WO2022082891A1 - 大数据采集方法、系统、计算机设备及其存储介质 - Google Patents

大数据采集方法、系统、计算机设备及其存储介质 Download PDF

Info

Publication number
WO2022082891A1
WO2022082891A1 PCT/CN2020/127947 CN2020127947W WO2022082891A1 WO 2022082891 A1 WO2022082891 A1 WO 2022082891A1 CN 2020127947 W CN2020127947 W CN 2020127947W WO 2022082891 A1 WO2022082891 A1 WO 2022082891A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
code
server
data
decompression
Prior art date
Application number
PCT/CN2020/127947
Other languages
English (en)
French (fr)
Inventor
彭加山
彭晓芳
Original Assignee
苏州莱锦机电自动化有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州莱锦机电自动化有限公司 filed Critical 苏州莱锦机电自动化有限公司
Publication of WO2022082891A1 publication Critical patent/WO2022082891A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC

Definitions

  • the invention relates to the technical field of big data collection, in particular to a big data collection method, system, computer equipment and storage medium thereof.
  • the traditional big data collection mainly uses Internet technology to realize remote data collection, collects various information generated by users when using the Internet through collection software, and after multiple aggregation and forwarding, is finally sent to the big data platform for analysis and application. data source.
  • the purpose of the present invention is to provide a big data collection method, system, computer equipment and storage medium thereof, so as to solve the problems raised in the above background art.
  • the present invention provides the following technical solutions:
  • the client obtains relevant Internet data, extracts relevant Internet data and generates a temporary database
  • the verification terminal intermittently sends verification information to the server.
  • the verification information is composed of two parts: decompression code and verification code.
  • the decompression code is randomly generated before sending the verification information and has no regularity.
  • the verification code is: The content is fixed and the relative position of the decompression code and the verification code cannot be changed;
  • the server After receiving the verification information, the server will record the decompression code and feed back the verification code to the verification terminal;
  • the verification terminal After the verification terminal obtains the verification code, it will extract the Internet data in the temporary database of the client, and encrypt and pressurize the Internet data to generate a transition file;
  • the server receives the transition file and decompresses it through decompression encoding.
  • the method for generating the described temporary database comprises the following specific steps:
  • the verification terminal sends verification information
  • the server extracts the verification information and feeds back the verification code to the verification terminal after recording the decompression code;
  • the server cannot extract the verification information or the extracted verification information is incomplete, it will not respond.
  • the method further includes: when the verification terminal outputs verification information for many times and cannot get feedback, the temporary folder will continuously increase the capacity along with the uninterrupted extraction of Internet data. When a certain threshold is reached, a new temporary folder will be generated again, and then the extracted Internet data will be stored in it and the original temporary folder will be frozen.
  • a big data collection system the collection system includes;
  • the client is used to obtain relevant Internet data, extract relevant Internet data and generate a temporary database
  • the verification terminal is used for intermittently sending verification information to the server.
  • the verification information is composed of two parts: decompression code and verification code.
  • the decompression code is randomly generated before sending the verification information and has no regularity.
  • the verification code is fixed content and the relative positions of the decompression code and the verification code cannot be changed; after obtaining the verification code, the Internet data in the temporary database of the client will be extracted, and the Internet data will be encrypted and compressed to generate a transition file ;
  • the server is used for recording the decompression code after receiving the verification information and feeding back the verification code to the verification terminal; receiving the transition file and decompressing it through the decompression code.
  • the described client comprises the following steps:
  • the verification terminal sends verification information to the server intermittently.
  • the verification information is composed of two parts: a decompression code and a verification code.
  • the decompression code is randomly generated before sending the verification information without regularity.
  • the verification code is Fixed encoding and the relative positions of the decompression encoding and verification encoding cannot be changed;
  • the server When the server receives the verification information, it will extract the decompression code and verification code, and if the verification code is complete, it will send the same verification code to the verification terminal;
  • the verification end After receiving the verification code, the verification end will extract the temporary folder in the temporary database and its internal Internet data and encrypt and pressurize it to generate a transition file;
  • the server After the server receives the transition file from the verification end, it restores it to the original data using the extracted decompression code
  • the server When the server cannot receive the verification information or the verification information is incomplete or incorrect, the server will not send the verification code to the verification terminal.
  • the temporary folder when the verification terminal cannot receive the verification code from the server for a long time when the network is disconnected or the network is unstable, the temporary folder will increase the capacity with the continuous extraction of Internet data. It keeps increasing, and when it reaches a certain threshold, a new temporary folder will be generated again, and then the extracted Internet data will be stored in it and the original temporary folder will be frozen.
  • a computer device comprising a display screen, a memory, a processor, and a computer program, wherein the memory stores a computer program, and when the computer program is executed by the processor, the processing The controller executes the steps of the big data collection method.
  • a readable storage medium a computer program is stored on the readable storage medium, and when the computer program is executed by a processor, the processor executes the method of the big data collection method. step.
  • the beneficial effects of the present invention are: in the process of data collection, the client can initially screen and classify huge real-time data, which can reduce the amount of data and thus reduce the transmission load;
  • the verification information sent by the server can effectively judge whether the current network is in a stable state according to whether the feedback is obtained, so as to avoid data loss due to the interruption of network instability during the transmission process; in addition, the decompression code that changes in real time can effectively prevent data leakage Or leaked when intercepted by others, the security is higher.
  • FIG. 1 is a network architecture diagram of a big data collection method applicable to an embodiment of the present invention provided by an embodiment of the present invention.
  • FIG. 2 is a flowchart of a big data collection method provided in an embodiment of the present invention.
  • FIG. 3 is a flowchart of generating a temporary database provided in an embodiment of the present invention.
  • FIG. 4 is a flow chart of the feedback loop between the verification terminal and the server.
  • FIG. 5 is a schematic structural diagram of a big data collection system provided in an embodiment of the present invention.
  • FIG. 6 is a flowchart for generating a temporary database provided in another preferred embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of an apparatus for generating a temporary database according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a computer device where a client is located in an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of a connection relationship between a readable storage medium and a processor provided by an implementation of the present invention.
  • the Internet technology is mainly used to realize remote data collection.
  • Various information generated when users use the Internet are collected through collection software, and after many times of aggregation and forwarding, they are finally sent to the big data platform for analysis and application. data source.
  • the amount of data generated in real time by the data source is huge, and the frequency of data transmission is high, which puts great pressure on the collection server and the transmission network.
  • the transmission network is unstable, the data collection and transmission process is prone to data leakage, loss and other problems. Security is poor.
  • the client obtains relevant Internet data, extracts the relevant Internet data, and generates a temporary database;
  • the verification terminal intermittently sends verification information to the server, and the verification information consists of two parts: decompression code and verification code.
  • the decompression code is randomly generated before sending the verification information, and has no regularity, the verification code is fixed content and the relative position of the decompression code and the verification code cannot be changed;
  • the server receives the verification code.
  • the decompression code will be recorded and the verification code will be fed back to the verification terminal; after the verification terminal obtains the verification code, the Internet data in the temporary database of the client will be extracted, and the Internet data will be encrypted and compressed to generate a transition file; The server receives the transition file and decompresses it through decompression coding, thereby realizing data collection.
  • Figure 2 shows the implementation process of the big data collection method in the present invention.
  • the big data collection method is applied to a device that can connect to the Internet in real time.
  • the device can be a device that can communicate with a mobile phone, a tablet computer, a computer, etc.
  • the described big data collection methods are detailed as follows:
  • step S100 the client obtains relevant Internet data, extracts the relevant Internet data, and generates a temporary database.
  • the client is background software running on devices that can communicate, such as a mobile phone, a tablet computer, and a computer used by the user.
  • devices such as a mobile phone, a tablet computer, and a computer used by the user.
  • various information generated in real time will be automatically recorded by the running background software, and a temporary database will be generated to store the data.
  • the background software is also a background program, which is a program that is not directly contacted by the user. If it is on a machine, the program that the user is operating is usually called the foreground program, and the program that the user is not operating but is running (such as system services) is called the background program.
  • the background software described here will run automatically when the device is turned on and have the function of recording device usage data in real time without affecting the normal use of the device. The specific type is not limited here.
  • FIG. 3 shows a method for generating the temporary database in an embodiment of the present invention, which specifically includes the following steps:
  • Step S101 obtaining relevant Internet data
  • the Internet data is recorded and obtained in real time by background software running in the device.
  • Step S102 extract the non-repeated items and complete items in the Internet data
  • Step S103 create a temporary folder and name it by date and time
  • Step S104 inputting the extracted Internet data into the temporary folder to generate the temporary database.
  • the filtered valid data is stored in the history folder, and the temporary folder is named with date and time, which can tell the earliest time when the data in the temporary folder was collected, so as to avoid other temporary files. There is confusion between the clips, unrecognizable.
  • Step S200 the verification terminal intermittently sends verification information to the server, and the verification information is composed of two parts: a decompression code and a verification code, and the decompression code is randomly generated before sending the verification information without regularity.
  • the verification code is fixed content and the relative position of the decompression code and the verification code cannot be changed;
  • the verification terminal sends verification information to the server at regular intervals
  • the decompression code and the verification code here can be regarded as a string of letters, numbers or other characters.
  • the verification information can be expressed as "decompression encoding + separation character + verification encoding", where the separation character is a fixed character and cannot be used as a component of decompression encoding and verification encoding.
  • the decompression code is a string temporarily generated before sending the verification information, and it does not contain separator characters.
  • the verification end will record and save the decompression code, and will regenerate the decompression code and delete the last transmission when the verification information is sent next time.
  • the decompression code recorded when verifying the information.
  • the verification code is a fixed string, and the relative position to the decompression code cannot be changed.
  • Step S300 the server will record the decompression code after receiving the verification information and feed back the verification code to the verification terminal;
  • the server after receiving the verification information, the server will identify it and extract the character string after the separated characters and compare it with the verification code to determine the stability of the network. When the extracted character string is the same as the verification code, this If the verification process is successful, the server will record and save the decompression code in the verification information, and feed back the verification code to the verification terminal; when the extracted string is different from the verification code, the verification process fails and the server does not respond.
  • Step S301 the verification terminal sends verification information
  • Step S302 the server extracts the verification information and records the decompression code and the verification code
  • Step S303 the server compares the extracted verification code with the verification code in the database; if the comparison results are the same, then perform step S304; if the comparison results are different, end the process;
  • Step S304 the server sends the verification code to the verification terminal.
  • Step S400 after the verification terminal obtains the verification code, it will extract the Internet data in the temporary database of the client, and encrypt and pressurize the Internet data to generate a transition file;
  • the verification end after the verification end receives the feedback from the server, it will compare the obtained feedback information with the verification code, so as to determine again whether the network transmission is stable.
  • verify the The terminal will extract the temporary folder and its internal data in the temporary database, and encrypt and compress it into a transition file, and the decompression password of the transition file is consistent with the decompression code recorded by the verification terminal;
  • the verification end deletes the recorded decompression codes and repeats step S300.
  • Step S500 the server receives the transition file and decompresses it through decompression encoding.
