CN111241152B - Policy information mining method and device and cloud server - Google Patents

Policy information mining method and device and cloud server Download PDF

Info

Publication number
CN111241152B
CN111241152B CN201911400685.8A CN201911400685A CN111241152B CN 111241152 B CN111241152 B CN 111241152B CN 201911400685 A CN201911400685 A CN 201911400685A CN 111241152 B CN111241152 B CN 111241152B
Authority
CN
China
Prior art keywords
information
target
policy information
feature
enterprise terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911400685.8A
Other languages
Chinese (zh)
Other versions
CN111241152A (en
Inventor
孙秀婷
费红琳
肖巧巧
丁杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Gaoqi Cloud Information Technology Co ltd
Original Assignee
Guangzhou Gaoqi Cloud Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Gaoqi Cloud Information Technology Co ltd filed Critical Guangzhou Gaoqi Cloud Information Technology Co ltd
Priority to CN201911400685.8A priority Critical patent/CN111241152B/en
Publication of CN111241152A publication Critical patent/CN111241152A/en
Application granted granted Critical
Publication of CN111241152B publication Critical patent/CN111241152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention relates to the technical field of data processing, in particular to a policy information mining method and device and a cloud server. According to the method, a policy information characteristic analysis instruction is generated according to a digital authentication certificate, characteristic extraction is carried out on target policy information in a policy information mining request according to the policy information characteristic analysis instruction to obtain a plurality of characteristic vectors, then corresponding relations are established between the characteristic identification of each characteristic vector and a plurality of information databases opened based on an interface conversion request, so that target information corresponding to the target vector obtained by vector matching of the information database based on the characteristic vector corresponding to the information database is obtained based on a debit port of each information database, and finally feedback information obtained by integrating the target information is sent to an enterprise terminal. The invention can perform multi-dimensional feature extraction on the target policy information sent by an enterprise terminal, and then comprehensively and deeply mine and interpret the target policy information based on the information databases with different dimensions.

Description

Policy information mining method and device and cloud server
Technical Field
The invention relates to the technical field of information processing, in particular to a policy information mining method and device and a cloud server.
Background
With the development of information technology, the amount and variety of information also shows the increase of the well injection type. Among various types of information, policy information is a type of information that is of major interest to the enterprise side. When an enterprise terminal makes a project declaration, policy information is required to be used as support. Therefore, it is very important how to extract policy information related to project declaration of an enterprise from massive information. In the prior art, the policy information is mostly mined by matching keywords and associated words with the policy information sent by an enterprise terminal, but the method is difficult to comprehensively and deeply mine and interpret the policy information.
Disclosure of Invention
In order to overcome at least the above disadvantages in the prior art, an object of the present invention is to provide a policy information mining method, apparatus and cloud server.
In a first aspect of the embodiments of the present invention, a policy information mining method is provided, which is applied to a cloud server, and the method includes:
in the process of acquiring a policy information mining request sent by an enterprise terminal by using an information receiving port of the cloud server, generating an interface conversion request according to a digital authentication certificate in the policy information mining request, wherein the interface conversion request carries a policy information characteristic analysis instruction;
according to the interface conversion request, starting a plurality of preset information databases by calling target interfaces of data services of the information databases;
according to the policy information feature analysis instruction, performing feature extraction on target policy information in the policy information mining request to obtain a plurality of feature vectors of the target policy information; determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector;
for each feature vector, determining an information database with a database identifier consistent with the feature identifier of the feature vector from the plurality of information databases, and establishing a corresponding relation between the information database and the feature vector;
for each information database, acquiring target information corresponding to a target vector, which is obtained by the information database through vector matching according to the characteristic vector of the information database in the corresponding relation, from the information database through a target interface of the information database;
and integrating the acquired target information to obtain feedback information corresponding to the target policy information in the policy information mining request, and sending the feedback information to the enterprise terminal.
In an alternative embodiment, the performing, according to the policy information feature analysis instruction, feature extraction on target policy information in the policy information mining request to obtain a plurality of feature vectors of the target policy information includes:
acquiring the generation time of the target policy information, and determining target object information and classification information of the target policy information as a feature index of the target policy information when the time length between the generation time and the acquisition time of the policy information mining request transmitted by the enterprise terminal does not exceed a set time length;
searching a logic form corresponding to the characteristic index in a memory; if the logic form is not found, acquiring the logic form according to a function calling method;
judging whether the logical form has a source data directory of the cloud server, if so, generating an agent directory according to execution logic corresponding to the source data directory and replacing the source data directory in the logical form with the agent directory to obtain a target logical form;
obtaining a subject information set of the target policy information, and constructing a subject information relation tree according to the subject information set, wherein the subject information relation tree comprises information units corresponding to subject information;
acquiring the information matching degree between the first information units which are not activated in the subject information relationship tree, and activating the first information units which are not activated at present according to the information matching degree; when the second information unit which is not activated still exists in the theme information relationship tree, activating the second information unit which is not activated based on an information unit activation strategy to obtain an activated information unit set; when the topic information relationship tree still has an unactivated third information unit, activating the third information unit according to the information matching degree between the third information unit and the activated information unit set;
and performing feature extraction on the target policy information according to feature extraction logics corresponding to all activated information units in the subject information relation tree to obtain a plurality of feature vectors of the target policy information.
In an alternative embodiment, the determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector includes:
for the histogram distribution of each feature vector, fitting according to the histogram corresponding to each vector value in the histogram distribution to obtain a distribution curve of the histogram distribution;
segmenting the distribution curve according to the number of vector values of the feature vector to obtain a plurality of curve segments, and determining the average slope of each curve segment;
and determining the slope change coefficient between every two adjacent curve segments, and determining the feature identifier of the feature vector according to the maximum value of all slope change coefficients corresponding to the feature vector.
In an alternative embodiment, the sending the feedback information to the enterprise side includes:
before the feedback information is sent to the enterprise terminal, setting state parameters and dynamic keys for the feedback information, updating an information transmission process list according to the set state parameters, updating an enterprise terminal list according to the set dynamic keys, and configuring link layer protocol parameters of a transmission path for sending the feedback information to the enterprise terminal according to the information capacity of the feedback information;
acquiring a structural description of the feedback information, and splitting the feedback information according to the structural description to obtain a discrete information set and a first directed connection line set;
determining a first identifier of the enterprise terminal from the updated enterprise terminal list, and sending the first identifier and the discrete information set to the enterprise terminal so that the enterprise terminal determines a second identifier from the enterprise terminal according to the discrete information set and performs encryption verification on the first identifier and the second identifier to obtain a verification result;
obtaining a verification result sent by the enterprise terminal, and analyzing the verification result according to the updated state parameter to an information transmission process list to obtain a second directed connection set;
judging whether the second directed connecting line set is consistent with the first directed connecting line set or not; and when the second directed connection set is consistent with the first directed connection set, packaging the feedback information according to the link layer protocol parameters to obtain a data packet, and sending the data packet to the enterprise terminal based on the transmission path.
In a second aspect of the embodiments of the present invention, there is provided a policy information mining apparatus applied to a cloud server, where the apparatus at least includes:
the generation module is used for generating an interface conversion request according to a digital authentication certificate in a policy information mining request in the process of acquiring the policy information mining request sent by an enterprise terminal by using an information receiving port of the cloud server, wherein the interface conversion request carries a policy information characteristic analysis instruction;
the starting module is used for starting the plurality of information databases by calling target interfaces of data services of the plurality of preset information databases according to the interface conversion request;
the determining module is used for performing feature extraction on target policy information in the policy information mining request according to the policy information feature analysis instruction to obtain a plurality of feature vectors of the target policy information; determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector;
the establishing module is used for determining an information database with a database identifier consistent with the feature identifier of the feature vector from the plurality of information databases aiming at each feature vector and establishing the corresponding relation between the information database and the feature vector;
the matching module is used for acquiring target information corresponding to a target vector, which is obtained by the information database through vector matching according to the characteristic vector corresponding to the information database in the corresponding relation, from the information database through a target interface of the information database aiming at each information database;
and the integration module is used for integrating the acquired target information to obtain feedback information corresponding to the target policy information in the policy information mining request, and sending the feedback information to the enterprise terminal.
In an alternative embodiment, the determining module is configured to:
acquiring the generation time of the target policy information, and determining target object information and classification information of the target policy information as a feature index of the target policy information when the time length between the generation time and the acquisition time of the policy information mining request transmitted by the enterprise terminal does not exceed a set time length;
searching a logic form corresponding to the characteristic index in a memory; if the logic form is not found, acquiring the logic form according to a function calling method;
judging whether the logical form has a source data directory of the cloud server, if so, generating an agent directory according to execution logic corresponding to the source data directory and replacing the source data directory in the logical form with the agent directory to obtain a target logical form;
obtaining a subject information set of the target policy information, and constructing a subject information relation tree according to the subject information set, wherein the subject information relation tree comprises information units corresponding to subject information;
acquiring the information matching degree between the first information units which are not activated in the subject information relationship tree, and activating the first information units which are not activated at present according to the information matching degree; when the second information unit which is not activated still exists in the theme information relationship tree, activating the second information unit which is not activated based on an information unit activation strategy to obtain an activated information unit set; when the topic information relationship tree still has an unactivated third information unit, activating the third information unit according to the information matching degree between the third information unit and the activated information unit set;
and performing feature extraction on the target policy information according to feature extraction logics corresponding to all activated information units in the subject information relation tree to obtain a plurality of feature vectors of the target policy information.
In an alternative embodiment, the determining module is configured to:
for the histogram distribution of each feature vector, fitting according to the histogram corresponding to each vector value in the histogram distribution to obtain a distribution curve of the histogram distribution;
segmenting the distribution curve according to the number of vector values of the feature vector to obtain a plurality of curve segments, and determining the average slope of each curve segment;
and determining the slope change coefficient between every two adjacent curve segments, and determining the feature identifier of the feature vector according to the maximum value of all slope change coefficients corresponding to the feature vector.
In an alternative embodiment, the integration module is configured to:
before the feedback information is sent to the enterprise terminal, setting state parameters and dynamic keys for the feedback information, updating an information transmission process list according to the set state parameters, updating an enterprise terminal list according to the set dynamic keys, and configuring link layer protocol parameters of a transmission path for sending the feedback information to the enterprise terminal according to the information capacity of the feedback information;
acquiring a structural description of the feedback information, and splitting the feedback information according to the structural description to obtain a discrete information set and a first directed connection line set;
determining a first identifier of the enterprise terminal from the updated enterprise terminal list, and sending the first identifier and the discrete information set to the enterprise terminal so that the enterprise terminal determines a second identifier from the enterprise terminal according to the discrete information set and performs encryption verification on the first identifier and the second identifier to obtain a verification result;
obtaining a verification result sent by the enterprise terminal, and analyzing the verification result according to the updated state parameter to an information transmission process list to obtain a second directed connection set;
judging whether the second directed connecting line set is consistent with the first directed connecting line set or not; when the second directed connection set is consistent with the first directed connection set, the feedback information is encapsulated according to the link layer protocol parameters to obtain a data packet, and the data packet is sent to the enterprise terminal based on the transmission path
In a third aspect of the embodiments of the present invention, a cloud server is provided, including a processor, and a memory and a bus connected to the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is used for calling the program instructions in the memory to execute the policy information mining method.
In a fourth aspect of the embodiments of the present invention, a readable storage medium is provided, on which a program is stored, and the program, when executed by a processor, implements the policy information mining method described above.
According to the policy information mining method, the policy information mining device and the cloud server, an interface conversion request carrying a policy information characteristic analysis instruction can be generated according to a digital authentication certificate in a policy information mining request, a plurality of characteristic vectors are obtained by performing characteristic extraction on target policy information in the policy information mining request according to the policy information characteristic analysis instruction, then corresponding relations are established between the characteristic identifiers of the characteristic vectors and a plurality of information databases opened based on the interface conversion request, so that target information corresponding to the target vectors obtained by vector matching of the information databases based on the characteristic vectors corresponding to the information databases is obtained based on the debit of each information database, and finally feedback information obtained by integrating the target information is sent to an enterprise terminal. Therefore, multi-dimensional feature extraction can be performed on the target policy information sent by the enterprise terminal, and then the target policy information is comprehensively and deeply mined and interpreted based on the information databases with different dimensions.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a policy information mining method according to an embodiment of the present invention.
Fig. 2 is a functional block diagram of a policy information mining apparatus according to an embodiment of the present invention.
Fig. 3 is a schematic block diagram of a cloud server according to an embodiment of the present invention.
Icon:
200-policy information mining means; 201-a generation module; 202-opening module; 203-a determination module; 204-establishing module; 205-a matching module; 206-an integration module;
300-a cloud server; 301-a processor; 302-a memory; 303-bus.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to better understand the technical solutions of the present invention, the following detailed descriptions of the technical solutions of the present invention are provided with the accompanying drawings and the specific embodiments, and it should be understood that the specific features in the embodiments and the examples of the present invention are the detailed descriptions of the technical solutions of the present invention, and are not limitations of the technical solutions of the present invention, and the technical features in the embodiments and the examples of the present invention may be combined with each other without conflict.
Fig. 1 is a flowchart of a policy information mining method according to an embodiment of the present invention, applied to a cloud server, where the method may include the following steps:
step S21, in the process of collecting a policy information mining request sent by an enterprise terminal using an information receiving port of the cloud server, generating an interface conversion request according to a digital authentication certificate in the policy information mining request, where the interface conversion request carries a policy information feature analysis instruction.
And step S22, according to the interface conversion request, opening a plurality of preset information databases through calling target interfaces of data services of the information databases.
Step S23, according to the policy information feature analysis instruction, performing feature extraction on the target policy information in the policy information mining request to obtain a plurality of feature vectors of the target policy information; and determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector.
Step S24 is to determine, for each feature vector, an information database having a database identifier matching the feature identifier of the feature vector from among the plurality of information databases, and establish a correspondence between the information database and the feature vector.
Step S25, for each information database, obtaining, from the information database through the target interface of the information database, target information corresponding to a target vector obtained by vector matching the information database according to the feature vector of the information database in the corresponding relationship.
And step S26, integrating the acquired target information to obtain feedback information corresponding to the target policy information in the policy information mining request, and sending the feedback information to the enterprise terminal.
Through the steps S21 to S26, an interface conversion request carrying a policy information feature analysis instruction is generated according to a digital authentication certificate in the policy information mining request, a plurality of feature vectors are obtained by performing feature extraction on target policy information in the policy information mining request according to the policy information feature analysis instruction, then, a corresponding relationship is established between the interface conversion request and a plurality of information databases opened based on the interface conversion request according to feature identifiers of the feature vectors, so that target information corresponding to the target vectors obtained by performing vector matching on the information databases based on the feature vectors having the corresponding relationship with the information databases is obtained based on the borrowing of each information database, and finally, feedback information obtained by integrating the target information is sent to an enterprise terminal. Therefore, multi-dimensional feature extraction can be performed on the target policy information sent by the enterprise terminal, and then the target policy information is comprehensively and deeply mined and interpreted based on the information databases with different dimensions.
In a specific implementation, in order to implement comprehensive and deep mining of target policy information, it is necessary to ensure that there is no association between the feature information of the target policy information on the basis of determining the feature information of the target policy information in different dimensions, and for this reason, in step S23, the feature extraction is performed on the target policy information in the policy information mining request according to the policy information feature analysis instruction to obtain a plurality of feature vectors of the target policy information, which may specifically include the following contents:
step S2311, obtaining a generation time of the target policy information, and determining target object information and classification information of the target policy information as a feature index of the target policy information when a time length between the generation time and a collection time of a policy information mining request collected from an enterprise side does not exceed a preset time length.
Step S2312, searching a logic form corresponding to the characteristic index in a memory; and if the logic form is not found, acquiring the logic form according to a function calling method.
Step S2313, determining whether the logical form has the source data directory of the cloud server, and if the logical form has the source data directory of the cloud server, generating a proxy directory according to execution logic corresponding to the source data directory and replacing the source data directory in the logical form with the proxy directory to obtain a target logical form.
Step S2314, a subject information set of the target policy information is obtained, and a subject information relationship tree is constructed according to the subject information set, where the subject information relationship tree includes information units corresponding to subject information.
Step S2315, obtaining the information matching degree between the first information units which are not activated in the theme information relationship tree, and activating the first information units which are not activated at present according to the information matching degree; when the second information unit which is not activated still exists in the theme information relationship tree, activating the second information unit which is not activated based on an information unit activation strategy to obtain an activated information unit set; and when the third information unit which is not activated still exists in the theme information relationship tree, activating the third information unit according to the information matching degree between the third information unit and the activated information unit set.
Step S2316, performing feature extraction on the target policy information according to feature extraction logics corresponding to all activated information units in the topic information relationship tree to obtain a plurality of feature vectors of the target policy information.
It can be understood that based on steps S2311-S2316, the timeliness of the target policy information and the data security of the logical form can be verified, and the timeliness of the obtained target logical form and the source data security of the cloud server are ensured. And then establishing a subject information relation tree based on a subject information set of the target policy information, realizing activation of an information unit, and finally performing feature extraction on the target policy information according to feature extraction logic of the activated information unit to obtain a plurality of feature vectors of the target policy information. In this way, it is ensured that there is no correlation between the plurality of obtained feature vectors.
In a specific implementation, in order to accurately determine the feature identifier of each feature vector, so as to ensure the matching accuracy of each feature vector and the database identifier of the information database, in step S23, the determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector may further include the following:
step S2321, for the histogram distribution of each feature vector, a distribution curve of the histogram distribution is obtained by fitting according to the histogram corresponding to each vector value in the histogram distribution.
Step S2322, the distribution curve is segmented according to the number of the vector values of the feature vector to obtain a plurality of curve segments, and the average slope of each curve segment is determined.
Step S2323, determining the slope change coefficient between every two adjacent curve segments, and determining the feature identifier of the feature vector according to the maximum value of all slope change coefficients corresponding to the feature vector.
It can be understood that through steps S2321-S2323, a distribution curve corresponding to the histogram distribution of each feature vector can be determined, then the distribution curve is segmented to determine a slope change coefficient between every two adjacent curve segments, and then the feature identifier of each feature vector is determined according to the maximum value of all slope change coefficients corresponding to each feature vector. Therefore, the feature identification of each feature vector can be accurately determined, and the matching accuracy of each feature vector and the database identification of the information database is ensured.
In a specific implementation, in order to ensure transmission security of the feedback information, in step S26, the sending the feedback information to the enterprise side may specifically include the following:
step S261, before sending the feedback information to the enterprise terminal, sets a state parameter and a dynamic key for the feedback information, updates an information transmission process list according to the set state parameter, updates an enterprise terminal list according to the set dynamic key, and configures a link layer protocol parameter of a transmission path for sending the feedback information to the enterprise terminal according to an information capacity of the feedback information.
Step S262, obtaining the structural description of the feedback information, and splitting the feedback information according to the structural description to obtain a discrete information set and a first directed connection set.
Step S263, determining a first identifier of the enterprise terminal from the updated enterprise terminal list, and sending the first identifier and the discrete information set to the enterprise terminal, so that the enterprise terminal determines a second identifier from the enterprise terminal according to the discrete information set, and performs encryption verification on the first identifier and the second identifier to obtain a verification result.
Step S264, obtaining the verification result sent by the enterprise terminal, and analyzing the verification result according to the updated state parameter and the information transmission process list to obtain a second directed connection set.
Step S265, determining whether the second directed connection set is consistent with the first directed connection set; and when the second directed connection set is consistent with the first directed connection set, packaging the feedback information according to the link layer protocol parameters to obtain a data packet, and sending the data packet to the enterprise terminal based on the transmission path.
Based on steps S261 to S265, before sending the feedback information to the enterprise end, security verification can be performed on the enterprise end based on the structured description of the feedback information, and then when it is ensured that the enterprise end passes the security verification, the feedback information is encapsulated according to the configured link layer protocol parameters to obtain a data packet, and then the data packet is sent to the enterprise end. Thus, the transmission security of the feedback information can be ensured.
In a specific implementation, in order to ensure the accuracy of the policy information characteristic analysis command, in step S21, the generating an interface conversion request according to the digital authentication certificate in the policy information mining request may specifically include the following:
step S211, obtaining the authentication index of the digital authentication certificate and each authentication result.
Step S212, under the condition that the digital authentication certificate contains the dynamic signature according to the authentication index, determining the offset coefficient between each authentication result of the digital authentication certificate under the static signature and each authentication result of the digital authentication certificate under the dynamic signature according to the authentication result of the digital authentication certificate under the dynamic signature and the result confidence thereof, and adjusting the authentication result of the digital authentication certificate under the static signature and the authentication result under the dynamic signature, wherein the offset coefficient of the authentication result of the digital authentication certificate under the static signature and the authentication result under the dynamic signature is positioned in the corresponding dynamic signature.
Step S213, determining a query interface protocol of each authentication result in all the authentication results adjusted to the dynamic signature.
Step S214, determining the isolation weight between every two query interface protocols, and generating an interface response rate list according to the determined isolation weight.
Step S215, determining an interface conversion request including the policy information characteristic analysis instruction according to the interface response rate list and the port model of the information receiving port.
It is understood that through steps S211 to S215, the interface conversion request including the policy information characteristic analysis command can be determined based on the authentication index of the digital authentication certificate and each authentication result, and thus, the accuracy of the policy information characteristic analysis command can be ensured.
On the basis of the above, the embodiment of the present invention provides a policy information mining apparatus 200. Fig. 2 is a functional block diagram of a policy information mining apparatus 200 according to an embodiment of the present invention, where the policy information mining apparatus 200 includes:
the generating module 201 is configured to generate an interface conversion request according to a digital authentication certificate in a policy information mining request sent by an enterprise terminal in a process of acquiring the policy information mining request by using an information receiving port of the cloud server, where the interface conversion request carries a policy information feature analysis instruction;
the starting module 202 is configured to start the multiple information databases by calling target interfaces of data services of the multiple preset information databases according to the interface conversion request;
the determining module 203 is configured to perform feature extraction on the target policy information in the policy information mining request according to the policy information feature analysis instruction, so as to obtain a plurality of feature vectors of the target policy information; determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector;
an establishing module 204, configured to determine, for each feature vector, an information database having a database identifier that is consistent with the feature identifier of the feature vector from the multiple information databases, and establish a corresponding relationship between the information database and the feature vector;
a matching module 205, configured to, for each information database, obtain, from the information database through a target interface of the information database, target information corresponding to a target vector obtained by vector matching, by the information database, according to the feature vector of the information database in the corresponding relationship;
and the integration module 206 is configured to integrate the acquired target information, obtain feedback information corresponding to the target policy information in the policy information mining request, and send the feedback information to the enterprise side.
In an alternative embodiment, the determining module 203 is configured to:
acquiring the generation time of the target policy information, and determining target object information and classification information of the target policy information as a feature index of the target policy information when the time length between the generation time and the acquisition time of the policy information mining request transmitted by the enterprise terminal does not exceed a set time length;
searching a logic form corresponding to the characteristic index in a memory; if the logic form is not found, acquiring the logic form according to a function calling method;
judging whether the logical form has a source data directory of the cloud server, if so, generating an agent directory according to execution logic corresponding to the source data directory and replacing the source data directory in the logical form with the agent directory to obtain a target logical form;
obtaining a subject information set of the target policy information, and constructing a subject information relation tree according to the subject information set, wherein the subject information relation tree comprises information units corresponding to subject information;
acquiring the information matching degree between the first information units which are not activated in the subject information relationship tree, and activating the first information units which are not activated at present according to the information matching degree; when the second information unit which is not activated still exists in the theme information relationship tree, activating the second information unit which is not activated based on an information unit activation strategy to obtain an activated information unit set; when the topic information relationship tree still has an unactivated third information unit, activating the third information unit according to the information matching degree between the third information unit and the activated information unit set;
and performing feature extraction on the target policy information according to feature extraction logics corresponding to all activated information units in the subject information relation tree to obtain a plurality of feature vectors of the target policy information.
In an alternative embodiment, the determining module 203 is configured to:
for the histogram distribution of each feature vector, fitting according to the histogram corresponding to each vector value in the histogram distribution to obtain a distribution curve of the histogram distribution;
segmenting the distribution curve according to the number of vector values of the feature vector to obtain a plurality of curve segments, and determining the average slope of each curve segment;
and determining the slope change coefficient between every two adjacent curve segments, and determining the feature identifier of the feature vector according to the maximum value of all slope change coefficients corresponding to the feature vector.
In an alternative embodiment, the integration module 206 is configured to:
before the feedback information is sent to the enterprise terminal, setting state parameters and dynamic keys for the feedback information, updating an information transmission process list according to the set state parameters, updating an enterprise terminal list according to the set dynamic keys, and configuring link layer protocol parameters of a transmission path for sending the feedback information to the enterprise terminal according to the information capacity of the feedback information;
acquiring a structural description of the feedback information, and splitting the feedback information according to the structural description to obtain a discrete information set and a first directed connection line set;
determining a first identifier of the enterprise terminal from the updated enterprise terminal list, and sending the first identifier and the discrete information set to the enterprise terminal so that the enterprise terminal determines a second identifier from the enterprise terminal according to the discrete information set and performs encryption verification on the first identifier and the second identifier to obtain a verification result;
obtaining a verification result sent by the enterprise terminal, and analyzing the verification result according to the updated state parameter to an information transmission process list to obtain a second directed connection set;
judging whether the second directed connecting line set is consistent with the first directed connecting line set or not; and when the second directed connection set is consistent with the first directed connection set, packaging the feedback information according to the link layer protocol parameters to obtain a data packet, and sending the data packet to the enterprise terminal based on the transmission path.
The cloud server 300 includes a processor and a memory, the generating module 201, the starting module 202, the determining module 203, the establishing module 204, the matching module 205, the integrating module 206, and the like are all stored in the memory as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and target policy information is comprehensively and deeply mined and interpreted by adjusting kernel parameters.
An embodiment of the present invention provides a readable storage medium, on which a program is stored, which when executed by a processor implements the policy information mining method.
The embodiment of the invention provides a processor, wherein the processor is used for running a program, and the policy information mining method executed when the program runs is as follows:
A1. a policy information mining method is applied to a cloud server, and the method at least comprises the following steps:
in the process of acquiring a policy information mining request sent by an enterprise terminal by using an information receiving port of the cloud server, generating an interface conversion request according to a digital authentication certificate in the policy information mining request, wherein the interface conversion request carries a policy information characteristic analysis instruction;
according to the interface conversion request, starting a plurality of preset information databases by calling target interfaces of data services of the information databases;
according to the policy information feature analysis instruction, performing feature extraction on target policy information in the policy information mining request to obtain a plurality of feature vectors of the target policy information; determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector;
for each feature vector, determining an information database with a database identifier consistent with the feature identifier of the feature vector from the plurality of information databases, and establishing a corresponding relation between the information database and the feature vector;
for each information database, acquiring target information corresponding to a target vector, which is obtained by the information database through vector matching according to the characteristic vector of the information database in the corresponding relation, from the information database through a target interface of the information database;
and integrating the acquired target information to obtain feedback information corresponding to the target policy information in the policy information mining request, and sending the feedback information to the enterprise terminal.
A2. The method for mining policy information according to a1, wherein the extracting features of the target policy information in the policy information mining request according to the policy information feature analysis command to obtain a plurality of feature vectors of the target policy information, includes:
acquiring the generation time of the target policy information, and determining target object information and classification information of the target policy information as a feature index of the target policy information when the time length between the generation time and the acquisition time of the policy information mining request transmitted by the enterprise terminal does not exceed a set time length;
searching a logic form corresponding to the characteristic index in a memory; if the logic form is not found, acquiring the logic form according to a function calling method;
judging whether the logical form has a source data directory of the cloud server, if so, generating an agent directory according to execution logic corresponding to the source data directory and replacing the source data directory in the logical form with the agent directory to obtain a target logical form;
obtaining a subject information set of the target policy information, and constructing a subject information relation tree according to the subject information set, wherein the subject information relation tree comprises information units corresponding to subject information;
acquiring the information matching degree between the first information units which are not activated in the subject information relationship tree, and activating the first information units which are not activated at present according to the information matching degree; when the second information unit which is not activated still exists in the theme information relationship tree, activating the second information unit which is not activated based on an information unit activation strategy to obtain an activated information unit set; when the topic information relationship tree still has an unactivated third information unit, activating the third information unit according to the information matching degree between the third information unit and the activated information unit set;
and performing feature extraction on the target policy information according to feature extraction logics corresponding to all activated information units in the subject information relation tree to obtain a plurality of feature vectors of the target policy information.
A3. According to the policy information mining method described in a1 or a2, determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector comprises:
for the histogram distribution of each feature vector, fitting according to the histogram corresponding to each vector value in the histogram distribution to obtain a distribution curve of the histogram distribution;
segmenting the distribution curve according to the number of vector values of the feature vector to obtain a plurality of curve segments, and determining the average slope of each curve segment;
and determining the slope change coefficient between every two adjacent curve segments, and determining the feature identifier of the feature vector according to the maximum value of all slope change coefficients corresponding to the feature vector.
A4. The method for mining policy information according to any one of a1-A3, wherein the sending the feedback information to the enterprise side includes:
before the feedback information is sent to the enterprise terminal, setting state parameters and dynamic keys for the feedback information, updating an information transmission process list according to the set state parameters, updating an enterprise terminal list according to the set dynamic keys, and configuring link layer protocol parameters of a transmission path for sending the feedback information to the enterprise terminal according to the information capacity of the feedback information;
acquiring a structural description of the feedback information, and splitting the feedback information according to the structural description to obtain a discrete information set and a first directed connection line set;
determining a first identifier of the enterprise terminal from the updated enterprise terminal list, and sending the first identifier and the discrete information set to the enterprise terminal so that the enterprise terminal determines a second identifier from the enterprise terminal according to the discrete information set and performs encryption verification on the first identifier and the second identifier to obtain a verification result;
obtaining a verification result sent by the enterprise terminal, and analyzing the verification result according to the updated state parameter to an information transmission process list to obtain a second directed connection set;
judging whether the second directed connecting line set is consistent with the first directed connecting line set or not; and when the second directed connection set is consistent with the first directed connection set, packaging the feedback information according to the link layer protocol parameters to obtain a data packet, and sending the data packet to the enterprise terminal based on the transmission path.
In the embodiment of the present invention, as shown in fig. 3, the cloud server 300 includes at least one processor 301, and at least one memory 302 and a bus connected to the processor 301; wherein, the processor 301 and the memory 302 complete the communication with each other through the bus 303; processor 301 is configured to call program instructions in memory 302 to perform the policy information mining method described above. The cloud server 300 herein may be a cloud server, a PC, a PAD, a mobile phone, etc.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, cloud servers (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing cloud server to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing cloud server, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a cloud server includes one or more processors (CPUs), memory, and a bus. The cloud server may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage cloud servers, or any other non-transmission medium that can be used to store information that can be accessed by a computing cloud server. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or cloud server that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or cloud server. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or cloud server comprising the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A policy information mining method is applied to a cloud server, and the method at least comprises the following steps:
in the process of acquiring a policy information mining request sent by an enterprise terminal by using an information receiving port of the cloud server, generating an interface conversion request according to a digital authentication certificate in the policy information mining request, wherein the interface conversion request carries a policy information characteristic analysis instruction;
according to the interface conversion request, starting a plurality of preset information databases by calling target interfaces of data services of the information databases;
according to the policy information feature analysis instruction, performing feature extraction on target policy information in the policy information mining request to obtain a plurality of feature vectors of the target policy information; determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector;
for each feature vector, determining an information database with a database identifier consistent with the feature identifier of the feature vector from the plurality of information databases, and establishing a corresponding relation between the information database and the feature vector;
for each information database, acquiring target information corresponding to a target vector, which is obtained by the information database through vector matching according to the characteristic vector of the information database in the corresponding relation, from the information database through a target interface of the information database;
and integrating the acquired target information to obtain feedback information corresponding to the target policy information in the policy information mining request, and sending the feedback information to the enterprise terminal.
2. The method of claim 1, wherein the extracting features of target policy information in the policy information mining request according to the policy information feature analysis command to obtain a plurality of feature vectors of the target policy information comprises:
acquiring the generation time of the target policy information, and determining target object information and classification information of the target policy information as a feature index of the target policy information when the time length between the generation time and the acquisition time of the policy information mining request transmitted by the enterprise terminal does not exceed a set time length;
searching a logic form corresponding to the characteristic index in a memory; if the logic form is not found, acquiring the logic form according to a function calling method;
judging whether the logical form has a source data directory of the cloud server, if so, generating an agent directory according to execution logic corresponding to the source data directory and replacing the source data directory in the logical form with the agent directory to obtain a target logical form;
obtaining a subject information set of the target policy information, and constructing a subject information relation tree according to the subject information set, wherein the subject information relation tree comprises information units corresponding to subject information;
acquiring the information matching degree between the first information units which are not activated in the subject information relationship tree, and activating the first information units which are not activated at present according to the information matching degree; when the second information unit which is not activated still exists in the theme information relationship tree, activating the second information unit which is not activated based on an information unit activation strategy to obtain an activated information unit set; when the topic information relationship tree still has an inactivated third information unit, activating the third information unit according to the information matching degree between the third information unit and the activated information unit set;
and performing feature extraction on the target policy information according to feature extraction logics corresponding to all activated information units in the subject information relation tree to obtain a plurality of feature vectors of the target policy information.
3. The policy information mining method according to claim 1 or 2, wherein the determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector comprises:
for the histogram distribution of each feature vector, fitting according to the histogram corresponding to each vector value in the histogram distribution to obtain a distribution curve of the histogram distribution;
segmenting the distribution curve according to the number of vector values of the feature vector to obtain a plurality of curve segments, and determining the average slope of each curve segment;
and determining the slope change coefficient between every two adjacent curve segments, and determining the feature identifier of the feature vector according to the maximum value of all slope change coefficients corresponding to the feature vector.
4. The policy information mining method according to claim 3, wherein the sending the feedback information to the enterprise side includes:
before the feedback information is sent to the enterprise terminal, setting state parameters and dynamic keys for the feedback information, updating an information transmission process list according to the set state parameters, updating an enterprise terminal list according to the set dynamic keys, and configuring link layer protocol parameters of a transmission path for sending the feedback information to the enterprise terminal according to the information capacity of the feedback information;
acquiring a structural description of the feedback information, and splitting the feedback information according to the structural description to obtain a discrete information set and a first directed connection line set;
determining a first identifier of the enterprise terminal from the updated enterprise terminal list, and sending the first identifier and the discrete information set to the enterprise terminal so that the enterprise terminal determines a second identifier from the enterprise terminal according to the discrete information set and performs encryption verification on the first identifier and the second identifier to obtain a verification result;
obtaining a verification result sent by the enterprise terminal, and analyzing the verification result according to the updated state parameter to an information transmission process list to obtain a second directed connection set;
judging whether the second directed connecting line set is consistent with the first directed connecting line set or not; and when the second directed connection set is consistent with the first directed connection set, packaging the feedback information according to the link layer protocol parameters to obtain a data packet, and sending the data packet to the enterprise terminal based on the transmission path.
5. A policy information mining device applied to a cloud server, the device at least comprising:
the generation module is used for generating an interface conversion request according to a digital authentication certificate in a policy information mining request in the process of acquiring the policy information mining request sent by an enterprise terminal by using an information receiving port of the cloud server, wherein the interface conversion request carries a policy information characteristic analysis instruction;
the starting module is used for starting the plurality of information databases by calling target interfaces of data services of the plurality of preset information databases according to the interface conversion request;
the determining module is used for performing feature extraction on target policy information in the policy information mining request according to the policy information feature analysis instruction to obtain a plurality of feature vectors of the target policy information; determining the feature identifier of each feature vector according to the histogram distribution of the vector values in each feature vector;
the establishing module is used for determining an information database with a database identifier consistent with the feature identifier of the feature vector from the plurality of information databases aiming at each feature vector and establishing the corresponding relation between the information database and the feature vector;
the matching module is used for acquiring target information corresponding to a target vector, which is obtained by the information database through vector matching according to the characteristic vector corresponding to the information database in the corresponding relation, from the information database through a target interface of the information database aiming at each information database;
and the integration module is used for integrating the acquired target information to obtain feedback information corresponding to the target policy information in the policy information mining request, and sending the feedback information to the enterprise terminal.
6. The policy information mining apparatus according to claim 5, wherein the determination module is configured to:
acquiring the generation time of the target policy information, and determining target object information and classification information of the target policy information as a feature index of the target policy information when the time length between the generation time and the acquisition time of the policy information mining request transmitted by the enterprise terminal does not exceed a set time length;
searching a logic form corresponding to the characteristic index in a memory; if the logic form is not found, acquiring the logic form according to a function calling method;
judging whether the logical form has a source data directory of the cloud server, if so, generating an agent directory according to execution logic corresponding to the source data directory and replacing the source data directory in the logical form with the agent directory to obtain a target logical form;
obtaining a subject information set of the target policy information, and constructing a subject information relation tree according to the subject information set, wherein the subject information relation tree comprises information units corresponding to subject information;
acquiring the information matching degree between the first information units which are not activated in the subject information relationship tree, and activating the first information units which are not activated at present according to the information matching degree; when the second information unit which is not activated still exists in the theme information relationship tree, activating the second information unit which is not activated based on an information unit activation strategy to obtain an activated information unit set; when the topic information relationship tree still has an inactivated third information unit, activating the third information unit according to the information matching degree between the third information unit and the activated information unit set;
and performing feature extraction on the target policy information according to feature extraction logics corresponding to all activated information units in the subject information relation tree to obtain a plurality of feature vectors of the target policy information.
7. The policy information mining apparatus according to claim 5 or 6, wherein the determination module is configured to:
for the histogram distribution of each feature vector, fitting according to the histogram corresponding to each vector value in the histogram distribution to obtain a distribution curve of the histogram distribution;
segmenting the distribution curve according to the number of vector values of the feature vector to obtain a plurality of curve segments, and determining the average slope of each curve segment;
and determining the slope change coefficient between every two adjacent curve segments, and determining the feature identifier of the feature vector according to the maximum value of all slope change coefficients corresponding to the feature vector.
8. The policy information mining apparatus according to claim 7, wherein the integration module is configured to:
before the feedback information is sent to the enterprise terminal, setting state parameters and dynamic keys for the feedback information, updating an information transmission process list according to the set state parameters, updating an enterprise terminal list according to the set dynamic keys, and configuring link layer protocol parameters of a transmission path for sending the feedback information to the enterprise terminal according to the information capacity of the feedback information;
acquiring a structural description of the feedback information, and splitting the feedback information according to the structural description to obtain a discrete information set and a first directed connection line set;
determining a first identifier of the enterprise terminal from the updated enterprise terminal list, and sending the first identifier and the discrete information set to the enterprise terminal so that the enterprise terminal determines a second identifier from the enterprise terminal according to the discrete information set and performs encryption verification on the first identifier and the second identifier to obtain a verification result;
obtaining a verification result sent by the enterprise terminal, and analyzing the verification result according to the updated state parameter to an information transmission process list to obtain a second directed connection set;
judging whether the second directed connecting line set is consistent with the first directed connecting line set or not; and when the second directed connection set is consistent with the first directed connection set, packaging the feedback information according to the link layer protocol parameters to obtain a data packet, and sending the data packet to the enterprise terminal based on the transmission path.
9. A cloud server, comprising a processor, and a memory and a bus connected to the processor; wherein, the processor and the memory complete mutual communication through the bus; the processor is configured to call program instructions in the memory to perform the policy information mining method of any of claims 1-4.
10. A readable storage medium, having stored thereon a program which, when executed by a processor, implements the policy information mining method of any one of claims 1 to 4.
CN201911400685.8A 2019-12-30 2019-12-30 Policy information mining method and device and cloud server Active CN111241152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911400685.8A CN111241152B (en) 2019-12-30 2019-12-30 Policy information mining method and device and cloud server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911400685.8A CN111241152B (en) 2019-12-30 2019-12-30 Policy information mining method and device and cloud server

Publications (2)

Publication Number Publication Date
CN111241152A CN111241152A (en) 2020-06-05
CN111241152B true CN111241152B (en) 2020-09-15

Family

ID=70871850

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911400685.8A Active CN111241152B (en) 2019-12-30 2019-12-30 Policy information mining method and device and cloud server

Country Status (1)

Country Link
CN (1) CN111241152B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112990715A (en) * 2021-03-22 2021-06-18 数字浙江技术运营有限公司 Policy information pushing method and device
CN113010747B (en) * 2021-03-25 2024-04-26 深圳赛安特技术服务有限公司 Information matching method, device, equipment and storage medium
CN115905399B (en) * 2022-12-21 2023-07-25 湖南嘉创信息科技发展有限公司 Big data visual analysis method and system based on artificial intelligence

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015228158A (en) * 2014-06-02 2015-12-17 Kddi株式会社 Privacy policy generation device, privacy policy generation method, and program
CN109493265A (en) * 2018-11-05 2019-03-19 北京奥法科技有限公司 A kind of Policy Interpretation method and Policy Interpretation system based on deep learning
CN109509106A (en) * 2018-10-30 2019-03-22 平安科技(深圳)有限公司 Flat type determines method and Related product
CN110297961A (en) * 2019-06-26 2019-10-01 广州博士信息技术研究院有限公司 A kind of Quick Acquisition of policy information and optimization extracting method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8145241B2 (en) * 2005-06-30 2012-03-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
CN106126704A (en) * 2016-06-30 2016-11-16 浪潮软件集团有限公司 Finance and tax integration platform, system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015228158A (en) * 2014-06-02 2015-12-17 Kddi株式会社 Privacy policy generation device, privacy policy generation method, and program
CN109509106A (en) * 2018-10-30 2019-03-22 平安科技(深圳)有限公司 Flat type determines method and Related product
CN109493265A (en) * 2018-11-05 2019-03-19 北京奥法科技有限公司 A kind of Policy Interpretation method and Policy Interpretation system based on deep learning
CN110297961A (en) * 2019-06-26 2019-10-01 广州博士信息技术研究院有限公司 A kind of Quick Acquisition of policy information and optimization extracting method

Also Published As

Publication number Publication date
CN111241152A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN111241152B (en) Policy information mining method and device and cloud server
CN111163129B (en) Resource processing method and device based on cross-link network
CN107562513B (en) Intelligent contract life cycle management method based on JAVA
WO2022022477A1 (en) Management operation and maintenance platform and data processing method
CN107220142B (en) Method and device for executing data recovery operation
CN105302920A (en) Optimal management method and system for cloud storage data
CN104572644A (en) Database updating device and database updating method
CN111092889B (en) Distributed data node abnormal behavior detection method and device and server
CN112036125B (en) Document management method and device and computer equipment
CN112615759B (en) Full link voltage measurement assembly, full link voltage measurement method and device
CN116974948B (en) Service system testing method, system, equipment and medium
CN116360809B (en) Remote firmware upgrading method, system and medium for embedded intelligent terminal
CN111722994A (en) Task request response method and device
CN111600755A (en) Internet access behavior management system and method
CN110995670A (en) Block chain-based digital identity information management method and system
CN112559252B (en) Configuration data management method and device based on attribute classification
CN111563083B (en) Report data query method, device and system
CN113849789A (en) Authority verification method, device and equipment based on AOP and storage medium
CN113626524A (en) Data processing method and device and data checking system
CN113010377A (en) Method and device for collecting operation logs of operation
CN112698842A (en) Method and device for acquiring additional information of application program
KR20210083780A (en) Method and system for improving android app security by DEX file segmentation and obfuscation
CN111949612B (en) Unstructured data storage middleware system based on hadoop and use method thereof
CN109032655A (en) A kind of configuration method, server and computer readable storage medium monitoring example
CN114553930B (en) System integration method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant