CN116797267A - Distributed market data acquisition management system for equity investment - Google Patents

Distributed market data acquisition management system for equity investment Download PDF

Info

Publication number
CN116797267A
CN116797267A CN202311064685.1A CN202311064685A CN116797267A CN 116797267 A CN116797267 A CN 116797267A CN 202311064685 A CN202311064685 A CN 202311064685A CN 116797267 A CN116797267 A CN 116797267A
Authority
CN
China
Prior art keywords
value
unit
data
management
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311064685.1A
Other languages
Chinese (zh)
Other versions
CN116797267B (en
Inventor
冯欣楠
刘晓波
肖建刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deep Space Development Investment Holdings Hubei Co ltd
Original Assignee
Deep Space Development Investment Holdings Hubei Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deep Space Development Investment Holdings Hubei Co ltd filed Critical Deep Space Development Investment Holdings Hubei Co ltd
Priority to CN202311064685.1A priority Critical patent/CN116797267B/en
Publication of CN116797267A publication Critical patent/CN116797267A/en
Application granted granted Critical
Publication of CN116797267B publication Critical patent/CN116797267B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Abstract

The invention relates to the technical field of market data management, solves the problem of low storage, transmission and browsing safety after the acquisition of distributed market data for equity investment, in particular to a distributed market data acquisition management system for equity investment, which comprises a management end and an acquisition end, wherein a data acquisition unit is arranged in the acquisition end, and a management and control platform, a transmission supervision unit, a selection analysis unit, a security management unit and a visualization unit are arranged in the management end; according to the method, the collected target market information is analyzed from three angles of storage management, transmission management and browsing management, so that the safety of storage, transmission and browsing of the target market information is improved, important information leakage caused by cracking of data information in cloud storage is avoided, and the safety of enterprises on the management of the target market information is improved by monitoring and early warning analysis of authority data, and abnormal browsing information is stored, so that follow-up responsibility following and investigation are facilitated.

Description

Distributed market data acquisition management system for equity investment
Technical Field
The invention relates to the technical field of market data management, in particular to a distributed market data acquisition and management system for equity investment.
Background
At present, the large data is further developed towards mobility, the emerging contents such as social networks and the like are also continuously raised, people can conveniently acquire the wanted information, the generated data is geometrically increased along with the continuous development of demands and businesses, the large-scale data set has immeasurable value, and the relationship among the data plays an important role in the operation and decision of enterprises;
the distributed market of the equity investment refers to a market model constructed by using a distributed technology, wherein investors can perform investment activities and establish market decisions in a decentralizing mode so as to be applied to several stages of equity investment, namely an initial creation stage, a growth stage and an IPO stage; in the application of the distributed market of the equity investment, the data of the distributed market of the equity investment needs to be collected and managed so as to help investors to better make investment decisions;
the security problem of the distributed market is more and more challenged when the data of the distributed market is processed and stored, the stored data is easy to be stolen by others, so that the loss of a user is caused, but in the existing mode of collecting and managing the data of the distributed market of the equity investment, the data of the distributed market of the equity investment is difficult to be safely transmitted, stored and browsed in authority, so that key market data of enterprises or individuals are revealed, the storage security and privacy of the data are further reduced, and meanwhile, the data of the distributed market of the equity investment is disordered, and unnecessary loss is caused;
in view of the above technical drawbacks, a solution is now proposed.
Disclosure of Invention
The invention aims to provide a distributed market data acquisition management system for equity investment, which solves the technical defects, improves the safety of target market information storage by analyzing three angles of storage management, transmission management and browsing management of acquired target market information, can avoid important information leakage caused by cracking of data information in cloud storage, and solves the problem of low safety of distributed market data storage, transmission and browsing for equity investment, so as to improve the safety of target market information storage, and can also avoid important information leakage caused by cracking of data information in cloud storage.
The aim of the invention can be achieved by the following technical scheme: the distributed market data acquisition management system for the equity investment comprises a management end and an acquisition end, wherein a data acquisition unit is arranged in the acquisition end, and a management and control platform, a transmission supervision unit, a selection analysis unit, a security management unit and a visualization unit are arranged in the management end;
when the management terminal internal management and control platform generates a management and control instruction and sends the management and control instruction to the data acquisition unit in the acquisition terminal, the data acquisition unit immediately acquires a data acquisition plan of an enterprise after receiving the management and control instruction, and performs acquisition data analysis on the data acquisition plan to obtain target market information, and meanwhile, a supervision instruction is generated and sent to the transmission supervision unit, the selection analysis unit and the safety management unit through the management and control platform;
when receiving the supervision instruction, the selection analysis unit immediately collects state data of each storage server of the enterprise, wherein the state data comprises load values of hardware of each storage server and use time of each storage server, carries out safety supervision feedback analysis on the state data, and sends the number of the obtained target storage server to the transmission supervision unit and the visualization unit;
when receiving a supervision instruction, the transmission supervision unit immediately acquires environment data of a target storage server network node, wherein the environment data comprises a data loss risk value and a transmission speed in unit time, performs node environment safety evaluation analysis and formulation comparison analysis on the environment data, and sends the obtained ordered node transmission evaluation coefficient Ci to the visualization unit;
and when receiving the supervision instruction, the security management unit immediately acquires the authority data of the target storage server, wherein the authority data comprises enterprise employee numbers and real-time input passwords, performs supervision early warning analysis on the authority data, and sends the obtained browsing signals to the visualization unit.
Preferably, the analysis process of the collected data of the data collecting unit is as follows:
acquiring a data acquisition plan of an enterprise, extracting keywords from the data acquisition plan of the enterprise, acquiring target keywords, acquiring market data according to the target keywords, obtaining target market information, and generating a supervision instruction.
Preferably, the safety supervision feedback analysis process of the selection analysis unit is as follows:
s1: the method comprises the steps of collecting a market for a period of time before market information transmission, marking the market as a time threshold, obtaining load values of all storage server hardware in the time threshold, comparing the load values with stored preset load value thresholds, and marking the ratio between the part of the load value larger than the preset load value threshold and the preset load value threshold as a load multiplier value if the load value is larger than the preset load value threshold;
s12: acquiring the time length from the starting time of each storage server to the current time, marking the time length as the use time length, simultaneously acquiring the maintenance times of each storage server in the use time length, acquiring the average throughput of each storage server in the use time length, and marking the ratio obtained by carrying out data normalization processing on the maintenance times and the average throughput as a cloud kiss value;
s13: comparing the load multiplying power value with a cloud kissing value and comparing the load multiplying power value with a preset load multiplying power value threshold value and a preset cloud kissing value threshold value which are recorded and stored in the cloud kissing value:
if the load multiplier value is greater than or equal to a preset load multiplier value threshold or the cloud kiss value is greater than or equal to a preset cloud kiss value threshold, no signal is generated;
if the load multiplier value is smaller than a preset load multiplier value threshold and the cloud kiss value is smaller than a preset cloud kiss value threshold, generating a feedback instruction, when the feedback instruction is generated, constructing a set A of storage servers corresponding to the feedback instruction, acquiring a sum value obtained by carrying out data normalization processing on the load multiplier value and the cloud kiss value corresponding to the storage servers in the set A, marking the sum value as a preferred value, further acquiring a preferred value of a minimum value, and marking the storage server corresponding to the preferred value of the minimum value as a target storage server.
Preferably, the node environmental security assessment analysis process of the transmission supervision unit is as follows:
acquiring a storage network of a target storage server, setting i child nodes in the storage network, wherein i is a natural number larger than 1, acquiring a data loss risk value of each child node of the cloud storage device network in a time threshold, wherein the data loss risk value represents a value obtained by multiplying a product value obtained by carrying out data normalization processing on the data loss times of each child node and the vulnerability number in unit time in the time threshold and a network stability value, wherein the network stability value represents a ratio of the frequency of network attack and the successful defending frequency in unit time of each child node in the time threshold, and marking the data loss risk value as SDi;
dividing a time threshold into k subtime periods, wherein k is a natural number larger than zero, acquiring the transmission speed of each subnode in each subtime period in unit time, establishing a rectangular coordinate system by taking time as an X axis and the transmission speed of unit time as a Y axis, drawing a transmission speed curve of unit time in a dot drawing mode, acquiring a maximum peak value and a minimum trough value from the transmission speed curve of unit time, and marking the difference value between the maximum peak value and the minimum trough value as a transmission unbalance value CSI.
Preferably, the formulation comparison analysis process of the transmission supervision unit is as follows:
according to the formulaObtaining node transmission evaluation coefficients of all nodes, wherein f1 and f2 are respectively preset scale factor coefficients of a data loss risk value and a transmission unbalance value, f3 is a preset compensation factor coefficient, f1, f2 and f3 are respectively positive numbers larger than zero, ci is the node transmission evaluation coefficient of all the nodes, and the node transmission evaluation coefficients Ci are sequenced from small to large;
the visualization unit immediately displays the child node names corresponding to the ordered node transmission evaluation coefficients Ci after receiving the ordered node transmission evaluation coefficients Ci, acquires the first child node name after ordering, marks the first child node name as a storage transmission node, and further sends the target market information to a target storage server for storage through the storage transmission node.
Preferably, the supervision and early warning analysis process of the safety management unit is as follows:
acquiring the registration account number and the real-time input password of a browser in a time threshold, extracting the number, the letter and the symbol characteristics of the registration account number and the real-time input password, marking the character string composed of the extracted number, letter and symbol as a first identification sequence, simultaneously acquiring the total number of the first identification sequence, marking the total number of the first identification sequence as a verification number, simultaneously comparing the verification number with a preset verification number threshold value, generating a comparison instruction if the verification number is equal to the preset verification number threshold value, and comparing the first identification sequence with the preset first identification sequence recorded and stored in the first identification sequence when the comparison instruction is generated:
if the first identification sequence is the same as the preset first identification sequence, a browsing signal is generated and sent to a visualization unit, and the visualization unit immediately displays the browsing signal in a word authorization mode after receiving the browsing signal;
if the first recognition sequence is different from the preset first recognition sequence, generating a risk signal, when the risk signal is generated, immediately acquiring facial feature images of a viewer in a time threshold through a monitoring facility, acquiring a facial feature image, simultaneously acquiring an authorized facial feature image list, and comparing and analyzing the facial feature images with the facial feature image list:
if the facial feature image belongs to the facial feature image list, generating a secondary verification instruction, and when the secondary verification instruction is generated, immediately popping up a permission verification page to carry out re-verification;
if the facial feature image does not belong to the facial feature image list, generating an early warning instruction, and immediately exiting the permission verification page when the early warning instruction is generated.
The beneficial effects of the invention are as follows:
(1) According to the method, the collected target market information is analyzed from three angles of storage management, transmission management and browsing management, so that the safety of target market information storage is improved, important information leakage caused by cracking of data information in cloud storage can be avoided, namely, the safety of market information storage is guaranteed through safety supervision feedback analysis on state data of each storage server, the situation of data loss and damage is avoided, and through node environment safety assessment analysis on environment data, reasonable storage and protection management are conducted, reasonable selection of transmission nodes is facilitated, safety and stability in the target market information transmission process are guaranteed, and effectiveness and safety of target market information are guaranteed;
(2) According to the invention, the authority data is subjected to supervision early warning analysis, so that the safety of the target storage server in storing the target market information is ensured, the information leakage of the target market information is avoided, meanwhile, a browser is reminded to browse the target market information, the safety of enterprises in managing the target market information is improved, and the information with abnormal browsing is stored, so that follow-up responsibility is facilitated and investigation is facilitated.
Drawings
The invention is further described below with reference to the accompanying drawings;
FIG. 1 is a flow chart of the system of the present invention;
FIG. 2 is a partial analysis of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
Referring to fig. 1 to 2, the invention discloses a distributed market data acquisition management system for equity investment, which comprises a management end and an acquisition end, wherein a data acquisition unit is arranged in the acquisition end, a management and control platform, a transmission supervision unit, a selection analysis unit, a safety management unit and a visualization unit are arranged in the management end, the management and control platform is in unidirectional communication connection with the transmission supervision unit, the selection analysis unit and the safety management unit, the selection analysis unit is in unidirectional communication connection with the transmission supervision unit, and the transmission supervision unit, the selection analysis unit and the safety management unit are in unidirectional communication connection with the visualization unit;
when the management terminal internal management and control platform generates a management and control instruction and sends the management and control instruction to the data acquisition unit in the acquisition terminal, the data acquisition unit immediately acquires a data acquisition plan of an enterprise after receiving the management and control instruction, and performs acquisition data analysis on the data acquisition plan, wherein the specific acquisition data analysis process is as follows:
acquiring a data acquisition plan of an enterprise, extracting keywords from the data acquisition plan of the enterprise, acquiring target keywords, acquiring market data according to the target keywords, obtaining target market information, generating a supervision instruction at the same time, and sending the supervision instruction to a transmission supervision unit, a selection analysis unit and a safety management unit through a management and control platform;
when receiving the supervision instruction, the selection analysis unit immediately collects state data of each storage server of the enterprise, wherein the state data comprises load values of hardware of each storage server and use time length of each storage server, and performs safety supervision feedback analysis on the state data to ensure the safety of market information storage, and the specific safety supervision feedback analysis process is as follows:
the method comprises the steps of collecting a market for a period of time before market information transmission, marking the market as a time threshold, obtaining load values of all storage server hardware in the time threshold, comparing the load values with stored preset load value thresholds, and if the load values are larger than the preset load value thresholds, marking the ratio between the part of the load values larger than the preset load value thresholds and the preset load value thresholds as a load multiplier value, wherein the smaller the value of the load multiplier value is, the smaller the abnormal risk of storage of target market information is;
acquiring the duration from the starting time to the current time of each storage server, marking the duration as the use duration, simultaneously acquiring the maintenance times of each storage server in the use duration, acquiring the average throughput of each storage server in the use duration, and marking the ratio obtained by normalizing the maintenance times and the average throughput as a cloud kiss value, wherein the larger the value of the cloud kiss value is, the larger the abnormal risk of storage of target market information is;
comparing the load multiplying power value with a cloud kissing value and comparing the load multiplying power value with a preset load multiplying power value threshold value and a preset cloud kissing value threshold value which are recorded and stored in the cloud kissing value:
if the load multiplier value is greater than or equal to a preset load multiplier value threshold or the cloud kiss value is greater than or equal to a preset cloud kiss value threshold, no signal is generated;
if the load multiplier value is smaller than a preset load multiplier value threshold and the cloud kiss value is smaller than a preset cloud kiss value threshold, generating a feedback instruction, when the feedback instruction is generated, constructing a set A of storage servers corresponding to the feedback instruction, acquiring a sum value obtained by carrying out data normalization processing on the load multiplier value and the cloud kiss value corresponding to the storage servers in the set A, marking the sum value as a preferred value, further acquiring a preferred value of a minimum value, marking the storage server corresponding to the preferred value of the minimum value as a target storage server, transmitting the number of the target storage server to a transmission monitoring unit and a visualization unit, and immediately displaying the number of the target storage server in a text mode after receiving the number of the target storage server by the visualization unit, thereby facilitating an operator to store target market information;
when receiving a supervision instruction, the transmission supervision unit immediately acquires environment data of a network node of the target storage server, wherein the environment data comprises a data loss risk value and a transmission speed in unit time, and performs node environment safety assessment analysis on the environment data so as to perform reasonable storage and protection management, and meanwhile, the transmission node is convenient to reasonably select, and the specific node environment safety assessment analysis process is as follows:
obtaining a storage network of a target storage server, setting i child nodes in the storage network, wherein i is a natural number larger than 1, obtaining a data loss risk value of each child node of the cloud storage device network in a time threshold, wherein the data loss risk value represents a value obtained by multiplying a product value obtained by carrying out data normalization processing on the data loss times of each child node and the vulnerability number in unit time in the time threshold and a network stability value, the network stability value represents a ratio of the frequency of network attack and the successful defending frequency in unit time of each child node in the time threshold, and the data loss risk value is marked as SDi;
dividing a time threshold into k subtime periods, wherein k is a natural number larger than zero, acquiring the transmission speed of each subnode in each subtime period, establishing a rectangular coordinate system by taking time as an X axis and the transmission speed of each subnode in each subtime period as a Y axis, drawing a transmission speed curve in unit time in a dot drawing mode, acquiring a maximum peak value and a minimum trough value from the transmission speed curve in unit time, and marking the difference value between the maximum peak value and the minimum trough value as a transmission unbalance value, wherein the mark is CSI; it should be noted that, the larger the value of the transmission unbalance value CSi is, the larger the risk of the node is, and the larger the influence on the transmission stability of the target market information is;
according to the formulaObtaining node transmission evaluation coefficients of all nodes, wherein f1 and f2 are respectively preset scale factor coefficients of a data loss risk value and a transmission unbalance value, the scale factor coefficients are used for correcting deviation of all parameters in a formula calculation process, so that a calculation result is more accurate, f3 is a preset compensation factor coefficient, f1, f2 and f3 are respectively positive numbers larger than zero, ci is a node transmission evaluation coefficient of all the nodes, the node transmission evaluation coefficients Ci are ordered in order from small to large, the ordered node transmission evaluation coefficients Ci are sent to a visualization unit, the visualization unit immediately displays a sub-node name corresponding to the ordered node transmission evaluation coefficient Ci after receiving the ordered node transmission evaluation coefficient Ci, and acquires a first sub-node after orderedThe node names are marked as storage transmission nodes, and then the target market information is sent to a target storage server for storage through the storage transmission nodes, so that the safety and stability of the target market information transmission are guaranteed, and the effectiveness and safety of the target market information are guaranteed.
Example 2
When receiving the supervision instruction, the security management unit immediately acquires the authority data of the target storage server, wherein the authority data comprises enterprise employee numbers and real-time input passwords, and performs supervision early warning analysis on the authority data so as to ensure the security of the target storage server on the storage of the target market information, and the specific supervision early warning analysis process is as follows:
acquiring the registration account number and the real-time input password of a browser in a time threshold, extracting the number, the letter and the symbol characteristics of the registration account number and the real-time input password, marking the character string composed of the extracted number, letter and symbol as a first identification sequence, simultaneously acquiring the total number of the first identification sequence, marking the total number of the first identification sequence as a verification number, simultaneously comparing the verification number with a preset verification number threshold value, generating a comparison instruction if the verification number is equal to the preset verification number threshold value, and comparing the first identification sequence with the preset first identification sequence recorded and stored in the first identification sequence when the comparison instruction is generated:
if the first identification sequence is the same as the preset first identification sequence, a browsing signal is generated and sent to a visualization unit, and the visualization unit immediately displays the browsing signal in a text authorization mode after receiving the browsing signal, so that a browser is reminded to browse and analyze target market information, and the safety of enterprises on target market information management is improved;
if the first recognition sequence is different from the preset first recognition sequence, generating a risk signal, when the risk signal is generated, immediately acquiring facial feature images of a viewer in a time threshold through a monitoring facility, acquiring a facial feature image, simultaneously acquiring an authorized facial feature image list, and comparing and analyzing the facial feature images with the facial feature image list:
if the facial feature image belongs to the facial feature image list, generating a secondary verification instruction, and when the secondary verification instruction is generated, immediately popping up a permission verification page to carry out re-verification so as to ensure the privacy of target market information and avoid information leakage;
if the facial feature image does not belong to the facial feature image list, an early warning instruction is generated, and when the early warning instruction is generated, an authority verification page is immediately pushed out so as to avoid information leakage of target market information, and meanwhile, the facial feature image is stored so as to facilitate follow-up responsibility and investigation.
In summary, the method and the system analyze the collected target market information from three angles of storage management, transmission management and browsing management, so that the safety of target market information storage is improved, meanwhile, important information leakage caused by cracking of data information in cloud storage can be avoided, namely, safety supervision feedback analysis is carried out on state data of each storage server to ensure the safety of market information storage, the situation of data loss and damage is avoided, node environment safety evaluation analysis is carried out on environment data so as to carry out reasonable storage and protection management, reasonable selection on transmission nodes is facilitated, safety and stability in the transmission process of the target market information are guaranteed, effectiveness and safety of the target market information are guaranteed, and supervision and early warning analysis on authority data are facilitated, so that the safety of target market information storage by a target storage server is guaranteed, information leakage of the target market information is avoided, a browser is reminded of carrying out information on the target market information, the safety of the target market information management is improved, abnormal information is stored, and follow-up browsing is facilitated.
The size of the threshold is set for ease of comparison, and regarding the size of the threshold, the number of cardinalities is set for each set of sample data depending on how many sample data are and the person skilled in the art; as long as the proportional relation between the parameter and the quantized value is not affected.
The above formulas are all formulas obtained by collecting a large amount of data for software simulation and selecting a formula close to the true value, and coefficients in the formulas are set by a person skilled in the art according to practical situations, and the above is only a preferred embodiment of the present invention, but the protection scope of the present invention is not limited thereto, and any person skilled in the art is within the technical scope of the present invention, and the technical scheme and the inventive concept according to the present invention are equivalent to or changed and are all covered in the protection scope of the present invention.

Claims (6)

1. The distributed market data acquisition management system for the equity investment is characterized by comprising a management end and an acquisition end, wherein a data acquisition unit is arranged in the acquisition end, and a management and control platform, a transmission supervision unit, a selection analysis unit, a security management unit and a visualization unit are arranged in the management end;
when the management terminal internal management and control platform generates a management and control instruction and sends the management and control instruction to the data acquisition unit in the acquisition terminal, the data acquisition unit immediately acquires a data acquisition plan of an enterprise after receiving the management and control instruction, and performs acquisition data analysis on the data acquisition plan to obtain target market information, and meanwhile, a supervision instruction is generated and sent to the transmission supervision unit, the selection analysis unit and the safety management unit through the management and control platform;
when receiving the supervision instruction, the selection analysis unit immediately collects state data of each storage server of the enterprise, wherein the state data comprises load values of hardware of each storage server and use time of each storage server, carries out safety supervision feedback analysis on the state data, and sends the number of the obtained target storage server to the transmission supervision unit and the visualization unit;
when receiving a supervision instruction, the transmission supervision unit immediately acquires environment data of a target storage server network node, wherein the environment data comprises a data loss risk value and a transmission speed in unit time, performs node environment safety evaluation analysis and formulation comparison analysis on the environment data, and sends the obtained ordered node transmission evaluation coefficient Ci to the visualization unit;
and when receiving the supervision instruction, the security management unit immediately acquires the authority data of the target storage server, wherein the authority data comprises enterprise employee numbers and real-time input passwords, performs supervision early warning analysis on the authority data, and sends the obtained browsing signals to the visualization unit.
2. The distributed market data collection management system for equity investment according to claim 1, wherein the collected data analysis process of the data collection unit is as follows:
acquiring a data acquisition plan of an enterprise, extracting keywords from the data acquisition plan of the enterprise, acquiring target keywords, acquiring market data according to the target keywords, obtaining target market information, and generating a supervision instruction.
3. The distributed market data collection management system for equity investment according to claim 1, wherein the security supervision feedback analysis process of the selection analysis unit is as follows:
s1: the method comprises the steps of collecting a market for a period of time before market information transmission, marking the market as a time threshold, obtaining load values of all storage server hardware in the time threshold, comparing the load values with stored preset load value thresholds, and marking the ratio between the part of the load value larger than the preset load value threshold and the preset load value threshold as a load multiplier value if the load value is larger than the preset load value threshold;
s12: acquiring the time length from the starting time of each storage server to the current time, marking the time length as the use time length, simultaneously acquiring the maintenance times of each storage server in the use time length, acquiring the average throughput of each storage server in the use time length, and marking the ratio obtained by carrying out data normalization processing on the maintenance times and the average throughput as a cloud kiss value;
s13: comparing the load multiplying power value with a cloud kissing value and comparing the load multiplying power value with a preset load multiplying power value threshold value and a preset cloud kissing value threshold value which are recorded and stored in the cloud kissing value:
if the load multiplier value is greater than or equal to a preset load multiplier value threshold or the cloud kiss value is greater than or equal to a preset cloud kiss value threshold, no signal is generated;
if the load multiplier value is smaller than a preset load multiplier value threshold and the cloud kiss value is smaller than a preset cloud kiss value threshold, generating a feedback instruction, when the feedback instruction is generated, constructing a set A of storage servers corresponding to the feedback instruction, acquiring a sum value obtained by carrying out data normalization processing on the load multiplier value and the cloud kiss value corresponding to the storage servers in the set A, marking the sum value as a preferred value, further acquiring a preferred value of a minimum value, and marking the storage server corresponding to the preferred value of the minimum value as a target storage server.
4. The distributed market data collection management system for equity investment according to claim 1, wherein the node environmental security assessment analysis process of the transmission supervision unit is as follows:
acquiring a storage network of a target storage server, setting i child nodes in the storage network, wherein i is a natural number larger than 1, acquiring a data loss risk value of each child node of the cloud storage device network in a time threshold, wherein the data loss risk value represents a value obtained by multiplying a product value obtained by carrying out data normalization processing on the data loss times of each child node and the vulnerability number in unit time in the time threshold and a network stability value, wherein the network stability value represents a ratio of the frequency of network attack and the successful defending frequency in unit time of each child node in the time threshold, and marking the data loss risk value as SDi;
dividing a time threshold into k subtime periods, wherein k is a natural number larger than zero, acquiring the transmission speed of each subnode in each subtime period in unit time, establishing a rectangular coordinate system by taking time as an X axis and the transmission speed of unit time as a Y axis, drawing a transmission speed curve of unit time in a dot drawing mode, acquiring a maximum peak value and a minimum trough value from the transmission speed curve of unit time, and marking the difference value between the maximum peak value and the minimum trough value as a transmission unbalance value CSI.
5. The distributed market data collection management system for equity investment according to claim 4, wherein the formulation comparison analysis process of the transmission supervision unit is as follows:
according to the formulaObtaining node transmission evaluation coefficients of all nodes, wherein f1 and f2 are respectively preset scale factor coefficients of a data loss risk value and a transmission unbalance value, f3 is a preset compensation factor coefficient, f1, f2 and f3 are respectively positive numbers larger than zero, ci is the node transmission evaluation coefficient of all the nodes, and the node transmission evaluation coefficients Ci are sequenced from small to large;
the visualization unit immediately displays the child node names corresponding to the ordered node transmission evaluation coefficients Ci after receiving the ordered node transmission evaluation coefficients Ci, acquires the first child node name after ordering, marks the first child node name as a storage transmission node, and further sends the target market information to a target storage server for storage through the storage transmission node.
6. The distributed market data collection management system for equity investment according to claim 1, wherein the supervision and early warning analysis process of the security management unit is as follows:
acquiring the registration account number and the real-time input password of a browser in a time threshold, extracting the number, the letter and the symbol characteristics of the registration account number and the real-time input password, marking the character string composed of the extracted number, letter and symbol as a first identification sequence, simultaneously acquiring the total number of the first identification sequence, marking the total number of the first identification sequence as a verification number, simultaneously comparing the verification number with a preset verification number threshold value, generating a comparison instruction if the verification number is equal to the preset verification number threshold value, and comparing the first identification sequence with the preset first identification sequence recorded and stored in the first identification sequence when the comparison instruction is generated:
if the first identification sequence is the same as the preset first identification sequence, a browsing signal is generated and sent to a visualization unit, and the visualization unit immediately displays the browsing signal in a word authorization mode after receiving the browsing signal;
if the first recognition sequence is different from the preset first recognition sequence, generating a risk signal, when the risk signal is generated, immediately acquiring facial feature images of a viewer in a time threshold through a monitoring facility, acquiring a facial feature image, simultaneously acquiring an authorized facial feature image list, and comparing and analyzing the facial feature images with the facial feature image list:
if the facial feature image belongs to the facial feature image list, generating a secondary verification instruction, and when the secondary verification instruction is generated, immediately popping up a permission verification page to carry out re-verification;
if the facial feature image does not belong to the facial feature image list, generating an early warning instruction, and immediately exiting the permission verification page when the early warning instruction is generated.
CN202311064685.1A 2023-08-23 2023-08-23 Distributed market data acquisition management system for equity investment Active CN116797267B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311064685.1A CN116797267B (en) 2023-08-23 2023-08-23 Distributed market data acquisition management system for equity investment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311064685.1A CN116797267B (en) 2023-08-23 2023-08-23 Distributed market data acquisition management system for equity investment

Publications (2)

Publication Number Publication Date
CN116797267A true CN116797267A (en) 2023-09-22
CN116797267B CN116797267B (en) 2023-11-24

Family

ID=88048374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311064685.1A Active CN116797267B (en) 2023-08-23 2023-08-23 Distributed market data acquisition management system for equity investment

Country Status (1)

Country Link
CN (1) CN116797267B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117097569A (en) * 2023-10-19 2023-11-21 南京怡晟安全技术研究院有限公司 Network security situation diagnosis method and system based on multi-node relevance
CN117198488A (en) * 2023-11-08 2023-12-08 天津中医药大学第一附属医院 Acupuncture instrument service efficiency evaluation system based on Internet of things
CN117272386A (en) * 2023-10-10 2023-12-22 广州工程技术职业学院 Internet big data information security encryption method, device, equipment and system

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150293896A1 (en) * 2014-04-09 2015-10-15 Bitspray Corporation Secure storage and accelerated transmission of information over communication networks
CA2887428A1 (en) * 2014-12-01 2016-06-01 Tata Consultancy Services Limited A computer implemented system and method for secure path selection using network rating
CN107172615A (en) * 2017-07-25 2017-09-15 中国信息安全测评中心 A kind of data transmission method of network node, device, network node and system
US20180020018A1 (en) * 2016-07-14 2018-01-18 L3 Technologies, Inc. Method and tool to quantify the enterprise consequences of cyber risk
US20190036648A1 (en) * 2014-05-13 2019-01-31 Datomia Research Labs Ou Distributed secure data storage and transmission of streaming media content
US20190182115A1 (en) * 2017-11-02 2019-06-13 Datomia Research Labs Ou Optimization of distributed data storage systems
US10659462B1 (en) * 2019-09-24 2020-05-19 Pribit Technology, Inc. Secure data transmission using a controlled node flow
CN111680319A (en) * 2020-04-28 2020-09-18 无锡中金鼎讯信通科技股份有限公司 Distributed equipment information acquisition system and method
CN112866349A (en) * 2020-12-31 2021-05-28 江苏徐工信息技术股份有限公司 Industrial big data transmission system and method based on ultra-wideband technology
CN112910728A (en) * 2021-01-22 2021-06-04 苏州浪潮智能科技有限公司 Data security monitoring method and device
CN114444096A (en) * 2022-01-06 2022-05-06 杭州京胜航星科技有限公司 Network data storage encryption detection system based on data analysis
CN114785580A (en) * 2022-04-14 2022-07-22 李林骏 Cloud computing data security processing system
CN115733681A (en) * 2022-11-14 2023-03-03 贵州商学院 Data security management platform for preventing data loss
CN116017469A (en) * 2023-01-08 2023-04-25 北京工业大学 Trust evaluation method suitable for wireless sensor network
CN116049859A (en) * 2023-02-27 2023-05-02 河南金盾信安检测评估中心有限公司 Data security management method, system, terminal equipment and storage medium
CN116228174A (en) * 2023-05-09 2023-06-06 北京惠朗时代科技有限公司 Management method of printing control instrument with intelligent recognition function
CN116248406A (en) * 2023-03-08 2023-06-09 深圳市亿特宝科技有限公司 Information security storage method and information security device thereof
CN116346637A (en) * 2023-02-28 2023-06-27 深圳市中创电测技术有限公司 Network node evaluation system based on power grid information parameter analysis
CN116389135A (en) * 2023-04-17 2023-07-04 东南大学 Network security monitoring system for computer communication
CN116633816A (en) * 2023-05-30 2023-08-22 合肥正非数字科技有限公司 Media display terminal safety supervision early warning system based on enterprise digitization

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150293896A1 (en) * 2014-04-09 2015-10-15 Bitspray Corporation Secure storage and accelerated transmission of information over communication networks
US20190036648A1 (en) * 2014-05-13 2019-01-31 Datomia Research Labs Ou Distributed secure data storage and transmission of streaming media content
CA2887428A1 (en) * 2014-12-01 2016-06-01 Tata Consultancy Services Limited A computer implemented system and method for secure path selection using network rating
CN105991617A (en) * 2014-12-01 2016-10-05 塔塔咨询服务有限公司 Computer implemented system and method for secure path selection using network rating
US20180020018A1 (en) * 2016-07-14 2018-01-18 L3 Technologies, Inc. Method and tool to quantify the enterprise consequences of cyber risk
CN107172615A (en) * 2017-07-25 2017-09-15 中国信息安全测评中心 A kind of data transmission method of network node, device, network node and system
US20190182115A1 (en) * 2017-11-02 2019-06-13 Datomia Research Labs Ou Optimization of distributed data storage systems
US10659462B1 (en) * 2019-09-24 2020-05-19 Pribit Technology, Inc. Secure data transmission using a controlled node flow
CN111680319A (en) * 2020-04-28 2020-09-18 无锡中金鼎讯信通科技股份有限公司 Distributed equipment information acquisition system and method
CN112866349A (en) * 2020-12-31 2021-05-28 江苏徐工信息技术股份有限公司 Industrial big data transmission system and method based on ultra-wideband technology
CN112910728A (en) * 2021-01-22 2021-06-04 苏州浪潮智能科技有限公司 Data security monitoring method and device
CN114444096A (en) * 2022-01-06 2022-05-06 杭州京胜航星科技有限公司 Network data storage encryption detection system based on data analysis
CN114785580A (en) * 2022-04-14 2022-07-22 李林骏 Cloud computing data security processing system
CN115733681A (en) * 2022-11-14 2023-03-03 贵州商学院 Data security management platform for preventing data loss
CN116017469A (en) * 2023-01-08 2023-04-25 北京工业大学 Trust evaluation method suitable for wireless sensor network
CN116049859A (en) * 2023-02-27 2023-05-02 河南金盾信安检测评估中心有限公司 Data security management method, system, terminal equipment and storage medium
CN116346637A (en) * 2023-02-28 2023-06-27 深圳市中创电测技术有限公司 Network node evaluation system based on power grid information parameter analysis
CN116248406A (en) * 2023-03-08 2023-06-09 深圳市亿特宝科技有限公司 Information security storage method and information security device thereof
CN116389135A (en) * 2023-04-17 2023-07-04 东南大学 Network security monitoring system for computer communication
CN116228174A (en) * 2023-05-09 2023-06-06 北京惠朗时代科技有限公司 Management method of printing control instrument with intelligent recognition function
CN116633816A (en) * 2023-05-30 2023-08-22 合肥正非数字科技有限公司 Media display terminal safety supervision early warning system based on enterprise digitization

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
戴亚盛;游真旭;朱友康;杨晓慧;: "无线Mesh网络协同节点信誉评价建模", 软件导刊, no. 04 *
韩美芳;: "云计算下敏感数据安全传输可靠性评估仿真", 计算机仿真, no. 09 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272386A (en) * 2023-10-10 2023-12-22 广州工程技术职业学院 Internet big data information security encryption method, device, equipment and system
CN117272386B (en) * 2023-10-10 2024-02-27 广州工程技术职业学院 Internet big data information security encryption method, device, equipment and system
CN117097569A (en) * 2023-10-19 2023-11-21 南京怡晟安全技术研究院有限公司 Network security situation diagnosis method and system based on multi-node relevance
CN117097569B (en) * 2023-10-19 2023-12-19 南京怡晟安全技术研究院有限公司 Network security situation diagnosis method and system based on multi-node relevance
CN117198488A (en) * 2023-11-08 2023-12-08 天津中医药大学第一附属医院 Acupuncture instrument service efficiency evaluation system based on Internet of things
CN117198488B (en) * 2023-11-08 2024-01-26 天津中医药大学第一附属医院 Acupuncture instrument service efficiency evaluation system based on Internet of things

Also Published As

Publication number Publication date
CN116797267B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
CN116797267B (en) Distributed market data acquisition management system for equity investment
CN110222525B (en) Database operation auditing method and device, electronic equipment and storage medium
CN101616101B (en) Method and device for filtering user information
CN110781930A (en) User portrait grouping and behavior analysis method and system based on log data of network security equipment
CN106101116A9 (en) A kind of user behavior abnormality detection system and method based on principal component analysiss
CN116934285B (en) Visual intelligent system and equipment for realizing digitization and entity file management
CN110677430B (en) User risk degree evaluation method and system based on log data of network security equipment
CN112367273B (en) Flow classification method and device of deep neural network model based on knowledge distillation
CN116366374B (en) Security assessment method, system and medium for power grid network management based on big data
CN110727957A (en) Differential privacy protection method and system based on sampling
CN110933115A (en) Analysis object behavior abnormity detection method and device based on dynamic session
CN116865952B (en) Encryption management method and system for data
CN110753081B (en) Public security big data intelligent acquisition and analysis method and device
CN116956083A (en) Data processing method and device
CN116896452B (en) Computer network information security management method and system based on data processing
CN117254983A (en) Method, device, equipment and storage medium for detecting fraud-related websites
CN116644825A (en) Big data-based outpatient information inquiry reservation management system
CN115174205B (en) Network space safety real-time monitoring method, system and computer storage medium
CN115470361A (en) Data detection method and device
CN108427744A (en) A kind of intelligent data incidence relation based on information O&M determines method
CN115329378A (en) Unmanned aerial vehicle air patrol platform with encryption function
CN116192943B (en) Message pushing method and system based on user grid division
CN115877802B (en) Production process data acquisition and monitoring method and system
CN116431319B (en) Task processing method and device
CN112565200B (en) Industrial control network misuse intrusion detection early warning system based on edge intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 430000 Leke Workshop Incubator, Building 1, Lianchuang Technology Center, No. 55 Haitang Road, Wuhan Economic and Technological Development Zone, Hubei Province (Ji LKGC-B621)

Applicant after: Deep Space Development Investment Holdings (Hubei) Co.,Ltd.

Address before: No. 724 Luoyu Road, Hongshan District, Wuhan City, Hubei Province 430000, West 5-02, Annex 2

Applicant before: Deep Space Development Investment Holdings (Hubei) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant