CN112069222A - Enterprise policy query system based on big data - Google Patents

Enterprise policy query system based on big data Download PDF

Info

Publication number
CN112069222A
CN112069222A CN202010940750.2A CN202010940750A CN112069222A CN 112069222 A CN112069222 A CN 112069222A CN 202010940750 A CN202010940750 A CN 202010940750A CN 112069222 A CN112069222 A CN 112069222A
Authority
CN
China
Prior art keywords
enterprise policy
preset
enterprise
user
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010940750.2A
Other languages
Chinese (zh)
Inventor
夏彬
周婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010940750.2A priority Critical patent/CN112069222A/en
Publication of CN112069222A publication Critical patent/CN112069222A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to an enterprise policy query system based on big data, which comprises an enterprise policy query terminal and an enterprise policy query server, wherein the enterprise policy query terminal sends a registration request to the enterprise policy query server, the enterprise policy query server performs exception detection on a user according to the registration request, if the user does not have an exception condition, the enterprise policy query terminal performs registration and sends an enterprise policy name list to the enterprise policy query terminal, the enterprise policy query terminal firstly verifies the identity of the user, and a target enterprise policy text file is obtained through voice acquisition and voice conversion after the verification is passed. Therefore, the enterprise policy query system can realize online enterprise policy query at any time through a series of processing processes, the query mode is simple, the efficiency is high, and the intelligence degree and the safety of the enterprise policy query system are greatly improved.

Description

Enterprise policy query system based on big data
Technical Field
The invention relates to an enterprise policy query system based on big data.
Background
At present, more and more entrepreneurship companies are provided, the supporting strength of governments on medium-small innovative enterprises is increased, various policies for marketing are gradually increased, and when the enterprises apply various subsidy policies of governments, the enterprises need to know and read the full text of the policies in advance to judge whether the subsidy conditions are met, and accordingly, file data are prepared. The current enterprise policy query mode is complicated, manual query is usually required to be specially carried out in relevant departments of enterprise policies, and the efficiency is low.
Disclosure of Invention
The invention aims to provide an enterprise policy query system based on big data, which is used for solving the problem of low efficiency of the conventional enterprise policy query mode.
In order to solve the problems, the invention adopts the following technical scheme:
an enterprise policy inquiry system based on big data comprises an enterprise policy inquiry terminal and an enterprise policy inquiry server, wherein the enterprise policy inquiry terminal is in communication connection with the enterprise policy inquiry server;
the enterprise policy inquiry terminal sends a registration request generated by operating the enterprise policy inquiry terminal by a user to the enterprise policy inquiry server, wherein the registration request comprises actual identity card information of the user and first actual facial image information of the user;
the enterprise policy query server receives the registration request and acquires the actual identity card information and the first actual face image information;
the enterprise policy query server carries out anomaly detection on the user according to the actual identity card information and a preset anomaly detection rule;
if the enterprise policy query server judges that the user has no abnormal condition, registering, and storing the actual identity card information and the first actual face image information into a preset identity database; after the registration is finished, the enterprise policy query server generates a registration completion data packet according to a preset enterprise policy name list and sends the registration completion data packet to the enterprise policy query terminal; the registration completion data packet comprises registration completion indication information and the enterprise policy name list, and the enterprise policy name list comprises at least two enterprise policy names;
the enterprise policy inquiry terminal acquires the identity authentication identity card information of the user and sends the identity authentication identity card information to the enterprise policy inquiry server;
the enterprise policy inquiry server inputs the identity authentication identity card information into the identity database, judges whether the identity authentication identity card information is the same as the actual identity card information in the identity database, and sends identity authentication passing indication information to an enterprise policy inquiry terminal if the identity authentication identity card information is the same as the actual identity card information in the identity database;
after receiving the identity authentication passing indication information, the enterprise policy inquiry terminal acquires an enterprise policy inquiry voice signal of the user, identifies the enterprise policy inquiry voice signal as an enterprise policy inquiry word signal according to a preset voice identification algorithm, inputs the enterprise policy inquiry word signal into the enterprise policy name list, and acquires a target enterprise policy name corresponding to the enterprise policy inquiry word signal in the enterprise policy name list;
the enterprise policy query terminal generates and sends an enterprise policy acquisition instruction to the enterprise policy query server according to the target enterprise policy name, wherein the enterprise policy acquisition instruction comprises the target enterprise policy name;
after the enterprise policy query server acquires the enterprise policy acquisition instruction, calling a target enterprise policy text file corresponding to the target enterprise policy name from a preset enterprise policy database according to the target enterprise policy name, generating and sending a facial image acquisition instruction to the enterprise policy query terminal according to the target enterprise policy text file, wherein the facial image acquisition instruction is used for indicating the enterprise policy query terminal to acquire facial image information of the user;
the enterprise policy query terminal acquires second actual face image information of the user according to the face image acquisition instruction and sends the second actual face image information to the enterprise policy query server;
and after the enterprise policy query server acquires the second actual face image information, comparing the first actual face image information with the second actual face image information, and if the comparison is passed, sending the target enterprise policy text file to the enterprise policy query terminal.
Further, the enterprise policy query server performs anomaly detection on the user according to the actual identification card information and a preset anomaly detection rule, including:
the enterprise policy query server acquires historical registration times of the user for registering in a preset historical time period according to the actual identity card information, compares the historical registration times with a preset registration time threshold, and acquires a first abnormal value of the user if the historical registration times is larger than or equal to the preset registration time threshold;
the enterprise policy query server sends a preset execution instruction to the enterprise policy query terminal according to the actual identity card information of the user, after the enterprise policy query terminal receives the preset execution instruction, if the operation authority corresponding to the enterprise policy query terminal is an abnormal operation authority, the enterprise policy query terminal can execute the preset execution instruction, and if the operation authority corresponding to the enterprise policy query terminal is not the abnormal operation authority, the enterprise policy query terminal cannot execute the preset execution instruction; the operation level of the abnormal operation authority is higher than a preset operation level;
if the enterprise policy inquiry terminal executes the preset execution instruction, outputting execution result feedback information generated by executing the preset execution instruction;
if the enterprise policy query server receives the execution result feedback information, judging that the operation permission corresponding to the enterprise policy query terminal is an abnormal operation permission, and acquiring a second abnormal score of the user;
the enterprise policy query server calculates a total abnormal value according to the first abnormal value and the second abnormal value, compares the total abnormal value with a preset total abnormal threshold value, and judges that the user has an abnormal condition if the total abnormal value is greater than or equal to the preset total abnormal threshold value; and if the total abnormal score is smaller than the preset total abnormal threshold, judging that the user has no abnormal condition.
Further, the enterprise policy query server calculates a total anomaly score according to the first anomaly score and the second anomaly score, and includes:
the enterprise policy query server acquires a first weight of the first abnormal score and a second weight of the second abnormal score according to a preset weight distribution mechanism;
calculating the product of the first abnormal score and the first weight to obtain a first product value, and calculating the product of the second abnormal score and the second weight to obtain a second product value;
and calculating the sum of the first product value and the second product value to obtain the total abnormal score.
Further, after receiving the target enterprise policy text file, the enterprise policy query terminal converts the target enterprise policy text file into an enterprise policy file in a preset format according to a preset format conversion rule, and stores the enterprise policy file according to a preset storage mechanism.
The invention has the beneficial effects that: before enterprise policy inquiry is carried out through an enterprise policy inquiry terminal, registration is needed, during registration, actual identity card information and first actual face image information of a user are sent to an enterprise policy inquiry server through the enterprise policy inquiry terminal, the enterprise policy inquiry server carries out abnormity detection on the user according to the actual identity card information and preset abnormity detection rules, registration is carried out only when the user does not have abnormity, damage to the enterprise policy inquiry server through a registration process and a subsequent inquiry process when the user is abnormal can be prevented, further, greater loss caused by data loss in the enterprise policy inquiry server is avoided, and the consequence that other users cannot carry out enterprise policy inquiry due to damage of the enterprise policy inquiry server can also be avoided; when registering, storing the actual identity card information and the first actual face image information into a preset identity database, after the registration is finished, when enterprise policy query is needed, obtaining the identity card information of the user for authentication, carrying out identity authentication according to the identity database, after the identity authentication is passed, obtaining enterprise policy query voice signals of the user by an enterprise policy query terminal, obtaining enterprise policy query text signals after voice recognition, then comparing the enterprise policy query text signals with an enterprise policy name list to obtain the needed target enterprise policy name, calling a target enterprise policy text file from the enterprise policy database by an enterprise policy query server according to the target enterprise policy name, then not directly outputting the target enterprise policy text file to the enterprise policy query terminal, but obtaining the face image information of the user when the enterprise policy is obtained firstly, and then comparing the obtained face image information with the face image information obtained during registration, if the comparison is passed, the behavior that the registration and the query are the same person is represented, and the enterprise policy query server outputs the text file of the target enterprise policy to the enterprise policy query terminal. Therefore, the enterprise policy query system based on the big data provided by the invention can query the enterprise policy on line at any time through the enterprise policy query terminal in the modes of registration, identity verification, data processing and face comparison, and compared with the mode of manually querying by a relevant department of enterprise policy, the enterprise policy query system based on the big data provided by the invention has the advantages of simpler query mode and higher efficiency.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings needed to be used in the embodiment will be briefly described as follows:
FIG. 1 is a schematic diagram of the overall structure of a big data-based enterprise policy query system provided by the present invention;
FIG. 2 is a schematic diagram of data interaction of a big data-based enterprise policy query system provided by the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
The embodiment provides an enterprise policy query system based on big data, which is used for carrying out enterprise policy query.
The enterprise policy query system comprises an enterprise policy query terminal and an enterprise policy query server, wherein the enterprise policy query terminal can be a specially-arranged handheld terminal used for enterprise policy query, and can also be a smart phone, a tablet personal computer, a PDA (personal digital assistant) device and the like. The enterprise policy query server may be set in an enterprise policy-related consulting department, and the enterprise policy query server may be a conventional server device. The enterprise policy inquiry terminal is in communication connection with the enterprise policy inquiry server, and may be in wireless communication connection with a conventional 4G wireless communication network, as shown in fig. 1.
Before a user holds the enterprise policy inquiry terminal to inquire the enterprise policy, the user needs to register the identity through the enterprise policy inquiry terminal, and the enterprise policy can be inquired only after the registration is successful.
As a specific implementation mode, the enterprise policy inquiry terminal is provided with a registration entity key or a registration virtual key on a touch screen of the enterprise policy inquiry terminal, after a user clicks the registration entity key or the registration virtual key, a registration page is displayed on the touch screen, an identity card input box is arranged in the registration page, and the user can edit the identity card information (namely, the identity card number) of the user in the identity card input box. And after the user clicks the registration entity key or the registration virtual key, the front-facing camera arranged on the enterprise policy inquiry terminal is started, and the front-facing camera can acquire the face image information of the user and is the first actual face image information. Then, after the user clicks the register entity key or the register virtual key, the enterprise policy inquiry terminal generates a register request, where the register request includes the actual identification card information of the user and the first actual facial image information of the user.
As shown in fig. 2, the enterprise policy query terminal transmits a registration request to the enterprise policy query server.
And the enterprise policy inquiry server receives the registration request and acquires the actual identity card information and the first actual face image information of the user. It should be appreciated that the enterprise policy query server stores the actual identification card information and the first actual face image information for subsequent use.
The enterprise policy inquiry server is preset with an abnormal detection rule. And the enterprise policy inquiry server carries out abnormity detection on the user according to the actual identity card information and a preset abnormity detection rule, and judges whether the user has an abnormal condition. It should be understood that the specific anomaly criterion corresponding to the anomaly detection rule is set according to actual needs, and as a specific implementation, a specific anomaly determination process is given as follows:
a historical time period is preset in the enterprise policy query server, namely a certain time period before the identity registration is carried out, and the time length of the preset historical time period is set according to actual needs, such as half a month. Moreover, the ending time of the preset historical time period is not limited to a certain time point, such as: the ending time of the preset historical time period may be the registration time of the user performing the identity registration, or may be a certain time before the user performs the identity registration.
When any user performs identity registration, the corresponding identity card information is transmitted to the enterprise policy inquiry server, and whether the registration is successful or not, the registration process and the registration time of each time are recorded, namely, when the enterprise policy inquiry server receives one identity card information, the receiving time of the identity card information is recorded. Then, for a certain time period, the number of times of identity registration of each user in the time period, that is, the number of times of receiving the identity card information of each user, may be obtained.
Therefore, the enterprise policy query server obtains the historical registration times of the user for identity registration within the preset historical time period according to the obtained actual identity card information, that is, obtains the times of the identity card information of the user received by the enterprise policy query server within the preset time period. Under normal conditions, the same user does not frequently send the identity card information to the enterprise policy query server, so that the enterprise policy query server presets a registration time threshold, and the preset registration time threshold is set according to actual needs. The enterprise policy inquiry server compares the historical registration times with a preset registration time threshold, if the historical registration times are larger than or equal to the preset registration time threshold, the user frequently registers the identity in a preset historical time period, the user is abnormal, and a first abnormal score of the user is obtained. The first abnormal score is a preset number larger than 0, and the specific numerical value is set according to actual needs. It should be understood that, if the historical registration number is smaller than the preset registration number threshold, the first anomaly score of the user is not obtained, and it can be understood that the first anomaly score of the user is 0.
And the enterprise policy inquiry server sends a preset execution instruction to the enterprise policy inquiry terminal according to the actual identity card information of the user. And after receiving the preset execution instruction, the enterprise policy inquiry terminal executes related operation according to the preset execution instruction, wherein the related operation corresponds to the preset execution instruction. It should be noted that the enterprise policy query terminal can execute the operation corresponding to the preset execution instruction only when a certain condition is satisfied, where the condition is: and correspondingly, if the operation right corresponding to the enterprise policy inquiry terminal is not the abnormal operation right, the enterprise policy inquiry terminal cannot execute the preset execution instruction. In this embodiment, the preset operation level is a normal operation level of the enterprise policy query terminal, and since the operation level of the abnormal operation permission is higher than the preset operation level, the operation level of the abnormal operation permission is higher than a normal operation level of the enterprise policy query terminal, so that the operation level of the abnormal operation permission is an abnormal operation level, such as: the operation level of the abnormal operation permission is that the enterprise policy inquiry terminal is permitted to be root, prison or super administrator. After the enterprise policy inquiry terminal is root or prison-out, the permission of a super manager of the enterprise policy inquiry terminal is given, so that the system of the enterprise policy inquiry terminal can be changed and set, or the enterprise policy inquiry terminal has the permission of reading and writing the system bottom layer. Therefore, after the enterprise policy query terminal is root or jail-off, the enterprise policy query terminal may be invaded by some malicious software or illegally invaded by a hacker, so that the enterprise policy query terminal is implanted with the trojan virus. Therefore, the preset execution instruction can be a high-level instruction which can be executed only after the enterprise policy inquiry terminal is root or prison-off.
If the enterprise policy inquiry terminal executes the preset execution instruction, execution result feedback information generated by executing the preset execution instruction can be generated, and the execution result feedback information is output to the enterprise policy inquiry server. And if the enterprise policy query server receives the execution result feedback information, judging that the operation permission corresponding to the enterprise policy query terminal is the abnormal operation permission, further judging that the enterprise policy query terminal is abnormal, and acquiring a second abnormal score of the user. It should be understood that the second anomaly score is a preset number greater than 0, and the specific value is set by actual needs. It should be understood that, if the enterprise policy query server does not receive the execution result feedback information, the second anomaly score of the user is not obtained, and it may be understood that the second anomaly score of the user is 0.
The enterprise policy query server calculates a total anomaly score according to the first anomaly score and the second anomaly score, and a specific calculation process is given as follows:
a weight distribution mechanism is preset in the enterprise policy query server, and the weight distribution mechanism comprises a first weight corresponding to the first abnormal score and a second weight corresponding to the second abnormal score. It should be understood that the sum of the first weight and the second weight is 1, and the specific values and magnitude relationship of the first weight and the second weight are set by actual requirements, such as: if the consequence brought by the abnormal operation permission of the enterprise policy inquiry terminal is considered to be serious, the first weight can be larger than the second weight, and if the consequence brought by the abnormal operation permission of the enterprise policy inquiry terminal is considered to be serious, the second weight can be larger than the first weight.
The enterprise policy query server acquires a first weight of the first abnormal score and a second weight of the second abnormal score according to a preset weight distribution mechanism. And then calculating the product of the first abnormal score and the first weight to obtain a first product value, and calculating the product of the second abnormal score and the second weight to obtain a second product value. And finally, calculating the sum of the first product value and the second product value to obtain the total abnormal score.
A total abnormal threshold value is preset in the enterprise policy query server, and the preset total abnormal threshold value is set according to actual needs. The enterprise policy query server compares the total abnormal value with a preset total abnormal threshold value, if the total abnormal value is larger than or equal to the preset total abnormal threshold value, the total abnormal value is larger, and the user is indicated to have an abnormal condition; correspondingly, if the total abnormal score is smaller than the preset total abnormal threshold, the user is judged to have no abnormal condition.
Therefore, the user is subjected to abnormity detection through two completely different aspects, namely the condition of the enterprise policy query terminal and the condition of the user, effective and reliable verification of the user is realized, the possibility of illegal registration is reduced, the possibility that the enterprise policy query server is attacked is reduced, and the possibility that large data in the enterprise policy query server is lost is further reduced.
And if the enterprise policy inquiry server judges that the user has no abnormal condition, registering. It should be understood that registering means storing the actual identification card information of the user and the first actual face image information in an identity database specifically set in the enterprise policy query server. When the first actual face image information is stored in the identity database, the corresponding relationship between the actual identity card information and the first actual face image information needs to be established, so that the corresponding first actual face image information can be obtained according to the actual identity card information.
The enterprise policy query server stores therein various (i.e., at least two) enterprise policies (i.e., enterprise policy body files), and all of the enterprise policy body files are stored in an enterprise policy database in the enterprise policy query server. It should be understood that the enterprise policy body files in the enterprise policy database are all the enterprise policies that exist at present, and are updated in real time for the convenience of query. Moreover, the data format of the enterprise policy text file in the enterprise policy database is set by actual needs, such as PDF or doc.
An enterprise policy name list is also preset in the enterprise policy query server, and the enterprise policy name list comprises enterprise policy names of enterprise policy text files in an enterprise policy database, namely the enterprise policy name list comprises at least two enterprise policy names.
After the registration is finished, the enterprise policy inquiry server calls an enterprise policy name list and generates a registration finishing data packet according to the enterprise policy name list, wherein the registration finishing data packet comprises registration finishing indication information and an enterprise policy name list. And the enterprise policy query server sends the registration completion data packet to the enterprise policy query terminal.
The enterprise policy inquiry terminal obtains the registration completion data packet to obtain registration completion indication information and an enterprise policy name list, wherein the registration completion indication information can be displayed through a touch screen, for example, the registration completion indication information is a character of 'registration completion', and the touch screen displays 'registration completion' to enable a user to know a registration state.
The above is a registration process, and enterprise policy inquiry can be performed after registration is completed.
When enterprise policy inquiry is needed, a user operates an enterprise policy inquiry terminal, as a specific implementation mode, the enterprise policy inquiry terminal is provided with an identity authentication actual key or an identity authentication virtual key on a touch screen of the enterprise policy inquiry terminal, after the user clicks the identity authentication entity key or the identity authentication virtual key, an identity authentication page is displayed on the touch screen, an identity card input box is arranged in the identity authentication page, and the user can edit identity card information (namely an identity card number) of the user in the identity card input box. The identity card information input by the user is identity authentication identity card information. And the enterprise policy inquiry terminal acquires the authentication identity card information of the user and sends the authentication identity card information to the enterprise policy inquiry server.
After receiving the identity card information, the enterprise policy inquiry server inputs the identity card information into the identity database, and judges whether the identity card information is certain identity card information in the identity database, namely whether the identity card information is the same as the actual identity card information in the identity database. If the identity card information is the same as the identity card information, the identity card information is registered before, the identity card passes the authentication, and identity card passing indication information is sent to the enterprise policy inquiry terminal. It should be understood that, when the identity authentication passes, the first actual face image information corresponding to the actual identity card information is also obtained according to the identity authentication identity card information and the identity database.
After the enterprise policy inquiry terminal receives the authentication passing indication information, characters similar to 'authentication passing' can be displayed through the touch screen, so that the user can know that the authentication passes.
After the enterprise policy inquiry terminal receives the identity authentication passing indication information, a microphone on the enterprise policy inquiry terminal can be automatically opened through an internal control program, or after the user sees that the identity authentication passes, the microphone on the enterprise policy inquiry terminal is manually opened.
After the microphone is started, the user speaks an enterprise policy query voice signal, and the enterprise policy query terminal acquires the enterprise policy query voice signal of the user. The enterprise policy inquiry terminal is preset with a voice recognition algorithm, and it should be understood that the voice recognition algorithm is an existing voice recognition algorithm. And the enterprise policy inquiry terminal identifies the enterprise policy inquiry voice signal as an enterprise policy inquiry word signal according to the voice identification algorithm. It should be understood that the enterprise policy query text signal includes the name of the enterprise policy to be queried, and further, the enterprise policy query text signal includes only the name of the enterprise policy to be queried.
After the enterprise policy inquiry text signal is obtained by the enterprise policy inquiry terminal, the enterprise policy inquiry text signal is input into an enterprise policy name list, and a target enterprise policy name corresponding to the enterprise policy inquiry text signal in the enterprise policy name list is obtained. As a specific implementation manner, the enterprise policy query text signal is compared with each enterprise policy name in the enterprise policy name list, so as to obtain an enterprise policy name corresponding to the enterprise policy query text signal, where the enterprise policy name is a target enterprise policy name.
And the enterprise policy inquiry terminal generates an enterprise policy acquisition instruction according to the target enterprise policy name, wherein the enterprise policy acquisition instruction comprises the target enterprise policy name and sends the enterprise policy acquisition instruction to the enterprise policy inquiry server.
And after the enterprise policy query server acquires the enterprise policy acquisition instruction, calling a target enterprise policy text file corresponding to the target enterprise policy name from the enterprise policy database according to the target enterprise policy name. And after the enterprise policy query server obtains the target enterprise policy text file, a facial image acquisition instruction is generated and sent to the enterprise policy query terminal. The facial image acquisition instruction is used for instructing the enterprise policy inquiry terminal to acquire facial image information of the user.
And after receiving the face image acquisition instruction, the enterprise policy inquiry terminal controls to start the front camera, acquires the face image information of the user at the moment, is second actual face image information, and sends the second actual face image information to the enterprise policy inquiry server.
And after the enterprise policy query server acquires the second actual face image information, comparing the first actual face image information with the second actual face image information, wherein the face image comparison algorithm belongs to the existing algorithm and is not repeated.
And if the comparison between the first actual face image information and the second actual face image information is passed, namely the similarity between the first actual face image information and the second actual face image information is higher than a preset value and indicates that the identity registration and the enterprise policy query are the same user, the enterprise policy query server sends a target enterprise policy text file to the enterprise policy query terminal.
After receiving the target enterprise policy text, the enterprise policy inquiry terminal can directly display the target enterprise policy text, or can convert the target enterprise policy text file into an enterprise policy file with a preset format according to a preset format conversion rule, and store the enterprise policy file according to a preset storage mechanism. The format conversion rule is set according to actual needs, for example, if the target enterprise policy text file is a word file, the format conversion rule is word to PDF, and the format of the enterprise policy file is PDF; the storage mechanism is set by actual needs, for example, stored in a specially-set file database, and then the enterprise policy inquiry terminal stores the enterprise policy file in the specially-set file database according to the preset storage mechanism.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (4)

1. An enterprise policy query system based on big data is characterized by comprising an enterprise policy query terminal and an enterprise policy query server, wherein the enterprise policy query terminal is in communication connection with the enterprise policy query server;
the enterprise policy inquiry terminal sends a registration request generated by operating the enterprise policy inquiry terminal by a user to the enterprise policy inquiry server, wherein the registration request comprises actual identity card information of the user and first actual facial image information of the user;
the enterprise policy query server receives the registration request and acquires the actual identity card information and the first actual face image information;
the enterprise policy query server carries out anomaly detection on the user according to the actual identity card information and a preset anomaly detection rule;
if the enterprise policy query server judges that the user has no abnormal condition, registering, and storing the actual identity card information and the first actual face image information into a preset identity database; after the registration is finished, the enterprise policy query server generates a registration completion data packet according to a preset enterprise policy name list and sends the registration completion data packet to the enterprise policy query terminal; the registration completion data packet comprises registration completion indication information and the enterprise policy name list, and the enterprise policy name list comprises at least two enterprise policy names;
the enterprise policy inquiry terminal acquires the identity authentication identity card information of the user and sends the identity authentication identity card information to the enterprise policy inquiry server;
the enterprise policy inquiry server inputs the identity authentication identity card information into the identity database, judges whether the identity authentication identity card information is the same as the actual identity card information in the identity database, and sends identity authentication passing indication information to an enterprise policy inquiry terminal if the identity authentication identity card information is the same as the actual identity card information in the identity database;
after receiving the identity authentication passing indication information, the enterprise policy inquiry terminal acquires an enterprise policy inquiry voice signal of the user, identifies the enterprise policy inquiry voice signal as an enterprise policy inquiry word signal according to a preset voice identification algorithm, inputs the enterprise policy inquiry word signal into the enterprise policy name list, and acquires a target enterprise policy name corresponding to the enterprise policy inquiry word signal in the enterprise policy name list;
the enterprise policy query terminal generates and sends an enterprise policy acquisition instruction to the enterprise policy query server according to the target enterprise policy name, wherein the enterprise policy acquisition instruction comprises the target enterprise policy name;
after the enterprise policy query server acquires the enterprise policy acquisition instruction, calling a target enterprise policy text file corresponding to the target enterprise policy name from a preset enterprise policy database according to the target enterprise policy name, generating and sending a facial image acquisition instruction to the enterprise policy query terminal according to the target enterprise policy text file, wherein the facial image acquisition instruction is used for indicating the enterprise policy query terminal to acquire facial image information of the user;
the enterprise policy query terminal acquires second actual face image information of the user according to the face image acquisition instruction and sends the second actual face image information to the enterprise policy query server;
and after the enterprise policy query server acquires the second actual face image information, comparing the first actual face image information with the second actual face image information, and if the comparison is passed, sending the target enterprise policy text file to the enterprise policy query terminal.
2. The big data-based enterprise policy query system according to claim 1, wherein the enterprise policy query server performs anomaly detection on the user according to the actual identification card information and according to preset anomaly detection rules, and the anomaly detection comprises:
the enterprise policy query server acquires historical registration times of the user for registering in a preset historical time period according to the actual identity card information, compares the historical registration times with a preset registration time threshold, and acquires a first abnormal value of the user if the historical registration times is larger than or equal to the preset registration time threshold;
the enterprise policy query server sends a preset execution instruction to the enterprise policy query terminal according to the actual identity card information of the user, after the enterprise policy query terminal receives the preset execution instruction, if the operation authority corresponding to the enterprise policy query terminal is an abnormal operation authority, the enterprise policy query terminal can execute the preset execution instruction, and if the operation authority corresponding to the enterprise policy query terminal is not the abnormal operation authority, the enterprise policy query terminal cannot execute the preset execution instruction; the operation level of the abnormal operation authority is higher than a preset operation level;
if the enterprise policy inquiry terminal executes the preset execution instruction, outputting execution result feedback information generated by executing the preset execution instruction;
if the enterprise policy query server receives the execution result feedback information, judging that the operation permission corresponding to the enterprise policy query terminal is an abnormal operation permission, and acquiring a second abnormal score of the user;
the enterprise policy query server calculates a total abnormal value according to the first abnormal value and the second abnormal value, compares the total abnormal value with a preset total abnormal threshold value, and judges that the user has an abnormal condition if the total abnormal value is greater than or equal to the preset total abnormal threshold value; and if the total abnormal score is smaller than the preset total abnormal threshold, judging that the user has no abnormal condition.
3. The big-data based enterprise policy query system of claim 2, wherein the enterprise policy query server calculates a total anomaly score according to the first anomaly score and the second anomaly score, comprising:
the enterprise policy query server acquires a first weight of the first abnormal score and a second weight of the second abnormal score according to a preset weight distribution mechanism;
calculating the product of the first abnormal score and the first weight to obtain a first product value, and calculating the product of the second abnormal score and the second weight to obtain a second product value;
and calculating the sum of the first product value and the second product value to obtain the total abnormal score.
4. The big-data-based enterprise policy query system according to claim 1, wherein after receiving the target enterprise policy text file, the enterprise policy query terminal converts the target enterprise policy text file into an enterprise policy file in a preset format according to preset format conversion rules, and stores the enterprise policy file according to a preset storage mechanism.
CN202010940750.2A 2020-09-09 2020-09-09 Enterprise policy query system based on big data Withdrawn CN112069222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010940750.2A CN112069222A (en) 2020-09-09 2020-09-09 Enterprise policy query system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010940750.2A CN112069222A (en) 2020-09-09 2020-09-09 Enterprise policy query system based on big data

Publications (1)

Publication Number Publication Date
CN112069222A true CN112069222A (en) 2020-12-11

Family

ID=73663065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010940750.2A Withdrawn CN112069222A (en) 2020-09-09 2020-09-09 Enterprise policy query system based on big data

Country Status (1)

Country Link
CN (1) CN112069222A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112711697A (en) * 2020-12-25 2021-04-27 河南工业和信息化职业学院 Electronic information inquiry system convenient to operate

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112711697A (en) * 2020-12-25 2021-04-27 河南工业和信息化职业学院 Electronic information inquiry system convenient to operate

Similar Documents

Publication Publication Date Title
AU2019222729B2 (en) Asset management method and apparatus, and electronic device
WO2020177392A1 (en) Federated learning-based model parameter training method, apparatus and device, and medium
US20210357488A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
US7631362B2 (en) Method and system for adaptive identity analysis, behavioral comparison, compliance, and application protection using usage information
US11030287B2 (en) User-behavior-based adaptive authentication
CN106506524A (en) Method and apparatus for verifying user
CN105721468A (en) Communication method and device
CN109033313B (en) Method and terminal equipment for realizing full-disk scanning function by using USN
CN111107057B (en) Abnormal user account detection method, device, equipment and storage medium
CN112069222A (en) Enterprise policy query system based on big data
JP2012182737A (en) Secret data leakage preventing system, determining apparatus, secret data leakage preventing method and program
CN117035391A (en) Risk identification method and risk identification device
CN111274563A (en) Security authentication method and related device
US20230188564A1 (en) Detecting and Protecting Against Employee Targeted Phishing Attacks
US10826923B2 (en) Network security tool
CN111767575A (en) Data anti-crawling method, device, equipment and computer readable storage medium
CN112328998A (en) Computer information security monitoring method
CN117688616B (en) Information security processing method, device, equipment and storage medium based on big data
CN113409051B (en) Risk identification method and device for target service
CN114944950A (en) Real-name authentication method and device
CN115277046B (en) 5G capability open security control method, device, equipment and storage medium
CN116760644B (en) Terminal abnormality judging method, system, storage medium and electronic equipment
US11204894B2 (en) Information read/write method and apparatus based on blockchain
CN111625846B (en) System state recording method of mobile terminal equipment
KR102181445B1 (en) Electronic Approval Method Using Palm Vein

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201211