Intelligent electronic information storage system for industrial management
Technical Field
The invention belongs to the field of information storage, relates to an intelligent storage and utilization technology, and particularly relates to an electronic information intelligent storage system for industrial management.
Background
The storage of information is an important aspect of an information system, if the information is not stored, the collected and processed information cannot be fully utilized, and meanwhile, the information is collected and processed again by consuming resources, people and objects, and the information storage is provided, so that the information can be taken at any time, conditions are created for the multifunctional utilization of unit information, and the cost is greatly reduced. The intelligent electronic information storage system has the advantages of extremely high access speed, large data storage amount, various information storage types, wide application range and capability of being used in the industrial management process.
In the use process of the existing information storage system, data is not analyzed in the process of inputting information, and virus data mixed in the data is easily brought into the system, so that the data stored in the system is easily stolen, meanwhile, a user is not safe enough only through simple account password verification when logging in the system, certain influence is also brought to the use of the system, and a solution is provided for solving the defects.
Disclosure of Invention
The invention aims to provide an electronic information intelligent storage system for industrial management.
The technical problem to be solved by the invention is as follows:
(1) how to better improve the safety of the system;
(2) how to make the system more intelligent and convenient;
the purpose of the invention can be realized by the following technical scheme:
an electronic information intelligent storage system for industrial management comprises a data receiving module, a data source analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a dump module, a cloud storage module, a data retrieval module, an identity verification module and a login module;
the system comprises a data receiving module, a data source analyzing module, a virus scanning module, an external virus characteristic information collecting module, a data processing module, a data classifying module, a data storage module, a transferring module, a communication connecting module, a data retrieving module, an identity verifying module and a login module, wherein the data receiving module is in communication connection with the data source analyzing module, the data source analyzing module is in communication connection with the virus scanning module, the external virus characteristic information collecting module is in communication connection with the virus scanning module, the virus scanning module is in communication connection with the data processing module, the data processing module is in communication connection with the data classifying module, the data classifying module is in communication connection with the data storage module, the data storage module is in communication connection with the transferring module, the transferring module is in communication connection with the;
the data receiving module is used for receiving data, the received data is sent to the data source analyzing module, the data source analyzing module is used for analyzing the source of the received data after receiving the data and sending the data to the virus scanning module after the data is analyzed, the virus scanning module is used for killing viruses of the analyzed data, the external virus characteristic information collecting module is used for collecting virus information characteristics in a network and sending the virus information characteristics to the virus scanning module, the virus scanning module is used for matching virus characteristics of the received data information after receiving the data, the data without matched viruses is sent to the data processing module for processing, the data processing module is used for marking time labels on the received data and sending the data to the data classifying module for classifying, the data classification module classifies the received data and sends the classified data to the data storage module for storage, the unloading module unloads the data stored in the data storage module into the cloud storage module for backup storage, the login module is used for a user to login the data retrieval module, the identity verification module is used for confirming the identity of a login user, and the data retrieval module starts to be used after the identity verification is provided;
the data source analysis module can record the IP address of the past data source and can also collect the IP address information of the received data, and the data source analysis module can compare the two data, and the specific comparison process is as follows:
the method comprises the following steps: the IP address of the past data source is marked as Kzi, i is 1 … … n;
step two: marking the IP address obtained from the real-time collected data as Czi, wherein i is 1 … … n;
step three: comparing Czi with Kzi and matching;
step four: when any one of Czi and Kzi is matched, the data is sent to the data processing module for processing after the matching is passed;
step five: when none of Czi and Kzi match, the data receiving module will send the received data to the virus scanning module for virus scanning;
the virus scanning module performs virus feature matching on data received in real time, and the specific matching process is as follows:
s1: marking the external virus characteristic information acquired by the external virus characteristic information acquisition module as Vi, i is 1 … … n;
s2: marking the collected data as SJi, i-1 … … n;
s3: SJi are scanned and the number of feature points SJi that meet the Vi signature is recorded;
s4: when the characteristic point which accords with the Vi characteristic is not scanned in SJi, the data is directly sent to a data processing module for processing;
s5: when the characteristic which is scanned out from SJi and accords with Vi is in the preset range, the characteristic is scanned out from SJi after secondary scanning, the data can not be recorded into the data processing module;
s6: when the characteristic meeting Vi is scanned out from SJi and exceeds the preset value, the data can not be input into the data processing module;
the data processing module will time stamp the received data.
Further, the specific setting process of the time tag is as follows:
SS 1: dividing 24h into six stages, wherein 0h-4h is a period a, 4h01s to 8h are b periods, 8h01s to 12h are c periods, 12h01s to 16h are d periods, 16h01s to 20h are e stages, and 20h01s to 23h59s are f stages;
SS 2: when the time for receiving the data is a period a, adding a mark a to the front of the data name;
SS 3: when the time for receiving the data is the b period, a mark b is added before the data name;
SS 4: when the time for receiving the data is the period c, adding a mark c to the front of the data name;
SS 5: when the time for receiving the data is d period, adding a mark d in front of the data name;
SS 6: when the time for receiving the data is the time period e, adding a mark e in front of the data name;
SS 7: when the time of receiving the data is f period, the data name is added with a mark f.
Further, the dump module compares the data pieces in the data storage module and the cloud storage module at a preset time point, and the specific comparison process is as follows:
(1): marking the information in the data storage module as CQ;
(2): marking the information in the cloud storage module as YQ;
(3): obtaining a difference value ZQ between the information amount in the data storage module and the information amount in the cloud storage module by a formula CQ-YQ;
(4): when the | ZQ | is larger than a preset value, the dump module directly copies and dump the information in the data storage module to the cloud storage module;
(5): when the | ZQ | is within the preset range, the system prompts a user to update manually;
(6): when the | ZQ | is smaller than the preset value, the unloading module unloads the information in the data storage module at preset time intervals.
Further, the login module is used for logging in the system when a user needs to use the data retrieval module to retrieve data, the authentication module can authenticate the user when the user logs in by using the login module, and the specific authentication process is as follows:
1): marking the time point when the user logs in the system for the first time and starts to input a login account as T1;
2): marking the time point when the user inputs the login account as T2;
3): the duration T of the account input by the user for the first time can be obtained through the formula T2-T1 ═ T;
4): marking t1 the time point when the user logs in the system for the first time, which is the input of the login password;
5): marking the time point when the user finishes inputting the login password as t 2;
6): the duration t of the account input by the user for the first time can be obtained through the formula t 2-t 1 ═ t;
7): the input duration coefficient Kt1 of the user can be obtained by the formula (T + T)/2 ═ Kt 1;
8): marking the time length coefficient input by the user in real time as Kt 2;
9): obtaining a difference value Kt through a formula Kt 2-KT 1 ═ Kt;
10): when the absolute value Kt is larger than the preset value, the login is not performed after the verification fails;
11): when | Kt | is smaller than a preset value or | Kt | ═ 0, that is, the verification is passed, the data can be logged into the data retrieval module for data retrieval.
The invention has the beneficial effects that:
(1) according to the invention, through the arranged information source analysis module and the virus scanning module, the data information sent by the IP address of the received data can be filtered through analyzing the IP address of the received data, so that the situation that the file stored in the system is stolen due to the fact that the virus data sent by an unknown IP reaches the system can be effectively avoided, meanwhile, the virus scanning module can be used for carrying out virus comparison on the data sent by the unknown IP, the situation that the data information is deleted by mistake can be avoided, the safety of the system for receiving the data is further ensured, and the situation that the data stored in the system is leaked is avoided;
(2) through the set identity authentication module, the identity of a user can be authenticated when the user logs in the data retrieval module by using the login module, and through a formula (T + T)/2-Kt 1, the input duration coefficient Kt1 of the user can be obtained, when the absolute value of Kt is greater than a preset value, authentication failure is not performed for logging in, when the absolute value of Kt is less than the preset value or the absolute value of Kt is 0, authentication is passed, and the user can log in the data retrieval module for data retrieval;
(3) according to the cloud storage system, the dump module can be used for collecting the information quantity information stored in the data storage module and the cloud storage module, the difference ZQ between the information quantity in the data storage module and the information quantity in the cloud storage module can be obtained by the formula CQ-YQ being ZQ, and automatic and prompt manual update of cloud data can be realized according to the change of the value of ZQ, so that the system is more intelligent and is more suitable for popularization and use.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, an intelligent electronic information storage system for industrial management includes a data receiving module, a data source analyzing module, a virus scanning module, a data processing module, a data classifying module, a data storage module, a dump module, a cloud storage module, a data retrieving module, an identity verifying module, and a login module;
the system comprises a data receiving module, a data source analyzing module, a virus scanning module, an external virus characteristic information collecting module, a data processing module, a data classifying module, a data storage module, a transferring module, a communication connecting module, a data retrieving module, an identity verifying module and a login module, wherein the data receiving module is in communication connection with the data source analyzing module, the data source analyzing module is in communication connection with the virus scanning module, the external virus characteristic information collecting module is in communication connection with the virus scanning module, the virus scanning module is in communication connection with the data processing module, the data processing module is in communication connection with the data classifying module, the data classifying module is in communication connection with the data storage module, the data storage module is in communication connection with the transferring module, the transferring module is in communication connection with the;
the data receiving module is used for receiving data, the received data is sent to the data source analyzing module, the data source analyzing module is used for analyzing the source of the received data after receiving the data and sending the data to the virus scanning module after the data is analyzed, the virus scanning module is used for killing viruses of the analyzed data, the external virus characteristic information collecting module is used for collecting virus information characteristics in a network and sending the virus information characteristics to the virus scanning module, the virus scanning module is used for matching virus characteristics of the received data information after receiving the data, the data without matched viruses is sent to the data processing module for processing, the data processing module is used for marking time labels on the received data and sending the data to the data classifying module for classifying, the data classification module classifies the received data and sends the classified data to the data storage module for storage, the unloading module unloads the data stored in the data storage module into the cloud storage module for backup storage, the login module is used for a user to login the data retrieval module, the identity verification module is used for confirming the identity of a login user, and the data retrieval module starts to be used after the identity verification is provided;
the data source analysis module can record the IP address of the past data source and can also collect the IP address information of the received data, and the data source analysis module can compare the two data, and the specific comparison process is as follows:
the method comprises the following steps: the IP address of the past data source is marked as Kzi, i is 1 … … n;
step two: marking the IP address obtained from the real-time collected data as Czi, wherein i is 1 … … n;
step three: comparing Czi with Kzi and matching;
step four: when any one of Czi and Kzi is matched, the data is sent to the data processing module for processing after the matching is passed;
step five: when none of Czi and Kzi match, the data receiving module will send the received data to the virus scanning module for virus scanning;
the virus scanning module performs virus feature matching on data received in real time, and the specific matching process is as follows:
s1: marking the external virus characteristic information acquired by the external virus characteristic information acquisition module as Vi, i is 1 … … n;
s2: marking the collected data as SJi, i-1 … … n;
s3: SJi are scanned and the number of feature points SJi that meet the Vi signature is recorded;
s4: when the characteristic point which accords with the Vi characteristic is not scanned in SJi, the data is directly sent to a data processing module for processing;
s5: when the characteristic which is scanned out from SJi and accords with Vi is in the preset range, the characteristic is scanned out from SJi after secondary scanning, the data can not be recorded into the data processing module;
s6: when the characteristic meeting Vi is scanned out from SJi and exceeds the preset value, the data can not be input into the data processing module;
the data processing module will time stamp the received data.
The specific setting process of the time tag is as follows:
SS 1: dividing 24h into six stages, wherein 0h-4h is a period a, 4h01s to 8h are b periods, 8h01s to 12h are c periods, 12h01s to 16h are d periods, 16h01s to 20h are e stages, and 20h01s to 23h59s are f stages;
SS 2: when the time for receiving the data is a period a, adding a mark a to the front of the data name;
SS 3: when the time for receiving the data is the b period, a mark b is added before the data name;
SS 4: when the time for receiving the data is the period c, adding a mark c to the front of the data name;
SS 5: when the time for receiving the data is d period, adding a mark d in front of the data name;
SS 6: when the time for receiving the data is the time period e, adding a mark e in front of the data name;
SS 7: when the time of receiving the data is f period, the data name is added with a mark f.
The unloading module can compare data pieces in the data storage module and the cloud storage module at a preset time point, and the specific comparison process is as follows:
(1): marking the information in the data storage module as CQ;
(2): marking the information in the cloud storage module as YQ;
(3): obtaining a difference value ZQ between the information amount in the data storage module and the information amount in the cloud storage module by a formula CQ-YQ;
(4): when the | ZQ | is larger than a preset value, the dump module directly copies and dump the information in the data storage module to the cloud storage module;
(5): when the | ZQ | is within the preset range, the system prompts a user to update manually;
(6): when the | ZQ | is smaller than the preset value, the unloading module unloads the information in the data storage module at preset time intervals.
The login module is used for logging in the system when a user needs to use the data retrieval module to retrieve data, the identity authentication module can authenticate the identity of the user when the user logs in by using the login module, and the specific authentication process is as follows:
1): marking the time point when the user logs in the system for the first time and starts to input a login account as T1;
2): marking the time point when the user inputs the login account as T2;
3): the duration T of the account input by the user for the first time can be obtained through the formula T2-T1 ═ T;
4): marking t1 the time point when the user logs in the system for the first time, which is the input of the login password;
5): marking the time point when the user finishes inputting the login password as t 2;
6): the duration t of the account input by the user for the first time can be obtained through the formula t 2-t 1 ═ t;
7): the input duration coefficient Kt1 of the user can be obtained by the formula (T + T)/2 ═ Kt 1;
8): marking the time length coefficient input by the user in real time as Kt 2;
9): obtaining a difference value Kt through a formula Kt 2-KT 1 ═ Kt;
10): when the absolute value Kt is larger than the preset value, the login is not performed after the verification fails;
11): when | Kt | is smaller than a preset value or | Kt | ═ 0, that is, the verification is passed, the data can be logged into the data retrieval module for data retrieval.
The data input module is also used for inputting preset values X1 and X2, the data input module is used for transmitting X1 and X2 to the controller, and the controller is used for returning X1 and X2 to the data statistics module.
An intelligent storage system of electronic information for industrial management is prepared as using data receiving module to receive data and sending received data to data source analysis module, carrying out source analysis on received data by data source analysis module, enabling to filter data information sent by position IP address by analyzing IP address of received data to effectively avoid condition of stealing file stored in said system caused by virus data sent by unknown IP, sending data to virus scanning module after analysis is finished, carrying out virus check and kill on analyzed data by virus scanning module, collecting virus information characteristics in network by external virus characteristic information collection module and sending virus information characteristics to virus scanning module, the virus scanning module performs virus characteristic matching on received data information after receiving the data, the virus scanning module can perform virus comparison on the data sent by an unknown IP, the situation that the data information is deleted by mistake can be avoided, the safety of the data received by the system is further ensured, the situation that the data stored in the system is leaked is avoided, the data without matched viruses can be sent to the data processing module for processing, the data processing module is used for marking a time tag on the received data and sending the data to the data classification module for classification, the data classification module can classify the received data and send the classified data to the data storage module for storage, and the dump module can dump the data stored in the data storage module into a cloud storage module for backup storage, the login module is used for a user to log in the data retrieval module, the identity verification module is used for confirming the identity of a login user, and the data retrieval module can be used after the identity verification is provided.
Firstly, the data information sent by the IP address of the position can be filtered by analyzing the IP address of the received data through the arranged information source analysis module and the virus scanning module, so that the condition that the file stored in the system is stolen because the virus data sent by an unknown IP reaches the system can be effectively avoided, meanwhile, the virus comparison can be carried out on the data sent by the unknown IP through the arranged virus scanning module, the condition that the data information is deleted by mistake can be avoided, the safety of the system for receiving the data is further ensured, and the condition that the data stored in the system is leaked is avoided;
secondly, through the set identity authentication module, when a user logs in the data retrieval module by using the login module, the identity of the user can be authenticated, and through a formula (T + T)/2-Kt 1, the input duration coefficient Kt1 of the user can be obtained, when the absolute value of Kt is greater than a preset value, authentication failure is not performed for logging in, when the absolute value of Kt is less than the preset value or the absolute value of Kt is 0, authentication is passed, and the user can log in the data retrieval module for data retrieval;
finally, the information quantity information stored in the data storage module and the cloud storage module can be collected through the dump module, the difference ZQ between the information quantity in the data storage module and the information quantity in the cloud storage module can be obtained through the formula CQ-YQ being ZQ, automatic and prompt manual update of the cloud data can be achieved according to the change of the value of the ZQ, and therefore the system is more intelligent and more suitable for popularization and use.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.