CN117081856B - Intelligent space analysis platform and early warning method based on cloud computing - Google Patents

Intelligent space analysis platform and early warning method based on cloud computing Download PDF

Info

Publication number
CN117081856B
CN117081856B CN202311327296.3A CN202311327296A CN117081856B CN 117081856 B CN117081856 B CN 117081856B CN 202311327296 A CN202311327296 A CN 202311327296A CN 117081856 B CN117081856 B CN 117081856B
Authority
CN
China
Prior art keywords
data
source
monitoring
unit
judging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311327296.3A
Other languages
Chinese (zh)
Other versions
CN117081856A (en
Inventor
夏东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Vision Miracle Intelligent Technology Co ltd
Original Assignee
Hunan Vision Miracle Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Vision Miracle Intelligent Technology Co ltd filed Critical Hunan Vision Miracle Intelligent Technology Co ltd
Priority to CN202311327296.3A priority Critical patent/CN117081856B/en
Publication of CN117081856A publication Critical patent/CN117081856A/en
Application granted granted Critical
Publication of CN117081856B publication Critical patent/CN117081856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A30/00Adapting or protecting infrastructure or their operation
    • Y02A30/60Planning or developing urban green infrastructure

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an intelligent space analysis platform and an early warning method based on cloud computing, and relates to the technical field of intelligent space analysis platforms.

Description

Intelligent space analysis platform and early warning method based on cloud computing
Technical Field
The invention relates to the technical field of intelligent space analysis platforms, in particular to a cloud computing-based intelligent space analysis platform and an early warning method.
Background
The intelligent space analysis platform is a technical platform for analyzing, processing and managing space-related data, through which a user can analyze and understand various space phenomena from the angles of geography, time and attributes, so that trend, optimization planning, resource allocation, risk assessment and the like are better predicted, and the platform is required to continuously acquire and analyze various information related to the geography in order to better assist the user in analyzing and understanding, wherein the source of analysis information is important;
in order to ensure the accuracy and high availability of the analysis result, the intelligent space analysis platform only acquires data from the authorized trusted enterprise, receives the data transmitted by the authorized trusted enterprise after the authorized trusted enterprise is successfully authenticated, and analyzes the data after the authorized trusted enterprise is successfully verified by MD5, however, in such a way, if the authentication information of the authorized trusted enterprise for identity authentication is revealed, a third party can be easily regarded as the authorized trusted enterprise, and the intelligent space analysis platform can erroneously receive the data transmitted by the authorized trusted enterprise, thereby not only influencing the final analysis result of the intelligent space analysis platform and causing the waste of analysis resources on the intelligent space analysis platform and unsafe data storage, but also having the risk of being maliciously tampered by the third party and inserting executable codes in the data transmitted by the authorized enterprise in the process of transmitting the identity authentication, and the safety of the intelligent space analysis platform received from the authorized enterprise can not be ensured by the existing authentication mode using MD5 verification;
In order to solve the above problems, the present invention proposes a solution.
Disclosure of Invention
The invention aims to provide an intelligent space analysis platform and an early warning method based on cloud computing, which aim to solve the problems that in the prior art, through carrying out identity authentication on an authorized trusted enterprise, after authentication is successful, data transmitted by the authorized trusted enterprise is received, and after MD5 verification is carried out on the authorized trusted enterprise successfully, however, in such a way, if authentication information of the authorized trusted enterprise for carrying out identity authentication is leaked, a third party is easily regarded as the authorized trusted enterprise, and the intelligent space analysis platform receives the transmitted data in error, so that the final analysis result of the intelligent space analysis platform is influenced, the waste of analysis resources on the intelligent space analysis platform and the unsafe of data storage are caused, and after the authorized enterprise is successful in identity authentication, the transmitted data is also subjected to malicious tampering by the third party and executable codes are inserted, and the safety of the intelligent space analysis platform received from the authorized enterprise cannot be ensured by the existing authentication mode using MD5 verification;
the aim of the invention can be achieved by the following technical scheme:
An intelligent spatial analysis platform based on cloud computing, comprising:
the data source terminal comprises a plurality of data source sub-modules, one data source sub-module corresponds to one authorized enterprise, and the data source sub-module comprises an information storage unit, a monitoring and judging unit, a safety interaction unit and an alarm unit;
the information storage unit stores geographic space information data which are acquired from satellite remote sensing data, geographic position sensor data, social media data, mobile equipment track data and enterprise database data in real time by corresponding authorized enterprises, wherein the geographic space information data comprise topography, urban construction and planning, traffic networks, land utilization, environmental resources, population distribution, market demands and natural disasters;
the security interaction unit stores enterprise names, sequence variables, login account numbers and login passwords of corresponding authorized enterprises and the current login account numbers and login passwords for logging in the space analysis platform;
the monitoring and judging unit judges the data capacity of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform according to a certain monitoring and judging rule every other monitoring and judging period, and the method specifically comprises the following steps:
S11: taking a monitoring judging period as an example, acquiring the data capacity A1 of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform;
s12: if A1< a, the monitoring and judging unit does not perform any processing, wherein a is a preset capacity comparison threshold value, otherwise, the monitoring and judging unit generates single-time source data to be analyzed based on the monitoring and judging period according to all the information data which are not transmitted to the safety interaction unit and are related to geography and are currently stored in the information storage unit, and transmits the single-time source data to the safety interaction unit, wherein the fixed interval duration of one monitoring and judging period is Z1, and Z1 is a preset value;
the security interaction unit acquires a login account number and a login password of a corresponding authorized enterprise after receiving single-time to-be-analyzed source data based on the monitoring and judging period, and generates initial authentication information based on the monitoring and judging period according to the login account number and the login password;
the space analysis platform is used for authentication and early warning judgment of single-time to-be-analyzed source data transmitted by all authorized enterprises, and comprises an identity authentication unit, an interaction authentication unit and an analysis display unit;
The identity authentication unit stores account names, account passwords and enterprise names of all authorized enterprises which are currently subjected to credit authentication of the space analysis platform and allowed to log in an authorized manner;
the identity authentication unit acquires a login account number and a login password carried in initial authentication information based on the monitoring and judging period, carries out consistency matching on the login account number and the login password and account names and account passwords of all authorized enterprises stored in the identity authentication unit, acquires enterprise names of the authorized enterprises corresponding to the account names and the account passwords if the matched and consistent account names and account passwords exist, recalibrates the enterprise names into authenticated enterprise names based on the monitoring and judging period, and transmits the authenticated enterprise names to the interactive authentication unit for temporary storage;
the identity authentication unit generates an initial matching success instruction and transmits the initial matching success instruction to the security interaction unit, and the security interaction unit converts single-time source data to be analyzed based on the monitoring and judging period into source filling data packets L1, L2, I.M., lg based on the monitoring and judging period according to a certain security conversion rule after receiving the initial matching success instruction transmitted by the identity authentication unit and transmits the source filling data packets to the security interaction unit;
The security interaction unit updates and stores sequence variables of all authorized enterprises, and after receiving source filling data packets L1, L2, and/or Lg transmitted by the security interaction unit and based on the monitoring and judging period, the security interaction unit independently authenticates the source filling data packets L1, L2, and/or Lg transmitted currently and based on the monitoring and judging period according to a certain authentication mode.
Further, the authorized enterprise refers to an enterprise trusted by the spatial analysis platform and authorized to allow data interaction with the spatial analysis platform.
Further, the identity authentication unit converts the single-time to-be-analyzed source data based on the monitoring and judging period into source filling data packets L1, L2, and the specific security conversion rules of the data packets L1, L2, lb based on the monitoring and judging period are as follows:
s21: binary number conversion is carried out on the single-time to-be-analyzed source data based on the monitoring judging period, which is converted into binary number, is recalibrated into source conversion transmission data, and the total character amount B1 of the source conversion transmission data is obtained;
s22: the number of cuts E1 of the source conversion transmission data is calculated according to a certain judgment calculation rule, and the method specifically comprises the following steps:
S221: acquiring the value of the sequence variable currently stored by the security interaction unit, marking the value as C1, and judging the size of the C1;
s222: if 1 is less than or equal to C1< Cmin, calculating and acquiring the cutting number E1 of source conversion transmission data by using a formula E1=B1/D1, wherein D1 is expressed as the total amount of characters of a single data packet in a calculation formula of E1, d1=C1×a1, and alpha 1 is a preset low-order adjustment factor;
if Cmin is less than or equal to C1 and less than or equal to Cmax, calculating and obtaining the number of cuts E1 of source conversion transmission data by using a formula e1=b1/D1, wherein D1 is represented as the total amount of characters of a single source conversion data block in a calculation formula of E1, d1=c1×a2, and a 2 is a preset middle order adjustment factor;
if Cmax is less than C1, calculating and obtaining the number of cuts E1 of the source conversion transmission data by using a formula e1=b1/D1, wherein D1 is represented as the total number of characters of a single data packet in the calculation formula of E1, d1=c1×α3, the α 3 is a preset high-order adjustment factor, the Cmin and Cmax are preset minimum and maximum division comparison thresholds respectively,
s23: acquiring enterprise names of authorized enterprises stored in a security interaction unit, and orderly marking all characters forming the enterprise names as F1, F2, F, and F not less than 1 according to the sequence from left to right, wherein F < E1 is required to be noted;
S24: cutting source conversion transmission data and the like into E1 source conversion data blocks according to the number of the cutting parts E1, and sequentially marking all the source conversion data blocks as G1, G2, G, g=1, 2, E1 according to the positions of each source conversion data block in the source conversion transmission data, wherein the number of characters of each source conversion data block is D1;
s25: binary conversion is carried out on the character F1, and binary numbers corresponding to the converted character F1 are inserted into the source conversion data block G1 according to a certain insertion rule to generate a corresponding source filling data packet L1, wherein the specific insertion rule is as follows:
s251: the method comprises the steps of performing Chinese silent tone pinyin conversion on a character F1, converting the character F1 into corresponding pinyin, wherein the letters subjected to Chinese silent tone pinyin conversion are lowercase, and the results of performing Chinese silent tone pinyin conversion on a 'ha' word are shown as an example;
s252: acquiring all letters in the pinyin corresponding to the character F1, and sequentially marking the letters as H1, H2, hh, wherein H is more than or equal to 1;
the method comprises the steps of respectively finding code values corresponding to letters H1, H2 and Hh according to an ascii coding table, marking the code values as I1, I2 and I, calculating and obtaining the sum I of the code values corresponding to the letters H1, H2, I and Hh by using a formula I=I1+I2+ (I+II), and recalibrating the sum I to be an interleaved sequence value of a character F1;
S253: if I>D1, using the formulaCalculating the interpolation filling bit number H1 of the acquired character F1 in the source conversion data block G1, wherein the mod () function is a residual function;
otherwise, recalibrating the interpolation sequence value I of the character F1 to be the interpolation filling bit number H1 of the character F1 in the source conversion data block G1;
s254: the method comprises the steps of carrying out binary number conversion on a character F1, and sequentially marking each digit in binary numbers corresponding to the converted character F1 as K1, K2, K16 according to the sequence from left to right, wherein the digit after Chinese is converted into the binary number is 16;
s255: inserting numbers K1, K2, H1+1, H1+2, H1+15 bits into the source conversion data block G1 according to the interleaved filling bit H1 of the character F1 in the source conversion data block G1 in sequence from left to right, binding the inserted source conversion data block G1 and the subscript 1 in the corresponding reference number G1 after filling to generate a source filling data packet based on the source conversion data block G1, and marking the source filling data packet as L1;
s26: the binary numbers corresponding to the characters F1, F2, and Ff after conversion are inserted into the source conversion data blocks G1, G2, and Gg according to the order of the characters F1, F2, and Ff, respectively, to generate the corresponding source stuffing data packets L1, L2, and Lg.
Further, the specific authentication mode of the secure interaction unit for independently authenticating the source stuffing data packets L1, L2, & gt, lg transmitted currently based on the monitoring and judging period is as follows:
s31: acquiring a value M1 of an order variable of a corresponding authorized enterprise currently stored in the interactive authentication unit according to the authentication enterprise name based on the monitoring and judging period temporarily stored in the interactive authentication unit;
s32: calculating and acquiring the total number N1 of characters of a single source conversion data block based on the monitoring and judging period according to the values M1 and g of the sequence variable of the corresponding authorized enterprise;
s33: obtaining the interleaved sequence values of the source filling data packets L1, L2, L.and Lg based on the monitoring judging period according to the authentication enterprise name calculation based on the monitoring judging period, and recalibrating the interleaved sequence values into Q1, Q2, qg;
s34: and carrying out independent authentication on the received source tainan charging data packet L1 based on the monitoring and judging period according to a certain independent authentication rule, wherein the method comprises the following steps of:
acquiring the number of characters of the received source filling data packet L1 based on the monitoring and judging period, comparing the number of characters with N1, and if the number of characters is inconsistent with N1, marking the received source filling data packet L1 based on the monitoring and judging period as an abnormal data packet;
If the two characters are consistent, extracting Q1 bit to Q1+15 bit numbers from the source filling data packet L1 according to the interleaving sequence value Q1, converting the Q1 bit to Q1+15 bit numbers into Chinese and comparing the consistency of the first character in the authentication enterprise name based on the monitoring judging period, if the two characters are consistent, judging that the received source filling data packet L1 based on the monitoring judging period is authenticated successfully independently, deleting the Q1 bit to Q1+15 bit numbers in the source filling data packet L1, generating a corresponding restored data packet according to the deleted source filling data packet L1, and marking the restored data packet as R1;
otherwise, marking the received source filling data packet L1 based on the monitoring judging period as an abnormal data packet;
s35: the received source stuffing packets L1, L2, & gt, lg based on the monitoring determination period are individually authenticated in this order in S34:
if the individual authentication of the source filling data packets L1, L2, i.e., lg based on the monitoring and judging period is successful, acquiring the corresponding generated reduction data packets R1, R2, i.e., rg after the authentication is successful, splicing the reduction data packets R1, R2, i.e., rg according to the sequence of the reduction data packets R1, R2, i.e., rg to generate reduction analysis data based on the monitoring and judging period, wherein the interactive authentication unit transmits the reduction analysis data based on the monitoring and judging period to the analysis display unit for analysis and display;
If marked abnormal data packets exist in the source filling data packets L1, L2, the third and the Lg based on the monitoring and judging period, acquiring the number T1 of the abnormal data packets;
if T1=g, the interactive display unit generates a primary alarm instruction and transmits the primary alarm instruction to the corresponding alarm unit, and the alarm unit alarms corresponding enterprise management personnel in a short message mode after receiving the primary alarm instruction transmitted by the interactive display unit to remind the enterprise management personnel to timely modify the password;
if T1< g, the interactive display unit generates a secondary alarm instruction and transmits the secondary alarm instruction to a corresponding alarm unit, the alarm unit alarms corresponding enterprise management personnel in a form of a short message after receiving the secondary alarm instruction transmitted by the interactive display unit, reminds the enterprise management personnel of three-party interference in a single-time source data transmission process based on the monitoring and judging period, and deletes the received source filling data packets L1, L2, the third and the Lg based on the monitoring and judging period without analysis;
and the interactive authentication unit randomly selects a number from 1-P1 after all received source filling data packets L1, L2, and Lg based on the monitoring and judging period are authenticated independently, takes the number as the value of the sequence variable of the authorized enterprises with the same authentication enterprise name based on the monitoring and judging period, updates and stores the value in the interactive authentication unit, and transmits the value to the security interaction unit of the corresponding authorized enterprises, wherein P1 is a preset digital threshold value.
An early warning method based on a cloud computing intelligent space analysis platform comprises the following steps:
step one: the data source terminal comprises a plurality of data source sub-modules, one data source sub-module corresponds to one authorized enterprise, and the data source sub-module comprises an information storage unit, a monitoring and judging unit, a safety interaction unit and an alarm unit;
step two: the monitoring and judging unit judges the data capacity of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform according to a certain monitoring and judging rule every other monitoring and judging period, and the method specifically comprises the following steps:
s11: taking a monitoring judging period as an example, acquiring the data capacity A1 of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform;
s12: if A1< a, the monitoring and judging unit does not perform any processing, wherein a is a preset capacity comparison threshold value, otherwise, the monitoring and judging unit generates single-time source data to be analyzed based on the monitoring and judging period according to all the information data which are not transmitted to the safety interaction unit and are related to geography and are currently stored in the information storage unit, and transmits the single-time source data to the safety interaction unit, wherein the fixed interval duration of one monitoring and judging period is Z1, and Z1 is a preset value;
Step three: the space analysis platform is used for authentication and early warning judgment of single-time to-be-analyzed source data transmitted by all authorized enterprises, and comprises an identity authentication unit and an interaction display unit, wherein the identity authentication unit carries out consistency matching on login names and login passwords of the authorized enterprises, and generates an initial matching success instruction after successful matching and transmits the initial matching success instruction to the corresponding safety interaction unit;
step four: the security interaction unit converts the single-time to-be-analyzed source data based on the monitoring and judging period into source filling data packets L1, L2, and Lg based on the monitoring and judging period;
step five: the interactive authentication unit performs independent authentication on the source filling data packets L1, L2, and Lg of the current transmission based on the monitoring and judging period, after the independent authentication on the source filling data packets L1, L2, and Lg of the current transmission based on the monitoring and judging period is successful, the interactive authentication unit performs splicing based on the source filling data packets L1, L2, and Lg of the monitoring and judging period to generate reduction analysis data based on the monitoring and judging period, and the interactive authentication unit transmits the reduction analysis data based on the monitoring and judging period to the analysis display unit for analysis and display;
If the independent authentication is unsuccessful, marking the corresponding source filling data packet as an abnormal data packet, acquiring the data T1 of the final abnormal data packet, if T1 = g, generating a first-level alarm instruction by the interactive display unit and transmitting the first-level alarm instruction to the corresponding alarm unit, alarming the corresponding enterprise manager by the alarm unit in a form of a short message, reminding the corresponding enterprise manager to modify the password in time, otherwise, generating a second-level alarm unit and transmitting the second-level alarm unit to the corresponding alarm unit, and alarming the corresponding enterprise manager by the alarm unit in a form of the short message, reminding the corresponding enterprise manager of the transmission data of the third-party interference;
step six: and the interactive authentication unit randomly selects a number from 1-P1 after all the received source filling data packets L1, L2, and Lg based on the monitoring and judging period are authenticated singly, takes the number as a value of an order variable of an authorized enterprise with the same name as a secondary authentication enterprise of single-time analysis source data based on the monitoring and judging period, updates and stores the value in the interactive authentication unit, and transmits the value to a security interaction unit of a corresponding authorized enterprise, wherein P1 is a preset digital threshold value.
The invention has the beneficial effects that:
According to the invention, the monitoring judging unit is arranged to judge the data capacity of all the geographical space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform according to a certain monitoring judging rule every other monitoring judging period, so that single-time analysis source data meeting the transmission condition is obtained, the identity authentication unit carries out primary authentication on the account name and the account password of the authorized enterprise, the security interaction unit converts the enterprise name of the authorized enterprise corresponding to the authenticated enterprise into binary numbers based on the sequence variable characteristics of the single-time analysis source data after the authentication is passed, the binary numbers are filled into a plurality of source filling data packets converted by the single-time analysis source data packets, the interaction authentication unit carries out double authentication on the number of numbers and the number of digits of the numbers of the single-time analysis source filling data packets, the phenomenon that the transmitted data are falsified by three parties to cause the space analysis platform to be received incorrectly is avoided, the occurrence of analysis resource consumption condition of the space analysis platform is avoided, and the security of the data in the space analysis platform is ensured.
Drawings
The invention is further described below with reference to the accompanying drawings.
Fig. 1 is a system block diagram of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the intelligent space analysis platform and the early warning method based on cloud computing comprise a data source terminal and a space analysis platform;
the data source terminal comprises a plurality of data source sub-modules, one data source sub-module corresponds to an authorized enterprise performing data interaction with the space analysis platform, and the data source sub-module comprises an information storage unit, a monitoring and judging unit, a safety interaction unit and an alarm unit;
the information storage unit stores geographic space information data which are acquired from satellite remote sensing data, geographic position sensor data, social media data, mobile equipment track data and enterprise database data in real time by corresponding authorized enterprises, wherein the geographic space information data comprise topography, urban construction and planning, traffic networks, land utilization, environmental resources, population distribution, market demands and natural disasters;
satellite remote sensing data: image data from satellites and remote sensing sensors for obtaining geospatial information such as earth coverage type and climate change, geographic position sensor data: including geographic location information and environmental parameters provided by various sensors, including in this embodiment GPS, inertial sensors, for locating and monitoring the position and status of a mobile device, vehicle or other object; social media data: the geographic tag information, such as photos and check-ins, published by the users collected through the social media platform can be used for analyzing population flow and public opinion hotspots. Mobile device trajectory data: and acquiring the movement track data of the user by using a position service on the mobile device, and analyzing the personnel activity mode and the traffic condition. Enterprise database data: databases within the corresponding authorized enterprises, including supply chain data, sales data, and customer data, may provide information related to geographic location, such as sales areas and logistics paths;
The monitoring and judging unit judges the data capacity of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform according to a certain monitoring and judging rule every other monitoring and judging period, and the method specifically comprises the following steps:
s11: taking a monitoring judging period as an example, acquiring the data capacity A1 of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform;
s12: if A1< A, the monitoring and judging unit does not perform any processing, otherwise, the monitoring and judging unit generates single-time source data to be analyzed based on the monitoring and judging period according to all the information data which are not transmitted to the safety interaction unit and are related to geography and are currently stored in the information storage unit, and transmits the single-time source data to the safety interaction unit, wherein the fixed interval duration of one monitoring and judging period is Z1, Z1 is a preset value, and A is a preset threshold;
the security interaction unit stores a login account number, a login password, an enterprise name and an order variable corresponding to a current login space analysis platform of an authorized enterprise, and in this embodiment, the enterprise name of the authorized enterprise only contains Chinese;
The security interaction unit receives the single-time source data to be analyzed based on the monitoring and judging period transmitted by the monitoring and judging unit, generates source data to be transmitted according to the transmitted single-time source data to be analyzed and the generation time thereof, acquires a login account and a login password stored in the security interaction unit, generates initial authentication information of the single-time source data to be analyzed based on the monitoring and judging period according to the acquired login account and login password, and transmits the initial authentication information to the space analysis platform;
the space analysis platform is used for authenticating, receiving and analyzing information data transmitted by all authorized enterprises and comprises an identity authentication unit, an interaction authentication unit and an analysis display unit;
the space analysis platform receives the initial authentication information of the single-time source data to be analyzed based on the monitoring and judging period transmitted by the safety interaction unit and transmits the initial authentication information to the identity authentication unit, wherein the identity authentication unit stores account names, account passwords and enterprise names of all authorized enterprises which are currently subjected to credit authentication of the space analysis platform and allowed to log in;
the identity authentication unit receives initial authentication information of the single-time source data to be analyzed based on the monitoring and judging period transmitted by the space analysis platform, carries out consistency matching according to a login account number and a login password carried in the initial authentication information and account names and account passwords of all authorized enterprises stored in the identity authentication unit, and if the matching is successful, acquires the successfully matched account name and the successfully matched enterprise name of the authorized enterprise corresponding to the account password, and recalibrates the successfully matched account name and account password as the authenticated enterprise name based on the monitoring and judging period;
The identity authentication unit transmits the authentication enterprise name based on the monitoring and judging period to the interactive authentication unit for temporary storage;
the identity authentication unit generates an initial matching success instruction and transmits the initial matching success instruction to the corresponding security interaction unit;
after receiving the initial matching success instruction transmitted by the identity authentication unit, the security interaction unit converts the single-time source data to be analyzed based on the monitoring and judging period into source filling data packets L1, L2, and Lg based on the monitoring and judging period according to a certain security conversion rule, wherein the specific security interaction rule is as follows:
s21: binary number conversion is carried out on the single-time to-be-analyzed source data based on the monitoring judging period, which is converted into binary number, is recalibrated into source conversion transmission data, and the total character amount B1 of the source conversion transmission data is obtained;
s22: the number of cuts E1 of the source conversion transmission data is calculated according to a certain judgment calculation rule, and the method specifically comprises the following steps:
s221: acquiring the value of the sequence variable currently stored by the security interaction unit, marking the value as C1, and judging the size of the C1;
s222: if 1 is less than or equal to C1< Cmin, calculating and acquiring the cutting number E1 of source conversion transmission data by using a formula E1=B1/D1, wherein D1 is expressed as the total amount of characters of a single data packet in a calculation formula of E1, d1=C1×a1, and alpha 1 is a preset low-order adjustment factor;
If Cmin is less than or equal to C1 and less than or equal to Cmax, calculating and obtaining the number of cuts E1 of source conversion transmission data by using a formula e1=b1/D1, wherein D1 is represented as the total amount of characters of a single source conversion data block in a calculation formula of E1, d1=c1×a2, and a 2 is a preset middle order adjustment factor;
if Cmax is less than C1, calculating and obtaining the number of cuts E1 of the source conversion transmission data by using a formula e1=b1/D1, wherein D1 is represented as the total number of characters of a single data packet in the calculation formula of E1, d1=c1×α3, the α 3 is a preset high-order adjustment factor, the Cmin and Cmax are preset minimum and maximum division comparison thresholds respectively,
s23: acquiring enterprise names of authorized enterprises stored in a security interaction unit, and orderly marking all characters forming the enterprise names as F1, F2, F, and F not less than 1 according to the sequence from left to right, wherein F < E1 is required to be noted;
s24: cutting source conversion transmission data and the like into E1 source conversion data blocks according to the number of the cutting parts E1, and sequentially marking all the source conversion data blocks as G1, G2, G, g=1, 2, E1 according to the positions of each source conversion data block in the source conversion transmission data, wherein the number of characters of each source conversion data block is D1;
S25: binary conversion is carried out on the character F1, and binary numbers corresponding to the converted character F1 are inserted into the source conversion data block G1 according to a certain insertion rule to generate a corresponding source filling data packet L1, wherein the specific insertion rule is as follows:
s251: the method comprises the steps of performing Chinese silent tone pinyin conversion on a character F1, converting the character F1 into corresponding pinyin, wherein the letters subjected to Chinese silent tone pinyin conversion are lowercase, and the results of performing Chinese silent tone pinyin conversion on a 'ha' word are shown as an example;
s252: acquiring all letters in the pinyin corresponding to the character F1, and sequentially marking the letters as H1, H2, hh, wherein H is more than or equal to 1;
the method comprises the steps of respectively finding code values corresponding to letters H1, H2 and Hh according to an ascii coding table, marking the code values as I1, I2 and I, calculating and obtaining the sum I of the code values corresponding to the letters H1, H2, I and Hh by using a formula I=I1+I2+ (I+II), and recalibrating the sum I to be an interleaved sequence value of a character F1;
s243: if I>D1, using the formulaCalculating the interpolation filling bit number H1 of the acquired character F1 in the source conversion data block G1, wherein the mod () function is a residual function;
otherwise, recalibrating the interpolation sequence value I of the character F1 to be the interpolation filling bit number H1 of the character F1 in the source conversion data block G1;
S244: the method comprises the steps of carrying out binary number conversion on a character F1, and sequentially marking each digit in binary numbers corresponding to the converted character F1 as K1, K2, K16 according to the sequence from left to right, wherein the digit after Chinese is converted into the binary number is 16;
s255: inserting numbers K1, K2, H1+1, H1+2, H1+15 bits into the source conversion data block G1 according to the interleaved filling bit H1 of the character F1 in the source conversion data block G1 in sequence from left to right, binding the inserted source conversion data block G1 and the subscript 1 in the corresponding reference number G1 after filling to generate a source filling data packet based on the source conversion data block G1, and marking the source filling data packet as L1;
s26: according to S25, inserting binary numbers corresponding to the characters F1, F2, and Ff after conversion into the source conversion data blocks G1, G2, and G respectively according to the sequence of the characters F1, F2, and fg to generate corresponding source stuffing data packets L1, L2, and Lg, where it is required to be noted that if all binary numbers corresponding to the characters F1, F2, and Ff after conversion have been inserted into the source conversion data blocks, the source conversion data blocks are not inserted into the binary numbers corresponding to the characters F1, F2, and Ff after conversion, and then continuing to insert the binary numbers corresponding to the characters F1, F2, and Ff after conversion into the remaining source conversion data blocks according to the sequence of the characters F1, F2, and Ff respectively until all the source conversion data blocks are converted into source stuffing data packets;
The secure interaction unit transmits the source stuffing data packets L1, L2, and/or Lg based on the monitoring determination period to the interaction authentication unit in the order of the source stuffing data packets L1, L2, and/or Lg;
the interactive authentication unit updates and stores sequence variables of all authorized enterprises, and authenticates identity information of an authorized user currently transmitting the source filling data packets L1, L2, the first and the second according to a certain authentication mode after receiving the source filling data packets L1, L2, the first and the second according to the monitoring and judging period transmitted by the corresponding safety interactive unit, wherein the identity information comprises the following specific steps:
s31: acquiring a value M1 of an order variable of a corresponding authorized enterprise currently stored in the interactive authentication unit according to the authentication enterprise name based on the monitoring and judging period temporarily stored in the interactive authentication unit;
s32: calculating and acquiring the total number N1 of characters of a single source conversion data block based on the monitoring and judging period according to the values M1 and g of the sequence variable of the corresponding authorized enterprise;
s33: obtaining the interleaved sequence values of the source filling data packets L1, L2, L.and Lg based on the monitoring judging period according to the authentication enterprise name calculation based on the monitoring judging period, and recalibrating the interleaved sequence values into Q1, Q2, qg;
S34: and carrying out independent authentication on the received source tainan charging data packet L1 based on the monitoring and judging period according to a certain independent authentication rule, wherein the method comprises the following steps of:
acquiring the number of characters of the received source filling data packet L1 based on the monitoring and judging period, comparing the number of characters with N1, and if the number of characters is inconsistent with N1, marking the received source filling data packet L1 based on the monitoring and judging period as an abnormal data packet;
if the two characters are consistent, extracting Q1 bit to Q1+15 bit numbers from the source filling data packet L1 according to the interleaving sequence value Q1, converting the Q1 bit to Q1+15 bit numbers into Chinese and comparing the consistency of the first character in the authentication enterprise name based on the monitoring judging period, if the two characters are consistent, judging that the received source filling data packet L1 based on the monitoring judging period is authenticated successfully independently, deleting the Q1 bit to Q1+15 bit numbers in the source filling data packet L1, generating a corresponding restored data packet according to the deleted source filling data packet L1, and marking the restored data packet as R1;
otherwise, marking the received source filling data packet L1 based on the monitoring judging period as an abnormal data packet;
s35: the received source stuffing packets L1, L2, & gt, lg based on the monitoring determination period are individually authenticated in this order in S34:
If the individual authentication of the source filling data packets L1, L2, i.e., lg based on the monitoring and judging period is successful, acquiring the corresponding generated reduction data packets R1, R2, i.e., rg after the authentication is successful, splicing the reduction data packets R1, R2, i.e., rg according to the sequence of the reduction data packets R1, R2, i.e., rg to generate reduction analysis data based on the monitoring and judging period, wherein the interactive authentication unit transmits the reduction analysis data based on the monitoring and judging period to the analysis display unit for analysis and display;
if marked abnormal data packets exist in the source filling data packets L1, L2, the third and the Lg based on the monitoring and judging period, acquiring the number T1 of the abnormal data packets;
if T1=g, the interactive display unit generates a primary alarm instruction and transmits the primary alarm instruction to an alarm unit corresponding to the authentication enterprise name based on the monitoring judging period, and the alarm unit alarms to the corresponding enterprise manager in the form of a short message after receiving the primary alarm instruction transmitted by the interactive display unit to remind the enterprise manager to modify the password in time;
if T1< g, the interactive display unit generates a secondary alarm instruction and transmits the secondary alarm instruction to an alarm unit corresponding to the authentication enterprise name based on the monitoring and judging period, the alarm unit alarms to the corresponding enterprise manager in the form of a short message after receiving the secondary alarm instruction transmitted by the interactive display unit, reminds the enterprise manager of three-party interference of single-time source data transmission data to be analyzed based on the monitoring and judging period, and deletes the received source filling data packets L1, L2, & gt and Lg based on the monitoring and judging period without analysis;
The interactive authentication unit randomly selects a number from 1-P1 after all received source filling data packets L1, L2, I.M. and Lg based on the monitoring and judging period are authenticated singly, takes the number as a value of an order variable of an authorized enterprise with the same name as an authenticated enterprise based on the monitoring and judging period, updates and stores the value in the interactive authentication unit, and transmits the value to a security interaction unit of a corresponding authorized enterprise, wherein P1 is a preset digital threshold;
in the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely illustrative and explanatory of the invention, as various modifications and additions may be made to the particular embodiments described, or in a similar manner, by those skilled in the art, without departing from the scope of the invention or exceeding the scope of the invention as defined in the claims.
The foregoing describes one embodiment of the present invention in detail, but the description is only a preferred embodiment of the present invention and should not be construed as limiting the scope of the invention. All equivalent changes and modifications within the scope of the present invention are intended to be covered by the present invention.

Claims (6)

1. Intelligent space analysis platform based on cloud calculates, its characterized in that includes:
the data source terminal comprises a plurality of data source sub-modules, one data source sub-module corresponds to one authorized enterprise, and the data source sub-module comprises an information storage unit, a monitoring and judging unit, a safety interaction unit and an alarm unit;
the information storage unit stores geographic space information data which is acquired from satellite remote sensing data, geographic position sensor data, social media data, mobile equipment track data and enterprise database data in real time by a corresponding authorized enterprise, wherein the geographic space information data comprises topography, population distribution and natural disasters;
the security interaction unit stores enterprise names, sequence variables, login account numbers and login passwords of corresponding authorized enterprises and the current login account numbers and login passwords for logging in the space analysis platform;
The monitoring and judging unit judges the data capacity of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform according to a certain monitoring and judging rule every other monitoring and judging period, and the method specifically comprises the following steps:
s11: acquiring the data capacity A1 of all the geographic space information data which are currently stored in the monitoring judging period information storage unit and are not transmitted to the space analysis platform;
s12: if A1< a, the monitoring and judging unit does not perform any processing, wherein a is a preset capacity comparison threshold value, otherwise, the monitoring and judging unit generates single-time source data to be analyzed based on the monitoring and judging period according to all the information data which are not transmitted to the safety interaction unit and are related to geography and are currently stored in the information storage unit, and transmits the single-time source data to the safety interaction unit, wherein the fixed interval duration of one monitoring and judging period is Z1, and Z1 is a preset value;
the security interaction unit acquires a login account number and a login password of a corresponding authorized enterprise after receiving single-time to-be-analyzed source data based on the monitoring and judging period, and generates initial authentication information based on the monitoring and judging period according to the login account number and the login password;
The space analysis platform is used for authentication and early warning judgment of single-time to-be-analyzed source data transmitted by all authorized enterprises, and comprises an identity authentication unit, an interaction authentication unit and an analysis display unit;
the identity authentication unit stores account names, account passwords and enterprise names of all authorized enterprises which are currently subjected to credit authentication of the space analysis platform and allowed to log in an authorized manner;
the identity authentication unit acquires a login account number and a login password carried in initial authentication information based on the monitoring and judging period, carries out consistency matching on the login account number and the login password and account names and account passwords of all authorized enterprises stored in the identity authentication unit, acquires enterprise names of the authorized enterprises corresponding to the account names and the account passwords if the matched and consistent account names and account passwords exist, recalibrates the enterprise names into authenticated enterprise names based on the monitoring and judging period, and transmits the authenticated enterprise names to the interactive authentication unit for temporary storage;
the identity authentication unit generates an initial matching success instruction and transmits the initial matching success instruction to the safety interaction unit, and the safety interaction unit converts single-time to-be-analyzed source data based on the monitoring judging period into source filling data packets L1, L2, and Lg based on the monitoring judging period according to a certain safety conversion rule after receiving the initial matching success instruction transmitted by the identity authentication unit and transmits the source filling data packets L1, L2, and Lg to the interaction authentication unit;
The interactive authentication unit updates and stores sequence variables of all authorized enterprises, the interactive authentication unit receives source filling data packets L1, L2, and/or Lg transmitted by the safety interactive unit and based on the monitoring and judging period, then independently authenticates the source filling data packets L1, L2, and/or Lg transmitted currently and based on the monitoring and judging period according to a certain authentication mode, after authentication is successful, randomly selects a number from 1-P1, takes the number as the value of the sequence variable of the authorized enterprise with the same name as the authenticated enterprise based on the monitoring and judging period, updates and stores the value in the interactive authentication unit, and transmits the value to the safety interactive unit of the corresponding authorized enterprise, wherein P1 is a preset digital threshold;
the identity authentication unit converts the single-time to-be-analyzed source data based on the monitoring and judging period into source filling data packets L1, L2, and the specific security conversion rules of the data packets L1, L2, L are as follows:
s21: binary number conversion is carried out on the single-time to-be-analyzed source data based on the monitoring judging period, which is converted into binary number, is recalibrated into source conversion transmission data, and the total character amount B1 of the source conversion transmission data is obtained;
S22: calculating and obtaining the cutting number E1 of the source conversion transmission data according to a certain judgment calculation rule;
s23: acquiring enterprise names of authorized enterprises stored in a security interaction unit, and orderly marking all characters forming the enterprise names as F1, F2, F, and F not less than 1 according to the sequence from left to right, wherein F < E1 is required to be noted;
s24: cutting source conversion transmission data into E1 source conversion data blocks according to the number of the cutting parts E1, and marking all the source conversion data blocks as G1, G2, gg, g=1, 2, E1 in sequence from left to right according to the position of each source conversion data block in the source conversion transmission data before cutting, wherein the number of characters of each source conversion data block is D1;
s25: binary conversion is carried out on the character F1, and binary numbers corresponding to the converted character F1 are inserted into a source conversion data block G1 according to a certain insertion rule to generate a corresponding source filling data packet L1;
s26: the binary numbers corresponding to the characters F1, F2, and Ff after conversion are inserted into the source conversion data blocks G1, G2, and Gg according to the order of the characters F1, F2, and Ff, respectively, to generate the corresponding source stuffing data packets L1, L2, and Lg.
2. The cloud computing-based intelligent spatial analysis platform of claim 1, wherein the authorized enterprise refers to an enterprise trusted and authorized by the spatial analysis platform to allow data interaction with the spatial analysis platform.
3. The cloud computing-based intelligent spatial analysis platform according to claim 1, wherein the S22, a decision calculation rule for calculating the number of cuts E1 of the acquired source conversion transmission data is as follows:
s221: acquiring the value of the sequence variable currently stored by the security interaction unit, marking the value as C1, and judging the size of the C1;
s222: if 1 is less than or equal to C1< Cmin, calculating and acquiring the cutting number E1 of source conversion transmission data by using a formula E1=B1/D1, wherein D1 is expressed as the total amount of characters of a single data packet in a calculation formula of E1, d1=C1×a1, and alpha 1 is a preset low-order adjustment factor;
if Cmin is less than or equal to C1 and less than or equal to Cmax, calculating and obtaining the number of cuts E1 of source conversion transmission data by using a formula e1=b1/D1, wherein D1 is represented as the total amount of characters of a single source conversion data block in a calculation formula of E1, d1=c1×a2, and a 2 is a preset middle order adjustment factor;
if Cmax is less than C1, calculating and obtaining the number of cuts E1 of the source conversion transmission data by using a formula e1=b1/D1, wherein in the calculation formula of E1, D1 is represented as the total number of characters of a single data packet, d1=c1×α3, α 3 is a preset high-order adjustment factor, and Cmin and Cmax are respectively preset minimum and maximum division comparison thresholds.
4. The cloud computing-based intelligent spatial analysis platform according to claim 1, wherein the inserting rule for generating the corresponding source stuffing packet L1 at S25 is as follows:
s251: the method comprises the steps of performing Chinese character silent tone pinyin conversion on a character F1, converting the character F1 into corresponding pinyin, and performing Chinese character silent tone pinyin conversion on lower case letters;
s252: acquiring all letters in the pinyin corresponding to the character F1, and sequentially marking the letters as H1, H2, hh, wherein H is more than or equal to 1;
the method comprises the steps of respectively finding code values corresponding to letters H1, H2 and Hh according to an ascii coding table, marking the code values as I1, I2 and I, calculating and obtaining the sum I of the code values corresponding to the letters H1, H2, I and Hh by using a formula I=I1+I2+ (I+II), and recalibrating the sum I to be an interleaved sequence value of a character F1;
s253: if I>D1, using the formulaCalculating the interpolation filling bit number J1 of the obtained character F1 in the source conversion data block G1, wherein the mod () function is a residual function;
otherwise, recalibrating the interpolation sequence value I of the character F1 to be the interpolation filling bit number J1 of the character F1 in the source conversion data block G1;
s254: the method comprises the steps of carrying out binary number conversion on a character F1, and sequentially marking each digit in binary numbers corresponding to the converted character F1 as K1, K2, K16 according to the sequence from left to right, wherein the digit after Chinese is converted into the binary number is 16;
S255: according to the interleaved padding digits J1 of the character F1 in the source conversion data block G1, the digits K1, K2, H1+1, H1+2, H1+15 bits of the source conversion data block G1 are inserted from left to right in sequence, the digits which are originally positioned in the H1 bit and the H1 bit in the source conversion data block G1 are sequentially delayed backwards, and after the padding is completed, the inserted source conversion data block G1 and the subscript 1 in the corresponding label G1 are bound to generate a source padding data packet based on the source conversion data block G1, and the source padding data packet is marked as L1.
5. The cloud computing-based intelligent spatial analysis platform according to claim 1, wherein the specific authentication manner by which the interactive authentication unit performs independent authentication on the source stuffing packets L1, L2, and Lg currently transmitted based on the monitoring determination period is as follows:
s31: acquiring a value M1 of an order variable of a corresponding authorized enterprise currently stored in the interactive authentication unit according to the authentication enterprise name based on the monitoring and judging period temporarily stored in the interactive authentication unit;
s32: calculating and acquiring the total number N1 of characters of a single source conversion data block based on the monitoring and judging period according to the values M1 and g of the sequence variable of the corresponding authorized enterprise;
s33: obtaining the interleaved sequence values of the source filling data packets L1, L2, L.and Lg based on the monitoring judging period according to the authentication enterprise name calculation based on the monitoring judging period, and recalibrating the interleaved sequence values into Q1, Q2, qg;
S34: and carrying out individual authentication on the received source filling data packet L1 based on the monitoring judging period according to a certain individual authentication rule, wherein the method comprises the following specific steps:
acquiring the number of characters of the received source filling data packet L1 based on the monitoring and judging period, comparing the number of characters with N1, and if the number of characters is inconsistent with N1, marking the received source filling data packet L1 based on the monitoring and judging period as an abnormal data packet;
if the two characters are consistent, extracting Q1 bit to Q1+15 bit numbers from the source filling data packet L1 according to the interleaving sequence value Q1, converting the Q1 bit to Q1+15 bit numbers into Chinese and comparing the consistency of the first character in the authentication enterprise name based on the monitoring judging period, if the two characters are consistent, judging that the received source filling data packet L1 based on the monitoring judging period is authenticated successfully independently, deleting the Q1 bit to Q1+15 bit numbers in the source filling data packet L1, generating a corresponding reduction data packet according to the deleted source filling data packet L1, marking the corresponding reduction data packet as R1, otherwise, marking the received source filling data packet L1 based on the monitoring judging period as an abnormal data packet;
s35: the received source stuffing packets L1, L2, & gt, lg based on the monitoring determination period are individually authenticated in this order in S34:
S351: if the individual authentication of the source filling data packets L1, L2, i.e., lg based on the monitoring and judging period is successful, acquiring the corresponding generated reduction data packets R1, R2, i.e., rg after the authentication is successful, splicing the reduction data packets R1, R2, i.e., rg according to the sequence of the reduction data packets R1, R2, i.e., rg to generate reduction analysis data based on the monitoring and judging period, wherein the interactive authentication unit transmits the reduction analysis data based on the monitoring and judging period to the analysis display unit for analysis and display;
s352: if marked abnormal data packets exist in the source filling data packets L1, L2, the third and the Lg based on the monitoring and judging period, acquiring the number T1 of the abnormal data packets;
if T1=g, the analysis display unit generates a primary alarm instruction and transmits the primary alarm instruction to the corresponding alarm unit, and the alarm unit alarms corresponding enterprise management personnel in a short message mode after receiving the primary alarm instruction transmitted by the analysis display unit to remind the enterprise management personnel to timely modify the password;
if T1< g, the analysis display unit generates a secondary alarm instruction and transmits the secondary alarm instruction to the corresponding alarm unit, and the alarm unit alarms to the corresponding enterprise manager in the form of a short message after receiving the secondary alarm instruction transmitted by the analysis display unit, reminds the enterprise manager of three-party interference in the single-time source data transmission process based on the monitoring and judging period, and deletes the received source filling data packets L1, L2, the.
6. An early warning method based on the cloud computing intelligent space analysis platform as claimed in claim 1, which is characterized by comprising the following steps:
step one: the data source terminal comprises a plurality of data source sub-modules, one data source sub-module corresponds to one authorized enterprise, and the data source sub-module comprises an information storage unit, a monitoring and judging unit, a safety interaction unit and an alarm unit;
step two: the monitoring and judging unit judges the data capacity of all the geographic space information data which are currently stored in the information storage unit and are not transmitted to the space analysis platform according to a certain monitoring and judging rule every other monitoring and judging period, and the method specifically comprises the following steps:
s11: acquiring the data capacity A1 of all the geographic space information data which are currently stored in the monitoring judging period information storage unit and are not transmitted to the space analysis platform;
s12: if A1< a, the monitoring and judging unit does not perform any processing, wherein a is a preset capacity comparison threshold value, otherwise, the monitoring and judging unit generates single-time source data to be analyzed based on the monitoring and judging period according to all the information data which are not transmitted to the safety interaction unit and are related to geography and are currently stored in the information storage unit, and transmits the single-time source data to the safety interaction unit, wherein the fixed interval duration of one monitoring and judging period is Z1, and Z1 is a preset value;
Step three: the space analysis platform is used for authenticating and carrying out early warning judgment on single-time to-be-analyzed source data transmitted by all authorized enterprises, and comprises an identity authentication unit, an interaction authentication unit and an analysis display unit, wherein the identity authentication unit carries out consistency matching on login names and login passwords of the authorized enterprises, and generates an initial matching success instruction after successful matching and transmits the initial matching success instruction to the corresponding safety interaction unit;
step four: the security interaction unit converts the single-time to-be-analyzed source data based on the monitoring and judging period into source filling data packets L1, L2, and Lg based on the monitoring and judging period;
step five: the interactive authentication unit performs independent authentication on the source filling data packets L1, L2, and Lg of the current transmission based on the monitoring and judging period, after the independent authentication on the source filling data packets L1, L2, and Lg of the current transmission based on the monitoring and judging period is successful, the source filling data packets L1, L2, and Lg of the monitoring and judging period are spliced to generate reduction analysis data based on the monitoring and judging period, and the interactive authentication unit transmits the reduction analysis data based on the monitoring and judging period to the analysis display unit for analysis and display;
If the independent authentication is unsuccessful, marking the corresponding source filling data packet as an abnormal data packet and acquiring the number T1 of the final abnormal data packet, if T1 = g, generating a primary alarm instruction by the analysis display unit and transmitting the primary alarm instruction to the corresponding alarm unit, wherein the alarm unit alarms to the corresponding enterprise manager in a short message mode to remind the corresponding enterprise manager to modify the password in time, otherwise, generating a secondary alarm unit and transmitting the secondary alarm unit to the corresponding alarm unit, and the alarm unit alarms to the corresponding enterprise manager in a short message mode to remind the transmission data of the three-party interference;
step six: and the interactive authentication unit randomly selects a number from 1-P1 after all the received source filling data packets L1, L2, and Lg based on the monitoring and judging period are authenticated singly, takes the number as a value of an order variable of an authorized enterprise with the same name as a secondary authentication enterprise of single-time analysis source data based on the monitoring and judging period, updates and stores the value in the interactive authentication unit, and transmits the value to a security interaction unit of a corresponding authorized enterprise, wherein P1 is a preset digital threshold value.
CN202311327296.3A 2023-10-13 2023-10-13 Intelligent space analysis platform and early warning method based on cloud computing Active CN117081856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311327296.3A CN117081856B (en) 2023-10-13 2023-10-13 Intelligent space analysis platform and early warning method based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311327296.3A CN117081856B (en) 2023-10-13 2023-10-13 Intelligent space analysis platform and early warning method based on cloud computing

Publications (2)

Publication Number Publication Date
CN117081856A CN117081856A (en) 2023-11-17
CN117081856B true CN117081856B (en) 2023-12-19

Family

ID=88704585

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311327296.3A Active CN117081856B (en) 2023-10-13 2023-10-13 Intelligent space analysis platform and early warning method based on cloud computing

Country Status (1)

Country Link
CN (1) CN117081856B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063464A (en) * 2018-08-16 2018-12-21 杭州市商务委员会(杭州市粮食局) System safety certification and automatic authorization method and system based on big data analysis
WO2019003233A1 (en) * 2017-06-27 2019-01-03 Kavitha Parthasarathy System and method applied for monitoring, controlling and processing information from remote device through configurable cloud based application.
CN110378827A (en) * 2019-07-26 2019-10-25 王永德 A kind of smart city service architecture device based on nformation grid service
CN116561725A (en) * 2023-05-17 2023-08-08 广州市融粤家政服务有限公司 Information security type enterprise information management system based on data encryption

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714456B (en) * 2014-01-06 2015-08-19 同济大学 Software action monitoring verification system
US20170124497A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. System for automated capture and analysis of business information for reliable business venture outcome prediction
US10355864B2 (en) * 2017-08-29 2019-07-16 Citrix Systems, Inc. Policy based authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019003233A1 (en) * 2017-06-27 2019-01-03 Kavitha Parthasarathy System and method applied for monitoring, controlling and processing information from remote device through configurable cloud based application.
CN109063464A (en) * 2018-08-16 2018-12-21 杭州市商务委员会(杭州市粮食局) System safety certification and automatic authorization method and system based on big data analysis
CN110378827A (en) * 2019-07-26 2019-10-25 王永德 A kind of smart city service architecture device based on nformation grid service
CN116561725A (en) * 2023-05-17 2023-08-08 广州市融粤家政服务有限公司 Information security type enterprise information management system based on data encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向互联网金融行业的大数据资源服务平台;蒋昌俊;丁志军;王俊丽;闫春钢;;科学通报(第36期);全文 *

Also Published As

Publication number Publication date
CN117081856A (en) 2023-11-17

Similar Documents

Publication Publication Date Title
Fordham et al. Plant extinction risk under climate change: are forecast range shifts alone a good indicator of species vulnerability to global warming?
Toledo-Castro et al. Forest fire prevention, detection, and fighting based on fuzzy logic and wireless sensor networks
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN108229921B (en) National tax and local tax combined data acquisition system and operation method thereof
CN110958109B (en) Light dynamic data integrity auditing method based on hierarchical merck hash tree
CN107169499A (en) A kind of Risk Identification Method and device
CN116127689A (en) Digital twin space construction method and device and computing equipment
CN114785580A (en) Cloud computing data security processing system
CN109120609B (en) Social information reporting method and device based on block chain
CN117081856B (en) Intelligent space analysis platform and early warning method based on cloud computing
Yao et al. Internet of Things positioning technology based intelligent delivery system
CN116757849B (en) Asset management system and method based on block chain
US10089475B2 (en) Detection of security incidents through simulations
CN115514470B (en) Storage method and system for community correction data security
CN112084429B (en) Data processing method, device, electronic equipment and storage medium
WO2020228564A1 (en) Application service method and device
CN114065258A (en) Geographic space data encryption method for mobile terminal
Ivanova ASSESSMENT OF THE PROBABILITY OF CYBERATTACKS ON TRANSPORT MANAGEMENT SYSTEMS.
CN111708996A (en) Enterprise internal management consultation information sharing system based on Internet
CN117134996B (en) Industrial Internet identification information analysis method and system based on block chain
CN116933818B (en) Scenic spot two-dimension code management method, system and storage medium
CN117579388B (en) Risk assessment method, system, equipment and medium for intelligent network interconnection industrial control system
CN117350683B (en) Network management method and system based on paperless approval
CN109756646B (en) Block chain-based vector chapter management method and system
CN113392077B (en) File detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant