Data query method and data query platform

文档序号:1952660 发布日期:2021-12-10 浏览:10次 中文

阅读说明:本技术 数据查询方法和数据查询平台 (Data query method and data query platform ) 是由 王毅 于 2020-10-23 设计创作,主要内容包括:本公开提供了一种数据查询方法,应用于数据查询平台,所述数据查询平台与业务数据库通信。所述方法包括:在注册阶段基于业务方提供的用户名和密码的组合生成密文串,并将所述密文串反馈给所述业务方;以及在查询阶段基于所述业务方发送的包括所述密文串的查询请求,到所述业务数据库中进行数据查询。本公开还提供了一种数据查询平台、一种电子设备、以及一种计算机可读存储介质。(The disclosure provides a data query method, which is applied to a data query platform, wherein the data query platform is communicated with a service database. The method comprises the following steps: generating a ciphertext string based on the combination of the user name and the password provided by the service party in the registration stage, and feeding the ciphertext string back to the service party; and in the inquiry stage, based on the inquiry request including the ciphertext string sent by the service party, carrying out data inquiry in the service database. The present disclosure also provides a data query platform, an electronic device, and a computer-readable storage medium.)

1. A data query method is applied to a data query platform, and the data query platform is communicated with a service database, wherein the method comprises the following steps:

generating a ciphertext string based on the combination of the user name and the password provided by the service party in the registration stage, and feeding the ciphertext string back to the service party; and

and in the query stage, data query is carried out in the service database based on the query request which is sent by the service party and comprises the ciphertext string.

2. The method of claim 1, wherein the data query platform further comprises a user information management database, the method further comprising:

and uniformly storing and managing the user name and the password provided by the service party and the ciphertext string by using the user information management database.

3. The method of claim 1, wherein the data query platform is integrated with a Kylin service, the method further comprising:

distributing a user interaction service address to the service party in a registration stage;

wherein the content of the first and second substances,

and the user interaction service address is used for receiving the query request in a query stage and determining a real address of the Kylin service registered for the item to be queried in the query request.

4. The method of claim 3, wherein the method further comprises:

a plurality of Kylin services are registered for one project in a registration phase, wherein the plurality of Kylin services are different in deployment mode.

5. The method of claim 4, wherein the method further comprises:

in the query stage, a plurality of Kylin services registered for an item are combined based on the query frequency and/or the query data volume of the item.

6. The method of claim 4 or 5, wherein the deployment mode comprises:

a single task deployment mode constructed based on tasks;

a single task deployment mode based on task query; or

And a dual-task deployment mode based on task construction and task query combination.

7. A data query platform, comprising:

the data query module is communicated with the service database and is used for performing data query from the service database based on a query request in a query stage;

an interaction service module, in communication with the data query module, to:

generating a ciphertext string based on the combination of the user name and the password provided by the service party in the registration stage, and feeding the ciphertext string back to the service party; and

and in the query stage, the query request which is sent by the service party and comprises the ciphertext string is forwarded to the data query module, and the result of the data query module for data query is fed back to the service party.

8. The data query platform of claim 7, wherein the data query platform further comprises a user information management database, the user information management database communicatively coupled to the interaction service module;

and the interactive service module is also used for uniformly storing and managing the user name and the password provided by the service party and the ciphertext string by utilizing the user information management database.

9. The data query platform of claim 7, wherein:

the data query module is integrated with a Kylin service;

the interaction service module is also used for;

distributing a user interaction service address to the service party in a registration stage;

wherein the content of the first and second substances,

and the user interaction service address is used for receiving the query request in a query stage and determining a real address of the Kylin service deployed for the item to be queried in the query request.

10. The data query platform of claim 9, wherein the interaction service module is further to:

registering a plurality of Kylin services for one project in a registration phase, wherein the plurality of Kylin services are different in deployment mode;

wherein the content of the first and second substances,

the deployment mode includes:

a single task deployment mode constructed based on tasks;

a single task deployment mode based on task query; or

And a dual-task deployment mode based on task construction and task query combination.

11. The data query platform of claim 10, wherein the interaction service module is further to:

in the query stage, a plurality of Kylin services registered for an item are combined based on the query frequency and/or the query data volume of the item.

12. An electronic device, comprising:

one or more memories having stored thereon computer-executable instructions;

one or more processors executing the instructions to implement the method of any one of claims 1-6.

13. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 6.

Technical Field

The present disclosure relates to the field of internet information security technologies, and more particularly, to a data query method, a data query platform, an electronic device, and a computer-readable storage medium.

Background

Data queries can be currently performed by accessing databases and the like through some data query platforms (e.g., Apache Kylin). The data query platform can be connected with a data source and a business side for data query in a configuration file mode. The data source information is unsafe due to the mode, so that very important business side data is easily leaked, and great potential safety hazards exist. Moreover, the data information of the service side is not secure, and the contents such as the information of the service side and the inquired data are easy to be obtained illegally.

Disclosure of Invention

In view of this, the embodiments of the present disclosure provide a data query method and a data query platform, which can improve security of user information and data source information in a data query process, and an electronic device and a computer-readable storage medium.

In one aspect of the disclosed embodiments, a data query method is provided, which is applied to a data query platform, where the data query platform is in communication with a service database. The method comprises the following steps: generating a ciphertext string based on the combination of the user name and the password provided by the service party in the registration stage, and feeding the ciphertext string back to the service party; and in the inquiry stage, based on the inquiry request including the ciphertext string sent by the service party, carrying out data inquiry in the service database.

According to an embodiment of the present disclosure, the data query platform further includes a user information management database. The method also comprises the step of uniformly storing and managing the user name and the password provided by the service party and the ciphertext string by utilizing the user information management database.

According to an embodiment of the present disclosure, the data query platform is integrated with a Kylin service. The method further comprises the following steps: and distributing the user interaction service address to the service party in a registration stage. The user interaction service address is used for receiving the query request in a query stage and determining a real address of a Kylin service registered for an item to be queried in the query request.

According to an embodiment of the present disclosure, the method further comprises: in the registration phase, a plurality of Kylin services are registered for one project, and the deployment modes of the plurality of Kylin services are different.

According to the embodiment of the disclosure, the method further comprises combining a plurality of deployment mode different Kylin services registered for the project based on the query frequency and/or query data volume of the project in the query stage.

According to an embodiment of the present disclosure, the deployment mode includes: a single task deployment mode constructed based on tasks; a single task deployment mode based on task query; or a dual task deployment mode based on a combination of task construction and task query.

In another aspect of the disclosed embodiments, a data query platform is provided. The data query platform comprises a data query module and an interactive service module. The data query module is communicated with the service database and is used for querying data from the service database based on the query request in the query stage. The interactive service module is communicated with the data query module and is used for generating a ciphertext string based on a user name and password combination provided by a service party in a registration stage and feeding the ciphertext string back to the service party, forwarding the query request which is sent by the service party and comprises the ciphertext string to the data query module in a query stage and feeding a result of data query performed by the data query module back to the service party.

According to the embodiment of the disclosure, the data query platform further comprises a user information management database, and the user information management database is in communication connection with the interactive service module. And the interactive service module is also used for uniformly storing and managing the user name and the password provided by the service party and the ciphertext string by utilizing the user information management database.

According to an embodiment of the present disclosure, the data query module is integrated with a Kylin service. The interactive service module is also used for distributing a user interactive service address to the business party in a registration phase. The user interaction service address is used for receiving the query request in a query stage and determining a real address of a Kylin service deployed for an item to be queried in the query request.

According to an embodiment of the present disclosure, the interaction service module is further configured to: a plurality of Kylin services are registered for one project in a registration phase, wherein the plurality of Kylin services are different in deployment mode. The deployment mode comprises a single-task deployment mode constructed based on tasks, a single-task deployment mode based on task query, or a double-task deployment mode based on task construction and task query combination.

According to the embodiment of the disclosure, the interaction service module is further configured to combine, in the query stage, a plurality of Kylin services registered for an item based on the query frequency and/or the query data volume of the item.

In another aspect of the disclosed embodiments, an electronic device is provided. The electronic device includes one or more memories, and one or more processors. The memory has stored thereon computer-executable instructions. The processor executes the instructions to implement the method as described above.

Another aspect of the embodiments of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.

Another aspect of embodiments of the present disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.

One or more of the above-described embodiments may provide the following advantages or benefits: the business party uses the ciphertext string based on the user name and the password to interact with the data platform, so that the problem that the business party connected with the data query platform 120 uses the user name and the password of the plaintext and is easy to steal can be at least partially solved, and the potential safety hazard of the data query platform 120 in the using process is reduced.

Drawings

The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments of the present disclosure with reference to the accompanying drawings, in which:

FIG. 1 schematically illustrates a system architecture of a data query method and a data query platform according to an embodiment of the disclosure;

FIG. 2 schematically illustrates a flow diagram of a data query method according to an embodiment of the present disclosure;

FIG. 3 schematically illustrates a system architecture of a data query platform according to another embodiment of the present disclosure;

FIG. 4 schematically shows a flow diagram of a data query method in a registration phase according to an embodiment of the present disclosure;

fig. 5 schematically shows a class diagram illustrating registration of Kylin information in a registration phase in a data query method according to an embodiment of the present disclosure;

FIG. 6 schematically shows a flow diagram of a data query method in a query phase according to another embodiment of the present disclosure;

FIG. 7 schematically shows a class diagram illustrating a business party connecting with Kylin during a query phase in a data query method according to an embodiment of the present disclosure;

fig. 8 schematically shows a code diagram of a business party connecting to a Kylin service by means of JDBC according to an embodiment of the present disclosure; and

FIG. 9 schematically illustrates a block diagram of a computer system suitable for implementing a data query method and a data query platform according to embodiments of the disclosure.

Detailed Description

Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.

The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.

All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.

Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).

FIG. 1 schematically illustrates a system architecture 100 of a data query method and a data query platform according to an embodiment of the disclosure.

As shown in FIG. 1, the system architecture 100 includes a business party 110, a data query platform 120, and a business database 130. The data query platform 120 may communicate with the business party 110 and the business database 130, respectively. The data query platform 120 may receive the query request from the service party 110, query data from the service database 130 based on the query request, and feed the data back to the service party 110.

The service party 110 may be an end user or may be an intermediate service that needs to make a data query.

The business database 130 may be an Hbase database, or a Hadoop Distributed File System (HDFS).

According to an embodiment of the present disclosure, the data query platform 120 may include a data query module 121 and an interaction service module 122. The data query module 121 is in communication with the service database, and is configured to perform data query from the service database based on the query request in the query phase. The interaction service module 122 is in communication with the data query module 121, and is configured to generate a ciphertext string based on a combination of a user name and a password provided by the service party 110 in a registration stage, and feed the ciphertext string back to the service party 110, forward a query request including the ciphertext string sent by the service party 110 to the data query module 121 in a query stage, and feed a result of data query performed by the data query module 121 back to the service party 110. Therefore, the service party interacts with the data platform by using the ciphertext string based on the user name and the password, the problem that the service party 110 is connected with the data query platform 120 by using the user name and the password of the plaintext and is easy to steal can be solved to a certain extent, and potential safety hazards of the data query platform 120 in the using process are reduced.

The data query platform 120 may further include a user information management database 123, and the user information management database 123 may be communicatively connected to the interaction service module 122. The interaction service module 122 is further configured to utilize the user information management database 123 to uniformly store and manage the user name, the password, and the ciphertext string provided by the service provider 110, and clarify and standardize the access process and the maintenance scheme of the data query platform 120. The user information management database 123 may be, for example, a MySQL database, and/or an Etcd database.

The data query platform 120 may be a data platform integrated with a Kylin service. For example, a kylin service is integrated into the data query module 121. Apache Kylin supports JDBC as a third data source (Hive, Kafka), so that Kylin and some SQL databases or data warehouses can be directly integrated for data query.

Since Kylin provides many APIs for querying data, if the real address of Kylin service is leaked, the data of the service side 110 can be easily obtained illegally. According to an embodiment of the present disclosure, the interaction service module 122 is further configured to assign a user interaction service address to the business party 110 in the registration phase, where the user interaction service address is configured to receive the query request in the query phase and determine a real address of the Kylin service deployed for the item to be queried in the query request. Thus, the address exposed to the service part 110 is the user interaction service address, and not the real address of the Kylin service, and the real address of the Kylin service can be protected. The important data of the service part 110 is prevented from being read or even tampered through the API interface opened by Kylin.

Further, the interaction service module 122 may also register a plurality of Kylin services for one project in the registration phase, wherein the deployment modes of the plurality of Kylin services are different. Thus, in the query phase, the interaction service module 122 may combine a plurality of Kylin services registered for an item based on the query frequency and/or query data amount of the item. The deployment mode of the Kylin service may include, for example, a single-task deployment mode based on task building, a single-task deployment mode based on task querying, or a dual-task deployment mode based on a combination of task building and task querying. In this way, the Kylin services in different deployment modes can be obtained through dynamic and flexible combination according to the query frequency and query data volume of the items queried by the service party 110, and the capacity of handling high-concurrency construction tasks by the Kylin is improved. It should be noted that the combined management policy can be dynamically implemented without operating the Kylin client machine.

Fig. 2 schematically shows a flow chart of a data query method according to an embodiment of the present disclosure.

As shown in fig. 2, the method may include operations S210 and S220.

In operation S210, the interaction service module 122 generates a cipher text string based on a combination of the user name and the password provided by the service party 110 in the registration stage, and feeds back the cipher text string to the service party 110.

In operation S220, a data query is performed to the service database in the query phase based on the query request including the ciphertext string sent by the service party 110. Specifically, after receiving the query request, the interaction service module 122 verifies the ciphertext string in the query request. After the verification is passed, the query information (e.g., project and cube information of the item to be queried) in the query request is forwarded to the data query module 121. The data query module 121 performs data query in the service database 130 according to the query information, and feeds back the query result to the interactive service module 122. The interaction service module 122 then feeds back the query results to the business party 110. Therefore, the service party 110 does not have the plaintext of the user name and the password, and the used ciphertext string is generated by combining the user name and the password and then encrypting the combination, so that the difficulty that the information of the service party 110 is maliciously stolen and decrypted is increased.

FIG. 3 schematically illustrates a system architecture 300 of a data query platform according to another embodiment of the present disclosure. The system architecture 300 may be a specific embodiment of the system architecture 100.

As shown in FIG. 3, the data query platform in the system architecture 300 includes a data query module 321, an interaction service module 322, and a MySQL database 3231 and an Etcd database 3232. The MySQL database 3231 and the Etcd database 3232 are user information management databases of the data query platform. In the embodiment, two types of databases, namely the MySQL database 3231 and the Etcd database 3232, are used simultaneously, so that the management safety of user information data can be improved.

The data query module 321 is integrated with the Kylin service, and communicates with the Hbase database 332 and/or the HDFS system 331, and can perform data query through the Kylin service.

The business interaction service module 322 is responsible for interaction with the business party 310, including performing data registration of the business party 310 (for example, registration by the platform administrator 340), receiving a query request of the business party 310, forwarding query information in the query request to the data query module 321, and feeding back a query result obtained by the data query module 321 to the business party 310.

Platform administrator 340 may register information such as user name, password, project, cube, etc. for business party 310. The business party 310 establishes a connection with the Kylin service by using a ciphertext string based on the username and password. According to an embodiment of the present disclosure, a user interaction service address is assigned to the business party 310 during the registration phase. Thus, the service party 310 directly accesses the user interaction service address instead of the real Kylin service address, thereby protecting the real address of the Kylin service.

In addition, the platform administrator 340 may dynamically and flexibly control the combination of multiple Kylin services to perform data query by corresponding one project to multiple Kylin service addresses and configuring a policy according to query frequency and query data volume of different services in a query stage, thereby integrating and using two deployment modes of Kylin, dynamically and flexibly controlling a mode of Kylin construction tasks, and improving the capacity of Kylin to process high-concurrency construction tasks.

The following describes an exemplary registration phase and query phase in the data query process of fig. 3 in conjunction with fig. 4 to 8.

FIG. 4 schematically shows a flow diagram illustrating a data query method in a registration phase according to an embodiment of the present disclosure.

With reference to fig. 3, as shown in fig. 4, an operation flow of the data query method in the registration phase according to the embodiment of the present disclosure may include operations S410 to S430.

In operation S410, a ciphertext string is generated based on a combination of the user name and the password provided by the service part 310 in the registration stage, and the ciphertext string is fed back to the service part 310.

In operation S420, a user interaction service address is assigned to the service part 310 in a registration phase. The user interaction service address is used for receiving the query request in the query stage and determining the real address of the Kylin service registered for the item to be queried in the query request.

In operation S430, a plurality of Kylin services are registered for one project in a registration phase, wherein deployment patterns of the plurality of Kylin services are different. Wherein, the deployment mode comprises: a single task deployment mode constructed based on tasks; a single task deployment mode based on task query; or a dual task deployment mode based on a combination of task construction and task query.

Fig. 5 schematically illustrates a class diagram showing registration of Kylin information in a registration phase in a data query method according to an embodiment of the present disclosure.

The platform administrator 340 registers the Kylin information through a regestasterinfo (strung clusterName, strung clusterservurrl, strung token) method, where clusterName is a cluster name that the service party 310 applies for accessing the Kylin service, clusterservurrl is a Kylin service address that the platform administrator 340 allocates to the service party 310, the address is not a real address for the Kylin deployment, and token is an authentication code for authenticating to zk.

The process of platform administrator 340 registering the Kylin work node includes the following four steps.

The first step is as follows: and (4) performing authority verification by using the token and the token obtained from the zookeeper WatchTask, entering a second step of registration process if the authentication is successful, and otherwise, returning registration failure.

The second step is that: a probe is made to the registered service address ServerUrl (real Kylin service address). And (3) using a testportWithTimes (host) method in the ClusterMonitorHandler class to detect the port, entering a third step of registration process if the port is in a survival state, and otherwise, returning registration failure. The purpose of the second step is to ensure that the registered address is in a live available state.

The third step: and acquiring a prefix of a key value in the Etcd from the MySQL database, and splicing the current cluster directory path to prevent the key conflict of the Etcd from causing registration failure.

The fourth step: data was registered to Etcd by the setValue (path + key, masterInfo) method in the EtcdUtil class. To this end, the platform administrator 340 completes registering the Kylin information.

FIG. 6 schematically shows a flow diagram illustrating a data query method in a query phase according to another embodiment of the present disclosure.

In connection with fig. 3, as shown in fig. 6, the operations of the data query method in the query phase according to the embodiment of the present disclosure may include operations S610 to S630.

In operation S610, a query request sent by the service part 310 to the user interaction service address is received, where the query request includes a ciphertext string and a query item (project). In some embodiments also a queried data cube.

In operation S620, after the ciphertext string is verified, real service addresses of a plurality of Kylin services registered for the item are determined based on the item project of the query, wherein the plurality of Kylin services are deployed in different modes.

In operation S630, a combination of the plurality of Kylin services registered for the item is controlled based on the query frequency and/or query data amount of the item, and a data query is performed.

Fig. 7 schematically shows a class diagram illustrating that a business party 310 is connected with Kylin in a query phase in a data query method according to an embodiment of the present disclosure.

As shown in fig. 7, in the query phase, the service 310 needs to apply and obtain the encrypted ciphertext, Project and Cube information after the combination of the user name and the password registered by the platform administrator 340 before sending the request connection to the Kylin. The service 310 requests the ciphertext String of MD5 (username, password) to query the JDBC connection String of Kylin through querykylin jdbcinfo (String user name, String password, String file) method by the client. And after the real address of the Kylin service aiming at the inquired project is obtained, submitting the construction task.

Fig. 8 schematically shows a code diagram of a service party 310 connecting to a Kylin service by means of JDBC in a data query method according to an embodiment of the present disclosure.

In conjunction with fig. 3 and 8, during the registration phase, the platform administrator 340 may request the following addresses to complete the registration by way of an http get. In one embodiment, the registration address may be, for example:

http://{PowerServerUrl}:{port}/kylin/master/{martName}/{kylinSer verUrl}/token。

in the query phase, the business party 310 connects to the Kylin service by acquiring JDBC. As shown in fig. 8, the ciphertext _ auth _ script.getauthusename () obtains the ciphertext string of MD5 (user name, password), and the ciphertext _ auth _ script.getUrl () obtains the real service address of Kylin. And starting a Kylin construction task through a build interface after acquiring complete Kylin connection information. The using methods of query, reconstruction and the like of the Kylin information are similar to the using method of the build process.

Any of the modules, sub-modules, units, sub-units (e.g., data query module, and interaction service module), or at least part of the functionality of any of them, according to embodiments of the present disclosure, may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.

FIG. 9 schematically illustrates a block diagram of a computer system 900 suitable for implementing a data query method and a data query platform according to embodiments of the present disclosure. The computer system illustrated in FIG. 9 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.

As shown in fig. 9, a computer system 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage section 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.

In the RAM 903, various programs and data necessary for the operation of the system 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the program may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.

Computer system 900 may also include an input/output (I/O) interface 905, input/output (I/O) interface 905 also connected to bus 904, according to an embodiment of the present disclosure. Computer system 900 may also include one or more of the following components connected to I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.

According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.

The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.

According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 902 and/or the RAM 903 described above and/or one or more memories other than the ROM 902 and the RAM 903.

The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.

The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

16页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于差分隐私的数据查询方法、装置、设备及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!