CN111930723B - Scientific and technological achievement data fusion method based on big data - Google Patents

Scientific and technological achievement data fusion method based on big data Download PDF

Info

Publication number
CN111930723B
CN111930723B CN202011026936.3A CN202011026936A CN111930723B CN 111930723 B CN111930723 B CN 111930723B CN 202011026936 A CN202011026936 A CN 202011026936A CN 111930723 B CN111930723 B CN 111930723B
Authority
CN
China
Prior art keywords
data
technological achievement
scientific
achievement data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011026936.3A
Other languages
Chinese (zh)
Other versions
CN111930723A (en
Inventor
秦砺寒
黄毅臣
运晨超
赵微
何慧
吴小明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING BRON S&T Ltd
State Grid Corp of China SGCC
Economic and Technological Research Institute of State Grid Hebei Electric Power Co Ltd
Original Assignee
BEIJING BRON S&T Ltd
State Grid Corp of China SGCC
Economic and Technological Research Institute of State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BRON S&T Ltd, State Grid Corp of China SGCC, Economic and Technological Research Institute of State Grid Hebei Electric Power Co Ltd filed Critical BEIJING BRON S&T Ltd
Priority to CN202011026936.3A priority Critical patent/CN111930723B/en
Publication of CN111930723A publication Critical patent/CN111930723A/en
Application granted granted Critical
Publication of CN111930723B publication Critical patent/CN111930723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/211Schema design and management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • G06F16/287Visualization; Browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment of the invention discloses a scientific and technological achievement data fusion method based on big data, which comprises the following steps: constructing a scientific and technological achievement data fusion database based on big data, constructing a scientific and technological achievement data index system, setting health threshold values of various indexes, and monitoring health conditions; visual display is carried out on scientific and technological achievement data by utilizing visual graphics, and automatic analysis and summarization are carried out on application data; the data are subjected to fusion processing, data acquisition is converted, and data of different data platforms are extracted, so that cross-platform, cross-field and cross-professional technological achievement data access is realized; and safety authentication is carried out on the user and the data, so that the risk that technological achievement data relate to secret disclosure and information tampering and malicious codes is prevented. The invention can realize cross-platform, cross-domain and cross-professional technological achievement data access, can conveniently inquire, display and share technological achievement information, deeply excavates technological achievement formed in production and management, and improves management efficiency and business accuracy.

Description

Scientific and technological achievement data fusion method based on big data
Technical Field
The invention relates to the technical field of data management, in particular to a scientific and technological achievement data fusion method based on big data.
Background
How to realize the deep fusion of scientific and technological achievement data in a cross-platform, cross-field and cross-professional mode, and realize the core of scientific and technological achievement data safety management which can be inquired, counted, analyzed and mined and time data management. The technological achievement data range is wider, the data sources are more, and the technical means of data acquisition and transmission are researched according to the differences of different data sources, so that the problems of non-uniform data formats, non-uniform database types, non-uniform data acquisition modes and the like are solved. Mainly comprises the following steps: firstly, accessing scientific and technological achievement data and industry data of different platforms, different fields and different professions; and secondly, completing multi-source data fusion through statistical analysis and data conversion. In the prior art, the management and mining capability of scientific and technological achievement data is weak, the scientific and technological achievement lacks a unified data format, a data source, a collection method and a use mode, an association relation cannot be formed between the scientific and technological achievement data and project information, statistical analysis is difficult, visual and convenient inquiry of the scientific and technological achievement information cannot be achieved, achievement and process data display is incomplete, data sharing is difficult, development of scientific and technological achievement data fusion and sharing research work is needed, deep mining of achievements formed in production, management and management research is carried out, and management efficiency and business accuracy are improved.
Thus, improvements are needed in the art.
Disclosure of Invention
One technical problem to be solved by the embodiment of the invention is as follows: a scientific and technological achievement data fusion method based on big data is provided to solve the problems existing in the prior art.
The scientific and technological achievement data fusion method based on big data comprises the following steps:
constructing a scientific and technological achievement data fusion database based on big data, constructing a scientific and technological achievement data index system, setting health threshold values of various indexes, and monitoring health conditions;
visual display is carried out on scientific and technological achievement data by utilizing visual graphics, and automatic analysis and summarization are carried out on application data;
the data are subjected to fusion processing, data acquisition is converted, and data of different data platforms are extracted, so that cross-platform, cross-field and cross-professional technological achievement data access is realized;
and safety authentication is carried out on the user and the data, so that the risk that technological achievement data relate to secret disclosure and information tampering and malicious codes is prevented.
In another embodiment of the above-mentioned big data based technological achievement data fusion method of the present invention, the building of the big data based technological achievement data fusion database, the building of the technological achievement data index system, the setting of the health threshold of each index, and the monitoring of the health condition include:
modeling production operation management data and constructing a scientific and technological achievement data index system;
setting a filling template of each index data in a scientific and technological achievement data index system, and receiving and storing the scientific and technological achievement data in real time;
setting specific health thresholds of various indexes and setting early warning conditions of unhealthy indexes;
and monitoring scientific and technological achievement data in the database, and starting an early warning mechanism when the data trigger early warning conditions of unhealthy indexes.
In another embodiment of the above-mentioned big data-based technological achievement data fusion method, the visual display of technological achievement data by using visual graphics includes:
analyzing scientific and technological achievement data through the same ratio, the ring ratio and the duty ratio;
visual display is carried out on scientific and technological achievement data by using a pie chart, a bar chart and a line chart;
a report generation template of the scientific and technological achievement data is formulated, and a scientific and technological achievement data report is automatically generated;
and using a JAVA visual scene to visually display the scientific and technological achievement data model.
In another embodiment of the above-mentioned big data-based technological achievement data fusion method, the data fusion processing, the data acquisition conversion and the data extraction of different data platforms, the implementation of cross-platform, cross-domain and cross-professional technological achievement data access includes:
ETL program development is carried out by applying an information tool, and scientific and technological result data are extracted to a full-service data center;
defining the specification of a scientific and technological achievement data access interface, and defining the time, format and content requirements of data exchange;
the verification of the data interface is completed in a report and log mode, and the extraction of the scientific and technological achievement data comprises initial extraction and periodic extraction, wherein the initial extraction is one-time extraction of related scientific and technological achievement data from a source system, and the periodic extraction is extraction of the data in a designated time according to different data contents and data extraction periods;
judging whether the scientific and technological achievement data are all-service center data, if so, directly importing the scientific and technological achievement data into a database for use;
otherwise, applying for data access, judging whether the scientific and technological achievement data of the application data access support page import;
if yes, importing the scientific and technological achievement data into a database through a system importing interface;
otherwise, the data is input into the database manually.
In another embodiment of the above-mentioned big data-based technological achievement data fusion method of the present invention, the security authentication of the user and the data, and the prevention of technological achievement data from being related to disclosure and falsification of information and malicious code risks include:
authenticating application security of a scientific and technological achievement data user, authenticating user identity information, authorizing user operation, verifying input and output of data, and managing configuration, session, parameter operation and abnormal conditions of a system;
the technical result data is managed safely, so that the storage, transmission, backup and access control of the technical result data are managed safely;
managing the security of an operating system, and carrying out identity authentication, access control restriction, virus invasion prevention, vulnerability scanning, patch updating, security audit, data backup and malicious code prevention on the operating system;
and managing the database security, and carrying out identity authentication, access control, vulnerability scanning, security audit and patch updating on the database system.
In another embodiment of the above big data based scientific and technological achievement data fusion method of the present invention, the authenticating the user identity information includes:
storing the password in a database in an MD5 mode;
the login password is not stored in the cookie, and when the browser is closed, all authentication information is destroyed;
performing password intensity configuration, supporting a password intensity configuration switch and a forced password modification switch, checking password intensity during login, and forcedly modifying the password when the intensity is insufficient;
the login failure times are locked excessively, when the login failure times exceed a set threshold value, an account is automatically locked, and an event is written into a log;
and configuring the IP addresses of the login accounts, and refusing the unified account to login at a plurality of IP addresses.
In another embodiment of the above big data based scientific and technological achievement data fusion method of the present invention, the verifying the input and output of the data includes:
filtering request parameters of the URL, illegal characters of javascript contained in GET and POST data of the form through a filter, and preventing information tampering;
performing input verification based on the regular expression, and meeting the requirements of scientific and technological achievement data of different scenes;
verifying whether the parameters of the sql injection exist in the processes of user login and the like, and preventing the sql injection attack;
based on the uploading file after identity authentication, supporting configuration of the type of the uploading file;
verifying the validity of the attributes of the length, the range and the data type of the data input or imported by the user at the client, prohibiting the input module of the illegal data, and prompting error information;
unifying input and output data verification interfaces, and guaranteeing consistency of verification logic;
formatting the input data according to the data formats of the interfaces, including URL, date, number and character string formats, so as to ensure the data format to be correct;
detecting special characters to prevent XML injection, SQL injection and script injection attack, wherein the special characters comprise single quotation marks, 1=1 and CDATA, for, loop;
and performing data filtering and screening, discarding illegal data, alarming and unifying error prompt information of all integrated interfaces.
In another embodiment of the above big data based technological achievement data fusion method of the present invention, the managing the configuration, the session, the parameter operation and the abnormal situation of the system includes:
system configuration management:
setting a configuration change management flow, and when the configuration change occurs in key information, implementing an approval system, wherein the key information comprises: database connection, operation parameters and template information;
setting a storage and version control rule of configuration information, and avoiding version loss or confusion;
controlling a configuration management role by using a role-based authorization policy, controlling the granularity of configuration authorities, and enabling a configuration management function to be accessed by authorized operators and administrators;
the configuration of database connection, system operation parameters and the like is transmitted to middleware for unified management, and template configuration information is encrypted and stored;
system session management:
setting session survival time, automatically destroying user session after overtime, and deleting session information;
after the user logs in successfully, a new session is established, a session ID is randomly allocated, and the current IP address and the machine name information are bound;
storing session information at a server, and carrying out encryption transmission on user login information and identity credentials;
logging out the login user, and automatically clearing the user session by the server after the user logs out or closes the browser;
system operation parameter management:
verifying the input parameters, and avoiding using query character string parameters containing sensitive data or affecting the security logic of the server;
identifying the client using the session identifier and storing the sensitive item in a session storage area on the server;
HTTP POST is used for replacing GET to submit the window, so that hidden window is avoided;
URL checking is executed at the server side, so that the user is prevented from bypassing the checking without passing through the operation parameters, and the user is prevented from operating the URL parameters through the browser address text box;
limiting the fields that can accept user input and modifying and validating all values from the client;
system abnormal condition management:
uniformly returning a general error message;
using a structured exception handling mechanism and capturing exceptions;
setting an abnormal transaction rollback and compensation mechanism, providing transaction security rollback when an abnormality occurs, and ending the session in which the abnormality occurs.
In another embodiment of the above-mentioned big-data-based technological achievement data fusion method of the present invention, the managing the technological achievement data security to enable the storage, transmission, backup and access control of the data to be managed safely includes:
and (3) safety management of scientific and technological achievement data storage:
when the core management data service information is stored and applied, verifying the integrity of the data, and providing log record tracking and recovering functions aiming at the conditions of data loss and abnormality;
the data deletion is controlled by access, and an access control mechanism of application software is used;
the deletion of data is at least confirmed twice;
the method comprises the steps of performing unidirectional conversion by using an MD5 hash algorithm, and storing the unidirectional conversion in a database, wherein the ciphertext length is 32 bits;
and (3) safety management of scientific and technological achievement data transmission:
transmitting service information by using an HTTPS security protocol, and performing confidentiality protection on remote file access by using SFTP;
encrypting data using a digital signature;
backup safety management of scientific and technological achievement data:
the dual-machine RAC redundant deployment topology is implemented, and service node switching and fault node recovery are carried out when a key node fails;
hardware redundancy of the primary network device, communication lines, and data processing system;
and (3) managing scientific and technological achievement data access control:
setting a sensitive mark for important data resources;
and controlling the operation of the user on the information resource with the sensitive mark according to the security policy.
In another embodiment of the above big data based technological achievement data fusion method of the present invention, the technological achievement data includes structured data and unstructured data;
the access method of the structured data comprises the following steps:
extracting by adopting a ETL, OGG, load mode;
longitudinally interacting by adopting a data transmission assembly;
cleaning and converting by adopting an ETL mode;
adopting an ETL mode to convert and load;
the method for accessing unstructured data comprises the following steps:
collecting by adopting an unstructured data access assembly;
converting by adopting an unstructured conversion component;
and converting and loading by adopting an ETL mode.
Compared with the prior art, the invention has the following advantages:
according to the scientific and technological achievement data fusion method based on big data, a scientific and technological achievement index system is built, health thresholds of indexes are set and monitored, fusion processing is conducted on data, cross-platform, cross-domain and cross-professional scientific and technological achievement data access is met, visual display is conducted on the scientific and technological achievement data, safety protection is conducted on users and the data, comprehensive acquisition of the scientific and technological achievement data is achieved, data are organically fused, and management efficiency and business accuracy are improved.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention.
The invention may be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow chart of an embodiment of a big data based technological process data fusion method of the present invention.
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless it is specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective parts shown in the drawings are not drawn in actual scale for convenience of description.
The following description of at least one exemplary embodiment is merely exemplary in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
Fig. 1 is a flowchart of an embodiment of a big data based technological process data fusion method according to the present invention, as shown in fig. 1, where the big data based technological process data fusion method includes:
10, constructing a scientific and technological achievement data fusion database based on big data, constructing a scientific and technological achievement data index system, setting health threshold values of various indexes, and monitoring health conditions;
20, carrying out visual display on the scientific and technological achievement data by utilizing a visual graph, and carrying out automatic analysis and summarization on application data;
30, carrying out fusion processing on the data, converting the data acquisition and extracting the data of different data platforms, and realizing cross-platform, cross-field and cross-professional technological achievement data access;
and 40, carrying out security authentication on the user and the data, and preventing the risk of divulging and falsifying information and malicious codes in the scientific and technological achievement data.
Constructing a scientific and technological achievement data fusion database based on big data, constructing a scientific and technological achievement data index system, setting health thresholds of various indexes, and monitoring health conditions comprises the following steps:
modeling production operation management data and constructing a scientific and technological achievement data index system;
setting a filling template of each index data in a scientific and technological achievement data index system, and receiving and storing the scientific and technological achievement data in real time;
setting specific health thresholds of various indexes and setting early warning conditions of unhealthy indexes;
and monitoring scientific and technological achievement data in the database, and starting an early warning mechanism when the data trigger early warning conditions of unhealthy indexes.
In a specific embodiment, the process of modeling production management data includes: the technological achievement data user applies for data access requirements, provides corresponding access schemes for each access data according to structured data and unstructured data, develops a data interface for the selected data access scheme, develops ETL programs by adopting an information tool for data interface development, and extracts source system data to a full-service data center.
In the development process of the data interface, the following judgment needs to be performed:
judging the size of the data volume, and dividing the data interface into incremental access and full access according to the size of the data volume;
the incremental access, the data in the scientific and technological achievement data table with larger data volume, the timestamp, log comparison and full table comparison technology are used, the data of source system change brought by business processing is captured by matching with the change data capturing function provided by the ETL tool, and only the incremental data is transmitted to the data cache area for subsequent ETL flow processing;
full access, which is used for processing objects of a data cache area, wherein the full access is smaller in data volume, or the incremental access technical condition is not provided, or the performance and complexity problems are beyond the tolerance of a service system, and all data in a certain time range are adopted;
the initial data loading adopts a full mode;
interface specification:
in order to ensure accurate and efficient realization of data exchange with a source system, a mode of a data access interface specification is definitely defined, and responsibility of each party, and time, format and content requirements of the data exchange are definitely defined;
the interface specification shall include both interface responsibilities, interface implementations, data interface requirements, and definitions for each detailed interface;
a source data provider for ensuring the on-time provision of data content specified by the interface specification; providing a relevant verification function for the interface data, and ensuring the accuracy and consistency of the data; if the source system is changed, the source system is required to provide a change content description before the change, and the interface specification and the corresponding content of the related accessories are updated in time; following the validation rules specified in the interface specification; the problems occurring in the interface data providing process should be solved in time;
a data receiver receives related data content specified by interface specifications on time; if the interface is changed, providing related description of the changed content before the change, and updating corresponding content of the interface specification and related accessories in time; providing verification of the received data;
the interface implementation, access the source system database through the infromatics database access interface protocol, inquire about the designated interface table to obtain the data to the full-service data center, including: supporting the transmission of an Oracle database access interface, realizing the database connection and data acquisition of a local area network and a wide area network platform, and supporting the database reconnection and data retransmission; the verification of IP address, account and password of the interface machine is supported;
extraction period of interface data:
the method comprises the steps of initial extraction, namely extracting relevant data from a source system at one time, wherein the data range of the initial extraction comprises all data with valid latest state during extraction, and the data period during the initial extraction is described in the description of a data interface unit according to specific conditions;
the method comprises the steps of regularly extracting, namely, according to different data contents and data extraction periods, carrying out data extraction in a specified time, wherein the regular extraction is divided into a total daily amount, a daily increment and a total monthly amount;
the interface verification mode is as follows:
verifying the data interface, wherein the verification of the interface data is jointly responsible for both sides of the interface, and the verification is performed in a report form checking and log mode;
the report forms are subjected to verification of data consistency through the audit between the report forms and indexes with correlation relations;
and the log is verified by comparing the processing logs of the data receiver and the data provider.
The data interface defines in detail:
for each data interface that needs to be transmitted, the following is defined:
data content, interface unit name, code, description, interface unit corresponding list main key;
interface unit field list, field name, service description, field type, field format, field length, whether null value is allowed;
extracting mode and period;
OGG synchronization process configuration:
and carrying out data synchronization by adopting an OGG mode, carrying out OGG process configuration on a source database and an SG-RDB end, and adding synchronization table information into a process to realize real-time data synchronization.
Visual display is carried out on scientific and technological achievement data by utilizing visual graphics, and automatic analysis and summarization of application data comprise the following steps:
analyzing scientific and technological achievement data through the same ratio, the ring ratio and the duty ratio;
visual display is carried out on scientific and technological achievement data by using a pie chart, a bar chart and a line chart;
a report generation template of the scientific and technological achievement data is formulated, and a scientific and technological achievement data report is automatically generated;
and using a JAVA visual scene to visually display the scientific and technological achievement data model.
The data fusion processing is performed, the data acquisition is converted and the data extraction of different data platforms is performed, and the cross-platform, cross-domain and cross-professional technological achievement data access is realized, which comprises the following steps:
ETL program development is carried out by applying an information tool, and scientific and technological result data are extracted to a full-service data center;
defining the specification of a scientific and technological achievement data access interface, and defining the time, format and content requirements of data exchange;
the verification of the data interface is completed in a report and log mode, and the extraction of the scientific and technological achievement data comprises initial extraction and periodic extraction, wherein the initial extraction is one-time extraction of related scientific and technological achievement data from a source system, and the periodic extraction is extraction of the data in a designated time according to different data contents and data extraction periods;
judging whether the scientific and technological achievement data are all-service center data, if so, directly importing the scientific and technological achievement data into a database for use;
otherwise, applying for data access, judging whether the scientific and technological achievement data of the application data access support page import;
if yes, importing the scientific and technological achievement data into a database through a system importing interface;
otherwise, the data is input into the database manually.
The security authentication of the user and the data, preventing technological achievement data from being related to secret disclosure and information falsification and malicious code risks, comprises:
authenticating application security of a scientific and technological achievement data user, authenticating user identity information, authorizing user operation, verifying input and output of data, and managing configuration, session, parameter operation and abnormal conditions of a system;
the technical result data is managed safely, so that the storage, transmission, backup and access control of the technical result data are managed safely;
managing the security of an operating system, and carrying out identity authentication, access control restriction, virus invasion prevention, vulnerability scanning, patch updating, security audit, data backup and malicious code prevention on the operating system;
and managing the database security, and carrying out identity authentication, access control, vulnerability scanning, security audit and patch updating on the database system.
The authentication of the user identity information comprises the following steps:
storing the password in a database in an MD5 mode;
the login password is not stored in the cookie, and when the browser is closed, all authentication information is destroyed;
performing password intensity configuration, supporting a password intensity configuration switch and a forced password modification switch, checking password intensity during login, and forcedly modifying the password when the intensity is insufficient;
the login failure times are locked excessively, when the login failure times exceed a set threshold value, an account is automatically locked, and an event is written into a log;
and configuring the IP addresses of the login accounts, and refusing the unified account to login at a plurality of IP addresses.
The verifying the input and output of the data comprises the following steps:
filtering request parameters of the URL, illegal characters of javascript contained in GET and POST data of the form through a filter, and preventing information tampering;
performing input verification based on the regular expression, and meeting the requirements of scientific and technological achievement data of different scenes;
verifying whether the parameters of the sql injection exist in the processes of user login and the like, and preventing the sql injection attack;
based on the uploading file after identity authentication, supporting configuration of the type of the uploading file;
verifying the validity of the attributes of the length, the range and the data type of the data input or imported by the user at the client, prohibiting the input module of the illegal data, and prompting error information;
unifying input and output data verification interfaces, and guaranteeing consistency of verification logic;
formatting the input data according to the data formats of the interfaces, including URL, date, number and character string formats, so as to ensure the data format to be correct;
detecting special characters to prevent XML injection, SQL injection and script injection attack, wherein the special characters comprise single quotation marks, 1=1 and CDATA, for, loop;
and performing data filtering and screening, discarding illegal data, alarming and unifying error prompt information of all integrated interfaces.
The management of configuration, session, parameter operation and abnormal conditions of the system comprises:
system configuration management:
setting a configuration change management flow, and when the configuration change occurs in key information, implementing an approval system, wherein the key information comprises: database connection, operation parameters and template information;
setting a storage and version control rule of configuration information, and avoiding version loss or confusion;
controlling a configuration management role by using a role-based authorization policy, controlling the granularity of configuration authorities, and enabling a configuration management function to be accessed by authorized operators and administrators;
the configuration of database connection, system operation parameters and the like is transmitted to middleware for unified management, and template configuration information is encrypted and stored;
system session management:
setting session survival time, automatically destroying user session after overtime, and deleting session information;
after the user logs in successfully, a new session is established, a session ID is randomly allocated, and the current IP address and the machine name information are bound;
storing session information at a server, and carrying out encryption transmission on user login information and identity credentials;
logging out the login user, and automatically clearing the user session by the server after the user logs out or closes the browser;
system operation parameter management:
verifying the input parameters, and avoiding using query character string parameters containing sensitive data or affecting the security logic of the server;
identifying the client using the session identifier and storing the sensitive item in a session storage area on the server;
HTTP POST is used for replacing GET to submit the window, so that hidden window is avoided;
URL checking is executed at the server side, so that the user is prevented from bypassing the checking without passing through the operation parameters, and the user is prevented from operating the URL parameters through the browser address text box;
limiting the fields that can accept user input and modifying and validating all values from the client;
system abnormal condition management:
uniformly returning a general error message;
using a structured exception handling mechanism and capturing exceptions;
setting an abnormal transaction rollback and compensation mechanism, providing transaction security rollback when an abnormality occurs, and ending the session in which the abnormality occurs.
The managing the safety of the technological achievement data to ensure that the safety management of the storage, transmission, backup and access control of the data comprises the following steps:
and (3) safety management of scientific and technological achievement data storage:
when the core management data service information is stored and applied, verifying the integrity of the data, and providing log record tracking and recovering functions aiming at the conditions of data loss and abnormality;
the data deletion is controlled by access, and an access control mechanism of application software is used;
the deletion of data is at least confirmed twice;
the method comprises the steps of performing unidirectional conversion by using an MD5 hash algorithm, and storing the unidirectional conversion in a database, wherein the ciphertext length is 32 bits;
and (3) safety management of scientific and technological achievement data transmission:
transmitting service information by using an HTTPS security protocol, and performing confidentiality protection on remote file access by using SFTP;
encrypting data using a digital signature;
backup safety management of scientific and technological achievement data:
the dual-machine RAC redundant deployment topology is implemented, and service node switching and fault node recovery are carried out when a key node fails;
hardware redundancy of the primary network device, communication lines, and data processing system;
and (3) managing scientific and technological achievement data access control:
setting a sensitive mark for important data resources;
and controlling the operation of the user on the information resource with the sensitive mark according to the security policy.
The scientific and technological achievement data comprises structured data and unstructured data;
the access method of the structured data comprises the following steps:
extracting by adopting a ETL, OGG, load mode;
longitudinally interacting by adopting a data transmission assembly;
cleaning and converting by adopting an ETL mode;
adopting an ETL mode to convert and load;
the method for accessing unstructured data comprises the following steps:
collecting by adopting an unstructured data access assembly;
converting by adopting an unstructured conversion component;
and converting and loading by adopting an ETL mode.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different manner from other embodiments, so that the same or similar parts between the embodiments are mutually referred to. For system embodiments, the description is relatively simple as it essentially corresponds to method embodiments, and reference should be made to the description of method embodiments for relevant points.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (4)

1. A technological achievement data fusion method based on big data is characterized by comprising the following steps:
constructing a scientific and technological achievement data fusion database based on big data, constructing a scientific and technological achievement data index system, setting health threshold values of various indexes, and monitoring health conditions, wherein the method comprises the following steps:
modeling production operation management data and constructing a scientific and technological achievement data index system;
setting a filling template of each index data in a scientific and technological achievement data index system, and receiving and storing the scientific and technological achievement data in real time;
setting specific health thresholds of various indexes and setting early warning conditions of unhealthy indexes;
monitoring scientific and technological achievement data in a database, and starting an early warning mechanism when the data trigger early warning conditions of unhealthy indexes;
visual display is carried out on scientific and technological achievement data by utilizing visual graphics, automatic analysis and summarization are carried out on application data, and the method comprises the following steps:
analyzing scientific and technological achievement data through the same ratio, the ring ratio and the duty ratio;
visual display is carried out on scientific and technological achievement data by using a pie chart, a bar chart and a line chart;
a report generation template of the scientific and technological achievement data is formulated, and a scientific and technological achievement data report is automatically generated;
using JAVA visual scene to perform visual display on the scientific and technological achievement data model;
the data are fused, the data acquisition is converted and the data of different data platforms are extracted, so that cross-platform, cross-field and cross-professional technological achievement data access is realized, and the method comprises the following steps:
ETL program development is carried out by applying an information tool, and scientific and technological result data are extracted to a full-service data center;
defining the specification of a scientific and technological achievement data access interface, and defining the time, format and content requirements of data exchange;
the verification of the data interface is completed in a report and log mode, and the extraction of the scientific and technological achievement data comprises initial extraction and periodic extraction, wherein the initial extraction is one-time extraction of related scientific and technological achievement data from a source system, and the periodic extraction is extraction of the data in a designated time according to different data contents and data extraction periods;
judging whether the scientific and technological achievement data are all-service center data, if so, directly importing the scientific and technological achievement data into a database for use;
otherwise, applying for data access, judging whether the scientific and technological achievement data of the application data access support page import;
if yes, importing the scientific and technological achievement data into a database through a system importing interface;
otherwise, the data is input into the database in a manual mode;
safety authentication is carried out on users and data, and technological achievement data is prevented from being related to secret leakage and information tampering and malicious code risks, and the safety authentication method comprises the following steps:
authenticating application security of a scientific and technological achievement data user, authenticating user identity information, authorizing user operation, verifying input and output of data, and managing configuration, session, parameter operation and abnormal conditions of a system;
the technical result data is managed safely, so that the storage, transmission, backup and access control of the technical result data are managed safely;
managing the security of an operating system, and carrying out identity authentication, access control restriction, virus invasion prevention, vulnerability scanning, patch updating, security audit, data backup and malicious code prevention on the operating system;
managing database security, and carrying out identity authentication, access control, vulnerability scanning, security audit and patch updating on a database system;
the management of configuration, session, parameter operation and abnormal conditions of the system comprises:
system configuration management:
setting a configuration change management flow, and when the configuration change occurs in key information, implementing an approval system, wherein the key information comprises: database connection, operation parameters and template information;
setting a storage and version control rule of configuration information, and avoiding version loss or confusion;
controlling a configuration management role by using a role-based authorization policy, controlling the granularity of configuration authorities, and enabling a configuration management function to be accessed by authorized operators and administrators;
the database connection and the system operation parameter configuration are communicated with middleware for unified management, and the template configuration information is encrypted and stored;
system session management:
setting session survival time, automatically destroying user session after overtime, and deleting session information;
after the user logs in successfully, a new session is established, a session ID is randomly allocated, and the current IP address and the machine name information are bound;
storing session information at a server, and carrying out encryption transmission on user login information and identity credentials;
logging out the login user, and automatically clearing the user session by the server after the user logs out or closes the browser;
system operation parameter management:
verifying the input parameters, and avoiding using query character string parameters containing sensitive data or affecting the security logic of the server;
identifying the client using the session identifier and storing the sensitive item in a session storage area on the server;
HTTP POST is used for replacing GET to submit the window, so that hidden window is avoided;
URL checking is executed at the server side, so that the user is prevented from bypassing the checking without passing through the operation parameters, and the user is prevented from operating the URL parameters through the browser address text box;
limiting the fields that can accept user input and modifying and validating all values from the client;
system abnormal condition management:
uniformly returning a general error message;
using a structured exception handling mechanism and capturing exceptions;
setting an abnormal transaction rollback and compensation mechanism, providing transaction security rollback when an abnormality occurs, and ending the session in which the abnormality occurs;
the managing the safety of the technological achievement data to ensure that the safety management of the storage, transmission, backup and access control of the data comprises the following steps:
and (3) safety management of scientific and technological achievement data storage:
when the core management data service information is stored and applied, verifying the integrity of the data, and providing log record tracking and recovering functions aiming at the conditions of data loss and abnormality;
the data deletion is controlled by access, and an access control mechanism of application software is used;
the deletion of data is at least confirmed twice;
the method comprises the steps of performing unidirectional conversion by using an MD5 hash algorithm, and storing the unidirectional conversion in a database, wherein the ciphertext length is 32 bits;
and (3) safety management of scientific and technological achievement data transmission:
transmitting service information by using an HTTPS security protocol, and performing confidentiality protection on remote file access by using SFTP;
encrypting data using a digital signature;
backup safety management of scientific and technological achievement data:
the dual-machine RAC redundant deployment topology is implemented, and service node switching and fault node recovery are carried out when a key node fails;
hardware redundancy of the primary network device, communication lines, and data processing system;
and (3) managing scientific and technological achievement data access control:
setting a sensitive mark for important data resources;
and controlling the operation of the user on the information resource with the sensitive mark according to the security policy.
2. The big data based technological achievement data fusion method of claim 1, wherein the authentication of the user identity information includes:
storing the password in a database in an MD5 mode;
the login password is not stored in the cookie, and when the browser is closed, all authentication information is destroyed;
performing password intensity configuration, supporting a password intensity configuration switch and a forced password modification switch, checking password intensity during login, and forcedly modifying the password when the intensity is insufficient;
the login failure times are locked excessively, when the login failure times exceed a set threshold value, an account is automatically locked, and an event is written into a log;
and configuring the IP addresses of the login accounts, and refusing the unified account to login at a plurality of IP addresses.
3. The big data based technological achievement data fusion method of claim 1, wherein the verifying the input and output of the data comprises:
filtering request parameters of the URL, illegal characters of javascript contained in GET and POST data of the form through a filter, and preventing information tampering;
performing input verification based on the regular expression, and meeting the requirements of scientific and technological achievement data of different scenes;
verifying whether the user login process has the parameters of sql injection or not, and preventing the sql injection attack;
based on the uploading file after identity authentication, supporting configuration of the type of the uploading file;
verifying the validity of the attributes of the length, the range and the data type of the data input or imported by the user at the client, prohibiting the input module of the illegal data, and prompting error information;
unifying input and output data verification interfaces, and guaranteeing consistency of verification logic;
formatting the input data according to the data formats of the interfaces, including URL, date, number and character string formats, so as to ensure the data format to be correct;
detecting special characters to prevent XML injection, SQL injection and script injection attack, wherein the special characters comprise single quotation marks, 1=1 and CDATA, for, loop;
and performing data filtering and screening, discarding illegal data, alarming and unifying error prompt information of all integrated interfaces.
4. The big data based technological achievement data fusion method of claim 1, wherein the technological achievement data comprises structured data and unstructured data;
the access method of the structured data comprises the following steps:
extracting by adopting a ETL, OGG, load mode;
longitudinally interacting by adopting a data transmission assembly;
cleaning and converting by adopting an ETL mode;
adopting an ETL mode to convert and load;
the method for accessing unstructured data comprises the following steps:
collecting by adopting an unstructured data access assembly;
converting by adopting an unstructured conversion component;
and converting and loading by adopting an ETL mode.
CN202011026936.3A 2020-09-25 2020-09-25 Scientific and technological achievement data fusion method based on big data Active CN111930723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011026936.3A CN111930723B (en) 2020-09-25 2020-09-25 Scientific and technological achievement data fusion method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011026936.3A CN111930723B (en) 2020-09-25 2020-09-25 Scientific and technological achievement data fusion method based on big data

Publications (2)

Publication Number Publication Date
CN111930723A CN111930723A (en) 2020-11-13
CN111930723B true CN111930723B (en) 2024-02-02

Family

ID=73334274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011026936.3A Active CN111930723B (en) 2020-09-25 2020-09-25 Scientific and technological achievement data fusion method based on big data

Country Status (1)

Country Link
CN (1) CN111930723B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112965858B (en) * 2021-03-04 2023-07-18 电信科学技术第五研究所有限公司 Method for realizing networking distributed storage data conflict processing
CN113111105A (en) * 2021-04-06 2021-07-13 创意信息技术股份有限公司 Data customized access method and system based on big data
CN113723747A (en) * 2021-07-16 2021-11-30 北京房江湖科技有限公司 Analysis report generation method, electronic device and readable storage medium
CN115987579B (en) * 2022-12-07 2023-09-15 南京鼎山信息科技有限公司 Data processing method and data processing system based on big data and Internet of things communication
CN116915500B (en) * 2023-09-05 2023-11-17 武汉万数科技有限公司 Security detection method and system for access equipment
CN116910036B (en) * 2023-09-11 2023-12-26 中国林业科学研究院森林生态环境与自然保护研究所(国家林业和草原局世界自然遗产保护研究中心) Construction method of multisource forest soil attribute database

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106354786A (en) * 2016-08-23 2017-01-25 冯村 Visual analysis method and system
CN106777227A (en) * 2016-12-26 2017-05-31 河南信安通信技术股份有限公司 Multidimensional data convergence analysis system and method based on cloud platform
CN111125228A (en) * 2019-12-26 2020-05-08 北京航天泰坦科技股份有限公司 Data sharing method and device based on forestry data sharing service platform
CN111191259A (en) * 2019-12-24 2020-05-22 绍兴市上虞区理工高等研究院 Scientific and technological achievement encryption transmission method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9914054B2 (en) * 2014-06-07 2018-03-13 Microsoft Technology Licensing, Llc Display of system-level achievements with real-time updating

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106354786A (en) * 2016-08-23 2017-01-25 冯村 Visual analysis method and system
CN106777227A (en) * 2016-12-26 2017-05-31 河南信安通信技术股份有限公司 Multidimensional data convergence analysis system and method based on cloud platform
CN111191259A (en) * 2019-12-24 2020-05-22 绍兴市上虞区理工高等研究院 Scientific and technological achievement encryption transmission method and device
CN111125228A (en) * 2019-12-26 2020-05-08 北京航天泰坦科技股份有限公司 Data sharing method and device based on forestry data sharing service platform

Also Published As

Publication number Publication date
CN111930723A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
CN111930723B (en) Scientific and technological achievement data fusion method based on big data
CN109831327B (en) IMS full-service network monitoring intelligent operation and maintenance support system based on big data analysis
CN110881044B (en) Computer firewall dynamic defense security platform
KR101327317B1 (en) Apparatus and method for sap application traffic analysis and monitoring, and the information protection system thereof
CN112765245A (en) Electronic government affair big data processing platform
CN112217835B (en) Message data processing method and device, server and terminal equipment
US8285778B2 (en) Protecting web application data
EP2144420A1 (en) Web application security filtering
KR100912794B1 (en) Web hacking management system and manegement method thereof for real time web server hacking analysis and homepage hacking search
CN102868702B (en) System login device and system login method
CN109977673B (en) Vulnerability repairing method and system based on web website system security
CN103413083A (en) Security defending system for single host
CN103441926A (en) Security gateway system of numerically-controlled machine tool network
CN106161710B (en) A kind of user account safety management system based on smart phone
CN112383535B (en) Method and device for detecting Hash transfer attack behavior and computer equipment
CN115270182A (en) Power grid project closed-loop control file management system
CN108769004B (en) Remote operation safety verification method for industrial internet intelligent equipment
CN101408955A (en) Method and system determining obligation base on tactic
CN111652454A (en) Supervision quality and safety production management evaluation management system
Mohsin et al. Uml-sr: A novel security requirements specification language
KR20070109775A (en) The security method for authentication which using of random password
CN114881469A (en) Performance assessment and management system and method for enterprise workers
KR102192232B1 (en) System for providing verification and guide line of cyber security based on block chain
CN107248037A (en) A kind of long-distance monitoring method for financial data
KR101425720B1 (en) Method for Managing Database Security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant