A kind of electric network information secure and trusted work system based on big data
Technical field
The present invention relates to big data field, and in particular to a kind of electric network information secure and trusted job family based on big data
System.
Background technology
Big data refers to that its content cannot be captured, managed and processed with conventional software instrument within a certain period of time
Data acquisition system, the research and application of big data have become one indispensable research field of present information.
In the data message for currently using, having substantial portion of data is issued by manager, and root
Modified by manager according to the demand of the suggestion of user or manager itself, for the magnanimity information of this part, such as
What can preferably carry out quality management and excavation, fast and effeciently therefrom find useful information, be a urgent need to resolve
Problem.
Trust computing is that the trust computing under being supported based on hardware security module is widely used in calculating and communication system
Platform, the security overall to improve system.Information security has four sides:Equipment safety, data safety, content safety with
Behavior safety.Behavior safety includes:The features such as the confidentiality of behavior, the integrality of behavior, the authenticity of behavior.Trust computing is
Behavior safety and give birth to.
On the one hand electric network information is necessary open to society and accepts oversight, on the other hand, if not carrying out authentication
Just information is conducted interviews, the normal work of power network can be impacted, potential safety hazard is caused, how in abundant public information
Under the premise of ensure electric network information fail safely effectively solution.
The content of the invention
Regarding to the issue above, the present invention provides a kind of electric network information secure and trusted work system based on big data.
The purpose of the present invention is realized using following technical scheme:
A kind of electric network information secure and trusted work system based on big data, it is characterized in that, including data quality management mould
Block, useful data excavate module, authentication module and credible evaluation module, and wherein quality management module includes that data describe son
Module, quality testing submodule and data quality grading management submodule, useful data excavate module and locate in advance including data
Reason submodule, useful data build submodule, useful data amendment submodule and useful data layer digging submodule, and identity is tested
Card module includes fingerprint recognition submodule and alarm submodule;
(1) data describe submodule
Data, data attribute number in itself are described by introducing the attribute of data attribute in itself and data influencer
Represented according to size, date created, comprising picture number, related data amount, wherein, related data amount is other that current data is pointed to
The summation of other data of data and sensing current data;The attribute of data influence person influencer's network clustering coefficientCarry out table
Show,Obtained by following methods:
Build data influence person and describe network, for each data, influencer includes multiple users and a pipe
Reason person, each of which influencer represents a node, and user may browse through data, it is also possible to which data are proposed with the suggestion of modification,
And manager voluntarily can both modify to data, it is also possible to modified according to user's suggestion,
Then influencer's network clustering coefficientIt is defined as:
In formula, σ1Represent that user often browses the factor of influence of secondary data applying, m represents that user browses total degree;σ2Represent
User often proposes the factor of influence that suggestion for revision applies, and l represents that user advises total degree;σ3Represent manager often certainly
The factor of influence that row one secondary data of modification applies, σ4Represent the influence that manager often applies according to user's suggestion one secondary data of modification
The factor, δ1And δ2Respectively σ3And σ4Weights, n represents that manager changes total degree;It is user's modification frequency system
Number, for representing satisfaction of the user to data, the coefficient shows that more greatly modification of the user to data is more frequent;
(2) quality testing submodule
The quality of data is evaluated using " three-level evaluation model ", three classes is splitted data into according to size of data first,
Then all other attribute in addition to size of data of integrated data is evaluated its quality of data, and specific method is as follows:
Sample data is divided into quality data, middle qualitative data and low quality data, if size of data is more than threshold value
T1, then the data belong to quality data, if size of data is more than threshold values T2But it is less than threshold values T1, then the data belong to middle matter
Amount data, if size of data is less than threshold values T2, then the data belong to low quality data, T1> T2And T1、T2Span be
[1KB, 1MB];Quality data and low quality are further divided into different brackets, all other attribute composition of data is chosen
Vector, and the average of each data attribute of each grade is calculated according to sample data, it is that each grade sets up corresponding average
Vector, new data vector X=(x1,…,xN) represent, the mean vector Y=(y of certain grade1,…,yN) represent, N is represented
All other attribute number of data in addition to size of data, two similarities of vector are represented with similarity function R (X, Y):
R (X, Y) value is smaller, then show that similarity is bigger, conversely, then similarity is smaller, each data calculate respectively with not
The similarity of the mean vector of ad eundem, so as to confirm its credit rating;
(3) quality of data differentiated control submodule
Data by being divided into different quality grade after quality testing submodule, according to data level different pairs
According to carrying out differentiated control;
(4) fingerprint recognition submodule
Accessing electric network information data needs to be input into fingerprint, is matched with the fingerprint in fingerprint base, is only known by fingerprint
Others could conduct interviews to electric network information data;
(5) alarm submodule
If not passing through fingerprint recognition, it is impossible to electric network information is conducted interviews, system sends alarm.
