[go: up one dir, main page]

CN112000943B - Information verification method based on edge computing and cloud edge fusion and central cloud platform - Google Patents

Information verification method based on edge computing and cloud edge fusion and central cloud platform Download PDF

Info

Publication number
CN112000943B
CN112000943B CN202010905886.XA CN202010905886A CN112000943B CN 112000943 B CN112000943 B CN 112000943B CN 202010905886 A CN202010905886 A CN 202010905886A CN 112000943 B CN112000943 B CN 112000943B
Authority
CN
China
Prior art keywords
information
target
service information
sending
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010905886.XA
Other languages
Chinese (zh)
Other versions
CN112000943A (en
Inventor
陈顺发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Xiaomeng Technology Co.,Ltd.
Original Assignee
Jiangsu Xiaomeng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Xiaomeng Technology Co ltd filed Critical Jiangsu Xiaomeng Technology Co ltd
Priority to CN202010905886.XA priority Critical patent/CN112000943B/en
Priority to CN202110596388.6A priority patent/CN113326500B/en
Publication of CN112000943A publication Critical patent/CN112000943A/en
Application granted granted Critical
Publication of CN112000943B publication Critical patent/CN112000943B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The disclosure discloses an information verification method based on edge computing and cloud-edge fusion and a central cloud platform. The method comprises the following steps: the method comprises the steps of firstly obtaining first group sending service information of target edge node equipment in a first node group configured in advance, secondly obtaining second group sending service information of the target edge node equipment in a second node group determined based on received real-time service requirements, and finally verifying original information which is extracted by the target edge node equipment based on the real-time service requirements and used for generating the second group sending service information according to the first group sending service information and the second group sending service information. Therefore, cross validation of service information can be realized by validating the original information, so that whether the edge node equipment has the behavior of mutually transmitting error information during interaction is timely and accurately judged, a basis is provided for subsequent correction, and the normal and reliable operation of the whole edge node equipment system can be ensured.

Description

Information verification method based on edge computing and cloud edge fusion and central cloud platform
Technical Field
The disclosure relates to the technical field of edge computing information processing, and in particular relates to an information verification method based on edge computing and cloud-edge fusion and a central cloud platform.
Background
In the edge computing architecture with cloud edge coordination, each edge node device is independent, and each edge node device is dedicated to processing of service information of the edge node device, so that the service information processing efficiency can be effectively improved, and the response time between devices is reduced.
However, this method also has some problems: because the edge node devices are independent of each other, cross validation of service information cannot be achieved, which may cause that the edge node devices may transmit error information to each other during interaction.
Disclosure of Invention
In order to solve the technical problems in the related art, the disclosure provides an information verification method based on edge computing and cloud-edge fusion and a central cloud platform.
According to a first aspect of the embodiments of the present invention, there is provided an information verification method based on edge computing and cloud edge fusion, applied to a central cloud platform communicatively connected to a plurality of edge node devices that communicate with each other, the method at least including:
acquiring first trunking service information of target edge node equipment in a first node group configured in advance;
obtaining second group sending service information of the target edge node equipment in a second node group determined based on the received real-time service requirement;
and according to the first group sending service information and the second group sending service information, verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating the second group sending service information.
Alternatively,
the obtaining first trunking service information of the target edge node device in a preconfigured first node group includes: acquiring first target service information of a target edge node device in a first node group configured in advance, wherein the first target service information has a first group sending tag; wherein, the first mass sending labels are a plurality of non-repeating multilevel labels;
the obtaining second group sending service information of the target edge node device in a second node group determined based on the received real-time service requirement includes: obtaining second target service information of a second group sending label in a second node group determined by the target edge node equipment based on the received real-time service requirement; wherein the second mass sending tags are a plurality of non-repeating multilevel tags;
the verifying, according to the first bulk service information and the second bulk service information, the original information extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk service information includes: and according to the first target service information with the first mass sending label and the second target service information with the second mass sending label, verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating the second mass sending service information.
Optionally, the verifying, according to the first target service information with the first bulk sending tag and the second target service information with the second bulk sending tag, the original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk sending service information, includes:
acquiring device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags;
acquiring service correlation degrees corresponding to at least two second mass sending labels in the second target service information with the second mass sending labels;
and verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating second mass sending service information according to the equipment interaction records corresponding to the at least two first mass sending tags, the service correlation degrees corresponding to the at least two second mass sending tags and the service execution log corresponding to the second target service information with the second mass sending tags.
Optionally, the verifying, according to the device interaction records corresponding to the at least two first group sending tags, the service correlation corresponding to the at least two second group sending tags, and the service execution log corresponding to the second target service information with the second group sending tags, the original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second group sending service information, includes:
determining the label authentication authority of the mass texting label to be verified, which is matched with the at least two second mass texting labels, in the second target service information by adopting the equipment interaction records corresponding to the at least two first mass texting labels and the service type distribution of the original information;
determining the associated service information of the second target service information with the second mass sending labels by adopting the service correlation degrees corresponding to the at least two second mass sending labels; the related service information is service information with a transaction behavior with second target service information;
acquiring a service execution log corresponding to second target service information with a second mass sending label according to the label authentication authority of the mass sending label to be verified and the associated service information of the second target service information with the second mass sending label;
according to the service execution log corresponding to the second target service information with the second mass sending label, performing abnormal class screening on the service class distribution to obtain a plurality of information authority levels corresponding to the original information;
judging whether a target information authority level exceeding a set authority level exists in the plurality of information authority levels or not;
when judging that a target information authority level exceeding the set authority level exists in the plurality of information authority levels, determining to-be-verified information corresponding to the target information authority level, calculating a safety evaluation coefficient of a data extraction interface corresponding to the target edge node device when the target edge node device extracts the to-be-verified information from a preset device database, and when the safety evaluation coefficient is lower than the set coefficient, determining that information distortion risk exists when the target edge node device is switched from the first node group to the second node group for sending second group sending service information;
when the safety evaluation coefficient is lower than a set coefficient, or
When judging that no target information authority level exceeding the set authority level exists in the plurality of information authority levels, determining that no information distortion risk exists when the target edge node equipment is switched from the first node group to the second node group to send second group sending service information; the information distortion risk is used for representing that information loss or information messy codes exist in the target edge node equipment when the service information is sent in the mass mode.
Optionally, the obtaining second target service information of the target edge node device, where a second group sending tag exists, in a second node group determined based on the received real-time service requirement includes:
obtaining continuous service information to be screened of the target edge node equipment in a second node group determined based on the received real-time service requirement and the first target service information with the first group sending label on a label updating track; the label updating track is used for representing the updating times and the thinning moments of the mass-sending label in the time sequence;
screening out second target service information with a second mass-sending label based on the label updating track; the method specifically comprises the following steps: determining the label direction of each group of service information to be screened based on the label updating track, if the label direction is similar to the set label direction of the first target service information, deleting the service information to be screened, and if the label direction is not similar to the set label direction of the first target service information, reserving the service information to be screened; determining the reserved service information to be screened as second target service information; and the reserved mass sending label of the service information to be screened is the second mass sending label.
Alternatively,
the obtaining of the device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags includes: acquiring device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags by adopting a running log analysis mode; the method specifically comprises the following steps: calling an operation log text of the target edge node equipment through a preset log calling interface, determining a target log text of a target time period corresponding to the label generation time of the first mass-sending label from the log text, and acquiring equipment interaction records corresponding to at least two first mass-sending labels according to the target log text; the time sequence correlation degree between the at least two first mass sending tags is greater than a set correlation degree, and the time sequence correlation degree is used for representing the difference value of the tag generation moments of the at least two first mass sending tags;
the obtaining of the service relevancy corresponding to at least two second group sending tags in the second target service information with the second group sending tags includes: acquiring first service behavior data and second service behavior data corresponding to the at least two second mass sending tags respectively, extracting first data characteristics of the first service behavior data and second data characteristics of the second service behavior data, calculating cosine distances between the first data characteristics and the second data characteristics, and determining the service correlation degree according to the cosine distances.
Optionally, the obtaining first target service information of a first group sending tag in a first node group configured in advance by a target edge node device includes: acquiring communication protocol information of target edge node equipment according to the node communication topology of the preconfigured first node group; obtaining first target service information with a first group sending tag in the communication protocol information;
the obtaining, according to the node communication topology of the preconfigured first node group, communication protocol information of the target edge node device includes: when the target edge node device communicates with the first butt edge node devices according to an information request mode capable of obtaining authorization information of the first butt edge node devices, obtaining communication protocol information of the target edge node device according to the node communication topology of the preconfigured first node group;
wherein the target edge node device communicates with the plurality of first butting edge node devices in an information request manner in which authorization information of the plurality of first butting edge node devices is available, and includes: the target edge node device generates an information request instruction based on a preset check random number and sends the information request instruction to the first butt edge node devices so as to obtain authorization information of the first butt edge node devices.
According to a second aspect of the embodiments of the present invention, there is provided a central cloud platform, in which an information verification apparatus is disposed, and the information verification apparatus implements the information verification method when operating.
According to a third aspect of the embodiments of the present invention, there is provided a central cloud platform, including: a processor; and a memory in communication with the processor; wherein: the processor is used for calling the computer program from the memory and realizing the information verification method by running the computer program.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed, implements the above-described information verification method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects.
The method comprises the steps of firstly obtaining first group sending service information of target edge node equipment in a first node group configured in advance, secondly obtaining second group sending service information of the target edge node equipment in a second node group determined based on received real-time service requirements, and finally verifying original information which is extracted by the target edge node equipment based on the real-time service requirements and used for generating the second group sending service information according to the first group sending service information and the second group sending service information. Therefore, cross validation of service information can be realized by validating the original information, so that whether the edge node equipment has the behavior of mutually transmitting error information during interaction is timely and accurately judged, a basis is provided for subsequent correction, and the normal and reliable operation of the whole edge node equipment system can be ensured.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is an architectural schematic diagram of an information verification system based on edge computing and cloud-edge fusion in accordance with the present disclosure;
FIG. 2 is a schematic flow diagram of an information verification method based on edge computing and cloud-edge fusion according to the present disclosure;
FIG. 3 is a functional block diagram of an information validation apparatus based on edge computing and cloud-edge fusion according to the present disclosure;
fig. 4 is a hardware architecture diagram of a central cloud platform according to the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The inventor finds out through research and research that the common service data verification on the edge node equipment is point-to-point verification, namely the service data verification is carried out on every two edge node equipment with interaction. However, the method does not consider the condition of mass sending of the service data, the accuracy of the service data verification is difficult to ensure, and furthermore, the cloud resources are greatly consumed by the point-to-point verification, so that the cloud operation efficiency is reduced.
In order to solve the technical problems, the invention aims to provide an information verification method based on edge computing and cloud edge fusion and a central cloud platform, which can realize mass-sending service data verification on edge node equipment, improve the accuracy of service data verification and improve the operation efficiency of the central cloud platform.
Referring first to fig. 1, an architecture diagram of a data verification system 100 based on edge computing and cloud edge fusion is provided. The data verification system 100 includes a central cloud platform 110 and a plurality of edge node devices 130, where the plurality of edge node devices 130 communicate with each other, and each edge node device 130 communicates with the central cloud platform 110.
In this embodiment, the central cloud platform 110 may be applied to a smart city, a smart medical service, a smart industrial park, and a smart industrial internet, and the data verification system 100 may be applied to scenarios such as big data, cloud computing, and edge computing, including but not limited to new energy vehicle system management, intelligent online office, intelligent online education, cloud game data processing, e-commerce live delivery processing, cloud internet processing, block chain digital financial currency service, and block chain supply chain financial service, and the like, which are not limited herein. It is understood that when applied to the above-mentioned corresponding fields, the content and type of the service data are adjusted and further refined, and are not listed here.
On the basis, please refer to fig. 2 in combination, an information verification method based on edge computing and cloud edge fusion is provided, and the method may be applied to the central cloud platform 110 in fig. 1, and specifically may include the contents described in the following steps S21 to S23.
Step S21, obtain first trunking service information of the target edge node device in the preconfigured first node group.
Illustratively, the first trunking service information is information that is sent by the target edge node device to a plurality of first peer edge node devices in the first node group except the target edge node device.
Step S22, obtain second group-sending service information of the target edge node device in the second node group determined based on the received real-time service requirement.
Exemplarily, the second group service information is information that the target edge node device sends to a plurality of second peer edge node devices in the second node group except the target edge node device, and the first node group is different from the second node group.
Step S23, according to the first bulk service information and the second bulk service information, verifying original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk service information.
It can be understood that when the original information is verified to have a problem, corresponding measures may be taken to perform correction or repair, and details about this part will be expanded below and will not be described herein again.
When the contents described in the above steps S21 to S23 are specifically applied, first group sending service information of the target edge node device in a first node group configured in advance is obtained, second group sending service information of the target edge node device in a second node group determined based on the received real-time service requirement is obtained, and finally, according to the first group sending service information and the second group sending service information, original information extracted by the target edge node device based on the real-time service requirement and used for generating the second group sending service information is verified. Therefore, cross validation of service information can be realized by validating the original information, so that whether the edge node equipment has the behavior of mutually transmitting error information during interaction is timely and accurately judged, a basis is provided for subsequent correction, and the normal and reliable operation of the whole edge node equipment system can be ensured.
In a possible implementation manner, the obtaining of the first trunking service information of the target edge node device in the preconfigured first node group described in step S21 specifically includes: acquiring first target service information of a target edge node device in a first node group configured in advance, wherein the first target service information has a first group sending tag; the first mass sending tags are a plurality of non-repeating multistage tags.
In a possible implementation manner, the obtaining of the second group sending service information of the target edge node device in the second node group determined based on the received real-time service requirement described in step S22 specifically includes: obtaining second target service information of a second group sending label in a second node group determined by the target edge node equipment based on the received real-time service requirement; the second mass sending tags are a plurality of non-repeating multistage tags.
In a possible implementation manner, the verifying, according to the first bulk service information and the second bulk service information, the original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk service information, described in step S23 specifically includes: and according to the first target service information with the first mass sending label and the second target service information with the second mass sending label, verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating the second mass sending service information.
It can be understood that by introducing different mass-sending tags, different mass-sending service information can be distinguished, so that the accuracy and reliability of verification of original information can be ensured.
On the basis of the above, in order to ensure the comprehensiveness and timeliness of verifying the original information, the detailed step of step S23 is: according to the first target service information with the first bulk sending tag and the second target service information with the second bulk sending tag, verifying original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk sending service information, further including the contents described in the following steps S231 to S233.
Step S231, obtaining device interaction records corresponding to at least two first mass texting tags in the first target service information having the first mass texting tag.
Step S232, obtaining the service correlation corresponding to at least two second group sending tags in the second target service information having the second group sending tag.
Step S233, according to the device interaction records corresponding to the at least two first group sending tags, the service correlation corresponding to the at least two second group sending tags, and the service execution log corresponding to the second target service information with the second group sending tags, verifying the original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second group sending service information.
When the contents described in the above steps S231 to S233 are implemented, the device interaction records corresponding to at least two first group sending tags in the first target service information and the service correlation corresponding to at least two second group sending tags in the second target service information can be taken into account, so as to implement the verification of the original information in the information interaction and information correlation layer, and thus, the comprehensiveness and real-time performance of the information interaction can be considered, so as to ensure the comprehensiveness and timeliness of the verification of the original information.
In a possible implementation manner, a problem of original information may be to cause distortion in information transmission, and in order to accurately verify whether the problem occurs, the verification of the original information extracted by the target edge node device based on the real-time service requirement for generating the second bulk sending service information according to the device interaction record corresponding to the at least two first bulk sending tags, the service correlation corresponding to the at least two second bulk sending tags, and the service execution log corresponding to the second target service information in which the second bulk sending tag exists, as described in step S233, may further include the following contents described in step S2331 to step S2337.
Step S2331, determining a tag authentication authority of the to-be-verified mass texting tag matched with the at least two second mass texting tags in the second target service information by using the device interaction records corresponding to the at least two first mass texting tags and the service type distribution of the original information.
Step S2332, determining the associated service information of the second target service information with the second group sending label by adopting the service correlation corresponding to the at least two second group sending labels; and the associated service information is service information with a transaction behavior with second target service information.
Step S2333, obtaining a service execution log corresponding to the second target service information having the second mass texting tag according to the tag authentication authority of the to-be-verified mass texting tag and the associated service information of the second target service information having the second mass texting tag.
Step S2334, performing abnormal category screening on the service category distribution according to the service execution log corresponding to the second target service information having the second mass texting tag, and obtaining a plurality of information permission levels corresponding to the original information.
Step S2335, which determines whether or not there is a target information authority level exceeding a set authority level among the plurality of information authority levels.
Step S2336, when it is determined that a target information permission level exceeding the set permission level exists in the plurality of information permission levels, determining information to be verified corresponding to the target information permission level, calculating a security evaluation coefficient of a data extraction interface corresponding to the target edge node device when the target edge node device extracts the information to be verified from a preset device database, and when the security evaluation coefficient is lower than the set coefficient, determining that an information distortion risk exists when the target edge node device switches from the first node group to the second node group to transmit second bulk transmission service information.
Step S2337, when the security evaluation coefficient is lower than a set coefficient, or when it is determined that there is no target information permission level exceeding the set permission level among the plurality of information permission levels, determining that there is no information distortion risk when the target edge node device is switched from the first node group to the second node group to transmit second group transmission service information; the information distortion risk is used for representing that information loss or information messy codes exist in the target edge node equipment when the service information is sent in the mass mode.
Therefore, based on the contents described in the above steps S2331 to S2337, it can be accurately and reliably determined whether there is an information distortion risk when the target edge node device is switched from the first node group to the second node group to send the second group sending service information, so that the information distortion risk is timely discovered to perform corresponding remedial measures, and a stable and reliable operation of the edge node device system is ensured.
In an alternative embodiment, the obtaining of the second target service information of the target edge node device in the second node group determined based on the received real-time service demand and having the second mass sending tag may specifically include the contents described in the following step S221 and step S222.
Step S221, obtaining continuous service information to be screened of the target edge node equipment in a second node group determined based on the received real-time service requirement and the first target service information with the first group sending label on a label updating track; the label updating track is used for representing the updating times and the thinning moments of the mass-sending label in the time sequence.
Step S222, screening out the second target service information having the second mass texting label based on the label updating track.
Further, step S222 may specifically include: determining the label direction of each group of service information to be screened based on the label updating track, if the label direction is similar to the set label direction of the first target service information, deleting the service information to be screened, and if the label direction is not similar to the set label direction of the first target service information, reserving the service information to be screened; determining the reserved service information to be screened as second target service information; and the reserved mass sending label of the service information to be screened is the second mass sending label.
Therefore, by executing the steps S221 to S222, the second target service information can be obtained accurately and reliably, so that the second target service information is prevented from being overlapped with the first target service information too much, and redundant information carried in the second target service information is also prevented.
Further, the obtaining of the device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tag in step S231 specifically includes: and acquiring device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags by adopting a running log analysis mode. Further, the method specifically comprises the following steps: calling an operation log text of the target edge node equipment through a preset log calling interface, determining a target log text of a target time period corresponding to the label generation time of the first mass-sending label from the log text, and acquiring equipment interaction records corresponding to at least two first mass-sending labels according to the target log text; the time sequence correlation degree between the at least two first mass sending tags is greater than a set correlation degree, and the time sequence correlation degree is used for representing the difference value of the tag generation moments of the at least two first mass sending tags. Therefore, the continuity of the interaction records of the equipment on the time sequence can be ensured.
Further, the step S232 of obtaining the service relevancy corresponding to at least two second mass texting labels in the second target service information where the second mass texting label exists specifically includes: acquiring first service behavior data and second service behavior data corresponding to the at least two second mass sending tags respectively, extracting first data characteristics of the first service behavior data and second data characteristics of the second service behavior data, calculating cosine distances between the first data characteristics and the second data characteristics, and determining the service correlation degree according to the cosine distances. Therefore, the service relevancy can be ensured to reflect the interaction degree of the second mass-sending label on the service data layer.
Further, the obtaining of the first target service information of the target edge node device having the first group identification in the preconfigured first node group described in step S21 may specifically include the following contents described in step S211 and step S212.
Step S211, obtaining communication protocol information of the target edge node device according to the node communication topology of the preconfigured first node group.
Step S212, obtain the first target service information with the first group sending tag in the communication protocol information.
In detail, the obtaining, according to the node communication topology of the preconfigured first node group, the communication protocol information of the target edge node device in step S211 further includes: and when the target edge node device communicates with the first butt edge node devices according to an information request mode capable of obtaining authorization information of the first butt edge node devices, obtaining communication protocol information of the target edge node device according to the node communication topology of the preconfigured first node group.
In more detail, the target edge node device communicates with the plurality of first butting edge node devices in an information request manner in which authorization information of the plurality of first butting edge node devices is available, including: the target edge node device generates an information request instruction based on a preset check random number and sends the information request instruction to the first butt edge node devices so as to obtain authorization information of the first butt edge node devices.
In this way, based on the relevant contents described in the above step S211 and step S212, the information confidence of the first target service information can be ensured.
In an alternative embodiment, the inventors have further found that, when performing information verification, it is necessary to verify not only the group sending accuracy and the information integrity of the group sending service information, but also the forwarding rate loss of the group sending service information during multiple forwarding, so as to ensure the timeliness of the group sending service information during multiple forwarding. To achieve this, the verifying step S23 may further include verifying, according to the first bulk service information and the second bulk service information, original information extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk service information, and further includes the following steps a to d.
Step a, aiming at least one group of event information table in original information, inputting the event information table into a pre-built and trained event characteristic recognition model to obtain a rate loss queue output by the event characteristic recognition model and aiming at the event information table during information forwarding; each queue value of the rate loss queue represents a weight value of a rate loss value corresponding to the queue value in the event information table, wherein the weight value belongs to a normal rate loss interval; the event feature recognition model is obtained by training thread operation parameters of information transmission threads in target edge node equipment at different time periods.
Step b, obtaining the parameter variation coefficient of the thread operation parameter of each time interval in the event information table according to the rate loss queue; the parameter variation coefficient is used for representing the forwarding rate stability of the thread operation parameter relative to the event information table, the larger the parameter variation coefficient is, the stronger the forwarding rate stability is, and the smaller the parameter variation coefficient is, the weaker the forwarding rate stability is.
Step c, calculating the forwarding rate loss of the parameter change coefficient to obtain a forwarding rate loss factor corresponding to the event information table; and judging whether the forwarding rate loss factor is larger than a target loss factor determined based on the equipment loss data of the target edge node equipment.
Step d, when the forwarding rate loss factor is larger than the target loss factor, after the target edge node device is judged to send the second mass-sending service information, the second mass-sending service information has a risk of forwarding rate loss during secondary forwarding, and information recoding processing is performed on the original information; and when the forwarding rate loss factor is less than or equal to the target loss factor, determining that the second group sending service information has no risk of forwarding rate loss during secondary forwarding after the target edge node device issues the second group sending service information.
Therefore, through the contents described in the above steps a to d, the forwarding rate loss during multiple forwarding of the bulk service information can be verified, thereby ensuring the timeliness of the bulk service information during multiple forwarding.
Based on the same inventive concept as above, please refer to fig. 3, which shows a functional block diagram of an information verification apparatus 300 based on edge computing and cloud edge fusion, where the information verification apparatus 300 can be applied to the central cloud platform 110 in fig. 1, and a detailed description of the functional block diagram of the information verification apparatus 300 is as follows.
A first obtaining module 310, configured to obtain first trunking service information of a target edge node device in a preconfigured first node group.
A second obtaining module 320, configured to obtain second group sending service information of the target edge node device in a second node group determined based on the received real-time service requirement.
An information verification module 330, configured to verify, according to the first bulk service information and the second bulk service information, original information that is extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk service information.
Further, the air conditioner is provided with a fan,
the first obtaining module 310 is specifically configured to: acquiring first target service information of a target edge node device in a first node group configured in advance, wherein the first target service information has a first group sending tag; wherein, the first mass sending labels are a plurality of non-repeating multilevel labels;
the second obtaining module 320 is specifically configured to: obtaining second target service information of a second group sending label in a second node group determined by the target edge node equipment based on the received real-time service requirement; wherein the second mass sending tags are a plurality of non-repeating multilevel tags;
the information verification module 330 is specifically configured to: and according to the first target service information with the first mass sending label and the second target service information with the second mass sending label, verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating the second mass sending service information.
Further, the information verification module 330 is specifically configured to: acquiring device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags;
acquiring service correlation degrees corresponding to at least two second mass sending labels in the second target service information with the second mass sending labels;
and verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating second mass sending service information according to the equipment interaction records corresponding to the at least two first mass sending tags, the service correlation degrees corresponding to the at least two second mass sending tags and the service execution log corresponding to the second target service information with the second mass sending tags.
Further, the information verification module 330 is specifically configured to: determining the label authentication authority of the mass texting label to be verified, which is matched with the at least two second mass texting labels, in the second target service information by adopting the equipment interaction records corresponding to the at least two first mass texting labels and the service type distribution of the original information;
determining the associated service information of the second target service information with the second mass sending labels by adopting the service correlation degrees corresponding to the at least two second mass sending labels; the related service information is service information with a transaction behavior with second target service information;
acquiring a service execution log corresponding to second target service information with a second mass sending label according to the label authentication authority of the mass sending label to be verified and the associated service information of the second target service information with the second mass sending label;
according to the service execution log corresponding to the second target service information with the second mass sending label, performing abnormal class screening on the service class distribution to obtain a plurality of information authority levels corresponding to the original information;
judging whether a target information authority level exceeding a set authority level exists in the plurality of information authority levels or not;
when judging that a target information authority level exceeding the set authority level exists in the plurality of information authority levels, determining to-be-verified information corresponding to the target information authority level, calculating a safety evaluation coefficient of a data extraction interface corresponding to the target edge node device when the target edge node device extracts the to-be-verified information from a preset device database, and when the safety evaluation coefficient is lower than the set coefficient, determining that information distortion risk exists when the target edge node device is switched from the first node group to the second node group for sending second group sending service information;
when the safety evaluation coefficient is lower than a set coefficient, or
When judging that no target information authority level exceeding the set authority level exists in the plurality of information authority levels, determining that no information distortion risk exists when the target edge node equipment is switched from the first node group to the second node group to send second group sending service information; the information distortion risk is used for representing that information loss or information messy codes exist in the target edge node equipment when the service information is sent in the mass mode.
Further, the second obtaining module 320 is specifically configured to: obtaining continuous service information to be screened of the target edge node equipment in a second node group determined based on the received real-time service requirement and the first target service information with the first group sending label on a label updating track; the label updating track is used for representing the updating times and the thinning moments of the mass-sending label in the time sequence;
screening out second target service information with a second mass-sending label based on the label updating track; the method specifically comprises the following steps: determining the label direction of each group of service information to be screened based on the label updating track, if the label direction is similar to the set label direction of the first target service information, deleting the service information to be screened, and if the label direction is not similar to the set label direction of the first target service information, reserving the service information to be screened; determining the reserved service information to be screened as second target service information; and the reserved mass sending label of the service information to be screened is the second mass sending label.
Further, the air conditioner is provided with a fan,
the information verification module 330 is specifically configured to: acquiring device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags by adopting a running log analysis mode; the method specifically comprises the following steps: calling an operation log text of the target edge node equipment through a preset log calling interface, determining a target log text of a target time period corresponding to the label generation time of the first mass-sending label from the log text, and acquiring equipment interaction records corresponding to at least two first mass-sending labels according to the target log text; the time sequence correlation degree between the at least two first mass sending tags is greater than a set correlation degree, and the time sequence correlation degree is used for representing the difference value of the tag generation moments of the at least two first mass sending tags;
the obtaining of the service relevancy corresponding to at least two second group sending tags in the second target service information with the second group sending tags includes: acquiring first service behavior data and second service behavior data corresponding to the at least two second mass sending tags respectively, extracting first data characteristics of the first service behavior data and second data characteristics of the second service behavior data, calculating cosine distances between the first data characteristics and the second data characteristics, and determining the service correlation degree according to the cosine distances.
Further, the first obtaining module 310 is specifically configured to: acquiring communication protocol information of target edge node equipment according to the node communication topology of the preconfigured first node group; obtaining first target service information with a first group sending tag in the communication protocol information;
the obtaining, according to the node communication topology of the preconfigured first node group, communication protocol information of the target edge node device includes: when the target edge node device communicates with the first butt edge node devices according to an information request mode capable of obtaining authorization information of the first butt edge node devices, obtaining communication protocol information of the target edge node device according to the node communication topology of the preconfigured first node group;
wherein the target edge node device communicates with the plurality of first butting edge node devices in an information request manner in which authorization information of the plurality of first butting edge node devices is available, and includes: the target edge node device generates an information request instruction based on a preset check random number and sends the information request instruction to the first butt edge node devices so as to obtain authorization information of the first butt edge node devices.
Further, the information verification module 330 is further configured to:
inputting at least one group of event information tables in original information into a pre-built and trained event feature recognition model to obtain a rate loss queue output by the event feature recognition model and aiming at the event information tables during information forwarding; each queue value of the rate loss queue represents a weight value of a rate loss value corresponding to the queue value in the event information table, wherein the weight value belongs to a normal rate loss interval; the event feature recognition model is obtained by training thread operation parameters of information transmission threads in target edge node equipment at different time periods;
obtaining a parameter change coefficient of the thread operation parameters of each time period included in the event information table according to the rate loss queue; the parameter variation coefficient is used for representing the forwarding rate stability of the thread operation parameter relative to the event information table, the larger the parameter variation coefficient is, the stronger the forwarding rate stability is, and the smaller the parameter variation coefficient is, the weaker the forwarding rate stability is;
carrying out forwarding rate loss calculation on the parameter change coefficient to obtain a forwarding rate loss factor corresponding to the event information table; judging whether the forwarding rate loss factor is larger than a target loss factor determined based on the equipment loss data of the target edge node equipment;
when the forwarding rate loss factor is larger than the target loss factor, judging that after the target edge node equipment issues the second mass-sending service information, the second mass-sending service information has a risk of forwarding rate loss during secondary forwarding, and performing information recoding processing on the original information; and when the forwarding rate loss factor is less than or equal to the target loss factor, determining that the second group sending service information has no risk of forwarding rate loss during secondary forwarding after the target edge node device issues the second group sending service information.
Based on the same inventive concept, the invention also provides an information verification system based on edge computing and cloud edge fusion, which comprises a central cloud platform and a plurality of edge node devices, wherein the central cloud platform and the edge node devices are communicated with each other; wherein the central cloud platform is to:
acquiring first trunking service information of target edge node equipment in a first node group configured in advance;
obtaining second group sending service information of the target edge node equipment in a second node group determined based on the received real-time service requirement;
and according to the first group sending service information and the second group sending service information, verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating the second group sending service information.
On the basis of the above, as shown in fig. 4, there is shown a central cloud platform 110, comprising: a processor 111; and a memory 112 in communication with the processor 111; wherein: the processor 111 is configured to retrieve the computer program from the memory 112 and implement the information verification method shown in fig. 2 by running the computer program.
Further, a computer-readable storage medium is also provided, on which a computer program is stored, which computer program, when executed, implements the information verification method shown in fig. 2.
In summary, by applying the above scheme, first group-sending service information of the target edge node device in a preconfigured first node group is obtained, second group-sending service information of the target edge node device in a second node group determined based on the received real-time service requirement is obtained, and finally, according to the first group-sending service information and the second group-sending service information, original information extracted by the target edge node device based on the real-time service requirement and used for generating the second group-sending service information is verified. Therefore, cross validation of service information can be realized by validating the original information, so that whether the edge node equipment has the behavior of mutually transmitting error information during interaction is timely and accurately judged, a basis is provided for subsequent correction, and the normal and reliable operation of the whole edge node equipment system can be ensured.
The various technical features in the above embodiments can be arbitrarily combined, so long as there is no conflict or contradiction between the combinations of the features, but the combination is limited by the space and is not described one by one, and therefore, any combination of the various technical features in the above embodiments also belongs to the scope disclosed in the present specification.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (7)

1. An information verification method based on edge computing and cloud edge fusion is applied to a central cloud platform in communication connection with a plurality of edge node devices which are communicated with each other, the central cloud platform and the edge node devices form an information verification system, and the information verification system is applied to block chain supply chain financial services, and the method at least comprises the following steps:
acquiring first trunking service information of target edge node equipment in a first node group configured in advance;
obtaining second group sending service information of the target edge node equipment in a second node group determined based on the received real-time service requirement;
according to the first group sending service information and the second group sending service information, original information which is extracted by the target edge node equipment based on the real-time service requirement and used for generating the second group sending service information is verified;
the obtaining first trunking service information of the target edge node device in a preconfigured first node group includes: acquiring first target service information of a target edge node device in a first node group configured in advance, wherein the first target service information has a first group sending tag; wherein, the first mass sending labels are a plurality of non-repeating multilevel labels;
the obtaining second group sending service information of the target edge node device in a second node group determined based on the received real-time service requirement includes: obtaining second target service information of a second group sending label in a second node group determined by the target edge node equipment based on the received real-time service requirement; wherein the second mass sending tags are a plurality of non-repeating multilevel tags;
wherein, the verifying, according to the first bulk service information and the second bulk service information, the original information extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk service information includes: verifying original information which is extracted by the target edge node equipment based on the real-time service requirement and is used for generating second mass sending service information according to the first target service information with the first mass sending label and the second target service information with the second mass sending label;
wherein, the verifying, according to the first target service information with the first bulk sending tag and the second target service information with the second bulk sending tag, the original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second bulk sending service information, includes:
acquiring device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags;
acquiring service correlation degrees corresponding to at least two second mass sending labels in the second target service information with the second mass sending labels;
verifying original information which is extracted by the target edge node device based on the real-time service requirement and is used for generating second mass sending service information according to the device interaction records corresponding to the at least two first mass sending tags, the service correlation degrees corresponding to the at least two second mass sending tags and the service execution log corresponding to the second target service information with the second mass sending tags;
wherein, the verifying, according to the device interaction records corresponding to the at least two first group sending tags, the service correlation corresponding to the at least two second group sending tags, and the service execution log corresponding to the second target service information with the second group sending tags, the original information, which is extracted by the target edge node device based on the real-time service requirement and used for generating the second group sending service information, includes:
determining the label authentication authority of the mass texting label to be verified, which is matched with the at least two second mass texting labels, in the second target service information by adopting the equipment interaction records corresponding to the at least two first mass texting labels and the service type distribution of the original information;
determining the associated service information of the second target service information with the second mass sending labels by adopting the service correlation degrees corresponding to the at least two second mass sending labels; the related service information is service information with a transaction behavior with second target service information;
acquiring a service execution log corresponding to second target service information with a second mass sending label according to the label authentication authority of the mass sending label to be verified and the associated service information of the second target service information with the second mass sending label;
according to the service execution log corresponding to the second target service information with the second mass sending label, performing abnormal class screening on the service class distribution to obtain a plurality of information authority levels corresponding to the original information;
judging whether a target information authority level exceeding a set authority level exists in the plurality of information authority levels or not;
when judging that a target information authority level exceeding the set authority level exists in the plurality of information authority levels, determining to-be-verified information corresponding to the target information authority level, calculating a safety evaluation coefficient of a data extraction interface corresponding to the target edge node device when the target edge node device extracts the to-be-verified information from a preset device database, and when the safety evaluation coefficient is lower than the set coefficient, determining that information distortion risk exists when the target edge node device is switched from the first node group to the second node group for sending second group sending service information;
when the safety evaluation coefficient is lower than a set coefficient, or
When judging that no target information authority level exceeding the set authority level exists in the plurality of information authority levels, determining that no information distortion risk exists when the target edge node equipment is switched from the first node group to the second node group to send second group sending service information; the information distortion risk is used for representing that information loss or information messy codes exist in the target edge node equipment when the service information is sent in the mass mode.
2. The method of claim 1, wherein the obtaining second target traffic information that the target edge node device has a second mass texting tag in a second node group determined based on the received real-time traffic demand comprises:
obtaining continuous service information to be screened of the target edge node equipment in a second node group determined based on the received real-time service requirement and the first target service information with the first group sending label on a label updating track; the label updating track is used for representing the updating times and the thinning moments of the mass-sending label in the time sequence;
screening out second target service information with a second mass-sending label based on the label updating track; the method specifically comprises the following steps: determining the label direction of each group of service information to be screened based on the label updating track, if the label direction is similar to the set label direction of the first target service information, deleting the service information to be screened, and if the label direction is not similar to the set label direction of the first target service information, reserving the service information to be screened; determining the reserved service information to be screened as second target service information; and the reserved mass sending label of the service information to be screened is the second mass sending label.
3. The method of claim 1,
the obtaining of the device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags includes: acquiring device interaction records corresponding to at least two first mass sending tags in the first target service information with the first mass sending tags by adopting a running log analysis mode; the method specifically comprises the following steps: calling an operation log text of the target edge node equipment through a preset log calling interface, determining a target log text of a target time period corresponding to the label generation time of the first mass-sending label from the log text, and acquiring equipment interaction records corresponding to at least two first mass-sending labels according to the target log text; the time sequence correlation degree between the at least two first mass sending tags is greater than a set correlation degree, and the time sequence correlation degree is used for representing the difference value of the tag generation moments of the at least two first mass sending tags;
the obtaining of the service relevancy corresponding to at least two second group sending tags in the second target service information with the second group sending tags includes: acquiring first service behavior data and second service behavior data corresponding to the at least two second mass sending tags respectively, extracting first data characteristics of the first service behavior data and second data characteristics of the second service behavior data, calculating cosine distances between the first data characteristics and the second data characteristics, and determining the service correlation degree according to the cosine distances.
4. The method according to any one of claims 1 to 3, wherein the obtaining first target service information that the target edge node device has the first group label in the preconfigured first node group comprises: acquiring communication protocol information of target edge node equipment according to the node communication topology of the preconfigured first node group; obtaining first target service information with a first group sending tag in the communication protocol information;
the obtaining, according to the node communication topology of the preconfigured first node group, communication protocol information of the target edge node device includes: when the target edge node device communicates with the first butt edge node devices according to an information request mode capable of obtaining authorization information of the first butt edge node devices, obtaining communication protocol information of the target edge node device according to the node communication topology of the preconfigured first node group;
wherein the target edge node device communicates with the plurality of first butting edge node devices in an information request manner in which authorization information of the plurality of first butting edge node devices is available, and includes: the target edge node device generates an information request instruction based on a preset check random number and sends the information request instruction to the first butt edge node devices so as to obtain authorization information of the first butt edge node devices.
5. A central cloud platform, characterized in that an information verification device is arranged in the central cloud platform, and the information verification device realizes the information verification method of any one of claims 1 to 4 when running.
6. A central cloud platform, comprising:
a processor; and
a memory in communication with the processor;
wherein:
the processor is used for retrieving the computer program from the memory and implementing the information verification method of any one of claims 1 to 4 by running the computer program.
7. A computer-readable storage medium, on which a computer program is stored, which, when executed, implements the information verification method of any one of claims 1 to 4.
CN202010905886.XA 2020-09-02 2020-09-02 Information verification method based on edge computing and cloud edge fusion and central cloud platform Active CN112000943B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010905886.XA CN112000943B (en) 2020-09-02 2020-09-02 Information verification method based on edge computing and cloud edge fusion and central cloud platform
CN202110596388.6A CN113326500B (en) 2020-09-02 2020-09-02 Information verification method combining edge computing and cloud edge fusion and central cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010905886.XA CN112000943B (en) 2020-09-02 2020-09-02 Information verification method based on edge computing and cloud edge fusion and central cloud platform

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110596388.6A Division CN113326500B (en) 2020-09-02 2020-09-02 Information verification method combining edge computing and cloud edge fusion and central cloud platform

Publications (2)

Publication Number Publication Date
CN112000943A CN112000943A (en) 2020-11-27
CN112000943B true CN112000943B (en) 2021-07-16

Family

ID=73465101

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110596388.6A Active CN113326500B (en) 2020-09-02 2020-09-02 Information verification method combining edge computing and cloud edge fusion and central cloud platform
CN202010905886.XA Active CN112000943B (en) 2020-09-02 2020-09-02 Information verification method based on edge computing and cloud edge fusion and central cloud platform

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110596388.6A Active CN113326500B (en) 2020-09-02 2020-09-02 Information verification method combining edge computing and cloud edge fusion and central cloud platform

Country Status (1)

Country Link
CN (2) CN113326500B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113077014B (en) * 2021-04-29 2022-09-27 上海德衡数据科技有限公司 Cloud edge terminal information fusion method, system, device and medium
CN113225757B (en) * 2021-05-08 2023-02-14 深圳职业技术学院 Edge node identification method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110099381A (en) * 2019-04-04 2019-08-06 常宁(常州)数据产业研究院有限公司 A kind of vehicle based on edge calculations center and roadside device installation security certification networking structure and identifying procedure
CN110300104A (en) * 2019-06-21 2019-10-01 山东超越数控电子股份有限公司 User right control and transfer method and system under a kind of edge cloud scene
CN110995777A (en) * 2019-10-24 2020-04-10 华为技术有限公司 Service management method and device
CN111507714A (en) * 2020-04-10 2020-08-07 成都质数斯达克科技有限公司 Verification method, verification device, server and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9972055B2 (en) * 2014-02-28 2018-05-15 Lucas J. Myslinski Fact checking method and system utilizing social networking information
CN111034114B (en) * 2017-08-07 2023-07-28 维萨国际服务协会 Blockchain architecture with record security
US11611491B2 (en) * 2018-04-12 2023-03-21 Intel Corporation Edge computing service global validation
CN108737171B (en) * 2018-05-10 2021-08-27 网宿科技股份有限公司 Method and system for managing cloud service cluster
EP3900301B1 (en) * 2018-12-17 2025-01-22 Xeniro Multi-access edge computing node with distributed ledger
CN111506775B (en) * 2019-01-29 2023-04-25 阿里巴巴集团控股有限公司 Label processing method, device, electronic equipment and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110099381A (en) * 2019-04-04 2019-08-06 常宁(常州)数据产业研究院有限公司 A kind of vehicle based on edge calculations center and roadside device installation security certification networking structure and identifying procedure
CN110300104A (en) * 2019-06-21 2019-10-01 山东超越数控电子股份有限公司 User right control and transfer method and system under a kind of edge cloud scene
CN110995777A (en) * 2019-10-24 2020-04-10 华为技术有限公司 Service management method and device
CN111507714A (en) * 2020-04-10 2020-08-07 成都质数斯达克科技有限公司 Verification method, verification device, server and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
大规模分组传送网多业务隔离评估及控制技术研究;孟陈;《中国优秀硕士学位论文全文数据库》;20181015;全文 *

Also Published As

Publication number Publication date
CN112000943A (en) 2020-11-27
CN113326500B (en) 2022-10-04
CN113326500A (en) 2021-08-31

Similar Documents

Publication Publication Date Title
CN110838065B (en) Transaction data processing method and device
CN107147735B (en) Distributed account book system based on hierarchical structure
CN110222116B (en) Control method and device for transaction data storage and storage medium
CN110310205A (en) A kind of block chain data monitoring method, device, equipment and medium
CN105827706A (en) Information push device and method
WO2020228531A1 (en) Consortium blockchain governance method and apparatus, computer device and storage medium
CN112087502A (en) Method, device and equipment for processing request and storage medium
CN112000943B (en) Information verification method based on edge computing and cloud edge fusion and central cloud platform
CN112101942A (en) Transaction request processing method, system, device and equipment based on block chain
CN111447245A (en) Authentication method, authentication device, electronic equipment and server
CN114567643B (en) Cross-blockchain data transfer method, device and related equipment
CN111934881B (en) Data right determining method and device, storage medium and electronic device
CN110990879B (en) Data evidence storing method based on block chain
CN110414983A (en) Reference information processing method, device, equipment and storage medium based on block chain
CN109101664A (en) A kind of data transmission method, device, equipment and the medium of lightweight node
CN112202564A (en) Transaction transfer method and device, electronic equipment and readable storage medium
CN105812380A (en) Verification method and device
CN114239044B (en) Decentralizing device retrospective shared access system
CN113709098B (en) Data transmission method and device
CN106933888A (en) Database configuration management system
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN112132576B (en) Payment information processing method based on block chain communication and block chain information platform
CN109905388A (en) A method and system for processing domain name credit based on blockchain
CN115328786A (en) Automatic testing method and device based on block chain and storage medium
CN110266476A (en) SMS platform sign test method, server and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210629

Address after: 224200 1st floor, block B, R & D center, Chengdong new district, Dongtai City, Yancheng City, Jiangsu Province

Applicant after: Jiangsu Xiaomeng Technology Co.,Ltd.

Address before: 510700 1st floor, building F, Guangdong Software Park, Guangzhou hi tech Industrial Development Zone, Guangzhou City, Guangdong Province

Applicant before: Chen Shunfa

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant