CN106603516A - Data checking method and system - Google Patents
Data checking method and system Download PDFInfo
- Publication number
- CN106603516A CN106603516A CN201611097222.5A CN201611097222A CN106603516A CN 106603516 A CN106603516 A CN 106603516A CN 201611097222 A CN201611097222 A CN 201611097222A CN 106603516 A CN106603516 A CN 106603516A
- Authority
- CN
- China
- Prior art keywords
- data
- server
- client
- message
- task
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Abstract
The invention relates to a data checking method and system. The system comprises one or more client ends, one or more data submission servers, a distributed data checking service platform, a dispatch server and one or more safety servers; the data checking method and system can provide safe data access; a stage type data storage mode, namely a data submission servers-distributed data checking platform-safety servers mode, is built while no original system is changed; local data is submitted and verified based on isolated access technologies; a user is allowed to define a data verification mode, and finally verification result data is returned to the user of a corresponding client end.
Description
【Technical field】
The invention belongs to data processing field, more particularly to a kind of data checking method.
【Background technology】
A kind of common data detection be whether based on specific rule judgment data to be tested it is effective, for example:Visitor
Family is input into ID card information, can judge whether the ID card information is effective, user input with identity-based card coding rule
Gender information, it can be determined that whether the gender information belongs to enumeration type { man, female }, if the information of input is:" it ", then
Such information is clearly that invalid, invalid data can not be used for further analysis, can not be used as further work
Basis.
Data detection instrument of the prior art is all very simple, is generally locally passing through simple instrument or is voluntarily writing
Being verified, using such verification method, all of data are all stored in locally program, if instrument is that many people are shared made
With, everyone can easily get other people data, and these data are for validation verification instrument, and
Without distinguishing, it is easily caused data cover, steals, there is very serious data safety sex chromosome mosaicism, it is existing based on above-mentioned problems
Need a kind of new data checking method and system badly, using the teaching of the invention it is possible to provide Data Access Security, do not change any original system
Under the premise of, to be deposited by the data of establishment stage formula, data submit server --- distributed data verifying bench --- safety to
Server, based on isolation access technique to local data is submitted the mode of formula checking;User Defined data verification is allowed simultaneously
Mode, the result data most checked at last returns to corresponding user.
【The content of the invention】
In order to solve the problems referred to above of the prior art, the present invention proposes a kind of data checking method and system, technology
Scheme is as follows:
(1) client sends data detection and asks to dispatch server when needing to carry out data detection, and data detection please
Size comprising data to be tested and signature, client identification in asking;
(2) dispatch server is after the data detection request that client sends is received, if distributed data verifying bench
Data detection ability allow, then select for submit to data submit to server, and give client send agree to inspection message, together
The data for carrying out data submission to be tested for client are carried in meaning inspection message submit server identification to;
(3) client extracts data and submits server identification to, based on this after agreement inspection message is received from message
After the completion of data is activation to be tested is submitted to server, data to submit to by mark to corresponding data, client sends submission and completes
Message is to dispatch server;
(4) dispatch server is received and submits completion message to, is appointed based on the data creation data detection task to be tested, distribution
Business numbering, and the data detection task of the client is assigned in data detection node according to the size of data volume to be tested
Performing check process;
(5) data to be tested required for data detection node submits to server to read from data, and process of testing;
(6) data detection node sends data after inspection task process is completed to one or more security server
Storage request;
(7) security server, according to the storage capacity of itself, decides whether to send accurate after data storage request is received
Give storage message;
(8) data detection node sends response message after permission storage message is received to the security server;
(9) security server sends response completion message after response message is received to data detection node;Data are examined
Node is tested after response completion message is received, the secure data after the completion of process and corresponding mission number are sent to into the peace
Full server;After the completion of storage, data detection node sends task completion message to dispatch server, and task is included in message
Numbering and security server mark;
(10) secure data is associated and deposited by security server after secure data is received with its corresponding mission number
Storage;
(11) dispatch server sends association messages to security server, in message after task completion message is received
Carry pending data signature and client identification that the task is directed to;Execution step (14).
(14) security server signs the pending data and client identification, task identification and corresponding secure data
Associated storage, and association completion message is sent to dispatch server;
(15) dispatch server sends task completion message to client, the mark of server safe to carry in message;
(16) client, according to the mark of security server, is sent out after task completion message is received to security server
Data acquisition request is sent, data signature to be tested and client identification are carried in request;
(17) security server extracts secure data and is sent to client based on request.
Further, in step (11), dispatch server also judges, whether task passes through splits, if without fractionation,
Dispatch server sends association messages to security server, and pending data signature and client that the task is directed to are carried in message
End mark, execution step (14).
Further, if through fractionation, the corresponding all subtasks of a task all after the completion of, task scheduling server choosing
Selecting a security server carries out data splicing, and sends data transfer instruction and process to each subtask to a task
Security server, carry in data transfer instruction the selection for data splicing security server mark, data are spelled
It is connected to the security server of the selection.
Further, data are spliced into the security server in the selection, specially:(12) security server is being received
After data transfer instruction, the corresponding secure data in the subtask and its subtask mark are sent to into the security service of the selection
Device, the security server of the selection carries out secure data spelling after secure data is received according to the order of its subtask mark
Connect, and by mission number and splicing after the completion of secure data associated storage;The security server of the selection is sent out after the completion of splicing
Splicing completion message is sent to dispatch server;
(13) dispatch server is received after splicing completion message, sends association messages to security server, is taken in message
The pending data signature being directed to the task and client identification.
Further, data detection rule can be set in advance.
Further, preset rules are arranged by client.
Further, security server can delete the secure data after data validity interval is reached.
Further, data validity interval is predetermined time period.
Further, after client reading times reach pre-determined number, data validity interval is reached.
Further, client did not read the secure data, then secure data is always maintained at effectively.
Beneficial effects of the present invention include:Data Access Security can be provided, in the premise for not changing any original system
Under, to be deposited by the data of establishment stage formula, data submit server --- distributed data verifying bench --- security service to
Device, based on isolation access technique to local data is submitted the mode of formula checking;User Defined data verification mode is allowed simultaneously,
The result data most verified at last returns to corresponding client user.
【Description of the drawings】
Accompanying drawing described herein be for providing a further understanding of the present invention, constituting the part of the application, but
Inappropriate limitation of the present invention is not constituted, in the accompanying drawings:
Fig. 1 is a kind of structure chart of data detection system of the invention.
【Specific embodiment】
Describe the present invention in detail below in conjunction with accompanying drawing and specific embodiment, illustrative examples therein and say
It is bright to be only used for explaining the present invention but not as a limitation of the invention.
It is a kind of data detection system applied of the invention referring to accompanying drawing 1, the system includes one or more clients
End, one or more data submit server, distributed data inspection service platform, dispatch server, one or more peace to
Full server;Client can by it is wired or wirelessly with dispatch server connect;Distributed data verifying bench
In include multiple data detection nodes.
Based on said system, a kind of data checking method of the present invention is described in detail below.
(1) client sends data detection and asks to dispatch server when needing to carry out data detection, and data detection please
Size comprising data to be tested and signature, client identification in asking;
Client identification can be the MAC Address of the IP address of the client or client device;Client identification can be with
Distributed by dispatch server, when a new client adds system, dispatch server distributes one only for the client
One mark;
(2) dispatch server is after the data detection request that client sends is received, if distributed data verifying bench
Data detection ability allow, then select for submit to data submit to server, and give client send agree to inspection message, together
The data for carrying out data submission to be tested for client are carried in meaning inspection message submit server identification to;
Dispatch server is received after data detection request, therefrom extracts the size and client identification of data to be tested,
The data detection rule that the client user is arranged is searched from local storage based on the client identification, based on data to be tested
Size judge whether the storage capacity of distributed data verifying bench allows, based on the regular and to be tested data of data detection
Size judges whether the computing capability of distributed data verifying bench allows;Because the amount of calculation that different inspection rules brings is
Different, therefore need to consider inspection rule when computing capability is considered;
Preferably:Judge whether the storage capacity of distributed data verifying bench allows based on the size of data to be tested,
Specially:Judge whether that residual memory space submits server to more than the data of the size of data to be tested, if it does,
Then storage capacity is allowed, and is not otherwise allowed;
Preferably:Judge whether computing capability allows based on the inspection item number being related in inspection rule;
Preferably:Judge whether computing capability allows based on the computation complexity of the check algorithm being related in inspection rule;
Preferably:With the increase of the size of the increase and data to be tested of inspection rule complexity, required calculating
Ability is consequently increased;
The data that selection is submitted to submit server to, specially:Check that each data submits the remaining space of server to
Size, selects remaining space size and the immediate top n data of size of data to be tested to submit server to as data to be selected
Submit server to, submit to from N number of data and select in server the minimum data of communication overhead and client between to submit service to
Device submits server to as selected data;Wherein N can be selected rule of thumb;
(3) client extracts data and submits server identification to, based on this after agreement inspection message is received from message
After the completion of data is activation to be tested is submitted to server, data to submit to by mark to corresponding data, client sends submission and completes
Message is to dispatch server;
Multiple client can be parallel make data submission, data submit to process and the data processing can be with executed in parallel, greatly
Execution efficiency is improve greatly, meanwhile, data are submitted to and data inspection area is separated, form data isolation region, it is ensured that number
According to security;
(4) dispatch server is received and submits completion message to, is appointed based on the data creation data detection task to be tested, distribution
Business numbering, and the data detection task of the client is assigned in data detection node according to the size of data volume to be tested
Performing check process;
If data volume to be tested is more than the disposal ability of any one data detection node in distributed data verifying bench,
Then the data detection task is split based on default fractionation strategy, multiple subtasks, distribution subtask are formed after fractionation
Numbering, and the plurality of subtask is assigned in one or more data detection node is processed;Specifically:Obtain all
The free memory size C1~Cmax of data detection node, wherein, max is the total amount of data detection node;If task T
Data volume to be tested more than any one data detection node in distributed data verifying bench free memory size, then
Data to be tested are split as into Part I and Part II, the wherein size of Part I is equal to the maximum in C1~Cmax
× P (presses actual value, all of data are assigned to into Part I) during not enough maximum × P, to be tested based on the Part I
Data genaration subtask T1, and subtask T1 is assigned on the corresponding data detection node of the maximum, by the data inspection
The free memory size real-time update for testing node is 0, if the Part II data volume after splitting not is 0, continues pin
Part II is split and task distribution, till the Part II quantity is 0;One or more son is obtained after fractionation
Task;
Wherein P is a percent value less than or equal to 1, because through the data of inspection, its size can change, is needed
Will in advance in view of the change of this quantity;P can be arranged based on experience value;
Strategy is split it is also possible that obtaining the average of the free memory size of all data detection nodes, will be to be checked
Test data and be split as the average size;
The data detection task of the client is assigned in data detection node according to the size of data volume to be tested
Performing check process, specially:Dispatch server checks the free memory size of each data detection node, selects available depositing
Space size and the immediate front M data detection node of size of data to be tested are stored up as data detection node to be selected, from the M
The most strong data detection node of computing capability is selected in individual data detection node as selected data detection node;Wherein M
Can rule of thumb select;Preferably, the minimum data detection node of communication overhead is selected;
Preferably:Dispatch server distributes unique mission number for each data detection task;
Preferably:The data detection node that the data detection rule that computing capability and client are arranged can be selected most to match
As selected data detection node;
Preferably:The inspection node for selecting spatial cache maximum for the high client of priority is examined as selected data
Test node;For the low client of priority the minimum inspection node of spatial cache is selected as selected data detection node;
Preferably, the data detection task of the client is assigned to into data detection section according to the size of data volume to be tested
Test in point process, specially:Data detection task is assigned in the maximum data detection node of free memory;
(5) data to be tested required for data detection node submits to server to read from data, and process of testing;
Specially:Data detection node obtains the data detection rule of the task that client is specified from dispatch server, carries from data
Data to be tested required for handing over server to read, by data storage to be tested in local storage space, and based on the inspection
Rule carries out data detection;
(6) data detection node is after the process for completing inspection task/subtask, to one or more security server
Send data storage request;
Data detection node selects one or more safety clothes after having inspected based on security server selection strategy
Business device sends data storage request;Selection strategy can be:One/mono- group most-often used security server of selection is selected
All of security server is sent request by way of broadcast or selects one/mono- group minimum security service of communication overhead
Device sends request;
(7) security server, according to the storage capacity of itself, decides whether to send accurate after data storage request is received
Storage message is given, if storage ability is allowed, is sent to the data detection node and is granted storage request, if it is not allowed, then
Not respond;Wherein, the mark that the security server is carried in storage request is granted;
(8) data detection node sends response message after permission storage message is received to the security server;If
Multiple permission storage message are received, then therefrom selects a security server;
A security server is selected, specially:Select the minimum security server of communication overhead or Response to selection most fast
Security server;
(9) security server sends response completion message after response message is received to data detection node;Data are examined
Node is tested after response completion message is received, the secure data after the completion of process and corresponding task/subtask numbering are sent out
It is sent to the security server;After the completion of storage, data detection node sends task completion message to dispatch server, in message
Identify comprising mission number and security server;
(10) security server compiles the secure data and its corresponding task/subtask after secure data is received
Number associated storage;
Different task and its secure data may be deposited in same security server, security server is to these secure datas
It is managed;
Preferably:The corresponding secure data of same task is stored in continuous memory space;
(11) whether dispatch server judges the task through splitting after task completion message is received, if without
Fractionation is crossed, dispatch server sends association messages to security server, the pending data label that the task is directed to are carried in message
Name and client identification, redirect execution step (14);If through fractionation, the corresponding all subtasks of a task all after the completion of,
Task scheduling server selects a security server to carry out data splicing, and sends data transfer instruction to each to a task
The security server that processed of subtask, the security service for data splicing of the selection is carried in data transfer instruction
Device is identified, and continues step (12);
Whether task is judged through splitting, specially:Task based access control numbering judges whether the task is subtask, if not
It is, then not through splitting, if it is, through splitting;Or, being judged by the allocation table preserved in local storage;
Dispatch server needs real-time update to change allocation table in the task of carrying out distribution or task when splitting;
A security server is selected to be specially:Select the maximum security server of free memory, from storage this
The security server that the most subtask secure datas of storage are selected in the security server of all subtask secure datas of business is made
For transfer service device (now, data transfer amount minimum transfer efficiency highest), (private server is special to select private security device
Door is used to shift secure data);
(12) security server appoints the corresponding secure data in the subtask and its son after data transfer instruction is received
Business mark is sent to the security server of the selection, and the security server of the selection is sub according to it after secure data is received
The order of task identification carries out secure data splicing, and by the secure data associated storage after the completion of mission number and splicing;Spell
The security server of the selection after the completion of connecing sends splicing completion message to dispatch server;
(13) dispatch server is received after splicing completion message, sends association messages to security server, is taken in message
The pending data signature being directed to the task and client identification;
(14) security server signs the pending data and client identification, task identification and corresponding secure data
Associated storage, and association completion message is sent to dispatch server;
Security server is managed to secure data, and the safe number from different inspection nodes is deposited in security server
According to depositing in different depositing based on pending data signature and client identification, the task identification secure datas different to these
Storage space;
(15) dispatch server sends task completion message to client, the mark of server safe to carry in message;
For user, in this case it is not apparent which security server is required data are stored on, do not know specific yet
Storage location, the security server is sightless for client, is also to have access to, and is only being got
After mark, one security server of the identification access can be just based on, therefore security server memory space is next for client
Say it is isolation, the security of client data ensure that by isolation;
(16) client, according to the mark of security server, is sent out after task completion message is received to security server
Data acquisition request is sent, data signature to be tested and client identification are carried in request;
User can not get all data on the server, Zhi Nengji after security server mark is got
The corresponding secure data of data to be tested that the client is submitted to is obtained in signature;The data signature is that client is submitting to be checked to
Test what is submitted to while data, in whole data handling procedure, only dispatch server and the client understand that client is needed
Simultaneously required data, the authentication dual equivalent to can just be got based on the signature and client identification;
After task completion message is got, the mark and signing messages required for extracting can be wanted user with office what is the need for
Request is retransmited when secure data, security server plays a part of data management and preserves;
Security server can delete the secure data after data validity interval is reached;
(17) security server extracts secure data and is sent to client based on request;
The secure data that security server is obtained and data signature to be tested and client identification are matched is sent to client
End, when any information is unmatched, sends failed authentication message to client;
A kind of data checking method and system of the present invention, using the teaching of the invention it is possible to provide Data Access Security, it is any original not changing
On the premise of system, deposited by the data of establishment stage formula, data submit server to --- distributed data inspection is flat
Platform --- security server, based on isolation access technique to local data is submitted the mode of formula checking;User is allowed to make by oneself simultaneously
Adopted data verification mode, the result data most verified at last returns to corresponding user.
The above is only the better embodiment of the present invention, therefore all constructions according to described in present patent application scope,
Equivalence changes or modification that feature and principle are done, are included in the range of present patent application.
Claims (10)
1. a kind of data checking method, it is characterised in that the method comprises the steps:
(1) client sends data detection and asks to dispatch server, in data detection request when needing to carry out data detection
Size comprising data to be tested and signature, client identification;
(2) dispatch server is after the data detection request that client sends is received, if the number of distributed data verifying bench
Allow according to detectability, then selection submits server to for the data of submission, and sends agreement inspection message, agreement inspection to client
Test in message and carry the data submission server identification that data submission to be tested is carried out for client;
(3) client extracts data and submits server identification to, based on the mark after agreement inspection message is received from message
After the completion of submitting to server, data to submit to corresponding data data is activation to be tested, client sends submits completion message to
To dispatch server;
(4) dispatch server is received and submits completion message to, is compiled based on the data creation data detection task to be tested, distribution task
Number, and the data detection task of the client is assigned in data detection node according to the size of data volume to be tested is examined
Test process;
(5) data to be tested required for data detection node submits to server to read from data, and process of testing;
(6) data detection node sends data storage after inspection task process is completed to one or more security server
Request;
(7) security server, according to the storage capacity of itself, decides whether that sending permission deposits after data storage request is received
Put message;
(8) data detection node sends response message after permission storage message is received to the security server;
(9) security server sends response completion message after response message is received to data detection node;Data detection section
Secure data after the completion of process and corresponding mission number are sent to the safety clothes by point after response completion message is received
Business device;After the completion of storage, data detection node sends task completion message to dispatch server, and mission number is included in message
With security server mark;
(10) security server is after secure data is received, by the secure data and its corresponding mission number associated storage;
(11) dispatch server sends association messages to security server after task completion message is received, and carries in message
Pending data signature and client identification that the task is directed to;Execution step (14);
(14) security server associates the pending data signature with corresponding secure data with client identification, task identification
Storage, and association completion message is sent to dispatch server;
(15) dispatch server sends task completion message to client, the mark of server safe to carry in message;
(16) client, according to the mark of security server, to security server number is sent after task completion message is received
According to request is obtained, data signature to be tested and client identification are carried in request;
(17) security server extracts secure data and is sent to client based on request.
2. data checking method according to claim 1, it is characterised in that in step (11), dispatch server also judges,
Whether through splitting, if without fractionation, dispatch server sends association messages to security server to task, carries in message
Pending data signature and client identification that the task is directed to, redirect execution step (14).
3. data checking method according to claim 2, it is characterised in that if through splitting, the corresponding institute of a task
After the completion of having subtask all, task scheduling server selects a security server to carry out data splicing, and sends data transfer and refer to
The security server processed to each subtask to a task is made, being used for for the selection is carried in data transfer instruction
Data are spliced the security server in the selection by the security server mark of data splicing.
4. data checking method according to claim 3, it is characterised in that data are spliced into the security service in the selection
Device, specially:
(12) security server marks the corresponding secure data in the subtask and its subtask after data transfer instruction is received
Knowledge is sent to the security server of the selection, the security server of the selection after secure data is received, according to its subtask
The order of mark carries out secure data splicing, and by the secure data associated storage after the completion of mission number and splicing;Splice
The security server of the selection into after sends splicing completion message to dispatch server;
(13) dispatch server is received after splicing completion message, sends association messages to security server, and carrying in message should
Pending data signature and client identification that task is directed to.
5. data checking method according to claim 1, it is characterised in that data detection rule can be to preset
's.
6. data checking method according to claim 5, it is characterised in that preset rules are arranged by client.
7. data checking method according to claim 1, it is characterised in that security server can be arrived in data validity interval
Up to rear deletion secure data.
8. data checking method according to claim 7, it is characterised in that data validity interval is predetermined time period.
9. data checking method according to claim 7, it is characterised in that reach pre-determined number in client reading times
Afterwards, data validity interval is reached.
10. data checking method according to claim 7, it is characterised in that client did not read the secure data, then
Secure data is always maintained at effectively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611097222.5A CN106603516B (en) | 2016-12-02 | 2016-12-02 | Data inspection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611097222.5A CN106603516B (en) | 2016-12-02 | 2016-12-02 | Data inspection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106603516A true CN106603516A (en) | 2017-04-26 |
CN106603516B CN106603516B (en) | 2021-04-30 |
Family
ID=58596999
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611097222.5A Active CN106603516B (en) | 2016-12-02 | 2016-12-02 | Data inspection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106603516B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771537A (en) * | 2008-12-26 | 2010-07-07 | 中国移动通信集团公司 | Processing method and certificating method for distribution type certificating system and certificates of certification thereof |
US20130198226A1 (en) * | 2012-01-31 | 2013-08-01 | Cleversafe, Inc. | Retrieving data utilizing a distributed index |
US20130297606A1 (en) * | 2012-05-07 | 2013-11-07 | Ken C. Tola | Systems and methods for detecting, identifying and categorizing intermediate nodes |
CN103455633A (en) * | 2013-09-24 | 2013-12-18 | 浪潮齐鲁软件产业有限公司 | Method of distributed analysis for massive network detailed invoice data |
CN103581279A (en) * | 2012-08-10 | 2014-02-12 | 百度在线网络技术(北京)有限公司 | Access system, method and device for third-party developer |
CN104468628A (en) * | 2014-12-29 | 2015-03-25 | 芜湖乐锐思信息咨询有限公司 | Product cooperation development system based on file encryption algorithm |
-
2016
- 2016-12-02 CN CN201611097222.5A patent/CN106603516B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771537A (en) * | 2008-12-26 | 2010-07-07 | 中国移动通信集团公司 | Processing method and certificating method for distribution type certificating system and certificates of certification thereof |
US20130198226A1 (en) * | 2012-01-31 | 2013-08-01 | Cleversafe, Inc. | Retrieving data utilizing a distributed index |
US20130297606A1 (en) * | 2012-05-07 | 2013-11-07 | Ken C. Tola | Systems and methods for detecting, identifying and categorizing intermediate nodes |
CN103581279A (en) * | 2012-08-10 | 2014-02-12 | 百度在线网络技术(北京)有限公司 | Access system, method and device for third-party developer |
CN103455633A (en) * | 2013-09-24 | 2013-12-18 | 浪潮齐鲁软件产业有限公司 | Method of distributed analysis for massive network detailed invoice data |
CN104468628A (en) * | 2014-12-29 | 2015-03-25 | 芜湖乐锐思信息咨询有限公司 | Product cooperation development system based on file encryption algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN106603516B (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108282527B (en) | Generate the distributed system and method for Service Instance | |
CN105915650B (en) | Load-balancing method and device | |
CN106888106A (en) | The extensive detecting system of IT assets in intelligent grid | |
CN113014566B (en) | Malicious registration detection method and device, computer readable medium and electronic device | |
CN106844730A (en) | The display methods and device of file content | |
CN112035638B (en) | Information processing method, device, storage medium and equipment | |
US11244153B2 (en) | Method and apparatus for processing information | |
CN108023881A (en) | Login method, device, medium and the electronic equipment of application program | |
CN106203103A (en) | The method for detecting virus of file and device | |
CN108846292A (en) | Desensitization process method and device | |
CN108156194A (en) | A kind of form data processing method | |
CN106603516A (en) | Data checking method and system | |
CN107341645A (en) | Demand of human resources information processing method, device, computer equipment and storage medium | |
CN109213924B (en) | Popularization task allocation method and device and computer equipment | |
CN103729369B (en) | The method and device of automatically processing coexisting orders | |
CN108156188A (en) | A kind of data validation system | |
CN114422147B (en) | Multi-party safety calculation method based on block chain | |
US20210012001A1 (en) | Storage medium, information processing method, and information processing apparatus | |
CN110276403B (en) | Model building method and device | |
CN114003784A (en) | Request recording method, device, equipment and storage medium | |
CN106127451A (en) | Collaborative work handling device, system and method | |
KR102446504B1 (en) | Online rorschach test system and operation method thereof | |
JP7071462B2 (en) | Evaluation point correction device and evaluation point correction program | |
Scanlon | Identifying the impact of friends on their peers academic performance | |
CN117390455B (en) | Data processing method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 101399 No. 2 East Airport Road, Shunyi Airport Economic Core Area, Beijing (1st, 5th and 7th floors of Industrial Park 1A-4) Applicant after: Zhongke Star Map Co., Ltd. Address before: 101399 Building 1A-4, National Geographic Information Technology Industrial Park, Guomen Business District, Shunyi District, Beijing Applicant before: Space Star Technology (Beijing) Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |