CN115952025A - Data management and control method, system, terminal equipment and storage medium - Google Patents

Data management and control method, system, terminal equipment and storage medium Download PDF

Info

Publication number
CN115952025A
CN115952025A CN202310027999.8A CN202310027999A CN115952025A CN 115952025 A CN115952025 A CN 115952025A CN 202310027999 A CN202310027999 A CN 202310027999A CN 115952025 A CN115952025 A CN 115952025A
Authority
CN
China
Prior art keywords
data
abnormal
data transmission
transmission
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310027999.8A
Other languages
Chinese (zh)
Other versions
CN115952025B (en
Inventor
石建坤
张慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Saibert Communications Technology Co ltd
Original Assignee
Shenzhen Saibert Communications Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Saibert Communications Technology Co ltd filed Critical Shenzhen Saibert Communications Technology Co ltd
Priority to CN202310027999.8A priority Critical patent/CN115952025B/en
Publication of CN115952025A publication Critical patent/CN115952025A/en
Application granted granted Critical
Publication of CN115952025B publication Critical patent/CN115952025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The present application relates to the field of data processing technologies, and in particular, to a data management and control method, a data management and control system, a terminal device, and a storage medium. The method comprises the steps of identifying a current data application scene and acquiring corresponding data transmission parameters; if the data transmission parameters do not accord with the data transmission parameter indexes corresponding to the current data application scene, acquiring corresponding abnormal data transmission parameters; analyzing the abnormal data transmission parameters to obtain corresponding abnormal data output records; acquiring corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record; and generating a corresponding data correction instruction according to the original data to control data transmission. The data management and control method, the data management and control system, the terminal device and the storage medium have the effects of improving the safety management and calling of data.

Description

Data management and control method, system, terminal equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data management and control method, system, terminal device, and storage medium.
Background
Data management is the process of efficient collection, storage, processing and application of data using computer and software technologies, with the goal of fully and efficiently playing the role of data.
With the further increase of the level of informatization, there is a series of data quality problems that are accumulating, such as: the data management system has the advantages that the data quality is influenced due to the fact that attributes are lost, data are incomplete, data are not processed timely, data are not accurate, data attributes are not consistent, and the like.
Disclosure of Invention
In order to improve the safety management and calling effects of data, the application provides a data management and control method, a system, terminal equipment and a storage medium.
In a first aspect, the present application provides, comprising the steps of:
acquiring a current data application scene;
identifying the current data application scene, and acquiring corresponding data transmission parameters;
if the data transmission parameter does not accord with the data transmission parameter index corresponding to the current data application scene, acquiring a corresponding abnormal data transmission parameter;
analyzing the abnormal data transmission parameters to obtain corresponding abnormal data output records;
acquiring corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record;
and generating a corresponding data correction instruction according to the original data to control data transmission.
By adopting the technical scheme, the data transmission parameters for displaying the data transmission state are obtained according to the current data application scene, if the data transmission parameters do not conform to the data transmission parameter indexes corresponding to the current data application scene, the current network data quality is affected, in order to further carry out specific analysis on the affected data, so that an accurate adjustment strategy is made, the current abnormal data transmission parameters are obtained and analyzed, an abnormal data output record for recording the content of abnormal data is obtained, the abnormal transmission data affected by the current network and the backup original data corresponding to the abnormal transmission data can be obtained through the abnormal data output record, and then a corresponding data correction instruction can be generated according to the original data to correct the abnormal transmission data, the data transmission is further controlled, and the actual abnormal transmission data is specifically analyzed through the data transmission parameters not conforming to the data transmission parameter indexes and is corrected by combining with the corresponding original data pairs, so that the safety management and the calling effect of the data are improved.
Optionally, after acquiring the corresponding abnormal data transmission parameter if the data transmission parameter does not conform to the data transmission parameter index corresponding to the current data application scenario, the method further includes the following steps:
judging whether the abnormal data transmission parameters are multiple items or not;
if the abnormal data transmission parameters are multiple items, generating corresponding transmission parameter differences by combining the abnormal data transmission parameters and the data transmission parameter indexes corresponding to the abnormal data transmission parameters;
setting an adjustment priority corresponding to the abnormal data transmission parameters according to the transmission parameter difference, wherein the transmission parameter difference is in direct proportion to the adjustment priority;
and adjusting the abnormal data transmission parameters according to the adjustment priority.
By adopting the technical scheme, if the abnormal data transmission parameters are multiple, the current network performance is indicated to be unqualified, the adjustment priority corresponding to the abnormal data transmission parameters is further set according to the transmission parameter difference, and the abnormal data transmission parameters are adjusted according to the adjustment priority, so that the repair efficiency of the network data transmission environment is improved.
Optionally, after determining whether the abnormal data transmission parameters are multiple items, the method further includes the following steps:
if the abnormal data transmission parameters are multiple items, acquiring data transmission categories corresponding to the abnormal data transmission parameters;
identifying the data transmission category and acquiring a corresponding emergency processing grade;
and calling a processing strategy corresponding to the data transmission type to process the abnormal transmission data according to the emergency processing level.
By adopting the technical scheme, the processing strategy corresponding to the data transmission category is called according to the emergency processing level, and the abnormal transmission data is further processed according to the processing strategy, so that the safety of the data with higher important coefficients is improved.
Optionally, the obtaining of the corresponding abnormal transmission data and the original data corresponding to the abnormal transmission data according to the abnormal data output record includes the following steps:
matching a corresponding target data link according to the abnormal data output record;
identifying the target data link and acquiring a corresponding data backup group;
and acquiring the corresponding original data in the data backup group according to the abnormal transmission data.
By adopting the technical scheme, the data backup group with the same attribute of the abnormal transmission data can be conveniently and quickly matched according to the target data link, and the original data corresponding to the abnormal transmission data can be further obtained according to the data backup group, so that the efficiency of obtaining the original data corresponding to the abnormal transmission data is improved.
Optionally, after identifying the current data application scenario and acquiring the corresponding data transmission parameter, the method further includes the following steps:
if the data transmission parameter accords with the data transmission parameter index corresponding to the current data application scene, acquiring corresponding transmission data;
setting an access key corresponding to the transmission data according to the data content corresponding to the transmission data;
and acquiring and recording the use times and the user information corresponding to the access key.
By adopting the technical scheme, the access key corresponding to the transmission data is set, and the use times and the user information corresponding to the access key are recorded, so that the safety tracking of the data in the transmission process is promoted, and the safety in the data calling process is promoted.
Optionally, after obtaining and recording the number of times of use and the user information corresponding to the access key, the method further includes the following steps:
if the use times meet the preset key use time standard, judging whether the user information meets the preset visitor record;
and if the user information does not accord with the preset visitor record, generating a corresponding early warning prompt by combining the user information and the access trace.
By adopting the technical scheme, if the user information does not accord with the preset visitor record, the fact that an unfamiliar third party visits is indicated, and the corresponding early warning prompt is generated by further combining the user information and the visit trace, so that the timeliness of processing abnormal visits is improved.
Optionally, if the user information does not conform to the preset visitor record, the following steps are further included after generating a corresponding early warning prompt by combining the user information and the access trace:
acquiring data content and data length corresponding to the transmission data according to the early warning prompt;
and generating a corresponding message authentication code by combining the data content and the data length.
By adopting the technical scheme, when an unfamiliar third party accesses, in order to guarantee the safety and the integrity of data, the corresponding message authentication code is generated by combining the data content and the data length, so that the safety of data management is improved.
In a second aspect, the present application provides a data management and control system, including:
the first acquisition module is used for acquiring a current data application scene;
the identification module is used for identifying the current data application scene and acquiring corresponding data transmission parameters;
the second acquisition module is used for acquiring corresponding abnormal data transmission parameters if the data transmission parameters do not accord with the data transmission parameter indexes corresponding to the current data application scene;
the analysis module is used for analyzing the abnormal data transmission parameters and acquiring corresponding abnormal data output records;
a third obtaining module, configured to obtain corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record;
and the correction module is used for generating a corresponding data correction instruction according to the original data to control data transmission.
By adopting the technical scheme, according to the current data application scene acquired by the first acquisition module, the data transmission parameters for displaying the data transmission state can be identified and acquired by the identification module, if the data transmission parameters do not conform to the data transmission parameter indexes corresponding to the current data application scene, the current network data quality is indicated to be influenced, in order to further perform specific analysis on the influenced data, so as to make an accurate adjustment strategy, the current abnormal data transmission parameters are acquired and analyzed by the second acquisition module, the abnormal data output record for recording the abnormal data content is further obtained by the analysis module, the abnormal transmission data currently influenced by the network and the backup original data corresponding to the abnormal transmission data can be acquired by the third acquisition module according to the abnormal data output record, and further, the corresponding data correction instruction can be generated according to the original data, the abnormal transmission data is corrected by the correction module, the data transmission is further controlled, and the actual abnormal transmission data is specifically analyzed by the data transmission parameters not conforming to the data transmission parameter indexes, and is corrected by combining the corresponding original data pairs, so that the safety management and the calling effect of the data are improved.
In a third aspect, the present application provides a terminal device, which adopts the following technical solution:
a terminal device comprises a memory and a processor, wherein the memory stores computer instructions capable of running on the processor, and when the processor loads and executes the computer instructions, the data management and control method is adopted.
By adopting the technical scheme, the computer instruction is generated by the data control method and is stored in the memory so as to be loaded and executed by the processor, so that the terminal equipment is manufactured according to the memory and the processor, and the use is convenient.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium, having stored therein computer instructions, which when loaded and executed by a processor, implement a data management method as described above.
By adopting the technical scheme, the computer instruction is generated by the data management and control method and is stored in the computer readable storage medium to be loaded and executed by the processor, and the computer instruction can be conveniently read and stored through the computer readable storage medium.
In summary, the present application includes at least one of the following beneficial technical effects: according to the current data application scene, data transmission parameters for displaying the data transmission state are obtained, if the data transmission parameters do not accord with data transmission parameter indexes corresponding to the current data application scene, the current network data quality is affected, in order to further carry out specific analysis on the affected data, so that an accurate adjustment strategy is made, the current abnormal data transmission parameters are obtained and analyzed, an abnormal data output record for recording the content of abnormal data is obtained, the current abnormal transmission data affected by the network and backup original data corresponding to the abnormal transmission data can be obtained through the abnormal data output record, a corresponding data correction instruction can be generated according to the original data to correct the abnormal transmission data, the data transmission is further controlled, and the actual abnormal transmission data are specifically analyzed through the data transmission parameters which do not accord with the data transmission parameter indexes and are corrected in combination with the corresponding original data pairs, so that the data management and calling effects are improved.
Drawings
Fig. 1 is a schematic flowchart of steps S101 to S106 in a data management and control method according to the present application.
Fig. 2 is a schematic flowchart of steps S201 to S204 in a data management and control method according to the present application.
Fig. 3 is a schematic flowchart of steps S301 to S303 in a data management and control method according to the present application.
Fig. 4 is a schematic flowchart of steps S401 to S403 in a data management and control method according to the present application.
Fig. 5 is a schematic flowchart of steps S501 to S503 in a data management and control method according to the present application.
Fig. 6 is a schematic flowchart of steps S601 to S602 in a data management and control method according to the present application.
Fig. 7 is a schematic flowchart of steps S701 to S702 in a data management and control method according to the present application.
Fig. 8 is a schematic block diagram of a data management and control system according to the present application.
Description of reference numerals:
1. a first acquisition module; 2. an identification module; 3. a second acquisition module; 4. an analysis module; 5. a third obtaining module; 6. and a correction module.
Detailed Description
The present application is described in further detail below with reference to figures 1-8.
The embodiment of the application discloses a data management and control method, as shown in fig. 1, comprising the following steps:
s101, acquiring a current data application scene;
s102, identifying a current data application scene, and acquiring corresponding data transmission parameters;
s103, if the data transmission parameters do not accord with the data transmission parameter indexes corresponding to the current data application scene, acquiring corresponding abnormal data transmission parameters;
s104, analyzing the abnormal data transmission parameters to obtain corresponding abnormal data output records;
s105, acquiring corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record;
and S106, generating a corresponding data correction instruction according to the original data to control data transmission.
In step S101, the current data application scenario refers to an application scenario of current data transmission, for example, a data application scenario of IP telephony, video, and website access.
Where data transmission is the communication of data from one location to another, data transmission systems typically consist of a transmission channel, which may be a dedicated communication channel, or may be provided by a data switching network, a telephone switching network, or other type of switching network, and data circuit terminating equipment at the ends of the channel, and in some cases multiplexing equipment at the ends of the channel.
Further, in step S102, a current data application scenario is identified, and a corresponding data transmission parameter is obtained, where the data transmission parameter refers to a characteristic parameter of communication data line transmission, and it is further determined that the current data transmission parameter conforms to a data transmission parameter index corresponding to the current data application scenario, where the data transmission parameter index refers to a parameter index of bandwidth, delay, jitter, and packet loss rate of network data transmission, and it should be noted that data transmission parameter indexes corresponding to different current data application scenarios are also different.
Specifically, data transmission parameter indexes required by different current data application scenes are different, for example, the network index requirements of an IP phone, a video and an access website are different, from the perspective of a server environment, the server can only control the bandwidth of the server, but the actual access environment of a common user cannot be controlled, the server needs to do so in a poor network environment and can provide better experience, and from the perspective of a user environment, if the network environment of a website, namely the data transmission parameter indexes, meets the requirements, the user can open the website smoothly, so that the data transmission parameter indexes can be met, and the corresponding network environment has no problem.
In step S103, if the data transmission parameter does not conform to the data transmission parameter index corresponding to the current data application scenario, it indicates that the current network data transmission environment is affected, which causes an exception to occur in the data transmission process during call, and in order to further ensure the data security, the corresponding abnormal data transmission parameter is obtained, where the data transmission parameter index includes delay, jitter, and packet loss rate, and all of the delay, jitter, and packet loss rate may be directly tested using PING.
For example, the abnormal data transmission parameter is a delay, which refers to the time required for a packet or packet to be transmitted from one end of the network to the other end. Taking voice data transmission as an example, the delay refers to the time from when a speaker starts speaking to when the other party hears the spoken content, if the delay is too large, the speech sound will be unclear, discontinuous or broken, and the delay index is usually less than 100 milliseconds.
For another example, the abnormal data transmission parameter is jitter, which means that delay presented by different packets in the same service flow is different, and jitter is mainly caused by different queuing times of successive packets in the service flow, which is a problem that affects the quality of service most, and the jitter index is usually less than 20 milliseconds.
For another example, the abnormal data transmission parameter is a packet loss rate, which means that the number of lost data packets accounts for the ratio of the transmitted data groups, and a small amount of packet loss has little influence on the service. The transmission of data using the tcp also allows a small amount of packet loss, because the tcp allows retransmission of lost information, but a large amount of packet loss affects the transmission efficiency, and the packet loss rate is usually less than 1%.
Further, in step S104, the abnormal data transmission parameter is analyzed to obtain a corresponding abnormal data output record, where the abnormal data output record refers to a record of actually outputting data when the network operates under the abnormal data transmission parameter.
For example, the abnormal data transmission parameter is a voice delay, i.e. delay, when the delay is between 100 ms and 300 ms, the speaker may detect a slight pause of the reply of the other party, when the delay exceeds 300 ms, the delay is obvious, the users start to wait for the reply of the other party, when one party in a call cannot receive the expected reply in time, the speaker may repeat the spoken word, which may collide with the reply delayed by the far end, resulting in repetition, and the voice interaction data between the users are recorded in the abnormal data output record in real time, wherein the abnormal data output record may also be set as an abnormal voice data collection database.
Further, in steps S105 to S106, according to the abnormal data output record, corresponding abnormal transmission data and original data corresponding to the abnormal transmission data are obtained, where the original data refers to backup data copied when the data is transmitted, and when the time delay exceeds 300 milliseconds, a party in a call cannot receive an expected reply in time, and at this time, the transmitted voice data may be lost.
According to the data control method provided by the embodiment, the data transmission parameters for displaying the data transmission state are obtained according to the current data application scene, if the data transmission parameters do not accord with the data transmission parameter indexes corresponding to the current data application scene, it is indicated that the current network data quality is affected, in order to further perform specific analysis on the affected data, so as to make an accurate adjustment strategy, the current abnormal data transmission parameters are obtained and analyzed, an abnormal data output record for recording the content of abnormal data is obtained, the abnormal transmission data affected by the current network can be obtained through the abnormal data output record, backup original data corresponding to the abnormal transmission data are obtained, a corresponding data correction instruction can be generated according to the original data to correct the abnormal transmission data, the data transmission is further controlled, and the actual abnormal transmission data is specifically analyzed through the data transmission parameters which do not accord with the data transmission parameter indexes, and corrected by combining with the corresponding original data pairs, so that the safety management and the calling effect of the data are improved.
In one implementation manner of this embodiment, as shown in fig. 2, in step S103, that is, if the data transmission parameter does not meet the data transmission parameter index corresponding to the current data application scenario, the following steps are further included after acquiring the corresponding abnormal data transmission parameter:
s201, judging whether the abnormal data transmission parameters are multiple items;
s202, if the abnormal data transmission parameters are multiple, generating corresponding transmission parameter differences by combining the abnormal data transmission parameters and data transmission parameter indexes corresponding to the abnormal data transmission parameters;
s203, setting an adjustment priority corresponding to the abnormal data transmission parameters according to the transmission parameter difference, wherein the transmission parameter difference is in direct proportion to the adjustment priority;
and S204, adjusting the abnormal data transmission parameters according to the adjustment priority.
In step S201, it is determined whether the abnormal data transmission parameter is multiple, so as to analyze and detect the network environment corresponding to the data transmission in advance, so as to determine the actual transmission environment of the current network data, i.e. the network performance.
Further, in step S202, if the abnormal data transmission parameters are multiple items, it indicates that the current network data transmission environment is poor, and then the corresponding transmission parameter difference is generated by combining each abnormal data transmission parameter and the data transmission parameter index corresponding to each abnormal data transmission parameter.
For example, if the abnormal data transmission parameters are delay and jitter, the measured current delay is 150 ms, and the jitter is 25 ms, the difference of the corresponding delay transmission parameters generated by combining the current delay and the corresponding delay data transmission parameter index is 50 ms, and the difference of the corresponding delay transmission parameters generated by combining the current jitter and the corresponding jitter data transmission parameter index is 5 ms.
In order to adjust the network data transmission environment more efficiently, in step S203, an adjustment priority corresponding to the abnormal data transmission parameter is set according to the transmission parameter difference, the transmission parameter difference is proportional to the adjustment priority, that is, the larger the transmission parameter difference is, the higher the corresponding adjustment priority is, wherein the transmission parameter difference is determined according to the difference level.
For example, a delay of 100 ms to 125 ms belongs to a first-order delay class, a delay of 125 ms to 180 ms belongs to a second-order delay class, and a delay of more than 180 ms belongs to a third-order delay class, with a higher delay class corresponding to a higher difference class. Similarly, jitter is at a primary jitter level of 20 milliseconds to 30 milliseconds, jitter is at a secondary jitter level of 30 milliseconds to 40 milliseconds, and jitter exceeding 40 milliseconds is at a tertiary jitter level. The adjustment priority corresponding to the available delay is higher than the adjustment priority corresponding to the jitter.
Finally, in step S204, according to the obtained adjustment priority, the abnormal data transmission parameter corresponding to the network data transmission environment is adjusted to be within the data transmission parameter index range, for example, entering a router setup page modification channel, so as to change the delay problem.
In the data management and control method provided by this embodiment, if the number of the abnormal data transmission parameters is multiple, it is indicated that the number of the abnormal data transmission parameters does not reach the standard, the adjustment priority corresponding to the abnormal data transmission parameters is further set according to the transmission parameter difference, and the abnormal data transmission parameters are adjusted according to the adjustment priority, so that the repair efficiency of the network data transmission environment is improved.
In one implementation manner of this embodiment, as shown in fig. 3, after determining whether the abnormal data transmission parameters are multiple items in step S201, the method further includes the following steps:
s301, if the abnormal data transmission parameters are multiple, acquiring data transmission categories corresponding to the abnormal data transmission parameters;
s302, identifying the data transmission type and acquiring a corresponding emergency processing grade;
and S303, calling a processing strategy corresponding to the data transmission type according to the emergency processing level to process the abnormal transmission data.
In practical applications, the corresponding data emphasis is different in various current data application scenarios, for example, in a video call, video picture data and voice communication data are involved, wherein the importance level of the voice communication data is higher than that of the video picture data.
Further, the data transmission type corresponding to the abnormal data transmission parameter in step S301 is the above mentioned various types of transmission data corresponding to the current data application scenario, when the network data transmission environment is poor, in order to perform timely and safe processing on the important data, in step S302, the data transmission type is identified to obtain a corresponding emergency processing level, for example, the emergency processing level corresponding to the available voice communication data is higher than the emergency processing level of the video image data.
In step S303, a processing policy corresponding to the data transmission type is invoked to process the abnormal transmission data according to the emergency processing level, where the processing policy refers to a security protection policy corresponding to different emergency processing levels.
For example, when the delay and jitter of the video call are serious, the processing strategy corresponding to the voice communication data is called as that effective network bandwidth is increased first, a method for increasing bandwidth is adopted to provide larger capacity, so as to solve the delay, then the current jitter buffer depth is increased or decreased according to the size relation between the difference of the stamp values of the data packets at the tail end and the head end in the jitter buffer pointer queue and the current jitter buffer depth, and according to the relation between the buffer time of the data packets in the jitter buffer pointer queue and the minimum delay amount of the data packets buffered in the jitter buffer pointer queue, and then the voice communication data is preferentially transmitted to the receiving party.
According to the data management and control method provided by the embodiment, the processing strategy corresponding to the data transmission category is called according to the emergency processing level, and the abnormal transmission data is further processed according to the processing strategy, so that the safety of the data with higher important coefficients is improved.
In one implementation manner of this embodiment, as shown in fig. 4, the step S105 of obtaining the corresponding abnormal transmission data and the original data corresponding to the abnormal transmission data according to the abnormal data output record includes the following steps:
s401, matching a corresponding target data link according to the abnormal data output record;
s402, identifying a target data link and acquiring a corresponding data backup group;
and S403, acquiring corresponding original data in the data backup group according to the abnormal transmission data.
In practical applications, in order to ensure the security and reliability of data transmission, in steps S401 to S402, a corresponding target data link is matched according to an abnormal data output record, and a corresponding data backup group is further obtained by identifying the target data link, where the target data link refers to a communication channel with the data backup group, the data backup group refers to a backup file sent by a sender or retrieved by a database, and a communication connection can be quickly established with the data backup group through the target data link.
Further, in step S403, when the data transmission fails or is lost in the middle, the corresponding original data in the data backup group is obtained according to the abnormal transmission data, and there is a corresponding record in the abnormal data output record when the data transmission fails or is lost in the middle.
Specifically, the data loss is caused by misoperation of a user, and the data loss may be caused by negligence of the user in the process of processing the data, for example, some important data are deleted by mistake; when a software system is in error operation and a software program is suddenly stopped or crashed, data cannot be stored, and the data can be lost; the damage of the hard disk, the scratch of the hard disk, the damage of the magnetic disk and the loss of data when chips or other components are burnt.
For example, in a voice call scenario, a sender sends a segment of voice, after a voice segment is completed before the voice is sent, the system backups the data content corresponding to the voice segment and stores the data content into a data backup group, at this time, in the process of transmitting voice data to a receiver, the voice data is lost due to sudden suspension of a software program, an abnormal data output record records the storage address of the voice data in the data backup group, and then matches the storage address and establishes communication with the data backup group through a corresponding target data link, and then obtains the corresponding voice segment original data in the data backup group according to the abnormal transmission data, and resends the voice segment original data.
According to the data management and control method provided by the embodiment, the data backup group with the same attribute of the abnormal transmission data is conveniently and quickly matched according to the target data link, and the original data corresponding to the abnormal transmission data is further acquired according to the data backup group, so that the efficiency of acquiring the original data corresponding to the abnormal transmission data is improved.
In one implementation manner of this embodiment, as shown in fig. 5, after identifying the current data application scenario and acquiring the corresponding data transmission parameters in step S102, the method further includes the following steps:
s501, if the data transmission parameters meet data transmission parameter indexes corresponding to the current data application scene, acquiring corresponding transmission data;
s502, setting an access key corresponding to the transmission data according to the data content corresponding to the transmission data;
s503, obtaining and recording the use times and the user information corresponding to the access key.
In actual application, if the data transmission parameter conforms to the data transmission parameter index corresponding to the current data application scenario, in order to further improve the transmission security of the network data, in step S502, transmission data corresponding to the current network is obtained, and an access key corresponding to the transmission data is set according to the data content corresponding to the transmission data.
The transmission of important data in a network may be open and naked, so that the data may have a wiretapping problem during transmission, so that it is necessary to encrypt currently transmitted data, and for many encryption techniques, for example, MD5, SHA-1, and so on, the encryption technique based on the hash function is irreversible and has the same length, for example, when storing a password in a database, the encryption algorithm based on the hash function may be used for cryptographic encryption, and then the encrypted password is stored in the database.
Furthermore, although the above-mentioned technology can ensure that data is not leaked, the receiving party may not know who the sending party is, that is, anyone can send a message to the receiving party, and if a malicious person sends data with a public key, it is enough to pose a threat, so in step S503, the number of times of use corresponding to the access key and the user information are obtained and recorded, and the system log can record the number of times of use of the access key and the user information, that is, the visitor information, in real time, the user information includes the identity information of the visitor.
According to the data management and control method provided by the embodiment, the access key corresponding to the transmission data is set, and the use times and the user information corresponding to the access key are recorded, so that the safety tracking of the data in the transmission process is improved, and the safety in the data calling process is improved.
In one implementation of this embodiment, as shown in fig. 6, after acquiring and recording the number of uses corresponding to the access key and the user information in step S503, the method further includes the following steps:
s601, if the using times meet the preset key using time standard, judging whether the user information meets the preset visitor record;
s602, if the user information does not accord with the preset visitor record, generating a corresponding early warning prompt by combining the user information and the access trace.
In step S601, if the number of times of use meets a predetermined key number of times of use standard, where the predetermined key number of times of use standard refers to an upper limit of the number of times of use of the access key, and the predetermined key number of times of use standard is also set to reduce a range of data leakage.
Further, if the number of times of use meets the preset key number of times of use standard, it is indicated that the current data is primarily determined as safe, and it is further determined whether the user information meets a preset visitor record, where the user information is identity information of the access key used, and the preset visitor record is identity information of a person who is preset to have access to the data.
If the number of times of use does not meet the preset key number of times of use standard, the system triggers a locking instruction to stop all access requests, namely, the identification and reading of the access key are stopped, and the data are in a comprehensive blocking state.
In step S602, if the user information does not conform to the preset visitor record, it is indicated that the user, i.e., the visitor, is an unfamiliar third party, and in order to facilitate tracing back of the unfamiliar third party, a corresponding warning prompt is generated in combination with the user information and the visit trace to notify the relevant person.
According to the data control method provided by the embodiment, if the user information does not accord with the preset visitor record, the fact that an unfamiliar third party visits is indicated, and the corresponding early warning prompt is generated by further combining the user information and the visit trace, so that the timeliness of processing abnormal visits is improved.
In one implementation manner of this embodiment, as shown in fig. 7, in step S602, that is, if the user information does not meet the preset visitor record, the method further includes the following steps after generating a corresponding warning prompt by combining the user information and the access trace:
s701, acquiring data content and data length corresponding to transmission data according to the early warning prompt;
s702, combining the data content and the data length to generate a corresponding message authentication code.
In steps S701 to S702, after a strange third party cracks the access right of the data, the data may be tampered, so in order to reduce the above situation, the system obtains the data content and the data length corresponding to the transmission data according to the warning prompt, and generates a corresponding message authentication code in combination with the data content and the data length, the message authentication code is randomly generated along with the actual content and the actual length of the current data, and the message authentication code corresponds to the query modification right of the data.
Specifically, the message authentication code generates a random code according to the content and length of the transmitted data and a key for unlocking the random code, the data is verified through the key when needing to be accessed, if the data is tampered in the transmission process, the random code is changed, and the data cannot be decrypted by using the key.
According to the data management and control method provided by the embodiment, when an unfamiliar third party accesses, in order to guarantee the safety and the integrity of data, the corresponding message authentication code is generated by combining the data content and the data length, and therefore the safety of data management is improved.
The embodiment of the application discloses a data management and control system, as shown in fig. 8, including:
the first acquisition module 1 is used for acquiring a current data application scene;
the identification module 2 is used for identifying the current data application scene and acquiring corresponding data transmission parameters;
the second obtaining module 3 is configured to obtain a corresponding abnormal data transmission parameter if the data transmission parameter does not conform to the data transmission parameter index corresponding to the current data application scenario;
the analysis module 4 is used for analyzing the abnormal data transmission parameters and acquiring corresponding abnormal data output records;
the third obtaining module 5 is configured to obtain corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record;
and the correction module 6 is used for generating a corresponding data correction instruction according to the original data to control data transmission.
According to the data management and control system provided by the embodiment, according to the current data application scene acquired by the first acquisition module 1, data transmission parameters for displaying a data transmission state can be identified and acquired through the identification module 2, if the data transmission parameters do not accord with data transmission parameter indexes corresponding to the current data application scene, it is indicated that the current network data quality is affected, in order to further perform specific analysis on the affected data so as to make an accurate adjustment strategy, the current abnormal data transmission parameters are acquired and analyzed through the second acquisition module 3, an abnormal data output record for recording the content of the abnormal data is further obtained through analysis of the analysis module 4, according to the abnormal data output record, abnormal transmission data influenced by the current network and backup original data corresponding to the abnormal transmission data can be acquired through the third acquisition module 5, and further, according to the original data, a corresponding data correction instruction can be generated, the abnormal transmission data can be corrected through the correction module 6, the transmission of the data is further controlled, and due to the fact that the actual abnormal transmission data is specifically analyzed through the data transmission parameters which do not accord with the data transmission parameter indexes, and the corresponding original data pair is corrected, the safety management and the calling effect of the data is improved.
It should be noted that the data management and control system provided in the embodiment of the present application further includes each module and/or each sub-module corresponding to a logic function or a logic step of any one of the data management and control methods, so as to achieve the same effect as each logic function or logic step, and will not be described herein again specifically.
The embodiment of the present application further discloses a terminal device, which includes a memory, a processor, and a computer instruction stored in the memory and capable of running on the processor, wherein when the processor executes the computer instruction, any one of the data management and control methods in the above embodiments is adopted.
The terminal device may adopt a computer device such as a desktop computer, a notebook computer, or a cloud server, and the terminal device includes but is not limited to a processor and a memory, for example, the terminal device may further include an input/output device, a network access device, a bus, and the like.
The processor may be a Central Processing Unit (CPU), and of course, according to an actual use situation, other general processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like may also be used, and the general processor may be a microprocessor or any conventional processor, and the present application does not limit the present invention.
The memory may be an internal storage unit of the terminal device, for example, a hard disk or a memory of the terminal device, or an external storage device of the terminal device, for example, a plug-in hard disk, a Smart Memory Card (SMC), a secure digital card (SD) or a flash memory card (FC) equipped on the terminal device, and the memory may also be a combination of the internal storage unit of the terminal device and the external storage device, and the memory is used for storing computer instructions and other instructions and data required by the terminal device, and the memory may also be used for temporarily storing data that has been output or will be output, which is not limited in this application.
The terminal device stores any one of the data management and control methods in the embodiments in a memory of the terminal device, and the data management and control method is loaded and executed on a processor of the terminal device, so that the terminal device is convenient to use.
The embodiment of the present application further discloses a computer-readable storage medium, and the computer-readable storage medium stores computer instructions, where the computer instructions, when executed by the processor, adopt any one of the data management and control methods in the foregoing embodiments.
The computer instructions may be stored in a computer readable medium, the computer instructions include computer instruction codes, the computer instruction codes may be in a source code form, an object code form, an executable file or some middleware form, and the computer readable medium includes any entity or device capable of carrying the computer instruction codes, a recording medium, a usb disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a Read Only Memory (ROM), a Random Access Memory (RAM), an electrical carrier signal, a telecommunication signal, a software distribution medium, and the like, and the computer readable medium includes but is not limited to the above components.
The computer-readable storage medium stores any one of the data management and control methods in the above embodiments, and is loaded and executed on a processor to facilitate storage and application of the methods.
The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: equivalent changes in structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (10)

1. A data management and control method is characterized by comprising the following steps:
acquiring a current data application scene;
identifying the current data application scene, and acquiring corresponding data transmission parameters;
if the data transmission parameter does not accord with the data transmission parameter index corresponding to the current data application scene, acquiring a corresponding abnormal data transmission parameter;
analyzing the abnormal data transmission parameters to obtain corresponding abnormal data output records;
acquiring corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record;
and generating a corresponding data correction instruction to control data transmission according to the original data.
2. The data management and control method according to claim 1, wherein after acquiring the corresponding abnormal data transmission parameter if the data transmission parameter does not conform to the data transmission parameter index corresponding to the current data application scenario, the method further comprises the following steps:
judging whether the abnormal data transmission parameters are multiple items or not;
if the abnormal data transmission parameters are multiple items, generating corresponding transmission parameter differences by combining the abnormal data transmission parameters and the data transmission parameter indexes corresponding to the abnormal data transmission parameters;
setting an adjustment priority corresponding to the abnormal data transmission parameters according to the transmission parameter difference, wherein the transmission parameter difference is in direct proportion to the adjustment priority;
and adjusting the abnormal data transmission parameters according to the adjustment priority.
3. The data management and control method according to claim 2, further comprising the following steps after said determining whether the abnormal data transmission parameters are multiple items:
if the abnormal data transmission parameters are multiple items, acquiring data transmission categories corresponding to the abnormal data transmission parameters;
identifying the data transmission category and acquiring a corresponding emergency processing grade;
and calling a processing strategy corresponding to the data transmission type to process the abnormal transmission data according to the emergency processing level.
4. The method according to claim 1, wherein the step of obtaining corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record comprises the following steps:
matching a corresponding target data link according to the abnormal data output record;
identifying the target data link and acquiring a corresponding data backup group;
and acquiring the corresponding original data in the data backup group according to the abnormal transmission data.
5. The data management and control method according to claim 1, further comprising the following steps after said identifying the current data application scenario and obtaining the corresponding data transmission parameters:
if the data transmission parameter accords with the data transmission parameter index corresponding to the current data application scene, acquiring corresponding transmission data;
setting an access key corresponding to the transmission data according to the data content corresponding to the transmission data;
and acquiring and recording the use times and the user information corresponding to the access key.
6. The data management and control method according to claim 5, further comprising the following steps after the obtaining and recording the number of uses and the user information corresponding to the access key:
if the use times meet the preset key use time standard, judging whether the user information meets the preset visitor record;
and if the user information does not accord with the preset visitor record, generating a corresponding early warning prompt by combining the user information and the access trace.
7. The data management and control method according to claim 6, wherein if the user information does not conform to the preset visitor record, the method further comprises the following steps of generating a corresponding early warning prompt by combining the user information and an access trace:
acquiring data content and data length corresponding to the transmission data according to the early warning prompt;
and generating a corresponding message authentication code by combining the data content and the data length.
8. The data management and control system of claim 1, comprising:
the system comprises a first acquisition module (1) for acquiring a current data application scene;
the identification module (2) is used for identifying the current data application scene and acquiring corresponding data transmission parameters;
the second acquisition module (3) is used for acquiring corresponding abnormal data transmission parameters if the data transmission parameters do not accord with the data transmission parameter indexes corresponding to the current data application scene;
the analysis module (4) is used for analyzing the abnormal data transmission parameters and acquiring corresponding abnormal data output records;
a third obtaining module (5) for obtaining corresponding abnormal transmission data and original data corresponding to the abnormal transmission data according to the abnormal data output record;
and the correction module (6) is used for generating a corresponding data correction instruction according to the original data to control data transmission.
9. A terminal device comprising a memory and a processor, wherein the memory stores computer instructions capable of running on the processor, and the processor loads and executes the computer instructions, and the data management method according to any one of claims 1 to 7 is adopted.
10. A computer readable storage medium having computer instructions stored thereon, wherein the computer instructions, when loaded and executed by a processor, implement a data management method as claimed in any one of claims 1 to 7.
CN202310027999.8A 2023-01-09 2023-01-09 Data management and control method, system, terminal equipment and storage medium Active CN115952025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310027999.8A CN115952025B (en) 2023-01-09 2023-01-09 Data management and control method, system, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310027999.8A CN115952025B (en) 2023-01-09 2023-01-09 Data management and control method, system, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115952025A true CN115952025A (en) 2023-04-11
CN115952025B CN115952025B (en) 2024-03-05

Family

ID=87282345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310027999.8A Active CN115952025B (en) 2023-01-09 2023-01-09 Data management and control method, system, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115952025B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547206A (en) * 2010-12-30 2012-07-04 中国移动通信集团公司 Method and device for determining video transmission parameter during video communication
CN107995243A (en) * 2016-10-27 2018-05-04 北京优朋普乐科技有限公司 A kind of communication means and server based on control command
WO2020015259A1 (en) * 2018-07-20 2020-01-23 华为技术有限公司 Data backup method and terminal
CN111246262A (en) * 2020-01-09 2020-06-05 西安万像电子科技有限公司 Code scheduling control method and scheduling controller
CN113037440A (en) * 2021-05-25 2021-06-25 腾讯科技(深圳)有限公司 Data retransmission processing method and device, computer equipment and storage medium
CN113497797A (en) * 2020-04-08 2021-10-12 中国移动通信集团广东有限公司 Method and device for detecting abnormality of ICMP tunnel transmission data
CN113783775A (en) * 2021-03-09 2021-12-10 北京京东尚科信息技术有限公司 Data transmission method and device
CN114218001A (en) * 2021-11-30 2022-03-22 山东云海国创云计算装备产业创新中心有限公司 Fault repairing method and device, electronic equipment and readable storage medium
CN114615239A (en) * 2022-03-15 2022-06-10 奇安信科技集团股份有限公司 Data transmission method, device, system and storage medium
CN114666225A (en) * 2022-03-10 2022-06-24 阿里巴巴(中国)有限公司 Bandwidth adjustment method, data transmission method, device and computer storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547206A (en) * 2010-12-30 2012-07-04 中国移动通信集团公司 Method and device for determining video transmission parameter during video communication
CN107995243A (en) * 2016-10-27 2018-05-04 北京优朋普乐科技有限公司 A kind of communication means and server based on control command
WO2020015259A1 (en) * 2018-07-20 2020-01-23 华为技术有限公司 Data backup method and terminal
CN111246262A (en) * 2020-01-09 2020-06-05 西安万像电子科技有限公司 Code scheduling control method and scheduling controller
CN113497797A (en) * 2020-04-08 2021-10-12 中国移动通信集团广东有限公司 Method and device for detecting abnormality of ICMP tunnel transmission data
CN113783775A (en) * 2021-03-09 2021-12-10 北京京东尚科信息技术有限公司 Data transmission method and device
CN113037440A (en) * 2021-05-25 2021-06-25 腾讯科技(深圳)有限公司 Data retransmission processing method and device, computer equipment and storage medium
CN114218001A (en) * 2021-11-30 2022-03-22 山东云海国创云计算装备产业创新中心有限公司 Fault repairing method and device, electronic equipment and readable storage medium
CN114666225A (en) * 2022-03-10 2022-06-24 阿里巴巴(中国)有限公司 Bandwidth adjustment method, data transmission method, device and computer storage medium
CN114615239A (en) * 2022-03-15 2022-06-10 奇安信科技集团股份有限公司 Data transmission method, device, system and storage medium

Also Published As

Publication number Publication date
CN115952025B (en) 2024-03-05

Similar Documents

Publication Publication Date Title
US8943599B2 (en) Certifying server side web applications against security vulnerabilities
CN109474603B (en) Data packet grabbing processing method and terminal equipment
CN110445615B (en) Network request security verification method, device, medium and electronic equipment
CN113225351B (en) Request processing method and device, storage medium and electronic equipment
CN113132363B (en) Front-end and back-end security verification method and equipment
CN112566121B (en) Method for preventing attack, server and storage medium
US20200382498A1 (en) Method and device for portal authentication
CN108390857B (en) Method and device for exporting file from high-sensitivity network to low-sensitivity network
CN112968910A (en) Replay attack prevention method and device
CN116132149A (en) Tamper-resistant communication method and device, server, intelligent home and terminal equipment
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN113660292A (en) Method and device for acquiring information of calling client main body
CN115952025B (en) Data management and control method, system, terminal equipment and storage medium
CN110995658A (en) Gateway protection method, device, computer equipment and storage medium
CN113225348B (en) Request anti-replay verification method and device
CN115333797A (en) Evaluation method and system of charging pile system and computer storage medium
CN114626849A (en) Data protection method and protection device based on block chain
CN113626857A (en) Meteorological information sharing service system based on visual plug-in and use method
CN107948331B (en) Big data information processing method and system and information collection equipment
CN113765673A (en) Access control method and device
CN108270567B (en) Message source verification method, device and system and message sending method and device
CN111328077A (en) Pseudo base station short message identification method, base station short message encryption method and system
CN116318899B (en) Data encryption and decryption processing method, system, equipment and medium
CN114338107B (en) Safety control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant