CN103116620A - Unstructured data safe filtering method based on strategy - Google Patents

Unstructured data safe filtering method based on strategy Download PDF

Info

Publication number
CN103116620A
CN103116620A CN2013100343261A CN201310034326A CN103116620A CN 103116620 A CN103116620 A CN 103116620A CN 2013100343261 A CN2013100343261 A CN 2013100343261A CN 201310034326 A CN201310034326 A CN 201310034326A CN 103116620 A CN103116620 A CN 103116620A
Authority
CN
China
Prior art keywords
value
exp
strategy
document
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100343261A
Other languages
Chinese (zh)
Other versions
CN103116620B (en
Inventor
汪晨
林为民
张涛
邓松
马缓缓
时坚
李伟伟
周诚
管小娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
State Grid Jiangsu Electric Power Co Ltd
Global Energy Interconnection Research Institute
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI filed Critical State Grid Corp of China SGCC
Priority to CN201310034326.1A priority Critical patent/CN103116620B/en
Publication of CN103116620A publication Critical patent/CN103116620A/en
Application granted granted Critical
Publication of CN103116620B publication Critical patent/CN103116620B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides an unstructured data safe filtering method based on strategy. The unstructured data safe filtering method based on strategy safely filters unstructured data with the technology which combines technology with management. On the technology, strategy rules are standardized by designing flexible strategy rules formulas. On the management, requirements of a service system are analyzed, managers and service workers design the proper strategy rules together, and operating workers of unstructured data transmission add attribute mark information on the data. When the unstructured data are filtered, the strategy rules formulas and the strategy rules formulas are taken as parameters for strategy rule matching and are matched, and the unstructured data are safely filtered through matching results.

Description

Unstructured data safety filtering method based on strategy
Technical field
The invention belongs to information security field, be specifically related to a kind of unstructured data safety filtering method based on strategy.
Background technology
Day by day perfect along with IT application to our society, a lot of large enterprises, government affairs departments has realized handle official business operation information and digitizing, but during due to initial the construction for safety, network is divided into Inside and outside network, causes not connected information island.For can the better services user popular, enterprise or government affairs departments begin limited that internal network and internet is interconnected, and what bring is exactly the safety problem of data transmission thereupon.
Data in the network information mainly contain structuring and two kinds of data modes of destructuring, and structural data often is stored in database with the form of bivariate table, because data are easy to extract, filter also relatively easy in reciprocal process; And there is no machine made unstructured data as Word, PDF, image, video etc., their data layout is different, and data content is difficult to extract, the network switching equipment is how fine to be filtered them, unifiedly even carries out a major challenge that safe filter analysis is current filter plant.
Number of patent application provides a kind of unstructured data safety filtering method for the patent application that CN201110316665.X, name are called based on the unstructured data safety filtering method of mark, although can filter unstructured data, but policing rule is fairly simple, can not carry out strategy matching to the mark value of unstructured data in mode flexibly and filter.
Summary of the invention
For overcoming defects, the invention provides a kind of unstructured data safety filtering method based on strategy, in service end by the policy expression of configuration with variable, the layout strategy matching algorithm, be that unstructured data adds mark value in client, when the unstructured data of client tape label value during to service end, according to policy expression, in mode very flexibly, the mark value of unstructured data is carried out strategy matching by the strategy matching algorithm and filter.
For achieving the above object, the invention provides a kind of unstructured data safety filtering method based on strategy, carry out data filtering when service end and client are carried out data transmission, its improvements are, described method comprises the steps:
(1). the layout strategy regular expression;
(2). in conjunction with attribute and the business demand of unstructured data, according to policing rule expression formula design specific strategy rule;
(3). according to policing rule and unstructured data attribute, with the form record of unstructured data attribute with label information, and transmit together with unstructured data;
(4). parses policy rule is configured to tree data structure with the policing rule of character string forms and calculates to carry out strategy matching;
(5). resolve label information, and be stored in Hash table;
(6). with the parameter of the label information in policing rule data structure and Hash table as the policing rule coupling, calculate matching result, the match is successful, and allow data to pass through, otherwise do not allow data to pass through, and log.
In optimal technical scheme provided by the invention, in described step 1, policing rule is the text string expression formula that is stored in tactful configuration file; Policing rule is comprised of self-defining expression formula; The policing rule expression formula is designed according to business demand and unstructured data document properties by service end, so that unstructured data is filtered.
In the second optimal technical scheme provided by the invention, expression formula comprises: variable, value and operational character; The value of variable is extracted from data markers information in the strategy matching process.
In the 3rd optimal technical scheme provided by the invention, in described step 3, label information is made marks to document by the conditional information of client according to attribute, business demand and the mutual agreement of document data; Document markup is a list that key-value pair is answered; Wherein, key is the variable on policy expression, is worth the value for variable.
In the 4th optimal technical scheme provided by the invention, the mark of document is comprised: the size of document, type and filename.
In the 5th optimal technical scheme provided by the invention, in described step 4, policing rule is resolved to the data structure that is suitable for strategy matching, calculate to facilitate strategy matching; Parses policy when rule, the policing rule of text is carried out lexical analysis and grammatical analysis, if policing rule is correct, spanning tree type policy data structure, otherwise the processing that reports an error.
In the 6th optimal technical scheme provided by the invention, described step 5 comprises the steps: (5-1). extract document markup L from document D;
(5-2). build Hash table H and preserve label information;
(5-3). obtain item by item label information, and with information with key-value pair<key, value〉mode be filled in H.
In the 7th optimal technical scheme provided by the invention, described step 6 comprises the steps:
(6-1). build the formation Queue of a first in first out;
(6-2). begin traverse tree type structure expression Exp from root;
(6-3). judge the element in formation, as be 1, return to the end value that Exp calculates, otherwise return to mistake.
In the 8th optimal technical scheme provided by the invention, described step 6-2 comprises the steps:
A. be not empty as left subtree, the left subtree of traverse tree;
B. be not empty as right subtree, the right subtree of traverse tree;
C. be value value as Exp, Exp is entered Queue;
D. be variable var as Exp, extract variate-value by the Get function and build new Exp from the Hash table H that is stored in mark, new Exp is entered in Queue;
E. be operational character operator as Exp, the operand number N of decision operation symbol, and get N operand from QQueue, and calculation expression, result of calculation is stored in new Exp in the mode of value value, and then new Exp is entered in Queue.
In the 9th optimal technical scheme provided by the invention, the Get function be Get (key, H)->value;
The Get function from Hash table H, returns to corresponding value by key, and this moment is with the key of variable var as H.
Compared with the prior art, a kind of unstructured data safety filtering method based on strategy provided by the invention, purpose are to solve the problem of safe transmission unstructured data between the network of different level of securitys; Because current information filtering technology does not have good mode on the safety problem that solves the destructuring transmission, and pass through the collocation strategy regular expression based on the technology of strategy, design efficient strategy matching algorithm, and do attribute flags for transmitting the document that exchanges, by gateway server (interface between heterogeneous networks) time, according to the policing rule expression formula, adopt the mode of strategy matching algorithm that the document markup attribute is mated, thereby document is carried out safety filtering, to guarantee the safety problem of unstructured data in transmitting procedure.
Description of drawings
Fig. 1 is the assembly schematic diagram that method comprises.
Fig. 2 is the schematic flow sheet based on the unstructured data safety filtering method of strategy.
Fig. 3 is the tree construction schematic diagram.
Embodiment
As shown in Figure 2, a kind of unstructured data safety filtering method based on strategy is carried out data filtering when service end and client are carried out data transmission, comprise the steps:
(1). the layout strategy regular expression;
(2). in conjunction with attribute and the business demand of unstructured data, according to policing rule expression formula design specific strategy rule;
(3). according to policing rule and unstructured data attribute, with the form record of unstructured data attribute with label information, and transmit together with unstructured data;
(4). parses policy rule is configured to tree data structure with the policing rule of character string forms and calculates to carry out strategy matching;
(5). resolve label information, and be stored in Hash table;
(6). with the parameter of the label information in policing rule data structure and Hash table as the policing rule coupling, calculate matching result, the match is successful, and allow data to pass through, otherwise do not allow data to pass through, and log.
In described step 1, policing rule is the text string expression formula that is stored in tactful configuration file; Policing rule is comprised of self-defining expression formula; The policing rule expression formula is designed according to business demand and unstructured data document properties by service end, so that unstructured data is filtered.
Expression formula comprises: variable, value and operational character; The value of variable is extracted from data markers information in the strategy matching process.
In described step 3, label information is made marks to document by the conditional information of client according to attribute, business demand and the mutual agreement of document data; Document markup is a list that key-value pair is answered; Wherein, key is the variable on policy expression, is worth the value for variable.
Mark to document comprises: the size of document, type and filename.
In described step 4, policing rule is resolved to the data structure that is suitable for strategy matching, calculate to facilitate strategy matching; Parses policy when rule, the policing rule of text is carried out lexical analysis and grammatical analysis, if policing rule is correct, spanning tree type policy data structure, otherwise the processing that reports an error.
Described step 5 comprises the steps: (5-1). extract document markup L from document D;
(5-2). build Hash table H and preserve label information;
(5-3). obtain item by item label information, and with information with key-value pair<key, value〉mode be filled in H.
Described step 6 comprises the steps:
(6-1). build the formation Queue of a first in first out;
(6-2). begin traverse tree type structure expression Exp from root;
(6-3). judge the element in formation, as be 1, return to the end value that Exp calculates, otherwise return to mistake.
Described step 6-2 comprises the steps:
A. be not empty as left subtree, the left subtree of traverse tree;
B. be not empty as right subtree, the right subtree of traverse tree;
C. be value value as Exp, Exp is entered Queue;
D. be variable var as Exp, extract variate-value by the Get function and build new Exp from the Hash table H that is stored in mark, new Exp is entered in Queue;
E. be operational character operator as Exp, the operand number N of decision operation symbol, and get N operand from Queue, and calculation expression, result of calculation is stored in new Exp in the mode of value value, and then new Exp is entered in Queue.
The Get function be Get (key, H)->value; The Get function from Hash table H, returns to corresponding value by key, and this moment is with the key of variable var as H.
By following examples, the unstructured data safety filtering method based on strategy is done further explanation.
Fig. 1 has provided the unstructured data safety filtering method reference architecture figure based on strategy, and it mainly comprises three parts: policy rule information, data markers information and matching algorithm.Policy rule information comprises policing rule and rule parsing two parts.Policing rule is the expression formula text string, deposits in tactful configuration file its foundation for filtering; Rule parsing is for being fit to the expression-form (data structure) of coupling with regular text resolution.Label information is that client is the attribute description that document is made, and includes relevant information, user's operation information of document etc., and different documents has different label informations.Matching algorithm calculates coupling according to the label information of client transmissions data according to the policing rule expression formula, with the foundation of matching result as the document filtration.By in service end design and collocation strategy rule and be that document adds attribute description in client, come the matching strategy result according to the relation between data attribute and policing rule expression formula, with this as the filtration voucher.Policing rule is designed to the mathematic(al) representation form with variable, calculates very easy.In addition, due to the dirigibility of policing rule, the extendability of this filter method is very powerful.
The below provides concrete introduction:
Policing rule: policing rule is a text string expression formula that is stored in tactful configuration file.Policing rule is comprised of one or more self-defining expression formulas.Expression formula is by variable, and value and operational character consist of.The value of variable is extracted from data markers information in the strategy matching process.Because policing rule uses expression formula, so the design of policing rule is very flexible.When realizing, concrete suitable policing rule expression formula is designed according to business demand and unstructured data document properties by service end keeper or business personnel, so that unstructured data is filtered.
Parses policy rule: after policing rule configures, in order better policing rule to be mated calculating, policing rule need to be resolved to the data structure that is suitable for strategy matching, calculate to facilitate strategy matching.During the parses policy rule, need to carry out lexical analysis and grammatical analysis to the policing rule of text string.If policing rule is correct, with the generation strategy data structure, otherwise processing will report an error.
Label information: label information by client (send data one end) according to the conditional information of attribute, business demand and the mutual agreement of document data to document make marks (as the size of document, type, filename etc.).Document markup is flexible and variable, and it is the list of a key-value pair, and wherein, key is the variable on policy expression, is worth the value for variable.
Coupling: after regular data structure and label information had been arranged, matching algorithm as parameter, by traversal and calculative strategy regular expression, filtered document with regular data structure and label information; In coupling was calculated, the variable in expression formula replaced with the value to dependent variable in label information.With respect to policing rule and label information, matching algorithm is independently, and it is not subjected to the impact of two parts in front.
1, policing rule expression formula design
Unstructured data safety filtering method core missions based on strategy are exactly to design the policing rule that adapts to filtercondition.The syntax gauge P that this patent proposes a kind of policing rule on the basis of this standard, can design various policing rules flexibly.The standard P of policing rule is described as: P is worth by variable, and three kinds of fundamental elements of operational character consist of, and working rule has,
Rule one: value value and variable var are expression formula exp
Rule two: expression formula consists of new expression formula by monocular operational character opu
Rule three: expression formula and expression formula consist of strategy by the expression formula that binocular operational character opb consists of the new final form of expression formula.In the foregoing description, variable is by letter, and numeral and underscore form, and initial is not numeral; Value is by integer number (mathematical integer), and floating type number (mathematical real number) and character string form; Operational character by relational operator (>,>=,<,<=,==, unequal to), logical operator (﹠amp; ﹠amp; , ||,! ) and substring (substr: left operand is the substring of right operand) operation formation.
Formal being described below of policing rule standard P:
Figure BDA00002790469800081
When the collocation strategy rule, the designer is according to the policing rule standard, in conjunction with business demand and user's operation, select suitable variable, and the satisfied value of variable, by operational character, the relation between variable and value is consisted of a policing rule, and be stored in the policing rule file with the form of brief note string.Design procedure is as follows:
A. according to policing rule standard P;
B. according to the attribute information of document, in conjunction with business demand information, word is required to convert to policing rule
Expression formula exp
As: by Doctype, do inceptive filtering.Business demand only receives the PDF document, but design variable doc_type, use==operational character, policy expression is
doc_type==“PDF”
This expression formula is when document PDF by name, and operating result is true, allow to pass through, otherwise, do not allow to pass through.For another example: suppose that document security level has 1,2,3,4,5 five grades, and numeral is larger, higher grade, certain business demand be document security level greater than 3 o'clock, document does not allow transmission, but design variable doc_security_grade, operational character be>with! , policy expression is
!(doc_security_grade>3)
Be expressed as document security level greater than 3 o'clock, it is false returning results, and does not allow transmission, otherwise, allow transmission.
2, label information
Based on the unstructured data safety filtering method of strategy in client (document transmission end) to the document information that makes marks.Mark not only includes encryption, digital digest, the mandate of document, and the information that all documents such as the owner all can exist also includes the value information of the variable in the service end policing rule.The information step of making marks is:
A. build label L
B. obtain the attribute information A of document, add label L (A) to
C. obtain user's operational attribute information O, add label L (O) to
D. mark is added D in the data file data (L)
3, policing rule is resolved
In method flow 1, the policing rule of designing exists with character string forms, and in order to carry out the matching operation of strategy, the strategy of character string forms need to be represented with the data structure that is fit to matched rule.
In order to can be good at carrying out strategy matching, use following data structure that policy expression is preserved.
Figure BDA00002790469800101
Exp can preserve a value expression (use data territory); Exp can preserve one with the expression formula of operational character, and have operational character to be stored in operator this moment, and lchild preserves left operand, and rchild preserves right operand.By the recurrence of a plurality of Exp, Exp finally can preserve a complete strategy.
The purpose that policing rule is resolved is exactly that policing rule exp with character string forms resolves to strategy with the Exp structure, so that carry out strategy matching.The policy resolution rule is as follows:
A. recurrence exp is handled as follows:
B-1. during for value value or variable var, construct an Exp as exp, value is stored in data territory in Exp, other territories are sky;
B-2. working as exp is op uDuring exp, construct an Exp, with op uGive the operator territory in Exp, with op uThe exp of back is to the rchild of Exp, and other territories are empty;
B-3. working as exp is exp op bDuring exp, construct an Exp, with op bGive the operator territory in Exp, with oP bThe exp of back is to the rchild of Exp, with oP bThe exp of front is to the lchild of Exp, and other territories are empty;
B. return to the root by the tree data structure of Exp structure, be a complete policy data structure.
4, label information extracts
After service end obtains document data, document data is resolved, with the acquisition label information, and label information is converted to the data structure that is suitable for coupling to be calculated.Step is as follows:
A. extract document markup L from document D;
B. build Hash table (HashMap) H and preserve label information;
C. obtain item by item label information, and with information with key-value pair<key, value〉mode be filled in H.
5, policing rule coupling
, be stored in tree in the expression formula mode after parsing due to policing rule, when strategy matching, by the postorder traversal tree, and when traversal calculation expression, finally can obtain an end value.End value can be used for judging whether to allow document to pass through.The strategy matching step is as follows:
A. build the formation Queue of a first in first out;
B. begin postorder traversal tree expression formula Exp from root
B1. be not empty as left subtree (lchild of Exp), the left subtree of traverse tree;
B2. be not empty as right subtree (rchild of Exp), the right subtree of traverse tree;
B3. be value value (data is not empty) as Exp, Exp is entered Queue;
B4. be variable var (data is not for empty) as Exp, extract variate-value by the Get function and build new Exp from Hash table (HashMap) H that is stored in mark, new Exp is entered in Queue.
The Get function is
Get(key,H)->value
The Get function from Hash table H, returns to corresponding value by key, and this moment is with the key of variable var as H.
B5. the operator as Exp is not empty, and namely expression formula is operational character, the operand number N of decision operation symbol, and get N operand from Queue, and calculation expression, result of calculation is stored in new Exp, and then new Exp is entered in Queue
Judge the element in formation, as be 1, return to the end value that Exp calculates, otherwise expression is wrong, returns to mistake.
For convenience of description, our hypothesis has following application example:
Certain enterprise has the high internal network of internal security rank and the low external network of level of security, and external network and internet link, and business demand and better services client for enterprises need internal network is connected with extranets.Connecting the gateway of internal network with external network, layout is based on the unstructured data security filter of strategy, and internal and external customer's transferring documents end is added to the mark instrument of informational function of document.Document is before transmission, the strategy good according to as offered adds label information to the document policies variable, when passing the intranet and extranet junction, when being filtering server, server can extract label information, and strategy is mated calculating, in case strategy matching is not passed through, will carry out will not passing through to process to document, otherwise, allow to pass through.Suppose that application scenarios is that the user is delivered to the unstructured data document on the low external network of level of security from the high internal network of level of security, its specific embodiment is:
One, policing rule:
Policing rule is set according to the keeper of business demand by server, and requires client variate-value in filling Strategy in transferring documents to play the effect of filtration.Here suppose that service needed is as follows:
1. the document source is 192.168.216.5 for the IP of Intranet operation system
2. can not include " scheme " in document name
3. document security level can not surpass 3 (the supposition level of confidentiality is 1,2,3,4,5 five grades, higher grade, level of security is higher)
According to the policing rule standard, use variable src to represent document source, name represents document name, and sec_grade represents the file level of confidentiality, and policing rule is as follows,
(src=" 192.168.216.5 ") ﹠amp; ﹠amp; (! (" scheme " substr name)) ﹠amp; ﹠amp; (sec_grade<=3)
Two, label information:
In the client of document transmission, in negotiations process, client is known and need to be done document source to document, the marking operation of document name and document security level, and supposing has individual client, transmits three parts of documents:
The mark value of document 1 is as follows:
{ src:192.168.216.6, name: " design proposal ", sec_grade=4}
The mark value of document 2 is as follows:
{ src:192.168.216.5, name: " design proposal ", sec_grade=4}
The mark value of document 3 is as follows:
{ src:192.168.216.5, name: " operation system operation instructions ", sec_grade=1}
Three, coupling:
1. need policing rule is done parsing before the coupling, convert the policing rule of character string forms to tree, the policing rule in " " will become following tree construction, as shown in Figure 3.
2. then according to the postorder traversal tree, and when running into variable, go to extract the value of variable from label information, come matched indicia information, with this, document is filtered.
The effect of postorder traversal tree is exactly the value of first calculating left subtree, and then calculates the value of right subtree, left subtree, and right subtree has all calculated, then calculates upper strata subtree left subtree, and right subtree is until tree root.
So according to the postorder traversal rule, have for document 1
2.1 coupling is calculated
src=192.168.216.5
Because the src value of marker extraction is 192.168.216.6, so calculated value is false.
2.2 coupling is calculated
" scheme " substr name
Due to marker extraction filename value be " design proposal ", so rreturn value is true.
2.3 coupling is calculated
(" scheme " substr name)
Obtained the false result in 2.2, so this step result is true.
2.4 coupling is calculated
sec_grade>=3
Because sec_grade is 4, so return to false.
2.5 coupling is calculated
(! (" scheme " substr name) ﹠amp; ﹠amp; (sec_grade>=3))
Can be got by 2.3 and 2.4 results, this result is false.
2.6 coupling is calculated
() ﹠amp src=192.168.216.5; ﹠amp; (! (" scheme " substr name) ﹠amp; ﹠amp; (sec_grade>=3))
Result of calculation by 2.1 and 2.4 as can be known, final matching results is false, so this document will be filtered, does not namely allow to pass through.
According to top step, document 2 and document 3 are mated calculating, be false with the result that obtains document 2, and the result of document 3 is true, namely document 3 allows to pass through, and document 2 does not allow to pass through.
What need statement is that content of the present invention and embodiment are intended to prove the practical application of technical scheme provided by the present invention, should not be construed as the restriction to protection domain of the present invention.Those skilled in the art can do various modifications, be equal to and replace or improve inspired by the spirit and principles of the present invention.But these changes or modification are all in the protection domain that application is awaited the reply.

Claims (10)

1. unstructured data safety filtering method based on strategy is carried out data filtering when service end and client are carried out data transmission, it is characterized in that, described method comprises the steps:
(1). the layout strategy regular expression;
(2). in conjunction with attribute and the business demand of unstructured data, according to policing rule expression formula design specific strategy rule;
(3). according to policing rule and unstructured data attribute, with the form record of unstructured data attribute with label information, and transmit together with unstructured data;
(4). parses policy rule is configured to tree data structure with the policing rule of character string forms and calculates to carry out strategy matching;
(5). resolve label information, and be stored in Hash table;
(6). with the parameter of the label information in policing rule data structure and Hash table as the policing rule coupling, calculate matching result, the match is successful, and allow data to pass through, otherwise do not allow data to pass through, and log.
2. method according to claim 1, is characterized in that, in described step 1, policing rule is the text string expression formula that is stored in tactful configuration file; Policing rule is comprised of self-defining expression formula; The policing rule expression formula is designed according to business demand and unstructured data document properties by service end, so that unstructured data is filtered.
3. method according to claim 2, is characterized in that, expression formula comprises: variable, value and operational character; The value of variable is extracted from data markers information in the strategy matching process.
4. method according to claim 1, is characterized in that, in described step 3, label information is made marks to document by the conditional information of client according to attribute, business demand and the mutual agreement of document data; Document markup is a list that key-value pair is answered; Wherein, key is the variable on policy expression, is worth the value for variable.
5. method according to claim 4, is characterized in that, the mark of document comprised: the size of document, type and filename.
6. method according to claim 1, is characterized in that, in described step 4, policing rule resolved to the data structure that is suitable for strategy matching, calculates to facilitate strategy matching; Parses policy when rule, the policing rule of text is carried out lexical analysis and grammatical analysis, if policing rule is correct, spanning tree type policy data structure, otherwise the processing that reports an error.
7. method according to claim 1, is characterized in that, described step 5 comprises the steps:
(5-1). extract document markup L from document D;
(5-2). build Hash table H and preserve label information;
(5-3). obtain item by item label information, and with information with key-value pair<key, value〉mode be filled in H.
8. method according to claim 1, is characterized in that, described step 6 comprises the steps:
(6-1). build the formation Queue of a first in first out;
(6-2). begin traverse tree type structure expression Exp from root;
(6-3). judge the element in formation, as be 1, return to the end value that Exp calculates, otherwise return to mistake.
9. method according to claim 8, is characterized in that, described step 6-2 comprises the steps:
A. be not empty as left subtree, the left subtree of traverse tree;
B. be not empty as right subtree, the right subtree of traverse tree;
C. be value value as Exp, Exp is entered Queue;
D. be variable var as Exp, extract variate-value by the Get function and build new Exp from the Hash table H that is stored in mark, new Exp is entered in Queue;
E. be operational character operator as Exp, the operand number N of decision operation symbol, and get N operand from QQueue, and calculation expression, result of calculation is stored in new Exp in the mode of value value, and then new Exp is entered in Queue.
10. method according to claim 9, is characterized in that, the Get function be Get (key, H)->value;
The Get function from Hash table H, returns to corresponding value by key, and this moment is with the key of variable var as H.
CN201310034326.1A 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy Active CN103116620B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310034326.1A CN103116620B (en) 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310034326.1A CN103116620B (en) 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy

Publications (2)

Publication Number Publication Date
CN103116620A true CN103116620A (en) 2013-05-22
CN103116620B CN103116620B (en) 2016-01-20

Family

ID=48414993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310034326.1A Active CN103116620B (en) 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy

Country Status (1)

Country Link
CN (1) CN103116620B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491023A (en) * 2015-11-24 2016-04-13 国网智能电网研究院 Data isolation exchange and security filtering method orienting electric power internet of things
CN107038161A (en) * 2015-07-13 2017-08-11 阿里巴巴集团控股有限公司 A kind of device for filtering data and method
CN108449201A (en) * 2018-02-05 2018-08-24 中国工程物理研究院计算机应用研究所 A kind of evaluation method of Intranet business data flow security management and control efficiency
CN110287174A (en) * 2019-05-09 2019-09-27 北京善义善美科技有限公司 A kind of data filtering engine and system and filter method
CN112087486A (en) * 2020-07-30 2020-12-15 山东浪潮通软信息科技有限公司 Data integration method, equipment and medium for Internet of things equipment
CN113114704A (en) * 2021-06-15 2021-07-13 杭州海康威视数字技术股份有限公司 Video structured data one-way transmission method and device based on equipment attribute selection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172773A1 (en) * 2005-02-01 2009-07-02 Newsilike Media Group, Inc. Syndicating Surgical Data In A Healthcare Environment
CN102075560A (en) * 2010-11-19 2011-05-25 福建富士通信息软件有限公司 Fukutomi enterprise search engine technology based on system coupling
CN102509057A (en) * 2011-10-18 2012-06-20 国网电力科学研究院 Mark-based method for safely filtering unstructured data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172773A1 (en) * 2005-02-01 2009-07-02 Newsilike Media Group, Inc. Syndicating Surgical Data In A Healthcare Environment
CN102075560A (en) * 2010-11-19 2011-05-25 福建富士通信息软件有限公司 Fukutomi enterprise search engine technology based on system coupling
CN102509057A (en) * 2011-10-18 2012-06-20 国网电力科学研究院 Mark-based method for safely filtering unstructured data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯亚丽等: "基于规则库的非结构化数据格式转换技术研究", 《云南师范大学学报》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038161A (en) * 2015-07-13 2017-08-11 阿里巴巴集团控股有限公司 A kind of device for filtering data and method
CN107038161B (en) * 2015-07-13 2021-03-26 阿里巴巴集团控股有限公司 Equipment and method for filtering data
CN105491023A (en) * 2015-11-24 2016-04-13 国网智能电网研究院 Data isolation exchange and security filtering method orienting electric power internet of things
CN108449201A (en) * 2018-02-05 2018-08-24 中国工程物理研究院计算机应用研究所 A kind of evaluation method of Intranet business data flow security management and control efficiency
CN108449201B (en) * 2018-02-05 2020-12-01 中国工程物理研究院计算机应用研究所 Evaluation method for safety management and control efficiency of intranet service data stream
CN110287174A (en) * 2019-05-09 2019-09-27 北京善义善美科技有限公司 A kind of data filtering engine and system and filter method
CN112087486A (en) * 2020-07-30 2020-12-15 山东浪潮通软信息科技有限公司 Data integration method, equipment and medium for Internet of things equipment
CN112087486B (en) * 2020-07-30 2022-07-12 山东浪潮通软信息科技有限公司 Data integration method, equipment and medium for Internet of things equipment
CN113114704A (en) * 2021-06-15 2021-07-13 杭州海康威视数字技术股份有限公司 Video structured data one-way transmission method and device based on equipment attribute selection

Also Published As

Publication number Publication date
CN103116620B (en) 2016-01-20

Similar Documents

Publication Publication Date Title
CN103116620B (en) Based on the unstructured data safety filtering method of strategy
Blanco et al. A systematic review and comparison of security ontologies
CN104391881B (en) A kind of daily record analytic method and system based on segmentation methods
CN102622443A (en) Customized screening system and method for microblog
CN104156352A (en) Method and system for handling Chinese event
CN104657903A (en) Compressive guarantee system for equipment based on IETM
CN108039943A (en) A kind of encryption searching method that can verify that
Almousa et al. Typing and compositionality for security protocols: A generalization to the geometric fragment
Fokkink et al. Divide and congruence: From decomposition of modal formulas to preservation of branching and η-bisimilarity
CN105045933A (en) Method for mapping between ship equipment maintenance and guarantee information relation data base mode and ship equipment maintenance and guarantee information body
Papanikolaou et al. A toolkit for automating compliance in cloud computing services
CN104318390A (en) Seal usage monitoring method based on file bar code
Arndt et al. Sustainability Reporting Using the eXtensible Business Reporting Language (XBRL).
CN102339552A (en) Instrument driven situation map collaborative plotting system and method
Zhang et al. Knowledge representation and reasoning of XML with ontology
CN112783836A (en) Information exchange method, device and computer storage medium
Nečaský et al. Linked open data for legislative domain-ontology and experimental data
Francesconi Supporting transnational judicial procedures between European member states: the e-Codex project
Keeney et al. Approaches to relating and integrating semantic data from heterogeneous sources
Kostochka Minors in‐Chromatic Graphs, II
CN107169139A (en) A kind of document file management system based on AR augmented realities, AR mobile intelligent terminals
US9904710B2 (en) System and method for validating and formatting IP right identifiers
CN206961121U (en) A kind of document file management system based on AR augmented realities, AR mobile intelligent terminals
Maidment et al. Accessing and sharing data using CUAHSI water data services
Havrilla Integration of Deep Computer Vision Foundation Models for Document Interpretation and Anonymisation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: CHINA ELECTRIC POWER RESEARCH INSTITUTE JIANGSU EL

Free format text: FORMER OWNER: STATE GRID CORPORATION OF CHINA

Effective date: 20150507

Owner name: STATE GRID CORPORATION OF CHINA

Free format text: FORMER OWNER: CHINA ELECTRIC POWER RESEARCH INSTITUTE

Effective date: 20150507

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 210003 NANJING, JIANGSU PROVINCE TO: 100031 XICHENG, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20150507

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant after: State Grid Corporation of China

Applicant after: China Electric Power Research Institute

Applicant after: Jiangsu Electric Power Company

Applicant after: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

Address before: Nan Shui Road Gulou District of Nanjing city of Jiangsu Province, No. 8 210003

Applicant before: China Electric Power Research Institute

Applicant before: State Grid Corporation of China

C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160421

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee after: State Grid Corporation of China

Patentee after: China Electric Power Research Institute

Patentee after: State Grid Smart Grid Institute

Patentee after: Jiangsu Electric Power Company

Patentee after: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee before: State Grid Corporation of China

Patentee before: China Electric Power Research Institute

Patentee before: Jiangsu Electric Power Company

Patentee before: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee after: State Grid Corporation of China

Patentee after: China Electric Power Research Institute

Patentee after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE

Patentee after: Jiangsu Electric Power Company

Patentee after: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee before: State Grid Corporation of China

Patentee before: China Electric Power Research Institute

Patentee before: State Grid Smart Grid Institute

Patentee before: Jiangsu Electric Power Company

Patentee before: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company