  • the decompression code it uses to decompress the transition file will be deleted when the verification information is received again.
  • FIG. 6 shows another preferred embodiment provided by the present invention.
  • the big data collection method further includes the following steps:
  • Step S600 detecting whether the temporary folder capacity is equal to the set threshold, when the temporary folder capacity is equal to the set threshold, repeat steps S103 and S104 and freeze the original temporary folder; When it is less than the set threshold, go to step S104.
  • FIG. 5 shows a schematic structural diagram of a big data collection system further provided in an embodiment of the present invention.
  • the big data collection system 10 includes:
  • the client terminal 11 is used to collect various information generated by the user when browsing the Internet; remove the repetitive and useless parts of the collected Internet information, and generate a temporary database for storing the filtered data;
  • the main body of the client 11 is an Internet device with communication capability, and the device may be a mobile phone, a tablet computer, a computer, etc., which is not specifically limited here.
  • the verification terminal 12 is used for intermittently sending verification information and extracting the temporary folder in the temporary database and its internal Internet data, encrypting it and pressing it to generate a transition file;
  • the server 13 is used for receiving the verification information and feeding back the verification code and restoring the transition file to the original data.
  • FIG. 7 shows a schematic structural diagram of an apparatus for generating a temporary database, which includes a client 11 and a verification terminal 12 .
  • the computer device 20 includes a memory 21, a processor 22, and a background program 23, wherein the memory 21 stores the background program 23 , when the background program 23 is executed by the processor 22, the processor 22 is made to execute the steps of the big data collection method.
  • the computer device may also be a notebook computer, a personal digital assistant (Personal Digital Assistant) Devices that can communicate, such as Digital Assistant, PDA), tablet computers, and mobile phones.
  • a personal digital assistant Personal Digital Assistant
  • PDA Personal Digital Assistant
  • FIG. 9 shows a schematic diagram of a readable storage medium provided by the implementation of the present invention.
  • the readable storage medium 30 stores a background program 23.
  • the computer program 23 is executed by the processor 22, the processor 22. Perform the steps of the big data collection method.
  • a computer program may be divided into one or more modules, and the one or more modules are stored in a memory and executed by a processor to accomplish the present invention.
  • One or more modules may be a series of computer program instruction segments capable of accomplishing specific functions, and the instruction segments are used to describe the execution process of the computer program in the terminal device.
  • the above-mentioned computer program can be divided into units or modules of the berth status display system provided by each of the above-mentioned system embodiments.
  • the above description of the terminal device is only an example, and does not constitute a limitation on the terminal device, and may include more or less components than the above description, or combine some components, or different components, such as It can include input and output devices, network access devices, buses, etc.
  • the so-called processor may be a central processing unit (Central Processing Unit, CPU), or other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), Application Specific Integrated Circuit (ASIC), Off-the-shelf Programmable Gate Array (Field-Programmable Gate Array) Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor can be a microprocessor or the processor can also be any conventional processor, etc.
  • the above-mentioned processor is the control center of the above-mentioned terminal equipment, and uses various interfaces and lines to connect various parts of the entire user terminal.
  • the above-mentioned memory can be used to store computer programs and/or modules, and the above-mentioned processor implements various functions of the above-mentioned terminal device by running or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory.
  • the memory can mainly include a stored program area and a stored data area, wherein the stored program area can store the operating system, application programs required for at least one function (such as information collection template display function, product information release function, etc.), etc.; Store the data created according to the use of the berth status display system (such as product information collection templates corresponding to different product types, product information that different product providers need to publish, etc.), etc.
  • the memory may include high-speed random access memory, and may also include non-volatile memory such as hard disk, internal memory, plug-in hard disk, Smart Media Card (SMC), Secure Digital (SD) card, Flash Card, at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • non-volatile memory such as hard disk, internal memory, plug-in hard disk, Smart Media Card (SMC), Secure Digital (SD) card, Flash Card, at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the modules/units integrated in the terminal equipment are implemented in the form of software functional units and sold or used as independent products, they may be stored in a computer-readable storage medium.
  • the present invention realizes all or part of the modules/units in the system of the above-mentioned embodiments, and can also be completed by instructing the relevant hardware through a computer program, and the above-mentioned computer program can be stored in a computer-readable storage medium, the When the computer program is executed by the processor, the functions of the above-described various system embodiments can be realized.
  • the computer program includes computer program code
  • the computer program code may be in the form of source code, object code, executable file or some intermediate forms, and the like.
  • the computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U disk, removable hard disk, magnetic disk, optical disk, computer memory, Read-Only Memory (ROM, Read-Only Memory) Memory), random access memory (RAM, Random Access Memory), electrical carrier signals, telecommunication signals, and software distribution media, etc.
  • the big data collection method provided in the embodiment of the present invention obtains relevant Internet data through the client, extracts the relevant Internet data, and generates a temporary database; the verification terminal intermittently sends verification information to the server, and the verification information is encoded by decompression and encoding.
  • the verification code consists of two parts, the decompression code is randomly generated before sending the verification information, and has no regularity, the verification code is fixed content and the relative position of the decompression code and the verification code cannot be changed;
  • the server After receiving the verification information, the server will record the decompression code and feed back the verification code to the verification terminal; after the verification terminal obtains the verification code, it will extract the Internet data in the temporary database of the client, and encrypt and pressurize the Internet data.
  • a transition file is generated; the server receives the transition file, and decompresses it through decompression coding, thereby realizing data collection.
  • the client can perform initial screening and classification of huge real-time data, which can reduce the amount of data and thus reduce the transmission load; and the verification terminal sends verification information to the server intermittently, which can be effectively judged according to whether feedback is obtained.
  • the decompression code that changes in real time can effectively prevent data leakage or leakage when it is intercepted by others, and the security is higher.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

