server
CN114221782A (en) Authentication method, equipment, chip and storage medium
CN115510493A (en) Resource data processing method and device based on block chain and server
CN116821954A (en) Information processing method and device, electronic equipment and computer readable storage medium
CN117635146A (en) Account management method, account management device, computer equipment and storage medium
CN115310105A (en) Resource request processing method and device based on block chain and server
NZ716756B2 (en) Automatically generating certification documents

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

Document name: Notification of Publication and of Entering the Substantive Examination Stage of the Application for Invention

DD01 Delivery of document by public notice

Addressee: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

Document name: the First Notification of an Office Action

C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Ma Huajie

Inventor after: Qiu Mei

Inventor after: Pang Zhanxing

Inventor after: Zhao Xiaoxue

Inventor after: Lang Xudong

Inventor after: Gao Jixuan

Inventor after: Chen Wanqiang

Inventor after: Liu Gang

Inventor after: Wang Xiaoshuai

Inventor before: Wang Yuanyuan

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20160129

Address after: 262000, No. 4 Mi River Road, Linqu County, Weifang, Shandong

Applicant after: STATE GRID SHANDONG LINQU POWER SUPPLY CO., LTD.

Address before: Suzhou City, Jiangsu province 215100 Songjiang Road, Suzhou Industrial Park, No. 208 Building 8 Room 112

Applicant before: Suzhou Yiyuan Hongda Intellectual Property Agency Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160623

Address after: 262600, 4 Shandong Road, Linqu County, China

Patentee after: STATE GRID SHANDONG LINQU POWER SUPPLY CO., LTD.

Patentee after: State Grid Shandong Electric Power Company Weifang Power Supply Company

Patentee after: State Grid Corporation of China

Address before: No. 4 Mi River Road, Linqu County

Patentee before: STATE GRID SHANDONG LINQU POWER SUPPLY CO., LTD.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160413

Termination date: 20171106

CF01 Termination of patent right due to non-payment of annual fee