CN116170206A - Information security data management method and system based on Internet - Google Patents

Information security data management method and system based on Internet Download PDF

Info

Publication number
CN116170206A
CN116170206A CN202310137595.4A CN202310137595A CN116170206A CN 116170206 A CN116170206 A CN 116170206A CN 202310137595 A CN202310137595 A CN 202310137595A CN 116170206 A CN116170206 A CN 116170206A
Authority
CN
China
Prior art keywords
data
current
transmission request
face
main body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310137595.4A
Other languages
Chinese (zh)
Inventor
雷秀兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Little Lazy Technology Co ltd
Original Assignee
Wuhan Little Lazy Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Little Lazy Technology Co ltd filed Critical Wuhan Little Lazy Technology Co ltd
Priority to CN202310137595.4A priority Critical patent/CN116170206A/en
Publication of CN116170206A publication Critical patent/CN116170206A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to an information security data management method and system based on the Internet, comprising the steps of obtaining a current data transmission request, judging whether an information transmission request main body has information transmission qualification, and if so, obtaining current data to be transmitted; acquiring main content data of the current data to be transmitted, acquiring a current secret item, judging whether the current actual similar data is pre-stored known data or not, acquiring dissimilar data if the current actual similar data is pre-stored known data, comparing the dissimilar data with preset standard secret data to generate an actual similarity value, and judging whether the actual similarity value is greater than or equal to standard similarity or not; and if the actual similarity value is smaller than the standard similarity, collecting the current face data of the information transmission request main body, and generating a data output instruction. The invention realizes the improvement of the safety and reliability of data management.

Description

Information security data management method and system based on Internet
Technical Field
The application relates to the technical field of the internet, in particular to an information security data management method and system based on the internet.
Background
Data management techniques refer to the classification, encoding, storage, retrieval and maintenance of data, which is a central problem for data processing. With the continuous development of computer technology, under the promotion of application requirements, the data management technology is subjected to 3 stages of manual management, file system and database system on the basis of development of computer hardware and software.
At present, in actual work, data is often required to be transferred, for example, an encrypted file transmission method, a decrypted file display method, a storage medium and an electronic device are disclosed in an invention patent with application number of CN202310005148.3, and the encrypted file transmission method includes: acquiring a storage request for a target file sent by a user terminal, wherein the storage request contains a user identifier; when the target file belongs to the sensitive file relative to the user identification, reading a byte array of the target file; acquiring the file type of a target file; identifying a first position set of bytes used for reflecting file contents in the byte array according to the file type; reading a byte array of the target file; performing numerical value change processing and position transformation processing on bytes in a first position set in the byte array; forming an encrypted file according to the byte array processed twice; and sending the encrypted file to the user terminal.
The technical scheme disclosed in the above patent document can improve the security of file transmission, and the formed encrypted file does not damage the file structure, but the encrypted file still has defects, and the encrypted file has the problems of inaccurate management and control and security when data transfer is carried out.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an internet-based information security data management method and system capable of data management security and reliability.
The technical scheme of the invention is as follows:
an internet-based information security data management method, the method comprising:
acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has information transmission qualification; carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored; if the current actual similar data is judged to be pre-stored known data, non-similar data in the main content data are obtained, the non-similar data are compared with preset standard secret data, an actual similarity value is generated, and whether the actual similarity value is larger than or equal to the standard similarity is judged; if the actual similarity value is smaller than the standard similarity, the current face data of the information transmission request main body is collected based on a preset internet information collection module, whether the data playing requirement is met or not is judged according to the current face data, if yes, a data output instruction is generated, and the current data transmission request is sent to a preset data receiving port according to the data output instruction.
Specifically, performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is prestored known data or not; the method specifically comprises the following steps:
performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, and simultaneously extracting actual outer layer data according to the main content data, wherein the actual outer layer data is data which is set by the information transmission request main body; acquiring pre-stored standard outer layer specifications according to the actual outer layer data, and judging whether the actual outer layer data is matched with the standard outer layer specifications or not; if the actual outer layer data is not matched with the standard outer layer specification, generating a data suspicious indication, and sending the data suspicious indication to a preset data supervisor; if the actual outer layer data is judged to be matched with the standard outer layer specification, a current secret item is obtained, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located; acquiring corresponding current latest project data according to the current secret project; comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data; acquiring prestored known data; comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not.
Specifically, if the actual similarity value is smaller than the standard similarity, acquiring current face data of the information transmission request main body based on a preset internet information acquisition module, judging whether the current face data meets the data playing requirement or not, if so, generating a data output instruction, and sending the current data transmission request to a preset data receiving port according to the data output instruction; the method specifically comprises the following steps:
if the actual similarity value is smaller than the standard similarity, acquiring initial face data of the information transmission request main body based on a preset internet information acquisition module; invoking pre-stored historical face data of the information transmission request main body based on the preset initial face data; comparing the pre-stored historical face data with the initial face data, and obtaining a face matching degree; judging whether the face matching degree is larger than or equal to the standard matching degree; if the face-to-face matching degree is smaller than the standard matching degree, judging that the information transmission request main body performs face-to-face matching, generating a face-to-face matching reminding, and continuously acquiring real-time face-to-face data until the information transmission request main body is judged to not perform face-to-face matching, wherein the acquired real-time face-to-face data is current face-to-face data; judging whether the current information transmission request main body has information transmission permission or not according to the current face data; if yes, generating a data output instruction according to the data play-out requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction; if not, generating a data non-transmissible prompt.
Specifically, a current data transmission request input by an information transmission request main body through a preset internet information input port is obtained, whether the information transmission request main body has information transmission qualification is judged according to the current data transmission request, and if yes, current data to be transmitted is obtained based on the current data transmission request; the method specifically comprises the following steps:
acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, and acquiring current input identity information input to the internet information input port by the information transmission request main body according to the current data transmission request; acquiring a current main body job level corresponding to the current input identity information according to the current input identity information; comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library; if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction; judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record; if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication; and acquiring the current data to be transmitted, which needs to be output by the information transmission request body, according to the current qualification indication and the current data transmission request.
Specifically, an internet-based information security data management system, the system comprising:
the transmission data acquisition module is used for acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has the information transmission qualification;
the similar data generation module is used for carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored;
the similarity data judging module is used for acquiring dissimilar data in the main content data if the current actual similar data is judged to be pre-stored known data, comparing the dissimilar data with preset standard secret data and generating an actual similarity value, and judging whether the actual similarity value is greater than or equal to the standard similarity;
And the transmission reminding indication module is used for acquiring the current face data of the information transmission request main body based on the preset internet information acquisition module if the actual similarity value is less than the standard similarity, judging whether the current face data accords with the data playing requirement or not according to the current face data, generating a data output instruction if the current face data accords with the data playing requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction.
Specifically, the similar data generation module is further configured to:
performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, and simultaneously extracting actual outer layer data according to the main content data, wherein the actual outer layer data is data which is set by the information transmission request main body; acquiring pre-stored standard outer layer specifications according to the actual outer layer data, and judging whether the actual outer layer data is matched with the standard outer layer specifications or not; if the actual outer layer data is not matched with the standard outer layer specification, generating a data suspicious indication, and sending the data suspicious indication to a preset data supervisor; if the actual outer layer data is judged to be matched with the standard outer layer specification, a current secret item is obtained, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located; acquiring corresponding current latest project data according to the current secret project; comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data; acquiring prestored known data; comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not
Specifically, the transmission reminding indication module is further used for:
if the actual similarity value is smaller than the standard similarity, acquiring initial face data of the information transmission request main body based on a preset internet information acquisition module; invoking pre-stored historical face data of the information transmission request main body based on the preset initial face data; comparing the pre-stored historical face data with the initial face data, and obtaining a face matching degree; judging whether the face matching degree is larger than or equal to the standard matching degree; if the face-to-face matching degree is smaller than the standard matching degree, judging that the information transmission request main body performs face-to-face matching, generating a face-to-face matching reminding, and continuously acquiring real-time face-to-face data until the information transmission request main body is judged to not perform face-to-face matching, wherein the acquired real-time face-to-face data is current face-to-face data; judging whether the current information transmission request main body has information transmission permission or not according to the current face data; if yes, generating a data output instruction according to the data play-out requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction;
Step S480: if not, generating a data non-transmissible prompt.
Specifically, the transmission data acquisition module is further configured to:
acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, and acquiring current input identity information input to the internet information input port by the information transmission request main body according to the current data transmission request; acquiring a current main body job level corresponding to the current input identity information according to the current input identity information; comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library; if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction; judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record; if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication; and acquiring the current data to be transmitted, which needs to be output by the information transmission request body, according to the current qualification indication and the current data transmission request.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the internet-based information security data management method described above when the processor executes the computer program.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the above-described internet-based information security data management method.
The invention has the following technical effects:
according to the information security data management method and system based on the Internet, the current data transmission request input by the information transmission request main body through the preset Internet information input port is sequentially acquired, whether the information transmission request main body has information transmission qualification or not is judged according to the current data transmission request, and if yes, the current data to be transmitted is acquired based on the current data transmission request; carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored; if the current actual similar data is judged to be pre-stored known data, non-similar data in the main content data are obtained, the non-similar data are compared with preset standard secret data, an actual similarity value is generated, and whether the actual similarity value is larger than or equal to the standard similarity is judged; if the actual similarity value is smaller than the standard similarity, acquiring current face data of the information transmission request main body based on a preset internet information acquisition module, judging whether the current face data meets the data playing requirement or not, if so, generating a data output instruction, and sending the current data transmission request to a preset data receiving port according to the data output instruction; in order to accurately judge whether the information transmission request main body has anxiety face or heart deficiency face caused by deficiency, the actual similarity value is smaller than the standard similarity through judgment, current face data of the information transmission request main body are collected based on a preset internet information collection module, whether the current face data meet data playing requirements or not is judged according to the current face data, if yes, a data output instruction is generated, the current data transmission request is sent to a preset data receiving port according to the data output instruction, and therefore information safety management and transmission management and control based on the internet are achieved, and safety and reliability of data management are improved.
Drawings
FIG. 1 is a flow diagram of an information security data management method based on Internet in one embodiment;
FIG. 2 is a block diagram of the architecture of an Internet-based information security data management system in one embodiment;
FIG. 3 is an internal block diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, the invention provides a data terminal, which is used for acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has information transmission qualification; carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored; if the current actual similar data is judged to be pre-stored known data, non-similar data in the main content data are obtained, the non-similar data are compared with preset standard secret data, an actual similarity value is generated, and whether the actual similarity value is larger than or equal to the standard similarity is judged; if the actual similarity value is smaller than the standard similarity, the current face data of the information transmission request main body is collected based on a preset internet information collection module, whether the data playing requirement is met or not is judged according to the current face data, if yes, a data output instruction is generated, and the current data transmission request is sent to a preset data receiving port according to the data output instruction.
The data terminal may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
In one embodiment, as shown in fig. 1, there is provided an information security data management method based on the internet, the method comprising:
step S100: acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has information transmission qualification;
step S200: carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored;
step S300: if the current actual similar data is judged to be pre-stored known data, non-similar data in the main content data are obtained, the non-similar data are compared with preset standard secret data, an actual similarity value is generated, and whether the actual similarity value is larger than or equal to the standard similarity is judged;
In this step, the dissimilar data is other data than the current actual similar data in the main content data.
Step S400: if the actual similarity value is smaller than the standard similarity, the current face data of the information transmission request main body is collected based on a preset internet information collection module, whether the data playing requirement is met or not is judged according to the current face data, if yes, a data output instruction is generated, and the current data transmission request is sent to a preset data receiving port according to the data output instruction.
In the present invention, the information transmission request body is a body that needs to output the data to be transmitted to the outside through the internet information input port, such as an engineer. The internet information input port is changed into an information security management medium through setting the internet information input port, an information management barrier is realized through setting the internet information input port, then whether the main body of the information transmission request can perform data transmission or not is judged to be qualified or not in order to accurately perform data transmission, so whether the main body of the information transmission request is qualified or not is judged according to the current data transmission request, if yes, the current data to be transmitted is acquired based on the current data transmission request, then in order to realize data refinement analysis, and comparison is performed between the current data transmission request and the currently performed data, and then whether the currently performed data needs to be said, so that the problem that the currently performed data possibly leaks is solved is judged, and therefore, whether the currently performed security item is pre-stored or not is judged by comparing the main body content data with the currently performed security item and generating current actual similarity data, then I judge whether the current actual similarity data is the pre-stored public data or not, if the dissimilarity value is also acquired, the actual similarity value is equal to the actually performed security data is greater than the actual similarity value, and the degree of similarity is equal to the actual similarity is generated, and the actual similarity is greater than the actual similarity is required to be compared, and the actual similarity is generated, and the problem that the currently performed data is possibly is revealed is possibly is solved by the data by the currently being acquired data of the currently being the data of the currently performed data, and acquiring the current face data of the information transmission request main body based on a preset internet information acquisition module, judging whether the current face data accords with the data playing requirement or not according to the current face data, if so, generating a data output instruction, and sending the current data transmission request to a preset data receiving port according to the data output instruction, so that information safety management and transmission management and control based on the internet are realized, and the safety and reliability of data management are improved.
In one embodiment, step S200: carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored; the method specifically comprises the following steps:
step S210: performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, and simultaneously extracting actual outer layer data according to the main content data, wherein the actual outer layer data is data which is set by the information transmission request main body;
step S220: acquiring pre-stored standard outer layer specifications according to the actual outer layer data, and judging whether the actual outer layer data is matched with the standard outer layer specifications or not;
step S230: if the actual outer layer data is not matched with the standard outer layer specification, generating a data suspicious indication, and sending the data suspicious indication to a preset data supervisor;
Step S240: if the actual outer layer data is judged to be matched with the standard outer layer specification, a current secret item is obtained, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located;
step S250: acquiring corresponding current latest project data according to the current secret project;
step S260: comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data;
step S270: acquiring prestored known data;
step S280: comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not.
In this embodiment, in order to accurately compare associated data in time, determine whether the data is associated with the recently performed project data, further perform data disassembly analysis on the current data to be transmitted, obtain main content data of the current data to be transmitted, and extract actual outer layer data according to the main content data, where the actual outer layer data is data set by the information transmission request main body; then, a pre-stored standard outer layer specification is obtained according to the actual outer layer data, and whether the actual outer layer data is matched with the standard outer layer specification or not is judged; the method comprises the steps that the actual outer layer data comprises, but is not limited to, file names, the standard outer layer specification is a standard naming format, screening of whether data can be transmitted or not is achieved in actual work through setting a fixed naming format, then if the actual outer layer data is not matched with the standard outer layer specification, a data suspicious indication is generated, and the data suspicious indication is sent to a preset data supervisor; then, if the actual outer layer data is judged to be matched with the standard outer layer specification, acquiring a current secret item, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located; then, obtaining corresponding current latest project data according to the current secret project; then, comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data; finally, pre-stored known data are obtained; comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not.
Further, the method includes the steps of disassembling according to a fixed format, for example, content searching is carried out according to preset keywords or key contents, main content data are obtained, then two secret items are obtained, the first item is the item where the current main body is located, the second item is the other item where the company is located, then comparison is carried out, similar data are obtained, the similar data can be output if the similar data are known data, and otherwise, the similar data cannot be output; on the other hand, by comparison, the method can avoid leakage data caused by untimely archiving of data in the method of not archiving the unfinished items in the prior art.
In one embodiment, step S400: if the actual similarity value is smaller than the standard similarity, acquiring current face data of the information transmission request main body based on a preset internet information acquisition module, judging whether the current face data meets the data playing requirement or not, if so, generating a data output instruction, and sending the current data transmission request to a preset data receiving port according to the data output instruction; the method specifically comprises the following steps:
step S410: if the actual similarity value is smaller than the standard similarity, acquiring initial face data of the information transmission request main body based on a preset internet information acquisition module;
Step S420: invoking pre-stored historical face data of the information transmission request main body based on the preset initial face data;
step S430: comparing the pre-stored historical face data with the initial face data, and obtaining a face matching degree;
step S440: judging whether the face matching degree is larger than or equal to the standard matching degree;
step S450: if the face-to-face matching degree is smaller than the standard matching degree, judging that the information transmission request main body performs face-to-face matching, generating a face-to-face matching reminding, and continuously acquiring real-time face-to-face data until the information transmission request main body is judged to not perform face-to-face matching, wherein the acquired real-time face-to-face data is current face-to-face data;
step S460: judging whether the current information transmission request main body has information transmission permission or not according to the current face data;
step S470: if yes, generating a data output instruction according to the data play-out requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction;
step S480: if not, generating a data non-transmissible prompt.
In this step, in order to further filter the authority of the person and determine whether the person has an abnormality in transmitting data, if the actual similarity value is less than the standard similarity, the initial face data of the information transmission request main body is collected based on a preset internet information collection module; then, calling pre-stored historical face data of the information transmission request main body based on the preset initial face data; then, comparing the pre-stored historical face data with the initial face data, and obtaining the face matching degree; then, judging whether the face matching degree is larger than or equal to the standard matching degree; if the face-to-face detection result is smaller than the standard matching degree, the fact that the face is blocked at the moment or the face is not completely collected due to other reasons is indicated, so that the face-to-face blocking is carried out by the information transmission request main body, a face-to-face blocking prompt is generated, and real-time face data are continuously acquired until the fact that the face-to-face blocking is not carried out by the information transmission request main body is judged, wherein the real-time face data acquired at the moment are current face data; then, judging whether the current information transmission request main body has information transmission permission according to the current face data; and if the data transmission request is judged to be in accordance with the data play request, generating a data output instruction, sending the current data transmission request to a preset data receiving port according to the data output instruction, and finally, if the data transmission request is not judged, generating a data non-transmissible prompt, and further carrying out accurate judgment by setting face data.
In one embodiment, step S100: acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has information transmission qualification; the method specifically comprises the following steps:
step S110: acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, and acquiring current input identity information input to the internet information input port by the information transmission request main body according to the current data transmission request;
step S120: acquiring a current main body job level corresponding to the current input identity information according to the current input identity information;
step S130: comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library;
step S140: if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction;
Step S150: judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record;
step S160: if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication;
step S170: and acquiring the current data to be transmitted, which needs to be output by the information transmission request body, according to the current qualification indication and the current data transmission request.
In this embodiment, the currently input identity information is information that can be input by a user, such as manually input or identity obtained after card identification, and at this time, the identity information is used as a first layer of identification and screening, which may be faked, so that face data is set in step S400, but in this step, in order to implement initial identity identification, judgment can be performed through the currently input identity information, and then, a current main body job level corresponding to the currently input identity information is obtained according to the currently input identity information; comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library; if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction; judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record; if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication; and finally, acquiring the current data to be transmitted which is required to be output by the information transmission request main body according to the current qualification indication and the current data transmission request, and acquiring the rating according to the request, wherein the rating level is enough, acquiring the historical transmission data, and if the transmission data has no bad record, acquiring the transmission qualification, so that the data acquisition is performed after the qualification judgment is realized, and the efficiency is improved.
In one embodiment, as shown in FIG. 2, an Internet-based information security data management system is provided, the system comprising:
the transmission data acquisition module is used for acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has the information transmission qualification;
the similar data generation module is used for carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored;
the similarity data judging module is used for acquiring dissimilar data in the main content data if the current actual similar data is judged to be pre-stored known data, comparing the dissimilar data with preset standard secret data and generating an actual similarity value, and judging whether the actual similarity value is greater than or equal to the standard similarity;
And the transmission reminding indication module is used for acquiring the current face data of the information transmission request main body based on the preset internet information acquisition module if the actual similarity value is less than the standard similarity, judging whether the current face data accords with the data playing requirement or not according to the current face data, generating a data output instruction if the current face data accords with the data playing requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction.
In one embodiment, the similarity data generation module is further configured to:
performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, and simultaneously extracting actual outer layer data according to the main content data, wherein the actual outer layer data is data which is set by the information transmission request main body; acquiring pre-stored standard outer layer specifications according to the actual outer layer data, and judging whether the actual outer layer data is matched with the standard outer layer specifications or not; if the actual outer layer data is not matched with the standard outer layer specification, generating a data suspicious indication, and sending the data suspicious indication to a preset data supervisor; if the actual outer layer data is judged to be matched with the standard outer layer specification, a current secret item is obtained, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located; acquiring corresponding current latest project data according to the current secret project; comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data; acquiring prestored known data; comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not
In one embodiment, the transmission alert indication module is further configured to:
if the actual similarity value is smaller than the standard similarity, acquiring initial face data of the information transmission request main body based on a preset internet information acquisition module; invoking pre-stored historical face data of the information transmission request main body based on the preset initial face data; comparing the pre-stored historical face data with the initial face data, and obtaining a face matching degree; judging whether the face matching degree is larger than or equal to the standard matching degree; if the face-to-face matching degree is smaller than the standard matching degree, judging that the information transmission request main body performs face-to-face matching, generating a face-to-face matching reminding, and continuously acquiring real-time face-to-face data until the information transmission request main body is judged to not perform face-to-face matching, wherein the acquired real-time face-to-face data is current face-to-face data; judging whether the current information transmission request main body has information transmission permission or not according to the current face data; if yes, generating a data output instruction according to the data play-out requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction;
Step S480: if not, generating a data non-transmissible prompt.
In one embodiment, the transmission data acquisition module is further configured to:
acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, and acquiring current input identity information input to the internet information input port by the information transmission request main body according to the current data transmission request; acquiring a current main body job level corresponding to the current input identity information according to the current input identity information; comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library; if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction; judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record; if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication; and acquiring the current data to be transmitted, which needs to be output by the information transmission request body, according to the current qualification indication and the current data transmission request.
In one embodiment, as shown in fig. 3, a computer device includes a memory storing a computer program and a processor implementing the steps of the internet-based information security data management method described above when the processor executes the computer program.
The processor, when executing the computer program, performs the steps of: acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has information transmission qualification; carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored; if the current actual similar data is judged to be pre-stored known data, non-similar data in the main content data are obtained, the non-similar data are compared with preset standard secret data, an actual similarity value is generated, and whether the actual similarity value is larger than or equal to the standard similarity is judged; if the actual similarity value is smaller than the standard similarity, the current face data of the information transmission request main body is collected based on a preset internet information collection module, whether the data playing requirement is met or not is judged according to the current face data, if yes, a data output instruction is generated, and the current data transmission request is sent to a preset data receiving port according to the data output instruction.
The processor, when executing the computer program, performs the steps of: performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, and simultaneously extracting actual outer layer data according to the main content data, wherein the actual outer layer data is data which is set by the information transmission request main body; acquiring pre-stored standard outer layer specifications according to the actual outer layer data, and judging whether the actual outer layer data is matched with the standard outer layer specifications or not; if the actual outer layer data is not matched with the standard outer layer specification, generating a data suspicious indication, and sending the data suspicious indication to a preset data supervisor; if the actual outer layer data is judged to be matched with the standard outer layer specification, a current secret item is obtained, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located; acquiring corresponding current latest project data according to the current secret project; comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data; acquiring prestored known data; comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not.
The processor, when executing the computer program, performs the steps of: acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, and acquiring current input identity information input to the internet information input port by the information transmission request main body according to the current data transmission request; acquiring a current main body job level corresponding to the current input identity information according to the current input identity information; comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library; if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction; judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record; if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication; and acquiring the current data to be transmitted, which needs to be output by the information transmission request body, according to the current qualification indication and the current data transmission request.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the above-described internet-based information security data management method.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. An internet-based information security data management method, the method comprising:
acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has information transmission qualification; carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored; if the current actual similar data is judged to be pre-stored known data, non-similar data in the main content data are obtained, the non-similar data are compared with preset standard secret data, an actual similarity value is generated, and whether the actual similarity value is larger than or equal to the standard similarity is judged; if the actual similarity value is smaller than the standard similarity, the current face data of the information transmission request main body is collected based on a preset internet information collection module, whether the data playing requirement is met or not is judged according to the current face data, if yes, a data output instruction is generated, and the current data transmission request is sent to a preset data receiving port according to the data output instruction.
2. The internet-based information security data management method according to claim 1, wherein the data disassembly analysis is performed on the current data to be transmitted, main content data of the current data to be transmitted is obtained, a current security item is obtained, the main content data is compared with the current security item, current actual similar data is generated, and whether the current actual similar data is pre-stored known data is judged; the method specifically comprises the following steps:
performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, and simultaneously extracting actual outer layer data according to the main content data, wherein the actual outer layer data is data which is set by the information transmission request main body; acquiring pre-stored standard outer layer specifications according to the actual outer layer data, and judging whether the actual outer layer data is matched with the standard outer layer specifications or not; if the actual outer layer data is not matched with the standard outer layer specification, generating a data suspicious indication, and sending the data suspicious indication to a preset data supervisor; if the actual outer layer data is judged to be matched with the standard outer layer specification, a current secret item is obtained, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located; acquiring corresponding current latest project data according to the current secret project; comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data; acquiring prestored known data; comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not.
3. The internet-based information security data management method according to claim 1, wherein if the actual similarity value is less than the standard similarity, the current face data of the information transmission request main body is collected based on a preset internet information collection module, whether the data playing requirement is met or not is judged according to the current face data, if yes, a data output instruction is generated, and the current data transmission request is sent to a preset data receiving port according to the data output instruction; the method specifically comprises the following steps:
if the actual similarity value is smaller than the standard similarity, acquiring initial face data of the information transmission request main body based on a preset internet information acquisition module; invoking pre-stored historical face data of the information transmission request main body based on the preset initial face data; comparing the pre-stored historical face data with the initial face data, and obtaining a face matching degree; judging whether the face matching degree is larger than or equal to the standard matching degree; if the face-to-face matching degree is smaller than the standard matching degree, judging that the information transmission request main body performs face-to-face matching, generating a face-to-face matching reminding, and continuously acquiring real-time face-to-face data until the information transmission request main body is judged to not perform face-to-face matching, wherein the acquired real-time face-to-face data is current face-to-face data; judging whether the current information transmission request main body has information transmission permission or not according to the current face data; if yes, generating a data output instruction according to the data play-out requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction; if not, generating a data non-transmissible prompt.
4. The internet-based information security data management method according to claim 1, wherein a current data transmission request input by an information transmission request main body through a preset internet information input port is obtained, whether the information transmission request main body has information transmission qualification is judged according to the current data transmission request, and if yes, current data to be transmitted is obtained based on the current data transmission request; the method specifically comprises the following steps:
acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, and acquiring current input identity information input to the internet information input port by the information transmission request main body according to the current data transmission request; acquiring a current main body job level corresponding to the current input identity information according to the current input identity information; comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library; if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction; judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record; if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication; and acquiring the current data to be transmitted, which needs to be output by the information transmission request body, according to the current qualification indication and the current data transmission request.
5. An internet-based information security data management system, the system comprising:
the transmission data acquisition module is used for acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, judging whether the information transmission request main body has information transmission qualification according to the current data transmission request, and acquiring current data to be transmitted based on the current data transmission request if the information transmission request main body has the information transmission qualification;
the similar data generation module is used for carrying out data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, acquiring a current security item, comparing the main content data with the current security item, generating current actual similar data, and judging whether the current actual similar data is pre-stored known data or not, wherein the pre-stored known data is pre-stored;
the similarity data judging module is used for acquiring dissimilar data in the main content data if the current actual similar data is judged to be pre-stored known data, comparing the dissimilar data with preset standard secret data and generating an actual similarity value, and judging whether the actual similarity value is greater than or equal to the standard similarity;
And the transmission reminding indication module is used for acquiring the current face data of the information transmission request main body based on the preset internet information acquisition module if the actual similarity value is less than the standard similarity, judging whether the current face data accords with the data playing requirement or not according to the current face data, generating a data output instruction if the current face data accords with the data playing requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction.
6. The internet-based information security data management system of claim 5, wherein the similar data generation module is further configured to:
performing data disassembly analysis on the current data to be transmitted, acquiring main content data of the current data to be transmitted, and simultaneously extracting actual outer layer data according to the main content data, wherein the actual outer layer data is data which is set by the information transmission request main body; acquiring pre-stored standard outer layer specifications according to the actual outer layer data, and judging whether the actual outer layer data is matched with the standard outer layer specifications or not; if the actual outer layer data is not matched with the standard outer layer specification, generating a data suspicious indication, and sending the data suspicious indication to a preset data supervisor; if the actual outer layer data is judged to be matched with the standard outer layer specification, a current secret item is obtained, wherein the current secret item is an ongoing item of a group where the information transmission request main body is located; acquiring corresponding current latest project data according to the current secret project; comparing the main content data with the current latest item data and generating current actual similar data, wherein the current actual similar data is data with similarity larger than a preset similarity value in the main content data and the current latest item data; acquiring prestored known data; comparing the pre-stored known data with the current actual similar data, and judging whether the current actual similar data is pre-stored known data or not.
7. The internet-based information security data management system of claim 6, wherein the transmission alert indication module is further configured to:
if the actual similarity value is smaller than the standard similarity, acquiring initial face data of the information transmission request main body based on a preset internet information acquisition module; invoking pre-stored historical face data of the information transmission request main body based on the preset initial face data; comparing the pre-stored historical face data with the initial face data, and obtaining a face matching degree; judging whether the face matching degree is larger than or equal to the standard matching degree; if the face-to-face matching degree is smaller than the standard matching degree, judging that the information transmission request main body performs face-to-face matching, generating a face-to-face matching reminding, and continuously acquiring real-time face-to-face data until the information transmission request main body is judged to not perform face-to-face matching, wherein the acquired real-time face-to-face data is current face-to-face data; judging whether the current information transmission request main body has information transmission permission or not according to the current face data; if yes, generating a data output instruction according to the data play-out requirement, and sending the current data transmission request to a preset data receiving port according to the data output instruction;
Step S480: if not, generating a data non-transmissible prompt.
8. The internet-based information security data management system of claim 6, wherein the transmission data acquisition module is further configured to:
acquiring a current data transmission request input by an information transmission request main body through a preset internet information input port, and acquiring current input identity information input to the internet information input port by the information transmission request main body according to the current data transmission request; acquiring a current main body job level corresponding to the current input identity information according to the current input identity information; comparing the current main body working order with each piece of standard order information in a pre-stored standard information matching library, and judging whether the current main body working order is pre-stored in the standard information matching library; if yes, acquiring a historical data transmission record of the information transmission request main body in a preset specific time period before the current moment; if not, generating a disqualification instruction; judging whether the historical data transmission record has a bad record or not, and generating a disqualification instruction if the historical data transmission record has the bad record; if no bad record exists, judging that the information transmission request main body has information transmission qualification, and generating a current qualification indication; and acquiring the current data to be transmitted, which needs to be output by the information transmission request body, according to the current qualification indication and the current data transmission request.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
CN202310137595.4A 2023-02-20 2023-02-20 Information security data management method and system based on Internet Pending CN116170206A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310137595.4A CN116170206A (en) 2023-02-20 2023-02-20 Information security data management method and system based on Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310137595.4A CN116170206A (en) 2023-02-20 2023-02-20 Information security data management method and system based on Internet

Publications (1)

Publication Number Publication Date
CN116170206A true CN116170206A (en) 2023-05-26

Family

ID=86414409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310137595.4A Pending CN116170206A (en) 2023-02-20 2023-02-20 Information security data management method and system based on Internet

Country Status (1)

Country Link
CN (1) CN116170206A (en)

Similar Documents

Publication Publication Date Title
EP3780541B1 (en) Identity information identification method and device
CN109189367B (en) Data processing method, device, server and storage medium
CN110362799B (en) On-line arbitration-based method and device for generating and processing resolution book and computer equipment
JP2020182214A (en) Verification system and method for cooperation of blockchain and off-chain device
CN109522328B (en) Data processing method and device, medium and terminal thereof
CN109710402A (en) Method, apparatus, computer equipment and the storage medium of process resource acquisition request
CN111415158B (en) Wind control method and system based on block chain
CN110795171B (en) Service data processing method, device, computer equipment and storage medium
WO2019148712A1 (en) Phishing website detection method, device, computer equipment and storage medium
CN109062965B (en) Big data analysis system, server, data processing method and storage medium
CN112559526A (en) Data table export method and device, computer equipment and storage medium
CN112395157A (en) Audit log obtaining method and device, computer equipment and storage medium
CN111124421B (en) Abnormal contract data detection method and device for blockchain intelligent contract
CN111858467B (en) File data processing method, device, equipment and medium based on artificial intelligence
CN114741384A (en) Patient information processing method and device and computer readable storage medium
CN116170206A (en) Information security data management method and system based on Internet
CN110781232A (en) Data processing method, data processing device, computer equipment and storage medium
CN115545815A (en) Network order sale management system and method
CN110460585B (en) Equipment identity identification method and device, computer equipment and storage medium
CN110969430B (en) Suspicious user identification method, suspicious user identification device, computer equipment and storage medium
CN112732937A (en) Hidden relation acquisition method, device, equipment and medium based on knowledge graph
CN110619275A (en) Information pushing method and device, computer equipment and storage medium
CN110909798A (en) Multi-algorithm intelligent studying and judging method, system and server
CN117493466B (en) Financial data synchronization method and system
CN112306551B (en) Historical configuration information acquisition method, system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication