[go: up one dir, main page]

CN119106005A - A computer device based on big data processing - Google Patents

A computer device based on big data processing Download PDF

Info

Publication number
CN119106005A
CN119106005A CN202411562076.3A CN202411562076A CN119106005A CN 119106005 A CN119106005 A CN 119106005A CN 202411562076 A CN202411562076 A CN 202411562076A CN 119106005 A CN119106005 A CN 119106005A
Authority
CN
China
Prior art keywords
unit
data
user
cache
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411562076.3A
Other languages
Chinese (zh)
Inventor
车向前
边莉
杨阳
贺思曼
梁学章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Ocean University
Original Assignee
Guangdong Ocean University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Ocean University filed Critical Guangdong Ocean University
Priority to CN202411562076.3A priority Critical patent/CN119106005A/en
Publication of CN119106005A publication Critical patent/CN119106005A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/168Details of user interfaces specifically adapted to file systems, e.g. browsing and visualisation, 2d or 3d GUIs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a computer device based on big data processing, which comprises a data processing and storage module, a cache management module, a data verification module, an access control and authority management module, a user interaction module and a security module, wherein the data processing and storage module is responsible for receiving, processing, analyzing and storing data, the cache management module is responsible for managing cache data and reducing direct access to a database, the data verification module is responsible for carrying out multiple verification before deleting the data, the access control and authority management module is responsible for managing the access authority of a user, the user interaction module is responsible for providing a user interface for interacting with the user, and the security module is responsible for remote monitoring and management and data backup and recovery.

Description

Big data processing-based computer equipment
Technical Field
The invention relates to the technical field of intelligent monitoring, in particular to a computer device based on big data processing.
Background
With the rapid development and popularization of information technology, computers have become an indispensable tool in modern society, and are widely applied to various fields of education, entertainment, work and the like. With the rise in video resolution (e.g., 4K, 8K video) and the popularity of streaming media services, users tend to download more high quality video for offline viewing. These video files occupy a large amount of memory. Computer devices based on big data processing technology have been developed. The devices realize the effective management and the efficient utilization of massive video data by integrating advanced storage technology, optimizing a data processing algorithm and constructing an efficient data management system.
Through retrieval, the invention patent with the Chinese patent number of CN115510272A discloses a computer data processing system based on big data analysis, and belongs to the technical field of computers. The processing system comprises a storage space analysis module, a target data selection module and a state information analysis module, wherein the storage space analysis module acquires video download data stored by a current computer as analysis data, if the storage space occupied by the analysis data is larger than a storage space threshold value, the target data selection module is enabled to analyze the analysis data, and if the time interval between the time when a certain video download data is triggered last time and the current time in the analysis data is longer than a time length threshold value, the video download data is the target data, and the state information analysis module analyzes the state information of the target data and judges whether the target data is to be deleted.
Compared with the prior art, the invention patent with the Chinese patent number of CN115510272A judges the probability that a subsequent user looks at the video by analyzing the video which is not watched for a long time, and directly deletes the video under the condition of lower probability, thereby reducing the occupation of idle video data to the storage space of a computer, ensuring the normal operation of the computer and improving the operation efficiency of the computer.
However, in the use of the above device, although the system designs complex analysis logic to determine which data should be deleted, there is still a possibility of erroneous determination that some users may occasionally watch some videos, but these videos are still important to them and should not be deleted, and thus a computer device based on big data processing is proposed.
Disclosure of Invention
The present invention aims to solve the drawbacks of the prior art that although the system designs complex analysis logic to determine which data should be deleted, there is still the possibility of misjudgment, some users may occasionally watch some videos, but these videos are still important to them and should not be deleted, and a computer device based on big data processing is proposed.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
a big data processing based computer device, comprising:
the data processing and storing module is used for receiving, processing, analyzing and storing data;
The cache management module is responsible for managing cache data and reducing direct access to a database;
the data verification module is responsible for carrying out multiple verification before deleting the data, so as to ensure the accuracy and importance of the data;
the access control and authority management module is responsible for managing the access authority of the user and ensuring the security of the data;
the user interaction module is responsible for providing a user interface and interacting with a user;
the safety module is responsible for remote monitoring and management and data backup and recovery;
The data processing and storing module is a core, the cache management module receives data to be cached from the data processing and storing module, the data checking module receives data to be deleted and corresponding information thereof from the data processing and storing module, returns a checking result to the data processing and storing module and decides whether to continue deleting operation, and the access control and authority management module receives an access request and user identity information from the user interaction module and returns an access result (permission or refusal) to the user interaction module.
The technical scheme further comprises the following steps:
Further, the data processing and storing module comprises a storage space analyzing sub-module, a target data selecting sub-module, a state information analyzing sub-module and an event association analyzing sub-module, wherein the storage space analyzing sub-module triggers a data optimizing process by monitoring and analyzing the use condition of a storage space and sends a request to the target data selecting sub-module, the target data selecting sub-module screens target data according to preset conditions and transmits the screening result to the state information analyzing sub-module, and the state information analyzing sub-module processes (sorting, demarcating, collecting and dividing, collecting and analyzing, deleting and controlling) the target data and determines the processing strategy (such as deleting, reserving and archiving) of the data.
Further, the storage space analysis submodule comprises a monitoring unit, an analysis unit and a triggering unit, wherein the monitoring unit continuously monitors the storage space occupation condition of the video downloading data, collects real-time data of the storage space, the analysis unit receives the data of the monitoring unit, analyzes the use trend and the residual space amount of the storage space, evaluates whether to trigger a data optimization flow, and when the storage space reaches a preset threshold or meets other optimization conditions according to the result of the analysis unit, the triggering unit triggers the data optimization flow and sends a request to the target data selection submodule.
Further, the target data selecting submodule comprises a screening unit and a condition configuration unit, the condition configuration unit allows a user or a system administrator to configure conditions for screening target data, such as time intervals, file sizes, data types and the like, the screening unit receives a trigger request from the storage space analysis submodule and the condition configuration of the condition configuration unit, the target data is screened from video downloading data according to the trigger request of the storage space analysis submodule and the condition configuration of the condition configuration unit, and a screening result is transmitted to the state information analysis submodule.
Further, the status information analysis submodule includes a sorting unit, a demarcating unit, a set dividing unit, a set analysis unit and a deletion control unit, wherein the sorting unit receives target data from the target data selection submodule, sorts the data according to a preset sorting rule (such as time and size), the sorting result is transmitted to the demarcating unit, the demarcating unit analyzes the sorted data, demarcates data according to service requirements or data characteristics, such as dividing the data into a plurality of batches or paragraphs, the set dividing unit further divides the demarcated data into different sets or subsets so as to perform more detailed analysis or processing, the set analysis unit analyzes each set or subset, evaluates importance, value or processing priority of the set analysis unit, the evaluation result is used for guiding a processing strategy of the data, and the deletion control unit decides which data need to be deleted or reserved based on the result of the set analysis unit, if the data need to be deleted, sends a request to the data verification module to perform multiple verification operation, and finally files or moves the data to other storage positions if the data need to be reserved.
Further, the event association analysis submodule comprises an event collecting unit, an event normalizing unit, an event storing unit, an association rule engine, an association analysis unit and an interpretation generating unit;
When any data-related events occur within the system (e.g., data expiration notifications, illegal access records, data migration logs, etc.), the event collection unit captures and passes these events to an event normalization unit;
the event standardization unit processes the collected event data to enable the event data to accord with a unified format and standard;
The processed event data is stored in an event storage unit for subsequent analysis and inquiry;
When a user initiates a deletion request, the system triggers a correlation analysis flow, and the correlation analysis unit retrieves event data related to the data to be deleted from the event storage unit;
The association analysis unit performs association analysis on the retrieved event data by using an association rule engine, and identifies an event sequence and an association mode related to the data to be deleted by analyzing the attributes such as the type, time, source, content and the like of the event;
The interpretation generation unit generates deletion reason interpretations according to the result of the association analysis, wherein the interpretations may comprise specific date of data expiration, detailed information of illegal access, reasons and processes of data migration, and the like, and the deletion reason interpretations are sent to the user interaction module.
Further, the cache management module includes a cache layer integration unit, a cache policy unit and a cache synchronization unit, where the cache layer integration unit is responsible for integrating Redis, memcached cache systems, configuring cache connection, parameters and the like, so as to ensure that the cache systems can work normally, the cache layer integration unit communicates with the cache systems (such as Redis, memcached), sends a cache read-write request, receives a response of the cache systems, processes cache data, the cache policy unit is responsible for implementing cache elimination policies such as LRU (least recently used), LFU (least frequently used) and the like, the cache policy unit monitors cache use conditions, including cache hit rate, cache size and the like, the cache policy unit determines which cache items need to be eliminated according to the cache policy, and sends an elimination request to the cache layer integration unit, the cache policy unit receives feedback of results of the cache layer integration unit about the elimination operation, and the cache synchronization unit is responsible for ensuring consistency of cache data and database data, and processing cache failure and update problems.
Furthermore, the data verification module provides a manual auditing channel, so that an additional verification step can be added before high-risk operation, and the safety of data is further improved;
The data verification module builds a data dependency graph, checks the dependency of data through a graph theory algorithm, and can identify and process the dependency of the data before deleting the data, and the data verification module comprises the following steps:
defining data entities and dependencies:
Identifying data entities-data entities explicitly incorporated into the dependency graph (e.g., database tables, files, objects, etc.);
defining dependency relationships, namely determining dependency relationship types (such as direct dependency, indirect dependency, circular dependency and the like) and rules among data entities;
Constructing a dependency graph:
Creating a Graph structure, namely representing data entities and the dependency relationship between the data entities by using a Graph structure in Graph theory, wherein the Graph consists of nodes and edges, wherein the nodes represent the data entities, and the edges represent the dependency relationship;
adding a node, namely adding a corresponding node in the graph for each data entity;
adding edges, namely adding corresponding edges in the graph according to the dependency relationship among the data entities, wherein the directions of the edges generally represent the direction of dependence (such as from the relying party to the relied party);
Graph theory algorithms are implemented to examine dependencies:
a traversal algorithm that uses a depth-first search to examine dependencies in the graph;
Dependency analysis:
checking whether a direct edge in the graph connects two nodes or not, and indicating that a direct dependency relationship exists between the two nodes;
indirect dependence, namely finding all possible dependent paths through depth-first search, and identifying indirect dependence;
Checking if a loop (Cycle) exists in the graph, the existence of which represents the existence of a cyclic dependency, which is generally an undesirable situation because it may lead to increased complexity in the case of data deletion or update;
dependency conflict detection, when a data entity is scheduled to be deleted, using a depth-first search to check whether the operation would violate any defined dependency rules or cause other data entities to become invalid or unavailable;
Processing dependency relationship:
a corresponding dependent solution strategy is formulated according to the checking result, for example, if deleting a certain data entity can cause other data entities to fail, the dependent data entities may need to be updated or deleted first, or the deleting operation is cancelled;
Automated processing-the checking and processing of the dependency is automated.
Further, the access control and authority management module comprises a role management unit, an authority allocation unit, a user management unit, an access control decision unit, a sensitive data protection unit and an audit log unit, wherein the role management unit is responsible for defining different roles in the system and allocating a group of authorities for each role, the role management unit interacts with the authority allocation unit and the user management unit to ensure the correct association between the roles and the authorities and users, the authority allocation unit is responsible for allocating access authorities for system resources (such as data, functions and the like) according to the roles defined by the role management unit, the authority allocation unit interacts with the role management unit, the user management unit and the access control decision unit to ensure the accurate allocation and execution of the authorities, the user management unit is responsible for managing the registration, authentication, authorization and other information of the users, the user management unit interacts with the roles, the user management unit is responsible for ensuring that the user can access corresponding data or executing operation by the role identity, the access control decision unit is responsible for attempting to access the corresponding data or executing operation by the user, the access control decision unit is responsible for directly recording the sensitive data protection and the sensitive data protection unit, the sensitive data is directly transmitted by the sensitive data protection unit is required to be limited by the access control unit according to the roles, and other time, the access control unit is required by the user is required to directly recording the sensitive data protection unit, the sensitive data protection unit is required to be directly sensitive data protection unit is required to be protected, and the sensitive data protection unit is protected by the sensitive data protection unit is sensitive data. The sensitive data protection unit interacts with the access control decision unit and the storage system to ensure the security of the sensitive data in the storage and transmission processes, the audit log unit is responsible for recording the data access and operation behaviors of all users, including logging in, accessing resources, modifying data and the like, so as to facilitate post-hoc tracking and audit, and the audit log unit interacts with the user management unit, the access control decision unit and the storage system to collect and store audit log information.
Further, the user interaction module comprises an interface presentation unit, a user operation unit, a user interaction logic unit, a deletion confirmation unit and an option customization unit, wherein the interface presentation unit is responsible for rendering and displaying a Graphical User Interface (GUI) or a Command Line Interface (CLI) to enable a user to interact with the system, the interface presentation unit receives user input from the user operation unit and displays system feedback to the user, the user operation unit is responsible for capturing operation instructions of the user, such as clicking, inputting and the like, and converting the operation instructions into instructions identifiable by the system, the user operation unit interacts with the user interaction logic unit, transmits the user operation instructions, simultaneously receives feedback from the interface presentation unit and displays the feedback to the user, the user interaction logic unit is responsible for processing the instructions transmitted by the user operation unit, executing corresponding logic judgment such as authority verification, data verification and the like, and calling functions of other units, wherein the user interaction logic unit interacts with a user operation unit, a deletion confirmation unit, an option customization unit and a data management module, coordinates execution of user operation, and before deleting data, the deletion confirmation unit inquires whether a user agrees in a popup window, mail notification and the like manner and provides data information and deletion reason explanation, the deletion reason explanation is provided by an event association analysis submodule, the deletion confirmation unit receives a deletion request from the user interaction logic unit, displays deletion confirmation information to the user and sends an instruction to the option customization unit according to user feedback (agreeing/refusing), the option customization unit allows the user to select whether to delete immediately, delay deletion or mark as to-be-audited, the flexibility of user operation is increased, and the option customization unit receives the user selection from the deletion confirmation unit and sends a corresponding deletion or marking instruction to the data management module according to the user selection.
The invention has the following beneficial effects:
In the invention, the cache management module uses the cache layer to cache the frequently queried results, reduces the number of direct access times to the database, improves the system performance, and avoids users waiting for a long time to see the results.
In the invention, a multiple verification mechanism is added before deleting the data, so that the accuracy and the importance of the data are ensured, meanwhile, the system inquires whether the user agrees before deleting the data through enough user interaction in the decision process, and provides data information and deletion reason explanation, wherein the deletion reason explanation comprises an event sequence and an association mode related to the data to be deleted, so that the situations of misjudgment, misdeletion and the like are avoided.
Drawings
FIG. 1 is a system block diagram of a computer device based on big data processing according to the present invention;
FIG. 2 is a system block diagram of a data processing and storage module according to the present invention;
FIG. 3 is a system block diagram of an event correlation analysis sub-module in accordance with the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-2, the present invention is a big data processing-based computer device, comprising:
the data processing and storing module is used for receiving, processing, analyzing and storing data;
The cache management module is responsible for managing cache data and reducing direct access to a database;
the data verification module is responsible for carrying out multiple verification before deleting the data, so as to ensure the accuracy and importance of the data;
the access control and authority management module is responsible for managing the access authority of the user and ensuring the security of the data;
the user interaction module is responsible for providing a user interface and interacting with a user;
the safety module is responsible for remote monitoring and management and data backup and recovery;
The data processing and storing module is a core, the cache management module receives data to be cached from the data processing and storing module, the data checking module receives data to be deleted and corresponding information thereof from the data processing and storing module, returns a checking result to the data processing and storing module, decides whether to continue deleting operation, the access control and authority management module receives an access request and user identity information from the user interaction module, returns an access result (permission or refusal) to the user interaction module, when a user initiates a data query request in the user interaction module, firstly acquires the required data from the cache management module, if the required data exists in the cache management module, the data is directly returned to the user, and if the required data does not exist, the data is returned to the user from the data processing and storing module.
The working principle of the computer equipment based on big data processing is that an external data source (such as a network and other systems) transmits data to a data processing and storing module, the data processing and storing module receives, analyzes and primarily processes the data, and the processed data is stored or transmitted to other modules according to requirements;
The cache management module receives data to be cached from the data processing and storage module, stores the data in a cache system such as Redis and the like, sets proper cache strategies (such as LRU and LFU), firstly tries to acquire the data from a cache when a data access request exists, and acquires the data from a database or other storage systems if the cache is not hit;
The data processing and storage module identifies the data to be deleted and transmits the related information to the data checking module, the data checking module executes multiple checking logics including data comparison, integrity checking, dependency checking and the like, and returns an instruction whether to continue the deleting operation or not to the data processing and storage module according to the checking result, if the checking result is passed, the data processing and storage module executes the deleting operation, provides more detailed explanation and options and inquires whether a user agrees when executing the deleting operation;
The user initiates an access request through the user interaction module and provides user identity information, the access control and authority management module receives the access request and the user identity information and performs identity verification and authority check, the access control and authority management module returns an access result (permission or refusal) to the user interaction module according to the check result, if the access is permitted, the user interaction module displays corresponding data or executes corresponding operation, if the access is refused, the user is displayed with refusal information, and when the user initiates a data query request in the user interaction module, the system firstly tries to acquire the required data from the cache management module. If the needed data exists in the cache, the data is directly returned to the user, so that the access times of the database are reduced, and the response speed is improved;
the user interacts with the system through a graphical user interface or a command line interface, the user can initiate operation requests such as data query, data deletion, authority application and the like, the system executes corresponding operations according to the requests of the user, and an operation result or prompt message is displayed to the user through a user interaction module.
In one embodiment, for the above-mentioned data processing and storage module, the data processing and storage module includes a storage space analysis sub-module, a target data selection sub-module, a status information analysis sub-module, and an event association analysis sub-module, where the storage space analysis sub-module triggers a data optimization process by monitoring and analyzing a storage space usage condition, and sends a request to the target data selection sub-module, where the target data selection sub-module screens target data according to a preset condition, and transmits a screening result to the status information analysis sub-module, where the status information analysis sub-module processes (sorts, delimits, divides, analyzes, deletes and controls) the target data, and determines a processing policy (such as deletion, retention, archiving, etc.) of the data.
In one embodiment, for the storage space analysis submodule, the storage space analysis submodule includes a monitoring unit, an analysis unit and a triggering unit, the monitoring unit continuously monitors the storage space occupation condition of the video download data, collects real-time data of the storage space, the analysis unit receives the data of the monitoring unit, analyzes the use trend and the residual space amount of the storage space, evaluates whether to trigger a data optimization flow, and according to the result of the analysis unit, when the storage space reaches a preset threshold or meets other optimization conditions, the triggering unit triggers the data optimization flow and sends a request to the target data selection submodule.
In one embodiment, for the above target data selecting sub-module, the target data selecting sub-module includes a filtering unit and a condition configuration unit, where the condition configuration unit allows a user or a system administrator to configure conditions for filtering target data, such as a time interval, a file size, a data type, etc., the filtering unit receives a trigger request from the storage space analyzing sub-module and the condition configuration of the condition configuration unit, and filters the target data from the video download data according to the trigger request of the storage space analyzing sub-module and the condition configuration of the condition configuration unit, and the filtering result is transferred to the status information analyzing sub-module.
In one embodiment, for the state information analysis submodule, the state information analysis submodule includes a sorting unit, a demarcation unit, a set dividing unit, a set analysis unit and a deletion control unit, the sorting unit receives the target data from the target data selecting submodule, sorts the data according to a preset sorting rule (such as time and size), the sorting result is transmitted to the demarcation unit, the demarcation unit analyzes the sorted data, demarcates the data according to service requirements or data characteristics, such as dividing the data into a plurality of batches or paragraphs, the set dividing unit further divides the demarcated data into different sets or subsets so as to perform more detailed analysis or processing, the set analysis unit analyzes each set or subset, evaluates importance, value or processing priority thereof, the evaluation result is used for guiding a processing strategy of the data, the deletion control unit determines which data needs to be deleted or reserved based on the result of the set analysis unit, if the data needs to be deleted, sends a request to the data verification module to perform multiple verification, and finally performs deletion operation, if the data needs to be reserved, files or moves to other storage locations.
In one embodiment, for the event correlation analysis submodule, the event correlation analysis submodule includes an event collecting unit, an event normalizing unit, an event storing unit, a correlation rule engine, a correlation analysis unit and an interpretation generating unit;
when any data-related events occur within the system (e.g., data expiration notifications, illegal access records, data migration logs, etc.), the event collection unit captures and passes these events to the event normalization unit;
the event standardization unit processes the collected event data to enable the event data to accord with a unified format and standard;
The processed event data is stored in an event storage unit for subsequent analysis and inquiry;
when a user initiates a deletion request, the system triggers a correlation analysis flow, and the correlation analysis unit retrieves event data related to the data to be deleted from the event storage unit;
The association analysis unit performs association analysis on the retrieved event data by using an association rule engine, and identifies an event sequence and an association mode related to the data to be deleted by analyzing the attributes such as the type, time, source, content and the like of the event;
the interpretation generating unit generates deletion reason interpretations according to the result of the association analysis, wherein the interpretations may comprise specific date of data expiration, detailed information of illegal access, reasons and processes of data migration, and the like, and the deletion reason interpretations are sent to the user interaction module.
In one embodiment, for the above cache management module, the cache management module includes a cache layer integration unit, a cache policy unit and a cache synchronization unit, where the cache layer integration unit is responsible for integrating Redis, memcached cache systems such as cache connection, parameters and the like, ensuring that the cache system can work normally, the cache layer integration unit communicates with the cache system (such as Redis, memcached), sends a cache read-write request, receives a response of the cache system, processes cache data, the cache policy unit is responsible for implementing cache elimination policies such as LRU (least recently used), LFU (least frequently used) and the like, the cache policy unit monitors cache use conditions, including cache hit rate, cache size and the like, the cache policy unit determines which cache items need to be eliminated according to the cache policy, and sends an elimination request to the cache layer integration unit, the cache policy unit receives feedback of the result of the cache layer integration unit about the elimination operation, and the cache synchronization unit is responsible for ensuring consistency of the cache data and database data, and processing cache failure and update problems.
In one embodiment, for the data verification module, the data verification module provides a manual auditing channel, so that an additional verification step can be added before high-risk operation, and the safety of data is further improved;
the data verification module builds a data dependency graph, checks the dependency of the data through a graph theory algorithm, and can identify and process the dependency of the data before deleting the data, and the data verification module comprises the following steps:
defining data entities and dependency relationships, namely identifying the data entities, and definitely incorporating the data entities into a dependency graph (such as database tables, files, objects and the like), defining the dependency relationships, and determining dependency relationship types (such as direct dependency, indirect dependency, circular dependency and the like) and rules among the data entities;
creating a Graph structure, wherein the Graph structure in Graph theory is used for representing data entities and the dependency relationship between the data entities, and the Graph consists of nodes and edges, wherein the nodes represent the data entities, and the edges represent the dependency relationship; adding a Node, adding a corresponding Node in the Graph for each data entity, adding an Edge, adding a corresponding Edge in the Graph according to the dependency relationship among the data entities, wherein the direction of the Edge generally represents the direction of dependence (such as from a relying party to a relied party);
The dependency analysis comprises the steps of directly relying on whether two nodes are connected by a direct edge in the diagram or not to represent the direct dependency relationship between the two nodes, indirectly relying on that all possible dependency paths are found through the depth-first search to identify the indirect dependency relationship, and circularly relying on that whether a ring (Cycle) exists in the diagram or not is checked, wherein the existence of the ring represents the existence of the circularly dependent relationship, which is generally undesirable, because the complexity of data deletion or update is increased, and depending on conflict detection, and when a certain data entity is scheduled to be deleted, the depth-first search is used for checking whether the operation violates any defined dependency rule or other data entity is invalid or not;
The dependency relationship is processed, namely, a dependency solution strategy is processed, a corresponding dependency solution strategy is formulated according to the checking result, for example, if deleting a certain data entity can cause other data entities to fail, the dependent data entities can be required to be updated or deleted first, or deleting operation is cancelled, and the checking and processing process of the dependency relationship is automated by automated processing.
In one embodiment, for the above access control and rights management module, the access control and rights management module includes a role management unit, a rights allocation unit, a user management unit, an access control decision unit, a sensitive data protection unit, and an audit log unit, the role management unit is responsible for defining different roles in the system and allocating a set of rights for each role, the role management unit interacts with the rights allocation unit and the user management unit to ensure proper association between roles and rights, users, the rights allocation unit is responsible for allocating access rights for system resources (such as data, functions, etc.) according to roles defined by the role management unit, the rights allocation unit interacts with the role management unit, the user management unit and the access control decision unit to ensure accurate allocation and execution of rights, the user management unit is responsible for managing registration, authentication, authorization, etc. information of users, associating users with roles, the user management unit interacts with the role management unit, the rights allocation unit and the access control decision unit to ensure that users can access corresponding data or perform operations in their role identities, the access control decision unit is responsible for deciding, when users access to system resources, and whether sensitive data is required to be directly transferred to the sensitive data protection units by the user, and other sensitive data protection units are restricted by the access control units, the sensitive data protection units are allowed to be directly transmitted by the access control units, the access control units is restricted by the sensitive data protection units, the sensitive data protection unit interacts with the access control decision unit and the storage system to ensure the security of the sensitive data in the storage and transmission process, and the audit log unit is responsible for recording the data access and operation behaviors of all users, including logging in, accessing resources, modifying data and the like, so as to facilitate post-hoc tracking and audit, and interacts with the user management unit, the access control decision unit and the storage system to collect and store audit log information.
In one embodiment, for the above-mentioned user interaction module package, the user interaction module includes an interface presenting unit, a user operation unit, a user interaction logic unit, a deletion confirmation unit and an option customization unit, where the interface presenting unit is responsible for rendering and displaying a Graphical User Interface (GUI) or a Command Line Interface (CLI) to enable a user to interact with the system, the interface presenting unit receives user input from the user operation unit and displays system feedback to the user, the user operation unit is responsible for capturing operation instructions of the user, such as clicking, inputting, etc., and converting them into instructions identifiable by the system, the user operation unit interacts with the user interaction logic unit, transmits the user operation instructions while receiving feedback from the interface presenting unit and displaying to the user, and the user interaction logic unit is responsible for processing the instructions transmitted by the user operation unit, executing corresponding logic judgment such as authority verification, data verification and the like, and calling functions of other units, wherein a user interaction logic unit interacts with a user operation unit, a deletion confirmation unit, an option customization unit and a data management module, coordinates the execution of user operation, and before deleting data, the deletion confirmation unit inquires whether a user agrees in a popup window, mail notification and the like manner and provides data information and deletion reason explanation, the deletion reason explanation is provided by an event association analysis submodule, the deletion confirmation unit receives a deletion request from the user interaction logic unit, displays the deletion confirmation information to the user and sends an instruction to the option customization unit according to user feedback (agreeing/refusing), the option customization unit allows the user to select whether to delete immediately, delay deletion or mark to be audited, the flexibility of user operation is increased, the option customization unit receives the user selection from the deletion confirmation unit, and sends a corresponding deletion or marking instruction to the data management module according to the user selection.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1.一种基于大数据处理的计算机设备,其特征在于,包括:1. A computer device based on big data processing, characterized by comprising: 数据处理与存储模块,用于数据的接收、处理、分析和存储;Data processing and storage module, used for receiving, processing, analyzing and storing data; 缓存管理模块,用于管理缓存数据,减少对数据库的直接访问;Cache management module, used to manage cache data and reduce direct access to the database; 数据校验模块,用于在数据删除前进行多重校验;Data verification module, used to perform multiple verifications before data deletion; 访问控制与权限管理模块,用于管理用户访问权限;Access control and permission management module, used to manage user access rights; 用户交互模块,用于提供用户界面,与用户进行交互;A user interaction module is used to provide a user interface and interact with users; 安全模块,用于远程监控与管理以及数据备份与恢复;Security module for remote monitoring and management as well as data backup and recovery; 所述数据处理与存储模块是核心,所述缓存管理模块从数据处理与存储模块接收需要缓存的数据,所述数据校验模块从数据处理与存储模块接收待删除的数据及其对应信息,向数据处理与存储模块返回校验结果,所述访问控制与权限管理模块从用户交互模块接收访问请求及用户身份信息,向用户交互模块返回访问结果。The data processing and storage module is the core, the cache management module receives the data to be cached from the data processing and storage module, the data verification module receives the data to be deleted and its corresponding information from the data processing and storage module, and returns the verification result to the data processing and storage module, and the access control and permission management module receives the access request and user identity information from the user interaction module, and returns the access result to the user interaction module. 2.根据权利要求1所述的一种基于大数据处理的计算机设备,其特征在于,所述数据处理与存储模块包括存储空间分析子模块、目标数据选取子模块、状态信息分析子模块以及事件关联分析子模块,所述存储空间分析子模块通过监控和分析存储空间使用情况,触发数据优化流程,并向目标数据选取子模块发送请求,所述目标数据选取子模块根据预设条件筛选目标数据,并将筛选结果传递给状态信息分析子模块,所述状态信息分析子模块处理目标数据,决定数据的处理策略。2. A computer device based on big data processing according to claim 1, characterized in that the data processing and storage module includes a storage space analysis submodule, a target data selection submodule, a status information analysis submodule and an event correlation analysis submodule, the storage space analysis submodule triggers the data optimization process by monitoring and analyzing the storage space usage, and sends a request to the target data selection submodule, the target data selection submodule filters the target data according to preset conditions, and passes the screening results to the status information analysis submodule, the status information analysis submodule processes the target data and determines the data processing strategy. 3.根据权利要求2所述的一种基于大数据处理的计算机设备,其特征在于,所述存储空间分析子模块包括监控单元、分析单元以及触发单元,所述监控单元持续监控视频下载数据的存储空间占用情况,收集存储空间的实时数据,所述分析单元接收监控单元的数据,分析存储空间的使用趋势、剩余空间量,评估是否触发数据优化流程,根据分析单元的结果,当存储空间达到预设阈值或满足其他优化条件时,所述触发单元触发数据优化流程,并向目标数据选取子模块发送请求。3. According to claim 2, a computer device based on big data processing is characterized in that the storage space analysis submodule includes a monitoring unit, an analysis unit and a trigger unit. The monitoring unit continuously monitors the storage space occupancy of video download data and collects real-time data of the storage space. The analysis unit receives the data of the monitoring unit, analyzes the usage trend and remaining space of the storage space, and evaluates whether to trigger the data optimization process. According to the result of the analysis unit, when the storage space reaches a preset threshold or meets other optimization conditions, the trigger unit triggers the data optimization process and sends a request to the target data selection submodule. 4.根据权利要求2所述的一种基于大数据处理的计算机设备,其特征在于,所述目标数据选取子模块包括筛选单元以及条件配置单元,所述条件配置单元允许用户或系统管理员配置筛选目标数据的条件,所述筛选单元接收来自存储空间分析子模块的触发请求和条件配置单元的条件配置,根据存储空间分析子模块的触发请求和条件配置单元的条件配置从视频下载数据中筛选出目标数据,筛选结果将传递给状态信息分析子模块。4. According to claim 2, a computer device based on big data processing is characterized in that the target data selection submodule includes a screening unit and a condition configuration unit, the condition configuration unit allows a user or a system administrator to configure the conditions for screening the target data, the screening unit receives a trigger request from the storage space analysis submodule and the condition configuration of the condition configuration unit, and screens out the target data from the video download data according to the trigger request of the storage space analysis submodule and the condition configuration of the condition configuration unit, and the screening result will be passed to the status information analysis submodule. 5.根据权利要求2所述的一种基于大数据处理的计算机设备,其特征在于,所述状态信息分析子模块包括排序单元、划界单元、集合划分单元、集合分析单元以及删除控制单元,所述排序单元接收来自目标数据选取子模块的目标数据,根据预设的排序规则对数据进行排序,排序结果将传递给划界单元,所述划界单元分析排序后的数据,根据业务需求或数据特性划定数据边界,所述集合划分单元将划界后的数据进一步划分为不同的集合或子集,所述集合分析单元对每个集合或子集进行分析,评估其重要性、价值或处理优先级,评估结果将用于指导数据的处理策略,所述删除控制单元基于集合分析单元的结果,决定哪些数据需要被删除或保留,如果需要删除数据,则向数据校验模块发送请求进行多重校验,并最终执行删除操作,如果需要保留数据,则将其归档或移动到其他存储位置。5. A computer device based on big data processing according to claim 2, characterized in that the status information analysis submodule includes a sorting unit, a demarcation unit, a set division unit, a set analysis unit and a deletion control unit. The sorting unit receives the target data from the target data selection submodule, sorts the data according to a preset sorting rule, and the sorting result is passed to the demarcation unit. The demarcation unit analyzes the sorted data and defines the data boundary according to business requirements or data characteristics. The set division unit further divides the demarcated data into different sets or subsets. The set analysis unit analyzes each set or subset to evaluate its importance, value or processing priority, and the evaluation result is used to guide the data processing strategy. The deletion control unit decides which data needs to be deleted or retained based on the result of the set analysis unit. If the data needs to be deleted, a request is sent to the data verification module for multiple verifications, and finally the deletion operation is performed. If the data needs to be retained, it is archived or moved to other storage locations. 6.根据权利要求2所述的一种基于大数据处理的计算机设备,其特征在于,所述事件关联分析子模块包括事件收集单元、事件标准化单元、事件存储单元、关联规则引擎、关联分析单元以及解释生成单元;6. A computer device based on big data processing according to claim 2, characterized in that the event correlation analysis submodule includes an event collection unit, an event standardization unit, an event storage unit, a correlation rule engine, a correlation analysis unit and an explanation generation unit; 当系统内部发生任何与数据相关的事件时,所述事件收集单元会捕获这些事件并将其传递给事件标准化单元;When any data-related events occur within the system, the event collection unit captures these events and passes them to the event standardization unit; 事件标准化单元对收集到的事件数据进行处理;The event standardization unit processes the collected event data; 处理后的事件数据被存储到事件存储单元中;The processed event data is stored in the event storage unit; 当用户发起删除请求时,系统触发关联分析流程,所述关联分析单元从事件存储单元中检索与待删除数据相关的事件数据;When the user initiates a deletion request, the system triggers the association analysis process, and the association analysis unit retrieves event data related to the data to be deleted from the event storage unit; 所述关联分析单元利用关联规则引擎对检索到的事件数据进行关联分析,通过分析事件的属性,识别出与待删除数据相关的事件序列和关联模式;The association analysis unit uses an association rule engine to perform association analysis on the retrieved event data, and identifies event sequences and association patterns related to the data to be deleted by analyzing the attributes of the events; 所述解释生成单元根据关联分析的结果,生成删除原因解释,所述删除原因解释发给用户交互模块。The explanation generating unit generates a deletion reason explanation according to the result of the association analysis, and the deletion reason explanation is sent to the user interaction module. 7.根据权利要求1所述的一种基于大数据处理的计算机设备,其特征在于,所述缓存管理模块包括缓存层集成单元、缓存策略单元以及缓存同步单元,所述缓存层集成单元负责集成缓存系统,所述缓存层集成单元与缓存系统进行通信,发送缓存读写请求,接收缓存系统的响应,处理缓存数据,所述缓存策略单元负责实现缓存淘汰策略,所述缓存策略单元监控缓存使用情况,所述缓存策略单元根据缓存策略决定哪些缓存项需要被淘汰,并向缓存层集成单元发送淘汰请求,所述缓存策略单元接收缓存层集成单元关于淘汰操作的结果反馈,所述缓存同步单元负责确保缓存数据与数据库数据的一致性,处理缓存失效和更新问题。7. According to claim 1, a computer device based on big data processing is characterized in that the cache management module includes a cache layer integration unit, a cache policy unit and a cache synchronization unit. The cache layer integration unit is responsible for integrating the cache system, communicating with the cache system, sending cache read and write requests, receiving responses from the cache system, and processing cache data. The cache policy unit is responsible for implementing the cache elimination strategy. The cache policy unit monitors cache usage. The cache policy unit determines which cache items need to be eliminated according to the cache strategy and sends an elimination request to the cache layer integration unit. The cache policy unit receives feedback from the cache layer integration unit on the results of the elimination operation. The cache synchronization unit is responsible for ensuring the consistency of cache data with database data and handling cache invalidation and update issues. 8.根据权利要求1所述的一种基于大数据处理的计算机设备,其特征在于,所述数据校验模块提供人工审核通道;8. A computer device based on big data processing according to claim 1, characterized in that the data verification module provides a manual review channel; 所述数据校验模块构建数据依赖关系图,通过图论算法来检查数据的依赖关系,在删除数据前能够识别并处理数据的依赖关系,包括以下步骤:The data verification module constructs a data dependency graph, checks the data dependency through a graph theory algorithm, and can identify and process the data dependency before deleting the data, including the following steps: 定义数据实体和依赖关系:识别数据实体,明确被纳入依赖关系图中的数据实体;定义依赖关系,确定数据实体之间的依赖关系类型和规则;Define data entities and dependencies: Identify data entities and specify the data entities to be included in the dependency graph; define dependencies and determine the dependency types and rules between data entities; 构建依赖关系图:创建图结构,使用图论中的图结构来表示数据实体和它们之间的依赖关系,所述图由节点和边组成,其中,节点代表数据实体,边代表依赖关系;添加节点,为每个数据实体在图中添加一个对应的节点;添加边,根据数据实体之间的依赖关系,在图中添加相应的边,所述边的方向通常表示依赖的方向;Build a dependency graph: Create a graph structure, using the graph structure in graph theory to represent data entities and the dependency relationships between them. The graph consists of nodes and edges, where nodes represent data entities and edges represent dependency relationships. Add nodes, add a corresponding node to the graph for each data entity. Add edges, add corresponding edges to the graph according to the dependency relationships between data entities, and the direction of the edge usually indicates the direction of dependency. 实现图论算法来检查依赖关系:遍历算法,使用深度优先搜索来检查图中的依赖关系;依赖分析:直接依赖,检查图中是否存在直接的边连接两个节点,表示它们之间存在直接的依赖关系;间接依赖,通过深度优先搜索找到所有可能的依赖路径,识别出间接依赖关系;循环依赖,检查图中是否存在环,所述环的存在表示存在循环依赖关系;依赖冲突检测,在计划删除某个数据实体时,使用深度优先搜索检查该操作是否会违反任何已定义的依赖规则或导致其他数据实体变得无效或不可用;Implement graph theory algorithms to check dependencies: traversal algorithm, use depth-first search to check dependencies in the graph; dependency analysis: direct dependency, check whether there is a direct edge connecting two nodes in the graph, indicating that there is a direct dependency between them; indirect dependency, find all possible dependency paths through depth-first search and identify indirect dependencies; circular dependency, check whether there is a loop in the graph, the existence of the loop indicates the existence of a circular dependency; dependency conflict detection, when planning to delete a data entity, use depth-first search to check whether the operation will violate any defined dependency rules or cause other data entities to become invalid or unavailable; 处理依赖关系:依赖解决策略,根据检查结果,制定相应的依赖解决策略;自动化处理,将依赖关系的检查和处理过程自动化。Handling dependencies: Dependency resolution strategy: formulate corresponding dependency resolution strategy based on the inspection results; automated processing: automate the dependency inspection and processing process. 9.根据权利要求1所述的一种基于大数据处理的计算机设备,其特征在于,所述访问控制与权限管理模块包括角色管理单元、权限分配单元、用户管理单元、访问控制决策单元、敏感数据保护单元以及审计日志单元,所述角色管理单元负责定义系统中的不同角色,并为每个角色分配一组权限,所述角色管理单元与权限分配单元和用户管理单元交互,所述权限分配单元负责根据角色管理单元定义的角色,为系统资源分配访问权限,所述权限分配单元与角色管理单元、用户管理单元和访问控制决策单元交互,确保权限的准确分配和执行,所述用户管理单元负责管理用户信息,将用户与角色进行关联,所述用户管理单元与角色管理单元、权限分配单元和访问控制决策单元交互,所述访问控制决策单元负责在用户尝试访问系统资源时,根据用户的角色、权限以及其他属性来决定是否允许访问,所述访问控制决策单元与用户管理单元、权限分配单元、敏感数据保护单元和审计日志单元交互,所述敏感数据保护单元负责对敏感数据进行加密存储和传输,实施访问控制策略以限制对敏感数据的直接访问,所述敏感数据保护单元与访问控制决策单元和存储系统交互,所述审计日志单元负责记录所有用户的数据访问和操作行为,所述审计日志单元与用户管理单元、访问控制决策单元和存储系统交互。9. A computer device based on big data processing according to claim 1, characterized in that the access control and permission management module includes a role management unit, a permission allocation unit, a user management unit, an access control decision unit, a sensitive data protection unit and an audit log unit, wherein the role management unit is responsible for defining different roles in the system and assigning a set of permissions to each role, the role management unit interacts with the permission allocation unit and the user management unit, the permission allocation unit is responsible for allocating access rights to system resources according to the roles defined by the role management unit, the permission allocation unit interacts with the role management unit, the user management unit and the access control decision unit to ensure accurate allocation and execution of permissions, the user management unit is responsible for managing user information, and associates users with roles The user management unit interacts with the role management unit, the permission allocation unit and the access control decision unit. The access control decision unit is responsible for deciding whether to allow access based on the user's role, permission and other attributes when the user attempts to access system resources. The access control decision unit interacts with the user management unit, the permission allocation unit, the sensitive data protection unit and the audit log unit. The sensitive data protection unit is responsible for encrypting the storage and transmission of sensitive data and implementing access control policies to limit direct access to sensitive data. The sensitive data protection unit interacts with the access control decision unit and the storage system. The audit log unit is responsible for recording the data access and operation behaviors of all users. The audit log unit interacts with the user management unit, the access control decision unit and the storage system. 10.根据权利要求2所述的一种基于大数据处理的计算机设备,其特征在于,所述用户交互模块包括界面呈现单元、用户操作单元、用户交互逻辑单元、删除确认单元以及选项定制单元,所述界面呈现单元负责图形化用户界面或命令行界面的渲染和展示,使用户与系统进行交互,所述界面呈现单元接收来自用户操作单元的用户输入,并将系统反馈展示给用户,所述用户操作单元负责捕获用户的操作指令,并将其转换为系统可识别的指令,所述用户操作单元与用户交互逻辑单元交互,传递用户操作指令,同时接收来自界面呈现单元的反馈并展示给用户,所述用户交互逻辑单元负责处理用户操作单元传递的指令,所述用户交互逻辑单元与用户操作单元、删除确认单元、选项定制单元以及数据管理模块交互,协调用户操作的执行,在删除数据前,所述删除确认单元询问用户是否同意,并提供数据信息和删除原因解释,所述删除原因解释由事件关联分析子模块提供,所述删除确认单元接收来自用户交互逻辑单元的删除请求,展示删除确认信息给用户,并根据用户反馈向选项定制单元发送指令,所述选项定制单元允许用户选择是否立即删除、延迟删除或标记为待审核,所述选项定制单元接收来自删除确认单元的用户选择,并根据用户的选择向数据管理模块发送相应的删除或标记指令。10. A computer device based on big data processing according to claim 2, characterized in that the user interaction module includes an interface presentation unit, a user operation unit, a user interaction logic unit, a deletion confirmation unit and an option customization unit, the interface presentation unit is responsible for rendering and displaying a graphical user interface or a command line interface, so that the user can interact with the system, the interface presentation unit receives user input from the user operation unit, and displays system feedback to the user, the user operation unit is responsible for capturing the user's operation instructions and converting them into instructions recognizable by the system, the user operation unit interacts with the user interaction logic unit, transmits the user operation instructions, and at the same time receives feedback from the interface presentation unit and displays it to the user, the user interaction logic unit is responsible for processing the user's operation The user interaction logic unit interacts with the user operation unit, the deletion confirmation unit, the option customization unit and the data management module to coordinate the execution of user operations. Before deleting data, the deletion confirmation unit asks the user whether he agrees and provides data information and an explanation of the deletion reason. The explanation of the deletion reason is provided by the event association analysis submodule. The deletion confirmation unit receives the deletion request from the user interaction logic unit, displays the deletion confirmation information to the user, and sends instructions to the option customization unit according to the user feedback. The option customization unit allows the user to choose whether to delete immediately, delay deletion or mark it for review. The option customization unit receives the user's selection from the deletion confirmation unit and sends corresponding deletion or marking instructions to the data management module according to the user's selection.
CN202411562076.3A 2024-11-05 2024-11-05 A computer device based on big data processing Pending CN119106005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411562076.3A CN119106005A (en) 2024-11-05 2024-11-05 A computer device based on big data processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411562076.3A CN119106005A (en) 2024-11-05 2024-11-05 A computer device based on big data processing

Publications (1)

Publication Number Publication Date
CN119106005A true CN119106005A (en) 2024-12-10

Family

ID=93720143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411562076.3A Pending CN119106005A (en) 2024-11-05 2024-11-05 A computer device based on big data processing

Country Status (1)

Country Link
CN (1) CN119106005A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119540430A (en) * 2025-01-21 2025-02-28 武创芯研科技(武汉)有限公司 Three-dimensional graphics rendering method and device based on graph theory

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282485A1 (en) * 2005-06-10 2006-12-14 Himanshu Aggarwal Method and system for automatic management of storage space
CN114996675A (en) * 2022-06-23 2022-09-02 平安科技(深圳)有限公司 Data query method and device, computer equipment and storage medium
CN115510272A (en) * 2022-09-20 2022-12-23 哈尔滨萌动科技有限公司 Computer data processing system based on big data analysis
CN116820346A (en) * 2023-07-11 2023-09-29 哈尔滨市唯美科技有限公司 A computer big data storage control system and method
CN117971129A (en) * 2024-02-27 2024-05-03 桂林理工大学 An efficient storage system for big data statistical collection
CN118364462A (en) * 2024-04-08 2024-07-19 广西电网有限责任公司电力科学研究院 Software supply chain security assessment method and system based on static analysis

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282485A1 (en) * 2005-06-10 2006-12-14 Himanshu Aggarwal Method and system for automatic management of storage space
CN114996675A (en) * 2022-06-23 2022-09-02 平安科技(深圳)有限公司 Data query method and device, computer equipment and storage medium
CN115510272A (en) * 2022-09-20 2022-12-23 哈尔滨萌动科技有限公司 Computer data processing system based on big data analysis
CN116820346A (en) * 2023-07-11 2023-09-29 哈尔滨市唯美科技有限公司 A computer big data storage control system and method
CN117971129A (en) * 2024-02-27 2024-05-03 桂林理工大学 An efficient storage system for big data statistical collection
CN118364462A (en) * 2024-04-08 2024-07-19 广西电网有限责任公司电力科学研究院 Software supply chain security assessment method and system based on static analysis

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119540430A (en) * 2025-01-21 2025-02-28 武创芯研科技(武汉)有限公司 Three-dimensional graphics rendering method and device based on graph theory

Similar Documents

Publication Publication Date Title
US7673324B2 (en) Method and system for tracking an operating performed on an information asset with metadata associated therewith
KR100732789B1 (en) Method and apparatus for monitoring database system
US7356545B2 (en) Enabling relational databases to incorporate customized intrusion prevention policies
CN102598021B (en) Method and system for managing security objects
CN110795257A (en) Method, device and equipment for processing multi-cluster operation records and storage medium
US5062045A (en) System for maintaining a document and activity selective alterable document history log in a data processing system
US9509722B2 (en) Provisioning access control using SDDL on the basis of an XACML policy
US12393472B2 (en) Unified event processing and log management over multiple domains
US8135762B2 (en) System and method for determining true computer file type identity
KR102734574B1 (en) Device for analyzing large amounts of log data based on ruleset, its control method and program
US12443604B2 (en) Nested discovery and deletion of resources
CN119106005A (en) A computer device based on big data processing
CN117744129B (en) Intelligent operation and maintenance method and system based on CIM
US20080208866A1 (en) Identification, notification, and control of data access quantity and patterns
CN120068088B (en) Unified resource identification and parsing calculation method based on trusted data space
CN119669167B (en) File observation method, electronic device, chip and program product
CN117951682A (en) Application process detection processing method, system, device and computer equipment
US12430461B2 (en) Query limiting and tracking in a data sharing environment
US20240256700A1 (en) Mechanisms to predict system resource consumption of transactions
WO2024164630A1 (en) Microkernel operating system based security monitoring method, apparatus, device, and chip
CN118094497A (en) Mobile storage equipment safety management method based on authority allocation and cancellation
CN115525924A (en) An Information Security System Based on Cloud Computing
CN118916906B (en) Data permission configuration method, device and storage medium
CN119442198A (en) A data permission identification method, device, equipment and storage medium
CN120692042A (en) Account management method, device, equipment, system, program product and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination