CN106603516A - Data checking method and system - Google Patents

Data checking method and system Download PDF

Info

Publication number
CN106603516A
CN106603516A CN201611097222.5A CN201611097222A CN106603516A CN 106603516 A CN106603516 A CN 106603516A CN 201611097222 A CN201611097222 A CN 201611097222A CN 106603516 A CN106603516 A CN 106603516A
Authority
CN
China
Prior art keywords
data
server
client
message
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611097222.5A
Other languages
Chinese (zh)
Other versions
CN106603516B (en
Inventor
安西民
吴方才
张卓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Space Star Technology (beijing) Co Ltd
Original Assignee
Space Star Technology (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Space Star Technology (beijing) Co Ltd filed Critical Space Star Technology (beijing) Co Ltd
Priority to CN201611097222.5A priority Critical patent/CN106603516B/en
Publication of CN106603516A publication Critical patent/CN106603516A/en
Application granted granted Critical
Publication of CN106603516B publication Critical patent/CN106603516B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Abstract

The invention relates to a data checking method and system. The system comprises one or more client ends, one or more data submission servers, a distributed data checking service platform, a dispatch server and one or more safety servers; the data checking method and system can provide safe data access; a stage type data storage mode, namely a data submission servers-distributed data checking platform-safety servers mode, is built while no original system is changed; local data is submitted and verified based on isolated access technologies; a user is allowed to define a data verification mode, and finally verification result data is returned to the user of a corresponding client end.

Description

A kind of data checking method and system
【Technical field】
The invention belongs to data processing field, more particularly to a kind of data checking method.
【Background technology】
A kind of common data detection be whether based on specific rule judgment data to be tested it is effective, for example:Visitor Family is input into ID card information, can judge whether the ID card information is effective, user input with identity-based card coding rule Gender information, it can be determined that whether the gender information belongs to enumeration type { man, female }, if the information of input is:" it ", then Such information is clearly that invalid, invalid data can not be used for further analysis, can not be used as further work Basis.
Data detection instrument of the prior art is all very simple, is generally locally passing through simple instrument or is voluntarily writing Being verified, using such verification method, all of data are all stored in locally program, if instrument is that many people are shared made With, everyone can easily get other people data, and these data are for validation verification instrument, and Without distinguishing, it is easily caused data cover, steals, there is very serious data safety sex chromosome mosaicism, it is existing based on above-mentioned problems Need a kind of new data checking method and system badly, using the teaching of the invention it is possible to provide Data Access Security, do not change any original system Under the premise of, to be deposited by the data of establishment stage formula, data submit server --- distributed data verifying bench --- safety to Server, based on isolation access technique to local data is submitted the mode of formula checking;User Defined data verification is allowed simultaneously Mode, the result data most checked at last returns to corresponding user.
【The content of the invention】
In order to solve the problems referred to above of the prior art, the present invention proposes a kind of data checking method and system, technology Scheme is as follows:
(1) client sends data detection and asks to dispatch server when needing to carry out data detection, and data detection please Size comprising data to be tested and signature, client identification in asking;
(2) dispatch server is after the data detection request that client sends is received, if distributed data verifying bench Data detection ability allow, then select for submit to data submit to server, and give client send agree to inspection message, together The data for carrying out data submission to be tested for client are carried in meaning inspection message submit server identification to;
(3) client extracts data and submits server identification to, based on this after agreement inspection message is received from message After the completion of data is activation to be tested is submitted to server, data to submit to by mark to corresponding data, client sends submission and completes Message is to dispatch server;
(4) dispatch server is received and submits completion message to, is appointed based on the data creation data detection task to be tested, distribution Business numbering, and the data detection task of the client is assigned in data detection node according to the size of data volume to be tested Performing check process;
(5) data to be tested required for data detection node submits to server to read from data, and process of testing;
(6) data detection node sends data after inspection task process is completed to one or more security server Storage request;
(7) security server, according to the storage capacity of itself, decides whether to send accurate after data storage request is received Give storage message;
(8) data detection node sends response message after permission storage message is received to the security server;
(9) security server sends response completion message after response message is received to data detection node;Data are examined Node is tested after response completion message is received, the secure data after the completion of process and corresponding mission number are sent to into the peace Full server;After the completion of storage, data detection node sends task completion message to dispatch server, and task is included in message Numbering and security server mark;
(10) secure data is associated and deposited by security server after secure data is received with its corresponding mission number Storage;
(11) dispatch server sends association messages to security server, in message after task completion message is received Carry pending data signature and client identification that the task is directed to;Execution step (14).
(14) security server signs the pending data and client identification, task identification and corresponding secure data Associated storage, and association completion message is sent to dispatch server;
(15) dispatch server sends task completion message to client, the mark of server safe to carry in message;
(16) client, according to the mark of security server, is sent out after task completion message is received to security server Data acquisition request is sent, data signature to be tested and client identification are carried in request;
(17) security server extracts secure data and is sent to client based on request.
Further, in step (11), dispatch server also judges, whether task passes through splits, if without fractionation, Dispatch server sends association messages to security server, and pending data signature and client that the task is directed to are carried in message End mark, execution step (14).
Further, if through fractionation, the corresponding all subtasks of a task all after the completion of, task scheduling server choosing Selecting a security server carries out data splicing, and sends data transfer instruction and process to each subtask to a task Security server, carry in data transfer instruction the selection for data splicing security server mark, data are spelled It is connected to the security server of the selection.
Further, data are spliced into the security server in the selection, specially:(12) security server is being received After data transfer instruction, the corresponding secure data in the subtask and its subtask mark are sent to into the security service of the selection Device, the security server of the selection carries out secure data spelling after secure data is received according to the order of its subtask mark Connect, and by mission number and splicing after the completion of secure data associated storage;The security server of the selection is sent out after the completion of splicing Splicing completion message is sent to dispatch server;
(13) dispatch server is received after splicing completion message, sends association messages to security server, is taken in message The pending data signature being directed to the task and client identification.
Further, data detection rule can be set in advance.
Further, preset rules are arranged by client.
Further, security server can delete the secure data after data validity interval is reached.
Further, data validity interval is predetermined time period.
Further, after client reading times reach pre-determined number, data validity interval is reached.
Further, client did not read the secure data, then secure data is always maintained at effectively.
Beneficial effects of the present invention include:Data Access Security can be provided, in the premise for not changing any original system Under, to be deposited by the data of establishment stage formula, data submit server --- distributed data verifying bench --- security service to Device, based on isolation access technique to local data is submitted the mode of formula checking;User Defined data verification mode is allowed simultaneously, The result data most verified at last returns to corresponding client user.
【Description of the drawings】
Accompanying drawing described herein be for providing a further understanding of the present invention, constituting the part of the application, but Inappropriate limitation of the present invention is not constituted, in the accompanying drawings:
Fig. 1 is a kind of structure chart of data detection system of the invention.
【Specific embodiment】
Describe the present invention in detail below in conjunction with accompanying drawing and specific embodiment, illustrative examples therein and say It is bright to be only used for explaining the present invention but not as a limitation of the invention.
It is a kind of data detection system applied of the invention referring to accompanying drawing 1, the system includes one or more clients End, one or more data submit server, distributed data inspection service platform, dispatch server, one or more peace to Full server;Client can by it is wired or wirelessly with dispatch server connect;Distributed data verifying bench In include multiple data detection nodes.
Based on said system, a kind of data checking method of the present invention is described in detail below.
(1) client sends data detection and asks to dispatch server when needing to carry out data detection, and data detection please Size comprising data to be tested and signature, client identification in asking;
Client identification can be the MAC Address of the IP address of the client or client device;Client identification can be with Distributed by dispatch server, when a new client adds system, dispatch server distributes one only for the client One mark;
(2) dispatch server is after the data detection request that client sends is received, if distributed data verifying bench Data detection ability allow, then select for submit to data submit to server, and give client send agree to inspection message, together The data for carrying out data submission to be tested for client are carried in meaning inspection message submit server identification to;
Dispatch server is received after data detection request, therefrom extracts the size and client identification of data to be tested, The data detection rule that the client user is arranged is searched from local storage based on the client identification, based on data to be tested Size judge whether the storage capacity of distributed data verifying bench allows, based on the regular and to be tested data of data detection Size judges whether the computing capability of distributed data verifying bench allows;Because the amount of calculation that different inspection rules brings is Different, therefore need to consider inspection rule when computing capability is considered;
Preferably:Judge whether the storage capacity of distributed data verifying bench allows based on the size of data to be tested, Specially:Judge whether that residual memory space submits server to more than the data of the size of data to be tested, if it does, Then storage capacity is allowed, and is not otherwise allowed;
Preferably:Judge whether computing capability allows based on the inspection item number being related in inspection rule;
Preferably:Judge whether computing capability allows based on the computation complexity of the check algorithm being related in inspection rule;
Preferably:With the increase of the size of the increase and data to be tested of inspection rule complexity, required calculating Ability is consequently increased;
The data that selection is submitted to submit server to, specially:Check that each data submits the remaining space of server to Size, selects remaining space size and the immediate top n data of size of data to be tested to submit server to as data to be selected Submit server to, submit to from N number of data and select in server the minimum data of communication overhead and client between to submit service to Device submits server to as selected data;Wherein N can be selected rule of thumb;
(3) client extracts data and submits server identification to, based on this after agreement inspection message is received from message After the completion of data is activation to be tested is submitted to server, data to submit to by mark to corresponding data, client sends submission and completes Message is to dispatch server;
Multiple client can be parallel make data submission, data submit to process and the data processing can be with executed in parallel, greatly Execution efficiency is improve greatly, meanwhile, data are submitted to and data inspection area is separated, form data isolation region, it is ensured that number According to security;
(4) dispatch server is received and submits completion message to, is appointed based on the data creation data detection task to be tested, distribution Business numbering, and the data detection task of the client is assigned in data detection node according to the size of data volume to be tested Performing check process;
If data volume to be tested is more than the disposal ability of any one data detection node in distributed data verifying bench, Then the data detection task is split based on default fractionation strategy, multiple subtasks, distribution subtask are formed after fractionation Numbering, and the plurality of subtask is assigned in one or more data detection node is processed;Specifically:Obtain all The free memory size C1~Cmax of data detection node, wherein, max is the total amount of data detection node;If task T Data volume to be tested more than any one data detection node in distributed data verifying bench free memory size, then Data to be tested are split as into Part I and Part II, the wherein size of Part I is equal to the maximum in C1~Cmax × P (presses actual value, all of data are assigned to into Part I) during not enough maximum × P, to be tested based on the Part I Data genaration subtask T1, and subtask T1 is assigned on the corresponding data detection node of the maximum, by the data inspection The free memory size real-time update for testing node is 0, if the Part II data volume after splitting not is 0, continues pin Part II is split and task distribution, till the Part II quantity is 0;One or more son is obtained after fractionation Task;
Wherein P is a percent value less than or equal to 1, because through the data of inspection, its size can change, is needed Will in advance in view of the change of this quantity;P can be arranged based on experience value;
Strategy is split it is also possible that obtaining the average of the free memory size of all data detection nodes, will be to be checked Test data and be split as the average size;
The data detection task of the client is assigned in data detection node according to the size of data volume to be tested Performing check process, specially:Dispatch server checks the free memory size of each data detection node, selects available depositing Space size and the immediate front M data detection node of size of data to be tested are stored up as data detection node to be selected, from the M The most strong data detection node of computing capability is selected in individual data detection node as selected data detection node;Wherein M Can rule of thumb select;Preferably, the minimum data detection node of communication overhead is selected;
Preferably:Dispatch server distributes unique mission number for each data detection task;
Preferably:The data detection node that the data detection rule that computing capability and client are arranged can be selected most to match As selected data detection node;
Preferably:The inspection node for selecting spatial cache maximum for the high client of priority is examined as selected data Test node;For the low client of priority the minimum inspection node of spatial cache is selected as selected data detection node;
Preferably, the data detection task of the client is assigned to into data detection section according to the size of data volume to be tested Test in point process, specially:Data detection task is assigned in the maximum data detection node of free memory;
(5) data to be tested required for data detection node submits to server to read from data, and process of testing; Specially:Data detection node obtains the data detection rule of the task that client is specified from dispatch server, carries from data Data to be tested required for handing over server to read, by data storage to be tested in local storage space, and based on the inspection Rule carries out data detection;
(6) data detection node is after the process for completing inspection task/subtask, to one or more security server Send data storage request;
Data detection node selects one or more safety clothes after having inspected based on security server selection strategy Business device sends data storage request;Selection strategy can be:One/mono- group most-often used security server of selection is selected All of security server is sent request by way of broadcast or selects one/mono- group minimum security service of communication overhead Device sends request;
(7) security server, according to the storage capacity of itself, decides whether to send accurate after data storage request is received Storage message is given, if storage ability is allowed, is sent to the data detection node and is granted storage request, if it is not allowed, then Not respond;Wherein, the mark that the security server is carried in storage request is granted;
(8) data detection node sends response message after permission storage message is received to the security server;If Multiple permission storage message are received, then therefrom selects a security server;
A security server is selected, specially:Select the minimum security server of communication overhead or Response to selection most fast Security server;
(9) security server sends response completion message after response message is received to data detection node;Data are examined Node is tested after response completion message is received, the secure data after the completion of process and corresponding task/subtask numbering are sent out It is sent to the security server;After the completion of storage, data detection node sends task completion message to dispatch server, in message Identify comprising mission number and security server;
(10) security server compiles the secure data and its corresponding task/subtask after secure data is received Number associated storage;
Different task and its secure data may be deposited in same security server, security server is to these secure datas It is managed;
Preferably:The corresponding secure data of same task is stored in continuous memory space;
(11) whether dispatch server judges the task through splitting after task completion message is received, if without Fractionation is crossed, dispatch server sends association messages to security server, the pending data label that the task is directed to are carried in message Name and client identification, redirect execution step (14);If through fractionation, the corresponding all subtasks of a task all after the completion of, Task scheduling server selects a security server to carry out data splicing, and sends data transfer instruction to each to a task The security server that processed of subtask, the security service for data splicing of the selection is carried in data transfer instruction Device is identified, and continues step (12);
Whether task is judged through splitting, specially:Task based access control numbering judges whether the task is subtask, if not It is, then not through splitting, if it is, through splitting;Or, being judged by the allocation table preserved in local storage; Dispatch server needs real-time update to change allocation table in the task of carrying out distribution or task when splitting;
A security server is selected to be specially:Select the maximum security server of free memory, from storage this The security server that the most subtask secure datas of storage are selected in the security server of all subtask secure datas of business is made For transfer service device (now, data transfer amount minimum transfer efficiency highest), (private server is special to select private security device Door is used to shift secure data);
(12) security server appoints the corresponding secure data in the subtask and its son after data transfer instruction is received Business mark is sent to the security server of the selection, and the security server of the selection is sub according to it after secure data is received The order of task identification carries out secure data splicing, and by the secure data associated storage after the completion of mission number and splicing;Spell The security server of the selection after the completion of connecing sends splicing completion message to dispatch server;
(13) dispatch server is received after splicing completion message, sends association messages to security server, is taken in message The pending data signature being directed to the task and client identification;
(14) security server signs the pending data and client identification, task identification and corresponding secure data Associated storage, and association completion message is sent to dispatch server;
Security server is managed to secure data, and the safe number from different inspection nodes is deposited in security server According to depositing in different depositing based on pending data signature and client identification, the task identification secure datas different to these Storage space;
(15) dispatch server sends task completion message to client, the mark of server safe to carry in message;
For user, in this case it is not apparent which security server is required data are stored on, do not know specific yet Storage location, the security server is sightless for client, is also to have access to, and is only being got After mark, one security server of the identification access can be just based on, therefore security server memory space is next for client Say it is isolation, the security of client data ensure that by isolation;
(16) client, according to the mark of security server, is sent out after task completion message is received to security server Data acquisition request is sent, data signature to be tested and client identification are carried in request;
User can not get all data on the server, Zhi Nengji after security server mark is got The corresponding secure data of data to be tested that the client is submitted to is obtained in signature;The data signature is that client is submitting to be checked to Test what is submitted to while data, in whole data handling procedure, only dispatch server and the client understand that client is needed Simultaneously required data, the authentication dual equivalent to can just be got based on the signature and client identification;
After task completion message is got, the mark and signing messages required for extracting can be wanted user with office what is the need for Request is retransmited when secure data, security server plays a part of data management and preserves;
Security server can delete the secure data after data validity interval is reached;
(17) security server extracts secure data and is sent to client based on request;
The secure data that security server is obtained and data signature to be tested and client identification are matched is sent to client End, when any information is unmatched, sends failed authentication message to client;
A kind of data checking method and system of the present invention, using the teaching of the invention it is possible to provide Data Access Security, it is any original not changing On the premise of system, deposited by the data of establishment stage formula, data submit server to --- distributed data inspection is flat Platform --- security server, based on isolation access technique to local data is submitted the mode of formula checking;User is allowed to make by oneself simultaneously Adopted data verification mode, the result data most verified at last returns to corresponding user.
The above is only the better embodiment of the present invention, therefore all constructions according to described in present patent application scope, Equivalence changes or modification that feature and principle are done, are included in the range of present patent application.

Claims (10)

1. a kind of data checking method, it is characterised in that the method comprises the steps:
(1) client sends data detection and asks to dispatch server, in data detection request when needing to carry out data detection Size comprising data to be tested and signature, client identification;
(2) dispatch server is after the data detection request that client sends is received, if the number of distributed data verifying bench Allow according to detectability, then selection submits server to for the data of submission, and sends agreement inspection message, agreement inspection to client Test in message and carry the data submission server identification that data submission to be tested is carried out for client;
(3) client extracts data and submits server identification to, based on the mark after agreement inspection message is received from message After the completion of submitting to server, data to submit to corresponding data data is activation to be tested, client sends submits completion message to To dispatch server;
(4) dispatch server is received and submits completion message to, is compiled based on the data creation data detection task to be tested, distribution task Number, and the data detection task of the client is assigned in data detection node according to the size of data volume to be tested is examined Test process;
(5) data to be tested required for data detection node submits to server to read from data, and process of testing;
(6) data detection node sends data storage after inspection task process is completed to one or more security server Request;
(7) security server, according to the storage capacity of itself, decides whether that sending permission deposits after data storage request is received Put message;
(8) data detection node sends response message after permission storage message is received to the security server;
(9) security server sends response completion message after response message is received to data detection node;Data detection section Secure data after the completion of process and corresponding mission number are sent to the safety clothes by point after response completion message is received Business device;After the completion of storage, data detection node sends task completion message to dispatch server, and mission number is included in message With security server mark;
(10) security server is after secure data is received, by the secure data and its corresponding mission number associated storage;
(11) dispatch server sends association messages to security server after task completion message is received, and carries in message Pending data signature and client identification that the task is directed to;Execution step (14);
(14) security server associates the pending data signature with corresponding secure data with client identification, task identification Storage, and association completion message is sent to dispatch server;
(15) dispatch server sends task completion message to client, the mark of server safe to carry in message;
(16) client, according to the mark of security server, to security server number is sent after task completion message is received According to request is obtained, data signature to be tested and client identification are carried in request;
(17) security server extracts secure data and is sent to client based on request.
2. data checking method according to claim 1, it is characterised in that in step (11), dispatch server also judges, Whether through splitting, if without fractionation, dispatch server sends association messages to security server to task, carries in message Pending data signature and client identification that the task is directed to, redirect execution step (14).
3. data checking method according to claim 2, it is characterised in that if through splitting, the corresponding institute of a task After the completion of having subtask all, task scheduling server selects a security server to carry out data splicing, and sends data transfer and refer to The security server processed to each subtask to a task is made, being used for for the selection is carried in data transfer instruction Data are spliced the security server in the selection by the security server mark of data splicing.
4. data checking method according to claim 3, it is characterised in that data are spliced into the security service in the selection Device, specially:
(12) security server marks the corresponding secure data in the subtask and its subtask after data transfer instruction is received Knowledge is sent to the security server of the selection, the security server of the selection after secure data is received, according to its subtask The order of mark carries out secure data splicing, and by the secure data associated storage after the completion of mission number and splicing;Splice The security server of the selection into after sends splicing completion message to dispatch server;
(13) dispatch server is received after splicing completion message, sends association messages to security server, and carrying in message should Pending data signature and client identification that task is directed to.
5. data checking method according to claim 1, it is characterised in that data detection rule can be to preset 's.
6. data checking method according to claim 5, it is characterised in that preset rules are arranged by client.
7. data checking method according to claim 1, it is characterised in that security server can be arrived in data validity interval Up to rear deletion secure data.
8. data checking method according to claim 7, it is characterised in that data validity interval is predetermined time period.
9. data checking method according to claim 7, it is characterised in that reach pre-determined number in client reading times Afterwards, data validity interval is reached.
10. data checking method according to claim 7, it is characterised in that client did not read the secure data, then Secure data is always maintained at effectively.
CN201611097222.5A 2016-12-02 2016-12-02 Data inspection method and system Active CN106603516B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611097222.5A CN106603516B (en) 2016-12-02 2016-12-02 Data inspection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611097222.5A CN106603516B (en) 2016-12-02 2016-12-02 Data inspection method and system

Publications (2)

Publication Number Publication Date
CN106603516A true CN106603516A (en) 2017-04-26
CN106603516B CN106603516B (en) 2021-04-30

Family

ID=58596999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611097222.5A Active CN106603516B (en) 2016-12-02 2016-12-02 Data inspection method and system

Country Status (1)

Country Link
CN (1) CN106603516B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771537A (en) * 2008-12-26 2010-07-07 中国移动通信集团公司 Processing method and certificating method for distribution type certificating system and certificates of certification thereof
US20130198226A1 (en) * 2012-01-31 2013-08-01 Cleversafe, Inc. Retrieving data utilizing a distributed index
US20130297606A1 (en) * 2012-05-07 2013-11-07 Ken C. Tola Systems and methods for detecting, identifying and categorizing intermediate nodes
CN103455633A (en) * 2013-09-24 2013-12-18 浪潮齐鲁软件产业有限公司 Method of distributed analysis for massive network detailed invoice data
CN103581279A (en) * 2012-08-10 2014-02-12 百度在线网络技术(北京)有限公司 Access system, method and device for third-party developer
CN104468628A (en) * 2014-12-29 2015-03-25 芜湖乐锐思信息咨询有限公司 Product cooperation development system based on file encryption algorithm

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771537A (en) * 2008-12-26 2010-07-07 中国移动通信集团公司 Processing method and certificating method for distribution type certificating system and certificates of certification thereof
US20130198226A1 (en) * 2012-01-31 2013-08-01 Cleversafe, Inc. Retrieving data utilizing a distributed index
US20130297606A1 (en) * 2012-05-07 2013-11-07 Ken C. Tola Systems and methods for detecting, identifying and categorizing intermediate nodes
CN103581279A (en) * 2012-08-10 2014-02-12 百度在线网络技术(北京)有限公司 Access system, method and device for third-party developer
CN103455633A (en) * 2013-09-24 2013-12-18 浪潮齐鲁软件产业有限公司 Method of distributed analysis for massive network detailed invoice data
CN104468628A (en) * 2014-12-29 2015-03-25 芜湖乐锐思信息咨询有限公司 Product cooperation development system based on file encryption algorithm

Also Published As

Publication number Publication date
CN106603516B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN108282527B (en) Generate the distributed system and method for Service Instance
CN105915650B (en) Load-balancing method and device
CN106888106A (en) The extensive detecting system of IT assets in intelligent grid
CN113014566B (en) Malicious registration detection method and device, computer readable medium and electronic device
CN106844730A (en) The display methods and device of file content
CN112035638B (en) Information processing method, device, storage medium and equipment
US11244153B2 (en) Method and apparatus for processing information
CN108023881A (en) Login method, device, medium and the electronic equipment of application program
CN106203103A (en) The method for detecting virus of file and device
CN108846292A (en) Desensitization process method and device
CN108156194A (en) A kind of form data processing method
CN106603516A (en) Data checking method and system
CN107341645A (en) Demand of human resources information processing method, device, computer equipment and storage medium
CN109213924B (en) Popularization task allocation method and device and computer equipment
CN103729369B (en) The method and device of automatically processing coexisting orders
CN108156188A (en) A kind of data validation system
CN114422147B (en) Multi-party safety calculation method based on block chain
US20210012001A1 (en) Storage medium, information processing method, and information processing apparatus
CN110276403B (en) Model building method and device
CN114003784A (en) Request recording method, device, equipment and storage medium
CN106127451A (en) Collaborative work handling device, system and method
KR102446504B1 (en) Online rorschach test system and operation method thereof
JP7071462B2 (en) Evaluation point correction device and evaluation point correction program
Scanlon Identifying the impact of friends on their peers academic performance
CN117390455B (en) Data processing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 101399 No. 2 East Airport Road, Shunyi Airport Economic Core Area, Beijing (1st, 5th and 7th floors of Industrial Park 1A-4)

Applicant after: Zhongke Star Map Co., Ltd.

Address before: 101399 Building 1A-4, National Geographic Information Technology Industrial Park, Guomen Business District, Shunyi District, Beijing

Applicant before: Space Star Technology (Beijing) Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant