CN113191122B - Service-oriented construction project electronic file and electronic file four-way detection method - Google Patents

Service-oriented construction project electronic file and electronic file four-way detection method Download PDF

Info

Publication number
CN113191122B
CN113191122B CN202110453484.5A CN202110453484A CN113191122B CN 113191122 B CN113191122 B CN 113191122B CN 202110453484 A CN202110453484 A CN 202110453484A CN 113191122 B CN113191122 B CN 113191122B
Authority
CN
China
Prior art keywords
detection
file
metadata
electronic
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110453484.5A
Other languages
Chinese (zh)
Other versions
CN113191122A (en
Inventor
周剑
王立军
魏鹏帅
卞小草
张家成
魏小红
叶玲
黄康
刘盟盟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changjiang Institute of Survey Planning Design and Research Co Ltd
Original Assignee
Changjiang Institute of Survey Planning Design and Research Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changjiang Institute of Survey Planning Design and Research Co Ltd filed Critical Changjiang Institute of Survey Planning Design and Research Co Ltd
Priority to CN202110453484.5A priority Critical patent/CN113191122B/en
Publication of CN113191122A publication Critical patent/CN113191122A/en
Application granted granted Critical
Publication of CN113191122B publication Critical patent/CN113191122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/14Tree-structured documents
    • G06F40/143Markup, e.g. Standard Generalized Markup Language [SGML] or Document Type Definition [DTD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/113Details of archiving
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a service-oriented construction project electronic file and electronic file four-way detection method. The method comprises the following steps: defining a packet structure; step two: calling an interface to remotely call a four-way detection interface to verify the electronic file or the electronic file by an internal business department, a file department and a related business system of the file store of the electronic file standing unit; step three: receiving detection; the background detects the data after receiving the related data through the interface; step four: and detecting the four properties of the electronic file and the electronic archive, wherein the serial number after detecting the project is the called interface serial number. The invention overcomes the defects of inconvenient circulation, tedious inquiry and the like of paper files in the prior art; the method has the advantages that the method is used as a third party service to call an internal business department, a file department and a user of a file store of the electronic file, completes verification of authenticity, integrity, availability and safety of the electronic file on line, and returns related detection results and reports in real time.

Description

Service-oriented construction project electronic file and electronic file four-way detection method
Technical Field
The invention relates to the field of engineering and information technology, in particular to a service-oriented construction project electronic file and electronic file four-way detection method.
Background
The four properties of the electronic file refer to authenticity, integrity, availability and security, and according to the definition in the general requirements for document electronic file detection in the electronic file archiving and electronic file management Specification, the authenticity refers to the property that the content, logic structure and background of the electronic file are consistent with the original condition when formed; integrity refers to the property of the electronic file that the content, structure and background information are complete and not destroyed, mutated or lost; availability refers to the property by which an electronic archive can be retrieved, presented, and understood; the security refers to the property that the management process of the electronic file is controllable, the data storage is reliable, and the electronic file is not destroyed or illegally accessed.
The authenticity not only can reflect the historical original appearance of each activity of the society, but also is a premise for forming the value attribute of the electronic file, and is an important basis for ensuring the administrative effectiveness and legal evidence of the electronic file; the integrity is an important guarantee for ensuring the value of the electronic archive certificate; availability is the basis for the existence and preservation value of the electronic file, and if the electronic file cannot be used conveniently, valuable file data can lose the actual meaning of existence; security is the basis for authenticity, integrity and availability, and is the guarantee of maintaining the value of electronic archive credentials and legal effectiveness.
The electronic file and the four properties of the electronic file are guaranteed, the electronic file can become a precondition of the electronic file, and the electronic file is also a key element capable of being stored for a long time. The method for managing the electronic file in the temporary way published in 2009 (two-office word [ 2009 ] 39) firstly provides a four-way concept and explicitly indicates that 'authentication, integrity, availability and safety aspects should be carried out when the electronic file is filed'; the "electronic archive transfer and reception method" issued by the national archive office in 2012 (archive [ 2012 ] No. 7) indicates that the four properties of an electronic archive are to be detected during the electronic archive transfer and reception process. In order to standardize the four-way detection work of electronic files, the national archives bureau is working to formulate the standard specification of four-way detection of electronic files, and the general requirements for detecting electronic files of paperwork are published at present.
Therefore, the four-property detection of the electronic file plays a role in the life cycle management process of the electronic file, is an important means for guaranteeing the authenticity, the integrity, the usability and the safety of the electronic file, and is an important measure for guaranteeing the credential value, the examination value and the preservation value of the electronic file.
Therefore, it is necessary to develop a method for detecting the four-property of electronic files.
Disclosure of Invention
The invention aims to provide a service-oriented construction project electronic file and electronic file four-way detection method, which is used as a third party service to call an internal business department, a file department and a file store user of an electronic file setting unit, completes verification of authenticity, integrity, availability and safety of an electronic file on line and returns related detection results and reports in real time.
In order to achieve the above purpose, the technical scheme of the invention is as follows: a four-way detection method for electronic files and electronic files of service-oriented construction projects is characterized by comprising the following steps: comprises the following steps of the method,
step one: defining a packet structure;
step two: calling an interface to remotely call a four-way detection interface to verify the electronic file or the electronic file by an internal business department, a file department and a related business system of the file store of the electronic file standing unit;
step three: receiving detection;
the background detects the data after receiving the related data through the interface;
step four: detecting the four properties of the electronic file and the electronic archive, wherein the serial number after detecting the project is the called interface serial number;
the electronic file and the method for detecting the four properties of the electronic file specifically comprise the following contents:
firstly, performing environment detection;
secondly, after the environment detection is completed, entering information package and database metadata detection, and simultaneously carrying out detection work of availability, authenticity, integrity and safety:
thirdly, detecting the content of the electronic file;
and fourthly, comprehensively judging all the processes in the process to finish the safety detection of the operation process.
In the above technical solution, in the second step, a method for remotely calling a four-way detection interface to verify an electronic file or an electronic archive by an internal service department, an archive department and an archive office related service system of an electronic file standing unit is implemented, which specifically includes the following steps:
1) Before detection, packaging the tested electronic file and metadata thereof into an information packet according to a specified format;
2) Transmitting the information packet description file, the encapsulated information packet and the backup file to a designated FTP;
3) Calling parameters such as interface numbers, information package paths, information package encapsulation topology description file paths, EEP metadata encapsulation structure description file paths, database information, archiving range and sequencing configuration, user metadata configuration, backup file paths, manual detection results and the like;
4) Receiving detection feedback information, including detection success information, failure information and result report in XML format;
5) And marking the detected electronic file, and correlating the detection report.
In the above technical solution, in the third step, after the background receives the related data through the interface, the detection method is as follows:
1) Analyzing the information packet path to obtain an information packet package topology structure file;
2) Analyzing the path of the information package topology structure description file to obtain the information package topology structure description file;
3) Analyzing the information package topological structure file by utilizing the information package topological structure description file to obtain all entity files and metadata files thereof;
4) Analyzing the EEP metadata encapsulation structure description file path to obtain an information encapsulation topology description file and an EEP metadata encapsulation structure description file;
5) Analyzing the metadata file obtained in the step 3 by using the EEP metadata encapsulation structure description file to obtain all metadata values of the electronic file;
6) Analyzing the database information database, table, field to obtain entity files and all metadata values recorded in the database;
7) Analyzing the user metadata configuration to obtain an external metadata strategy;
8) Based on the analysis result, the archiving range, the sorting configuration, the backup file path and the manual detection data are combined to be used as input values, so that the calculation, comparison and analysis of each four-way detection item are completed.
In the above technical scheme, in the fourth step, in the electronic file and electronic file four-way detection method, when the detection item fails, all detection results are recorded and displayed to the user together.
In the above technical solution, in the fourth step, the specific method for performing the environmental detection is as follows:
1) Simultaneously starting availability detection and security detection by adopting a multithreading operation mode;
2) The method comprises the steps of sequentially detecting the change condition of a storage environment, detecting the restorability of backup data and detecting the compliance of software and hardware environments in the usability detection;
3) At the same time of the detection in the previous step, the system simultaneously carries out detection on whether antivirus software is installed in the system environment, virus infection detection, carrier reading speed detection, carrier appearance detection, CD qualification detection, software system security hole detection and carrier storage environment security detection in the security detection unit.
In the above technical solution, in the fourth step, after the environment detection is completed, the information packet and the database metadata are entered for detection, and meanwhile, the detection work of availability, authenticity, integrity and security is performed, and the specific detection method is as follows:
1) Firstly, detecting accessibility of metadata in a target database and readability of metadata in an information packet, and detecting whether the database and the information packet are communicated or not so as to further go deep into a subsequent data detection link;
2) After the database connection and the readable information package are determined, consistency detection of the information package is performed, so that the information package is ensured not to be tampered;
3) Aiming at the information package, the information package directory structure normalization detection and the specification file and directory file normalization detection are carried out, so that the structure accuracy of the information package is ensured, and the information package is convenient for further utilization;
4) Analyzing the information package to obtain an electronic file package, and detecting the normalization of the electronic file package to ensure the compliance of the electronic file package structure in the information package, thereby facilitating further utilization;
5) And aiming at the electronic file package after the verification in the last step, carrying out XML code-level verification: detecting the validity of an electronic signature of an electronic file package, and ensuring that the complete source of XML codes is feasible by analyzing the validity of the electronic signature in the package;
6) The next step of deep analysis detection of the information packet is performed, firstly, the comparison of the number of files is performed, the consistency of the total number of files is detected, the integrity of the content data of the information packet is detected, the redundant files in the carrier are detected, and then the comparison of the storage size of the files is performed, and the consistency of the total number of bytes is detected;
7) Next, comparing the metadata items, analyzing the accuracy of the metadata items, and sequentially performing metadata item integrity check and information package metadata integrity check;
8) Next, analyzing metadata content, namely firstly starting to detect from the content format of a file number, and detecting the normalization of the file number and the consistency of metadata items and requirements of an archive;
9) After the file number analysis is completed, further expanding to detect metadata attributes of the electronic file, and detecting consistency of electronic attributes of the content data;
10 Further detecting whether metadata is associated with content data, analyzing whether the file path pointed by each metadata has associated content, and detecting the archiving range;
11 The method comprises the steps of detecting the format and content aspects of other metadata item contents, including metadata item data length detection, metadata item data type, format detection, metadata item value range coincidence detection of a set value range, metadata item data value rationality detection, metadata item data containing special character detection, metadata item data repeatability detection, metadata item filling item detection, process information integrity detection and continuity metadata item detection.
In the above technical solution, in the fourth step, the specific method for detecting the content of the electronic file is as follows:
1) After the detection of all metadata items and the content formats thereof is finished in the last step, the electronic files associated with the metadata are deeply detected one by one, and the validity detection of the solidification information is finished first, so that each electronic file is ensured not to be tampered;
2) Next, content data format detection, content data readability detection, content data integrity detection, content data format long-term availability detection, attachment data integrity detection, content data format compliance detection contained in the information package are performed.
The quadrilaterals described herein refer to authenticity, integrity, availability, and security.
The invention has the following advantages:
(1) The system for forming, archiving and managing the electronic file of the quality inspection of the hydraulic and hydroelectric engineering adopts an informatization method, and the formed electronic file and electronic file can completely replace the traditional paper file, thereby eliminating the defects of inconvenient paper file circulation, complex inquiry, troublesome storage and the like;
(2) The invention adopts four-property detection and other technologies to ensure that the electronic file is real, complete, reliable and available in the whole life cycle of the electronic file;
(3) The invention is suitable for the works of forming, archiving and managing the electronic file for the quality inspection and evaluation of the water conservancy and hydropower engineering, can effectively reduce the investment of personnel and materials in practical application, has high replicability, is suitable for the application of similar engineering projects, and has considerable economic benefit and social benefit.
Drawings
FIG. 1 is a portion of a flow chart of the four-way detection of electronic documents and files for service oriented construction projects of the present invention.
FIG. 2 is another part of a flow chart for four-way detection of electronic documents and files for service oriented construction projects according to the present invention.
Fig. 1 and fig. 2 constitute a complete flowchart of the four-way detection of electronic files and electronic files of the service-oriented construction project according to the present invention.
Detailed Description
The following detailed description of the invention is, therefore, not to be taken in a limiting sense, but is made merely by way of example. While making the advantages of the present invention clearer and more readily understood by way of illustration.
As can be seen with reference to the accompanying drawings: a service-oriented construction project electronic file and electronic archive four-way detection method specifically comprises the following steps:
step one: defining a structure of the information package;
the information package structure (information package structrue) is predefined and shared, so that background automatic identification and extraction of data in the package are facilitated to analyze, and the automation of the four-way detection service is realized;
the predefined and shared information package structure adopts an XMLschema standard format to describe the information package structure, and a user files and manages service requirements according to electronic files of different construction projects and refers to related specification requirements to manufacture an information package topological structure and an EEP metadata package structure description file (XSD format) of the electronic files;
step two: an interface service;
the method is characterized in that a set of interface service for online calling is provided, only the service system is required to transmit parameters such as information packet description files, information packet paths, databases and the like, a remote server is matched with a user to detect and return detection results and reports in real time, and the internal service departments, archive departments and related service systems of archives of electronic file standing units remotely call four-way detection interfaces to verify electronic files or electronic archives, and the realization method is as follows:
1) Before detection, packaging the tested electronic file (archive) and metadata thereof into an information packet according to a specified format;
2) Transmitting the information packet description file, the encapsulated information packet and the backup file to a designated FTP;
3) Calling parameters such as interface numbers, information package paths, information package encapsulation topology description file paths, EEP metadata encapsulation structure description file paths, database information, archiving range and sequencing configuration, user metadata configuration, backup file paths, manual detection results and the like;
the detection interface number < nquery > is a character type, the file number inquires the interface number, and base64 coding is adopted; the information packet path < ipurl > is of character type, the FTP path information of the information packet is recorded, and base64 coding is adopted; recording the topological structure of the information package by adopting base64 coding, wherein the path < ipschema aurl > of the topological structure description file of the information package is a character type; EEP metadata encapsulation structure describes that the file path < eeepschemaurl > is of character type, records the EEP metadata encapsulation structure of the electronic file and adopts base64 coding; the database information comprises < database >, < table >, < field > information, wherein < database > is of an XML type to record database access information, base64 coding is adopted, the < table > is information of an XML type record data table, base64 coding is adopted, and < field > is XML type record data field information, and parameters such as field type, length, value range, reasonable value, repeatability and the like are included, and base64 coding is adopted; the archiving range and the ordering configuration < gdscope > are of XML type, and the archiving range and the ordering list parameters to be detected are recorded; the user metadata configuration < config > is character type, configuration parameters such as metadata field configuration information, repeatability and the like are recorded, and base64 coding is adopted; the backup file path < backup > is of character type, the FTP path of the backup file is recorded, and base64 coding is adopted; the manual detection result < handinput > is of an XML type, parameters input in the manual detection project are recorded, and base64 coding is adopted;
4) Receiving detection feedback information, including detection success information, failure information and result report in XML format;
5) Marking the detected electronic file (archive) and correlating the detection report;
step three: receiving detection;
after the background receives the related data through the interface, the detection scheme is as follows:
1) Analyzing the information packet path to obtain an information packet package topology structure file (XML format);
2) Analyzing the path of the information package topology description file to obtain an information package topology description file (XSD format);
3) Analyzing the information package topological structure file by utilizing the information package topological structure description file to obtain all entity files and metadata files (XML format) of the entity files;
4) Analyzing the path of the EEP metadata encapsulation structure description file to obtain an information encapsulation topology description file (XSD format) and an EEP metadata encapsulation structure description file (XSD format);
5) Analyzing the metadata file obtained in the step 3) by using the EEP metadata encapsulation structure description file to obtain all metadata values of the electronic file;
6) Analyzing the database information database, table, field to obtain entity files and all metadata values recorded in the database;
7) Analyzing the user metadata configuration to obtain an external metadata strategy;
8) Based on the analysis result, the archiving range, the sorting configuration, the backup file path and the manual detection data are combined to be used as input values, so that calculation, comparison and analysis of all four detection items are completed;
step four: detecting the four properties;
referring to general requirements for document electronic file detection (DA/T70-2018) and program development logic, when an enterprise business department performs an electronic file archiving link to an archive department, and when the enterprise archive department performs electronic file transfer to an external archive system and performs long-term storage in the archive system, the electronic file and electronic file four-way detection is performed according to the following program, and the serial numbers after detection items are called interface serial numbers;
the specific four-property detection method comprises the following steps:
firstly, performing environment detection;
1) Simultaneously starting availability detection and security detection by adopting a multithreading operation mode; the multithreading operation mode is a common means for system operation;
2) Sequentially performing storage environment change condition detection (307), backup data restorability detection (309) and software and hardware environment compliance detection (306) in the usability detection; the method comprises the steps of detecting the change condition of a storage environment, detecting the restorability of backup data and detecting the compliance of a software environment and a hardware environment, wherein the detection of the compliance of the storage environment and the restorability of the backup data are all the prior art;
3) At the same time of the detection in the previous step, the background simultaneously carries out detection (401) of whether antivirus software is installed in the system environment, detection (402) of virus infection, detection (404) of carrier reading speed, detection (405) of carrier appearance, detection (406) of CD qualification, detection (408) of software system security loophole and detection (409) of carrier storage environment security in sequence in a security detection unit; whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; whether antivirus software detection (401), virus infection detection (402), carrier reading speed detection (404), carrier appearance detection (405), optical disc qualification detection (406), software system security hole detection (408) and carrier storage environment security detection (409) are all in the prior art;
secondly, after the environment detection is completed, entering information package and database metadata detection, and simultaneously carrying out detection work of availability, authenticity, integrity and safety;
1) Firstly, detecting the accessibility of metadata in a target database (302) and the readability of the metadata in an information packet (301), and detecting whether the database and the information packet are communicated or not so as to further go deep into a subsequent data detection link; the qualified detection is carried out in the next step, and the unqualified detection cannot be carried out in the subsequent links; the method comprises the steps of detecting metadata accessibility (302) in a target database and detecting readability (301) of metadata in an information packet, wherein the metadata accessibility detection (302) and the readability detection (301) of metadata in the information packet are both in the prior art;
2) After the database connection and the readable information package are determined, consistency detection (114) of the information package is performed to ensure that the information package is not tampered; whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; wherein the consistency detection (114) of the information packets is prior art;
3) For the information package, carrying out information package catalog structure normalization detection (113) and description file and catalog file normalization detection (112), ensuring the structure accuracy of the information package and facilitating further utilization; wherein, the information package directory structure normalization detection (113) and the specification file and directory file normalization detection (112) are all the prior art;
4) Analyzing the information package to obtain an electronic file package, and detecting the normalization of the electronic file package (115), so as to ensure the structural compliance of the electronic file package (EEP package) in the information package, thereby facilitating the further utilization; wherein, the electronic file package normalization detection (115) is the prior art;
5) And aiming at the electronic file package after the verification in the last step, carrying out XML code-level verification: the electronic signature validity detection (116) of the electronic file package ensures that the complete source of the XML code is feasible by analyzing the validity of the electronic signature in the package; the XML code level verification method is the prior art;
6) The next step of deep analysis detection of the information packet is performed, firstly, the comparison of the number of files is performed, the total number of files is detected (201), the integrity of the content data of the information packet is detected (211), the redundant files in the carrier are detected (403), and then the comparison of the storage size of the files is performed, and the total number of bytes is detected (202); whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; the method for deeply analyzing and detecting the information packet is the prior art;
7) Next, comparing the metadata items, analyzing the accuracy of the metadata items, and sequentially detecting the integrity of the metadata items (203) and the integrity of the metadata of the information package (210); whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; the metadata item integrity detection (203) and the information package metadata integrity detection (210) are all in the prior art.
8) Next, analyzing metadata content, namely firstly starting to detect from the content format of a file number, and detecting the normalization of the file number (107), and detecting the consistency of metadata items (whole number, catalog number and class number) and requirements of an archive (109); whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; the file number normalization detection (107), the metadata item (whole number, catalog number and class number) and the consistency detection (109) required by the archive are all in the prior art;
9) After the file number analysis is completed, further expanding to detect metadata attribute of the electronic file, and detecting the consistency of the electronic attribute of the content data (110); whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; wherein the electronic attribute consistency detection (110) of the content data is prior art;
10 Further performing metadata related content data detection (111), analyzing whether related content exists in a file path pointed by each metadata, and performing archive range detection (209); whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; wherein, whether metadata is related to content data detection (111) and archiving scope detection (209) are all the prior art;
11 Continuing to detect formats and content aspects of other metadata item contents, including metadata item data length detection (102), metadata item data type, format detection (103), metadata item value range coincidence detection (104) of set value range, metadata item data value rationality detection (105), metadata item data containing special character detection (106), metadata item data repeatability detection (108), metadata necessary-to-be-filled item detection (204), process information integrity detection (205) and continuity metadata item detection (206); whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; the metadata item data length detection (102), the metadata item data type, the format detection (103), the metadata item value range coincidence degree detection (104) of a set value range, the metadata item data value rationality detection (105), the metadata item data comprising special character detection (106), the metadata item data repeatability detection (108), the metadata necessary filling item detection (204), the process information integrity detection (205) and the continuity metadata item detection (206) are all in the prior art;
thirdly, detecting the content of the electronic file (archive);
1) After the detection of all metadata items and the content formats thereof is finished in the last step, the electronic files (files) related to the metadata are deeply detected one by one, and the validity detection (101) of the solidification information is finished first, so that each electronic file (file) is ensured not to be tampered; wherein the curing information validity detection (101) is the prior art;
2) Next, content data format detection (303), content data readability detection (304), content data integrity detection (207), content data format long-term availability detection (305), attachment data integrity detection (208), content data format compliance detection (308) contained in the information packet are performed; whether the detection is qualified or not is detected in the next step, after all the detection is completed, the background displays the detection record to the user, namely: recording all detection results and displaying the detection results to a user; the content data format detection (303), the content data readability detection (304), the content data integrity detection (207), the content data format long-term availability detection (305), the attachment data integrity detection (208) and the content data format compliance detection (308) contained in the information packet are all of the prior art;
fourth, comprehensively judging all the processes in the process to finish the safety detection (407) of the operation process; selecting safety evaluation opinion by utilizing system interaction; wherein the operation process safety detection (407) is prior art.
The four-way detection implementation process comprises the following steps: in the implementation step, if a certain item of detection fails, the background does not terminate the whole implementation procedure, and all items of detection results are recorded and displayed to a user together; if a certain detection is not needed in the detection of a certain link, the implementation can jump to the next detection program in sequence.
Other non-illustrated parts are known in the art.

Claims (4)

1. A four-way detection method for electronic files and electronic files of service-oriented construction projects is characterized by comprising the following steps: comprises the following steps of the method,
step one: defining a packet structure;
step two: the calling interface is used for remotely calling the four-way detection interface to verify the electronic file or the electronic file by an internal business department, a file department and a related business system of the file store of the electronic file standing unit, and the method is concretely as follows:
1) Before detection, packaging the tested electronic file and metadata thereof into an information packet according to a specified format;
2) Transmitting the information packet description file, the encapsulated information packet and the backup file to a designated FTP;
3) Calling interface service to input detection interface numbers, information package paths, information package encapsulation topology description file paths, EEP metadata encapsulation structure description file paths, database information, archiving range and sequencing configuration, user metadata configuration, backup file paths and manual detection result parameters;
4) Receiving detection feedback information, including detection success information, failure information and result report in XML format;
5) Marking the detected electronic file, and correlating the detection report;
step three: receiving detection;
after the background receives the related data through the interface, the data are detected, and the detection method is as follows:
1) Analyzing the information packet path to obtain an information packet package topology structure file;
2) Analyzing the path of the information package topology structure description file to obtain the information package topology structure description file;
3) Analyzing the information package topological structure file by utilizing the information package topological structure description file to obtain all entity files and metadata files thereof;
4) Analyzing the EEP metadata encapsulation structure description file path to obtain an information encapsulation topology description file and an EEP metadata encapsulation structure description file;
5) Analyzing the metadata file obtained in the step 3 by using the EEP metadata encapsulation structure description file to obtain all metadata values of the electronic file;
6) Analyzing the database information database, table, field to obtain entity files and all metadata values recorded in the database;
7) Analyzing the user metadata configuration to obtain an external metadata strategy;
8) Based on the analysis result, the archiving range, the sorting configuration, the backup file path and the manual detection data are combined to be used as input values, so that calculation, comparison and analysis of all four detection items are completed;
step four: detecting the four properties of the electronic file and the electronic archive, wherein the serial number after detecting the project is the called interface serial number;
the electronic file and the method for detecting the four properties of the electronic file specifically comprise the following contents:
firstly, performing environment detection;
secondly, after the environment detection is completed, entering information package and database metadata detection, and simultaneously carrying out detection work of availability, authenticity, integrity and safety, wherein the specific detection method comprises the following steps:
1) Firstly, detecting accessibility of metadata in a target database and readability of metadata in an information packet, and detecting whether the database and the information packet are communicated or not so as to further go deep into a subsequent data detection link;
2) After the database connection and the readable information package are determined, consistency detection of the information package is performed, so that the information package is ensured not to be tampered;
3) Aiming at the information package, the information package directory structure normalization detection and the specification file and directory file normalization detection are carried out, so that the structure accuracy of the information package is ensured, and the information package is convenient for further utilization;
4) Analyzing the information package to obtain an electronic file package, and detecting the normalization of the electronic file package to ensure the compliance of the electronic file package structure in the information package, thereby facilitating further utilization;
5) And aiming at the electronic file package after the verification in the last step, carrying out XML code-level verification: detecting the validity of an electronic signature of an electronic file package, and ensuring that the complete source of XML codes is feasible by analyzing the validity of the electronic signature in the package;
6) The next step of deep analysis detection of the information packet is performed, firstly, the comparison of the number of files is performed, the consistency of the total number of files is detected, the integrity of the content data of the information packet is detected, the redundant files in the carrier are detected, and then the comparison of the storage size of the files is performed, and the consistency of the total number of bytes is detected;
7) Next, comparing the metadata items, analyzing the accuracy of the metadata items, and sequentially performing metadata item integrity check and information package metadata integrity check;
8) Next, analyzing metadata content, namely firstly starting to detect from the content format of a file number, and detecting the normalization of the file number and the consistency of metadata items and requirements of an archive;
9) After the file number analysis is completed, further expanding to detect metadata attributes of the electronic file, and detecting consistency of electronic attributes of the content data;
10 Further detecting whether metadata is associated with content data, analyzing whether the file path pointed by each metadata has associated content, and detecting the archiving range;
11 Continuing to detect the format and content aspects of other metadata item contents, including metadata item data length detection, metadata item data type, format detection, metadata item value range coincidence detection of a set value range, metadata item data value rationality detection, metadata item data containing special character detection, metadata item data repeatability detection, metadata item filling detection, process information integrity detection and continuity metadata item detection;
thirdly, detecting the content of the electronic file;
and fourthly, comprehensively judging all the processes in the process to finish the safety detection of the operation process.
2. The method for detecting the four-property of the electronic file and the electronic archive of the service-oriented construction project according to claim 1, wherein the method comprises the following steps: in the fourth step, in the method for detecting the four properties of the electronic file and the electronic archive, when the detection item fails, all detection results are recorded and displayed to the user together.
3. The method for detecting the four-property of the electronic file and the electronic archive of the service-oriented construction project according to claim 2, wherein the method comprises the following steps: in the fourth step, the specific method for performing the environment detection is as follows:
1) Simultaneously starting availability detection and security detection by adopting a multithreading operation mode;
2) The method comprises the steps of sequentially detecting the change condition of a storage environment, detecting the restorability of backup data and detecting the compliance of software and hardware environments in the usability detection;
3) At the same time of the detection in the previous step, the system simultaneously carries out detection on whether antivirus software is installed in the system environment, virus infection detection, carrier reading speed detection, carrier appearance detection, CD qualification detection, software system security hole detection and carrier storage environment security detection in the security detection unit.
4. The method for detecting the four-property of the electronic file and the electronic archive of the service-oriented construction project according to claim 3, wherein the method comprises the following steps: in the fourth step, the specific method for detecting the content of the electronic file is as follows:
1) After the detection of all metadata items and the content formats thereof is finished in the last step, the electronic files associated with the metadata are deeply detected one by one, and the validity detection of the solidification information is finished first, so that each electronic file is ensured not to be tampered;
2) Next, content data format detection, content data readability detection, content data integrity detection, content data format long-term availability detection, attachment data integrity detection, content data format compliance detection contained in the information package are performed.
CN202110453484.5A 2021-04-26 2021-04-26 Service-oriented construction project electronic file and electronic file four-way detection method Active CN113191122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110453484.5A CN113191122B (en) 2021-04-26 2021-04-26 Service-oriented construction project electronic file and electronic file four-way detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110453484.5A CN113191122B (en) 2021-04-26 2021-04-26 Service-oriented construction project electronic file and electronic file four-way detection method

Publications (2)

Publication Number Publication Date
CN113191122A CN113191122A (en) 2021-07-30
CN113191122B true CN113191122B (en) 2023-05-26

Family

ID=76979019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110453484.5A Active CN113191122B (en) 2021-04-26 2021-04-26 Service-oriented construction project electronic file and electronic file four-way detection method

Country Status (1)

Country Link
CN (1) CN113191122B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115618394B (en) * 2022-11-09 2024-01-26 广州明动软件股份有限公司 Four-way detection method based on cloud archive integrated platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143281A (en) * 2019-12-31 2020-05-12 精英数智科技股份有限公司 File management method, device, system and medium
CN111159101A (en) * 2019-12-11 2020-05-15 中国电建集团华东勘测设计研究院有限公司 Electronic file full life cycle management method in hydraulic and hydroelectric engineering construction management
CN112184172A (en) * 2020-10-12 2021-01-05 北京美络克思科技有限公司 Electronic file on-line transfer and receiving method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8762325B2 (en) * 2008-10-06 2014-06-24 Foxit Corporation Processing of files for electronic content management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111159101A (en) * 2019-12-11 2020-05-15 中国电建集团华东勘测设计研究院有限公司 Electronic file full life cycle management method in hydraulic and hydroelectric engineering construction management
CN111143281A (en) * 2019-12-31 2020-05-12 精英数智科技股份有限公司 File management method, device, system and medium
CN112184172A (en) * 2020-10-12 2021-01-05 北京美络克思科技有限公司 Electronic file on-line transfer and receiving method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
骆建珍 ; 杨安荣 ; 马来娣 ; .电子档案"四性"检测要求及其实现方法.浙江档案.2017,(第12期),全文. *

Also Published As

Publication number Publication date
CN113191122A (en) 2021-07-30

Similar Documents

Publication Publication Date Title
CN108520464B (en) Real-time automatic supervision reporting system based on traditional block chain
US8892534B2 (en) System and method for integrating data quality metrics into enterprise data management processes
US10013439B2 (en) Automatic generation of instantiation rules to determine quality of data migration
US8949166B2 (en) Creating and processing a data rule for data quality
CN108520293A (en) A kind of product false proof source tracing method, device, server and storage medium
CN109254969A (en) Tables of data processing method, device, equipment and storage medium
CN104361119A (en) Data cleaning method and system
CN110209684A (en) Tracking, device, system and the medium of database D DL change operation
EP3444741A1 (en) Generating rules to detect security vulnerabilities based on vulnerability primitives with entry point finder
US20110145005A1 (en) Method and system for automatic business content discovery
CN107247767A (en) A kind of method and device that database is imported by formatted data files
CN113191122B (en) Service-oriented construction project electronic file and electronic file four-way detection method
CN115204909A (en) Multi-dimensional food cold chain traceability system based on block chain
US11443046B2 (en) Entry point finder
US20160132497A1 (en) Data protection compliant version control
CN112711563A (en) Method and system for detecting electronic file tetragonality
CN109947797A (en) A kind of data detecting device and method
CN116881979A (en) Method, device and equipment for detecting data safety compliance
CN116719799A (en) Environment-friendly data management method, device, computer equipment and storage medium
US10289531B2 (en) Software integration testing with unstructured database
WO2023116031A1 (en) Message checking method and apparatus, and terminal device and computer-readable storage medium
CN114385722A (en) Interface attribute consistency checking method and device, electronic equipment and storage medium
US20080155352A1 (en) Method and system for carrying out an operation based on a log record of a computer program
US10572669B2 (en) Checking for unnecessary privileges with entry point finder
JP2009517780A (en) Business transaction representation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant