Data analysis method and device, electronic device and storage medium

A data analysis and equipment technology, applied in the field of big data, can solve the problems of tampering and difficult to ensure data security, and achieve the effect of comprehensive data, ensuring security, and improving accuracy

Active Publication Date: 2019-12-06
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the method used in the existing technology depends on the source of the data, but illegal devices can tamper with the content of the data and the information of the device from which the data comes. Therefore, it is still difficult to guarantee the security of the data by using the above method to verify the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data analysis method and device, electronic device and storage medium
  • Data analysis method and device, electronic device and storage medium
  • Data analysis method and device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0088] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data analysis method and device, an electronic device and a storage medium, and relates to the technical field of big data. According to the specific implementation scheme, the method comprises: receiving a data detection request initiated by a service terminal; wherein the data detection request comprises log data of to-be-detected equipment; obtaining a security factorand a fingerprint identifier of the to-be-detected device from a first server; detecting log data of the to-be-detected equipment based on the safety factor, the fingerprint identifier of the to-be-detected equipment and an online database to obtain a detection result; and sending the detection result to the service terminal. Therefore, the equipment data can be comprehensively detected, whether the data is tampered or not is judged, and the safety of the data is guaranteed.

Description

technical field [0001] The present application relates to big data technology in the field of data processing technology, and in particular to a data analysis method, device, electronic equipment and storage medium. Background technique [0002] Data security is getting more and more attention. [0003] In the prior art, it is possible to determine whether the data has been tampered with by verifying the consistency of basic device information in the data; or, to determine whether the data has been tampered with through analysis based on the dimensional clustering features of the data, thereby ensuring data security. [0004] However, the method used in the existing technology depends on the source of the data, but illegal devices can tamper with the content of the data and the information of the device from which the data comes. Therefore, it is still difficult to guarantee the security of the data by using the above method to verify the data. . Contents of the invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/2458G06F16/23G06F16/25G06F21/62G06F21/64
CPCG06F16/2462G06F16/2365G06F16/254G06F21/6227G06F21/64
Inventor 陈飞彦黄蒙蒙李旺郑浩王蕴
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products