CN115587392A - Method, device, equipment and medium for preventing power loss - Google Patents
Method, device, equipment and medium for preventing power loss Download PDFInfo
- Publication number
- CN115587392A CN115587392A CN202211470432.XA CN202211470432A CN115587392A CN 115587392 A CN115587392 A CN 115587392A CN 202211470432 A CN202211470432 A CN 202211470432A CN 115587392 A CN115587392 A CN 115587392A
- Authority
- CN
- China
- Prior art keywords
- information
- data
- user
- certification
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06395—Quality analysis or management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Educational Administration (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Game Theory and Decision Science (AREA)
- Software Systems (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to a method, a device, equipment and a medium for preventing power loss, which comprises the following steps: the method comprises the steps of obtaining network data information and user data information, analyzing the network data information and the user data information to obtain target user information, determining certification time information and certification data information of a user based on the target user information, judging whether the certification time information exceeds preset time information, if so, verifying information integrity of the certification data information according to the network data information to obtain information integrity of the certification data information, judging whether the information integrity meets the preset integrity, if not, generating alarm information, and sending the alarm information to target equipment, wherein the target equipment is the user and equipment of the user. The method and the device have the effect of reducing the data storage capacity decline.
Description
Technical Field
The present application relates to the field of computers, and in particular, to a method, an apparatus, a device, and a medium for preventing power loss.
Background
The web3.0 network is a decentralized storage market developed on the basis of the IPFS (InterPlanetary File System) technology. It constructs the bottom layer of decentralized consensus through blockchain technology, so that people can participate in providing storage and freely trading storage space. Meanwhile, the method adopts the copy certification and the space-time certification to ensure the safety of the stored data, and the verifiability of the data storage is achieved under the condition that no centralized trust mechanism exists.
A Proof-of-space (PoSt) which proposes a data structure of a Proof chain formed by a challenge (challenge) and a Proof (Proof) linked together, a time period is added on the basis of the Proof chain, thus obtaining a Proof that a user stores data for a period of time, namely a Proof-of-space (PoSt) which allows a verifier to check whether the storage user stores his/her outsource data for a period of time, a Proof-of-space (PoSt) scheme which allows the verifier to convince the verifier that the storage user stores data for a period of time, the Proof-of-space being understood as a continuous Proof-of-replication, the user having to continuously generate the Proof and submit the Proof within a submission period, the challenger performing N rounds repeatedly in a porp loop, inputting a random challenge parameter C, for example C equal to 10, the challenge parameter being recursively calculated, that the last output is input for the next time, and the last result of the Proof is accepted as a Proof of space-time.
With respect to the above-mentioned related art, the inventors believe that space-time proof is difficult to guarantee continuous storage of data due to the higher complexity of the web3.0 network, and thus have a drawback of reduced data storage capacity.
Disclosure of Invention
In order to reduce the occurrence of data storage capacity decline, the application provides a method, a device, equipment and a medium for preventing the storage capacity decline.
In a first aspect, the present application provides a method for preventing power loss, which adopts the following technical scheme:
a method of preventing survivability, comprising:
acquiring network data information and user data information;
analyzing the network data information and the user data information to obtain target user information;
sending the network data information to a user corresponding to the target user information for data storage;
determining certification time information and certification data information of a user based on the target user information, and judging whether the certification time information exceeds preset time information or not, wherein the certification time information is time information spent on submitting certification, and the certification data information is certification data information submitted by the user along with the certification time information;
if the network data information exceeds the network data information, carrying out information integrity verification on the certification data information according to the network data information to obtain the information integrity of the certification data information;
and judging whether the information integrity degree meets a preset integrity degree, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and equipment of the user.
By adopting the technical scheme, when data transferred to a network is stored, network data information imported into a network node by a user and user data information connected with the network are respectively obtained, then the network data information and the user data information are analyzed to obtain target user information, the network data information is sent to the user corresponding to the target user information for data storage, then the certification time information and the certification data information of the user are determined based on the target user information, whether the certification time information exceeds the preset time information or not is judged, the certification time information is time information spent on submitting certification, the certification data information is the certification data information submitted by the user along with the certification time information, when the certification time information exceeds the preset time information, information integrity verification is carried out on the certification data information according to the network data information to obtain information integrity of the certification data information, whether the information integrity meets the preset integrity or not is judged, when the information integrity does not meet the preset integrity, alarm information is generated and sent to the user and target equipment of the user, and when the network storage problem occurs, the user and the user have sufficient processing time to solve the problem of storage reduction caused by the reduction of the storage.
In another possible implementation manner, the analyzing the network data information and the user data information to obtain target user information includes:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
According to the technical scheme, when the target user information is confirmed, the network data information is disassembled to obtain the data identification information and the data storage information, and then the user data information is subjected to user screening according to the data storage information to obtain the optimal target user information, so that the effect of screening the user is achieved.
In another possible implementation manner, the analyzing the network data information and the user data information to obtain target user information further includes:
and binding the target user information with the data identification information.
By adopting the technical scheme, after the target user information is obtained, the data identification information is bound with the target user information, so that the user can search the target user information according to the data identification information.
In another possible implementation manner, the performing user screening on the user data information according to the data storage information to obtain target user information includes:
identifying the data storage information to obtain data category information and data storage capacity of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively carrying out data comparison on the storage residual quantity of each user in the matched user information and the data storage quantity to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the comparison user information to obtain target user information meeting a preset sequence.
By adopting the technical scheme, when the target user information is screened, the data storage information is identified to obtain the data type information and the data storage amount of the data storage information, then the storage data type, the historical service quality and the storage residual amount of each user are determined based on the user data information, the data type information is matched with the storage data type to determine the matched user information matched with the data type information, then the storage residual amount of each user in the matched user information is compared with the data storage amount respectively to obtain the comparison user information meeting the preset condition, and then the historical service quality corresponding to the comparison user information is subjected to quality sequencing to obtain the target user information meeting the preset sequence order, so that the effect of screening the target user information is achieved.
In another possible implementation manner, the determining, based on the user data information, a type of stored data, a historical quality of service, and a remaining amount of storage of each user further includes:
acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
performing data sorting on the historical service information according to the type of the stored data and the integrity degree of the certificate to obtain service matrix data;
performing data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating historical service quality of each user;
and adding the historical service quality into the user data information for updating to obtain updated user data information.
By adopting the technical scheme, when the historical service quality is confirmed, the historical service information of each user in the user data information in a preset time period is obtained, then the historical service information is analyzed, the stored data types of each user in the historical service information in different time periods and the corresponding proof integrity of the stored data types are obtained, the historical service information is subjected to data sorting according to the stored data types and the proof integrity to obtain service matrix data, then data processing is carried out on data contained in the service matrix data to obtain corresponding user service data, meanwhile, the user service data is input into a preset algorithm model to carry out data operation to generate a historical service instruction of each user, then the historical service quality is added into the user data information to be updated, and the updated user data information is obtained, so that the effect of confirming the historical service quality is achieved.
In another possible implementation manner, the analyzing the historical service information to obtain the stored data type of each user in different time periods in the historical service information and the integrity of the certificate corresponding to the stored data type includes:
determining at least one set of service handling data based on the historical service information;
respectively performing label acquisition on the at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is processed completely according to the service processing time data, if not, performing data disruption on the service processing data, and if so, correspondingly binding the user data and the service processing time data to obtain user binding data;
and performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
By adopting the technical scheme, when the historical service information is specifically analyzed, at least one group of service processing data is determined according to the historical service information, at least one group of service processing data tags are respectively obtained, user data and service processing time information in each group of service processing data are obtained, whether the service processing data are processed completely is determined according to the service processing time data, when the processing is not completed, the service processing data are subjected to data collapse so as to improve the accuracy of the service processing data, when the processing is completed, the user data and the service processing time data are correspondingly bound so as to obtain user binding data, then the user binding data are subjected to data combination screening, the stored data types of each user in the historical service information in different time periods and the proof integrity corresponding to the stored data types are obtained, and therefore the accuracy of the proof integrity is achieved.
In another possible implementation manner, the adding the historical quality of service to the user data information for updating to obtain updated user data information further includes:
acquiring actual service quality corresponding to the current user data information;
and updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
By adopting the technical scheme, when the historical service quality is updated, the actual service quality corresponding to the obtained current user data information is added to the historical service quality for updating, and the updated historical service quality is obtained, so that the effect of updating the historical service quality in real time is achieved.
In a second aspect, the present application provides a device for preventing power from falling off, which adopts the following technical scheme:
an anti-crash device comprising:
the information acquisition module is used for acquiring network data information and user data information;
the information analysis module is used for analyzing the network data information and the user data information to obtain target user information;
the information sending module is used for sending the network data information to a user corresponding to the target user information for data storage;
the time judging module is used for determining the certification time information and the certification data information of the user based on the target user information and judging whether the certification time information exceeds the preset time information or not, wherein the certification time information is the time information spent on submitting the certification, and the certification data information is the certification data information submitted by the user along with the certification time information;
the information verification module is used for verifying the information integrity of the certification data information according to the network data information when the certification time information exceeds preset time information to obtain the information integrity of the certification data information;
and the integrity judgment module is used for judging whether the information integrity meets the preset integrity, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and the equipment of the user.
By adopting the technical scheme, when data transferred to a network is stored, the information acquisition module respectively acquires network data information imported into a network node by a user and user data information establishing connection with the network, the information analysis module analyzes the network data information and the user data information to obtain target user information, the information sending module sends the network data information to the user corresponding to the target user information for data storage, the time judgment module determines the proving time information and the proving data information of the user based on the target user information and judges whether the proving time information exceeds the preset time information or not, the proving time information is time information spent on submitting the proving, the proving data information is proving data information submitted by the user along with the proving time information, when the proving time information exceeds the preset time information, the information verification module verifies the information integrity of the proving data information according to the network data information to obtain the information integrity of the proving data information, the integrity judgment module judges whether the information integrity meets the preset integrity or not, and when the information integrity does not meet the preset integrity, the warning information is sent to the user information and the warning information is sent to the user equipment, and the problem that the user has enough storage time for the user and the problem caused by the reduction of the storage and the problem of the network storage caused by the reduction of the network storage.
In a possible implementation manner, when the information analysis module analyzes the network data information and the user data information to obtain target user information, the information analysis module is specifically configured to:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
In another possible implementation manner, the apparatus further includes: an information binding module, wherein,
and the information binding module is used for binding the target user information with the data identification information.
In another possible implementation manner, when the information analysis module performs user screening on the user data information according to the data storage information to obtain target user information, the information analysis module is specifically configured to:
identifying the data storage information to obtain data type information and data storage amount of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively carrying out data comparison on the storage residual quantity of each user in the matched user information and the data storage quantity to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the comparison user information to obtain target user information meeting a preset sequence.
In another possible implementation manner, the apparatus further includes: a service acquisition module, a service analysis module, an information arrangement module, a data operation module and a data update module, wherein,
the service acquisition module is used for acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
the service analysis module is used for analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
the information sorting module is used for sorting the historical service information according to the type of the stored data and the integrity degree of the certificate to obtain service matrix data;
the data operation module is used for performing data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating historical service quality of each user;
and the data updating module is used for adding the historical service quality into the user data information for updating to obtain updated user data information.
In another possible implementation manner, when the service analysis module analyzes the historical service information to obtain the stored data type of each user in the historical service information in different time periods and the proof integrity corresponding to the stored data type, the service analysis module is specifically configured to:
determining at least one set of service handling data based on the historical service information;
respectively performing label acquisition on the at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is processed completely according to the service processing time data, if not, performing data disruption on the service processing data, and if so, correspondingly binding the user data and the service processing time data to obtain user binding data;
and performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
In another possible implementation manner, the apparatus further includes: a quality acquisition module and a quality update module, wherein,
the quality obtaining module is used for obtaining the actual service quality corresponding to the current user data information;
and the quality updating module is used for updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
In a third aspect, the present application provides an electronic device, which adopts the following technical solutions:
an electronic device, comprising:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: a method of preventing power down is performed as shown in any one of the possible implementations of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium, comprising: there is stored a computer program that can be loaded by a processor and that executes a method of preventing power loss as shown in any of the possible implementations of the first aspect.
In summary, the present application includes at least one of the following beneficial technical effects:
1. when data transferred to a network is stored, network data information led into a network node by a user and user data information connected with the network are respectively obtained, then the network data information and the user data information are analyzed to obtain target user information, then the network data information is sent to a user corresponding to the target user information for data storage, then certification time information and certification data information of the user are determined based on the target user information, whether the certification time information exceeds preset time information or not is judged, the certification time information is time information spent on submitting certification, the certification data information is certification data information submitted by the user along with the certification time information, when the certification time information exceeds the preset time information, information integrity verification is carried out on the certification data information according to the network data information, information integrity of the certification data information is obtained, whether the information integrity satisfies the preset integrity or not is judged, when the information integrity does not satisfy the preset integrity, alarm information is generated, and the alarm information is sent to the user and target equipment of the user, when the network storage problem occurs, the user and the user have sufficient time to solve the problem, and the storage problem is reduced, and the storage condition of the network storage caused by the network storage is reduced;
2. when the historical service quality is confirmed, the historical service information of each user in the user data information in a preset time period is obtained, then the historical service information is analyzed, the stored data types of each user in the historical service information in different time periods and the corresponding proof integrity of the stored data types are obtained, data sorting is carried out on the historical service information according to the stored data types and the proof integrity to obtain service matrix data, then data processing is carried out on data contained in the service matrix data to obtain corresponding user service data, meanwhile, the user service data are input into a preset algorithm model to carry out data operation to generate a historical service instruction of each user, then the historical service quality is added into the user data information to be updated to obtain updated user data information, and therefore the effect of confirming the historical service quality is achieved.
Drawings
FIG. 1 is a schematic flow chart of a method for preventing power loss according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an anti-dropping force-storing device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-3.
A person skilled in the art, after reading the present description, may make modifications to the embodiments as required, without any inventive contribution thereto, but shall be protected by the patent laws within the scope of the claims of the present application.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship, unless otherwise specified.
The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
The embodiment of the application provides a method for preventing power loss, which is executed by electronic equipment, wherein the electronic equipment can be a server or terminal equipment, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The terminal device may be a smart phone, a tablet computer, a notebook computer, a desktop computer, and the like, but is not limited thereto, the terminal device and the server may be directly or indirectly connected through a wired or wireless communication manner, and an embodiment of the present application is not limited thereto, as shown in fig. 1, the method includes:
and step S10, acquiring network data information and user data information.
The network data information is data information imported into a network node by a user, and the user data information is user data information establishing connection with a network.
Specifically, after a user wants to import stored data information into a network node, the electronic device obtains the data information in the corresponding network node, and the specific obtaining manner includes: the user sends a RetrievalQuery request to the network node, the data to be uploaded is sent to the network node, the electronic equipment sends a RetrievalQuery response request to the network node, and the data which is just uploaded is intercepted and acquired.
And step S11, analyzing the network data information and the user data information to obtain target user information.
In the embodiment of the application, the network data information includes data identification information and data storage information, where the data identification information is a data CID-content identifier generated when a user imports data into its local node, that is, an ID uniquely describing content, and when the data storage information is subsequently stored at the user, the data stored by the specified user can be queried according to the ID.
And S12, sending the network data information to a user corresponding to the target user information for data storage.
Specifically, when the network data information is sent to the user corresponding to the target user information, the network transmits the data to the user in an online or offline manner. The online transmission is suitable for small-scale data volume, such as point-to-point transmission using ipfs (interplanetary file system) mining protocol. Offline transfer of large amounts of data suitable for PB levels (storage units: 1pb = 1024tb), for example hard disks to storage users.
And S13, determining the certification time information and the certification data information of the user based on the target user information, and judging whether the certification time information exceeds the preset time information, wherein the certification time information is the time information spent on submitting the certification, and the certification data information is the certification data information submitted by the user along with the certification time information.
In the embodiment of the present application, after the network data information is sent to the user, the user often submits a series of certificates to the network data information in order to ensure the storage stability of the data of the sector of the user, and the certificates are sent to the network. During the attestation process, data anomalies often occur, such as: when the certification time information spent in the certification process of the user exceeds the preset time information, and when the certification time information exceeds the preset time information, the situation that the data is abnormal is indicated, and for the embodiment of the application, the preset time information is 7 minutes.
And S14, if the network data information exceeds the network data information, carrying out information integrity verification on the certification data information according to the network data information to obtain the information integrity of the certification data information.
Specifically, when the certification time information spent in the certification process of the user exceeds the preset time information, the information integrity of the certification data information is verified according to the network data information, and the specific verification mode comprises the following steps: obtaining a simulation certification mode by obtaining a certification mode of a user, then carrying out certification simulation on the network data information according to the simulation certification mode to obtain simulated certification data information, and comparing and calculating the two pieces of certification data information to obtain the final information integrity.
And S15, judging whether the information integrity degree meets the preset integrity degree, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is a user and equipment of the user.
In the embodiment of the present application, the preset integrity is 100%, and when the information integrity does not satisfy 100%, the warning information is generated, for example: if the current information is proved to be abnormal, the maintenance is required in time. And sending the alarm information to the user and target equipment of the user, wherein for the embodiment of the application, the target equipment comprises equipment such as a mobile phone, a tablet and a computer.
The embodiment of the application provides a method for preventing memory loss, when data transferred to a network is stored, network data information imported into a network node by a user and user data information connected with the network are respectively obtained, the network data information and the user data information are analyzed to obtain target user information, the network data information is sent to the user corresponding to the target user information for data storage, then certification time information and certification data information of the user are determined based on the target user information, whether the certification time information exceeds preset time information or not is judged, the certification time information is time information spent on submitting certification, the certification data information is certification data information submitted by the user along with the certification time information, when the certification time information exceeds the preset time information, information integrity verification is carried out on the certification data information according to the network data information, information integrity of the certification data information is obtained, whether the information integrity meets the preset integrity or not is judged, when the information integrity does not meet the preset integrity, alarm information is generated, and the alarm information is sent to the user and target equipment of the user, when the problem of the network storage problem occurs, the problem of sufficient memory loss and the problem of the user due to the network storage is solved.
In a possible implementation manner of the embodiment of the present application, step S11 specifically includes step S111 (not shown in the figure) and step S112 (not shown in the figure), wherein,
and step S111, performing information disassembly on the network data information to obtain data identification information and data storage information.
And step S112, performing user screening on the user data information according to the data storage information to obtain target user information.
In a possible implementation manner of the embodiment of the present application, step S11 is followed by step S113 (not shown in the figure), wherein,
step S113, binding the target user information with the data identification information.
Specifically, the data identification information is bound with the target user information, and when the stored data is abnormal and the stored data is retrieved, the user can inquire the stored data according to the data identification information, so that the capability of tracing and retrieving the stored data information is improved.
In a possible implementation manner of the embodiment of the present application, the step S112 specifically includes a step S121 (not shown), a step S122 (not shown), a step S123 (not shown), a step S124 (not shown), and a step S125 (not shown), wherein,
step S121, identifying the data storage information to obtain data type information and data storage amount of the data storage information.
In an embodiment of the present application, the data category information includes: integer type [ byte, short, int, long ]; floating-point number type [ float, double ]; the character type char; boolean type coolean; picture format type [ gif ]. The data storage amount is used to indicate the data size of each category data in the data category information.
Step S122, determining the type of stored data, the historical quality of service and the storage remaining amount of each user based on the user data information.
Specifically, generally, users are divided into storage users and retrieval users, and the storage users provide data storage for clients. To become a storage consumer, the consumer must mortgage with a collateral (FIL) proportional to the storage space. Storage users respond to user Put requests by storing data at a particular time, in the process generating a "spatiotemporal proof" and submitting it to the blockchain network to prove that they have stored the client's target data at a particular time. If the proof is invalid or missing, the storage user will receive a penalty and some of their collateral will be deducted by the network.
Among a plurality of storage users, the data types which are responsible for storage of each storage user are different, some storage users are used for storing data of picture types, and some storage users are used for storing data of character types, so that the storage data types of the storage users comprise character types, integer types, floating point types, boolean types and picture types according to the storage properties.
In the embodiment of the application, the historical service quality is the quality information of each stored user which is served in a certain historical period, and is embodied in the credit number of the user.
The retrieval user provides data retrieval services for the client. The interstellar magic cube (ipfs) looks up the data needed by the retrieving user by providing the client Get request. Unlike the storage user: the retrieval user does not need to provide a mortgage, submit the stored data, and provide the storage certificate.
And step S123, matching the data type information with the stored data type to obtain matched user information.
Step S124, respectively performing data comparison on the storage residual amount and the data storage amount of each user in the matched user information to obtain comparison user information meeting preset conditions.
For the embodiment of the application, the preset condition is that the ratio of the storage remaining amount of the user to the data storage amount is greater than or equal to 2.
Step S125, the historical service quality corresponding to the compared user information is subjected to quality sorting to obtain the target user information meeting the preset sequence.
Specifically, the preset sequence bit represents the first sequence of the user sequence corresponding to the user information, that is, the user with the best service quality.
In a possible implementation manner of the embodiment of the present application, step S122 (not shown in the figure) further includes step S221 (not shown in the figure), step S222 (not shown in the figure), step S223 (not shown in the figure), step S224 (not shown in the figure), and step S225 (not shown in the figure), wherein,
step S221, obtains history service information.
The historical service information is service information of each user in the user data information within a preset time period.
For the embodiment of the application, the preset time period is input by a worker through a designated terminal device, and the designated terminal device comprises a tablet, a mobile phone, a computer and the like.
Specifically, the staff enters a preset time period (for example, 1/month 1 in 2020 to 10/month 3 in 2021) in the designated terminal device, and then the designated terminal device sends the preset time period to the electronic device for processing, and after receiving the preset time period, the electronic device obtains service information of each user in the user data information in the preset time period.
Specifically, one possible implementation manner of obtaining the historical service information is a big data obtaining manner, all the historical service information is obtained through a big data technology, and then all the historical service information is screened according to a preset time period to obtain the historical service information in the preset time period
Step S222, analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the integrity of the certificate corresponding to the stored data types.
And step S223, performing data sorting on the historical service information according to the type of the stored data and the integrity of the certificate to obtain service matrix data.
Specifically, according to the type of the stored data and the integrity of the certificate, data sorting is performed on the historical service information of the user each time, and the final service matrix data is obtained:
wherein m is the type of stored data, and n is the integrity of the certificate.
Step S224, data processing is carried out on the data contained in the service matrix data to obtain user service data, the user service data is input into a preset algorithm model to carry out data operation, and historical service quality of each user is generated.
Specifically, the preset algorithm model is a data averaging algorithm. Accumulating the integrity of the single user service data, and carrying out ratio operation on the accumulated value and the service times in the user service data to obtain the historical service quality of the user.
Step S225, add the historical service quality to the user data information for updating, so as to obtain updated user data information.
In a possible implementation manner of the embodiment of the present application, step S222 (not shown in the figure) specifically includes step Sa (not shown in the figure), step Sb (not shown in the figure), step Sc (not shown in the figure), and step Sd (not shown in the figure), wherein,
and a step Sa of determining at least one set of service processing data based on the historical service information.
Specifically, the service processing data included in the history service information is obtained by collecting data of each service of the user by the electronic device.
And step Sb, respectively obtaining the labels of at least one group of service processing data to obtain user data and service processing time data in each group of service processing data.
Specifically, tag acquisition is performed according to data tags in at least one set of service processing data, and specified tag content, namely time for acquiring historical services, service users, service end time, service amount and the like, is acquired.
Step Sc, determining whether the service processing data is completely processed according to the service processing time data, if not, performing data disruption on the service processing data, and if so, correspondingly binding the user data and the service processing time data to obtain user binding data;
specifically, whether the processing of the current service processing data is finished is determined through the acquired information corresponding to the service end time tag, if the service end time tag does not have corresponding time information, it is indicated that the service processing data is still in the processing process, so that the service processing data is subjected to data disruption, and if the service end time tag has corresponding time information, the user data and the service processing time data are correspondingly bound.
And Sd, performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
In a possible implementation manner of the embodiment of the present application, step S225 (not shown in the figure) further includes step S251 (not shown in the figure) and step S252 (not shown in the figure), wherein,
step S251, obtaining the actual service quality corresponding to the current user data information.
Step S252, the historical service quality is updated based on the actual service quality, and the updated historical service quality is obtained.
The embodiments described above introduce a method for preventing power loss from a method flow perspective, and the embodiments described below introduce a device for preventing power loss from a virtual module or a virtual unit perspective, which are described in detail in the following embodiments.
The embodiment of the present application provides an anti-dropping power-saving device, as shown in fig. 2, the anti-dropping power-saving device 20 may specifically include: an information acquisition module 21, an information analysis module 22, an information transmission module 23, a time judgment module 24, an information verification module 25, and an integrity judgment module 26, wherein,
the information acquisition module 21 is configured to acquire network data information and user data information, where the network data information is data information imported into a network node by a user, and the user data information is user data information establishing connection with a network;
the information analysis module 22 is configured to analyze the network data information and the user data information to obtain target user information;
the information sending module 23 is configured to send the network data information to a user corresponding to the target user information for data storage;
the time judging module 24 is configured to determine certification time information and certification data information of the user based on the target user information, and judge whether the certification time information exceeds preset time information, where the certification time information is time information taken for submitting a certification, and the certification data information is certification data information submitted by the user along with the certification time information;
the information verification module 25 is configured to verify the information integrity of the certification data information according to the network data information when the certification time information exceeds the preset time information, so as to obtain the information integrity of the certification data information;
and the integrity judgment module 26 is configured to judge whether the information integrity satisfies a preset integrity, and if the information integrity does not satisfy the preset integrity, generate alarm information and send the alarm information to a target device, where the target device is a user and a device of the user.
In a possible implementation manner of the embodiment of the present application, when the information analysis module 22 analyzes the network data information and the user data information to obtain the target user information, the information analysis module is specifically configured to:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: an information binding module, wherein,
and the information binding module is used for binding the target user information with the data identification information.
In another possible implementation manner of the embodiment of the present application, when the information analysis module 22 performs user screening on user data information according to the data storage information to obtain target user information, the information analysis module is specifically configured to:
identifying the data storage information to obtain data category information and data storage capacity of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively carrying out data comparison on the storage surplus of each user in the matched user information and the data storage amount to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the compared user information to obtain target user information meeting the preset sequence.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: a service acquisition module, a service analysis module, an information arrangement module, a data operation module and a data update module, wherein,
the service acquisition module is used for acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
the service analysis module is used for analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
the information sorting module is used for carrying out data sorting on the historical service information according to the type of the stored data and the integrity degree of the certificate to obtain service matrix data;
the data operation module is used for carrying out data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating the historical service quality of each user;
and the data updating module is used for adding the historical service quality into the user data information for updating to obtain the updated user data information.
In another possible implementation manner of the embodiment of the application, when the service analysis module analyzes the historical service information to obtain the stored data type of each user in different time periods in the historical service information and the integrity of the certificate corresponding to the stored data type, the service analysis module is specifically configured to:
determining at least one set of service handling data based on the historical service information;
respectively obtaining tags of at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is processed completely according to the service processing time data, if not, performing data disruption on the service processing data, and if so, correspondingly binding the user data and the service processing time data to obtain user binding data;
and performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: a quality acquisition module and a quality update module, wherein,
the quality acquisition module is used for acquiring the actual service quality corresponding to the current user data information;
and the quality updating module is used for updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The embodiment of the present application also introduces an electronic apparatus from the perspective of a physical device, as shown in fig. 3, an electronic apparatus 300 shown in fig. 3 includes: a processor 301 and a memory 303. Wherein processor 301 is coupled to memory 303, such as via bus 302. Optionally, the electronic device 300 may also include a transceiver 304. It should be noted that the transceiver 304 is not limited to one in practical applications, and the structure of the electronic device 300 is not limited to the embodiment of the present application.
The Processor 301 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 301 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
The Memory 303 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 303 is used for storing application program codes for executing the scheme of the application, and the processor 301 controls the execution. The processor 301 is configured to execute application program code stored in the memory 303 to implement the aspects illustrated in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. But also a server, etc. The electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
The following describes a computer-readable storage medium provided by embodiments of the present application, and the computer-readable storage medium described below and the method described above may be referred to correspondingly.
An embodiment of the present application provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above base station device management and control method are implemented.
Since embodiments of the computer-readable storage medium section correspond to embodiments of the method section, reference is made to the description of the embodiments of the method section for embodiments of the computer-readable storage medium section.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of execution is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.
Claims (10)
1. A method of preventing survivability, comprising:
acquiring network data information and user data information;
analyzing the network data information and the user data information to obtain target user information;
sending the network data information to a user corresponding to the target user information for data storage;
determining certification time information and certification data information of a user based on the target user information, and judging whether the certification time information exceeds preset time information or not, wherein the certification time information is time information spent on submitting certification, and the certification data information is certification data information submitted by the user along with the certification time information;
if the network data information exceeds the network data information, carrying out information integrity verification on the certification data information according to the network data information to obtain the information integrity of the certification data information;
and judging whether the information integrity degree meets a preset integrity degree, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and equipment of the user.
2. The method of claim 1, wherein the analyzing the network data information and the user data information to obtain the target user information comprises:
performing information disassembly on the network data information to obtain data identification information and data storage information;
and performing user screening on the user data information according to the data storage information to obtain target user information.
3. The method of claim 2, wherein the analyzing the network data information and the user data information to obtain the target user information further comprises:
and binding the target user information with the data identification information.
4. The method of claim 2, wherein the step of performing user screening on the user data information according to the data storage information to obtain target user information comprises:
identifying the data storage information to obtain data category information and data storage capacity of the data storage information;
determining the type of stored data, historical service quality and storage surplus of each user based on the user data information;
matching the data category information with the stored data category to obtain matched user information;
respectively carrying out data comparison on the storage residual quantity of each user in the matched user information and the data storage quantity to obtain comparison user information meeting preset conditions;
and performing quality sequencing on the historical service quality corresponding to the comparison user information to obtain target user information meeting a preset sequence.
5. The method of claim 4, wherein the determining the type of data stored, the historical quality of service, and the remaining amount of data stored for each user based on the user data information further comprises:
acquiring historical service information, wherein the historical service information is service information of each user in the user data information within a preset time period;
analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types;
performing data sorting on the historical service information according to the type of the stored data and the integrity degree of the certificate to obtain service matrix data;
performing data processing on data contained in the service matrix data to obtain user service data, inputting the user service data into a preset algorithm model for data operation, and generating historical service quality of each user;
and adding the historical service quality into the user data information for updating to obtain updated user data information.
6. The method according to claim 5, wherein the analyzing the historical service information to obtain the stored data types of each user in different time periods in the historical service information and the integrity of the certification corresponding to the stored data types comprises:
determining at least one set of service handling data based on the historical service information;
respectively performing label acquisition on the at least one group of service processing data to obtain user data and service processing time data in each group of service processing data;
determining whether the service processing data is processed completely according to the service processing time data, if not, performing data disruption on the service processing data, and if so, correspondingly binding the user data and the service processing time data to obtain user binding data;
and performing data combination screening on the user binding data to obtain the stored data types of each user in different time periods in the historical service information and the proof integrity corresponding to the stored data types.
7. The method of claim 5, wherein the adding the historical quality of service to the user data information for updating results in updated user data information, and further comprising:
acquiring actual service quality corresponding to the current user data information;
and updating the data of the historical service quality based on the actual service quality to obtain the updated historical service quality.
8. An anti-crash device, comprising:
the information acquisition module is used for acquiring network data information and user data information;
the information analysis module is used for analyzing the network data information and the user data information to obtain target user information;
the information sending module is used for sending the network data information to a user corresponding to the target user information for data storage;
the time judging module is used for determining the certification time information and the certification data information of the user based on the target user information and judging whether the certification time information exceeds the preset time information or not, wherein the certification time information is the time information spent on submitting the certification, and the certification data information is the certification data information submitted by the user along with the certification time information;
the information verification module is used for verifying the information integrity of the certification data information according to the network data information when the certification time information exceeds preset time information to obtain the information integrity of the certification data information;
and the integrity judgment module is used for judging whether the information integrity meets the preset integrity, if not, generating alarm information and sending the alarm information to target equipment, wherein the target equipment is the user and the equipment of the user.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: performing the method of preventing survivability according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of preventing power loss according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211470432.XA CN115587392B (en) | 2022-11-22 | 2022-11-22 | Method, device, equipment and medium for preventing power loss |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211470432.XA CN115587392B (en) | 2022-11-22 | 2022-11-22 | Method, device, equipment and medium for preventing power loss |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115587392A true CN115587392A (en) | 2023-01-10 |
CN115587392B CN115587392B (en) | 2023-04-07 |
Family
ID=84783483
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211470432.XA Active CN115587392B (en) | 2022-11-22 | 2022-11-22 | Method, device, equipment and medium for preventing power loss |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115587392B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110648243A (en) * | 2019-08-20 | 2020-01-03 | 中国平安财产保险股份有限公司 | Data processing method and device, computer equipment and storage medium |
US20200287900A1 (en) * | 2018-05-28 | 2020-09-10 | Alibaba Group Holding Limited | Identity verification method and apparatus |
CN111914269A (en) * | 2020-07-07 | 2020-11-10 | 华中科技大学 | Data security sharing method and system under block chain and cloud storage environment |
CN112416263A (en) * | 2020-12-10 | 2021-02-26 | 从法信息科技有限公司 | Space-time certification blocking storage method and device based on random verification and electronic equipment |
US20210157788A1 (en) * | 2019-10-15 | 2021-05-27 | Tencent Technology (Shenzhen) Company Limited | Data processing method and apparatus based on blockchain network, electronic device, and storage medium |
CN113382061A (en) * | 2021-06-08 | 2021-09-10 | 中国工商银行股份有限公司 | Service processing method, device and system based on cloud environment |
-
2022
- 2022-11-22 CN CN202211470432.XA patent/CN115587392B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200287900A1 (en) * | 2018-05-28 | 2020-09-10 | Alibaba Group Holding Limited | Identity verification method and apparatus |
CN110648243A (en) * | 2019-08-20 | 2020-01-03 | 中国平安财产保险股份有限公司 | Data processing method and device, computer equipment and storage medium |
US20210157788A1 (en) * | 2019-10-15 | 2021-05-27 | Tencent Technology (Shenzhen) Company Limited | Data processing method and apparatus based on blockchain network, electronic device, and storage medium |
CN111914269A (en) * | 2020-07-07 | 2020-11-10 | 华中科技大学 | Data security sharing method and system under block chain and cloud storage environment |
CN112416263A (en) * | 2020-12-10 | 2021-02-26 | 从法信息科技有限公司 | Space-time certification blocking storage method and device based on random verification and electronic equipment |
CN113382061A (en) * | 2021-06-08 | 2021-09-10 | 中国工商银行股份有限公司 | Service processing method, device and system based on cloud environment |
Also Published As
Publication number | Publication date |
---|---|
CN115587392B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108833458B (en) | Application recommendation method, device, medium and equipment | |
CN109582452B (en) | Container scheduling method, scheduling device and electronic equipment | |
US10469571B2 (en) | Block allocation based on server utilization | |
CN112035879B (en) | Information processing method and system for improving confidentiality of automatic logistics of cell | |
CN111698303A (en) | Data processing method and device, electronic equipment and storage medium | |
CN112162859A (en) | Data processing method and device, computer readable medium and electronic equipment | |
CN109800138B (en) | CPU testing method, electronic device and storage medium | |
CN114862140A (en) | Behavior analysis-based potential evaluation method, device, equipment and storage medium | |
CN112529400B (en) | Data processing method, device, terminal and readable storage medium | |
CN115587392B (en) | Method, device, equipment and medium for preventing power loss | |
CN113516065B (en) | Data weight measuring and calculating method and device based on block chain, server and storage medium | |
CN115358894A (en) | Intellectual property life cycle trusteeship management method, device, equipment and medium | |
CN113704616B (en) | Information pushing method and device, electronic equipment and readable storage medium | |
US10452792B1 (en) | Simulating demand and load on storage servers | |
CN113052509B (en) | Model evaluation method, model evaluation device, electronic apparatus, and storage medium | |
CN114723239A (en) | Multi-party collaborative modeling method, device, equipment, medium and program product | |
CN115238179A (en) | Project pushing method and device, electronic equipment and computer readable storage medium | |
CN116150470A (en) | Content recommendation method, device, apparatus, storage medium and program product | |
CN116506333B (en) | Transaction system production inversion detection method and equipment | |
CN114663200B (en) | Product recommendation method and device, electronic equipment and storage medium | |
CN116414366B (en) | Middleware interface generation method, device, equipment and medium | |
CN115225489B (en) | Dynamic control method for queue service flow threshold, electronic equipment and storage medium | |
CN114723488B (en) | Course recommendation method and device, electronic equipment and storage medium | |
CN115293266A (en) | Credit rating method, device, electronic equipment and computer-readable storage medium | |
CN116881726A (en) | Data processing method, device, equipment and medium for transportation practice operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |