CN113347193A - Data request permission method and system based on cloud server and cloud platform - Google Patents

Data request permission method and system based on cloud server and cloud platform Download PDF

Info

Publication number
CN113347193A
CN113347193A CN202110666286.7A CN202110666286A CN113347193A CN 113347193 A CN113347193 A CN 113347193A CN 202110666286 A CN202110666286 A CN 202110666286A CN 113347193 A CN113347193 A CN 113347193A
Authority
CN
China
Prior art keywords
data
content data
floating
instruction
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110666286.7A
Other languages
Chinese (zh)
Inventor
张倩
翟晓军
杨海珍
陈伟宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yunmofan Information Technology Co ltd
Original Assignee
Guangzhou Yunmofan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yunmofan Information Technology Co ltd filed Critical Guangzhou Yunmofan Information Technology Co ltd
Priority to CN202110666286.7A priority Critical patent/CN113347193A/en
Publication of CN113347193A publication Critical patent/CN113347193A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

According to the data request permission method, the data request permission system and the cloud platform based on the cloud server, target content data in a target operation behavior are obtained through responding to a target permission event, instruction labels corresponding to the target content data are loaded based on key features in the target operation behavior, then a plurality of content data to be selected matched with the target content data are determined based on preset keys, the preset keys are set based on the key data corresponding to the content data to be selected and floating data, the floating data are determined based on the association gradient of second data instructions corresponding to the content data to be selected, and then the instruction labels are extracted to be loaded in the key features. Therefore, the process of automatically extracting and loading the data instruction of the content data to be selected is realized, and the effectiveness of the loaded data instruction is ensured and the accuracy of data loading of the content data is improved because the floating key data and the floating data are adopted for combined screening in the process of extracting the content data to be selected.

Description

Data request permission method and system based on cloud server and cloud platform
Technical Field
The application relates to the technical field of cloud servers and data permission, in particular to a data request permission method and system based on a cloud server and a cloud platform.
Background
With the continuous progress of communication technology, users pay more and more attention to the security of related data transmission, and therefore, before the related data transmission, whether the related data can be transmitted or not needs to be permitted through a cloud server. Therefore, the risk of outputting related data can be effectively reduced, and the condition that the user feels bad in practicality due to the fact that the user wants to disclose the data is avoided.
However, there are some drawbacks in the related data request permission technique. For example: the related data comprises key data and floating data, so that only the key data can be identified and the floating data cannot be identified in the process of applying for data permission, and the accuracy of related data request permission is difficult to guarantee.
Disclosure of Invention
In view of this, the present application provides a data request permission method, system and cloud platform based on a cloud server.
In a first aspect, a data request permission method based on a cloud server is provided, which includes:
target content data in a target operation behavior is obtained in response to a target permission event, and an instruction tag corresponding to a first data instruction corresponding to the target content data is loaded based on key features in the target operation behavior;
determining a plurality of pieces of content data to be selected matched with the target content data based on a preset key, wherein the preset key is set based on key data and floating data corresponding to the content data to be selected, and the floating data is determined based on the association gradient of a second data instruction corresponding to the content data to be selected;
and extracting an instruction tag corresponding to the second data instruction so as to load in the key feature and obtain data request permission.
Preferably, the determining, based on a preset key, a plurality of content data to be selected that match the target content data includes:
determining a spatial order of the target content data;
determining a plurality of matching content data within a preset sequence number based on the spatial order;
respectively determining key data and floating data corresponding to the matched content data, and transmitting a preset network to obtain a request permission standard value;
and extracting the matched content data according to the request permission standard value to determine the content data to be selected.
Preferably, the determining a plurality of matching content data within a preset sequence number based on the spatial order includes:
sequentially allocating the spaces as a sequential list;
and matching in the preset sequence number based on the sequence initial point corresponding to the sequence list to obtain a plurality of matching content data.
Preferably, the determining the key data and the floating data corresponding to the matching content data, respectively, and transmitting a preset network to obtain the requested license standard value includes:
determining a key coefficient based on key data corresponding to the matched content data, wherein the key coefficient is set based on at least one of a direction coefficient, an object coefficient, an attribute coefficient, an instruction coefficient or a time coefficient;
determining a floating coefficient based on floating data corresponding to the matched content data, wherein the floating coefficient is set based on a floating state and floating feedback of an instruction tag corresponding to the matched content data;
and transmitting the key coefficient and the floating coefficient to the preset network to obtain the request permission standard value.
Preferably, the determining a floating coefficient based on floating data corresponding to the matching content data includes:
determining the category of the requesting device based on the floating data corresponding to the matched content data;
determining corresponding pass data when the request equipment type is allowed equipment;
determining floating data of the matching content data within the matching content data indicating a pass sequence number based on the pass data to determine the floating coefficient.
Preferably, the extracting the matching content data according to the request permission standard value to determine the content data to be selected includes:
distributing the matched content data according to the request permission standard value to obtain a matching sequence;
determining a preset order item in the matching sequence;
and auditing the preset sequence items to determine the to-be-selected content data passing the auditing.
Preferably, the extracting an instruction tag corresponding to the second data instruction to load in the key feature to obtain a data request permission includes:
extracting an instruction tag corresponding to the second data instruction;
calling a cleaning program to perform floating identification based on the instruction tag corresponding to the second data instruction; and if the floating identification passes, loading the instruction tag in the key feature.
Preferably, the invoking a washing program for floating recognition based on the instruction tag corresponding to the second data instruction includes:
calling a cleaning program based on the instruction tag corresponding to the second data instruction so as to perform tag conversion on the instruction tag corresponding to the second data instruction to obtain a floating tag;
and carrying out floating identification according to the floating label. .
In a second aspect, a data request permission system based on a cloud server is provided, which includes a processor and a memory, which are communicated with each other, and the processor is used for reading a computer program from the memory and executing the computer program to realize the method.
In a third aspect, a cloud platform, comprising: a memory for storing a computer program; a processor coupled to the memory for executing the computer program stored by the memory to implement the above-described method.
According to the data request permission method, the data request permission system and the cloud platform based on the cloud server, target content data in a target operation behavior is obtained by responding to a target permission event, and an instruction tag corresponding to a first data instruction corresponding to the target content data is loaded based on key features in the target operation behavior; then determining a plurality of pieces of content data to be selected matched with the target content data based on a preset key, setting the preset key based on key data and floating data corresponding to the content data to be selected, and determining the floating data based on the association gradient of a second data instruction corresponding to the content data to be selected; and further extracting an instruction tag corresponding to the second data instruction so as to load in the key features. The method and the device have the advantages that the process of automatically extracting and loading the data instruction of the content data to be selected is realized, and the floating key data and the floating data are jointly screened in the process of extracting the content data to be selected, so that the effectiveness of the loaded data instruction is guaranteed, and the accuracy of loading the data of the content data is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments are briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the serial number, and for those skilled in the art, other related drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a data request permission method based on a cloud server according to an embodiment of the present disclosure.
Fig. 2 is a block diagram of a data request permission apparatus based on a cloud server according to an embodiment of the present application.
Fig. 3 is an architecture diagram of a cloud server-based data request permission system according to an embodiment of the present application.
Detailed Description
In order to better understand the technical solutions, the technical solutions of the present application are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present application are detailed descriptions of the technical solutions of the present application, and are not limitations of the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
In order to improve the technical problems described in the background art, the inventor innovatively provides a data request permission method, a system and a cloud platform based on a cloud server, the scheme can obtain target content data in a target operation behavior by responding to a target permission event, an instruction tag corresponding to the target content data is loaded based on key features in the target operation behavior, then a plurality of content data to be selected matched with the target content data are determined based on a preset secret key, the preset secret key is set based on the key data corresponding to the content data to be selected and floating data, the floating data is determined based on the association gradient of a second data instruction corresponding to the content data to be selected, and then the instruction tag is extracted to be loaded in the key features. Therefore, the process of automatically extracting and loading the data instruction of the content data to be selected is realized, and the effectiveness of the loaded data instruction is ensured and the accuracy of data loading of the content data is improved because the floating key data and the floating data are adopted for combined screening in the process of extracting the content data to be selected.
Referring to fig. 1, a data request permission method based on a cloud server is shown, and the method may be applied to a risk account anti-intrusion identification system, and may include the technical solutions described in the following steps 100 to 300.
Step 100, obtaining target content data in a target operation behavior in response to a target permission event, wherein an instruction tag corresponding to a first data instruction corresponding to the target content data is loaded based on key features in the target operation behavior.
It will be appreciated that the target content data represents relevant data licensing content in the target operational behavior.
Step 200, determining a plurality of content data to be selected matched with the target content data based on a preset key, wherein the preset key is set based on key data and floating data corresponding to the content data to be selected, and the floating data is determined based on the association gradient of a second data instruction corresponding to the content data to be selected.
Illustratively, the critical data represents user profile data, and the floating data represents related data that is not used frequently (e.g., users who temporarily apply for access permission).
Further, the key features represent important contents of the access rights applied by the related users.
Step 300, extracting the instruction tag corresponding to the second data instruction to load in the key feature, and obtaining data request permission.
For example, the instruction tag represents a pointer signal corresponding to the data instruction.
It can be understood that, when the technical solutions described in steps 100 to 300 are executed, by acquiring target content data in a target operation behavior in response to a target permission event, an instruction tag corresponding to a first data instruction corresponding to the target content data is loaded based on a key feature in the target operation behavior; then determining a plurality of pieces of content data to be selected matched with the target content data based on a preset key, setting the preset key based on key data and floating data corresponding to the content data to be selected, and determining the floating data based on the association gradient of a second data instruction corresponding to the content data to be selected; and further extracting an instruction tag corresponding to the second data instruction so as to load in the key features. The method and the device have the advantages that the process of automatically extracting and loading the data instruction of the content data to be selected is realized, and the floating key data and the floating data are jointly screened in the process of extracting the content data to be selected, so that the effectiveness of the loaded data instruction is guaranteed, and the accuracy of loading the data of the content data is improved.
In an alternative embodiment, the inventor finds that, when the key is set in advance, the spatial order is inaccurate, so that it is difficult to accurately determine the plurality of pieces of content data to be selected that match the target content data, and in order to improve the above technical problem, the step of determining the plurality of pieces of content data to be selected that match the target content data based on the key set in advance, which is described in step 200, may specifically include the technical solutions described in the following steps q1 to q 4.
Step q1, determining the spatial order of the target content data.
And step q2, determining a plurality of matching content data in the preset sequence number based on the spatial sequence.
And q3, respectively determining the key data and the floating data corresponding to the matching content data, and transmitting a preset network to obtain the request permission standard value.
And q4, extracting the matched content data according to the request permission standard value to determine the content data to be selected.
It can be understood that, when the technical solutions described in the above steps q 1-q 4 are executed, the problem of inaccurate spatial order is avoided when setting keys in advance, so that a plurality of content data to be selected matching the target content data can be accurately determined.
In an alternative embodiment, the inventor finds that, when the list of the allocation order is inaccurate based on the spatial order, so that it is difficult to accurately determine the plurality of matching content data within the preset sequence number, in order to improve the above technical problem, the step of determining the plurality of matching content data within the preset sequence number based on the spatial order described in step q2 may specifically include the technical solutions described in the following step w1 and step w 2.
Step w1, allocating the spatial order as an order list.
And step w2, matching in the preset sequence number based on the sequence initial point corresponding to the sequence list to obtain a plurality of the matching content data.
It can be understood that, when the technical solutions described in the above steps w1 and w2 are performed, the problem of inaccurate allocation order list is avoided when based on the spatial order, so that a plurality of matching content data within the preset sequence number can be accurately determined.
In an alternative embodiment, the inventor finds that, when determining the key data and the floating data corresponding to the matching content data respectively, there is a problem that the floating coefficient is not accurate, so that it is difficult to accurately determine the key data and the floating data corresponding to the matching content data, and transmit a preset network to obtain the requested permission standard value, in order to improve the above technical problem, the step of determining the key data and the floating data corresponding to the matching content data respectively, and transmitting the preset network to obtain the requested permission standard value described in step q3 may specifically include the technical solutions described in the following steps e 1-e 3.
And e1, determining a key coefficient based on the key data corresponding to the matching content data, wherein the key coefficient is set based on at least one of a direction coefficient, an object coefficient, an attribute coefficient, an instruction coefficient or a time coefficient.
And e2, determining a floating coefficient based on the floating data corresponding to the matching content data, wherein the floating coefficient is set based on the floating state of the instruction label corresponding to the matching content data and floating feedback.
And e3, transmitting the key coefficient and the floating coefficient to the preset network to obtain the request permission standard value.
It can be understood that, when the technical solutions described in the above steps e 1-e 3 are executed, the problem of inaccurate floating coefficient is avoided when the key data and floating data corresponding to the matching content data are determined respectively, so that the key data and floating data corresponding to the matching content data can be accurately determined and the preset network can be transmitted to obtain the request permission standard value.
In an alternative embodiment, the inventor finds that, when floating data corresponding to the matching content data is based on, there is a problem that the category of the requesting device is unclear, so that it is difficult to reliably determine the floating coefficient, and in order to improve the above technical problem, the step of determining the floating coefficient based on the floating data corresponding to the matching content data, which is described in step e2, may specifically include the technical solutions described in the following steps r 1-r 3.
And r1, determining the category of the requesting device based on the floating data corresponding to the matching content data.
And r2, determining the corresponding pass data when the request equipment category is the license equipment.
Step r3, determining floating data of the matching content data within the matching content data indicating pass sequence number based on the pass data to determine the floating coefficient.
It can be understood that, when the technical solutions described in the above steps r 1-r 3 are executed, the problem that the category of the requesting device is unclear is avoided when floating data corresponding to the matching content data is based, so that the floating coefficient can be reliably determined.
In an alternative embodiment, the inventor finds that, when the matching content data is extracted according to the request permission standard value, there is a problem that the matching content data is not accurately allocated, so that it is difficult to accurately determine the candidate content data, and in order to improve the above technical problem, the step of extracting the matching content data according to the request permission standard value to determine the candidate content data described in step q4 may specifically include the technical solutions described in the following steps t 1-t 3.
And step t1, distributing the matching content data according to the request permission standard value to obtain a matching sequence.
Step t2, determining the preset order item in the matching sequence.
And step t3, auditing the preset sequence items to determine the content data to be selected which passes the auditing.
It can be understood that, when the technical solutions described in the above steps t 1-t 3 are performed, the problem of inaccurate allocation of matching content data is avoided when the matching content data is extracted according to the request permission standard value, so that the content data to be selected can be accurately determined.
In an alternative embodiment, the inventor finds that, when the instruction tag corresponding to the second data instruction is extracted to load in the critical feature, there is a problem that the instruction tag is inaccurate, so that it is difficult to accurately obtain the data request permission, in order to improve the above technical problem, the step of extracting the instruction tag corresponding to the second data instruction to load in the critical feature to obtain the data request permission described in step 300 may specifically include the technical solutions described in the following step a 1-step a 3.
And a1, extracting the instruction label corresponding to the second data instruction.
Step a2, calling a washing program to perform floating identification based on the instruction tag corresponding to the second data instruction.
Step a3, if the floating identification passes, loading the instruction tag in the key feature.
It can be understood that when the technical solutions described in the above steps a 1-a 3 are executed, the instruction tag corresponding to the second data instruction is extracted, so that when the loading is performed in the key feature, the problem of inaccurate instruction tag is avoided, and thus the data request permission can be accurately obtained.
In an alternative embodiment, the inventor finds that, when the washing program is called to perform floating identification based on the instruction tag corresponding to the second data instruction, there is a problem that the washing program does not accurately wash the second data instruction, so that it is difficult to perform floating identification accurately, and in order to improve the above technical problem, the step of calling the washing program to perform floating identification based on the instruction tag corresponding to the second data instruction, which is described in step a2, may specifically include the technical solutions described in the following step d1 and step d 2.
And d1, calling a cleaning program based on the instruction tag corresponding to the second data instruction, so as to perform tag conversion on the instruction tag corresponding to the second data instruction to obtain a floating tag.
And d2, performing floating identification according to the floating label.
It can be understood that, when the technical solutions described in the above steps d1 and d2 are executed, and the washing program is called based on the instruction tag corresponding to the second data instruction to perform floating recognition, the problem that the washing program does not accurately wash the second data instruction is avoided, so that floating recognition can be accurately performed.
Based on the basis, the technical scheme is described in the following steps g 1-g 3.
And g1, recording the request data corresponding to the floating identification process.
Step g2, determining a permission factor based on the request data.
And g3, generating a license simulation element according to the license coefficient so as to load in the key feature.
It can be understood that when the technical solutions described in steps g1 to g3 are executed, the integrity of loading in the key features is effectively improved by requesting data to obtain the permission coefficient.
Based on the above basis, the technical scheme described in the following steps j 1-j 3 can be further included.
And step j1, detecting permission record based on the instruction label corresponding to the second data instruction in real time.
And step j2, detecting permission record based on the instruction label corresponding to the second data instruction in real time.
And step j3, responding to the iteration of the floating data corresponding to the content data to be selected, and iterating the loading of the key operation behaviors.
It can be understood that when the technical scheme described in the step j1 to the step j3 is executed, the precision of iteration of loading the key operation behaviors is improved by accurately obtaining the permission record.
Based on the above basis, the technical scheme described in the following steps k 1-k 4 is also included.
And k1, determining iteration data corresponding to the plurality of content data to be selected.
Step k2, determining permission data based on the iterative data.
And k3, distributing a plurality of the content data to be selected according to the permission data to obtain a permission passing sequence.
Step k4, corresponding data loading is performed on the key feature through the sequence based on the permission.
It can be understood that when the technical solutions described in the above steps k 1-k 4 are executed, the accuracy of the iterative data corresponding to the content data to be selected is improved, so that the corresponding data loading of the key features can be accurately executed.
On the basis, please refer to fig. 2 in combination, there is provided a data request permission apparatus 200 based on a cloud server, applied to a cloud platform, the apparatus including:
a content data obtaining module 210, configured to obtain, in response to a target permission event, target content data in a target operation behavior, where an instruction tag corresponding to a first data instruction corresponding to the target content data is loaded based on a key feature in the target operation behavior;
a content data determining module 220, configured to determine, based on a preset key, a plurality of pieces of content data to be selected that are matched with the target content data, where the preset key is set based on key data and floating data corresponding to the pieces of content data to be selected, and the floating data is determined based on an association gradient of a second data instruction corresponding to the pieces of content data to be selected;
the request permission obtaining module 230 is configured to extract the instruction tag corresponding to the second data instruction, so as to load the instruction tag in the key feature to obtain a data request permission.
On the basis of the above, please refer to fig. 3 in combination, which shows a cloud server-based data request permission system 300, which includes a processor 310 and a memory 320 that are mutually requested, wherein the processor 310 is configured to read a computer program from the memory 320 and execute the computer program to implement the above method.
On the basis of the above, there is also provided a computer-readable storage medium on which a computer program is stored, which when executed implements the above-described method.
The application provides a cloud platform, including: a memory for storing a computer program; a processor coupled to the memory for executing the computer program stored by the memory to implement the above-described method.
In summary, based on the above scheme, by obtaining the target content data in the target operation behavior in response to the target permission event, the instruction tag corresponding to the first data instruction corresponding to the target content data is loaded based on the key feature in the target operation behavior; then determining a plurality of pieces of content data to be selected matched with the target content data based on a preset key, setting the preset key based on key data and floating data corresponding to the content data to be selected, and determining the floating data based on the association gradient of a second data instruction corresponding to the content data to be selected; and further extracting an instruction tag corresponding to the second data instruction so as to load in the key features. The method and the device have the advantages that the process of automatically extracting and loading the data instruction of the content data to be selected is realized, and the floating key data and the floating data are jointly screened in the process of extracting the content data to be selected, so that the effectiveness of the loaded data instruction is guaranteed, and the accuracy of loading the data of the content data is improved.
It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the broad application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, this application uses specific language to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the present application may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present application may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereon. Accordingly, various aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which elements and sequences of the processes described herein are processed, the use of alphanumeric characters, or the use of other designations, is not intended to limit the order of the processes and methods described herein, unless explicitly claimed. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the numbers allow for adaptive variation. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
The entire contents of each patent, patent application publication, and other material cited in this application, such as articles, books, specifications, publications, documents, and the like, are hereby incorporated by reference into this application. Except where the application is filed in a manner inconsistent or contrary to the present disclosure, and except where the claim is filed in its broadest scope (whether present or later appended to the application) as well. It is noted that the descriptions, definitions and/or use of terms in this application shall control if they are inconsistent or contrary to the statements and/or uses of the present application in the material attached to this application.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the present application. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the present application can be viewed as being consistent with the teachings of the present application. Accordingly, the embodiments of the present application are not limited to only those embodiments explicitly described and depicted herein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A data request permission method based on a cloud server is characterized by comprising the following steps:
target content data in a target operation behavior is obtained in response to a target permission event, and an instruction tag corresponding to a first data instruction corresponding to the target content data is loaded based on key features in the target operation behavior;
determining a plurality of pieces of content data to be selected matched with the target content data based on a preset key, wherein the preset key is set based on key data and floating data corresponding to the content data to be selected, and the floating data is determined based on the association gradient of a second data instruction corresponding to the content data to be selected;
and extracting an instruction tag corresponding to the second data instruction so as to load in the key feature and obtain data request permission.
2. The method according to claim 1, wherein the determining a plurality of candidate content data matching the target content data based on a preset key comprises:
determining a spatial order of the target content data;
determining a plurality of matching content data within a preset sequence number based on the spatial order;
respectively determining key data and floating data corresponding to the matched content data, and transmitting a preset network to obtain a request permission standard value;
and extracting the matched content data according to the request permission standard value to determine the content data to be selected.
3. The method according to claim 2, wherein the determining a plurality of matching content data within a preset sequence number based on the spatial order comprises:
sequentially allocating the spaces as a sequential list;
and matching in the preset sequence number based on the sequence initial point corresponding to the sequence list to obtain a plurality of matching content data.
4. The method according to claim 2, wherein the determining the key data and the floating data corresponding to the matching content data, respectively, and transmitting a preset network to obtain the requested license standard value comprises:
determining a key coefficient based on key data corresponding to the matched content data, wherein the key coefficient is set based on at least one of a direction coefficient, an object coefficient, an attribute coefficient, an instruction coefficient or a time coefficient;
determining a floating coefficient based on floating data corresponding to the matched content data, wherein the floating coefficient is set based on a floating state and floating feedback of an instruction tag corresponding to the matched content data;
and transmitting the key coefficient and the floating coefficient to the preset network to obtain the request permission standard value.
5. The method of claim 4, wherein determining floating coefficients based on floating data corresponding to the matching content data comprises:
determining the category of the requesting device based on the floating data corresponding to the matched content data;
determining corresponding pass data when the request equipment type is allowed equipment;
determining floating data of the matching content data within the matching content data indicating a pass sequence number based on the pass data to determine the floating coefficient.
6. The method according to claim 2, wherein the extracting the matching content data according to the request permission criterion value to determine the candidate content data comprises:
distributing the matched content data according to the request permission standard value to obtain a matching sequence;
determining a preset order item in the matching sequence;
and auditing the preset sequence items to determine the to-be-selected content data passing the auditing.
7. The method according to any one of claims 1 to 6, wherein the extracting the instruction tag corresponding to the second data instruction for loading in the key feature to obtain data request permission comprises:
extracting an instruction tag corresponding to the second data instruction;
calling a cleaning program to perform floating identification based on the instruction tag corresponding to the second data instruction;
and if the floating identification passes, loading the instruction tag in the key feature.
8. The method of claim 7, wherein invoking a washing program for floating recognition based on the instruction tag corresponding to the second data instruction comprises:
calling a cleaning program based on the instruction tag corresponding to the second data instruction so as to perform tag conversion on the instruction tag corresponding to the second data instruction to obtain a floating tag;
and carrying out floating identification according to the floating label.
9. A cloud server based data request permission system comprising a processor and a memory in communication with each other, the processor being configured to read a computer program from the memory and execute the computer program to implement the method of any one of claims 1 to 8.
10. A cloud platform, comprising:
a memory for storing a computer program;
a processor coupled to the memory for executing the computer program stored by the memory to implement the method of any of claims 1-8.
CN202110666286.7A 2021-06-16 2021-06-16 Data request permission method and system based on cloud server and cloud platform Withdrawn CN113347193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110666286.7A CN113347193A (en) 2021-06-16 2021-06-16 Data request permission method and system based on cloud server and cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110666286.7A CN113347193A (en) 2021-06-16 2021-06-16 Data request permission method and system based on cloud server and cloud platform

Publications (1)

Publication Number Publication Date
CN113347193A true CN113347193A (en) 2021-09-03

Family

ID=77475600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110666286.7A Withdrawn CN113347193A (en) 2021-06-16 2021-06-16 Data request permission method and system based on cloud server and cloud platform

Country Status (1)

Country Link
CN (1) CN113347193A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115456101A (en) * 2022-09-23 2022-12-09 马建家 Data security transmission method and system based on data center station

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115456101A (en) * 2022-09-23 2022-12-09 马建家 Data security transmission method and system based on data center station
CN115456101B (en) * 2022-09-23 2023-09-12 上海豹云网络信息服务有限公司 Data security transmission method and system based on data center

Similar Documents

Publication Publication Date Title
US8578278B2 (en) Dynamic user interface content adaptation and aggregation
US10318402B2 (en) Automated software compliance analysis
US11816224B2 (en) Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US8171053B2 (en) Dynamic workflow documentation system
US20090259928A1 (en) Systems and methods for employee compensation planning
CN113886468A (en) Online interactive data mining method and system based on Internet
CN107679937B (en) Method, system, storage medium and device for customizing service function
CN114625804B (en) Big data-based user behavior data processing method and system and cloud platform
CN113347193A (en) Data request permission method and system based on cloud server and cloud platform
CN113903473A (en) Medical information intelligent interaction method and system based on artificial intelligence
US20190057210A1 (en) User details based password policy
US20120260253A1 (en) Modeling and consuming business policy rules
CN111435348A (en) Method for creating runtime executable program for data analysis function
CN113610373A (en) Information decision processing method and system based on intelligent manufacturing
CN113947709A (en) Image processing method and system based on artificial intelligence
CN114090858B (en) Resource pool object data acquisition method and system based on automatic crawler
CN114611478B (en) Information processing method and system based on artificial intelligence and cloud platform
US20230118939A1 (en) Risk Assessment of a Container Build
CN115409510B (en) Online transaction security system and method
CN115495017B (en) Data storage method and system based on big data
CN113626559A (en) Semantic-based network document intelligent retrieval method and system
CN115455803A (en) Indoor energy consumption information analysis method and system
CN114170042A (en) Knowledge information operation method and system based on pervasive computing
CN115529592A (en) Bluetooth identity determination method and system based on digital twins
US20190095058A1 (en) Determining a user interface

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210903

WW01 Invention patent application withdrawn after publication