Nothing Special   »   [go: up one dir, main page]

CN113792070A - FMEA database access method with high analysis efficiency - Google Patents

FMEA database access method with high analysis efficiency Download PDF

Info

Publication number
CN113792070A
CN113792070A CN202110892576.3A CN202110892576A CN113792070A CN 113792070 A CN113792070 A CN 113792070A CN 202110892576 A CN202110892576 A CN 202110892576A CN 113792070 A CN113792070 A CN 113792070A
Authority
CN
China
Prior art keywords
data
user
database
private
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110892576.3A
Other languages
Chinese (zh)
Inventor
逯瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Uxsino Software Co ltd
Original Assignee
Beijing Uxsino Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Uxsino Software Co ltd filed Critical Beijing Uxsino Software Co ltd
Priority to CN202110892576.3A priority Critical patent/CN113792070A/en
Publication of CN113792070A publication Critical patent/CN113792070A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an FMEA (failure mode and effects analysis) database access method with higher analysis efficiency, which comprises the following steps: establishing a special data channel and a hotspot searching link; user registration, receiving and storing private key; logging in a server through an account and a private key and selecting a logging mode; and acquiring browsing information. According to the invention, by establishing the hot spot search list, the private server uses the data analysis module to classify the hot spot search file list in the database, and packs the same type of files to make a search file packet, so that the process working pressure of a computer is reduced, the search efficiency is improved, the overhead of accessing the database management system in multiple processes is reduced, a private key mode is arranged, the security of accessing the database by a user is improved, the verification mode is quick and simple, the private browsing mode is set, the peeping of other people when information is consulted is reduced, and the security of data is improved.

Description

FMEA database access method with high analysis efficiency
Technical Field
The invention relates to the field of database access methods, in particular to an FMEA database access method with high analysis efficiency.
Background
The database is an organized and sharable data set stored in a computer for a long time, many data in the database have confidentiality, all data of the database cannot be accessed by all people, but a part of data can be disclosed, namely, any person can access the database, namely, the database is called as an accessor, the confidential data are sensitive data, FMEA is an analysis method for determining a potential failure mode and a reason of the potential failure mode, in order to avoid the generation of defects, targets are analyzed one by one and possible result prejudgment is made, so that the effect of avoiding errors is achieved, and the error rate is reduced when the FMEA is applied to data analysis of the database along with the technical development.
The existing database does not establish hot spot search, for the existing data search, more computing resources are required to be wasted for the user to retrieve the existing files, the search process pressure of a computer is increased, an access record can be left at a user end after the existing database is accessed, the existing database is easy to be peeped by others, a traceless browsing mode is set when part of the database is accessed, once a window is closed, the database is very troublesome to retrieve again, and the database is very inconvenient to use; the existing database has the defects that information leakage is caused by poor user precaution consciousness during access, the reminding mode is single, and no good peeping measure exists.
Disclosure of Invention
In view of the above, the invention discloses an FMEA database access method with higher analysis efficiency, in which a private server establishes a hot spot search list, the private server uses a data analysis module to classify the hot spot search file list in a database, packages the same type of files into a search file package, and compresses the file package, thereby avoiding repeated search of the same target, reducing the process working pressure of a computer, improving the search efficiency, reducing the overhead when a plurality of processes access a database management system, and improving the query performance; the private key mode is set, a user logs in a server where the database is located through a private terminal, a login account is registered, personal identity information is verified at the server side, a private key is generated through a key module, then the private key is sent to the private terminal, the user stores the private key, the safety of the user accessing the database is improved, and the verification mode is quick and simple.
Specifically, the invention is realized by the following technical scheme:
an FMEA database access method with higher analysis efficiency, comprising the steps of:
a data analysis module in the server end classifies a hot spot search file list in a database, a data processing module marks data with the same attribute and category, stores the data with the same attribute and category in the same storage channel, generates a search data packet and establishes a special data channel and a hot spot search link;
a user logs in a server where a database is located through a private terminal, registers a login account, a server side verifies personal identity information, a private key is generated through a key module, then the private key is sent to the private terminal, and the user stores the private key;
after the user inputs a keyword, the data processing module compares the keyword with data in a search data packet, matches the keyword with the data in the search data packet successfully, and then directly extracts and caches the data packet matched with the keyword in a cache module of the server from a storage channel;
in the fast browsing mode, the server database lists a list catalog according to the key word information, extracts and stores data in a search data packet matched with and associated with the key word in a cache module of the server, and simultaneously encrypts corresponding list catalog data through an encryption module and sends the encrypted list catalog data to a private terminal of a user;
a user clicks an information title link on a list directory or directly checks a hot spot search link, after an electric shock command is issued, data of the soul village in the cache module are displayed in advance, and the processor searches and extracts the data in the corresponding storage channel while displaying the data in the cache module.
Private terminal is private computer, and the mode that private terminal and server end are connected includes web net, 4G or 5G, installs video acquisition device on the private computer, installs people's head quantity detection module in the private terminal, and the people's head quantity in the detectable monitoring range reachs the number of looking over personnel.
The search file package is compressed by a file compression module in a lossless compression mode.
The length of the key generated by the server side can be selected by a user, and the minimum length is six bytes.
The steps of the fast browsing mode are as follows:
firstly, a user selects a quick browsing mode and sends a request instruction to a server;
secondly, the server receives the instruction, classifies and analyzes the target files in the database by using multiple processes, and establishes a rapid data channel;
and thirdly, the server side feeds the target sending piece back to the user through the fast data channel.
The method of using the private browsing mode is as follows:
s1, the user selects the private browsing mode, the server side and the private terminal establish the continuous connection channel;
s2, the user can enter the information interface after pressing the special button, and the video acquisition device is automatically started;
s3, when the user loosens the special button, the user pops up the identity verification interface, temporarily closes the continuous connection channel and hides the information interface, and the user can browse the information interface again after needing to verify the identity information;
s4, when the user browses, the video acquisition device pops up a temporary window when detecting that the number of people exceeds one, and meanwhile, the information interface is temporarily hidden, and the user can continue browsing after confirming the number of people.
The special button is any number or letter on the keyboard of the private computer, the authentication interface comprises button starting authentication and quitting, the user enters the authentication interface after clicking the starting authentication button, the authentication mode is private key authentication, and the temporary window comprises button numbers of 1-9 and 26 English letters, deletion and confirmation.
The specific steps of receiving the list catalog by the user are as follows:
firstly, a server receives query information and enters a database;
comparing the query information with information in a database, and sequentially sequencing according to the conformity degree to generate a list catalog;
and thirdly, the generated list directory is linked with the file corresponding to the information in the database, and the list directory link file is sent to the private terminal.
Detecting abnormal values in a database by adopting a Dixon test statistic method, wherein the Dixon test statistic is divided into a single-side test statistic and a double-side test statistic;
dixon test statistic rijWhere the indices i and j have the following meanings:
i represents the number of extreme values on the same side (lower or upper) as the suspected abnormal value in the data, and i is 1 or 2;
j represents the number of extreme values on the other side of the data, j is 0, 1 or 2;
the formula for the one-sided test statistic to test if yi is an outlier is as follows:
Figure BDA0003196506880000041
the formula to check if yn is an outlier is as follows:
Figure BDA0003196506880000042
the formula for the calculation of the two-sided test statistics is as follows:
Figure BDA0003196506880000043
in the formula:
rijdixon test statistics (i 1, 2; j 0, 1, 2);
the ith minimum in the yi sample;
n number of observations in sample.
In a word, the private server marks and classifies the hot spot search file list in the database by establishing the hot spot search list and using the data analysis module, packages the same class of files into a search file package, compresses the file package, and stores the data with the same attribute and class in the same storage channel, thereby avoiding repeated search of the same target, reducing the process working pressure of a computer, improving the search efficiency, reducing the expenditure when a plurality of processes access the database management system and improving the query performance;
the invention is provided with a private key mode, a user logs in a server where a database is located through a private terminal, registers a login account, a server side verifies personal identity information, a private key is generated through a key module, then the private key is sent to the private terminal, the user stores the private key, the security of the user for accessing the database is improved, and the verification mode is quick and simple;
according to the invention, a private browsing mode is set before a user browses information in a database, the user can enter an information interface only after pressing a special button, the user releases the button during inquiry, an identity verification interface is popped out and the information interface is hidden, the user can browse the information interface again after needing verification of the information, information leakage caused by forgetting to close an information page when the user checks other things in the process is avoided, the operation is simple, the safety of personal information is protected, a number of people detection module is set, a temporary window can be popped out when the video acquisition device detects that the number of people exceeds one, meanwhile, the information interface is temporarily hidden, the user can continue browsing after confirming the number of people, the peeping of other people during information searching is reduced, and the safety of data is improved.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a database access method provided by an embodiment of the invention;
fig. 2 is a flowchart of a fast browsing mode in the database access method according to the embodiment of the present invention;
fig. 3 is a flowchart illustrating the use of a private browsing mode in the database access method according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a user receiving a list directory in a database access method according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
As shown in fig. 1 to 4, the present invention discloses a FMEA database access method with high analysis efficiency, which includes the following steps:
a data analysis module in the server end classifies a hot spot search file list in a database, a data processing module marks data with the same attribute and category, stores the data with the same attribute and category in the same storage channel, generates a search data packet and establishes a special data channel and a hot spot search link;
a user logs in a server where a database is located through a private terminal, registers a login account, a server side verifies personal identity information, a private key is generated through a key module, then the private key is sent to the private terminal, and the user stores the private key;
after the user inputs a keyword, the data processing module compares the keyword with data in a search data packet, matches the keyword with the data in the search data packet successfully, and then directly extracts and caches the data packet matched with the keyword in a cache module of the server from a storage channel;
in the fast browsing mode, the server database lists a list catalog according to the key word information, extracts and stores data in a search data packet matched with and associated with the key word in a cache module of the server, and simultaneously encrypts corresponding list catalog data through an encryption module and sends the encrypted list catalog data to a private terminal of a user;
a user clicks an information title link on a list directory or directly checks a hot spot search link, after an electric shock command is issued, data of the soul village in the cache module are displayed in advance, and the processor searches and extracts the data in the corresponding storage channel while displaying the data in the cache module.
Private terminal is private computer, and the mode that private terminal and server end are connected includes web net, 4G or 5G, installs video acquisition device on the private computer, installs people's head quantity detection module in the private terminal, and the people's head quantity in the detectable monitoring range reachs the number of looking over personnel.
The search file package is compressed by a file compression module in a lossless compression mode.
The length of the key generated by the server side can be selected by a user, and the minimum length is six bytes.
The steps of the fast browsing mode are as follows:
firstly, a user selects a quick browsing mode and sends a request instruction to a server;
secondly, the server receives the instruction, classifies and analyzes the target files in the database by using multiple processes, and establishes a rapid data channel;
and thirdly, the server side feeds the target sending piece back to the user through the fast data channel.
The method of using the private browsing mode is as follows:
s1, the user selects the private browsing mode, the server side and the private terminal establish the continuous connection channel;
s2, the user can enter the information interface after pressing the special button, and the video acquisition device is automatically started;
s3, when the user loosens the special button, the user pops up the identity verification interface, temporarily closes the continuous connection channel and hides the information interface, and the user can browse the information interface again after needing to verify the identity information;
s4, when the user browses, the video acquisition device pops up a temporary window when detecting that the number of people exceeds one, and meanwhile, the information interface is temporarily hidden, and the user can continue browsing after confirming the number of people.
The special button is any number or letter on the keyboard of the private computer, the authentication interface comprises button starting authentication and quitting, the user enters the authentication interface after clicking the starting authentication button, the authentication mode is private key authentication, the temporary window comprises button numbers 1-9 and 26 English letters, deletion and confirmation, a common interface is adopted, and the operation is simple and easy to understand.
The specific steps of receiving the list catalog by the user are as follows:
firstly, a server receives query information and enters a database;
comparing the query information with information in a database, and sequentially sequencing according to the conformity degree to generate a list catalog;
and thirdly, the generated list directory is linked with the file corresponding to the information in the database, and the list directory link file is sent to the private terminal.
Detecting abnormal values in a database by adopting a Dixon test statistic method, wherein the Dixon test statistic is divided into a single-side test statistic and a double-side test statistic;
dixon test statistic rijWhere the indices i and j have the following meanings:
i represents the number of extreme values on the same side (lower or upper) as the suspected abnormal value in the data, and i is 1 or 2;
j represents the number of extreme values on the other side of the data, j is 0, 1 or 2;
the formula for the one-sided test statistic to test if yi is an outlier is as follows:
Figure BDA0003196506880000081
the formula to check if yn is an outlier is as follows:
Figure BDA0003196506880000082
the formula for the calculation of the two-sided test statistics is as follows:
Figure BDA0003196506880000083
in the formula:
rijdixon test statistics (i 1, 2; j 0, 1, 2);
the ith minimum in the yi sample;
the number of observed values in the n samples can be reduced to the maximum extent by adopting a Dixon test statistic method.
For the above-mentioned apparatus embodiments, since they basically correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the disclosed solution. One of ordinary skill in the art can understand and implement it without inventive effort.
Finally, it should be noted that: while this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only exemplary of the present disclosure and should not be taken as limiting the present disclosure, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (9)

1. An FMEA database access method with higher analysis efficiency, characterized in that the database access method comprises the following steps:
a data analysis module in the server end classifies a hot spot search file list in a database, a data processing module marks data with the same attribute and category, stores the data with the same attribute and category in the same storage channel, generates a search data packet and establishes a special data channel and a hot spot search link;
a user logs in a server where a database is located through a private terminal, a login account is registered, a server side verifies personal identity information, a private key is generated through a key module, then the private key is sent to the private terminal, and the user stores the private key;
after the user inputs keywords, the data processing module compares the keywords with data in a search data packet, matches the keywords successfully, and then directly extracts and caches the data packet matched with the keywords in a storage channel in a cache module of the server;
in the fast browsing mode, the server database lists a list catalog according to the key word information, extracts and stores data in a search data packet matched with and associated with the key word in a cache module of the server, and simultaneously encrypts corresponding list catalog data through an encryption module and sends the encrypted list catalog data to a private terminal of a user;
a user clicks an information title link on a list directory or directly checks a hotspot searching link, after an electric shock command is issued, data of the soul village in the cache module is displayed in advance, and the processor searches and extracts the data in the corresponding storage channel while displaying the data in the lower cache module.
2. The method for accessing FMEA database with higher analysis efficiency as claimed in claim 1, wherein the private terminal is a private computer, the connection between the private terminal and the server side includes a web, 4G or 5G, the private computer is installed with a video capture device, and the private terminal is installed with a people number detection module, which can detect the number of people in the monitoring range and obtain the number of people looking over.
3. The FMEA database access method with higher analysis efficiency as claimed in claim 1, wherein the search file package is compressed by a file compression module in a lossless compression manner.
4. The method as claimed in claim 1, wherein the key length generated by the server is selectable by the user, and the minimum length is six bytes.
5. A method for accessing an FMEA database with improved analysis efficiency as claimed in claim 1, wherein the fast browsing mode comprises the steps of:
firstly, a user selects a quick browsing mode and sends a request instruction to a server;
secondly, the server receives the instruction, classifies and analyzes the target files in the database by using multiple processes, and establishes a rapid data channel;
and thirdly, the server side feeds the target sending piece back to the user through the fast data channel.
6. An FMEA database access method with higher analysis efficiency as claimed in claim 1, wherein the private browsing mode is used as follows:
s1, the user selects the private browsing mode, the server side and the private terminal establish the continuous connection channel;
s2, the user can enter the information interface after pressing the special button, and the video acquisition device is automatically started;
s3, when the user loosens the special button, the user pops up the identity verification interface, temporarily closes the continuous connection channel and hides the information interface, and the user can browse the information interface again after needing to verify the identity information;
s4, when the user browses, the video acquisition device pops up a temporary window when detecting that the number of people exceeds one, and meanwhile, the information interface is temporarily hidden, and the user can continue browsing after confirming the number of people.
7. The method as claimed in claim 6, wherein the special button is any number or letter on the keyboard of the personal computer, the authentication interface comprises a button start authentication and exit, the user enters the authentication interface after clicking the start authentication button, the authentication mode is private key authentication, and the temporary window comprises the button numbers 1-9 and 26 English letters, deletion and confirmation.
8. A method for accessing an FMEA database with improved analysis efficiency as claimed in claim 1, wherein the step of receiving the list by the user comprises:
firstly, a server receives query information and enters a database;
secondly, comparing the query information with information in a database, and sequentially sorting according to the degree of conformity to generate a list catalog;
and thirdly, the generated list directory is linked with the file corresponding to the information in the database, and the list directory link file is sent to the private terminal.
9. An FMEA database access method with higher analysis efficiency as claimed in claim 1, wherein the method of detecting outliers in the database uses Dixon test statistics, said Dixon test statistics are divided into single-sided test statistics and double-sided test statistics;
dixon test statistic rijWhere the indices i and j have the following meanings:
i represents the number of extreme values on the same side (lower or upper) as the suspected abnormal value in the data, and i is 1 or 2;
j represents the number of extreme values on the other side of the data, j is 0, 1 or 2;
the formula for the one-sided test statistic to test if yi is an outlier is as follows:
Figure FDA0003196506870000031
the formula to check if yn is an outlier is as follows:
Figure FDA0003196506870000032
the formula for the calculation of the two-sided test statistics is as follows:
Figure FDA0003196506870000033
in the formula:
rijdixon test statistics (i 1, 2; j 0, 1, 2);
the ith minimum in the yi sample;
n number of observations in sample.
CN202110892576.3A 2021-08-04 2021-08-04 FMEA database access method with high analysis efficiency Pending CN113792070A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110892576.3A CN113792070A (en) 2021-08-04 2021-08-04 FMEA database access method with high analysis efficiency

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110892576.3A CN113792070A (en) 2021-08-04 2021-08-04 FMEA database access method with high analysis efficiency

Publications (1)

Publication Number Publication Date
CN113792070A true CN113792070A (en) 2021-12-14

Family

ID=78877106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110892576.3A Pending CN113792070A (en) 2021-08-04 2021-08-04 FMEA database access method with high analysis efficiency

Country Status (1)

Country Link
CN (1) CN113792070A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116302484A (en) * 2023-01-17 2023-06-23 广州高才信息科技有限公司 Position search-based server optimization scheduling system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
CN106777233A (en) * 2016-12-27 2017-05-31 电子科技大学 The personalized search system of the support secret protection based on cloud computing
CN107231346A (en) * 2017-05-03 2017-10-03 北京海顿中科技术有限公司 A kind of method of cloud platform identification
CN107908695A (en) * 2017-10-31 2018-04-13 平安普惠企业管理有限公司 Operation system operation method, device, system and readable storage medium storing program for executing
FR3061328A1 (en) * 2016-12-22 2018-06-29 Qwant METHOD FOR PROVIDING INFORMATION
CN110866752A (en) * 2017-09-18 2020-03-06 腾讯科技(深圳)有限公司 Resource transaction method, node, device and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
FR3061328A1 (en) * 2016-12-22 2018-06-29 Qwant METHOD FOR PROVIDING INFORMATION
CN106777233A (en) * 2016-12-27 2017-05-31 电子科技大学 The personalized search system of the support secret protection based on cloud computing
CN107231346A (en) * 2017-05-03 2017-10-03 北京海顿中科技术有限公司 A kind of method of cloud platform identification
CN110866752A (en) * 2017-09-18 2020-03-06 腾讯科技(深圳)有限公司 Resource transaction method, node, device and storage medium
CN107908695A (en) * 2017-10-31 2018-04-13 平安普惠企业管理有限公司 Operation system operation method, device, system and readable storage medium storing program for executing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116302484A (en) * 2023-01-17 2023-06-23 广州高才信息科技有限公司 Position search-based server optimization scheduling system and method

Similar Documents

Publication Publication Date Title
US7937340B2 (en) Automated satisfaction measurement for web search
US8386476B2 (en) Computer-implemented search using result matching
US8474047B2 (en) Remote collection of computer forensic evidence
CA2710392C (en) Automated forensic document signatures
JP4950448B2 (en) System and method for ranking search results based on detected user preferences
CN108460582B (en) System information processing method, apparatus, computer device and storage medium
US20080288509A1 (en) Duplicate content search
CN108512854B (en) System information safety monitoring method and device, computer equipment and storage medium
MXPA05001073A (en) System and method for a unified and blended search.
WO2018177275A1 (en) Method and apparatus for integrating multi-data source user information
US20210390006A1 (en) Method and electronic device for querying application programming interfaces of webpage
US8832098B2 (en) Research tool access based on research session detection
US8612409B2 (en) Method and apparatus for detecting and explaining bursty stream events in targeted groups
CN111767445A (en) Data searching method and device, computer equipment and storage medium
US10693897B2 (en) Behavioral and account fingerprinting
CN113792070A (en) FMEA database access method with high analysis efficiency
US11770402B2 (en) Systems and methods for network device discovery and vulnerability assessment
CN110929129B (en) Information detection method, equipment and machine-readable storage medium
Weller Compromised account detection based on clickstream data
Hassan On determining the most effective subset of features for detecting phishing websites
US20150161259A1 (en) Method and Apparatus for Web Page Content Categorization
CN113037709A (en) Webpage fingerprint monitoring method for multi-label browsing of anonymous network
CN116881962A (en) Security monitoring system, method, device and storage medium
Sumalatha et al. Data collection and audit logs of digital forensics in cloud
US20220269737A1 (en) Systems and methods for host name based network device pre-recognition and discovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination