CN112800290B - Tracing data acquisition method, device and equipment - Google Patents

Tracing data acquisition method, device and equipment Download PDF

Info

Publication number
CN112800290B
CN112800290B CN202110287319.7A CN202110287319A CN112800290B CN 112800290 B CN112800290 B CN 112800290B CN 202110287319 A CN202110287319 A CN 202110287319A CN 112800290 B CN112800290 B CN 112800290B
Authority
CN
China
Prior art keywords
tracing
data
factor
target
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110287319.7A
Other languages
Chinese (zh)
Other versions
CN112800290A (en
Inventor
田睿
王海军
梁晓
刘沐芸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Saidong Intelligent Manufacturing Technology Co ltd
Original Assignee
Shenzhen Saidong Intelligent Manufacturing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Saidong Intelligent Manufacturing Technology Co ltd filed Critical Shenzhen Saidong Intelligent Manufacturing Technology Co ltd
Priority to CN202110287319.7A priority Critical patent/CN112800290B/en
Publication of CN112800290A publication Critical patent/CN112800290A/en
Application granted granted Critical
Publication of CN112800290B publication Critical patent/CN112800290B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9038Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method, a device and equipment for obtaining tracing data, wherein the method comprises the following steps: detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, wherein the source tracing factor is a serial number or a keyword; identifying a matching mode according to the tracing factor and a preset rule, and packaging the matching mode into corresponding request information according to the matching mode; restructuring the request information into a structured data acquisition password; obtaining tracing data according to the data obtaining password; displaying the tracing data according to a preset display rule; and when a tracing query instruction of a user is detected, the tracing data is used as a new tracing factor of the target to be traced, tracing is performed again, and a tracing result is displayed. The embodiment of the invention can realize that the tracing is not limited by a mode limited in the planning of an information system any more, but flexible tracing can be carried out according to the actual business of a user, and the tracing mode from an object to an object is indirectly finished.

Description

Tracing data acquisition method, device and equipment
Technical Field
The invention relates to the technical field of data management, in particular to a method, a device and equipment for obtaining tracing data.
Background
During the design process of a product, a large amount of data is generated. How to quickly and effectively search the needed data in a large amount of data is a problem that enterprises must solve.
When a conventional tracing system or a tracing module presents tracing data to a user, a data main line or a single-dimensional data dimension is presented to the user in a manner of a data list sorted according to a time sequence, and the data main line or the single-dimensional data dimension is used for displaying historical events of a traced object.
In the real world, there are main tracing lines and branch tracing lines when tracing or tracing. The tree-shaped bifurcation tracing structure is a multi-dimensional tree-shaped bifurcation tracing structure. The current tracing data has the following defects: the tracing mode is single, generally, related historical events are displayed according to the tracing objects, and the tracing mode is an object-event tracing mode; the trace back mode of "object- > object" is not supported.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
In view of the defects of the prior art, the present invention aims to provide a method, an apparatus and a device for obtaining trace back data, which aim to solve the problem that in the data trace back method in the prior art, a trace back mode is single, and generally a related historical event is displayed according to a trace back object, and the trace back mode is an object-event trace back mode; the technical problem of the tracing mode of 'object- > object' is not supported.
The technical scheme of the invention is as follows:
a method of retrospective data acquisition, the method comprising:
detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, wherein the source tracing factor is a serial number or a keyword;
identifying a matching mode according to the tracing factor and a preset rule, and packaging the matching mode into corresponding request information according to the matching mode;
restructuring the request information into a structured data acquisition password;
obtaining tracing data according to the data obtaining password;
displaying the tracing data according to a preset display rule;
and when a tracing query instruction of a user is detected, the tracing data is used as a new tracing factor of the target to be traced, tracing is performed again, and a tracing result is displayed.
Further, the detecting the source tracing query instruction and obtaining the source tracing factor of the target to be traced includes:
detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, wherein the target to be traced is an object or an event, and the source tracing factor is a number or a keyword;
judging whether the user enters a privilege mode or not;
if the user enters the privilege mode, obtaining authorized password information input by the user; when the authorized password information is detected to pass the verification, entering a sensitive tracing data tracing process corresponding to the privilege mode;
and if the privilege mode is not entered, entering a general tracing data tracing process.
Further preferably, the detecting the source tracing query instruction and obtaining the source factor of the target to be traced includes:
detecting a source tracing query instruction, and acquiring a source tracing factor and a source tracing target of a target to be traced;
and generating a scene factor according to the source tracing factor and the source tracing destination of the source tracing target.
Further preferably, the identifying a matching pattern according to the tracing factor and a preset rule, and after encapsulating the matching pattern into corresponding request information, includes:
and when the request information is detected to comprise the authorized password information, encrypting the authorized password information to generate encrypted request information.
Preferably, the restructuring into the structured data acquisition password according to the request information includes:
judging whether the request information comprises authorized password information or not;
if the password information comprises the authorized password information, decrypting the request information according to a preset rule, and performing password matching identification;
and if the identification is successful, converting the request information into a data password, determining the length and the sensitivity level of the data according to a preset rule, and generating a data acquisition password.
Further, the displaying the tracing data according to a preset display rule includes:
displaying the tracing data according to a certain time sequence, wherein the tracing data is one or a combination of a plurality of time, an object, a process, an event and the associated information of the object and the event.
Further, when a tracing query instruction of a user is detected, the tracing data is used as a new tracing factor of a target to be traced, tracing is performed again, and a tracing result is displayed, including:
when a tracing query instruction of a user is detected, acquiring the number of an event associated object in the tracing data;
and taking the serial number as a factor to be traced of a new target to be traced, tracing again according to the factor to be traced and the scenario factor, and displaying a tracing result.
Another embodiment of the present invention provides a trace back data acquisition apparatus, including:
the source tracing query module is used for detecting a source tracing query instruction and acquiring a source tracing factor of a target to be traced, wherein the source tracing factor is a serial number or a keyword;
the request information assembly module is used for identifying a matching mode according to the traceability factors and preset rules and packaging the matching mode into corresponding request information according to the matching mode;
the data recombination module is used for recombining the request information into a structured data acquisition password;
the tracing data acquisition module is used for acquiring tracing data according to the data acquisition password;
the data display module is used for displaying the tracing data according to a preset display rule;
and the tracing module is used for tracing again by taking the tracing data as a new tracing factor of the target to be traced when a tracing query instruction of the user is detected, and displaying a tracing result.
Another embodiment of the present invention provides a trace back data acquisition device, comprising at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the traceback data acquisition method described above.
Another embodiment of the present invention also provides a non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the above described trace-back data acquisition method.
Has the advantages that: the embodiment of the invention can realize that the tracing is not limited by a mode limited in the planning of an information system any more, but flexible tracing can be carried out according to the actual business of a user, and the tracing mode from an object to an object is indirectly finished.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flowchart illustrating a method for obtaining trace data according to a preferred embodiment of the present invention;
fig. 2 is a functional block diagram of a trace back data acquisition device according to a preferred embodiment of the present invention;
fig. 3 is a schematic diagram of a hardware structure of a trace back data acquisition device according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and effects of the present invention clearer and clearer, the present invention is described in further detail below. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Embodiments of the present invention will be described below with reference to the accompanying drawings.
The embodiment of the invention provides a tracing data acquisition method. Referring to fig. 1, fig. 1 is a flowchart illustrating a trace back data obtaining method according to a preferred embodiment of the present invention. As shown in fig. 1, it includes the steps of:
s100, detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, wherein the source tracing factor is a serial number or a keyword;
s200, identifying a matching mode according to the traceability factors and a preset rule, and packaging the matching mode into corresponding request information according to the matching mode;
step S300, reconstructing the request information into a structured data acquisition password;
s400, obtaining tracing data according to the data obtaining password;
s500, displaying the tracing data according to a preset display rule;
and S600, when a tracing query instruction of a user is detected, the tracing data is used as a new tracing factor of the target to be traced, tracing is performed again, and a tracing result is displayed.
In specific implementation, the embodiment of the present invention is described by taking an information system for tracing query as an example. The information system is divided into a front end and a back end, the front end being configured to provide an interface for gaining access to a user or an automation program. Taking the interface as an example, a user can input the number or the keyword of the target to be traced on the interface, and the back end comprises a tracing query module, a data acquisition module and a data storage module. The tracing query module is used for acquiring the key words or the serial numbers input by the user at the front end and packaging the key words or the serial numbers into request information. The data acquisition module generates a data acquisition password according to the request information, and the data storage module is used for storing historical data and returning the historical data to the data acquisition module through the data acquisition password.
Therefore, the tracing query module is used for detecting the tracing query instruction and acquiring the tracing factor of the target to be traced, wherein the tracing factor is a serial number or a keyword; and identifying a matching mode according to the tracing factor and a preset rule, and packaging into corresponding request information according to the matching mode.
The data acquisition module acquires the tracing data from the data storage module according to the data acquisition password and displays the tracing data according to a preset display rule.
Further, detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, including:
detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, wherein the target to be traced is an object or an event, and the source tracing factor is a number or a keyword;
judging whether the user enters a privilege mode or not;
if the user enters the privilege mode, obtaining authorized password information input by the user; when the authorized password information is detected to pass the verification, entering a sensitive tracing data tracing process corresponding to the privilege mode;
and if the privilege mode is not entered, entering a general tracing data tracing process.
In specific implementation, a user or an automated program accesses the tracing query module and inputs the number or the keyword of the target to be traced, wherein the target can be an object or an event. The attribute of the optional input object and the characteristic of the event carry out comprehensive screening and filtering on the data to be traced. Wherein properties of the object such as date of production; the nature of the event is e.g. quality related, critical. In the process, the user can optionally enter a privilege mode and input authorization password information, wherein the authorization password information can be a mobile phone number and a dynamic verification code or an account password so as to obtain higher-level sensitive tracing information. In order to prevent the input authorized password from being intercepted and cracked during input, the tracing query module is used for tracing a rule preset in advance according to a user or a system, wherein the rule can be changed to a certain extent along with a timestamp according to the preset rule, the rule is invalid after a preset time period is continued, and when a password or a verification code character in the password is input, the character is dynamically replaced into a character in the preset rule, so that sensitive information is encrypted on an input source. Comprehensive screening and filtering are carried out on the tracing data according to the attributes of the objects and the characteristics of the events, so that the tracing range is rapidly reduced; and the data grade is divided for tracing, and the information safety in the tracing process is improved. The sensitive tracing data tracing process comprises sensitive tracing data, and the sensitive tracing data is not involved in the general tracing data tracing process. Sensitive traceability data may be data that contains user information or the like that is not suitable for disclosure.
Further, detecting a source tracing query instruction, and acquiring a source factor of a target to be traced, including:
detecting a source tracing query instruction, and acquiring a source tracing factor and a source tracing target of a target to be traced;
and generating a scene factor according to the source tracing factor and the source tracing destination of the source tracing target.
In specific implementation, the existing tracing has no scene concept, multiple tracing in the same tracing depends on human brain to think and judge, but in the embodiment, when a tracing target number or a keyword is input, a tracing purpose can be selected and input, and the tracing purpose comprises but is not limited to quality audit; and calculating a scene factor according to the tracing purpose and the tracing target, wherein the factor is used for the associated purposes of the current tracing and the subsequent tracing.
Further, identifying a matching mode according to the tracing factor and a preset rule, and after encapsulating the matching mode into corresponding request information, the method includes:
and when the request information is detected to comprise the authorized password information, encrypting the authorized password information to generate encrypted request information.
In specific implementation, after input information of a user or an automation program is acquired, whether the information is legal or not is judged, and if not, the user is prompted. And then, identifying whether the matching is accurate matching or fuzzy matching according to the characteristics of the serial numbers and the keywords, the length of the character strings and a preset rule. The length of the character string refers to the length of the data entered by the user. The relevant request information is then assembled and passed to the get data module. Before requesting information transmission, if sensitive information such as an authorized password is included, the query module encrypts the sensitive information again. The account number or the mobile phone number in the password is encrypted reversibly, and the verification code and the password are encrypted irreversibly.
Further, the method for reconstructing the structured data acquisition password according to the request information comprises the following steps:
judging whether the request information comprises authorized password information or not;
if the password information comprises the authorized password information, decrypting the request information according to a preset rule, and performing password matching identification;
and if the identification is successful, converting the request information into a data password, determining the length and the sensitivity level of the data according to a preset rule, and generating a data acquisition password.
In specific implementation, in order to overcome the problem that in the prior art, single-dimensional retroactive data is generally only presented with main line data or one-dimensional historical events, when a problem occurs on a branch line, a data module cannot be conveniently and deeply retroactively obtained, after receiving data transmitted by a retroactive query module, firstly, whether password information exists is judged, if the password information exists, decryption and password matching identification are carried out on the password information according to preset rules, and if the identification fails, error information is returned to the retroactive query module. And if the identification is successful, reorganizing the tracing request information into a structured data acquisition password which can be identified by the data storage module, and determining the amount and the sensitivity level of the acquired data according to a preset rule. The reorganized data is then transferred to the data storage module. In the process, if the data acquisition module and the data storage module are not in the same intranet segment, the transmitted data is encrypted again, and the encryption processing adopts a reversible encryption mode.
After the data storage module acquires the data transmitted by the data acquisition module, if the data is encrypted, decryption processing is performed first. Then the data storage module acquires corresponding data from a storage system (such as a database, a file system and the like) according to the structured data acquisition password and returns the corresponding data to the data acquisition module. And if the corresponding data is not acquired, returning the result to the data acquisition module. In the data transmission process, if high-level sensitive tracing data are contained, the data are executed according to the same principle of the data security processing measures in the previous step.
Further, the tracing data is displayed according to a preset display rule, and the method comprises the following steps:
displaying the tracing data according to a certain time sequence, wherein the tracing data is one or a combination of a plurality of time, an object, a process, an event and the associated information of the object and the event.
In specific implementation, the data obtaining module returns a result to the tracing query module after receiving the tracing data returned by the data storage module. And if the sensitive data is included, decrypting the sensitive data according to a preset rule, and presenting the result to a user or an automatic program.
When the retrospective data is presented to the user, the data is presented to the user in a certain way (e.g. as a list or a graph) in a certain time sequence (sequential or reverse order, with a default order set according to statistical user behavior habits). The tracing data at least comprises 5 types of elements: time, object, process, event, and association information of object and event. Where events are divided by quality weights (e.g., into common events and critical events). For high levels of sensitive traceability data, the system marks it (e.g., font, color, icon, etc.) and presents it to the user. By tracing the historical events in the data, the key events and the common events are distinguished, and therefore the efficiency of problem analysis is improved.
Further, when a tracing query instruction of a user is detected, the tracing data is used as a new tracing factor of a target to be traced, tracing is performed again, and a tracing result is displayed, wherein the tracing step comprises the following steps:
when a tracing query instruction of a user is detected, acquiring the number of an event associated object in the tracing data;
and taking the serial number as a factor to be traced of a new target to be traced, tracing again according to the factor to be traced and the scenario factor, and displaying a tracing result.
In specific implementation, when the event data and the current object data are presented to the user, the user acquires the detail information of the event or the detail information of the current object in a manner supported by the information system (for example, hyperlink jumps to another page). In the context of the associated information data of the object and the event presented to the user, the user initiates a new retrospective query in a manner supported by the information system (e.g., hyperlink to another page).
When a user starts a new tracing query through the associated information data of the object and the event, the number of the current event associated object is used as a new tracing target to start the tracing query, and finally, the tracing data is presented to the user. In the process, in order to keep two previous tracebacks and two subsequent tracebacks in the same traceback scene, two tracebacks which are not related at all are avoided. The date and time of the current event in the previous trace can be selected as the implicit condition information of the next trace to screen and filter the trace data. Furthermore, in order to enable two previous tracebacks and two subsequent tracebacks to be kept in the same traceback scene, the subsequent traceback optionally refers to the scene factor of the previous traceback to influence the traceback data output of the subsequent traceback. And after the tracing data of the last tracing is output, a user starts new tracing by using the current tracing data, and then the scene factor is recalculated, wherein the scene factor calculation factors not only comprise a tracing target and a tracing purpose, but also comprise a process, an object and a user tracing path in the tracing data. Furthermore, in the calculation process of the scene factor, the calculation factor has weight, and a new scene factor is determined by using the trained neural network according to each factor, the weight and the user tracing path.
When the user traces back, the number of the object is input, and then the trace back data represents all events associated with the object as the user, namely, the trace back mode is the 'object- > event'. When a user starts a new tracing query through the associated information data of the object and the event, tracing from the initial object- > event- > new object "is completed, that is, the tracing mode of the object- > object" is indirectly completed.
According to the method embodiment, the tracing data acquisition method provided by the invention can realize that tracing is no longer limited by a mode defined during information system planning, but flexible tracing can be performed according to actual services of users. The traceability system can enable the traceability person to clearly distinguish primary and secondary information in the traceability process, and improves traceability efficiency. The tracing data are graded, so that different people can conveniently trace, and the information safety is facilitated.
It should be noted that, a certain order does not necessarily exist between the above steps, and those skilled in the art can understand, according to the description of the embodiments of the present invention, that in different embodiments, the above steps may have different execution orders, that is, may be executed in parallel, may also be executed interchangeably, and the like.
Another embodiment of the present invention provides a trace back data obtaining apparatus, as shown in fig. 2, the apparatus 1 includes:
the source tracing query module 11 is configured to detect a source tracing query instruction, and obtain a source tracing factor of a target to be traced, where the source tracing factor is a serial number or a keyword;
a request information assembly module 12, configured to identify a matching mode according to the traceability factor and a preset rule, and package the matching mode into corresponding request information according to the matching mode;
the data recombination module 13 is used for recombining the request information into a structured data acquisition password;
a trace data acquisition module 14, configured to acquire trace data according to the data acquisition password;
the data display module 15 is used for displaying the tracing data according to a preset display rule;
and the tracing module 16 is configured to, when a tracing query instruction of a user is detected, take the tracing data as a new tracing factor of the target to be traced, trace again, and display a tracing result.
The specific implementation is shown in the method embodiment, and is not described herein again.
Another embodiment of the present invention provides a trace back data obtaining apparatus, as shown in fig. 3, an apparatus 10 includes:
one or more processors 110 and a memory 120, where one processor 110 is illustrated in fig. 3, the processor 110 and the memory 120 may be connected by a bus or other means, and the connection by the bus is illustrated in fig. 3.
Processor 110 is operative to implement various control logic of apparatus 10, which may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), a single chip, an ARM (Acorn RISC machine) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. Also, the processor 110 may be any conventional processor, microprocessor, or state machine. Processor 110 may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The memory 120 is a non-volatile computer-readable storage medium, and can be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions corresponding to the trace data obtaining method in the embodiment of the present invention. The processor 110 executes various functional applications and data processing of the device 10, namely, implements the trace back data acquisition method in the above-described method embodiments, by executing the nonvolatile software program, instructions and units stored in the memory 120.
The memory 120 may include a storage program area and a storage data area, wherein the storage program area may store an application program required for operating the device, at least one function; the storage data area may store data created according to the use of the device 10, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 120 optionally includes memory located remotely from processor 110, which may be connected to device 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more units are stored in the memory 120, which when executed by the one or more processors 110, perform the trace-back data acquisition method in any of the above-described method embodiments, e.g., performing the above-described method steps S100 to S600 in fig. 1.
Embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer-executable instructions for execution by one or more processors, for example, to perform method steps S100-S600 in fig. 1 described above.
By way of example, non-volatile storage media can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Synchronous RAM (SRAM), dynamic RAM, (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory components or memory of the operating environment described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Another embodiment of the present invention provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the trace back data acquisition method of the above-described method embodiment. For example, the method steps S100 to S600 in fig. 1 described above are performed.
The above-described embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a general hardware platform, and may also be implemented by hardware. Based on such understanding, the above technical solutions essentially or contributing to the related art can be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods of the various embodiments or some parts of the embodiments.
Conditional language such as "can," "might," or "may" is generally intended to convey that a particular embodiment can include (yet other embodiments do not include) particular features, elements, and/or operations, among others, unless specifically stated otherwise or otherwise understood within the context as used. Thus, such conditional language is also generally intended to imply that features, elements, and/or operations are in any way required for one or more embodiments or that one or more embodiments must include logic for deciding, with or without input or prompting, whether such features, elements, and/or operations are included or are to be performed in any particular embodiment.
What has been described herein in the specification and drawings includes examples that can provide a retrospective data acquisition method and apparatus. It will, of course, not be possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various features of the disclosure, but it can be appreciated that many further combinations and permutations of the disclosed features are possible. It is therefore evident that various modifications can be made to the disclosure without departing from the scope or spirit thereof. In addition, or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and drawings and from practice of the disclosure as presented herein. It is intended that the examples set forth in this specification and the drawings be considered in all respects as illustrative and not restrictive. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (8)

1. A retrospective data acquisition method, comprising:
detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, wherein the source tracing factor is a serial number or a keyword;
identifying a matching mode according to the tracing factor and a preset rule, and packaging the matching mode into corresponding request information according to the matching mode;
restructuring the request information into a structured data acquisition password;
obtaining tracing data according to the data obtaining password;
displaying the tracing data according to a preset display rule;
when a tracing query instruction of a user is detected, the tracing data is used as a tracing factor of a new target to be traced, tracing is performed again, and a tracing result is displayed;
the detecting the source tracing query instruction and obtaining the source factor of the target to be traced includes:
detecting a source tracing query instruction, and acquiring a source tracing factor and a source tracing target of a target to be traced;
generating a scene factor according to the source tracing factor and the source tracing target of the source tracing target;
when a tracing query instruction of a user is detected, the tracing data is used as a new tracing factor of a target to be traced again, and a tracing result is displayed, wherein the tracing query instruction comprises the following steps:
when a tracing query instruction of a user is detected, acquiring the number of an event associated object in the tracing data;
taking the serial number as a factor to be traced of a new target to be traced, and tracing again according to the factor to be traced and the scene factor; displaying the tracing result;
screening and filtering the tracing data by taking the date and time of the occurrence of the current event in the previous tracing as the implicit condition information of the next tracing;
influencing the retroactive data output of the next retroactive by the scene factor of the previous retroactive; after the tracing data of the last tracing is output, starting new tracing by using the current tracing data, and recalculating the scene factor, wherein the scene factor calculation factors comprise a tracing target, a tracing purpose, a process, an object and a user tracing path in the tracing data;
in the process of calculating the scene factors, the calculation factors have weights, and the new scene factors are determined by using the trained neural network according to the factors, the weights and the user tracing paths.
2. The method for obtaining retrospective data according to claim 1, wherein the step of obtaining the traceability factor of the target to be traced by detecting the traceability query instruction includes:
detecting a source tracing query instruction, and acquiring a source tracing factor of a target to be traced, wherein the target to be traced is an object or an event, and the source tracing factor is a number or a keyword;
judging whether the user enters a privilege mode or not;
if the user enters the privilege mode, obtaining authorized password information input by the user; when the authorized password information is detected to pass the verification, entering a sensitive tracing data tracing process corresponding to the privilege mode;
and if the privilege mode is not entered, entering a general tracing data tracing process.
3. The method for obtaining the retroactive data according to claim 2, wherein the identifying a matching pattern according to the traceability factors and a preset rule, and after encapsulating the matching pattern into corresponding request information, comprises:
and when the request information is detected to comprise the authorized password information, encrypting the authorized password information to generate encrypted request information.
4. The retrospective data retrieval method of claim 1, wherein the restructuring of the request-based information into a structured data retrieval password comprises:
judging whether the request information comprises authorized password information or not;
if the password information comprises the authorized password information, decrypting the request information according to a preset rule, and performing password matching identification;
and if the identification is successful, converting the request information into a data password, determining the length and the sensitivity level of the data according to a preset rule, and generating a data acquisition password.
5. The method for obtaining the tracing data according to claim 1, wherein the displaying the tracing data according to a preset display rule includes:
displaying the tracing data according to a certain time sequence, wherein the tracing data is one or a combination of a plurality of time, an object, a process, an event and the associated information of the object and the event.
6. A trace data acquisition apparatus, the apparatus comprising:
the source tracing query module is used for detecting a source tracing query instruction and acquiring a source tracing factor of a target to be traced, wherein the source tracing factor is a serial number or a keyword;
the request information assembly module is used for identifying a matching mode according to the traceability factors and preset rules and packaging the matching mode into corresponding request information according to the matching mode;
the data recombination module is used for recombining the request information into a structured data acquisition password;
the tracing data acquisition module is used for acquiring tracing data according to the data acquisition password;
the data display module is used for displaying the tracing data according to a preset display rule;
the tracing module is used for tracing again by taking the tracing data as a tracing factor of a new target to be traced when a tracing query instruction of a user is detected, and displaying a tracing result;
the source tracing query module is also used for detecting a source tracing query instruction and acquiring a source tracing factor and a source tracing destination of a target to be traced; generating a scene factor according to the source tracing factor and the source tracing target of the source tracing target;
the tracing module is also used for acquiring the serial number of the event associated object in the tracing data when detecting a tracing inquiry instruction of a user; taking the serial number as a factor to be traced of a new target to be traced, and tracing again according to the factor to be traced and the scene factor; displaying the tracing result;
the tracing module is also used for screening and filtering tracing data by taking the date and time of the occurrence of the current event in the previous tracing as the implicit condition information of the next tracing;
influencing the retroactive data output of the next retroactive by the scene factor of the previous retroactive; after the tracing data of the last tracing is output, starting new tracing by using the current tracing data, and recalculating the scene factor, wherein the scene factor calculation factors comprise a tracing target, a tracing purpose, a process, an object and a user tracing path in the tracing data;
in the process of calculating the scene factors, the calculation factors have weights, and the new scene factors are determined by using the trained neural network according to the factors, the weights and the user tracing paths.
7. A retroactive data acquisition device, characterized in that it comprises at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the retroactive data acquisition method of any one of claims 1 to 5.
8. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the retrospective data acquisition method of any one of claims 1-5.
CN202110287319.7A 2021-03-17 2021-03-17 Tracing data acquisition method, device and equipment Active CN112800290B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110287319.7A CN112800290B (en) 2021-03-17 2021-03-17 Tracing data acquisition method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110287319.7A CN112800290B (en) 2021-03-17 2021-03-17 Tracing data acquisition method, device and equipment

Publications (2)

Publication Number Publication Date
CN112800290A CN112800290A (en) 2021-05-14
CN112800290B true CN112800290B (en) 2021-08-13

Family

ID=75817108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110287319.7A Active CN112800290B (en) 2021-03-17 2021-03-17 Tracing data acquisition method, device and equipment

Country Status (1)

Country Link
CN (1) CN112800290B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112807110B (en) * 2021-01-28 2022-06-07 广东威力铭科技有限公司 Traceable planting base station based on Internet of things and matched processing system
CN113315869B (en) * 2021-05-19 2022-09-30 北京达佳互联信息技术有限公司 Content display method, content display device, electronic equipment, content display system and storage medium
CN113556748B (en) * 2021-06-23 2023-06-16 中国联合网络通信集团有限公司 Signaling tracing identification method, device and system
CN113343226A (en) * 2021-06-28 2021-09-03 平安信托有限责任公司 Sensitive data tracking monitoring method, device, equipment and medium based on grouping
CN113781014B (en) * 2021-09-26 2023-06-06 广域铭岛数字科技有限公司 Coating color difference management method, system, medium and terminal
CN114519590A (en) * 2022-02-23 2022-05-20 中冶赛迪重庆信息技术有限公司 Traceability information generation system and method, electronic device and readable storage medium
CN115630045B (en) * 2022-12-06 2023-07-21 上海埃林哲软件系统股份有限公司 Data tracing method and AI system based on artificial intelligence
CN116975129B (en) * 2023-09-14 2023-11-24 成都融见软件科技有限公司 Signal tracing method based on source file window, electronic equipment and medium
CN117176480B (en) * 2023-11-03 2024-01-09 北京锐服信科技有限公司 Method and system for tracing attack event
CN118280548B (en) * 2024-05-30 2024-08-09 广东医科大学附属医院 Medical instrument equipment traceability-oriented information management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540013A (en) * 2008-03-17 2009-09-23 亿维讯软件(北京)有限公司 System and method for tracing quality data of all life cycle
CN104504487A (en) * 2014-11-21 2015-04-08 新疆地拓信息科技发展有限公司 Method and system for tracing service object information between platforms
CN106991196A (en) * 2017-05-02 2017-07-28 山东浪潮通软信息科技有限公司 A kind of general data traceability method and system
CN108540507A (en) * 2017-03-02 2018-09-14 北京好扑信息科技有限公司 One kind conveying traceability system and retroactive method based on block chain digitlization command control information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807034B (en) * 2019-10-17 2023-11-10 歌尔股份有限公司 Traceable data generation method, traceable data generation device and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540013A (en) * 2008-03-17 2009-09-23 亿维讯软件(北京)有限公司 System and method for tracing quality data of all life cycle
CN104504487A (en) * 2014-11-21 2015-04-08 新疆地拓信息科技发展有限公司 Method and system for tracing service object information between platforms
CN108540507A (en) * 2017-03-02 2018-09-14 北京好扑信息科技有限公司 One kind conveying traceability system and retroactive method based on block chain digitlization command control information
CN106991196A (en) * 2017-05-02 2017-07-28 山东浪潮通软信息科技有限公司 A kind of general data traceability method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
前端请求参数MD5加密校验参数串解密;鲁小胖;《https://www.cnblogs.com/lpggo/p/8316295.html》;20180119;1 *
加密参数(用户名和密码),使用md5方法加密;a_106058457;《https://blog.csdn.net/a_1060584570/article/details/65944225》;20170325;1 *

Also Published As

Publication number Publication date
CN112800290A (en) 2021-05-14

Similar Documents

Publication Publication Date Title
CN112800290B (en) Tracing data acquisition method, device and equipment
CN105653981B (en) The sensitive data protection system and method for the data circulation and transaction of big data platform
US11526614B2 (en) Continuous vulnerability management system for blockchain smart contract based digital asset using sandbox and artificial intelligence
CN107423632B (en) Customizable sensitive data desensitization method and system
CN108268253B (en) Interface code generation method and terminal equipment
CN109766263A (en) Automatic test analysis and processing method, device, computer equipment and storage medium
US20140379665A1 (en) Data lineage management operation procedures
CN112540811B (en) Cache data detection method and device, computer equipment and storage medium
CN113742776B (en) Data verification method and device based on biological recognition technology and computer equipment
US20200111188A1 (en) Digitized test management center
CN108292346A (en) The extracts physical access control policy from static rights and Access Events
CN111597424A (en) Crawler identification method and device, computer equipment and storage medium
CN110990362A (en) Log query processing method and device, computer equipment and storage medium
CN112328482A (en) Test method and device based on script template, computer equipment and storage medium
CN107451819A (en) A kind of auth method and device based on user's operation behavior feature
US8620911B2 (en) Document registry system
CN113392426A (en) Method and system for enhancing data privacy of an industrial or electrical power system
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN117829291B (en) Whole-process consultation knowledge integrated management system and method
CN116541372A (en) Data asset management method and system
CN111143399A (en) Data processing method, data processing device, storage medium and computer equipment
CN110399704A (en) Change method, apparatus, computer equipment and the storage medium of account number cipher
CN114036117A (en) Log viewing method and device, computer equipment and storage medium
US20180260820A1 (en) System device and process for an educational regulatory electronic tool kit
US20080155690A1 (en) System and Method for Authenticating and Validating the Linkage Between Input Files and Output Files in a Computational Process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Shenzhen saidong Intelligent Manufacturing Technology Co.,Ltd.

Address before: Room 201, Building A, No. 1 Qianwan Road, Qianhaisheng Cooperation Zone, Shenzhen City, Guangdong Province, 518000

Applicant before: SHENZHEN SAIDONG BIOLOGICAL AUTOMATION Co.,Ltd.

CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000 2 / F, Beike building, 59 Gaoxin South 9th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen saidong Intelligent Manufacturing Technology Co.,Ltd.

Address before: Room 201, Building A, No. 1 Qianwan Road, Qianhaisheng Cooperation Zone, Shenzhen City, Guangdong Province, 518000

Applicant before: Shenzhen saidong Intelligent Manufacturing Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant