CN110008704A - A kind of electronic information intelligent memory system for industrial management - Google Patents

A kind of electronic information intelligent memory system for industrial management Download PDF

Info

Publication number
CN110008704A
CN110008704A CN201910285492.6A CN201910285492A CN110008704A CN 110008704 A CN110008704 A CN 110008704A CN 201910285492 A CN201910285492 A CN 201910285492A CN 110008704 A CN110008704 A CN 110008704A
Authority
CN
China
Prior art keywords
module
data
information
virus
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910285492.6A
Other languages
Chinese (zh)
Other versions
CN110008704B (en
Inventor
王丹阳
刘晓芳
陈少峰
李佳佳
郭蓓蕾
贺伟
王新刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yihua Intelligent Technology Co ltd
Original Assignee
Henan University of Urban Construction
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Urban Construction filed Critical Henan University of Urban Construction
Priority to CN201910285492.6A priority Critical patent/CN110008704B/en
Publication of CN110008704A publication Critical patent/CN110008704A/en
Application granted granted Critical
Publication of CN110008704B publication Critical patent/CN110008704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/906Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of electronic information intelligent memory systems for industrial management, including data reception module, data source analysis module, virus scan module, data processing module, data categorization module, data storage module, unloading module, cloud storage module, data retrieval module, authentication module and login module;Wherein, the data reception module and data source analysis module communicate to connect, the data source analysis module and virus scan module communicate to connect, the outside virus characteristic information acquisition module and virus scan module communicate to connect, the virus scan module and data processing module communicate to connect, the data processing module and data categorization module communicate to connect, and the data categorization module and data storage module communicate to connect;The present invention can preferably guarantee the safety of the data of storage, while can also allow the system it is more convenient to use, be more suitable popularization and use.

Description

A kind of electronic information intelligent memory system for industrial management
Technical field
The invention belongs to area information storage, it is related to intelligent storage utilization technology, it is specifically a kind of for industrial management Electronic information intelligent memory system.
Background technique
The storage of information is the importance of information system, if without information store, cannot make full use of collected, Processing gained information, while cost, consumption people, consumption object also being wanted to come the collection again of organizational information, processing, there is information storage, just It can guarantee on-demand, create conditions for the multi-functional utilization of unit information, thus greatly reduce expense.It the advantage is that Access speed is exceedingly fast, and the data volume of storage is big, and the type of information storage has very much, and electronic information intelligent memory system is exactly wherein One kind, use scope is also very wide, also will use electronic information smart memory system during industrial management.
Existing information storage system in use, during typing information, does not divide data Analysis is easy to cause in data and is mingled with viral data and is brought into system, so that the data stored in system are easy to be stolen, User only passes through simple account number cipher when logging in the system and verifies not safe enough simultaneously, also brings to the use of the system Certain influence, in order to solve these defects, it is proposed that a solution.
Summary of the invention
The purpose of the present invention is to provide a kind of electronic information intelligent memory systems for industrial management.
The technical problems to be solved by the invention are as follows:
(1) safety of system how is preferably improved;
(2) system how is allowed more intelligently to facilitate;
The purpose of the present invention can be achieved through the following technical solutions:
A kind of electronic information intelligent memory system for industrial management, including the analysis of data reception module, data source Module, virus scan module, data processing module, data categorization module, data storage module, unloading module, cloud store mould Block, data retrieval module, authentication module and login module;
Wherein, the data reception module and data source analysis module communicate to connect, the data source analysis module It is communicated to connect with virus scan module, the outside virus characteristic information acquisition module and virus scan module communicate to connect, institute It states virus scan module and data processing module communicates to connect, the data processing module and data categorization module communicate to connect, The data categorization module and data storage module communicate to connect, and the data storage module and unloading module communicate to connect, institute It states unloading module and communication connection module communicates to connect, the data retrieval module and data storage module communicate to connect, described Authentication module and data retrieval module communicate to connect, and the login module and authentication module communicate to connect;
The data reception module can be sent to data source analysis for carrying out data receiver, received data In module, the data source analysis module can carry out source analysis to the data received after receiving data, and analysis finishes After can transmit data in virus scan module, the virus scan module is used to carry out virus to the data that finish of analysis to look into It kills, the outside virus characteristic information acquisition module module can be believed by the Virus Info feature in the network of acquisition, and by virus Breath feature is sent in virus scan module, and the virus scan module after receiving the data carries out received data information Virus characteristic matching, the data for not matching virus, which can be sent in data processing module, to be handled, the data processing Module is used for time tag in the data markers received, and is transmitted data in data categorization module and classified, institute The data received can be classified by stating data categorization module, and by the data classified be sent in data storage module into Row storage, the unloading module can will carry out backup storage in the cloud storage module of the data conversion storage stored in data storage module It deposits, the login module logs on to data retrieval module for user, and the authentication module is used for the body to registrant Part is confirmed that after authentication provides, the data retrieval module can begin to use;
The data source analysis module will record the IP address of lower previous data source, while can also acquire and receive Two data can be compared in the IP address information of data, data source analysis module, and specific comparison process is as follows:
Step 1: the IP address of previous data source is labeled as Kzi, i=1 ... n;
Step 2: the IP address arrived on real-time data collection is labeled as Czi, i=1 ... n;
Step 3: Czi is compared and is matched with Kzi;
Step 4: when Czi is matched with any one in Kzi, data processing module can be sent to by fitting through rear data In handled;
Step 5: when Czi in Kzi without any one with matching, data reception module can send the data received Virus scan is carried out to virus scan module;
The virus scan module can by real-time reception to information do virus characteristic matching, specific matching process is such as Under:
S1: the collected outside virus characteristic information of outside virus characteristic information acquisition module is labeled as Vi, i= 1……n;
S2: being SJi, i=1 ... n by collected data markers;
S3: being scanned SJi, and records the characteristic point quantity that SJi meets Vi feature;
S4: when not scanning the characteristic point for meeting Vi feature in SJi, which is sent directly to data processing module In handled;
S5: when scanned in SJi meet Vi feature within a preset range when, rescan is carried out to it, works as rescan Scanned in SJi afterwards meet Vi feature still within a preset range when, which will not be entered into data processing module;
S6: when scanned in SJi meet Vi feature more than preset value when, which will not be entered into data processing module In;
The data processing module can be to time tag in the data markers received.
Further, the specific setting up procedure of the time tag is as follows:
SS1: will be divided into six stages for 24 hours, and wherein 0h-4h is a period, and 4h01s to 8h is the b period, and 8h01s to 12h is c Period, 12h01s to 16h are the d period, and 16h01s to 20h is the e stage, and 20h01s to 23h59s is the f stage;
SS2: when receive data time be a period when by data name before addition mark a;
SS3: when receive data time be the b period when by data name before addition mark b;
SS4: when receive data time be the c period when by data name before addition mark c;
SS5: when receive data time be the d period when by data name before addition mark d;
SS6: when receive data time be the e period when by data name before addition mark e;
SS7: when receive data time be the f period when by data name before addition mark f.
Further, the unloading module can be in preset time point to the number in information storage module and cloud storage module Compare according to part, specific comparison procedure is as follows:
(1): being CQ by the information flag in information storage module;
(2): being YQ by the information flag in the storage module of cloud;
(3): by formula CQ-YQ=ZQ, in the information content and cloud storage module in available information storage module Information content difference ZQ;
(4): when | ZQ | when being greater than preset value, the information duplication in unloading module, that is, direct information storage module dumps to cloud It holds in storage module;
(5): when | ZQ | when within a preset range, system can prompt user to be updated manually;
(6): as | ZQ | when being less than preset value, unloading module can every preset time to the information in information storage module into Row unloading.
Further, the login module is logged in when needing to retrieve data using data retrieval module for user and is somebody's turn to do System, the authentication module can carry out authentication to it when user is logged in using login module, specific authenticated Journey is as follows:
1): user's first time login system being started to input the time point of login account labeled as T1;
2): user has been inputted into the time point of login account labeled as T2;
3): by formula T2-T1=T, the duration T for the account that available user inputs for the first time;
4): being the time point label t1 for inputting login password by user's first time login system G;
5): user has been inputted into the time point of login password labeled as t2;
6): by formula t2-t1=t, the duration t for the account that available user inputs for the first time;
7): passing through formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user;
8): the duration coefficient that user is inputted in real time is labeled as Kt2;
9): by formula Kt2-KT1=Kt, available its difference Kt,;
10): when | Kt | when being greater than preset value, i.e., authentication failed is not logged in;
11): as | Kt | be less than preset value or | Kt | when=0, that is, be verified, data retrieval module progress can be logged on to Data retrieval.
Beneficial effects of the present invention:
(1) present invention can be first passed through by the information source analysis module and virus scan module of setting to reception number According to IP address carry out the data information that analysis can send with strain position IP address, so as to effectively avoid unknown IP from sending The viral data situation that causes the file stored in the system to be stolen to the system it is raw, while passing through the virus scan of setting Module can carry out viral comparison to the data that unknown IP is sent, and can occur to avoid the situation that data information is accidentally deleted, It further ensure that the system receives the safety of data, avoid the situation hair that the data stored in the system are leaked It is raw;
(2) by setting authentication module, can when user logs on to data retrieval module using login module, The identity of user is verified, by formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user, when | Kt | when being greater than preset value, i.e., authentication failed is not logged in, as | Kt | be less than preset value or | Kt | when=0, that is, be verified, can Data retrieval is carried out to log on to data retrieval module, the setting of this kind of process can effectively reduce other people and pretend to be system user The situation that login system steals the data information stored in system occurs, and effectively raises the safety of the system storing data Property;
(3) present invention can be acquired and be stored in data storage module and cloud storage module by the unloading module of setting Information content letter, and information content and cloud storage module by formula CQ-YQ=ZQ, in available information storage module In information content difference ZQ, according to | ZQ | the size variation of value may be implemented automatic and prompt and update cloud data manually, make It is more intelligent to obtain the system, is more suitble to promote the use of.
Detailed description of the invention
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is system block diagram of the invention.
Specific embodiment
As shown in Figure 1, a kind of electronic information intelligent memory system for industrial management, including data reception module, number According to source analysis module, virus scan module, data processing module, data categorization module, data storage module, unloading module, Cloud storage module, data retrieval module, authentication module and login module;
Wherein, the data reception module and data source analysis module communicate to connect, the data source analysis module It is communicated to connect with virus scan module, the outside virus characteristic information acquisition module and virus scan module communicate to connect, institute It states virus scan module and data processing module communicates to connect, the data processing module and data categorization module communicate to connect, The data categorization module and data storage module communicate to connect, and the data storage module and unloading module communicate to connect, institute It states unloading module and communication connection module communicates to connect, the data retrieval module and data storage module communicate to connect, described Authentication module and data retrieval module communicate to connect, and the login module and authentication module communicate to connect;
The data reception module can be sent to data source analysis for carrying out data receiver, received data In module, the data source analysis module can carry out source analysis to the data received after receiving data, and analysis finishes After can transmit data in virus scan module, the virus scan module is used to carry out virus to the data that finish of analysis to look into It kills, the outside virus characteristic information acquisition module module can be believed by the Virus Info feature in the network of acquisition, and by virus Breath feature is sent in virus scan module, and the virus scan module after receiving the data carries out received data information Virus characteristic matching, the data for not matching virus, which can be sent in data processing module, to be handled, the data processing Module is used for time tag in the data markers received, and is transmitted data in data categorization module and classified, institute The data received can be classified by stating data categorization module, and by the data classified be sent in data storage module into Row storage, the unloading module can will carry out backup storage in the cloud storage module of the data conversion storage stored in data storage module It deposits, the login module logs on to data retrieval module for user, and the authentication module is used for the body to registrant Part is confirmed that after authentication provides, the data retrieval module can begin to use;
The data source analysis module will record the IP address of lower previous data source, while can also acquire and receive Two data can be compared in the IP address information of data, data source analysis module, and specific comparison process is as follows:
Step 1: the IP address of previous data source is labeled as Kzi, i=1 ... n;
Step 2: the IP address arrived on real-time data collection is labeled as Czi, i=1 ... n;
Step 3: Czi is compared and is matched with Kzi;
Step 4: when Czi is matched with any one in Kzi, data processing module can be sent to by fitting through rear data In handled;
Step 5: when Czi in Kzi without any one with matching, data reception module can send the data received Virus scan is carried out to virus scan module;
The virus scan module can by real-time reception to information do virus characteristic matching, specific matching process is such as Under:
S1: the collected outside virus characteristic information of outside virus characteristic information acquisition module is labeled as Vi, i= 1……n;
S2: being SJi, i=1 ... n by collected data markers;
S3: being scanned SJi, and records the characteristic point quantity that SJi meets Vi feature;
S4: when not scanning the characteristic point for meeting Vi feature in SJi, which is sent directly to data processing module In handled;
S5: when scanned in SJi meet Vi feature within a preset range when, rescan is carried out to it, works as rescan Scanned in SJi afterwards meet Vi feature still within a preset range when, which will not be entered into data processing module;
S6: when scanned in SJi meet Vi feature more than preset value when, which will not be entered into data processing module In;
The data processing module can be to time tag in the data markers received.
The specific setting up procedure of the time tag is as follows:
SS1: will be divided into six stages for 24 hours, and wherein 0h-4h is a period, and 4h01s to 8h is the b period, and 8h01s to 12h is c Period, 12h01s to 16h are the d period, and 16h01s to 20h is the e stage, and 20h01s to 23h59s is the f stage;
SS2: when receive data time be a period when by data name before addition mark a;
SS3: when receive data time be the b period when by data name before addition mark b;
SS4: when receive data time be the c period when by data name before addition mark c;
SS5: when receive data time be the d period when by data name before addition mark d;
SS6: when receive data time be the e period when by data name before addition mark e;
SS7: when receive data time be the f period when by data name before addition mark f.
The unloading module can compare the dataware in information storage module and cloud storage module in preset time point, Its specific comparison procedure is as follows:
(1): being CQ by the information flag in information storage module;
(2): being YQ by the information flag in the storage module of cloud;
(3): by formula CQ-YQ=ZQ, in the information content and cloud storage module in available information storage module Information content difference ZQ;
(4): when | ZQ | when being greater than preset value, the information duplication in unloading module, that is, direct information storage module dumps to cloud It holds in storage module;
(5): when | ZQ | when within a preset range, system can prompt user to be updated manually;
(6): as | ZQ | when being less than preset value, unloading module can every preset time to the information in information storage module into Row unloading.
The login module logs in the system when needing and retrieving data using data retrieval module for user, described Authentication module can carry out authentication when user is logged in using login module to it, and specific verification process is as follows:
1): user's first time login system being started to input the time point of login account labeled as T1;
2): user has been inputted into the time point of login account labeled as T2;
3): by formula T2-T1=T, the duration T for the account that available user inputs for the first time;
4): being the time point label t1 for inputting login password by user's first time login system G;
5): user has been inputted into the time point of login password labeled as t2;
6): by formula t2-t1=t, the duration t for the account that available user inputs for the first time;
7): passing through formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user;
8): the duration coefficient that user is inputted in real time is labeled as Kt2;
9): by formula Kt2-KT1=Kt, available its difference Kt,;
10): when | Kt | when being greater than preset value, i.e., authentication failed is not logged in;
11): as | Kt | be less than preset value or | Kt | when=0, that is, be verified, data retrieval module progress can be logged on to Data retrieval.
The data input module is also used to input preset value X1 and X2, and the data input module is used to pass X1 and X2 Defeated to arrive controller, the controller is used to X1 and X2 returning to data statistics module.
A kind of electronic information intelligent memory system for industrial management, at work, data reception module is used for first Data receiver is carried out, received data can be sent in data source analysis module, and data source analysis module receives The data received can be carried out with source analysis, data source analysis module can be first passed through to the IP for receiving data after to data Address carries out the data information that analysis can be sent with strain position IP address, so as to the virus for effectively avoiding unknown IP from sending The situation that data cause the file stored in the system to be stolen to the system is raw, and virus can be transmitted data to after analysis In scan module, virus scan module is used to carry out the data that analysis finishes checking and killing virus, the acquisition of outside virus characteristic information Module can be sent in virus scan module by the Virus Info feature in the network of acquisition, and by Virus Info feature, Virus scan module carries out virus characteristic matching to received data information after receiving the data, and virus scan module can be right The data that unknown IP is sent carry out viral comparison, can occur to avoid the situation that data information is accidentally deleted, also further It ensure that the system receives the safety of data, avoid the situation that the data stored in the system are leaked and occur, do not match Viral data, which can be sent in data processing module, out is handled, and data processing module is used for the data mark received Time tag in note, and transmit data in data categorization module and classify, the number that data categorization module can will receive It according to classifying, and sends the data classified in data storage module and stores, unloading module can be by data storage Backup storage is carried out in the cloud storage module of the data conversion storage stored in module, login module logs on to data for user Retrieval module, authentication module is for confirming the identity of registrant, after authentication provides, data retrieval module It can begin to use.
The present invention can be first passed through by the information source analysis module and virus scan module of setting to reception number first According to IP address carry out the data information that analysis can send with strain position IP address, so as to effectively avoid unknown IP from sending The viral data situation that causes the file stored in the system to be stolen to the system it is raw, while passing through the virus scan of setting Module can carry out viral comparison to the data that unknown IP is sent, and can occur to avoid the situation that data information is accidentally deleted, It further ensure that the system receives the safety of data, avoid the situation hair that the data stored in the system are leaked It is raw;
Secondly by the authentication module of setting, data retrieval module can be logged on to using login module in user When, the identity of user is verified, by formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user, when | Kt | when being greater than preset value, i.e., authentication failed is not logged in, as | Kt | be less than preset value or | Kt | when=0, that is, be verified, Data retrieval module can be logged on to and carry out data retrieval, the setting of this kind of process can effectively reduce other people and emit charging system use The situation that family login system steals the data information stored in system occurs, and effectively raises the safety of the system storing data Property;
The last present invention can be acquired and be stored in data storage module and cloud storage module by the unloading module of setting Information content letter, and information content and cloud storage module by formula CQ-YQ=ZQ, in available information storage module In information content difference ZQ, according to | ZQ | the size variation of value may be implemented automatic and prompt and update cloud data manually, make It is more intelligent to obtain the system, is more suitble to promote the use of.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.

Claims (4)

1. a kind of electronic information intelligent memory system for industrial management, which is characterized in that including data reception module, data Source analysis module, virus scan module, data processing module, data categorization module, data storage module, unloading module, cloud Hold storage module, data retrieval module, authentication module and login module;
Wherein, the data reception module and data source analysis module communicate to connect, the data source analysis module and disease Malicious scan module communication connection, the outside virus characteristic information acquisition module and virus scan module communicate to connect, the disease Malicious scan module and data processing module communicate to connect, and the data processing module and data categorization module communicate to connect, described Data categorization module and data storage module communicate to connect, and the data storage module and unloading module communicate to connect, and described turn Storing module and communication connection module communicate to connect, and the data retrieval module and data storage module communicate to connect, the identity Authentication module and data retrieval module communicate to connect, and the login module and authentication module communicate to connect;
For the data reception module for carrying out data receiver, received data can be sent to data source analysis module In, the data source analysis module can carry out source analysis, meeting after analysis to the data received after receiving data It transmitting data in virus scan module, the virus scan module is used to carry out checking and killing virus to the data that analysis finishes, The outside virus characteristic information acquisition module module can by the Virus Info feature in the network of acquisition, and by Virus Info spy It levys and is sent in virus scan module, the virus scan module carries out virus to received data information after receiving the data Characteristic matching, the data for not matching virus, which can be sent in data processing module, to be handled, the data processing module For to time tag in the data markers received, and transmits data in data categorization module and classify, the number The data received can be classified according to categorization module, and send the data classified in data storage module and store up It deposits, the unloading module can will carry out backup storage in the cloud storage module of the data conversion storage stored in data storage module, The login module logs on to data retrieval module for user, the authentication module be used for the identity of registrant into Row confirmation, after authentication provides, the data retrieval module can begin to use;
The data source analysis module will record the IP address of lower previous data source, while can also acquire the data received IP address information, two data can be compared in data source analysis module, and specific comparison process is as follows:
Step 1: the IP address of previous data source is labeled as Kzi, i=1 ... n;
Step 2: the IP address arrived on real-time data collection is labeled as Czi, i=1 ... n;
Step 3: Czi is compared and is matched with Kzi;
Step 4: when Czi is matched with any one in Kzi, fit through rear data can be sent in data processing module into Row processing;
Step 5: when Czi in Kzi without any one with matching, data reception module can send disease for the data received Malicious scan module carries out virus scan;
The virus scan module can by real-time reception to information do virus characteristic matching, specific matching process is as follows:
S1: the collected outside virus characteristic information of outside virus characteristic information acquisition module is labeled as Vi, i=1 ... n;
S2: being SJi, i=1 ... n by collected data markers;
S3: being scanned SJi, and records the characteristic point quantity that SJi meets Vi feature;
S4: when the characteristic point for meeting Vi feature is not scanned in SJi, by the information be sent directly in data processing module into Row processing;
S5: when scanned in SJi meet Vi feature within a preset range when, rescan is carried out to it, SJi after rescan In scan meet Vi feature still within a preset range when, which will not be entered into data processing module;
S6: when scanned in SJi meet Vi feature more than preset value when, which will not be entered into data processing module;
The data processing module can be to time tag in the data markers received.
2. a kind of electronic information intelligent memory system for industrial management according to claim 1, which is characterized in that institute The specific setting up procedure for stating time tag is as follows:
SS1: will be divided into six stages for 24 hours, and wherein 0h-4h is a period, and 4h01s to 8h is the b period, when 8h01s to 12h is c Section, 12h01s to 16h are the d period, and 16h01s to 20h is the e stage, and 20h01s to 23h59s is the f stage;
SS2: when receive data time be a period when by data name before addition mark a;
SS3: when receive data time be the b period when by data name before addition mark b;
SS4: when receive data time be the c period when by data name before addition mark c;
SS5: when receive data time be the d period when by data name before addition mark d;
SS6: when receive data time be the e period when by data name before addition mark e;
SS7: when receive data time be the f period when by data name before addition mark f.
3. a kind of electronic information intelligent memory system for industrial management according to claim 1, which is characterized in that institute The dataware in information storage module and cloud storage module can be compared in preset time point by stating unloading module, specific to compare Process is as follows:
(1): being CQ by the information flag in information storage module;
(2): being YQ by the information flag in the storage module of cloud;
(3): the letter in information content and cloud storage module by formula CQ-YQ=ZQ, in available information storage module The difference ZQ of breath amount;
(4): when | ZQ | when being greater than preset value, the information duplication in unloading module, that is, direct information storage module dumps to cloud storage In storing module;
(5): when | ZQ | when within a preset range, system can prompt user to be updated manually;
(6): when | ZQ | when being less than preset value, unloading module can turn the information in information storage module every preset time It deposits.
4. a kind of electronic information intelligent memory system for industrial management according to claim 1, which is characterized in that institute It states login module and logs in the system, the authentication mould when needing and retrieving data using data retrieval module for user Block can carry out authentication when user is logged in using login module to it, and specific verification process is as follows:
1): user's first time login system being started to input the time point of login account labeled as T1;
2): user has been inputted into the time point of login account labeled as T2;
3): by formula T2-T1=T, the duration T for the account that available user inputs for the first time;
4): being the time point label t1 for inputting login password by user's first time login system G;
5): user has been inputted into the time point of login password labeled as t2;
6): by formula t2-t1=t, the duration t for the account that available user inputs for the first time;
7): passing through formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user;
8): the duration coefficient that user is inputted in real time is labeled as Kt2;
9): by formula Kt2-KT1=Kt, available its difference Kt,;
10): when | Kt | when being greater than preset value, i.e., authentication failed is not logged in;
11): as | Kt | be less than preset value or | Kt | when=0, that is, be verified, data retrieval module can be logged on to and carry out data Retrieval.
CN201910285492.6A 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management Active CN110008704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910285492.6A CN110008704B (en) 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910285492.6A CN110008704B (en) 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management

Publications (2)

Publication Number Publication Date
CN110008704A true CN110008704A (en) 2019-07-12
CN110008704B CN110008704B (en) 2020-01-24

Family

ID=67170830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910285492.6A Active CN110008704B (en) 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management

Country Status (1)

Country Link
CN (1) CN110008704B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143280A (en) * 2019-12-31 2020-05-12 广州广电运通信息科技有限公司 Data scheduling method, system, device and storage medium
CN111625822A (en) * 2020-04-07 2020-09-04 重庆云君教育科技有限公司 Cloud resource storage management device and method
CN112163203A (en) * 2020-10-13 2021-01-01 合肥泽延微电子有限公司 Database management system for integrated circuit design
CN113297444A (en) * 2021-05-10 2021-08-24 广东白云学院 Big data classification management system
CN116225216A (en) * 2023-01-04 2023-06-06 湖北工业大学 Tea culture display system based on AR technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107943661A (en) * 2017-12-12 2018-04-20 温州市联科科技有限公司 A kind of data storage management system
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN108900537A (en) * 2018-07-30 2018-11-27 九江学院 A kind of data acquisition device applied to cloud auditing system
US20180351983A1 (en) * 2013-07-25 2018-12-06 Splunk Inc. Security Threat Detection based on Patterns in Machine Data Events
CN109583205A (en) * 2018-11-23 2019-04-05 江苏华存电子科技有限公司 A kind of data information security management method
CN109587130A (en) * 2018-11-29 2019-04-05 贵州航天云网科技有限公司 One kind being based on the consistent integrated operation support system of RTI space-time

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180351983A1 (en) * 2013-07-25 2018-12-06 Splunk Inc. Security Threat Detection based on Patterns in Machine Data Events
CN107943661A (en) * 2017-12-12 2018-04-20 温州市联科科技有限公司 A kind of data storage management system
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN108900537A (en) * 2018-07-30 2018-11-27 九江学院 A kind of data acquisition device applied to cloud auditing system
CN109583205A (en) * 2018-11-23 2019-04-05 江苏华存电子科技有限公司 A kind of data information security management method
CN109587130A (en) * 2018-11-29 2019-04-05 贵州航天云网科技有限公司 One kind being based on the consistent integrated operation support system of RTI space-time

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
海佳佳: ""云环境下用户数据存储安全问题研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143280A (en) * 2019-12-31 2020-05-12 广州广电运通信息科技有限公司 Data scheduling method, system, device and storage medium
CN111143280B (en) * 2019-12-31 2023-10-10 广州广电运通信息科技有限公司 Data scheduling method, system, device and storage medium
CN111625822A (en) * 2020-04-07 2020-09-04 重庆云君教育科技有限公司 Cloud resource storage management device and method
CN112163203A (en) * 2020-10-13 2021-01-01 合肥泽延微电子有限公司 Database management system for integrated circuit design
CN113297444A (en) * 2021-05-10 2021-08-24 广东白云学院 Big data classification management system
CN116225216A (en) * 2023-01-04 2023-06-06 湖北工业大学 Tea culture display system based on AR technology

Also Published As

Publication number Publication date
CN110008704B (en) 2020-01-24

Similar Documents

Publication Publication Date Title
CN110008704A (en) A kind of electronic information intelligent memory system for industrial management
CN109448175A (en) The control method and fingerprint lock administration system of Fingerprint Lock
CN103839318B (en) The gate control system of a kind of remote centralized certification and method
CN110570600A (en) Express sending and taking method and system based on certificate card and biological characteristic information
CN103425916B (en) Take safety criterion as safe operating device and the method for workflow auditing standard
CN205210923U (en) Intelligence files management system
CN105743850B (en) Method and device for obtaining user authentication information when delivering articles by using express box
CN110942563A (en) Express item processing method, device and medium for express delivery cabinet
CN104253818A (en) Server and terminal authentication method, server, terminal
CN107977816A (en) Express mail delivering method and server
CN105721497A (en) Method and system for realizing collection and extraction of expresses
CN115662657A (en) Online inquiry system based on internet hospital
CN112699987A (en) Method and system for monitoring work task by using lock
CN205263880U (en) Select room system
CN114117387A (en) Substation tool monitoring method and device, computer equipment and storage medium
CN107239810A (en) A kind of two-way asynchronous delivery system and its handover method
CN108090373A (en) A kind of data processing and exploitation total management system
CN106709683A (en) Offline goods storage method and apparatus, and offline goods receiving method and apparatus
CN107784588A (en) Insurance user information merging method and device
CN106330977A (en) Fingerprint authentication method and related equipment
CN109101828A (en) A kind of network is made house calls platform customer information stocking system
CN106710033A (en) Door control opening method and device
CN204707130U (en) Unmanned vehicle send part Apparatus and system
CN108492424A (en) A kind of access control system based on quantum cryptography
CN105701906B (en) A kind of self-service device method for managing security based on finger-print puzzle lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221014

Address after: 230000 Room 203, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee after: Hefei Jiuzhou Longteng scientific and technological achievement transformation Co.,Ltd.

Address before: 467036 Henan province Pingdingshan city new city Longxiang Road

Patentee before: Henan University of Urban Construction

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221111

Address after: 518055 401-402, Building C, Xanadu Creative Park, No. 5, Pingshan 1st Road, Pingshan Community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong

Patentee after: Shenzhen Yihua Intelligent Technology Co.,Ltd.

Address before: 230000 Room 203, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee before: Hefei Jiuzhou Longteng scientific and technological achievement transformation Co.,Ltd.

TR01 Transfer of patent right