A kind of electronic information intelligent memory system for industrial management
Technical field
The invention belongs to area information storage, it is related to intelligent storage utilization technology, it is specifically a kind of for industrial management
Electronic information intelligent memory system.
Background technique
The storage of information is the importance of information system, if without information store, cannot make full use of collected,
Processing gained information, while cost, consumption people, consumption object also being wanted to come the collection again of organizational information, processing, there is information storage, just
It can guarantee on-demand, create conditions for the multi-functional utilization of unit information, thus greatly reduce expense.It the advantage is that
Access speed is exceedingly fast, and the data volume of storage is big, and the type of information storage has very much, and electronic information intelligent memory system is exactly wherein
One kind, use scope is also very wide, also will use electronic information smart memory system during industrial management.
Existing information storage system in use, during typing information, does not divide data
Analysis is easy to cause in data and is mingled with viral data and is brought into system, so that the data stored in system are easy to be stolen,
User only passes through simple account number cipher when logging in the system and verifies not safe enough simultaneously, also brings to the use of the system
Certain influence, in order to solve these defects, it is proposed that a solution.
Summary of the invention
The purpose of the present invention is to provide a kind of electronic information intelligent memory systems for industrial management.
The technical problems to be solved by the invention are as follows:
(1) safety of system how is preferably improved;
(2) system how is allowed more intelligently to facilitate;
The purpose of the present invention can be achieved through the following technical solutions:
A kind of electronic information intelligent memory system for industrial management, including the analysis of data reception module, data source
Module, virus scan module, data processing module, data categorization module, data storage module, unloading module, cloud store mould
Block, data retrieval module, authentication module and login module;
Wherein, the data reception module and data source analysis module communicate to connect, the data source analysis module
It is communicated to connect with virus scan module, the outside virus characteristic information acquisition module and virus scan module communicate to connect, institute
It states virus scan module and data processing module communicates to connect, the data processing module and data categorization module communicate to connect,
The data categorization module and data storage module communicate to connect, and the data storage module and unloading module communicate to connect, institute
It states unloading module and communication connection module communicates to connect, the data retrieval module and data storage module communicate to connect, described
Authentication module and data retrieval module communicate to connect, and the login module and authentication module communicate to connect;
The data reception module can be sent to data source analysis for carrying out data receiver, received data
In module, the data source analysis module can carry out source analysis to the data received after receiving data, and analysis finishes
After can transmit data in virus scan module, the virus scan module is used to carry out virus to the data that finish of analysis to look into
It kills, the outside virus characteristic information acquisition module module can be believed by the Virus Info feature in the network of acquisition, and by virus
Breath feature is sent in virus scan module, and the virus scan module after receiving the data carries out received data information
Virus characteristic matching, the data for not matching virus, which can be sent in data processing module, to be handled, the data processing
Module is used for time tag in the data markers received, and is transmitted data in data categorization module and classified, institute
The data received can be classified by stating data categorization module, and by the data classified be sent in data storage module into
Row storage, the unloading module can will carry out backup storage in the cloud storage module of the data conversion storage stored in data storage module
It deposits, the login module logs on to data retrieval module for user, and the authentication module is used for the body to registrant
Part is confirmed that after authentication provides, the data retrieval module can begin to use;
The data source analysis module will record the IP address of lower previous data source, while can also acquire and receive
Two data can be compared in the IP address information of data, data source analysis module, and specific comparison process is as follows:
Step 1: the IP address of previous data source is labeled as Kzi, i=1 ... n;
Step 2: the IP address arrived on real-time data collection is labeled as Czi, i=1 ... n;
Step 3: Czi is compared and is matched with Kzi;
Step 4: when Czi is matched with any one in Kzi, data processing module can be sent to by fitting through rear data
In handled;
Step 5: when Czi in Kzi without any one with matching, data reception module can send the data received
Virus scan is carried out to virus scan module;
The virus scan module can by real-time reception to information do virus characteristic matching, specific matching process is such as
Under:
S1: the collected outside virus characteristic information of outside virus characteristic information acquisition module is labeled as Vi, i=
1……n;
S2: being SJi, i=1 ... n by collected data markers;
S3: being scanned SJi, and records the characteristic point quantity that SJi meets Vi feature;
S4: when not scanning the characteristic point for meeting Vi feature in SJi, which is sent directly to data processing module
In handled;
S5: when scanned in SJi meet Vi feature within a preset range when, rescan is carried out to it, works as rescan
Scanned in SJi afterwards meet Vi feature still within a preset range when, which will not be entered into data processing module;
S6: when scanned in SJi meet Vi feature more than preset value when, which will not be entered into data processing module
In;
The data processing module can be to time tag in the data markers received.
Further, the specific setting up procedure of the time tag is as follows:
SS1: will be divided into six stages for 24 hours, and wherein 0h-4h is a period, and 4h01s to 8h is the b period, and 8h01s to 12h is c
Period, 12h01s to 16h are the d period, and 16h01s to 20h is the e stage, and 20h01s to 23h59s is the f stage;
SS2: when receive data time be a period when by data name before addition mark a;
SS3: when receive data time be the b period when by data name before addition mark b;
SS4: when receive data time be the c period when by data name before addition mark c;
SS5: when receive data time be the d period when by data name before addition mark d;
SS6: when receive data time be the e period when by data name before addition mark e;
SS7: when receive data time be the f period when by data name before addition mark f.
Further, the unloading module can be in preset time point to the number in information storage module and cloud storage module
Compare according to part, specific comparison procedure is as follows:
(1): being CQ by the information flag in information storage module;
(2): being YQ by the information flag in the storage module of cloud;
(3): by formula CQ-YQ=ZQ, in the information content and cloud storage module in available information storage module
Information content difference ZQ;
(4): when | ZQ | when being greater than preset value, the information duplication in unloading module, that is, direct information storage module dumps to cloud
It holds in storage module;
(5): when | ZQ | when within a preset range, system can prompt user to be updated manually;
(6): as | ZQ | when being less than preset value, unloading module can every preset time to the information in information storage module into
Row unloading.
Further, the login module is logged in when needing to retrieve data using data retrieval module for user and is somebody's turn to do
System, the authentication module can carry out authentication to it when user is logged in using login module, specific authenticated
Journey is as follows:
1): user's first time login system being started to input the time point of login account labeled as T1;
2): user has been inputted into the time point of login account labeled as T2;
3): by formula T2-T1=T, the duration T for the account that available user inputs for the first time;
4): being the time point label t1 for inputting login password by user's first time login system G;
5): user has been inputted into the time point of login password labeled as t2;
6): by formula t2-t1=t, the duration t for the account that available user inputs for the first time;
7): passing through formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user;
8): the duration coefficient that user is inputted in real time is labeled as Kt2;
9): by formula Kt2-KT1=Kt, available its difference Kt,;
10): when | Kt | when being greater than preset value, i.e., authentication failed is not logged in;
11): as | Kt | be less than preset value or | Kt | when=0, that is, be verified, data retrieval module progress can be logged on to
Data retrieval.
Beneficial effects of the present invention:
(1) present invention can be first passed through by the information source analysis module and virus scan module of setting to reception number
According to IP address carry out the data information that analysis can send with strain position IP address, so as to effectively avoid unknown IP from sending
The viral data situation that causes the file stored in the system to be stolen to the system it is raw, while passing through the virus scan of setting
Module can carry out viral comparison to the data that unknown IP is sent, and can occur to avoid the situation that data information is accidentally deleted,
It further ensure that the system receives the safety of data, avoid the situation hair that the data stored in the system are leaked
It is raw;
(2) by setting authentication module, can when user logs on to data retrieval module using login module,
The identity of user is verified, by formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user, when | Kt
| when being greater than preset value, i.e., authentication failed is not logged in, as | Kt | be less than preset value or | Kt | when=0, that is, be verified, can
Data retrieval is carried out to log on to data retrieval module, the setting of this kind of process can effectively reduce other people and pretend to be system user
The situation that login system steals the data information stored in system occurs, and effectively raises the safety of the system storing data
Property;
(3) present invention can be acquired and be stored in data storage module and cloud storage module by the unloading module of setting
Information content letter, and information content and cloud storage module by formula CQ-YQ=ZQ, in available information storage module
In information content difference ZQ, according to | ZQ | the size variation of value may be implemented automatic and prompt and update cloud data manually, make
It is more intelligent to obtain the system, is more suitble to promote the use of.
Detailed description of the invention
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is system block diagram of the invention.
Specific embodiment
As shown in Figure 1, a kind of electronic information intelligent memory system for industrial management, including data reception module, number
According to source analysis module, virus scan module, data processing module, data categorization module, data storage module, unloading module,
Cloud storage module, data retrieval module, authentication module and login module;
Wherein, the data reception module and data source analysis module communicate to connect, the data source analysis module
It is communicated to connect with virus scan module, the outside virus characteristic information acquisition module and virus scan module communicate to connect, institute
It states virus scan module and data processing module communicates to connect, the data processing module and data categorization module communicate to connect,
The data categorization module and data storage module communicate to connect, and the data storage module and unloading module communicate to connect, institute
It states unloading module and communication connection module communicates to connect, the data retrieval module and data storage module communicate to connect, described
Authentication module and data retrieval module communicate to connect, and the login module and authentication module communicate to connect;
The data reception module can be sent to data source analysis for carrying out data receiver, received data
In module, the data source analysis module can carry out source analysis to the data received after receiving data, and analysis finishes
After can transmit data in virus scan module, the virus scan module is used to carry out virus to the data that finish of analysis to look into
It kills, the outside virus characteristic information acquisition module module can be believed by the Virus Info feature in the network of acquisition, and by virus
Breath feature is sent in virus scan module, and the virus scan module after receiving the data carries out received data information
Virus characteristic matching, the data for not matching virus, which can be sent in data processing module, to be handled, the data processing
Module is used for time tag in the data markers received, and is transmitted data in data categorization module and classified, institute
The data received can be classified by stating data categorization module, and by the data classified be sent in data storage module into
Row storage, the unloading module can will carry out backup storage in the cloud storage module of the data conversion storage stored in data storage module
It deposits, the login module logs on to data retrieval module for user, and the authentication module is used for the body to registrant
Part is confirmed that after authentication provides, the data retrieval module can begin to use;
The data source analysis module will record the IP address of lower previous data source, while can also acquire and receive
Two data can be compared in the IP address information of data, data source analysis module, and specific comparison process is as follows:
Step 1: the IP address of previous data source is labeled as Kzi, i=1 ... n;
Step 2: the IP address arrived on real-time data collection is labeled as Czi, i=1 ... n;
Step 3: Czi is compared and is matched with Kzi;
Step 4: when Czi is matched with any one in Kzi, data processing module can be sent to by fitting through rear data
In handled;
Step 5: when Czi in Kzi without any one with matching, data reception module can send the data received
Virus scan is carried out to virus scan module;
The virus scan module can by real-time reception to information do virus characteristic matching, specific matching process is such as
Under:
S1: the collected outside virus characteristic information of outside virus characteristic information acquisition module is labeled as Vi, i=
1……n;
S2: being SJi, i=1 ... n by collected data markers;
S3: being scanned SJi, and records the characteristic point quantity that SJi meets Vi feature;
S4: when not scanning the characteristic point for meeting Vi feature in SJi, which is sent directly to data processing module
In handled;
S5: when scanned in SJi meet Vi feature within a preset range when, rescan is carried out to it, works as rescan
Scanned in SJi afterwards meet Vi feature still within a preset range when, which will not be entered into data processing module;
S6: when scanned in SJi meet Vi feature more than preset value when, which will not be entered into data processing module
In;
The data processing module can be to time tag in the data markers received.
The specific setting up procedure of the time tag is as follows:
SS1: will be divided into six stages for 24 hours, and wherein 0h-4h is a period, and 4h01s to 8h is the b period, and 8h01s to 12h is c
Period, 12h01s to 16h are the d period, and 16h01s to 20h is the e stage, and 20h01s to 23h59s is the f stage;
SS2: when receive data time be a period when by data name before addition mark a;
SS3: when receive data time be the b period when by data name before addition mark b;
SS4: when receive data time be the c period when by data name before addition mark c;
SS5: when receive data time be the d period when by data name before addition mark d;
SS6: when receive data time be the e period when by data name before addition mark e;
SS7: when receive data time be the f period when by data name before addition mark f.
The unloading module can compare the dataware in information storage module and cloud storage module in preset time point,
Its specific comparison procedure is as follows:
(1): being CQ by the information flag in information storage module;
(2): being YQ by the information flag in the storage module of cloud;
(3): by formula CQ-YQ=ZQ, in the information content and cloud storage module in available information storage module
Information content difference ZQ;
(4): when | ZQ | when being greater than preset value, the information duplication in unloading module, that is, direct information storage module dumps to cloud
It holds in storage module;
(5): when | ZQ | when within a preset range, system can prompt user to be updated manually;
(6): as | ZQ | when being less than preset value, unloading module can every preset time to the information in information storage module into
Row unloading.
The login module logs in the system when needing and retrieving data using data retrieval module for user, described
Authentication module can carry out authentication when user is logged in using login module to it, and specific verification process is as follows:
1): user's first time login system being started to input the time point of login account labeled as T1;
2): user has been inputted into the time point of login account labeled as T2;
3): by formula T2-T1=T, the duration T for the account that available user inputs for the first time;
4): being the time point label t1 for inputting login password by user's first time login system G;
5): user has been inputted into the time point of login password labeled as t2;
6): by formula t2-t1=t, the duration t for the account that available user inputs for the first time;
7): passing through formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user;
8): the duration coefficient that user is inputted in real time is labeled as Kt2;
9): by formula Kt2-KT1=Kt, available its difference Kt,;
10): when | Kt | when being greater than preset value, i.e., authentication failed is not logged in;
11): as | Kt | be less than preset value or | Kt | when=0, that is, be verified, data retrieval module progress can be logged on to
Data retrieval.
The data input module is also used to input preset value X1 and X2, and the data input module is used to pass X1 and X2
Defeated to arrive controller, the controller is used to X1 and X2 returning to data statistics module.
A kind of electronic information intelligent memory system for industrial management, at work, data reception module is used for first
Data receiver is carried out, received data can be sent in data source analysis module, and data source analysis module receives
The data received can be carried out with source analysis, data source analysis module can be first passed through to the IP for receiving data after to data
Address carries out the data information that analysis can be sent with strain position IP address, so as to the virus for effectively avoiding unknown IP from sending
The situation that data cause the file stored in the system to be stolen to the system is raw, and virus can be transmitted data to after analysis
In scan module, virus scan module is used to carry out the data that analysis finishes checking and killing virus, the acquisition of outside virus characteristic information
Module can be sent in virus scan module by the Virus Info feature in the network of acquisition, and by Virus Info feature,
Virus scan module carries out virus characteristic matching to received data information after receiving the data, and virus scan module can be right
The data that unknown IP is sent carry out viral comparison, can occur to avoid the situation that data information is accidentally deleted, also further
It ensure that the system receives the safety of data, avoid the situation that the data stored in the system are leaked and occur, do not match
Viral data, which can be sent in data processing module, out is handled, and data processing module is used for the data mark received
Time tag in note, and transmit data in data categorization module and classify, the number that data categorization module can will receive
It according to classifying, and sends the data classified in data storage module and stores, unloading module can be by data storage
Backup storage is carried out in the cloud storage module of the data conversion storage stored in module, login module logs on to data for user
Retrieval module, authentication module is for confirming the identity of registrant, after authentication provides, data retrieval module
It can begin to use.
The present invention can be first passed through by the information source analysis module and virus scan module of setting to reception number first
According to IP address carry out the data information that analysis can send with strain position IP address, so as to effectively avoid unknown IP from sending
The viral data situation that causes the file stored in the system to be stolen to the system it is raw, while passing through the virus scan of setting
Module can carry out viral comparison to the data that unknown IP is sent, and can occur to avoid the situation that data information is accidentally deleted,
It further ensure that the system receives the safety of data, avoid the situation hair that the data stored in the system are leaked
It is raw;
Secondly by the authentication module of setting, data retrieval module can be logged on to using login module in user
When, the identity of user is verified, by formula (T+t)/2=Kt1, the input duration COEFFICIENT K t1 of available user, when
| Kt | when being greater than preset value, i.e., authentication failed is not logged in, as | Kt | be less than preset value or | Kt | when=0, that is, be verified,
Data retrieval module can be logged on to and carry out data retrieval, the setting of this kind of process can effectively reduce other people and emit charging system use
The situation that family login system steals the data information stored in system occurs, and effectively raises the safety of the system storing data
Property;
The last present invention can be acquired and be stored in data storage module and cloud storage module by the unloading module of setting
Information content letter, and information content and cloud storage module by formula CQ-YQ=ZQ, in available information storage module
In information content difference ZQ, according to | ZQ | the size variation of value may be implemented automatic and prompt and update cloud data manually, make
It is more intelligent to obtain the system, is more suitble to promote the use of.
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple
Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention
Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.