大数据采集方法、系统、计算机设备及其存储介质,通过客户端提取相关的互联网数据并生成临时数据库(S100);验证端发送验证信息至服务器(S200);所述的服务器在接收到验证信息后会收录解压编码并向验证端反馈验证编码(S300);所述的验证端提取客户端的临时数据库内的互联网数据并生成过渡文件(S400);所述的服务器接收所述的过渡文件,并通过解压编码将其解压(S500)。通过在数据采集过程中对庞大的实时数据进行筛选分类,能够减小数据量从而降低传输负荷;而通过验证端间歇性的向服务器发送验证信息可以根据是否得到反馈来有效的判断当前网络是否处于稳定状况;另外通过实时变化的解压编码更可以有效防止数据泄露或被他人拦截时出现泄密,安全性更高。

Description

大数据采集方法、系统、计算机设备及其存储介质 技术领域
本发明涉及大数据采集技术领域,具体涉及一种大数据采集方法、系统、计算机设备及其存储介质。
背景技术
“大数据”是需要新处理模式才能具有更强的决策力、洞察发现力和流程优化能力来适应海量、高增长率和多样化的信息资产。麦肯锡全球研究所给出的定义是:一种规模大到在获取、存储、管理、分析方面大大超出了传统数据库软件工具能力范围的数据集合,具有海量的数据规模、快速的数据流转、多样的数据类型和价值密度低四大特征。
而传统的大数据的采集主要是运用互联网技术实现远程数据采集,通过采集软件收集用户使用互联网时所产生的各种信息,并经过多次汇聚转发,最终发送给大数据平台作为分析和应用的数据源。
技术问题
但是数据源实时产生的数据量巨大,数据传输频率高,对采集服务器和传输网络的压力非常大,在传输网络不稳定的情况下,数据采集传输过程易发生数据泄露、丢失等问题,数据的安全性较差。
技术解决方案
本发明的目的在于提供一种大数据采集方法、系统、计算机设备及其存储介质,以解决上述背景技术中提出的问题。
为实现上述目的,本发明提供如下技术方案:
客户端获取相关的互联网数据,提取相关的互联网数据并生成临时数据库;
验证端间歇性地发送验证信息至服务器,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码在发送验证信息之前随机生成,不具有规律性,所述的验证编码为固定内容且所述的解压编码和验证编码的相对位置不能改变;
所述的服务器在接收到验证信息后会收录解压编码并向验证端反馈验证编码;
所述的验证端获取验证编码之后会提取客户端的临时数据库内的互联网数据,并将所述的互联网数据进行加密加压后生成过渡文件;
所述的服务器接收所述的过渡文件,并通过解压编码将其解压。
作为本发明进一步的方案:生成所述的临时数据库的方法包括以下具体步骤:
获取相关的互联网数据;
提取所述的互联网数据中的非重复项;
建立临时文件夹,并按日期和时间对其命名;
输入提取后的互联网数据至所述的临时文件夹中,生成所述的临时数据库。
作为本发明进一步的方案:所述的验证端和服务器之间进行以下步骤:
验证端发送验证信息;
服务器提取验证信息并在记录解压编码后向验证端反馈验证编码;
服务器若无法提取验证信息或者提取的验证信息不完整时,则不作应答。
作为本发明进一步的方案:所述的方法还包括:当验证端多次输出验证信息而得不到反馈时,临时文件夹会随着不间断的提取的互联网数据而使得容量不断增加,当增加到一定阈值时会再次生成新的临时文件夹,而接下来所提取的互联网数据会被存入其中并将原先的临时文件夹冻结。
作为本发明进一步的方案:一种大数据采集系统,所述的采集系统包括;
客户端,用于获取相关的互联网数据,并提取相关的互联网数据并生成临时数据库;
验证端,用于间歇性地发送验证信息至服务器,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码在发送验证信息之前随机生成,不具有规律性,所述的验证编码为固定内容且所述的解压编码和验证编码的相对位置不能改变;获取验证编码之后会提取客户端的临时数据库内的互联网数据,并将所述的互联网数据进行加密加压后生成过渡文件;
服务器,用于接收到验证信息后收录解压编码并向验证端反馈验证编码;接收所述的过渡文件,并通过解压编码将其解压。
作为本发明进一步的方案:所述的客户端包括以下步骤:
获取来自所收集的相关互联网数据;
剔除所述的互联网数据中的重复项和残缺项等无用数据;
整合所筛选出的互联网数据,并将其存储在临时文件夹中,所述的临时文件夹按照日期和时间进行命名以避免重复;
提取所有的所述的临时文件夹及其内部数据生成临时数据库。
作为本发明进一步的方案:所述的验证端与服务器之间进行如下步骤实现:
验证端向服务器间歇性的发送验证信息,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码为发送验证信息前随机生成,不具有规律性,所述的验证编码为固定编码且所述的解压编码和验证编码的相对位置不能改变;
当服务器在接收到验证信息之后会提取其中的解压编码和验证编码,若验证编码完整则向验证端发送相同的验证编码;
验证端在接收到验证编码之后会提取将临时数据库中的临时文件夹及其内部的互联网数据并将其加密加压后生成过渡文件;
服务器在接收到来自验证端的过渡文件后,利用提取的解压编码将其还原成原始数据;
当服务器无法接收到验证信息或者验证信息不完整和错误时,服务器则不会向验证端发送验证编码。
作为本发明进一步的方案:所述的验证端在断网或者网络不稳定的情况下,长期无法接收到来自服务器的验证编码时,临时文件夹会随着不间断的提取的互联网数据而使得容量不断增加,当增加到一定阈值时会再次生成新的临时文件夹,而接下来所提取的互联网数据会被存入其中并将原先的临时文件夹冻结。
作为本发明进一步的方案:一种计算机设备,包括显示屏、存储器、处理器以及计算机程序,其中所述存储器中存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器执行所述的大数据采集方法的步骤。
作为本发明进一步的方案:一种可读存储介质,所述可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,使得所述处理器执行所述的大数据采集方法的步骤。
有益效果
与现有技术相比,本发明的有益效果是:在数据采集过程中客户端可以对庞大的实时数据进行初期筛选分类,能够减小数据量从而降低传输负荷;而通过验证端间歇性的向服务器发送验证信息可以根据是否得到反馈来有效的判断当前网络是否处于稳定状况,从而避免在传输过程因为网络不稳定被打断而造成数据丢失;另外通过实时变化的解压编码更可以有效防止数据泄露或被他人拦截时出现泄密,安全性更高。
附图说明
在为了更清楚地说明本发明实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明中的一些实施例。
图1为本发明实施例提供的适用于本发明实施例的一种大数据采集方法的网络架构图。
图2为本发明是实施例中提供的一种大数据采集方法的流程图。
图3为本发明实施例中提供的生成临时数据库的流程图。
图4为验证端与服务器之间的反馈回路的流程图。
图5为本发明实施例中提供的一种大数据采集系统的结构示意图。
图6为本发明另一个优选的实施例中提供的用于生成临时数据库的流程图。
图7为本发明实施例提供的用于生成临时数据库的装置的结构示意图。
图8为本发明实施例中客户端所在的计算机设备的结构示意图。
图9为本发明实施提供的一种可读存储介质与处理器的连接关系示意图。
本发明的实施方式
在下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
需要说明,若本发明实施例中有方向性指示(诸如上、下、左、右、前、后......),则其仅用于解释在某一特定姿态下各部件之间的相对位置关系、运动情况等,如果该特定姿态发生改变时,则该方向性指示也相应地随之改变。
另外,若在本发明中涉及“第一”、“第二”等的描述,则其仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本发明要求的保护范围之内。
以下结合具体实施例对本发明的具体实现进行详细描述:
在传统的大数据的采集主要是运用互联网技术实现远程数据采集,通过采集软件收集用户使用互联网时所产生的各种信息,并经过多次汇聚转发,最终发送给大数据平台作为分析和应用的数据源。而据源实时产生的数据量巨大,数据传输频率高,对采集服务器和传输网络的压力非常大,在传输网络不稳定的情况下,数据采集传输过程易发生数据泄露、丢失等问题,数据的安全性较差。
在本实施例中,通过客户端获取相关的互联网数据,提取相关的互联网数据并生成临时数据库;验证端间歇性地发送验证信息至服务器,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码在发送验证信息之前随机生成,不具有规律性,所述的验证编码为固定内容且所述的解压编码和验证编码的相对位置不能改变;所述的服务器在接收到验证信息后会收录解压编码并向验证端反馈验证编码;所述的验证端获取验证编码之后会提取客户端的临时数据库内的互联网数据,并将所述的互联网数据进行加密加压后生成过渡文件;所述的服务器接收所述的过渡文件,并通过解压编码将其解压,从而实现数据的采集。
实施例1
图2示出了本发明中大数据采集方法的的实现流程,该大数据采集方法应用于能够实时连接互联网的设备,该设备可以是手机、平板电脑和计算机等可以通信的设备,此处不做具体限定,所述的大数据采集方法详述如下:
步骤S100,客户端获取相关的互联网数据,提取相关的互联网数据并生成临时数据库。
在本发明实施例中,所述的客户端为用户所使用的手机、平板电脑和计算机等可以通信的设备上所运行的后台软件。当上述设备被使用时,其实时产生的各种信息会被运行的后台软件所自动收录,并生成临时数据库用于存储数据。
所述的后台软件也即是后台程序,是非用户直接接触的程序。如果是一台机器上,通常把用户正在操作的程序称为前台程序,而用户没有操作但也在运行的程序(如系统服务)称为后台程序。此处所述的后台软件会在设备开启时自动运行和具有实时记录设备使用数据的功能且不会影响设备的正常使用,具体类型此处不作限定。
另外,在图3中示出了本发明实施例中生成所述的临时数据库的方法,其具体包括如下步骤:
步骤S101,获取相关的互联网数据;
在本发明实施例中,所述的互联网数据由设备中运行的后台软件所实时记录获得。
步骤S102,提取所述的互联网数据中的非重复项和完整项;
步骤S103,建立临时文件夹,并按日期和时间对其命名;
步骤S104,输入提取后的互联网数据至所述的临时文件夹中,生成所述的临时数据库。
可以理解的是,经过筛选得到的有效数据被存放至历史文件夹中,而临时文件夹采用日期和时间来命名可以告知该临时文件夹内数据最早被采集时的时间,从而避免其余其他临时文件夹之间之间出现混乱,无法识别。
步骤S200,验证端间歇性地发送验证信息至服务器,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码在发送验证信息之前随机生成,不具有规律性,所述的验证编码为固定内容且所述的解压编码和验证编码的相对位置不能改变;
本发明实施例中,验证端每隔一定的时间间隔向服务器发送验证信息,此处的解压编码和验证编码可视为一段包括字母、数字或者其他字符的字符串。验证信息可表示为“解压编码+分隔字符+验证编码”,此处的分隔字符为固定字符且不可作为解压编码和验证编码的组成部分。解压编码为发送验证信息之前临时生成的字符串,并且其中不含有分隔字符,另外验证端会对该解压编码进行记录和保存,而且会在下一次发送验证信息时重新生成解压编码并删除上一次发送验证信息时所记录的解压编码。而验证编码为固定字符串,且与解压编码的相对位置无法改变。
步骤S300,所述的服务器在接收到验证信息后会收录解压编码并向验证端反馈验证编码;
本发明实施例中,服务器在接收到验证信息后会对其进行识别并提取处分隔字符后的字符串与验证编码进行对比来确定网络稳定情况,当所提取的字符串与验证编码相同时,本次验证过程成功,服务器会收录验证信息中的解压编码后保存,并向验证端反馈验证编码;当所提取的字符串与验证编码不同是,验证过程失败,服务器不做应答。
另外,在图4中示出了整个反馈回路的实现方式,其具体步骤如下:
步骤S301,验证端发送验证信息;
步骤S302,服务器提取验证信息并在记录解压编码和验证编码;
步骤S303,服务器将所提取的验证编码和数据库中的验证编码进行比对;若比对结果相同则执行步骤S304;若比对结果不同,则结束流程;
步骤S304,服务器发送验证编码至验证端。
步骤S400,所述的验证端获取验证编码之后会提取客户端的临时数据库内的互联网数据,并将所述的互联网数据进行加密加压后生成过渡文件;
本发明实施例中,在验证端收到来自服务器的反馈后,会将所得的反馈信息与验证编码相比对,从而再次确定网络传输是否稳定,当反馈信息与验证编码一一致时,验证端会提取临时数据库中的临时文件夹及其内部数据,并将其加密加压成过渡文件,而所述的过渡文件的解压密码则与验证端所收录的解压编码保持一致;当反馈信息与验证编码不一致时,验证端会删除所收录的解压编码并重复步骤S300。
步骤S500,所述的服务器接收所述的过渡文件,并通过解压编码将其解压。
本发明实施例中,服务器在将过渡文件解压之后其用于解压该过渡文件的解压编码会在再次收到验证信息被删除。
图6中示出了本发明提供的另一个优选的实施例,在该实施例中,所述的大数据采集方法还包括以下步骤:
步骤S600,检测临时文件夹容量大小是否等于所设定阈值,当临时文件夹容量等于所设定的阈值时,则重复步骤S103和步骤S104并将原先的临时文件夹冻结;当临时文件夹容量小于所设定的阈值时,继续步骤S104。
可以理解的是,当通过网络传输数据时,可能会因为网络不稳定而造成中断。且随着数据的容量的增大,传输时间也会增加,而传输时间增加则出现数据传输中断的概率也会大大增加,而数据传输中断会造成数据丢失和泄露等危险。所以通过将过量的数据分成多次进行传输可以有效的防止因为网络中断而造成的危险,并且可以在出现数据丢失时将损害降到最低。
图5中示出了本发明实施例中进一步提供的一种大数据采集系统的结构示意图图,该大数据采集系统10包括:
客户端11,用于采集用户在浏览互联网时所产生的的各种信息;剔除所采集的互联网信息中的重复和无用的部分,并生成临时数据库用于存储筛选后的数据;
在本发明实施例中,所述的客户端11主体为具有通信能力的互联网设备,该设备可以是手机、平板电脑和计算机等,此处不作具体限定。
验证端12,用于间歇性的发送验证信息和提取临时数据库中的临时文件夹及其内部互联网数据并将其加密后压后生成过渡文件;
服务器13,用于接收验证信息并反馈验证编码和将过渡文件还原成原始数据。
图7中示出了用于生成临时数据库的装置的结构示意图,其内包含有客户端11和验证端12。
图8中示出了本发明实施例中客户端所在的计算机设备20的结构示意图,该计算机设备20包括存储器21、处理器22、以及后台程序23,其中所述存储器21中存储有后台程序23,所述后台程序23被所述处理器22执行时,使得所述处理器22执行所述大数据采集方法的步骤。
可以理解的是,在本发明提供的优选实施例中,该计算机设备还可以为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、平板电脑和手机等可以进行通信的设备。
图9示出了本发明实施提供的一种可读存储介质的示意图,所述可读存储介质30上存储有后台程序23,所述计算机程序23被处理器22执行时,使得所述处理器22执行所述大数据采集方法的步骤。
示例性的,计算机程序可以被分割成一个或多个模块,一个或者多个模块被存储在存储器中,并由处理器执行,以完成本发明。一个或多个模块可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述计算机程序在终端设备中的执行过程。例如,上述计算机程序可以被分割成上述各个系统实施例提供的泊位状态显示系统的单元或模块。
本领域技术人员可以理解,上述终端设备的描述仅仅是示例,并不构成对终端设备的限定,可以包括比上述描述更多或更少的部件,或者组合某些部件,或者不同的部件,例如可以包括输入输出设备、网络接入设备、总线等。
所称处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,上述处理器是上述终端设备的控制中心,利用各种接口和线路连接整个用户终端的各个部分。
上述存储器可用于存储计算机程序和/或模块,上述处理器通过运行或执行存储在存储器内的计算机程序和/或模块,以及调用存储在存储器内的数据,实现上述终端设备的各种功能。存储器可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如信息采集模板展示功能、产品信息发布功能等)等;存储数据区可存储根据泊位状态显示系统的使用所创建的数据(比如不同产品种类对应的产品信息采集模板、不同产品提供方需要发布的产品信息等)等。此外,存储器可以包括高速随机存取存储器,还可以包括非易失性存储器,例如硬盘、内存、插接式硬盘,智能存储卡(SmartMedia Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
终端设备集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实现上述实施例系统中的全部或部分模块/单元,也可以通过计算机程序来指令相关的硬件来完成,上述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个系统实施例的功能。其中,计算机程序包括计算机程序代码,计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。计算机可读介质可以包括:能够携带计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。
本发明实施例中提供的大数据采集方法通过客户端获取相关的互联网数据,提取相关的互联网数据并生成临时数据库;验证端间歇性地发送验证信息至服务器,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码在发送验证信息之前随机生成,不具有规律性,所述的验证编码为固定内容且所述的解压编码和验证编码的相对位置不能改变;所述的服务器在接收到验证信息后会收录解压编码并向验证端反馈验证编码;所述的验证端获取验证编码之后会提取客户端的临时数据库内的互联网数据,并将所述的互联网数据进行加密加压后生成过渡文件;所述的服务器接收所述的过渡文件,并通过解压编码将其解压,从而实现数据的采集。而在数据采集过程中客户端可以对庞大的实时数据进行初期筛选分类,能够减小数据量从而降低传输负荷;而通过验证端间歇性的向服务器发送验证信息可以根据是否得到反馈来有效的判断当前网络是否处于稳定状况,从而避免在传输过程因为网络不稳定被打断而造成数据丢失;另外通过实时变化的解压编码更可以有效防止数据泄露或被他人拦截时出现泄密,安全性更高。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (10)

  1. 一种大数据采集方法,其特征在于,所述的方法包括:客户端获取相关的互联网数据,提取相关的互联网数据并生成临时数据库;验证端间歇性地发送验证信息至服务器,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码在发送验证信息之前随机生成,不具有规律性,所述的验证编码为固定内容且所述的解压编码和验证编码的相对位置不能改变;所述的服务器在接收到验证信息后会收录解压编码并向验证端反馈验证编码;所述的验证端获取验证编码之后会提取客户端的临时数据库内的互联网数据,并将所述的互联网数据进行加密加压后生成过渡文件;所述的服务器接收所述的过渡文件,并通过解压编码将其解压。
  2. 根据权利要求1所述的一种大数据采集方法,其特征在于,生成所述的临时数据库的方法包括以下具体步骤:获取相关的互联网数据;提取所述的互联网数据中的非重复项和完整项;建立临时文件夹,并按日期和时间对其命名;输入提取后的互联网数据至所述的临时文件夹中,生成所述的临时数据库。
  3. 根据权利要求1所述的一种大数据采集方法,其特征在于,所述的验证端和服务器之间进行以下步骤:验证端发送验证信息;服务器提取验证信息并在记录解压编码后向验证端反馈验证编码;服务器若无法提取验证信息或者提取的验证信息不完整时,则不作应答。
  4. 根据权利要求1-3所述的任一种大数据采集方法,其特征在于,所述的方法还包括:当验证端多次输出验证信息而得不到反馈时,临时文件夹会随着不间断的提取的互联网数据而使得容量不断增加,当增加到一定阈值时会再次生成新的临时文件夹,而接下来所提取的互联网数据会被存入其中并将原先的临时文件夹冻结。
  5. 一种大数据采集系统,其特征在于,所述的采集系统包括;客户端,用于获取相关的互联网数据,并提取相关的互联网数据并生成临时数据库;验证端,用于间歇性地发送验证信息至服务器,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码在发送验证信息之前随机生成,不具有规律性,所述的验证编码为固定内容且所述的解压编码和验证编码的相对位置不能改变;获取验证编码之后会提取客户端的临时数据库内的互联网数据,并将所述的互联网数据进行加密加压后生成过渡文件;服务器,用于接收到验证信息后收录解压编码并向验证端反馈验证编码;接收所述的过渡文件,并通过解压编码将其解压。
  6. 根据权利要求5所述的一种大数据采集系统,其特征在于,所述的客户端包括以下步骤:获取所收集的相关互联网数据;剔除所述的互联网数据中的重复项和残缺项等无用数据;整合所筛选出的互联网数据,并将其存储在临时文件夹中,所述的临时文件夹按照日期和时间进行命名以避免重复;提取所有的所述的临时文件夹及其内部数据生成临时数据库。
  7. 根据权利要求5所述的一种大数据采集系统,其特征在于,所述的验证端和服务器之间进行如下步骤:验证端向服务器间歇性的发送验证信息,所述的验证信息由解压编码和验证编码两部分组成,所述的解压编码为发送验证信息前随机生成,不具有规律性,所述的验证编码为固定编码且所述的解压编码和验证编码的相对位置不能改变;当服务器在接收到验证信息之后会提取其中的解压编码和验证编码,若验证编码完整则向验证端发送相同的验证编码;验证端在接收到验证编码之后会提取将临时数据库中的临时文件夹及其内部的互联网数据并将其加密加压后生成过渡文件;服务器在接收到来自验证端的过渡文件后,利用提取的解压编码将其还原成原始数据;当服务器无法接收到验证信息或者验证信息不完整和错误时,服务器则不会向验证端发送验证编码。
  8. 根据权利要求7所述的一种大数据采集系统,其特征在于,所述的验证端在断网或者网络不稳定的情况下,长期无法接收到来自服务器的验证编码时,临时文件夹会随着不间断的提取的互联网数据而使得容量不断增加,当增加到一定阈值时会再次生成新的临时文件夹,而接下来所提取的互联网数据会被存入其中并将原先的临时文件夹冻结。
  9. 一种计算机设备,其特征在于,包括显示屏、存储器、处理器以及计算机程序,其中所述存储器中存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器执行权利要求1-4任一项权利要求所述的大数据采集方法的步骤。
  10. 一种可读存储介质,其特征在于,所述可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,使得所述处理器执行权利要求1-4任一项权利要求所述的大数据采集方法的步骤。
PCT/CN2020/127947 2020-10-20 2020-11-11 大数据采集方法、系统、计算机设备及其存储介质 WO2022082891A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011125546.1 2020-10-20
CN202011125546.1A CN112261038B (zh) 2020-10-20 2020-10-20 大数据采集方法、系统、计算机设备及其存储介质

Publications (1)

Publication Number Publication Date
WO2022082891A1 true WO2022082891A1 (zh) 2022-04-28

Family

ID=74245114

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/127947 WO2022082891A1 (zh) 2020-10-20 2020-11-11 大数据采集方法、系统、计算机设备及其存储介质

Country Status (2)

Country Link
CN (1) CN112261038B (zh)
WO (1) WO2022082891A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115021778A (zh) * 2022-06-02 2022-09-06 广州番禺电缆集团有限公司 一种基于网络稳定性反馈监测信息的智能电缆
CN115622782A (zh) * 2022-10-20 2023-01-17 国网浙江义乌市供电有限公司 一种用于电力设备的加密传输方法及系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114357030B (zh) * 2022-01-04 2022-09-30 深圳市智百威科技发展有限公司 一种大数据存储系统及方法
CN117041305B (zh) * 2023-10-10 2024-01-23 成都秦川物联网科技股份有限公司 基于物联网的气体流量计离线数据管理方法、设备及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478546A (zh) * 2009-01-23 2009-07-08 成都市华为赛门铁克科技有限公司 一种保护网络安全的方法和网络安全保护设备
US20160045826A1 (en) * 2007-12-05 2016-02-18 Sony Computer Entertainment America Llc System and Method for Retaining System State
CN106257874A (zh) * 2016-08-01 2016-12-28 上海海事大学 一种不稳定网络中大数据量远程采集方法与系统
CN106899678A (zh) * 2017-03-03 2017-06-27 上海中兴电力建设发展有限公司 动态平衡能源互联网网络带宽的高效数据传输方法及系统
CN109587006A (zh) * 2018-12-27 2019-04-05 深圳云博智联科技有限公司 一种基于Lora网关的数据续传方法及其系统与存储介质

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070245152A1 (en) * 2006-04-13 2007-10-18 Erix Pizano Biometric authentication system for enhancing network security
CN101799751B (zh) * 2009-12-02 2013-01-02 山东浪潮齐鲁软件产业股份有限公司 一种构建主机监控代理软件的方法
CN102685747A (zh) * 2012-05-04 2012-09-19 深圳芯智汇科技有限公司 移动设备及其数据传输方法
CN105610846A (zh) * 2016-01-08 2016-05-25 辽宁北方节能股份有限公司 一种电能监控终端数据采集能耗管理系统及其应用方法
US10211992B1 (en) * 2016-03-18 2019-02-19 EMC IP Holding Company LLC Secure certificate pinning in user provisioned networks
CN107707385B (zh) * 2017-09-18 2019-03-12 贵州白山云科技股份有限公司 一种数据上报方法及系统
CN108712408B (zh) * 2018-05-08 2021-03-23 百度在线网络技术(北京)有限公司 一种用户行为验证的反作弊方法及装置
CN109150828B (zh) * 2018-07-10 2021-04-13 珠海腾飞科技有限公司 一种验证注册方法及系统
CN109471844B (zh) * 2018-10-10 2022-02-18 深圳市达仁基因科技有限公司 文件共享方法、装置、计算机设备和存储介质
CN111225042B (zh) * 2019-12-27 2021-09-17 腾讯科技(深圳)有限公司 数据传输的方法、装置、计算机设备以及存储介质
CN111181722A (zh) * 2020-03-06 2020-05-19 联想(北京)有限公司 一种认证方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160045826A1 (en) * 2007-12-05 2016-02-18 Sony Computer Entertainment America Llc System and Method for Retaining System State
CN101478546A (zh) * 2009-01-23 2009-07-08 成都市华为赛门铁克科技有限公司 一种保护网络安全的方法和网络安全保护设备
CN106257874A (zh) * 2016-08-01 2016-12-28 上海海事大学 一种不稳定网络中大数据量远程采集方法与系统
CN106899678A (zh) * 2017-03-03 2017-06-27 上海中兴电力建设发展有限公司 动态平衡能源互联网网络带宽的高效数据传输方法及系统
CN109587006A (zh) * 2018-12-27 2019-04-05 深圳云博智联科技有限公司 一种基于Lora网关的数据续传方法及其系统与存储介质

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115021778A (zh) * 2022-06-02 2022-09-06 广州番禺电缆集团有限公司 一种基于网络稳定性反馈监测信息的智能电缆
CN115021778B (zh) * 2022-06-02 2023-10-24 广州番禺电缆集团有限公司 一种基于网络稳定性反馈监测信息的智能电缆
CN115622782A (zh) * 2022-10-20 2023-01-17 国网浙江义乌市供电有限公司 一种用于电力设备的加密传输方法及系统

Also Published As

Publication number Publication date
CN112261038B (zh) 2021-08-06
CN112261038A (zh) 2021-01-22

Similar Documents

Publication Publication Date Title
WO2022082891A1 (zh) 大数据采集方法、系统、计算机设备及其存储介质
US10552640B2 (en) In-situ data verification for the cloud
CN103095843B (zh) 一种基于版本矢量的数据备份方法及客户端
US10965732B2 (en) Streaming zip
CN103116615B (zh) 一种基于版本矢量的数据索引方法及服务器
WO2014015488A1 (zh) 一种数据存储、数据查询的方法及装置
CN103118104B (zh) 一种基于版本矢量的数据还原方法及服务器
CN104537076A (zh) 一种文件读写方法及装置
CN110727643B (zh) 一种基于机器学习的文件分类管理方法及系统
US9355108B2 (en) Storing data files in a file system
CN105094924A (zh) 镜像文件的导入方法及装置
TW201327232A (zh) 檔案處理方法及系統
CN111159100A (zh) 区块链文件存取方法、装置、计算机设备及存储介质
CN111339551B (zh) 数据的验证方法及相关装置、设备
CN108133026B (zh) 一种多数据的处理方法、系统及存储介质
WO2023217086A1 (zh) 资源文件更新方法、装置、设备及可读存储介质
CN112035471B (zh) 一种事务处理方法及计算机设备
CN113722152A (zh) 一种数据增量备份方法、装置、设备及存储介质
CN110609766A (zh) 一种基于Redis协议的KV数据存储方法及装置
CN107704557B (zh) 操作互斥数据的处理方法、装置、计算机设备和存储介质
US20190227991A1 (en) Synchronizing Different Representations of Content
CN112632054A (zh) 一种基于属性加密的数据集去重方法、存储介质及系统
CN111539028A (zh) 档案存储方法、装置、存储介质及电子设备
WO2024078029A1 (zh) 文件系统管理方法、装置和存储介质
CN108228227B (zh) 目录差分方法、装置及相应终端

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20958469

Country of ref document: EP

Kind code of ref document: A1

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20958469

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20958469

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 14/06/2023)