CN117294673A - Data resource processing method, data resource processing device and storage medium - Google Patents

Data resource processing method, data resource processing device and storage medium Download PDF

Info

Publication number
CN117294673A
CN117294673A CN202311526158.8A CN202311526158A CN117294673A CN 117294673 A CN117294673 A CN 117294673A CN 202311526158 A CN202311526158 A CN 202311526158A CN 117294673 A CN117294673 A CN 117294673A
Authority
CN
China
Prior art keywords
data
equipment
counterfeit
current
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311526158.8A
Other languages
Chinese (zh)
Other versions
CN117294673B (en
Inventor
钟国辉
周悦
陈康健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Everything Safety Technology Co ltd
Original Assignee
Shenzhen Everything Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Everything Safety Technology Co ltd filed Critical Shenzhen Everything Safety Technology Co ltd
Priority to CN202311526158.8A priority Critical patent/CN117294673B/en
Publication of CN117294673A publication Critical patent/CN117294673A/en
Application granted granted Critical
Publication of CN117294673B publication Critical patent/CN117294673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a data resource processing method, a data resource processing device and a storage medium, wherein the method comprises the following steps: when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and an old equipment merging table, wherein the old equipment merging table is used for storing the equipment data corresponding to the historical counterfeit equipment; if not, determining whether the dumb terminal is newly added counterfeit equipment according to the current equipment data and the counterfeit equipment merging table; if not, generating the coding information of the current equipment data, and integrating the current equipment data into a database. According to the invention, the data of the dummy terminal is obtained through the analysis processing of the old equipment merging table and the counterfeit equipment merging table, and when the data of the dummy terminal is accurate data, the current equipment data is integrated, so that the default processing of the data of the dummy terminal is avoided, and the utilization rate of resources is improved.

Description

Data resource processing method, data resource processing device and storage medium
Technical Field
The present invention relates to the field of data processing, and in particular, to a data resource processing method, a data resource processing device, and a storage medium.
Background
The dummy terminal device mainly relies on the host connected with the dummy terminal device to carry out most data processing tasks, and corresponding actions are executed by receiving instructions of the host. When information of the dumb terminal equipment needs to be collected, the scanning equipment acquires detailed information of the dumb terminal equipment in a mode of scanning a designated IP (Internet Protocol Address, internet communication protocol address) address, and integrates the information into asset data displayed on a webpage.
However, when one dummy terminal device has a plurality of IP addresses or MAC (Media Access Control ) addresses, after the scanning device collects different IP addresses or MAC addresses, the collected asset data is treated as a plurality of different devices and processed, resulting in repeated consumption of resources.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide a data resource processing method, a data resource processing device and a storage medium, which solve the problem of repeated consumption of resources during asset data processing in the prior art.
In order to achieve the above object, the present invention provides a method for processing a data resource, the method comprising the steps of:
when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and an old equipment merging table, wherein the old equipment merging table is used for storing the equipment data corresponding to the historical counterfeit equipment;
if not, determining whether the dumb terminal is newly added counterfeit equipment according to the current equipment data and the counterfeit equipment merging table;
if not, generating the coding information of the current equipment data, and integrating the current equipment data into a database.
Optionally, before the step of determining whether the dummy terminal is a history counterfeit device according to the current device data and the old device combination table when the current device data sent by the dummy terminal is different from the history device data, the method further includes:
when the current equipment data sent by the dumb terminal equipment is received, acquiring network identification information and/or sequence information of the current equipment data;
when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and the old equipment combination table comprises the following steps:
Adding a counterfeit identifier in the current equipment data when the network identifier information is different from the corresponding target network identifier information in the historical equipment data, and/or adding a counterfeit identifier in the current equipment data when the sequence information is different from the corresponding target sequence information in the historical equipment data;
and when the counterfeit identifier exists in the current equipment data, executing the step of determining whether the dumb terminal is a historical counterfeit equipment according to the current equipment data and an old equipment merging table.
Optionally, the step of determining whether the dumb terminal is a history counterfeit device according to the current device data and the old device merging table includes:
based on the network identification information and/or the sequence information, performing counterfeit record query processing on the old equipment merging table;
when the result of the counterfeit record query processing is empty, determining that the dumb terminal is not history counterfeit equipment; or alternatively
And when the result of the counterfeit record query processing is not null, determining a target code corresponding to the query result, updating the current equipment data coverage into the old equipment merging table based on the target code, and determining that the dumb terminal equipment is history counterfeit equipment.
Optionally, the step of determining whether the dumb terminal is a newly added counterfeit device according to the current device data and the counterfeit device combination table includes:
according to the network identification information and/or the sequence information, information query processing is carried out in the imitation equipment merging table;
if the result of the information query processing is null, determining that the dumb terminal is not the newly added counterfeit equipment; or alternatively
If the result of the information query processing is not null, judging whether the network identification information and the corresponding target network identification information in the fake equipment merging table have a containing relationship or not;
if the inclusion relationship exists, determining that the dumb terminal is the newly added counterfeit equipment, if the inclusion relationship does not exist, acquiring target coding information corresponding to the information query processing result, and executing the step of integrating the current equipment data into a database based on the target coding information.
Optionally, after the step of acquiring the network identification information and/or the sequence information of the current device data when the current device data sent by the dummy terminal device is received, the method further includes:
when the current equipment data does not have the counterfeit identification, based on the network identification information and/or the sequence information, performing comparison query processing in the counterfeit equipment merging table;
When the comparison query processing result is empty, performing secondary comparison query processing in the old equipment merging table based on the network identification information and/or the sequence information;
and if the result of the secondary query processing is empty and the data with the inclusion relation with the current equipment data does not exist in the equipment merging table, skipping to execute the step of generating the coding information of the current equipment data and integrating the current equipment data into a database.
Optionally, after the step of performing the comparison query processing in the impersonation device merging table based on the network identification information and/or the sequence information, the method further includes:
when the result of the fake inquiring process is not empty, if the data with the containing relation with the network identification and/or the sequence information does not exist in the fake equipment merging table, the step of integrating the current equipment data into a database is skipped; or alternatively
After the step of performing secondary comparison query processing in the old equipment merging table based on the network identification information and/or the sequence information, the method further comprises the following steps:
and if the result of the secondary comparison query processing is not null, determining a processing identifier corresponding to the result of the secondary comparison query processing, and updating the current equipment data into the old equipment merging table according to the processing identifier.
Optionally, before the step of determining whether the dummy terminal is a history counterfeit device according to the current device data and the old device combination table when the current device data sent by the dummy terminal is different from the history device data, the method further includes:
acquiring the historical equipment data corresponding to the dummy terminal, and constructing an equipment merging table according to the historical equipment data;
acquiring preset counterfeit data, and constructing the counterfeit equipment merging table based on the counterfeit data;
and acquiring historical counterfeit equipment data, and constructing the old equipment merging table according to the historical counterfeit equipment data.
Optionally, the step of generating the encoded information of the current device data and integrating the current device data into a database includes:
determining a corresponding storage address of the network identification information of the current equipment data in the equipment merging table of the database;
and generating coding information of the equipment, and storing the current equipment data into the equipment merging table based on the storage address.
In addition, in order to achieve the above object, the present invention also provides a processing device for a data resource, where the processing device for a data resource includes a memory, a processor, and a processing program for a data resource stored in the memory and capable of running on the processor, where the processing program for a data resource implements the steps of the processing method for a data resource as described above when executed by the processor.
In addition, in order to achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a processing program of a data resource, which when executed by a processor, implements the steps of the processing method of a data resource as described above.
The embodiment of the invention provides a processing method of data resources, a processing device of the data resources and a storage medium, when current equipment data sent by a dummy terminal is different from historical equipment data of the dummy terminal, whether the dummy terminal is historical counterfeit equipment is needed to be judged according to the current equipment data and an old equipment merging table, if not, whether the dummy terminal is newly added counterfeit equipment is further determined according to the current equipment data and the counterfeit equipment merging table, if not, the dummy terminal and corresponding equipment data are not subjected to counterfeit processing, coding information of the current equipment data is generated immediately, and the current equipment data is integrated into a database. It can be seen that by analyzing the current equipment data sent by the dummy terminal, whether the data corresponding to the dummy terminal is counterfeit data or not is analyzed, the current equipment data is prevented from being directly processed as newly added equipment data, repeated consumption of data resources is avoided, and the utilization rate of the resources is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention. In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flowchart illustrating a first embodiment of a method for processing data resources according to the present invention;
FIG. 2 is a schematic diagram of a data processing flow of a method for processing data resources according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a method for processing data resources according to the present invention;
FIG. 4 is a flowchart of a second embodiment of a method for processing data resources according to the present invention;
FIG. 5 is a flowchart illustrating a third embodiment of a method for processing data resources according to the present invention;
fig. 6 is a schematic diagram of a terminal hardware structure of each embodiment of the processing method of the data resource of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the related art, when one dummy terminal device has a plurality of IP addresses or MAC addresses, after the scanning device collects different IP addresses or MAC addresses, the collected asset data is treated as a plurality of different devices and processed, resulting in repeated consumption of resources.
In order to solve the above-mentioned drawbacks, an embodiment of the present invention provides a method for processing data resources, which mainly includes the following steps:
when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and an old equipment merging table, wherein the old equipment merging table is used for storing the equipment data corresponding to the historical counterfeit equipment;
if not, determining whether the dumb terminal is newly added counterfeit equipment according to the current equipment data and the counterfeit equipment merging table;
if not, generating the coding information of the current equipment data, and integrating the current equipment data into a database.
According to the invention, the current equipment data sent by the dummy terminal is analyzed, so that whether the data corresponding to the dummy terminal is counterfeit data or not is analyzed, the current equipment data is prevented from being directly processed as newly added equipment data, the repeated consumption of data resources is avoided, and the utilization rate of the resources is improved.
In order to better understand the above technical solution, exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, the steps of a method for processing data resources of the present invention include:
step S10, when current equipment data sent by a dummy terminal is different from historical equipment data, determining whether the dummy terminal is historical counterfeit equipment according to the current equipment data and an old equipment merging table, wherein the old equipment merging table is used for storing equipment data corresponding to the historical counterfeit equipment;
in this embodiment, when information of a dummy terminal device needs to be collected, a scanning device obtains detailed information of the dummy terminal device by scanning a specified IP address or MAC address, and integrates the information into asset data displayed on a web page. If a piece of dumb terminal equipment has a plurality of MAC addresses or IP addresses, when the scanning equipment scans different IP addresses of the same equipment, the scanning equipment may regard the same as a plurality of equipment, and perform different integration processing on collected asset data, so that resources are repeatedly consumed. Also in this case, the IP or MAC address of the device may be falsified or changed, causing the scanning device to misjudge the device asset, treat the same device as multiple devices, or misclassify the multiple devices as the same device. As a result, network asset management is confusing, and the defense system is overloaded and even crashed with heavy network traffic. In order to ensure the security of the data, it is necessary to avoid using the received counterfeit data as new data of the dumb terminal, that is, to identify the data when the data of different IP addresses or MAC addresses is scanned.
Based on the above, after receiving the current device data sent by the dummy terminal, it is necessary to perform verification processing on the current device data sent by the dummy terminal. In the checking process, the historical equipment data sent by the dummy terminal is required to be acquired, and primary checking processing is carried out on the current equipment data according to the historical equipment data.
Specifically, step S40 is further included before step S10, and when the current device data sent by the dummy terminal device is received, network identification information and/or sequence information of the current device data are obtained.
Referring to fig. 2, when the scanning device receives the current device data sent by the dumb terminal device, and when the network identification information of the current device data is different from the corresponding target network identification information in the historical device data, a counterfeit identifier is added in the current device data; and/or adding a counterfeit identification in the current equipment data when the sequence information is the same as the corresponding target sequence information in the historical equipment data. And then, when the counterfeit identifier exists in the current equipment data, inquiring according to the current equipment data and the data in the old equipment merging table, so as to judge whether the dumb terminal is a historical counterfeit equipment or not, and if so, indicating that the current equipment data is the counterfeit data. The network identification information comprises an IP address and an MAC address, the sequence information is ESN (Electronic Serial Number ), the historical equipment data can be accurate data sent by the dumb terminal at the previous time, or can be any historical data in a preset period, and the historical equipment data is accurate data sent by the dumb terminal.
Illustratively, after receiving the current device data, the IP address of the current device data is completely different from the IP address of the device data sent by the dumb terminal in the previous time, so that a data processing program of the scanning device adds a counterfeit identifier for representing the current device data as counterfeit data. And then taking the IP address of the current equipment data as a query condition, and carrying out query comparison processing in the old equipment merging table, wherein the query result is null, which indicates that the current dumb terminal is not history counterfeit equipment, namely the current equipment data is not history counterfeit data. When the current dummy terminal is judged to be the history counterfeit equipment, the data of the dummy terminal is generally considered to be invaded, and at the moment, a worker is required to repair the dummy terminal.
Optionally, before determining whether the dummy terminal is a history counterfeit device, acquiring the history device data corresponding to the dummy terminal, and constructing a device merging table according to the history device data, where the device merging table is used to store normal device data sent by the dummy terminal. Meanwhile, the history counterfeit equipment data is required to be acquired, and the old equipment merging table is constructed according to the history counterfeit equipment data, so that the old equipment merging table can be considered to store the processed history counterfeit data corresponding to the counterfeit equipment. Further, it is also necessary to acquire preset counterfeit data and construct a counterfeit device merge table based on the preset counterfeit data, where the counterfeit device merge table stores the counterfeit data corresponding to all currently known counterfeit devices, and the counterfeit data contaminates normal device data. When the current device data is acquired, if the old device merging table and the counterfeit device merging table exist, the table does not need to be repeatedly built.
Step S20, if not, determining whether the dumb terminal is a newly added counterfeit device according to the current device data and the counterfeit device merging table;
in this embodiment, please continue to refer to fig. 2, in the query result corresponding to the old device merging table, the current device data is not the data re-imitated by the imitated device, and at this time, query comparison processing needs to be further performed according to the imitated device merging table, so as to determine whether the current device data is illegal imitated data, that is, whether the dumb terminal is newly added imitated device. The process of comparing and inquiring in the merging table of the counterfeit equipment is the same as the process of comparing and inquiring in the merging table of the old equipment, and the inquiring process is carried out according to the network identification or the sequence information. By judging whether the dumb terminal equipment is newly added counterfeit equipment or not, the scanning equipment can be prevented from directly processing the current equipment data after the query processing of the old equipment merging table.
Step S30, if not, generating the coding information of the current equipment data, and integrating the current equipment data into a database.
In this embodiment, please continue to refer to fig. 2, after the current device data has the counterfeit identifier and the current device data is compared with the old device merging table and the query of the counterfeit device merging table, it is indicated that the current dumb terminal is not the counterfeit terminal, and the current device data is not the counterfeit data, and at this time, the current device data may be updated and stored in the device merging table.
Specifically, in the process of integrating and storing, a storage address corresponding to the network identification information of the current device data in the device merging table of the database needs to be determined, then the coding information of the device is generated, and the device data is stored in the device merging table based on the storage address. Wherein the generated encoded information is unique encoded information of the dumb terminal. In the storage process, the data with the same ENS are combined, the data with the same MAC address are combined, and the data with the same IP address are combined. Based on the method, the integration processing of the data resources is completed, and meanwhile, the safety of the current equipment data is improved through multi-level screening processing.
In the technical scheme disclosed in this embodiment, after current device data sent by a dumb terminal is received, an IP address, an MAC address and/or an ENS of the current device data are obtained, immediately when the current IP address, the MAC address and/or the ENS are different from corresponding data in historical device data sent by the dumb terminal at the previous time, a counterfeit identifier is added to the current device data, and then query comparison processing is performed on the current device data in an old device merging table and a counterfeit device merging table respectively, until query results of the old device merging table and the counterfeit device merging table are passed, the current device data are written into the device merging table, and when different IPs, different MAC addresses or ENS of the same device are received, the current device data are prevented from being processed as new device data, namely, resource reuse is avoided, and resource utilization is improved. Meanwhile, the security of data storage is improved through the query comparison processing of the old equipment merging table and the counterfeit equipment merging table.
Referring to fig. 3, in the second embodiment, based on the first embodiment, step S10 includes:
step S11, based on the network identification information and/or the sequence information, performing counterfeit record query processing on the old equipment combination table;
and step S12, when the result of the counterfeit record query processing is empty, determining that the dumb terminal is not history counterfeit equipment.
In this embodiment, the IP address, the MAC address, and/or the ENS may be used as a query condition, and query processing may be performed in the old device merge table, and when the search result is empty, it is indicated that the current device data is not the device data that has been processed and is counterfeited again, that is, the dumb terminal is not a history counterfeiting device.
Optionally, when the result of the query processing of the counterfeit record is not null, determining a target code corresponding to the query result, updating the current device data coverage into the old device merging table based on the target code, and determining that the dumb terminal device is a history counterfeit device. The result of the query processing of the counterfeit record is not null, which indicates that the current device data is the processed device data and is counterfeited again, at this time, the target code fed back by the query result can be determined, the original data of the storage position is deleted according to the storage position corresponding to the target code, and the current device data is stored in the storage position. And then determining the dummy terminal equipment as history counterfeit equipment, and outputting corresponding equipment maintenance information so that staff can maintain the data of the dummy terminal equipment. Based on the method, the processing of the current equipment data of the dumb terminal is completed, and the safety of the current data is ensured.
Optionally, referring to fig. 4, step S20 includes:
step S21, according to the network identification information and/or the sequence information, information inquiry processing is carried out in the imitation equipment combination table;
and S22, if the result of the information query processing is null, determining that the dumb terminal is not the newly added counterfeit equipment.
In this embodiment, the information inquiry process may also be performed in the counterfeit device merge table using the IP address, MAC address, and/or ENS as inquiry conditions.
Optionally, if the result of the information query processing is not null, judging whether a containing relationship exists between the network identification information and the corresponding target network identification information in the merging table of the counterfeit equipment, if so, determining that the dumb terminal is the newly added counterfeit equipment, if not, acquiring target coding information corresponding to the result of the information query processing, and executing the step of integrating the equipment data into a database based on the target coding information. Besides the network identification information, it can also determine whether there is information between ENS, where the relationship refers to whether IP, MAC, or ENS are identical, if there is one item of data identical, it will indicate that the dumb terminal is a newly added counterfeit device, and at this time, it is necessary to prohibit the integration of the current device data into the database. And the IP, MAC or ENS are all completely different, the current device data can be integrated into the database.
In the technical scheme disclosed in this embodiment, the query processing is performed in the old device merging table and the counterfeit device merging table through the IP address, the MAC address and/or the ENS, and the result queried in the old device merging table is not null, which indicates that the current device data belongs to the already processed counterfeit data, at this time, the current device data needs to be updated in the old device merging table in a covering manner, but the query result in the counterfeit device merging table is not null as well, and when the data in the counterfeit device merging table has a containing relationship with the IP address, the MAC address and/or the ENS, the integration of the current device data into the database is prohibited. Therefore, when the current device data belongs to the counterfeit data, the data is required to be updated to the old device merging table in an overlaying mode or is forbidden to be written into the database, and the safety of the original data in the device merging table is improved.
Referring to fig. 5, in a third embodiment, based on any of the foregoing embodiments, after the step of obtaining the network identification information and/or the sequence information of the current device data when receiving the current device data sent by the dummy terminal device in step S40, the method further includes:
step S50, when the current equipment data does not have the counterfeit identification, based on the network identification information and/or the sequence information, performing comparison query processing in the counterfeit equipment combination table;
In this embodiment, when the counterfeit identifier does not exist, it is indicated that different IP, MAC address information and/or different ENS information of the same dumb terminal are not received currently, that is, network identifier information of current device data is the same as corresponding target network identifier information in historical device data, and/or sequence information is the same as corresponding target sequence information in the historical device data. Even so, the current data still needs to be checked, so that the repeated consumption of the data is avoided, and the safety of the data storage processing is improved.
Specifically, referring to fig. 2, when the counterfeit identifier does not exist, the comparison query processing may be performed in the counterfeit device merge table through IP, MAC address, and/or ENS.
Step S60, when the comparison query processing result is empty, performing secondary comparison query processing in the old equipment merging table based on the network identification information and/or the sequence information;
in this embodiment, the result of the comparison query processing is null, which indicates that the current device data is not counterfeit data, and at this time, the secondary comparison query processing can be continuously performed in the old device merging table through the IP, the MAC address and/or the ENS, thereby improving the accuracy of the data analysis processing.
Optionally, when the result of the comparison query processing is not null, it is necessary to continuously determine whether there is data having an inclusion relationship with the IP, MAC address, and/or ENS in the merging table of the counterfeit device. If the data having the inclusion relation with the network identifier and/or the sequence information does not exist in the merging table of the counterfeit equipment, the step of integrating the current equipment data into the database can be directly skipped, so that the data integration efficiency is improved. Similarly, if the data with the inclusion relationship exists in the counterfeit device merge table, the step of integrating the current device data is forbidden.
And step S70, if the result of the secondary query processing is null and the data with the inclusion relation with the current equipment data does not exist in the equipment merging table, skipping to execute the step of generating the coding information of the equipment data and integrating the equipment data into a database.
In this embodiment, the secondary query result is still empty, which indicates that the current device data is not counterfeit data, and when there is no data having an inclusion relationship with the current device data in the device merge table, it indicates that the current device data is brand new data, but not existing data, based on which it is necessary to write the current device data into the device merge table.
Alternatively, if the data having an inclusion relationship with the current device data exists in the device merge table, the current device data is described as existing data, so that writing the current device data into the device merge table may be prohibited to avoid repetitive processing.
Optionally, if the result of the secondary comparison query processing is not null, determining a processing identifier corresponding to the result of the secondary comparison query processing, and updating the current device data into the old device merging table according to the processing identifier. The result of the secondary comparison query processing is not null, which indicates that the current device data is the processed counterfeit data, and the current device data needs to be updated into the old device merging table.
In the technical scheme disclosed in this embodiment, when the current device data does not include the counterfeit identifier, it is indicated that the current device data is data of the same IP, MAC and/or ENS sent by the dumb terminal, and in order to avoid that the data is counterfeit data or existing data, the comparison query processing is performed by combining the counterfeit device merging table and the old device merging table, and after both the counterfeit device merging table and the old device merging table query, the current device data is stored in the device merging table, so that the security of the data storage processing is improved while the repeated consumption of the data is avoided.
In a fourth embodiment, in this embodiment, a specific processing procedure of a processing method for a data resource according to the present invention includes: firstly judging whether the received device data has a counterfeit mark, if so, firstly inquiring an old device table, checking and judging whether the device data has a processed counterfeit record, wherein the presence of the data indicates that the current device is the processed device data, performing counterfeit again, randomly acquiring a unique code in the table, and inserting the data into a counterfeit merging table to delete the data in the old device table. Further, if no data exists in the old equipment merging table, the counterfeit merging table is queried, unique codes assigned to the data are queried, whether the containing relation exists or not, that is, whether the ip/mac/esn is completely the same or not is judged, the containing relation data does not exist in a warehouse, and the containing relation data does not exist in a warehouse. The unique code is directly generated without inquiry, and the data is put into storage.
And when the counterfeit identification does not exist, the counterfeit equipment merging table is required to be polled, whether the current data has counterfeit records or not is checked, if the counterfeit records exist, the fact that the current equipment is counterfeit in a certain dimension (ip/mac/esn) is indicated, whether the inclusion relationship exists or not is judged randomly, the inclusion relationship data does not exist in a warehouse, and the inclusion relationship data does not exist in a warehouse. Further, if no counterfeit record exists in the counterfeit equipment merging table, the old equipment table is queried, and the query result is not null, namely data exists, which indicates that the current equipment is the processed equipment data which is online again, at the moment, the unique code in the table needs to be acquired, and the data is inserted into the equipment merging table to delete the data in the old equipment table. If the query result in the old equipment merging table is empty, the equipment merging table is queried, whether the data in the equipment merging table has a containing relation or not is further judged, the data with the containing relation is not stored, and if the data with the containing relation does not have the containing relation, the unique coded data is generated and stored.
Referring to fig. 6, fig. 6 is a schematic diagram of a terminal structure of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 6, the terminal may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a network interface 1003, and a memory 1004. Wherein the communication bus 1002 is used to enable connected communication between these components. The network interface 1003 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1004 may be a high-speed RAM Memory (Random Access Memory, RAM) or a stable Non-Volatile Memory (NVM), such as a disk Memory. The memory 1004 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal structure shown in fig. 6 is not limiting of the terminal and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 6, a memory 1004, which is a type of computer storage medium, may include an operating system, a data storage module, a network communication module, and a processing program of data resources.
In the terminal shown in fig. 6, the network interface 1003 is mainly used for connecting to a background server, and performing data communication with the background server; the processor 1001 may call a handler of a data resource stored in the memory 1004 and perform the following operations:
when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and an old equipment merging table, wherein the old equipment merging table is used for storing the equipment data corresponding to the historical counterfeit equipment;
if not, determining whether the dumb terminal is newly added counterfeit equipment according to the current equipment data and the counterfeit equipment merging table;
if not, generating the coding information of the current equipment data, and integrating the current equipment data into a database.
Further, the processor 1001 may call a processing program of the data resource stored in the memory 1004, and further perform the following operations:
when the current equipment data sent by the dumb terminal equipment is received, acquiring network identification information and/or sequence information of the current equipment data;
when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and the old equipment combination table comprises the following steps:
Adding a counterfeit identifier in the current equipment data when the network identifier information is different from the corresponding target network identifier information in the historical equipment data, and/or adding a counterfeit identifier in the current equipment data when the sequence information is different from the corresponding target sequence information in the historical equipment data;
and when the counterfeit identifier exists in the current equipment data, executing the step of determining whether the dumb terminal is a historical counterfeit equipment according to the current equipment data and an old equipment merging table.
Further, the processor 1001 may call a processing program of the data resource stored in the memory 1004, and further perform the following operations:
based on the network identification information and/or the sequence information, performing counterfeit record query processing on the old equipment merging table;
when the result of the counterfeit record query processing is empty, determining that the dumb terminal is not history counterfeit equipment; or alternatively
And when the result of the counterfeit record query processing is not null, determining a target code corresponding to the query result, updating the current equipment data coverage into the old equipment merging table based on the target code, and determining that the dumb terminal equipment is history counterfeit equipment.
Further, the processor 1001 may call a processing program of the data resource stored in the memory 1004, and further perform the following operations:
according to the network identification information and/or the sequence information, information query processing is carried out in the imitation equipment merging table;
if the result of the information query processing is null, determining that the dumb terminal is not the newly added counterfeit equipment; or alternatively
If the result of the information query processing is not null, judging whether the network identification information and the corresponding target network identification information in the fake equipment merging table have a containing relationship or not;
if the inclusion relationship exists, determining that the dumb terminal is the newly added counterfeit equipment, if the inclusion relationship does not exist, acquiring target coding information corresponding to the information query processing result, and executing the step of integrating the current equipment data into a database based on the target coding information.
Further, the processor 1001 may call a processing program of the data resource stored in the memory 1004, and further perform the following operations:
when the current equipment data does not have the counterfeit identification, based on the network identification information and/or the sequence information, performing comparison query processing in the counterfeit equipment merging table;
When the comparison query processing result is empty, performing secondary comparison query processing in the old equipment merging table based on the network identification information and/or the sequence information;
and if the result of the secondary query processing is empty and the data with the inclusion relation with the current equipment data does not exist in the equipment merging table, skipping to execute the step of generating the coding information of the current equipment data and integrating the current equipment data into a database.
Further, the processor 1001 may call a processing program of the data resource stored in the memory 1004, and further perform the following operations:
when the result of the fake inquiring process is not empty, if the data with the containing relation with the network identification and/or the sequence information does not exist in the fake equipment merging table, the step of integrating the current equipment data into a database is skipped; or alternatively
After the step of performing secondary comparison query processing in the old equipment merging table based on the network identification information and/or the sequence information, the method further comprises the following steps:
and if the result of the secondary comparison query processing is not null, determining a processing identifier corresponding to the result of the secondary comparison query processing, and updating the current equipment data into the old equipment merging table according to the processing identifier.
Further, the processor 1001 may call a processing program of the data resource stored in the memory 1004, and further perform the following operations:
acquiring the historical equipment data corresponding to the dummy terminal, and constructing an equipment merging table according to the historical equipment data;
acquiring preset counterfeit data, and constructing the counterfeit equipment merging table based on the counterfeit data;
and acquiring historical counterfeit equipment data, and constructing the old equipment merging table according to the historical counterfeit equipment data.
Further, the processor 1001 may call a processing program of the data resource stored in the memory 1004, and further perform the following operations:
determining a corresponding storage address of the network identification information of the current equipment data in the equipment merging table of the database;
and generating coding information of the equipment, and storing the current equipment data into the equipment merging table based on the storage address.
Furthermore, it will be appreciated by those of ordinary skill in the art that implementing all or part of the processes in the methods of the above embodiments may be accomplished by computer programs to instruct related hardware. The computer program comprises program instructions, and the computer program may be stored in a storage medium, which is a computer readable storage medium. The program instructions are executed by at least one processor in the control terminal to carry out the flow steps of the embodiments of the method described above.
Accordingly, the present invention also provides a computer-readable storage medium storing a processing program of a data resource, which when executed by a processor, implements the steps of the processing method of a data resource as described in the above embodiments.
It should be noted that, because the storage medium provided in the embodiments of the present application is a storage medium used to implement the method in the embodiments of the present application, based on the method described in the embodiments of the present application, a person skilled in the art can understand the specific structure and the modification of the storage medium, and therefore, the description thereof is omitted herein. All storage media used in the methods of the embodiments of the present application are within the scope of protection intended in the present application.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flowchart and/or block of the flowchart illustrations and/or block diagrams, and combinations of flowcharts and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. A method for processing a data resource, the method comprising:
when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and an old equipment merging table, wherein the old equipment merging table is used for storing the equipment data corresponding to the historical counterfeit equipment;
If not, determining whether the dumb terminal is newly added counterfeit equipment according to the current equipment data and the counterfeit equipment merging table;
if not, generating the coding information of the current equipment data, and integrating the current equipment data into a database.
2. The method for processing data resources according to claim 1, wherein, before the step of determining whether the dummy terminal is a history counterfeit device according to the current device data and the old device combination table, when the current device data sent by the dummy terminal is different from the history device data, the method further comprises:
when the current equipment data sent by the dumb terminal equipment is received, acquiring network identification information and/or sequence information of the current equipment data;
when the current equipment data sent by the dummy terminal is different from the historical equipment data, determining whether the dummy terminal is the historical counterfeit equipment according to the current equipment data and the old equipment combination table comprises the following steps:
adding a counterfeit identifier in the current equipment data when the network identifier information is different from the corresponding target network identifier information in the historical equipment data, and/or adding a counterfeit identifier in the current equipment data when the sequence information is different from the corresponding target sequence information in the historical equipment data;
And when the counterfeit identifier exists in the current equipment data, executing the step of determining whether the dumb terminal is a historical counterfeit equipment according to the current equipment data and an old equipment merging table.
3. The method for processing data resources according to claim 2, wherein the step of determining whether the dumb terminal is a history counterfeit device according to the current device data and an old device merge table comprises:
based on the network identification information and/or the sequence information, performing counterfeit record query processing on the old equipment merging table;
when the result of the counterfeit record query processing is empty, determining that the dumb terminal is not history counterfeit equipment; or alternatively
And when the result of the counterfeit record query processing is not null, determining a target code corresponding to the query result, updating the current equipment data coverage into the old equipment merging table based on the target code, and determining that the dumb terminal equipment is history counterfeit equipment.
4. The method for processing data resources according to claim 2, wherein the step of determining whether the dummy terminal is a newly added counterfeit device based on the current device data and the counterfeit device merge table includes:
According to the network identification information and/or the sequence information, information query processing is carried out in the imitation equipment merging table;
if the result of the information query processing is null, determining that the dumb terminal is not the newly added counterfeit equipment; or alternatively
If the result of the information query processing is not null, judging whether the network identification information and the corresponding target network identification information in the fake equipment merging table have a containing relationship or not;
if the inclusion relationship exists, determining that the dumb terminal is the newly added counterfeit equipment, if the inclusion relationship does not exist, acquiring target coding information corresponding to the information query processing result, and executing the step of integrating the current equipment data into a database based on the target coding information.
5. The method for processing data resources according to claim 2, wherein after the step of acquiring network identification information and/or sequence information of the current device data when the current device data sent by the dummy terminal device is received, the method further comprises:
when the current equipment data does not have the counterfeit identification, based on the network identification information and/or the sequence information, performing comparison query processing in the counterfeit equipment merging table;
When the comparison query processing result is empty, performing secondary comparison query processing in the old equipment merging table based on the network identification information and/or the sequence information;
and if the result of the secondary query processing is empty and the data with the inclusion relation with the current equipment data does not exist in the equipment merging table, skipping to execute the step of generating the coding information of the current equipment data and integrating the current equipment data into a database.
6. The method for processing data resources according to claim 5, wherein after the step of performing the comparison query processing in the impersonation device merge table based on the network identification information and/or the sequence information, further comprising:
when the result of the fake inquiring process is not empty, if the data with the containing relation with the network identification and/or the sequence information does not exist in the fake equipment merging table, the step of integrating the current equipment data into a database is skipped; or alternatively
After the step of performing secondary comparison query processing in the old equipment merging table based on the network identification information and/or the sequence information, the method further comprises the following steps:
And if the result of the secondary comparison query processing is not null, determining a processing identifier corresponding to the result of the secondary comparison query processing, and updating the current equipment data into the old equipment merging table according to the processing identifier.
7. The method for processing data resources according to claim 1, wherein, before the step of determining whether the dummy terminal is a history counterfeit device according to the current device data and the old device combination table, when the current device data sent by the dummy terminal is different from the history device data, the method further comprises:
acquiring the historical equipment data corresponding to the dummy terminal, and constructing an equipment merging table according to the historical equipment data;
acquiring preset counterfeit data, and constructing the counterfeit equipment merging table based on the counterfeit data;
and acquiring historical counterfeit equipment data, and constructing the old equipment merging table according to the historical counterfeit equipment data.
8. The method of processing data resources of claim 7, wherein the step of generating encoded information for the current device data and integrating the current device data into a database comprises:
determining a corresponding storage address of the network identification information of the current equipment data in the equipment merging table of the database;
And generating coding information of the equipment, and storing the current equipment data into the equipment merging table based on the storage address.
9. A processing apparatus for a data resource, the processing apparatus for a data resource comprising: memory, a processor and a processing program of a data resource stored on the memory and executable on the processor, which processing program of a data resource, when executed by the processor, implements the steps of the method of processing a data resource according to any of claims 1 to 8.
10. A computer-readable storage medium, on which a processing program of a data resource is stored, which processing program of a data resource, when being executed by a processor, implements the steps of the processing method of a data resource according to any one of claims 1 to 8.
CN202311526158.8A 2023-11-16 2023-11-16 Data resource processing method, data resource processing device and storage medium Active CN117294673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311526158.8A CN117294673B (en) 2023-11-16 2023-11-16 Data resource processing method, data resource processing device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311526158.8A CN117294673B (en) 2023-11-16 2023-11-16 Data resource processing method, data resource processing device and storage medium

Publications (2)

Publication Number Publication Date
CN117294673A true CN117294673A (en) 2023-12-26
CN117294673B CN117294673B (en) 2024-02-23

Family

ID=89253757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311526158.8A Active CN117294673B (en) 2023-11-16 2023-11-16 Data resource processing method, data resource processing device and storage medium

Country Status (1)

Country Link
CN (1) CN117294673B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577645A (en) * 2009-06-12 2009-11-11 北京星网锐捷网络技术有限公司 Method and device for detecting counterfeit network equipment
US20150172289A1 (en) * 2013-12-18 2015-06-18 Electronics And Telecommunications Research Institute Apparatus and method for identifying rogue device
CN110175822A (en) * 2019-06-03 2019-08-27 京东方科技集团股份有限公司 A kind of equipment account management method and system
CN112491888A (en) * 2020-11-27 2021-03-12 深圳万物安全科技有限公司 Method and system for preventing equipment from being falsely used
CN115314319A (en) * 2022-08-26 2022-11-08 绿盟科技集团股份有限公司 Network asset identification method and device, electronic equipment and storage medium
CN116032591A (en) * 2022-12-23 2023-04-28 迈普通信技术股份有限公司 Dummy terminal counterfeiting identification method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577645A (en) * 2009-06-12 2009-11-11 北京星网锐捷网络技术有限公司 Method and device for detecting counterfeit network equipment
US20150172289A1 (en) * 2013-12-18 2015-06-18 Electronics And Telecommunications Research Institute Apparatus and method for identifying rogue device
CN110175822A (en) * 2019-06-03 2019-08-27 京东方科技集团股份有限公司 A kind of equipment account management method and system
CN112491888A (en) * 2020-11-27 2021-03-12 深圳万物安全科技有限公司 Method and system for preventing equipment from being falsely used
CN115314319A (en) * 2022-08-26 2022-11-08 绿盟科技集团股份有限公司 Network asset identification method and device, electronic equipment and storage medium
CN116032591A (en) * 2022-12-23 2023-04-28 迈普通信技术股份有限公司 Dummy terminal counterfeiting identification method and system

Also Published As

Publication number Publication date
CN117294673B (en) 2024-02-23

Similar Documents

Publication Publication Date Title
CN106453415B (en) Block chain-based equipment authentication method, authentication server and user equipment
CN112800404B (en) Cross-link access control method and device
CN103841239A (en) Method and device for verifying authenticity of terminal
CN110704816B (en) Interface cracking recognition method, device, equipment and storage medium
CN104869019A (en) Feedback method and apparatus for positioning faults, and server
CN110278192A (en) Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet
KR20190015327A (en) Methods and Devices to Prevent Servers from Attacking
CN105549996B (en) Application program updating method of mobile terminal and mobile terminal
CN111913878A (en) Program analysis result-based bytecode instrumentation method, device and storage medium
CN110659019B (en) Parameter verification method, device and server
CN112769871A (en) Cross-chain access control method and device
CN109684878A (en) One kind being based on block chain technology privacy information tamper resistant method and system
CN111026765A (en) Dynamic processing method, equipment, storage medium and device for strictly balanced binary tree
CN110969387A (en) Order distribution method, server, terminal and system
CN117294673B (en) Data resource processing method, data resource processing device and storage medium
CN106529281A (en) Executable file processing method and device
CN112433936A (en) Test method, test device and storage medium
CN112347138A (en) Strategy matching method, device, equipment and readable storage medium
CN112613893A (en) Method, system, equipment and medium for identifying malicious user registration
CN111885088A (en) Log monitoring method and device based on block chain
CN111949363A (en) Service access management method, computer equipment, storage medium and system
CN115952515A (en) Data security processing method and device based on big data
CN112732676B (en) Block chain-based data migration method, device, equipment and storage medium
CN111125567A (en) Equipment marking method and device, electronic equipment and storage medium
CN110740062A (en) Breakpoint resume method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant