CN103116620B - Based on the unstructured data safety filtering method of strategy - Google Patents

Based on the unstructured data safety filtering method of strategy Download PDF

Info

Publication number
CN103116620B
CN103116620B CN201310034326.1A CN201310034326A CN103116620B CN 103116620 B CN103116620 B CN 103116620B CN 201310034326 A CN201310034326 A CN 201310034326A CN 103116620 B CN103116620 B CN 103116620B
Authority
CN
China
Prior art keywords
value
exp
policing rule
document
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310034326.1A
Other languages
Chinese (zh)
Other versions
CN103116620A (en
Inventor
汪晨
林为民
张涛
邓松
马缓缓
时坚
李伟伟
周诚
管小娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
State Grid Jiangsu Electric Power Co Ltd
Global Energy Interconnection Research Institute
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
State Grid Jiangsu Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI, State Grid Jiangsu Electric Power Co Ltd, Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201310034326.1A priority Critical patent/CN103116620B/en
Publication of CN103116620A publication Critical patent/CN103116620A/en
Application granted granted Critical
Publication of CN103116620B publication Critical patent/CN103116620B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of unstructured data safety filtering method based on strategy, the technology combined by Technology and Administration carries out a kind of method of safety filtering to unstructured data, technically, by the policing rule expression formula specification policing rule of flexible design; In management, by the demand analysis to operation system, managerial personnel and business personnel's Joint Designing go out suitable policing rule, the operating personnel of unstructured data transmission are data interpolation attribute flags information, during filtration, the parameter that policing rule expression formula and label information mate as policing rule is mated, by matching result, safety filtering is carried out to unstructured data.

Description

Based on the unstructured data safety filtering method of strategy
Technical field
The invention belongs to information security field, be specifically related to a kind of unstructured data safety filtering method based on strategy.
Background technology
Day by day perfect along with IT application to our society, a lot of large enterprise, government affairs department have realized office operation information and digitizing, but in order to safety during owing to initially building, network is divided into Inside and outside network, causes not connected information island.In order to can better services user popular, enterprise or government affairs department start limited by interconnected to internal network and internet, and what bring is exactly the safety problem that data are transmitted thereupon.
Data in the network information mainly contain structuring and destructuring two kinds of data modes, and structural data is often stored in database with the form of bivariate table, because data are easy to extract, filter also relatively easy in reciprocal process; And there is no unstructured data in fixed form as Word, PDF, image, video etc., their data layout is different, and data content is difficult to extract, how fine the network switching equipment is filters them, and that unifies even carries out a major challenge that safe filter analysis is current filter equipment.
The patent application of the unstructured data safety filtering method that number of patent application is CN201110316665.X, name is called based on mark provides a kind of unstructured data safety filtering method, although can filter unstructured data, but policing rule is fairly simple, strategy matching filtration can not be carried out to the mark value of unstructured data in a flexible way.
Summary of the invention
For overcoming above-mentioned defect, the invention provides a kind of unstructured data safety filtering method based on strategy, at the policy expression of service end by configure band variable, layout strategy matching algorithm, client be unstructured data add mark value, when the unstructured data of client tape label value is to service end, according to policy expression, in mode very flexibly, strategy matching filtration is carried out to the mark value of unstructured data by strategy matching algorithm.
For achieving the above object, the invention provides a kind of unstructured data safety filtering method based on strategy, carry out data filtering when service end and client carry out data transmission, its improvements are, described method comprises the steps:
(1). layout strategy regular expression;
(2). in conjunction with attribute and the business demand of unstructured data, according to policing rule expression formula design specific strategy rule;
(3). according to policing rule and unstructured data attribute, by unstructured data attribute with the form record of label information, and transmit together with unstructured data;
(4). parses policy rule, is configured to tree data structure to carry out strategy matching calculating by the policing rule of character string forms;
(5). resolve label information, and be stored in Hash table;
(6). using the parameter that policy rules data structure is mated as policing rule with the label information in Hash table, calculate matching result, the match is successful, allows data to pass through, otherwise do not allow data to pass through, and log.
In optimal technical scheme provided by the invention, in described step 1, policing rule is the text string expression formula be stored in policy configuration file; Policing rule is made up of self-defining expression formula; Policing rule expression formula is designed, to filter unstructured data according to business demand and unstructured data document properties by service end.
In second optimal technical scheme provided by the invention, expression formula comprises: variable, value and operational character; The value of variable, in strategy matching process, is extracted from data markers information.
In 3rd optimal technical scheme provided by the invention, in described step 3, label information is made marks to document by the conditional information of client according to the attribute of document data, business demand and mutual agreement; Document markup is the list that a key-value pair is answered; Wherein, key is the variable on policy expression, is worth the value for variable.
In 4th optimal technical scheme provided by the invention, the mark of document is comprised: the size of document, type and filename.
In 5th optimal technical scheme provided by the invention, in described step 4, policing rule is resolved to the data structure being suitable for strategy matching, calculate to facilitate strategy matching; During parses policy rule, lexical analysis and grammatical analysis are carried out to the policing rule of text, if policing rule is correct, generate tree-shaped policy data structure, otherwise the process that reports an error.
In 6th optimal technical scheme provided by the invention, described step 5 comprises the steps: (5-1). from document D, extract document markup L;
(5-2). build Hash table H and preserve label information;
(5-3). obtain label information item by item, and information is filled in H in the mode of key-value pair <key, value>.
In 7th optimal technical scheme provided by the invention, described step 6 comprises the steps:
(6-1). build the queue Queue of a first in first out;
(6-2). from root, travel through tree-shaped structure expression Exp;
(6-3). judge the element in queue, as being 1, returning the end value that Exp calculates, otherwise returning mistake.
In 8th optimal technical scheme provided by the invention, described step 6-2 comprises the steps:
A. if left subtree is not empty, the left subtree of traverse tree;
B. if right subtree is not empty, the right subtree of traverse tree;
C. if Exp is value value, Exp is entered Queue;
D. if Exp is variable var, from the Hash table H being stored in mark, extract variate-value by Get function and build new Exp, new Exp is entered in Queue;
E. if Exp is operational character operator, judge the operand number N of operational character, and get N number of operand from QQueue, calculation expression, result of calculation is stored in new Exp in the mode of value value, and then is entered in Queue by new Exp.
In 9th optimal technical scheme provided by the invention, Get function is Get (key, H)-> value;
Get function, by key, from Hash table H, returns corresponding value, now using the key of variable var as H.
Compared with the prior art, a kind of unstructured data safety filtering method based on strategy provided by the invention, the problem of safe transmission unstructured data between the network that object is to solve different level of security; Because Current Content filtering technique does not have good mode in the safety problem solving destructuring transmission, and pass through collocation strategy regular expression based on the technology of strategy, design efficient strategy matching algorithm, and do attribute flags for transmitting the document exchanged, when by gateway server (interface between heterogeneous networks), according to policing rule expression formula, the mode of strategy matching algorithm is adopted to mate document markup attribute, thus safety filtering is carried out to document, to guarantee the safety problem of unstructured data in transmitting procedure.
Accompanying drawing explanation
Fig. 1 is the assembly schematic diagram that method comprises.
Fig. 2 is the schematic flow sheet of the unstructured data safety filtering method based on strategy.
Fig. 3 is tree construction schematic diagram.
Embodiment
As shown in Figure 2, a kind of unstructured data safety filtering method based on strategy, carries out data filtering when service end and client carry out data transmission, comprises the steps:
(1). layout strategy regular expression;
(2). in conjunction with attribute and the business demand of unstructured data, according to policing rule expression formula design specific strategy rule;
(3). according to policing rule and unstructured data attribute, by unstructured data attribute with the form record of label information, and transmit together with unstructured data;
(4). parses policy rule, is configured to tree data structure to carry out strategy matching calculating by the policing rule of character string forms;
(5). resolve label information, and be stored in Hash table;
(6). using the parameter that policy rules data structure is mated as policing rule with the label information in Hash table, calculate matching result, the match is successful, allows data to pass through, otherwise do not allow data to pass through, and log.
In described step 1, policing rule is the text string expression formula be stored in policy configuration file; Policing rule is made up of self-defining expression formula; Policing rule expression formula is designed, to filter unstructured data according to business demand and unstructured data document properties by service end.
Expression formula comprises: variable, value and operational character; The value of variable, in strategy matching process, is extracted from data markers information.
In described step 3, label information is made marks to document by the conditional information of client according to the attribute of document data, business demand and mutual agreement; Document markup is the list that a key-value pair is answered; Wherein, key is the variable on policy expression, is worth the value for variable.
The mark of document is comprised: the size of document, type and filename.
In described step 4, policing rule is resolved to the data structure being suitable for strategy matching, calculate to facilitate strategy matching; During parses policy rule, lexical analysis and grammatical analysis are carried out to the policing rule of text, if policing rule is correct, generate tree-shaped policy data structure, otherwise the process that reports an error.
Described step 5 comprises the steps: (5-1). from document D, extract document markup L;
(5-2). build Hash table H and preserve label information;
(5-3). obtain label information item by item, and information is filled in H in the mode of key-value pair <key, value>.
Described step 6 comprises the steps:
(6-1). build the queue Queue of a first in first out;
(6-2). from root, travel through tree-shaped structure expression Exp;
(6-3). judge the element in queue, as being 1, returning the end value that Exp calculates, otherwise returning mistake.
Described step 6-2 comprises the steps:
A. if left subtree is not empty, the left subtree of traverse tree;
B. if right subtree is not empty, the right subtree of traverse tree;
C. if Exp is value value, Exp is entered Queue;
D. if Exp is variable var, from the Hash table H being stored in mark, extract variate-value by Get function and build new Exp, new Exp is entered in Queue;
E. if Exp is operational character operator, judge the operand number N of operational character, and get N number of operand from Queue, calculation expression, result of calculation is stored in new Exp in the mode of value value, and then is entered in Queue by new Exp.
Get function is Get (key, H)-> value; Get function, by key, from Hash table H, returns corresponding value, now using the key of variable var as H.
By following examples, the unstructured data safety filtering method based on strategy is further explained.
Fig. 1 gives the unstructured data safety filtering method reference architecture figure based on strategy, and it mainly comprises three parts: policy rule information, data markers information and matching algorithm.Policy rule information comprises policing rule Sum fanction and resolves two parts.Policing rule is expression formula text string, deposits in policy configuration file, and it is the foundation of filtering; Rule parsing is the expression-form (data structure) being applicable to coupling by regular text resolution.Label information is client is the attribute description that document is made, and include the relevant information of document, user's operation information etc., different documents has different label informations.Matching algorithm, according to the label information of client transmissions data, carries out calculating coupling according to policing rule expression formula, the foundation of filtering using matching result as document.By in service end design and collocation strategy rule and be that document adds attribute description in client, carry out matching strategy result according to the relation between data attribute and policing rule expression formula, in this, as filtering voucher.Policing rule is designed to the mathematic(al) representation form being with variable, calculates very easy.In addition, due to the dirigibility of policing rule, the extendability of this filter method is very powerful.
Provide concrete introduction below:
Policing rule: policing rule is the text string expression formula be stored in policy configuration file.Policing rule is made up of one or more self-defining expression formula.Expression formula is by variable, and value and operational character are formed.The value of variable, in strategy matching process, is extracted from data markers information.Because policing rule uses expression formula, so the design of policing rule is very flexible.When realizing, concrete suitable policing rule expression formula is designed, to filter unstructured data according to business demand and unstructured data document properties by service end keeper or business personnel.
Parses policy rule: after policing rule configures, in order to better carry out matching primitives to policing rule, needing policing rule to be resolved to the data structure being suitable for strategy matching, calculating to facilitate strategy matching.During parses policy rule, need to carry out lexical analysis and grammatical analysis to the policing rule of text string.If policing rule is correct, by generation strategy data structure, otherwise will report an error process.
Label information: label information makes marks (as the size of document, type, filename etc.) according to the conditional information of the attribute of document data, business demand and mutual agreement to document by client (send data one end).Document markup is that it is the list of a key-value pair, and wherein, key is the variable on policy expression, is worth the value for variable flexibly with variable.
Coupling: after having had rules data structure and label information, matching algorithm, using rules data structure and label information as parameter, by traversal and calculative strategy regular expression, carrys out filter document; In matching primitives, the variable in expression formula is to replace the value of dependent variable in label information.Relative to policing rule and label information, matching algorithm is independently, and it is not subject to the impact of two parts above.
1, policing rule expression formula design
Unstructured data safety filtering method core missions based on strategy are exactly design the policing rule adapting to filtercondition.This patent proposes a kind of syntax gauge P of policing rule, on the basis of this specification, can design various policing rule flexibly.The specification P of policing rule is described as: P, by variable, is worth, and operational character three kinds of fundamental elements are formed, and working rule has,
Rule one: value value and variable var are expression formula exp
Rule two: expression formula forms new expression formula by monocular operational character opu
Rule three: the expression formula that expression formula and expression formula form the final form of new expression formula by binocular operational character opb forms strategy.In the foregoing description, variable is by letter, and numeral and underscore form, and initial is not numeral; Value is by integer number (mathematical integer), and floating type number (mathematical real number) and character string form; Operational character by relational operator (>, >=, <, <=,==, unequal to), logical operator (& &, ||,! ) and substring (substr: left operand is the substring of right operand) operation formation.
Policing rule specification P is formal to be described below:
When collocation strategy rule, designer is according to policing rule specification, in conjunction with business demand and user operation, select suitable variable, and the value that variable meets, by operational character, the relation between variable and value is formed a policing rule, and be stored in policing rule file with the form of brief note string.Design procedure is as follows:
A. according to policing rule specification P;
B. according to the attribute information of document, in conjunction with business demand information, word is required to convert policing rule to
Expression formula exp
As: by Doctype, do inceptive filtering.Business demand only receives PDF document, then can design variable doc_type, and use==operational character, then policy expression is
doc_type==“PDF”
This expression formula is when document is called PDF, and operating result is true, allows to pass through, otherwise, do not allow to pass through.For another example: suppose that document security level has 1,2,3,4,5 five grades, and numeral is larger, higher grade, and certain business demand is that document security level is when being greater than 3, document does not allow transmission, then can design variable doc_security_grade, operational character be > and! , policy expression is
!(doc_security_grade>3)
Be expressed as document security level when being greater than 3, it is false for returning results, and does not allow transmission, otherwise, allow transmission.
2, label information
Unstructured data safety filtering method based on strategy to make marks information to document in client (document transmission end).Mark not only includes the encryption of document, digital digest, mandate, and the information that all documents such as the owner all can exist, also includes the value information of the variable in service end policing rule.The information Step that makes marks is:
A. label L is built
B. obtain the attribute information A of document, add label L (A) to
C. obtain user operation attribute information O, add label L (O) to
D. mark is added D (L) in data file data
3, policing rule is resolved
In method flow 1, the policing rule designed exists with character string forms, and in order to carry out the matching operation of strategy, needs the strategy of character string forms to represent with the data structure of applicable matched rule.
In order to can be good at carrying out strategy matching, following data structure is used to preserve policy expression.
Exp can preserve a value expression (using data territory); Exp can preserve the expression formula of a band operational character, and now have operational character to be stored in operator, lchild preserves left operand, and rchild preserves right operand.By the recurrence of multiple Exp, Exp finally can preserve a complete strategy.
The object that policing rule is resolved is exactly resolve to the policing rule exp of character string forms with the strategy of Exp structure, so that carry out strategy matching.Policy resolution rule is as follows:
A. recurrence exp is handled as follows:
B-1., when exp is for value value or variable var, construct an Exp, be stored in by value in the data territory in Exp, other territories are empty;
B-2. when exp is op uduring exp, construct an Exp, by op uto the operator territory in Exp, by op uexp is below to the rchild of Exp, and other territories are empty;
B-3. when exp is expop bduring exp, construct an Exp, by op bto the operator territory in Exp, by oP bexp below to the rchild of Exp, by oP bexp is above to the lchild of Exp, and other territories are empty;
B. return the root of the tree data structure constructed by Exp, be a complete policy data structure.
4, label information extracts
After service end obtains document data, document data is resolved, to obtain label information, and label information is converted to the data structure being suitable for matching primitives.Step is as follows:
A. from document D, document markup L is extracted;
B. build Hash table (HashMap) H and preserve label information;
C. obtain label information item by item, and information is filled in H in the mode of key-value pair <key, value>.
5, policing rule coupling
Due to policing rule after parsing, be stored in tree in expression formula mode, when strategy matching, by postorder traversal tree, and traversal time calculation expression, finally can obtain an end value.End value can be used for judging whether to allow document to pass through.Strategy matching step is as follows:
A. the queue Queue of a first in first out is built;
B. postorder traversal tree expression formula Exp from root
B1. if left subtree (lchild of Exp) is not empty, the left subtree of traverse tree;
B2. if right subtree (rchild of Exp) is not empty, the right subtree of traverse tree;
B3. if Exp is value value (data is not empty), Exp is entered Queue;
B4. if Exp is variable var (data is not for empty), from Hash table (HashMap) H being stored in mark, extract variate-value by Get function and build new Exp, new Exp is entered in Queue.
Get function is
Get(key,H)->value
Get function, by key, from Hash table H, returns corresponding value, now using the key of variable var as H.
B5. the operator as Exp is not empty, and namely expression formula is operational character, and judge the operand number N of operational character, and get N number of operand from Queue, calculation expression, result of calculation is stored in new Exp, and then is entered in Queue by new Exp
Judging the element in queue, as being 1, return the end value that Exp calculates, otherwise expression is wrong, returns mistake.
For convenience of description, our hypothesis has following application example:
Certain enterprise has the high internal network of internal security rank and the low external network of level of security, and external network and internet are connected, and in order to business demand and the better services client of enterprises, internal network need be connected with extranets.Connecting the gateway of internal network and external network, arrange the unstructured data security filter based on strategy, internal and external customer's transferring documents end is added to document and marks the instrument of informational function.Document before being transmitted, the strategy good according to as offered adds label information to document policies variable, when through intranet and extranet junction, namely during filtering server, server can extract label information, carries out matching primitives to strategy, once strategy matching is not passed through, will to document carry out will not by process, otherwise, allow to pass through.Be delivered to the low external network of level of security from the internal network that level of security is high by unstructured data document assuming that application scenarios is user, its specific embodiment is:
One, policing rule:
Policing rule is set by the keeper of server according to business demand, and requires that the variate-value of client when transferring documents in filling Strategy is to play the effect of filtration.Here suppose that service needed is as follows:
1. document source is the IP of Intranet operation system is 192.168.216.5
2. can not include " scheme " in document name
3. document security level can not more than 3 (assuming that level of confidentiality is 1,2,3,4,5 five grades, higher grade, and level of security is higher)
Then according to policing rule specification, use variable src to represent document source, name represents document name, and sec_grade represents file level of confidentiality, then policing rule is as follows,
(src=" 192.168.216.5 ") & & (! (" scheme " substrname)) & & (sec_grade <=3)
Two, label information:
In the client of document transmission, in negotiations process, client is known to be needed to do document source to document, the marking operation of document name and document security level, suppose there is a client, transmits three parts of documents:
The mark value of document 1 is as follows:
{ src:192.168.216.6, name: " design proposal ", sec_grade=4}
The mark value of document 2 is as follows:
{ src:192.168.216.5, name: " design proposal ", sec_grade=4}
The mark value of document 3 is as follows:
{ src:192.168.216.5, name: " operation system operation instructions ", sec_grade=1}
Three, mate:
1. need to resolve policing rule before coupling, convert the policing rule of character string forms to tree, then the policing rule in " " will become following tree construction, as shown in Figure 3.
2., then according to postorder traversal tree, and when running into variable, from label information, going the value extracting variable, carry out matched indicia information, with this, document is filtered.
The effect of postorder traversal tree is exactly the value first calculating left subtree, and then calculates the value of right subtree, left subtree, and right subtree has all calculated, then calculates upper strata subtree left subtree, right subtree, until tree root.
So according to postorder traversal rule, have for document 1
2.1 matching primitives
src=192.168.216.5
Src value due to marker extraction is 192.168.216.6, so calculated value is false.
2.2 matching primitives
" scheme " substrname
Due to marker extraction filename value be " design proposal ", so rreturn value is true.
2.3 matching primitives
! (" scheme " substrname)
False result has been obtained, so this step result is true in 2.2.
2.4 matching primitives
sec_grade>=3
Because sec_grade is 4, so return false.
2.5 matching primitives
(! (" scheme " substrname) & & (sec_grade >=3))
Can be obtained by 2.3 and 2.4 results, this result is false.
2.6 matching primitives
(src=192.168.216.5) & & (! (" scheme " substrname) & & (sec_grade >=3))
From the result of calculation of 2.1 and 2.4, final matching results is false, so this document will be filtered, does not namely allow to pass through.
According to step above, carry out matching primitives to document 2 and document 3, be false by the result obtaining document 2, and the result of document 3 is true, namely document 3 allows to pass through, and document 2 does not allow to pass through.
It is to be understood that content of the present invention and embodiment are intended to the practical application proving technical scheme provided by the present invention, should not be construed as limiting the scope of the present invention.Those skilled in the art inspired by the spirit and principles of the present invention, can do various amendment, equivalent replacement or improve.But these changes or amendment are all in the protection domain that application is awaited the reply.

Claims (10)

1., based on a unstructured data safety filtering method for strategy, carry out data filtering when service end and client carry out data transmission, it is characterized in that, described method comprises the steps:
(1). layout strategy regular expression;
(2). in conjunction with attribute and the business demand of unstructured data, according to policing rule expression formula design specific strategy rule;
(3). according to policing rule and unstructured data attribute, by unstructured data attribute with the form record of label information, and transmit together with unstructured data;
(4). parses policy rule, is configured to tree data structure to carry out strategy matching calculating by the policing rule of character string forms;
(5). resolve label information, and be stored in Hash table;
(6). using the parameter that policy rules data structure is mated as policing rule with the label information in Hash table, calculate matching result, the match is successful, allows data to pass through, otherwise do not allow data to pass through, and log.
2. method according to claim 1, is characterized in that, in described step 1, policing rule is the text string expression formula be stored in policy configuration file; Policing rule is made up of self-defining expression formula; Policing rule expression formula is designed, to filter unstructured data according to business demand and unstructured data document properties by service end.
3. method according to claim 2, is characterized in that, expression formula comprises: variable, value and operational character; The value of variable, in strategy matching process, is extracted from data markers information.
4. method according to claim 1, is characterized in that, in described step 3, label information is made marks to document by the conditional information of client according to the attribute of document data, business demand and mutual agreement; Document markup is the list that a key-value pair is answered; Wherein, key is the variable on policy expression, is worth the value for variable.
5. method according to claim 4, is characterized in that, comprises the mark of document: the size of document, type and filename.
6. method according to claim 1, is characterized in that, in described step 4, policing rule is resolved to the data structure being suitable for strategy matching, calculates to facilitate strategy matching; During parses policy rule, lexical analysis and grammatical analysis are carried out to the policing rule of text, if policing rule is correct, generate tree-shaped policy data structure, otherwise the process that reports an error.
7. method according to claim 1, is characterized in that, described step 5 comprises the steps:
(5 ?1). from document D, extract document markup L;
(5 ?2). build Hash table H and preserve label information;
(5 ?3). obtain label information item by item, and information is filled in H in the mode of key-value pair <key, value>.
8. method according to claim 1, is characterized in that, described step 6 comprises the steps:
(6 ?1). build the queue Queue of a first in first out;
(6 ?2). from root, travel through tree-shaped structure expression Exp;
(6 ?3). judge the element in queue, as being 1, returning the end value that Exp calculates, otherwise returning mistake.
9. method according to claim 8, is characterized in that, described step 6 ?2 to comprise the steps:
A. if left subtree is not empty, the left subtree of traverse tree;
B. if right subtree is not empty, the right subtree of traverse tree;
C. if Exp is value value, Exp is entered Queue;
D. if Exp is variable var, from the Hash table H being stored in mark, extract variate-value by Get function and build new Exp, new Exp is entered in Queue;
E. if Exp is operational character operator, judge the operand number N of operational character, and get N number of operand from Queue, calculation expression, result of calculation is stored in new Exp in the mode of value value, and then is entered in Queue by new Exp.
10. method according to claim 9, is characterized in that, Get function be Get (key, H) ?>value;
Get function, by key, from Hash table H, returns corresponding value, now using the key of variable var as H.
CN201310034326.1A 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy Active CN103116620B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310034326.1A CN103116620B (en) 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310034326.1A CN103116620B (en) 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy

Publications (2)

Publication Number Publication Date
CN103116620A CN103116620A (en) 2013-05-22
CN103116620B true CN103116620B (en) 2016-01-20

Family

ID=48414993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310034326.1A Active CN103116620B (en) 2013-01-29 2013-01-29 Based on the unstructured data safety filtering method of strategy

Country Status (1)

Country Link
CN (1) CN103116620B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038161B (en) * 2015-07-13 2021-03-26 阿里巴巴集团控股有限公司 Equipment and method for filtering data
CN105491023B (en) * 2015-11-24 2020-10-27 国网智能电网研究院 Data isolation exchange and safety filtering method for power Internet of things
CN108449201B (en) * 2018-02-05 2020-12-01 中国工程物理研究院计算机应用研究所 Evaluation method for safety management and control efficiency of intranet service data stream
CN110287174A (en) * 2019-05-09 2019-09-27 北京善义善美科技有限公司 A kind of data filtering engine and system and filter method
CN112087486B (en) * 2020-07-30 2022-07-12 山东浪潮通软信息科技有限公司 Data integration method, equipment and medium for Internet of things equipment
CN113114704B (en) * 2021-06-15 2021-09-21 杭州海康威视数字技术股份有限公司 Video structured data one-way transmission method and device based on equipment attribute selection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075560A (en) * 2010-11-19 2011-05-25 福建富士通信息软件有限公司 Fukutomi enterprise search engine technology based on system coupling
CN102509057A (en) * 2011-10-18 2012-06-20 国网电力科学研究院 Mark-based method for safely filtering unstructured data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8200775B2 (en) * 2005-02-01 2012-06-12 Newsilike Media Group, Inc Enhanced syndication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075560A (en) * 2010-11-19 2011-05-25 福建富士通信息软件有限公司 Fukutomi enterprise search engine technology based on system coupling
CN102509057A (en) * 2011-10-18 2012-06-20 国网电力科学研究院 Mark-based method for safely filtering unstructured data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于规则库的非结构化数据格式转换技术研究;冯亚丽等;《云南师范大学学报》;20120331;第58-61页 *

Also Published As

Publication number Publication date
CN103116620A (en) 2013-05-22

Similar Documents

Publication Publication Date Title
CN103116620B (en) Based on the unstructured data safety filtering method of strategy
Blanco et al. A systematic review and comparison of security ontologies
US7584422B2 (en) System and method for data format transformation
CN103238308B (en) The method and system of propagating source identification information
CN105049420A (en) Security protocol formal verification method using expanded UML model as framework
CN101512505B (en) Security language translations with logic resolution
CN106446232A (en) Sensitive texts filtering method based on rules
CN104657903A (en) Compressive guarantee system for equipment based on IETM
Asgarli et al. Semantic ontologies for cyber threat sharing standards
CN102622443A (en) Customized screening system and method for microblog
CN103473224A (en) Problem semantization method based on problem solving process
Almousa et al. Typing and compositionality for security protocols: A generalization to the geometric fragment
CN105045933A (en) Method for mapping between ship equipment maintenance and guarantee information relation data base mode and ship equipment maintenance and guarantee information body
CN109933786A (en) The construction method of transponder message tool based on compiling rule
Arndt et al. Sustainability Reporting Using the eXtensible Business Reporting Language (XBRL).
Khare et al. Patterns and practices for CIM applications
JP7333933B2 (en) TRANSLATION DEVICE, CONTROL PROGRAM FOR TRANSLATION DEVICE, AND TRANSLATION METHOD USING TRANSLATION DEVICE
Nečaský et al. Linked open data for legislative domain-ontology and experimental data
CN112783836A (en) Information exchange method, device and computer storage medium
Francesconi Supporting Transnational Judicial Procedures between European Member States: the e-Codex Project.
Kostochka Minors in‐Chromatic Graphs, II
Keeney et al. Approaches to relating and integrating semantic data from heterogeneous sources
Shimizu et al. An Ontology Design Pattern for Microblog Entries.
JP7396608B2 (en) Translation device, translation device control program, and translation method using the translation device
Bill et al. On Synergies between Model Transformations and Semantic Web Technologies.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: CHINA ELECTRIC POWER RESEARCH INSTITUTE JIANGSU EL

Free format text: FORMER OWNER: STATE GRID CORPORATION OF CHINA

Effective date: 20150507

Owner name: STATE GRID CORPORATION OF CHINA

Free format text: FORMER OWNER: CHINA ELECTRIC POWER RESEARCH INSTITUTE

Effective date: 20150507

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 210003 NANJING, JIANGSU PROVINCE TO: 100031 XICHENG, BEIJING

TA01 Transfer of patent application right

Effective date of registration: 20150507

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Applicant after: State Grid Corporation of China

Applicant after: China Electric Power Research Institute

Applicant after: Jiangsu Electric Power Company

Applicant after: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

Address before: Nan Shui Road Gulou District of Nanjing city of Jiangsu Province, No. 8 210003

Applicant before: China Electric Power Research Institute

Applicant before: State Grid Corporation of China

C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160421

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee after: State Grid Corporation of China

Patentee after: China Electric Power Research Institute

Patentee after: State Grid Smart Grid Institute

Patentee after: Jiangsu Electric Power Company

Patentee after: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee before: State Grid Corporation of China

Patentee before: China Electric Power Research Institute

Patentee before: Jiangsu Electric Power Company

Patentee before: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee after: State Grid Corporation of China

Patentee after: China Electric Power Research Institute

Patentee after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE

Patentee after: Jiangsu Electric Power Company

Patentee after: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Patentee before: State Grid Corporation of China

Patentee before: China Electric Power Research Institute

Patentee before: State Grid Smart Grid Institute

Patentee before: Jiangsu Electric Power Company

Patentee before: Information & Telecommunication Branch of State Grid Jiangsu Electric Power Company