CN110717078A - Beauty shop business data monitoring method, device, equipment and medium - Google Patents

Beauty shop business data monitoring method, device, equipment and medium Download PDF

Info

Publication number
CN110717078A
CN110717078A CN201910871087.2A CN201910871087A CN110717078A CN 110717078 A CN110717078 A CN 110717078A CN 201910871087 A CN201910871087 A CN 201910871087A CN 110717078 A CN110717078 A CN 110717078A
Authority
CN
China
Prior art keywords
data
converted
character string
recognized
monitoring method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910871087.2A
Other languages
Chinese (zh)
Inventor
王玲
贺丹琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Anyuanga Information Technology Co Ltd
Original Assignee
Wuhan Anyuanga Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Anyuanga Information Technology Co Ltd filed Critical Wuhan Anyuanga Information Technology Co Ltd
Priority to CN201910871087.2A priority Critical patent/CN110717078A/en
Publication of CN110717078A publication Critical patent/CN110717078A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Strategic Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a beauty shop business data monitoring method, a device, equipment and a medium. The method comprises the following steps: acquiring branch shop business data in real time, and extracting data to be converted from the branch shop business data, wherein the data to be converted comprises: registering user data, project appointment data and financial data; acquiring local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and acquiring recognized character strings; the method and the system have the advantages that the recognized character strings are stored in the character string database, store data are converted into a character string form, monitoring strength of a main shop on the store data can be enhanced, the store data are encrypted, the store data are decrypted before conversion, accordingly, data can be effectively prevented from being tampered, and authenticity of the store data is improved.

Description

Beauty shop business data monitoring method, device, equipment and medium
Technical Field
The invention relates to the technical field of internet, in particular to a beauty shop business data monitoring method, a device, equipment and a medium.
Background
With the development of the times, the internet and the lives of people are closer and closer, and a plurality of shops are connected with the internet and monitored through the network.
However, at present, many beauty shops do not pay attention to monitoring of branch shop business data, and the same beauty shops do not have a complete flow for monitoring of branch shop business data, so that when a head office views the branch shop business data, useful data cannot be obtained often, how to effectively monitor the branch shop business data is achieved, and the problem that the management and control of the head office on the branch shop is strengthened becomes an urgent need to be solved.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
In view of this, the invention provides a beauty shop business data monitoring method, device, equipment and medium, and aims to solve the technical problem that the prior art cannot effectively monitor the shop business data of branch shops.
The technical scheme of the invention is realized as follows:
in one aspect, the invention provides a beauty shop data monitoring method, which comprises the following steps:
s1, acquiring branch shop data in real time, and extracting data to be converted from the branch shop data, wherein the data to be converted comprises: registering user data, project appointment data and financial data;
s2, obtaining local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and obtaining recognized character strings;
and S3, storing the recognized character string into a character string database.
On the basis of the above technical solution, preferably, in step S2, converting the data to be converted into a character string to be recognized, recognizing the character string to be recognized according to a character string database, and obtaining a recognized character string, further comprising the steps of converting the data to be converted into the character string to be recognized, recognizing the character string according to the character string database, and if the character string can be successfully recognized by the character database, taking the successfully recognized character string as the character string to be stored; and if the character string database does not successfully identify the character string, reselecting the character string for identification, and identifying the character string according to the character string database.
On the basis of the technical scheme, preferably, before converting the data to be converted into the character string to be identified, the method further comprises the following steps of obtaining an identification code corresponding to the unique password from the password generator, decrypting the encrypted data to be converted according to the identification code, and converting the data to be converted into the character string to be identified if the identification code successfully decrypts the encrypted data to be converted; and if the identification code cannot successfully decrypt the encrypted data to be converted, the encrypted data to be converted is obtained again.
On the basis of the technical scheme, preferably, an identification code corresponding to the unique password is acquired from the password generator, and the encrypted data to be converted is decrypted according to the identification code, and the method further comprises the following steps of setting a decryption time threshold, acquiring decryption time for decrypting the encrypted data to be converted in real time, comparing the decryption time with the decryption time threshold, and converting the data to be converted into a character string to be identified if the decryption time is less than the decryption time threshold; if the decryption time is larger than the decryption time threshold, the data is abnormal, and alarm information is sent to the user.
On the basis of the above technical solution, preferably, in step S1, the branch shop data is obtained in real time, and the data to be converted is extracted from the branch shop data, where the data to be converted includes: registering user data, project reservation data and financial data, and further comprising the following steps of extracting feature words of the data to be converted, wherein the feature words comprise: and marking different data to be converted by the user, the project and the finance according to the feature word pair of the data to be converted.
On the basis of the technical scheme, preferably, the method includes the steps of acquiring branch shop data in real time and extracting data to be converted from the branch shop data, establishing a password generator, acquiring the branch shop data in real time, distributing a unique password to the data to be converted after the data to be converted is extracted from the branch shop data, encrypting the data to be converted according to the unique password, and acquiring the encrypted data to be converted.
On the basis of the above technical solution, preferably, in step S3, the recognized character string is stored in a character string database, and the method further includes the steps of establishing different character string databases according to the feature words of each data to be converted, extracting the feature words of the recognized character string, and storing the corresponding character string in different character string databases according to the feature words.
Still further preferably, the beauty shop business data monitoring apparatus includes:
the acquisition module is used for acquiring the branch shop business data in real time and extracting data to be converted from the branch shop business data, wherein the data to be converted comprises: registering user data, project appointment data and financial data;
the conversion module is used for acquiring local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and acquiring recognized character strings;
and the storage module is used for storing the identified character string into a character string database.
In a second aspect, the beauty shop business data monitoring method further comprises an apparatus comprising: a memory, a processor, and a beauty shop business data monitoring method program stored on the memory and executable on the processor, the beauty shop business data monitoring method program configured to implement the steps of the beauty shop business data monitoring method as described above.
In a third aspect, the beauty shop data monitoring method further includes a medium, where the medium is a computer medium, and the computer medium stores thereon a program of the beauty shop data monitoring method, and the program of the beauty shop data monitoring method, when executed by a processor, implements the steps of the beauty shop data monitoring method as described above.
Compared with the prior art, the beauty shop data monitoring method has the following beneficial effects:
(1) the branch shop business data are acquired, converted into a character string form, identified by the historical character strings, and analyzed and stored, and the successfully identified character strings are converted into the character string form, so that the branch shop business data can be simply and visually known, and the branch shop management and control force of a main shop can be greatly enhanced;
(2) through encrypting the shop data, when the shop data is converted into a character string, the encrypted shop data is unlocked through the corresponding identification code, the time threshold value of decryption is set, only when the encrypted shop data can be successfully unlocked in the time threshold value of decryption, the next step can be carried out, otherwise, an alarm is sent to a user, so that the encryption of the shop data can effectively prevent the data from being tampered, and the confidentiality of the data can be effectively ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of an apparatus in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating a method for monitoring the data of the beauty shop business according to a first embodiment of the present invention;
fig. 3 is a functional block diagram of a beauty shop data monitoring method according to a first embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory, or may be a Non-Volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the device, and that in actual implementations the device may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005 as a medium may include an operating system, a network communication module, a user interface module, and a beauty shop data monitoring method program.
In the device shown in fig. 1, the network interface 1004 is mainly used to establish a communication connection between the device and a server storing all data required in the beauty shop data monitoring method system; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 of the beauty shop data monitoring method device of the present invention may be disposed in the beauty shop data monitoring method device, and the beauty shop data monitoring method device calls the beauty shop data monitoring method program stored in the memory 1005 through the processor 1001 and executes the beauty shop data monitoring method provided by the present invention.
Referring to fig. 2, fig. 2 is a schematic flow chart of a beauty shop data monitoring method according to a first embodiment of the present invention.
In this embodiment, the beauty shop data monitoring method includes the following steps:
s10: acquiring branch shop business data in real time, and extracting data to be converted from the branch shop business data, wherein the data to be converted comprises: registered user data, project appointment data, and financial data.
Correspondingly, the general server acquires the shop data of the branch stores in real time, and then extracts the data to be converted from the shop data of the branch stores, wherein each different data to be converted has corresponding characteristic words, and the characteristic words comprise: and marking the corresponding data to be converted according to the characteristics by the user, the project and the finance so as to operate the data to be converted subsequently.
It should be understood that a password generator is established, the password generator is used for randomly generating a password and carrying out password encryption on data to be encrypted, meanwhile, an identification code corresponding to the unique password is arranged in the password generator, and after data to be converted is extracted from branch shop business data, the main server encrypts the extracted data to be converted according to the password generator, namely, the unique password is distributed to the data to be converted, and the encrypted data to be converted is obtained.
It should be understood that the system sets a decryption time threshold, when the system decrypts the encrypted data to be converted, the system records the decryption time, only when the decryption time is less than the decryption time threshold, the system performs subsequent steps, when the decryption time is greater than the decryption time threshold, it indicates that the data is abnormal, the unique password is in problem, and at this time, alarm information is sent to the user.
S20: the method comprises the steps of obtaining local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and obtaining recognized character strings.
It should be understood that the local historical data to be converted is acquired, the local historical data to be converted is converted into the historical character string, and the character string database is established according to the character string converted by the local historical data to be converted, wherein the local historical data to be converted is correct shop data in the local history and is used for comparing the shop data and checking the accuracy of the shop data.
It should be understood that, the general server will recognize the character string to be recognized through the character string database, and if the character string can be successfully recognized by the character database, the character string after being successfully recognized is taken as the character string to be stored; and if the character string database does not successfully identify the character string, reselecting the character string for identification, and identifying the character string according to the character string database.
S30: and storing the recognized character string into a character string database.
It should be understood that the general server will establish different character string databases according to the feature words of each data to be converted, then after the character strings are successfully recognized, extract the feature words of the character strings, classify the character strings according to the feature words, and store the character strings in the corresponding character string databases for recognizing the following business data.
The above description is only for illustrative purposes and does not limit the technical solutions of the present application in any way.
As can be easily found from the above description, in the embodiment, the data to be converted is extracted from the branch shop data by acquiring the branch shop data in real time, where the data to be converted includes: registering user data, project appointment data and financial data; acquiring local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and acquiring recognized character strings; the recognized character strings are stored in the character string database, the embodiment can strengthen the monitoring strength of the main shop on the branch shop business data by converting the shop business data into the character string form, meanwhile, the shop business data are encrypted, and the shop business data are decrypted before conversion, so that the data can be effectively prevented from being tampered, and the authenticity of the branch shop data is improved.
In addition, the embodiment of the invention also provides a beauty shop business data monitoring device. As shown in fig. 3, the beauty shop business data monitoring apparatus includes: the device comprises an acquisition module 10, a conversion module 20 and a storage module 30.
The obtaining module 10 is configured to obtain the branch shop data in real time, and extract data to be converted from the branch shop data, where the data to be converted includes: registering user data, project appointment data and financial data;
the conversion module 20 is configured to obtain local history to-be-converted data, convert the local history to-be-converted data into a history character string, establish a character string database according to the character string converted from the local history to-be-converted data, convert the to-be-converted data into a to-be-identified character string, identify the to-be-identified character string according to the character string database, and obtain an identified character string;
and the storage module 30 is used for storing the identified character strings into a character string database.
In addition, it should be noted that the above-described embodiments of the apparatus are merely illustrative, and do not limit the scope of the present invention, and in practical applications, a person skilled in the art may select some or all of the modules to implement the purpose of the embodiments according to actual needs, and the present invention is not limited herein.
In addition, the technical details that are not described in detail in this embodiment can be referred to the beauty shop business data monitoring method provided by any embodiment of the present invention, and are not described herein again.
In addition, an embodiment of the present invention further provides a medium, where the medium is a computer medium, and the computer medium stores a beauty shop data monitoring method program, where the beauty shop data monitoring method program, when executed by a processor, implements the following operations:
s1, acquiring branch shop data in real time, and extracting data to be converted from the branch shop data, wherein the data to be converted comprises: registering user data, project appointment data and financial data;
s2, obtaining local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and obtaining recognized character strings;
and S3, storing the recognized character string into a character string database.
Further, the beauty shop business data monitoring method program further realizes the following operations when being executed by the processor:
converting the data to be converted into a character string to be recognized, recognizing the character string according to a character string database, and if the character string can be successfully recognized by the character database, taking the successfully recognized character string as the character string to be stored; and if the character string database does not successfully identify the character string, reselecting the character string for identification, and identifying the character string according to the character string database.
Further, the beauty shop business data monitoring method program further realizes the following operations when being executed by the processor:
acquiring an identification code corresponding to the unique password from the password generator, decrypting the encrypted data to be converted according to the identification code, and converting the data to be converted into a character string to be identified if the identification code successfully decrypts the encrypted data to be converted; and if the identification code cannot successfully decrypt the encrypted data to be converted, the encrypted data to be converted is obtained again.
Further, the beauty shop business data monitoring method program further realizes the following operations when being executed by the processor:
setting a decryption time threshold, acquiring decryption time for decrypting the encrypted to-be-converted data in real time, comparing the decryption time with the decryption time threshold, and converting the to-be-converted data into a to-be-identified character string if the decryption time is less than the decryption time threshold; if the decryption time is larger than the decryption time threshold, the data is abnormal, and alarm information is sent to the user.
Further, the beauty shop business data monitoring method program further realizes the following operations when being executed by the processor:
extracting a feature word of the data to be converted, wherein the feature word comprises: and marking different data to be converted by the user, the project and the finance according to the feature word pair of the data to be converted.
Further, the beauty shop business data monitoring method program further realizes the following operations when being executed by the processor:
establishing a password generator, acquiring branch shop business data in real time, distributing a unique password to the data to be converted after extracting the data to be converted from the branch shop business data, encrypting the data to be converted according to the unique password, and acquiring the encrypted data to be converted.
Further, the beauty shop business data monitoring method program further realizes the following operations when being executed by the processor:
establishing different character string databases according to the feature words of each data to be converted, extracting the feature words of the identified character strings, and storing the corresponding character strings into different character string databases according to the feature words.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. A beauty shop business data monitoring method is characterized in that: comprises the following steps;
s1, acquiring branch shop data in real time, and extracting data to be converted from the branch shop data, wherein the data to be converted comprises: registering user data, project appointment data and financial data;
s2, obtaining local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and obtaining recognized character strings;
and S3, storing the recognized character string into a character string database.
2. The beauty shop business data monitoring method of claim 1, wherein: in step S2, converting the data to be converted into a character string to be recognized, recognizing the character string to be recognized according to the character string database, and obtaining a recognized character string, and further including the steps of converting the data to be converted into the character string to be recognized, recognizing the character string according to the character string database, and if the character string can be successfully recognized by the character database, taking the successfully recognized character string as the character string to be stored; and if the character string database does not successfully identify the character string, reselecting the character string for identification, and identifying the character string according to the character string database.
3. The beauty shop business data monitoring method of claim 2, wherein: before converting the data to be converted into the character string to be identified, the method also comprises the following steps of obtaining an identification code corresponding to the unique password from the password generator, decrypting the encrypted data to be converted according to the identification code, and converting the data to be converted into the character string to be identified if the identification code successfully decrypts the encrypted data to be converted; and if the identification code cannot successfully decrypt the encrypted data to be converted, the encrypted data to be converted is obtained again.
4. The beauty shop business data monitoring method of claim 3, wherein: acquiring an identification code corresponding to the unique password from a password generator, decrypting the encrypted data to be converted according to the identification code, setting a decryption time threshold, acquiring decryption time for decrypting the encrypted data to be converted in real time, comparing the decryption time with the decryption time threshold, and converting the data to be converted into a character string to be identified if the decryption time is less than the decryption time threshold; if the decryption time is larger than the decryption time threshold, the data is abnormal, and alarm information is sent to the user.
5. The beauty shop business data monitoring method of claim 1, wherein: in step S1, store data of the branch store is obtained in real time, and data to be converted is extracted from the store data of the branch store, where the data to be converted includes: registering user data, project reservation data and financial data, and further comprising the following steps of extracting feature words of the data to be converted, wherein the feature words comprise: and marking different data to be converted by the user, the project and the finance according to the feature word pair of the data to be converted.
6. The beauty shop business data monitoring method of claim 5, wherein: the method comprises the steps of acquiring branch shop data in real time, extracting data to be converted from the branch shop data, establishing a password generator, acquiring the branch shop data in real time, distributing a unique password to the data to be converted after the data to be converted is extracted from the branch shop data, encrypting the data to be converted according to the unique password, and acquiring the encrypted data to be converted.
7. The beauty shop business data monitoring method of claim 5, wherein: in step S3, the recognized character string is stored in a character string database, and the method further includes the steps of establishing different character string databases according to the feature words of each data to be converted, extracting the feature words of the recognized character string, and storing the corresponding character string in the different character string databases according to the feature words.
8. A beauty shop business data monitoring apparatus, characterized by comprising:
the acquisition module is used for acquiring the branch shop business data in real time and extracting data to be converted from the branch shop business data, wherein the data to be converted comprises: registering user data, project appointment data and financial data;
the conversion module is used for acquiring local historical data to be converted, converting the local historical data to be converted into historical character strings, establishing a character string database according to the character strings converted from the local historical data to be converted, converting the data to be converted into character strings to be recognized, recognizing the character strings to be recognized according to the character string database, and acquiring recognized character strings;
and the storage module is used for storing the identified character string into a character string database.
9. An apparatus, characterized in that the apparatus comprises: a memory, a processor, and a beauty shop business data monitoring method program stored on the memory and executable on the processor, the beauty shop business data monitoring method program configured to implement the steps of the beauty shop business data monitoring method according to any one of claims 1 to 7.
10. A medium, characterized in that the medium is a computer medium having stored thereon a beauty shop business data monitoring method program that, when executed by a processor, implements the steps of the beauty shop business data monitoring method according to any one of claims 1 to 7.
CN201910871087.2A 2019-09-16 2019-09-16 Beauty shop business data monitoring method, device, equipment and medium Pending CN110717078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910871087.2A CN110717078A (en) 2019-09-16 2019-09-16 Beauty shop business data monitoring method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910871087.2A CN110717078A (en) 2019-09-16 2019-09-16 Beauty shop business data monitoring method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN110717078A true CN110717078A (en) 2020-01-21

Family

ID=69210483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910871087.2A Pending CN110717078A (en) 2019-09-16 2019-09-16 Beauty shop business data monitoring method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN110717078A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112797441A (en) * 2021-01-19 2021-05-14 北京北燃供热有限公司 Method and device for regulating and controlling gas-fired boiler

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006039102A2 (en) * 2004-09-30 2006-04-13 Deloitte Development Llc System, software and method for examining a database in a forensic accounting environment
CN106599200A (en) * 2016-12-14 2017-04-26 陕西学前师范学院 Intelligent remote financial data anti-cheating system and anti-cheating method thereof
CN107784102A (en) * 2017-10-27 2018-03-09 中国电子科技集团公司第二十八研究所 A kind of data difference comparative approach based on oracle database
CN108173640A (en) * 2017-12-11 2018-06-15 上海高顿教育培训有限公司 The character string symmetric cryptography and decryption method of a kind of high security
CN109523124A (en) * 2018-10-15 2019-03-26 平安科技(深圳)有限公司 Asset data processing method, device, computer equipment and storage medium
CN109947797A (en) * 2017-07-31 2019-06-28 华为技术有限公司 A kind of data detecting device and method
US20190220620A1 (en) * 2018-01-18 2019-07-18 Sap Se Secure Substring Search to Filter Encrypted Data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006039102A2 (en) * 2004-09-30 2006-04-13 Deloitte Development Llc System, software and method for examining a database in a forensic accounting environment
CN106599200A (en) * 2016-12-14 2017-04-26 陕西学前师范学院 Intelligent remote financial data anti-cheating system and anti-cheating method thereof
CN109947797A (en) * 2017-07-31 2019-06-28 华为技术有限公司 A kind of data detecting device and method
CN107784102A (en) * 2017-10-27 2018-03-09 中国电子科技集团公司第二十八研究所 A kind of data difference comparative approach based on oracle database
CN108173640A (en) * 2017-12-11 2018-06-15 上海高顿教育培训有限公司 The character string symmetric cryptography and decryption method of a kind of high security
US20190220620A1 (en) * 2018-01-18 2019-07-18 Sap Se Secure Substring Search to Filter Encrypted Data
CN109523124A (en) * 2018-10-15 2019-03-26 平安科技(深圳)有限公司 Asset data processing method, device, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112797441A (en) * 2021-01-19 2021-05-14 北京北燃供热有限公司 Method and device for regulating and controlling gas-fired boiler
CN112797441B (en) * 2021-01-19 2022-09-30 北京北燃供热有限公司 Method and device for regulating and controlling gas-fired boiler

Similar Documents

Publication Publication Date Title
WO2017140248A1 (en) Data exchange method, data exchange device and computing device
CN111756522B (en) Data processing method and system
AU2014237406B2 (en) Method and apparatus for substitution scheme for anonymizing personally identifiable information
CN108512854B (en) System information safety monitoring method and device, computer equipment and storage medium
US10380357B1 (en) Forensic investigation tool
US20210349988A1 (en) Systems and methods for decentralized recovery of identity attributes
CN110933063B (en) Data encryption method, data decryption method and equipment
CN108537314A (en) Product marketing system and method based on Quick Response Code
CN110729028A (en) Health data processing method and device, electronic equipment and storage medium
US20230306131A1 (en) Systems and methods for tracking propagation of sensitive data
CN110771190A (en) Controlling access to data
CN112184444A (en) Method, apparatus, device and medium for processing information based on information characteristics
CN114500093A (en) Safe interaction method and system for message information
CN111639355A (en) Data security management method and system
EP2124166A1 (en) Data pseudonymisation.
CN110266641A (en) Information-reading method and device
CN110717078A (en) Beauty shop business data monitoring method, device, equipment and medium
CN113609147A (en) Data sharing method and device and electronic equipment
CN100367229C (en) Productivity measuring method and system based on computer activity
CN108765615B (en) Block chain-based card punching information storage method and system
CN114492491B (en) Data management system for NFC label application
CN115664728A (en) Method, device, equipment and storage medium for enhancing password management application security
CN115600189A (en) Commercial password application security evaluation system
CN115313627A (en) Power data remote monitoring method, system, terminal and storage medium
US10320764B2 (en) Magnetic strip modification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200121