CN110008704B - Intelligent electronic information storage system for industrial management - Google Patents

Intelligent electronic information storage system for industrial management Download PDF

Info

Publication number
CN110008704B
CN110008704B CN201910285492.6A CN201910285492A CN110008704B CN 110008704 B CN110008704 B CN 110008704B CN 201910285492 A CN201910285492 A CN 201910285492A CN 110008704 B CN110008704 B CN 110008704B
Authority
CN
China
Prior art keywords
data
module
time
virus
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910285492.6A
Other languages
Chinese (zh)
Other versions
CN110008704A (en
Inventor
王丹阳
刘晓芳
陈少峰
李佳佳
郭蓓蕾
贺伟
王新刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yihua Intelligent Technology Co ltd
Original Assignee
Henan University of Urban Construction
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Urban Construction filed Critical Henan University of Urban Construction
Priority to CN201910285492.6A priority Critical patent/CN110008704B/en
Publication of CN110008704A publication Critical patent/CN110008704A/en
Application granted granted Critical
Publication of CN110008704B publication Critical patent/CN110008704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/906Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an electronic information intelligent storage system for industrial management, which comprises a data receiving module, a data source analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a dump module, a cloud storage module, a data retrieval module, an identity verification module and a login module, wherein the data receiving module is used for receiving data; the data receiving module is in communication connection with the data source analyzing module, the data source analyzing module is in communication connection with the virus scanning module, the external virus characteristic information collecting module is in communication connection with the virus scanning module, the virus scanning module is in communication connection with the data processing module, the data processing module is in communication connection with the data classifying module, and the data classifying module is in communication connection with the data storage module; the invention can better ensure the safety of the stored data, and simultaneously, the system can be more conveniently used and is more suitable for popularization and application.

Description

Intelligent electronic information storage system for industrial management
Technical Field
The invention belongs to the field of information storage, relates to an intelligent storage and utilization technology, and particularly relates to an electronic information intelligent storage system for industrial management.
Background
The storage of information is an important aspect of an information system, if the information is not stored, the collected and processed information cannot be fully utilized, and meanwhile, the information is collected and processed again by consuming resources, people and objects, and the information storage is provided, so that the information can be taken at any time, conditions are created for the multifunctional utilization of unit information, and the cost is greatly reduced. The intelligent electronic information storage system has the advantages of extremely high access speed, large data storage amount, various information storage types, wide application range and capability of being used in the industrial management process.
In the use process of the existing information storage system, data is not analyzed in the process of inputting information, and virus data mixed in the data is easily brought into the system, so that the data stored in the system is easily stolen, meanwhile, a user is not safe enough only through simple account password verification when logging in the system, certain influence is also brought to the use of the system, and a solution is provided for solving the defects.
Disclosure of Invention
The invention aims to provide an electronic information intelligent storage system for industrial management.
The technical problem to be solved by the invention is as follows:
(1) how to better improve the safety of the system;
(2) how to make the system more intelligent and convenient;
the purpose of the invention can be realized by the following technical scheme:
an electronic information intelligent storage system for industrial management comprises a data receiving module, a data source analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a dump module, a cloud storage module, a data retrieval module, an identity verification module and a login module;
the system comprises a data receiving module, a data source analyzing module, a virus scanning module, an external virus characteristic information collecting module, a data processing module, a data classifying module, a data storage module, a transferring module, a communication connecting module, a data retrieving module, an identity verifying module and a login module, wherein the data receiving module is in communication connection with the data source analyzing module, the data source analyzing module is in communication connection with the virus scanning module, the external virus characteristic information collecting module is in communication connection with the virus scanning module, the virus scanning module is in communication connection with the data processing module, the data processing module is in communication connection with the data classifying module, the data classifying module is in communication connection with the data storage module, the data storage module is in communication connection with the transferring module, the transferring module is in communication connection with the;
the data receiving module is used for receiving data, the received data is sent to the data source analyzing module, the data source analyzing module is used for analyzing the source of the received data after receiving the data and sending the data to the virus scanning module after the data is analyzed, the virus scanning module is used for killing viruses of the analyzed data, the external virus characteristic information collecting module is used for collecting virus information characteristics in a network and sending the virus information characteristics to the virus scanning module, the virus scanning module is used for matching virus characteristics of the received data information after receiving the data, the data without matched viruses is sent to the data processing module for processing, the data processing module is used for marking time labels on the received data and sending the data to the data classifying module for classifying, the data classification module classifies the received data and sends the classified data to the data storage module for storage, the unloading module unloads the data stored in the data storage module into the cloud storage module for backup storage, the login module is used for a user to login the data retrieval module, the identity verification module is used for confirming the identity of a login user, and the data retrieval module starts to be used after the identity verification is provided;
the data source analysis module can record the IP address of the past data source and can also collect the IP address information of the received data, and the data source analysis module can compare the two data, and the specific comparison process is as follows:
the method comprises the following steps: the IP address of the past data source is marked as Kzi, i is 1 … … n;
step two: marking the IP address obtained from the real-time collected data as Czi, wherein i is 1 … … n;
step three: comparing Czi with Kzi and matching;
step four: when any one of Czi and Kzi is matched, the data is sent to the data processing module for processing after the matching is passed;
step five: when none of Czi and Kzi match, the data receiving module will send the received data to the virus scanning module for virus scanning;
the virus scanning module performs virus feature matching on data received in real time, and the specific matching process is as follows:
s1: marking the external virus characteristic information acquired by the external virus characteristic information acquisition module as Vi, i is 1 … … n;
s2: marking the collected data as SJi, i-1 … … n;
s3: SJi are scanned and the number of feature points SJi that meet the Vi signature is recorded;
s4: when the characteristic point which accords with the Vi characteristic is not scanned in SJi, the data is directly sent to a data processing module for processing;
s5: when the characteristic which is scanned out from SJi and accords with Vi is in the preset range, the characteristic is scanned out from SJi after secondary scanning, the data can not be recorded into the data processing module;
s6: when the characteristic meeting Vi is scanned out from SJi and exceeds the preset value, the data can not be input into the data processing module;
the data processing module will time stamp the received data.
Further, the specific setting process of the time tag is as follows:
SS 1: dividing 24h into six stages, wherein 0h-4h is a period a, 4h01s to 8h are b periods, 8h01s to 12h are c periods, 12h01s to 16h are d periods, 16h01s to 20h are e stages, and 20h01s to 23h59s are f stages;
SS 2: when the time for receiving the data is a period a, adding a mark a to the front of the data name;
SS 3: when the time for receiving the data is the b period, a mark b is added before the data name;
SS 4: when the time for receiving the data is the period c, adding a mark c to the front of the data name;
SS 5: when the time for receiving the data is d period, adding a mark d in front of the data name;
SS 6: when the time for receiving the data is the time period e, adding a mark e in front of the data name;
SS 7: when the time of receiving the data is f period, the data name is added with a mark f.
Further, the dump module compares the data pieces in the data storage module and the cloud storage module at a preset time point, and the specific comparison process is as follows:
(1): marking the information in the data storage module as CQ;
(2): marking the information in the cloud storage module as YQ;
(3): obtaining a difference value ZQ between the information amount in the data storage module and the information amount in the cloud storage module by a formula CQ-YQ;
(4): when the | ZQ | is larger than a preset value, the dump module directly copies and dump the information in the data storage module to the cloud storage module;
(5): when the | ZQ | is within the preset range, the system prompts a user to update manually;
(6): when the | ZQ | is smaller than the preset value, the unloading module unloads the information in the data storage module at preset time intervals.
Further, the login module is used for logging in the system when a user needs to use the data retrieval module to retrieve data, the authentication module can authenticate the user when the user logs in by using the login module, and the specific authentication process is as follows:
1): marking the time point when the user logs in the system for the first time and starts to input a login account as T1;
2): marking the time point when the user inputs the login account as T2;
3): the duration T of the account input by the user for the first time can be obtained through the formula T2-T1 ═ T;
4): marking t1 the time point when the user logs in the system for the first time, which is the input of the login password;
5): marking the time point when the user finishes inputting the login password as t 2;
6): the duration t of the account input by the user for the first time can be obtained through the formula t 2-t 1 ═ t;
7): the input duration coefficient Kt1 of the user can be obtained by the formula (T + T)/2 ═ Kt 1;
8): marking the time length coefficient input by the user in real time as Kt 2;
9): obtaining a difference value Kt through a formula Kt 2-KT 1 ═ Kt;
10): when the absolute value Kt is larger than the preset value, the login is not performed after the verification fails;
11): when | Kt | is smaller than a preset value or | Kt | ═ 0, that is, the verification is passed, the data can be logged into the data retrieval module for data retrieval.
The invention has the beneficial effects that:
(1) according to the invention, through the arranged information source analysis module and the virus scanning module, the data information sent by the IP address of the received data can be filtered through analyzing the IP address of the received data, so that the situation that the file stored in the system is stolen due to the fact that the virus data sent by an unknown IP reaches the system can be effectively avoided, meanwhile, the virus scanning module can be used for carrying out virus comparison on the data sent by the unknown IP, the situation that the data information is deleted by mistake can be avoided, the safety of the system for receiving the data is further ensured, and the situation that the data stored in the system is leaked is avoided;
(2) through the set identity authentication module, the identity of a user can be authenticated when the user logs in the data retrieval module by using the login module, and through a formula (T + T)/2-Kt 1, the input duration coefficient Kt1 of the user can be obtained, when the absolute value of Kt is greater than a preset value, authentication failure is not performed for logging in, when the absolute value of Kt is less than the preset value or the absolute value of Kt is 0, authentication is passed, and the user can log in the data retrieval module for data retrieval;
(3) according to the cloud storage system, the dump module can be used for collecting the information quantity information stored in the data storage module and the cloud storage module, the difference ZQ between the information quantity in the data storage module and the information quantity in the cloud storage module can be obtained by the formula CQ-YQ being ZQ, and automatic and prompt manual update of cloud data can be realized according to the change of the value of ZQ, so that the system is more intelligent and is more suitable for popularization and use.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, an intelligent electronic information storage system for industrial management includes a data receiving module, a data source analyzing module, a virus scanning module, a data processing module, a data classifying module, a data storage module, a dump module, a cloud storage module, a data retrieving module, an identity verifying module, and a login module;
the system comprises a data receiving module, a data source analyzing module, a virus scanning module, an external virus characteristic information collecting module, a data processing module, a data classifying module, a data storage module, a transferring module, a communication connecting module, a data retrieving module, an identity verifying module and a login module, wherein the data receiving module is in communication connection with the data source analyzing module, the data source analyzing module is in communication connection with the virus scanning module, the external virus characteristic information collecting module is in communication connection with the virus scanning module, the virus scanning module is in communication connection with the data processing module, the data processing module is in communication connection with the data classifying module, the data classifying module is in communication connection with the data storage module, the data storage module is in communication connection with the transferring module, the transferring module is in communication connection with the;
the data receiving module is used for receiving data, the received data is sent to the data source analyzing module, the data source analyzing module is used for analyzing the source of the received data after receiving the data and sending the data to the virus scanning module after the data is analyzed, the virus scanning module is used for killing viruses of the analyzed data, the external virus characteristic information collecting module is used for collecting virus information characteristics in a network and sending the virus information characteristics to the virus scanning module, the virus scanning module is used for matching virus characteristics of the received data information after receiving the data, the data without matched viruses is sent to the data processing module for processing, the data processing module is used for marking time labels on the received data and sending the data to the data classifying module for classifying, the data classification module classifies the received data and sends the classified data to the data storage module for storage, the unloading module unloads the data stored in the data storage module into the cloud storage module for backup storage, the login module is used for a user to login the data retrieval module, the identity verification module is used for confirming the identity of a login user, and the data retrieval module starts to be used after the identity verification is provided;
the data source analysis module can record the IP address of the past data source and can also collect the IP address information of the received data, and the data source analysis module can compare the two data, and the specific comparison process is as follows:
the method comprises the following steps: the IP address of the past data source is marked as Kzi, i is 1 … … n;
step two: marking the IP address obtained from the real-time collected data as Czi, wherein i is 1 … … n;
step three: comparing Czi with Kzi and matching;
step four: when any one of Czi and Kzi is matched, the data is sent to the data processing module for processing after the matching is passed;
step five: when none of Czi and Kzi match, the data receiving module will send the received data to the virus scanning module for virus scanning;
the virus scanning module performs virus feature matching on data received in real time, and the specific matching process is as follows:
s1: marking the external virus characteristic information acquired by the external virus characteristic information acquisition module as Vi, i is 1 … … n;
s2: marking the collected data as SJi, i-1 … … n;
s3: SJi are scanned and the number of feature points SJi that meet the Vi signature is recorded;
s4: when the characteristic point which accords with the Vi characteristic is not scanned in SJi, the data is directly sent to a data processing module for processing;
s5: when the characteristic which is scanned out from SJi and accords with Vi is in the preset range, the characteristic is scanned out from SJi after secondary scanning, the data can not be recorded into the data processing module;
s6: when the characteristic meeting Vi is scanned out from SJi and exceeds the preset value, the data can not be input into the data processing module;
the data processing module will time stamp the received data.
The specific setting process of the time tag is as follows:
SS 1: dividing 24h into six stages, wherein 0h-4h is a period a, 4h01s to 8h are b periods, 8h01s to 12h are c periods, 12h01s to 16h are d periods, 16h01s to 20h are e stages, and 20h01s to 23h59s are f stages;
SS 2: when the time for receiving the data is a period a, adding a mark a to the front of the data name;
SS 3: when the time for receiving the data is the b period, a mark b is added before the data name;
SS 4: when the time for receiving the data is the period c, adding a mark c to the front of the data name;
SS 5: when the time for receiving the data is d period, adding a mark d in front of the data name;
SS 6: when the time for receiving the data is the time period e, adding a mark e in front of the data name;
SS 7: when the time of receiving the data is f period, the data name is added with a mark f.
The unloading module can compare data pieces in the data storage module and the cloud storage module at a preset time point, and the specific comparison process is as follows:
(1): marking the information in the data storage module as CQ;
(2): marking the information in the cloud storage module as YQ;
(3): obtaining a difference value ZQ between the information amount in the data storage module and the information amount in the cloud storage module by a formula CQ-YQ;
(4): when the | ZQ | is larger than a preset value, the dump module directly copies and dump the information in the data storage module to the cloud storage module;
(5): when the | ZQ | is within the preset range, the system prompts a user to update manually;
(6): when the | ZQ | is smaller than the preset value, the unloading module unloads the information in the data storage module at preset time intervals.
The login module is used for logging in the system when a user needs to use the data retrieval module to retrieve data, the identity authentication module can authenticate the identity of the user when the user logs in by using the login module, and the specific authentication process is as follows:
1): marking the time point when the user logs in the system for the first time and starts to input a login account as T1;
2): marking the time point when the user inputs the login account as T2;
3): the duration T of the account input by the user for the first time can be obtained through the formula T2-T1 ═ T;
4): marking t1 the time point when the user logs in the system for the first time, which is the input of the login password;
5): marking the time point when the user finishes inputting the login password as t 2;
6): the duration t of the account input by the user for the first time can be obtained through the formula t 2-t 1 ═ t;
7): the input duration coefficient Kt1 of the user can be obtained by the formula (T + T)/2 ═ Kt 1;
8): marking the time length coefficient input by the user in real time as Kt 2;
9): obtaining a difference value Kt through a formula Kt 2-KT 1 ═ Kt;
10): when the absolute value Kt is larger than the preset value, the login is not performed after the verification fails;
11): when | Kt | is smaller than a preset value or | Kt | ═ 0, that is, the verification is passed, the data can be logged into the data retrieval module for data retrieval.
The data input module is also used for inputting preset values X1 and X2, the data input module is used for transmitting X1 and X2 to the controller, and the controller is used for returning X1 and X2 to the data statistics module.
An intelligent storage system of electronic information for industrial management is prepared as using data receiving module to receive data and sending received data to data source analysis module, carrying out source analysis on received data by data source analysis module, enabling to filter data information sent by position IP address by analyzing IP address of received data to effectively avoid condition of stealing file stored in said system caused by virus data sent by unknown IP, sending data to virus scanning module after analysis is finished, carrying out virus check and kill on analyzed data by virus scanning module, collecting virus information characteristics in network by external virus characteristic information collection module and sending virus information characteristics to virus scanning module, the virus scanning module performs virus characteristic matching on received data information after receiving the data, the virus scanning module can perform virus comparison on the data sent by an unknown IP, the situation that the data information is deleted by mistake can be avoided, the safety of the data received by the system is further ensured, the situation that the data stored in the system is leaked is avoided, the data without matched viruses can be sent to the data processing module for processing, the data processing module is used for marking a time tag on the received data and sending the data to the data classification module for classification, the data classification module can classify the received data and send the classified data to the data storage module for storage, and the dump module can dump the data stored in the data storage module into a cloud storage module for backup storage, the login module is used for a user to log in the data retrieval module, the identity verification module is used for confirming the identity of a login user, and the data retrieval module can be used after the identity verification is provided.
Firstly, the data information sent by the IP address of the position can be filtered by analyzing the IP address of the received data through the arranged information source analysis module and the virus scanning module, so that the condition that the file stored in the system is stolen because the virus data sent by an unknown IP reaches the system can be effectively avoided, meanwhile, the virus comparison can be carried out on the data sent by the unknown IP through the arranged virus scanning module, the condition that the data information is deleted by mistake can be avoided, the safety of the system for receiving the data is further ensured, and the condition that the data stored in the system is leaked is avoided;
secondly, through the set identity authentication module, when a user logs in the data retrieval module by using the login module, the identity of the user can be authenticated, and through a formula (T + T)/2-Kt 1, the input duration coefficient Kt1 of the user can be obtained, when the absolute value of Kt is greater than a preset value, authentication failure is not performed for logging in, when the absolute value of Kt is less than the preset value or the absolute value of Kt is 0, authentication is passed, and the user can log in the data retrieval module for data retrieval;
finally, the information quantity information stored in the data storage module and the cloud storage module can be collected through the dump module, the difference ZQ between the information quantity in the data storage module and the information quantity in the cloud storage module can be obtained through the formula CQ-YQ being ZQ, automatic and prompt manual update of the cloud data can be achieved according to the change of the value of the ZQ, and therefore the system is more intelligent and more suitable for popularization and use.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (4)

1. An electronic information intelligent storage system for industrial management is characterized by comprising a data receiving module, a data source analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a dump module, a cloud storage module, a data retrieval module, an identity verification module and a login module;
the system comprises a data receiving module, a data source analyzing module, a virus scanning module, an external virus characteristic information collecting module, a data processing module, a data classifying module, a data storage module, a transferring module, a communication connecting module, a data retrieving module, an identity verifying module and a login module, wherein the data receiving module is in communication connection with the data source analyzing module, the data source analyzing module is in communication connection with the virus scanning module, the external virus characteristic information collecting module is in communication connection with the virus scanning module, the virus scanning module is in communication connection with the data processing module, the data processing module is in communication connection with the data classifying module, the data classifying module is in communication connection with the data storage module, the data storage module is in communication connection with the transferring module, the transferring module is in communication connection with the;
the data receiving module is used for receiving data, the received data is sent to the data source analyzing module, the data source analyzing module is used for analyzing the source of the received data after receiving the data and sending the data to the virus scanning module after the data is analyzed, the virus scanning module is used for killing viruses of the analyzed data, the external virus characteristic information collecting module is used for collecting virus information characteristics in a network and sending the virus information characteristics to the virus scanning module, the virus scanning module is used for matching virus characteristics of the received data information after receiving the data, the data without matched viruses is sent to the data processing module for processing, the data processing module is used for marking time labels on the received data and sending the data to the data classifying module for classifying, the data classification module classifies the received data and sends the classified data to the data storage module for storage, the unloading module unloads the data stored in the data storage module into the cloud storage module for backup storage, the login module is used for a user to login the data retrieval module, the identity verification module is used for confirming the identity of a login user, and the data retrieval module starts to be used after the identity verification is provided;
the data source analysis module can record the IP address of the past data source and can also collect the IP address information of the received data, and the data source analysis module can compare the two data, and the specific comparison process is as follows:
the method comprises the following steps: the IP address of the past data source is marked as Kzi, i is 1 … … n;
step two: marking the IP address obtained from the real-time collected data as Czi, wherein i is 1 … … n;
step three: comparing Czi with Kzi and matching;
step four: when any one of Czi and Kzi is matched, the data is sent to the data processing module for processing after the matching is passed;
step five: when none of Czi and Kzi match, the data receiving module will send the received data to the virus scanning module for virus scanning;
the virus scanning module performs virus feature matching on data received in real time, and the specific matching process is as follows:
s1: marking the external virus characteristic information acquired by the external virus characteristic information acquisition module as Vi, i is 1 … … n;
s2: marking the collected data as SJi, i-1 … … n;
s3: SJi are scanned and the number of feature points SJi that meet the Vi signature is recorded;
s4: when the characteristic point which accords with the Vi characteristic is not scanned in SJi, the data is directly sent to a data processing module for processing;
s5: when the characteristic which is scanned out from SJi and accords with Vi is in the preset range, the characteristic is scanned out from SJi after secondary scanning, the data can not be recorded into the data processing module;
s6: when the characteristic meeting Vi is scanned out from SJi and exceeds the preset value, the data can not be input into the data processing module;
the data processing module will time stamp the received data.
2. The intelligent storage system for electronic information used for industrial management according to claim 1, characterized in that, the specific setting process of the time tag is as follows:
SS 1: dividing 24h into six stages, wherein 0h-4h is a period a, 4h01s to 8h are b periods, 8h01s to 12h are c periods, 12h01s to 16h are d periods, 16h01s to 20h are e stages, and 20h01s to 23h59s are f stages;
SS 2: when the time for receiving the data is a period a, adding a mark a to the front of the data name;
SS 3: when the time for receiving the data is the b period, a mark b is added before the data name;
SS 4: when the time for receiving the data is the period c, adding a mark c to the front of the data name;
SS 5: when the time for receiving the data is d period, adding a mark d in front of the data name;
SS 6: when the time for receiving the data is the time period e, adding a mark e in front of the data name;
SS 7: when the time of receiving the data is f period, the data name is added with a mark f.
3. The system of claim 1, wherein the dump module compares the data elements in the data storage module and the cloud storage module at a predetermined time point, and the comparison process comprises:
(1): marking the information in the data storage module as CQ;
(2): marking the information in the cloud storage module as YQ;
(3): obtaining a difference value ZQ between the information amount in the data storage module and the information amount in the cloud storage module by a formula CQ-YQ;
(4): when the | ZQ | is larger than a preset value, the dump module directly copies and dump the information in the data storage module to the cloud storage module;
(5): when the | ZQ | is within the preset range, the system prompts a user to update manually;
(6): when the | ZQ | is smaller than the preset value, the unloading module unloads the information in the data storage module at preset time intervals.
4. The intelligent electronic information storage system for industrial management as claimed in claim 1, wherein the login module is used for a user to log in the system when the user needs to use the data retrieval module to retrieve data, the authentication module will authenticate the user when the user logs in using the login module, and the authentication process is as follows:
1): marking the time point when the user logs in the system for the first time and starts to input a login account as T1;
2): marking the time point when the user inputs the login account as T2;
3): the duration T of the account input by the user for the first time can be obtained through the formula T2-T1 ═ T;
4): marking t1 the time point when the user logs in the system for the first time, which is the input of the login password;
5): marking the time point when the user finishes inputting the login password as t 2;
6): the duration t of the account input by the user for the first time can be obtained through the formula t 2-t 1 ═ t;
7): the input duration coefficient Kt1 of the user can be obtained by the formula (T + T)/2 ═ Kt 1;
8): marking the time length coefficient input by the user in real time as Kt 2;
9): the difference value Kt can be obtained through the formula Kt 2-KT 1 ═ Kt;
10): when the absolute value Kt is larger than the preset value, the login is not performed after the verification fails;
11): when | Kt | is smaller than a preset value or | Kt | ═ 0, that is, the verification is passed, the data can be logged into the data retrieval module for data retrieval.
CN201910285492.6A 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management Active CN110008704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910285492.6A CN110008704B (en) 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910285492.6A CN110008704B (en) 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management

Publications (2)

Publication Number Publication Date
CN110008704A CN110008704A (en) 2019-07-12
CN110008704B true CN110008704B (en) 2020-01-24

Family

ID=67170830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910285492.6A Active CN110008704B (en) 2019-04-10 2019-04-10 Intelligent electronic information storage system for industrial management

Country Status (1)

Country Link
CN (1) CN110008704B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143280B (en) * 2019-12-31 2023-10-10 广州广电运通信息科技有限公司 Data scheduling method, system, device and storage medium
CN111625822A (en) * 2020-04-07 2020-09-04 重庆云君教育科技有限公司 Cloud resource storage management device and method
CN112163203A (en) * 2020-10-13 2021-01-01 合肥泽延微电子有限公司 Database management system for integrated circuit design
CN113297444A (en) * 2021-05-10 2021-08-24 广东白云学院 Big data classification management system
CN116225216A (en) * 2023-01-04 2023-06-06 湖北工业大学 Tea culture display system based on AR technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107943661A (en) * 2017-12-12 2018-04-20 温州市联科科技有限公司 A kind of data storage management system
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN108900537A (en) * 2018-07-30 2018-11-27 九江学院 A kind of data acquisition device applied to cloud auditing system
CN109583205A (en) * 2018-11-23 2019-04-05 江苏华存电子科技有限公司 A kind of data information security management method
CN109587130A (en) * 2018-11-29 2019-04-05 贵州航天云网科技有限公司 One kind being based on the consistent integrated operation support system of RTI space-time

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9215240B2 (en) * 2013-07-25 2015-12-15 Splunk Inc. Investigative and dynamic detection of potential security-threat indicators from events in big data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107943661A (en) * 2017-12-12 2018-04-20 温州市联科科技有限公司 A kind of data storage management system
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN108900537A (en) * 2018-07-30 2018-11-27 九江学院 A kind of data acquisition device applied to cloud auditing system
CN109583205A (en) * 2018-11-23 2019-04-05 江苏华存电子科技有限公司 A kind of data information security management method
CN109587130A (en) * 2018-11-29 2019-04-05 贵州航天云网科技有限公司 One kind being based on the consistent integrated operation support system of RTI space-time

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"云环境下用户数据存储安全问题研究";海佳佳;《中国优秀硕士学位论文全文数据库 信息科技辑》;20160515(第2016-05期);第I137-21页,正文第5章 *

Also Published As

Publication number Publication date
CN110008704A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN110008704B (en) Intelligent electronic information storage system for industrial management
US20100088197A1 (en) Systems and methods for generating remote system inventory capable of differential update reports
CN105138709B (en) Remote evidence taking system based on physical memory analysis
CN111866016A (en) Log analysis method and system
CN109190368B (en) SQL injection detection device and SQL injection detection method
CN111885210A (en) Cloud computing network monitoring system based on end user environment
CN107454118A (en) Identifying code acquisition methods and device, login method and system
CN111935064A (en) Industrial control network threat automatic isolation method and system
CN114491524A (en) Big data communication system applied to intelligent network security
CN114297231A (en) Method for intelligently collecting logs and data and quickly forming relational topology
CN103810417A (en) Method for releasing alerting signal on the basis of unconformity of host identify and authentication terminal thereof
CN104333538A (en) Network device access method
CN117370286A (en) Cloud platform-based data storage method, system and equipment
CN116319081B (en) Electronic signature security management system based on big data cloud platform
CN110457351B (en) Government financing platform data information-based management system and management method
CN111368334A (en) Safety maintenance system based on data asset data in database
CN110619209A (en) Method and system for analyzing and judging web intrusion event
US9742641B2 (en) System and method for identifying real users behind application servers
CN113486391A (en) Financial data processing method based on cloud computing
CN110266562B (en) Method for automatically detecting identity authentication function of network application system
CN114866546A (en) PaaS-based one-stop management system for monitoring platform
CN114037270A (en) Industrial control safety evaluation system and method
CN102446227A (en) Interactive semi-automatic security accident tracing method and system
CN113076355A (en) Method for sensing data security flow situation
CN111126762A (en) Intelligent workflow engine for electric power cloud security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221014

Address after: 230000 Room 203, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee after: Hefei Jiuzhou Longteng scientific and technological achievement transformation Co.,Ltd.

Address before: 467036 Henan province Pingdingshan city new city Longxiang Road

Patentee before: Henan University of Urban Construction

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221111

Address after: 518055 401-402, Building C, Xanadu Creative Park, No. 5, Pingshan 1st Road, Pingshan Community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong

Patentee after: Shenzhen Yihua Intelligent Technology Co.,Ltd.

Address before: 230000 Room 203, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province

Patentee before: Hefei Jiuzhou Longteng scientific and technological achievement transformation Co.,Ltd.

TR01 Transfer of patent right