Preferably, it is characterised in that
(1) data prediction submodule
Data are divided into different field, the data fields according to needed for user's request determines client use above-mentioned three-level
Evaluation model is screened to the high-quality High-level Data in field, constitutes a new tables of data K;
(2) useful data builds submodule
By the data for pre-processing, each data fields contains different classification, introduces coefficient correlation P and screens useful number
According to classification:
In formula, ZsRepresent the quantity of data double-way sensing in mono- classification of new data table K, i.e., for data A and B, can
B is pointed to from A, also A can be pointed to from B, Z represents the related data amount in mono- classification of tables of data K,Wherein N represents one
The sum of data in classification;
(3) useful data amendment submodule
Useful data in use, can be influenceed by artificial destruction and user two aspects of voting, according to this two
The revised coefficient correlation of aspect is P ';Concurrently set threshold value T, T ∈ (0,0.1], if P ' > T, show that this classification is that have
Use data;When from quality data qualified useful data cannot be obtained, successively in middle qualitative data and low quality number
Carry out searching qualified useful data in, and after all data search are finished, if the P ' for finally giving is maximum
Value is less than T, although or P ' maximum more than T its absolute value with the difference of threshold values T less than setting value C, show nothing
Although method finds useful data or can find useful data but the useful data degree of correlation that obtains is already below expection, then
Prompting, modification or increase related data are now sent to manager automatically;Take C=T/5;
(4) useful data layer digging submodule
Scan data table K first, it is assumed that the maximum and minimum value of P ' are respectively P 'maxWith P 'min, by tables of data K segmentations
IntoIndividual Non-overlapping Domain, P mining goes out Local frequent itemset, and wherein int is bracket function;Then it is sharp
Priori property is used, connection Local frequent itemset obtains global candidate;Scanning K counts the actual branch of each candidate again
Degree of holding is determining global frequentItemset;
It is according to artificial destruction and user's specific correction formula for being modified of ballot in useful data amendment submodule:
P '=P × (1-Y) × (1+H)
In formula, Y represents that data are subject to the probability of artificial destruction, H to represent that ballot user accounts for the ratio of total number of persons.
Preferably, credible evaluation module includes following submodule:
Submodule 1:Define the every credible attribute for evaluation module, credible attribute is classification, credible attribute can be with
Sub- attribute is decomposed into downwards;
Submodule 2:For each credible attribute or sub- attribute, the evaluation index to it is extracted, can be evaluated with these
Index is evaluated credible attribute or sub- attribute from different sides;
Submodule 3:For each credible attribute or sub- attribute, the evaluation criterion to it is defined, evaluation criterion is divided into four
Level:It is excellent, good, in, it is poor, evaluation criterion is determined based on evaluation index, the i.e. valued combinations according to each evaluation index can
Which rank of evaluation criterion letter attribute or sub- attribute have reached;
Submodule 4:The standard of classification that determining module is credible, credible grade scale is divided into Pyatyi, is according to each credible category
The evaluation conclusion of property and draw;
Submodule 5:Before credible evaluation activity is carried out, according to the difference of assessment emphasis, different credible evaluation moulds are formed
Plate, and credible evaluation activity is carried out based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
Beneficial effects of the present invention are:Introduce network clustering coefficient to be described data, consider data in itself
Attribute and data influencer attribute, improve the accuracy rate of classification, at the same by user change coefficient of frequency introducing come
Reduce manual intervention, realize the target of the efficient detection quality of data;Using three-level evaluation model, memory space is saved, carried
Computational efficiency high;Using brand-new similarity function, the effect of larger relative error is exaggerated so that credit rating more section
Learn accurate;Introduce data correction submodule to be modified coefficient correlation, can fully overcome artificial destruction and user's ballot right
The influence of data;Association rule mining application based on region division is combined with the classification of useful data, it is only necessary to three
Layer digging is carried out in the sorted tables of data of level, only when current data table does not have satisfactory data, just meeting
Excavated in next tables of data, amount of calculation declines to a great extent, and the excavation of the data can associate useful data classification, excavate
Purpose is stronger;Authentication module is set, and electric network information is effectively ensured safely;The data storage area specified is protected,
Prevent opponent from implementing certain types of physical access;All codes performed in calculating platform are imparted to prove it at one
Be not tampered with the ability run in environment, from the angle of broad sense, credible calculating platform for the network user provide one it is more wide
Wide security context, it describes safety problem from the angle of security system, it is ensured that the secure execution environments of user, and it is passive to break through
Defence patch installing mode.
Brief description of the drawings
Using accompanying drawing, the invention will be further described, but embodiment in accompanying drawing is not constituted to any limit of the invention
System, for one of ordinary skill in the art, on the premise of not paying creative work, can also obtain according to the following drawings
Other accompanying drawings.
Fig. 1 is the electric network information trouble free service system architecture diagram based on big data.
Reference:Quality management module -1;Useful data excavates module -2;Authentication module -3;Credible evaluation mould
Block -4;Data describe submodule -11;Quality testing submodule -12;Quality of data differentiated control submodule -13;Data are pre-
Treatment submodule -21;Useful data builds submodule -22;Useful data amendment submodule -23;Useful data layer digging
Module -24;Fingerprint recognition submodule -31;Alarm submodule -32.
Specific embodiment
The invention will be further described with the following Examples.
Embodiment 1:
A kind of electric network information secure and trusted work system based on big data as shown in Figure 1, including data quality management
Module 1, useful data excavates module 2, authentication module 3 and credible evaluation module 4, and wherein quality management module 1 includes number
According to description submodule 11, quality testing submodule 12 and data quality grading management submodule 13, useful data excavates mould
Block 2 includes that data prediction submodule 21, useful data builds submodule 22, useful data amendment submodule 23 and useful data
Layer digging submodule 24, authentication module 3 includes fingerprint recognition submodule 31 and alarm submodule 32.
(1) data describe submodule 11:
Data, data attribute number in itself are described by introducing the attribute of data attribute in itself and data influencer
Represented according to size, date created, comprising picture number, related data amount, wherein, related data amount is other that current data is pointed to
The summation of other data of data and sensing current data;The attribute of data influence person influencer's network clustering coefficientCarry out table
Show,Obtained by following methods:
Build data influence person and describe network, for each data, influencer includes multiple users and a pipe
Reason person, each of which influencer represents a node, and user may browse through data, it is also possible to which data are proposed with the suggestion of modification,
And manager voluntarily can both modify to data, it is also possible to modified according to user's suggestion,
Then influencer's network clustering coefficientIt is defined as:
In formula, σ1Represent that user often browses the factor of influence of secondary data applying, m represents that user browses total degree;σ2Represent
User often proposes the factor of influence that suggestion for revision applies, and l represents that user advises total degree;σ3Represent manager often certainly
The factor of influence that row one secondary data of modification applies, σ4Represent the influence that manager often applies according to user's suggestion one secondary data of modification
The factor, δ1And δ2Respectively σ3And σ4Weights, n represents that manager changes total degree;It is user's modification frequency system
Number, for representing satisfaction of the user to data, the coefficient shows that more greatly modification of the user to data is more frequent.
(2) quality testing submodule 12:
The quality of data is evaluated using " three-level evaluation model ", three classes is splitted data into according to size of data first,
Then all other attribute in addition to size of data of integrated data is evaluated its quality of data, and specific method is as follows:
Sample data is divided into quality data, middle qualitative data and low quality data, if size of data is more than threshold value
T1, then the data belong to quality data, if size of data is more than threshold values T2But it is less than threshold values T1, then the data belong to middle matter
Amount data, if size of data is less than threshold values T2, then the data belong to low quality data, T1> T2And T1、T2Span be
[1KB, 1MB];Quality data and low quality are further divided into different brackets, all other attribute composition of data is chosen
Vector, and the average of each data attribute of each grade is calculated according to sample data, it is that each grade sets up corresponding average
Vector, new data vector X=(x1,…,xN) represent, the mean vector Y=(y of certain grade1,…,yN) represent, N is represented
All other attribute number of data in addition to size of data, two similarities of vector are represented with similarity function R (X, Y):
R (X, Y) value is smaller, then show that similarity is bigger, conversely, then similarity is smaller, each data calculate respectively with not
The similarity of the mean vector of ad eundem, so as to confirm its credit rating.
(3) quality of data differentiated control submodule 13:
Data by being divided into different quality grade after quality testing submodule, according to data level different pairs
According to carrying out differentiated control.
(4) fingerprint recognition submodule 31:
Accessing electric network information data needs to be input into fingerprint, is matched with the fingerprint in fingerprint base, is only known by fingerprint
Others could conduct interviews to electric network information data.
(5) alarm submodule 32:
If not passing through fingerprint recognition, it is impossible to electric network information is conducted interviews, system sends alarm.
Preferably, it is characterised in that
(1) data prediction submodule 21:
Data are divided into different field, the data fields according to needed for user's request determines client use above-mentioned three-level
Evaluation model is screened to the high-quality High-level Data in field, constitutes a new tables of data K.
(2) useful data builds submodule 22:
By the data for pre-processing, each data fields contains different classification, introduces coefficient correlation P and screens useful number
According to classification:
In formula, ZsRepresent the quantity of data double-way sensing in mono- classification of new data table K, i.e., for data A and B, can
B is pointed to from A, also A can be pointed to from B, Z represents the related data amount in mono- classification of tables of data K,Wherein N represents one
The sum of data in classification.
(3) useful data amendment submodule 23:
Useful data in use, can be influenceed by artificial destruction and user two aspects of voting, according to this two
The revised coefficient correlation of aspect is P ';Concurrently set threshold value T, T ∈ (0,0.1], if P ' > T, show that this classification is that have
Use data;When from quality data qualified useful data cannot be obtained, successively in middle qualitative data and low quality number
Carry out searching qualified useful data in, and after all data search are finished, if the P ' for finally giving is maximum
Value is less than T, although or P ' maximum more than T its absolute value with the difference of threshold values T less than setting value C, show nothing
Although method finds useful data or can find useful data but the useful data degree of correlation that obtains is already below expection, then
Prompting, modification or increase related data are now sent to manager automatically.C=T/5 is taken, data area increase by 5% is pointed out, but
It is that amount of calculation increased 3.7%.
(4) useful data layer digging submodule 24:
Scan data table K first, it is assumed that the maximum and minimum value of P ' are respectively P 'maxWith P 'min, by tables of data K segmentations
IntoIndividual Non-overlapping Domain, P mining goes out Local frequent itemset, and wherein int is bracket function;Then it is sharp
Priori property is used, connection Local frequent itemset obtains global candidate;Scanning K counts the actual branch of each candidate again
Degree of holding is determining global frequentItemset.
It is according to artificial destruction and user's specific correction formula for being modified of ballot in useful data amendment submodule 23:
P '=P × (1-Y) × (1+H)
In formula, Y represents that data are subject to the probability of artificial destruction, H to represent that ballot user accounts for the ratio of total number of persons.
Preferably, credible evaluation module 4 includes following submodule:
Submodule 1:Define the every credible attribute for evaluation module, credible attribute is classification, credible attribute can be with
Sub- attribute is decomposed into downwards;
Submodule 2:For each credible attribute or sub- attribute, the evaluation index to it is extracted, can be evaluated with these
Index is evaluated credible attribute or sub- attribute from different sides;
Submodule 3:For each credible attribute or sub- attribute, the evaluation criterion to it is defined, evaluation criterion is divided into four
Level:It is excellent, good, in, it is poor, evaluation criterion is determined based on evaluation index, the i.e. valued combinations according to each evaluation index can
Which rank of evaluation criterion letter attribute or sub- attribute have reached;
Submodule 4:The standard of classification that determining module is credible, credible grade scale is divided into Pyatyi, is according to each credible category
The evaluation conclusion of property and draw;
Submodule 5:Before credible evaluation activity is carried out, according to the difference of assessment emphasis, different credible evaluation moulds are formed
Plate, and credible evaluation activity is carried out based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
In the invention of the present embodiment, introduce network clustering coefficient and data are described, consider data in itself
Attribute and the attribute of data influencer, improve the accuracy rate of classification, while being subtracted by the introducing of user's modification coefficient of frequency
Small manual intervention, realizes the target of the efficient detection quality of data;Using three-level evaluation model, memory space is saved, improved
Computational efficiency;Using brand-new similarity function, the effect of larger relative error is exaggerated so that credit rating more science
Accurately;Introduce data correction submodule to be modified coefficient correlation, can fully overcome artificial destruction and user's ballot logarithm
According to influence, take C=T/5, point out data area to increase by 5%, but amount of calculation increased 3.7%;Region division will be based on
Association rule mining application is combined with the classification of useful data, it is only necessary to divided in the sorted tables of data of three-level
Layer is excavated, and only when current data table does not have satisfactory data, can just be excavated in next tables of data, is calculated
Amount declines to a great extent, and the excavation of the data can associate useful data classification, excavate purpose stronger;Authentication module is set,
Electric network information is effectively ensured safely;All codes performed in calculating platform are imparted not usurped at one to prove it
Change the ability run in environment, from the angle of broad sense, credible calculating platform provides a more broad peace for the network user
Full ambient engine, it describes safety problem from the angle of security system, it is ensured that the secure execution environments of user, breaks through Passive Defence and beats
Patch mode.
Embodiment 2:
A kind of electric network information secure and trusted work system based on big data as shown in Figure 1, including data quality management
Module 1, useful data excavates module 2, authentication module 3 and credible evaluation module 4, and wherein quality management module 1 includes number
According to description submodule 11, quality testing submodule 12 and data quality grading management submodule 13, useful data excavates mould
Block 2 includes that data prediction submodule 21, useful data builds submodule 22, useful data amendment submodule 23 and useful data
Layer digging submodule 24, authentication module 3 includes fingerprint recognition submodule 31 and alarm submodule 32.
(1) data describe submodule 11:
Data, data attribute number in itself are described by introducing the attribute of data attribute in itself and data influencer
Represented according to size, date created, comprising picture number, related data amount, wherein, related data amount is other that current data is pointed to
The summation of other data of data and sensing current data;The attribute of data influence person influencer's network clustering coefficientCarry out table
Show,Obtained by following methods:
Build data influence person and describe network, for each data, influencer includes multiple users and a pipe
Reason person, each of which influencer represents a node, and user may browse through data, it is also possible to which data are proposed with the suggestion of modification,
And manager voluntarily can both modify to data, it is also possible to modified according to user's suggestion,
Then influencer's network clustering coefficientIt is defined as:
In formula, σ1Represent that user often browses the factor of influence of secondary data applying, m represents that user browses total degree;σ2Represent
User often proposes the factor of influence that suggestion for revision applies, and l represents that user advises total degree;σ3Represent manager often certainly
The factor of influence that row one secondary data of modification applies, σ4Represent the influence that manager often applies according to user's suggestion one secondary data of modification
The factor, δ1And δ2Respectively σ3And σ4Weights, n represents that manager changes total degree;It is user's modification frequency system
Number, for representing satisfaction of the user to data, the coefficient shows that more greatly modification of the user to data is more frequent.
(2) quality testing submodule 12:
The quality of data is evaluated using " three-level evaluation model ", three classes is splitted data into according to size of data first,
Then all other attribute in addition to size of data of integrated data is evaluated its quality of data, and specific method is as follows:
Sample data is divided into quality data, middle qualitative data and low quality data, if size of data is more than threshold value
T1, then the data belong to quality data, if size of data is more than threshold values T2But it is less than threshold values T1, then the data belong to middle matter
Amount data, if size of data is less than threshold values T2, then the data belong to low quality data, T1> T2And T1、T2Span be
[1KB, 1MB];Quality data and low quality are further divided into different brackets, all other attribute composition of data is chosen
Vector, and the average of each data attribute of each grade is calculated according to sample data, it is that each grade sets up corresponding average
Vector, new data vector X=(x1,…,xN) represent, the mean vector Y=(y of certain grade1,…,yN) represent, N is represented
All other attribute number of data in addition to size of data, two similarities of vector are represented with similarity function R (X, Y):
R (X, Y) value is smaller, then show that similarity is bigger, conversely, then similarity is smaller, each data calculate respectively with not
The similarity of the mean vector of ad eundem, so as to confirm its credit rating.
(3) quality of data differentiated control submodule 13:
Data by being divided into different quality grade after quality testing submodule, according to data level different pairs
According to carrying out differentiated control.
(4) fingerprint recognition submodule 31:
Accessing electric network information data needs to be input into fingerprint, is matched with the fingerprint in fingerprint base, is only known by fingerprint
Others could conduct interviews to electric network information data.
(5) alarm submodule 32:
If not passing through fingerprint recognition, it is impossible to electric network information is conducted interviews, system sends alarm.
Preferably, it is characterised in that
(1) data prediction submodule 21:
Data are divided into different field, the data fields according to needed for user's request determines client use above-mentioned three-level
Evaluation model is screened to the high-quality High-level Data in field, constitutes a new tables of data K.
(2) useful data builds submodule 22:
By the data for pre-processing, each data fields contains different classification, introduces coefficient correlation P and screens useful number
According to classification:
In formula, ZsRepresent the quantity of data double-way sensing in mono- classification of new data table K, i.e., for data A and B, can
B is pointed to from A, also A can be pointed to from B, Z represents the related data amount in mono- classification of tables of data K,Wherein N represents one
The sum of data in classification.
(3) useful data amendment submodule 23:
Useful data in use, can be influenceed by artificial destruction and user two aspects of voting, according to this two
The revised coefficient correlation of aspect is P ';Concurrently set threshold value T, T ∈ (0,0.1], if P ' > T, show that this classification is that have
Use data;When from quality data qualified useful data cannot be obtained, successively in middle qualitative data and low quality number
Carry out searching qualified useful data in, and after all data search are finished, if the P ' for finally giving is maximum
Value is less than T, although or P ' maximum more than T its absolute value with the difference of threshold values T less than setting value C, show nothing
Although method finds useful data or can find useful data but the useful data degree of correlation that obtains is already below expection, then
Prompting, modification or increase related data are now sent to manager automatically.C=T/5 is taken, data area increase by 5% is pointed out, but
It is that amount of calculation increased 3.7%.
(4) useful data layer digging submodule 24:
Scan data table K first, it is assumed that the maximum and minimum value of P ' are respectively P 'maxWith P 'min, by tables of data K segmentations
IntoIndividual Non-overlapping Domain, P mining goes out Local frequent itemset, and wherein int is bracket function;Then it is sharp
Priori property is used, connection Local frequent itemset obtains global candidate;Scanning K counts the actual branch of each candidate again
Degree of holding is determining global frequentItemset.
It is according to artificial destruction and user's specific correction formula for being modified of ballot in useful data amendment submodule 23:
P '=P × (1-Y) × (1+H)
In formula, Y represents that data are subject to the probability of artificial destruction, H to represent that ballot user accounts for the ratio of total number of persons.
Preferably, credible evaluation module 4 includes following submodule:
Submodule 1:Define the every credible attribute for evaluation module, credible attribute is classification, credible attribute can be with
Sub- attribute is decomposed into downwards;
Submodule 2:For each credible attribute or sub- attribute, the evaluation index to it is extracted, can be evaluated with these
Index is evaluated credible attribute or sub- attribute from different sides;
Submodule 3:For each credible attribute or sub- attribute, the evaluation criterion to it is defined, evaluation criterion is divided into four
Level:It is excellent, good, in, it is poor, evaluation criterion is determined based on evaluation index, the i.e. valued combinations according to each evaluation index can
Which rank of evaluation criterion letter attribute or sub- attribute have reached;
Submodule 4:The standard of classification that determining module is credible, credible grade scale is divided into Pyatyi, is according to each credible category
The evaluation conclusion of property and draw;
Submodule 5:Before credible evaluation activity is carried out, according to the difference of assessment emphasis, different credible evaluation moulds are formed
Plate, and credible evaluation activity is carried out based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
In the invention of the present embodiment, introduce network clustering coefficient and data are described, consider data in itself
Attribute and the attribute of data influencer, improve the accuracy rate of classification, while being subtracted by the introducing of user's modification coefficient of frequency
Small manual intervention, realizes the target of the efficient detection quality of data;Using three-level evaluation model, memory space is saved, improved
Computational efficiency;Using brand-new similarity function, the effect of larger relative error is exaggerated so that credit rating more science
Accurately;Introduce data correction submodule to be modified coefficient correlation, can fully overcome artificial destruction and user's ballot logarithm
According to influence, take C=T/6, point out data area to increase by 4%, but amount of calculation increased 3.3%;Region division will be based on
Association rule mining application is combined with the classification of useful data, it is only necessary to divided in the sorted tables of data of three-level
Layer is excavated, and only when current data table does not have satisfactory data, can just be excavated in next tables of data, is calculated
Amount declines to a great extent, and the excavation of the data can associate useful data classification, excavate purpose stronger;Authentication module is set,
Electric network information is effectively ensured safely;All codes performed in calculating platform are imparted not usurped at one to prove it
Change the ability run in environment, from the angle of broad sense, credible calculating platform provides a more broad peace for the network user
Full ambient engine, it describes safety problem from the angle of security system, it is ensured that the secure execution environments of user, breaks through Passive Defence and beats
Patch mode.
Embodiment 3:
A kind of electric network information secure and trusted work system based on big data as shown in Figure 1, including data quality management
Module 1, useful data excavates module 2, authentication module 3 and credible evaluation module 4, and wherein quality management module 1 includes number
According to description submodule 11, quality testing submodule 12 and data quality grading management submodule 13, useful data excavates mould
Block 2 includes that data prediction submodule 21, useful data builds submodule 22, useful data amendment submodule 23 and useful data
Layer digging submodule 24, authentication module 3 includes fingerprint recognition submodule 31 and alarm submodule 32.
(1) data describe submodule 11:
Data, data attribute number in itself are described by introducing the attribute of data attribute in itself and data influencer
Represented according to size, date created, comprising picture number, related data amount, wherein, related data amount is other that current data is pointed to
The summation of other data of data and sensing current data;The attribute of data influence person influencer's network clustering coefficientCarry out table
Show,Obtained by following methods:
Build data influence person and describe network, for each data, influencer includes multiple users and a pipe
Reason person, each of which influencer represents a node, and user may browse through data, it is also possible to which data are proposed with the suggestion of modification,
And manager voluntarily can both modify to data, it is also possible to modified according to user's suggestion,
Then influencer's network clustering coefficientIt is defined as:
In formula, σ1Represent that user often browses the factor of influence of secondary data applying, m represents that user browses total degree;σ2Represent
User often proposes the factor of influence that suggestion for revision applies, and l represents that user advises total degree;σ3Represent manager often certainly
The factor of influence that row one secondary data of modification applies, σ4Represent the influence that manager often applies according to user's suggestion one secondary data of modification
The factor, δ1And δ2Respectively σ3And σ4Weights, n represents that manager changes total degree;It is user's modification frequency system
Number, for representing satisfaction of the user to data, the coefficient shows that more greatly modification of the user to data is more frequent.
(2) quality testing submodule 12:
The quality of data is evaluated using " three-level evaluation model ", three classes is splitted data into according to size of data first,
Then all other attribute in addition to size of data of integrated data is evaluated its quality of data, and specific method is as follows:
Sample data is divided into quality data, middle qualitative data and low quality data, if size of data is more than threshold value
T1, then the data belong to quality data, if size of data is more than threshold values T2But it is less than threshold values T1, then the data belong to middle matter
Amount data, if size of data is less than threshold values T2, then the data belong to low quality data, T1> T2And T1、T2Span be
[1KB, 1MB];Quality data and low quality are further divided into different brackets, all other attribute composition of data is chosen
Vector, and the average of each data attribute of each grade is calculated according to sample data, it is that each grade sets up corresponding average
Vector, new data vector X=(x1,…,xN) represent, the mean vector Y=(y of certain grade1,…,yN) represent, N is represented
All other attribute number of data in addition to size of data, two similarities of vector are represented with similarity function R (X, Y):
R (X, Y) value is smaller, then show that similarity is bigger, conversely, then similarity is smaller, each data calculate respectively with not
The similarity of the mean vector of ad eundem, so as to confirm its credit rating.
(3) quality of data differentiated control submodule 13:
Data by being divided into different quality grade after quality testing submodule, according to data level different pairs
According to carrying out differentiated control.
(4) fingerprint recognition submodule 31:
Accessing electric network information data needs to be input into fingerprint, is matched with the fingerprint in fingerprint base, is only known by fingerprint
Others could conduct interviews to electric network information data.
(5) alarm submodule 32:
If not passing through fingerprint recognition, it is impossible to electric network information is conducted interviews, system sends alarm.
Preferably, it is characterised in that
(1) data prediction submodule 21:
Data are divided into different field, the data fields according to needed for user's request determines client use above-mentioned three-level
Evaluation model is screened to the high-quality High-level Data in field, constitutes a new tables of data K.
(2) useful data builds submodule 22:
By the data for pre-processing, each data fields contains different classification, introduces coefficient correlation P and screens useful number
According to classification:
In formula, ZsRepresent the quantity of data double-way sensing in mono- classification of new data table K, i.e., for data A and B, can
B is pointed to from A, also A can be pointed to from B, Z represents the related data amount in mono- classification of tables of data K,Wherein N represents one
The sum of data in classification.
(3) useful data amendment submodule 23:
Useful data in use, can be influenceed by artificial destruction and user two aspects of voting, according to this two
The revised coefficient correlation of aspect is P ';Concurrently set threshold value T, T ∈ (0,0.1], if P ' > T, show that this classification is that have
Use data;When from quality data qualified useful data cannot be obtained, successively in middle qualitative data and low quality number
Carry out searching qualified useful data in, and after all data search are finished, if the P ' for finally giving is maximum
Value is less than T, although or P ' maximum more than T its absolute value with the difference of threshold values T less than setting value C, show nothing
Although method finds useful data or can find useful data but the useful data degree of correlation that obtains is already below expection, then
Prompting, modification or increase related data are now sent to manager automatically.C=T/5 is taken, data area increase by 5% is pointed out, but
It is that amount of calculation increased 3.7%.
(4) useful data layer digging submodule 24:
Scan data table K first, it is assumed that the maximum and minimum value of P ' are respectively P 'maxWith P 'min, by tables of data K segmentations
IntoIndividual Non-overlapping Domain, P mining goes out Local frequent itemset, and wherein int is bracket function;Then it is sharp
Priori property is used, connection Local frequent itemset obtains global candidate;Scanning K counts the actual branch of each candidate again
Degree of holding is determining global frequentItemset.
It is according to artificial destruction and user's specific correction formula for being modified of ballot in useful data amendment submodule 23:
P '=P × (1-Y) × (1+H)
In formula, Y represents that data are subject to the probability of artificial destruction, H to represent that ballot user accounts for the ratio of total number of persons.
Preferably, credible evaluation module 4 includes following submodule:
Submodule 1:Define the every credible attribute for evaluation module, credible attribute is classification, credible attribute can be with
Sub- attribute is decomposed into downwards;
Submodule 2:For each credible attribute or sub- attribute, the evaluation index to it is extracted, can be evaluated with these
Index is evaluated credible attribute or sub- attribute from different sides;
Submodule 3:For each credible attribute or sub- attribute, the evaluation criterion to it is defined, evaluation criterion is divided into four
Level:It is excellent, good, in, it is poor, evaluation criterion is determined based on evaluation index, the i.e. valued combinations according to each evaluation index can
Which rank of evaluation criterion letter attribute or sub- attribute have reached;
Submodule 4:The standard of classification that determining module is credible, credible grade scale is divided into Pyatyi, is according to each credible category
The evaluation conclusion of property and draw;
Submodule 5:Before credible evaluation activity is carried out, according to the difference of assessment emphasis, different credible evaluation moulds are formed
Plate, and credible evaluation activity is carried out based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
In the invention of the present embodiment, introduce network clustering coefficient and data are described, consider data in itself
Attribute and the attribute of data influencer, improve the accuracy rate of classification, while being subtracted by the introducing of user's modification coefficient of frequency
Small manual intervention, realizes the target of the efficient detection quality of data;Using three-level evaluation model, memory space is saved, improved
Computational efficiency;Using brand-new similarity function, the effect of larger relative error is exaggerated so that credit rating more science
Accurately;Introduce data correction submodule to be modified coefficient correlation, can fully overcome artificial destruction and user's ballot logarithm
According to influence, take C=T/7, point out data area to increase by 3.5%, but amount of calculation increased 3%;Region division will be based on
Association rule mining application is combined with the classification of useful data, it is only necessary to divided in the sorted tables of data of three-level
Layer is excavated, and only when current data table does not have satisfactory data, can just be excavated in next tables of data, is calculated
Amount declines to a great extent, and the excavation of the data can associate useful data classification, excavate purpose stronger;Authentication module is set,
Electric network information is effectively ensured safely;All codes performed in calculating platform are imparted not usurped at one to prove it
Change the ability run in environment, from the angle of broad sense, credible calculating platform provides a more broad peace for the network user
Full ambient engine, it describes safety problem from the angle of security system, it is ensured that the secure execution environments of user, breaks through Passive Defence and beats
Patch mode.
Embodiment 4:
A kind of electric network information secure and trusted work system based on big data as shown in Figure 1, including data quality management
Module 1, useful data excavates module 2, authentication module 3 and credible evaluation module 4, and wherein quality management module 1 includes number
According to description submodule 11, quality testing submodule 12 and data quality grading management submodule 13, useful data excavates mould
Block 2 includes that data prediction submodule 21, useful data builds submodule 22, useful data amendment submodule 23 and useful data
Layer digging submodule 24, authentication module 3 includes fingerprint recognition submodule 31 and alarm submodule 32.
(1) data describe submodule 11:
Data, data attribute number in itself are described by introducing the attribute of data attribute in itself and data influencer
Represented according to size, date created, comprising picture number, related data amount, wherein, related data amount is other that current data is pointed to
The summation of other data of data and sensing current data;The attribute of data influence person influencer's network clustering coefficientCarry out table
Show,Obtained by following methods:
Build data influence person and describe network, for each data, influencer includes multiple users and a pipe
Reason person, each of which influencer represents a node, and user may browse through data, it is also possible to which data are proposed with the suggestion of modification,
And manager voluntarily can both modify to data, it is also possible to modified according to user's suggestion,
Then influencer's network clustering coefficientIt is defined as:
In formula, σ1Represent that user often browses the factor of influence of secondary data applying, m represents that user browses total degree;σ2Represent
User often proposes the factor of influence that suggestion for revision applies, and l represents that user advises total degree;σ3Represent manager often certainly
The factor of influence that row one secondary data of modification applies, σ4Represent the influence that manager often applies according to user's suggestion one secondary data of modification
The factor, δ1And δ2Respectively σ3And σ4Weights, n represents that manager changes total degree;It is user's modification frequency system
Number, for representing satisfaction of the user to data, the coefficient shows that more greatly modification of the user to data is more frequent.
(2) quality testing submodule 12:
The quality of data is evaluated using " three-level evaluation model ", three classes is splitted data into according to size of data first,
Then all other attribute in addition to size of data of integrated data is evaluated its quality of data, and specific method is as follows:
Sample data is divided into quality data, middle qualitative data and low quality data, if size of data is more than threshold value
T1, then the data belong to quality data, if size of data is more than threshold values T2But it is less than threshold values T1, then the data belong to middle matter
Amount data, if size of data is less than threshold values T2, then the data belong to low quality data, T1> T2And T1、T2Span be
[1KB, 1MB];Quality data and low quality are further divided into different brackets, all other attribute composition of data is chosen
Vector, and the average of each data attribute of each grade is calculated according to sample data, it is that each grade sets up corresponding average
Vector, new data vector X=(x1,…,xN) represent, the mean vector Y=(y of certain grade1,…,yN) represent, N is represented
All other attribute number of data in addition to size of data, two similarities of vector are represented with similarity function R (X, Y):
R (X, Y) value is smaller, then show that similarity is bigger, conversely, then similarity is smaller, each data calculate respectively with not
The similarity of the mean vector of ad eundem, so as to confirm its credit rating.
(3) quality of data differentiated control submodule 13:
Data by being divided into different quality grade after quality testing submodule, according to data level different pairs
According to carrying out differentiated control.
(4) fingerprint recognition submodule 31:
Accessing electric network information data needs to be input into fingerprint, is matched with the fingerprint in fingerprint base, is only known by fingerprint
Others could conduct interviews to electric network information data.
(5) alarm submodule 32:
If not passing through fingerprint recognition, it is impossible to electric network information is conducted interviews, system sends alarm.
Preferably, it is characterised in that
(1) data prediction submodule 21:
Data are divided into different field, the data fields according to needed for user's request determines client use above-mentioned three-level
Evaluation model is screened to the high-quality High-level Data in field, constitutes a new tables of data K.
(2) useful data builds submodule 22:
By the data for pre-processing, each data fields contains different classification, introduces coefficient correlation P and screens useful number
According to classification:
In formula, ZsRepresent the quantity of data double-way sensing in mono- classification of new data table K, i.e., for data A and B, can
B is pointed to from A, also A can be pointed to from B, Z represents the related data amount in mono- classification of tables of data K,Wherein N represents one
The sum of data in classification.
(3) useful data amendment submodule 23:
Useful data in use, can be influenceed by artificial destruction and user two aspects of voting, according to this two
The revised coefficient correlation of aspect is P ';Concurrently set threshold value T, T ∈ (0,0.1], if P ' > T, show that this classification is that have
Use data;When from quality data qualified useful data cannot be obtained, successively in middle qualitative data and low quality number
Carry out searching qualified useful data in, and after all data search are finished, if the P ' for finally giving is maximum
Value is less than T, although or P ' maximum more than T its absolute value with the difference of threshold values T less than setting value C, show nothing
Although method finds useful data or can find useful data but the useful data degree of correlation that obtains is already below expection, then
Prompting, modification or increase related data are now sent to manager automatically.C=T/5 is taken, data area increase by 5% is pointed out, but
It is that amount of calculation increased 3.7%.
(4) useful data layer digging submodule 24:
Scan data table K first, it is assumed that the maximum and minimum value of P ' are respectively P 'maxWith P 'min, by tables of data K segmentations
IntoIndividual Non-overlapping Domain, P mining goes out Local frequent itemset, and wherein int is bracket function;Then it is sharp
Priori property is used, connection Local frequent itemset obtains global candidate;Scanning K counts the actual branch of each candidate again
Degree of holding is determining global frequentItemset.
It is according to artificial destruction and user's specific correction formula for being modified of ballot in useful data amendment submodule 23:
P '=P × (1-Y) × (1+H)
In formula, Y represents that data are subject to the probability of artificial destruction, H to represent that ballot user accounts for the ratio of total number of persons.
Preferably, credible evaluation module 4 includes following submodule:
Submodule 1:Define the every credible attribute for evaluation module, credible attribute is classification, credible attribute can be with
Sub- attribute is decomposed into downwards;
Submodule 2:For each credible attribute or sub- attribute, the evaluation index to it is extracted, can be evaluated with these
Index is evaluated credible attribute or sub- attribute from different sides;
Submodule 3:For each credible attribute or sub- attribute, the evaluation criterion to it is defined, evaluation criterion is divided into four
Level:It is excellent, good, in, it is poor, evaluation criterion is determined based on evaluation index, the i.e. valued combinations according to each evaluation index can
Which rank of evaluation criterion letter attribute or sub- attribute have reached;
Submodule 4:The standard of classification that determining module is credible, credible grade scale is divided into Pyatyi, is according to each credible category
The evaluation conclusion of property and draw;
Submodule 5:Before credible evaluation activity is carried out, according to the difference of assessment emphasis, different credible evaluation moulds are formed
Plate, and credible evaluation activity is carried out based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
In the invention of the present embodiment, introduce network clustering coefficient and data are described, consider data in itself
Attribute and the attribute of data influencer, improve the accuracy rate of classification, while being subtracted by the introducing of user's modification coefficient of frequency
Small manual intervention, realizes the target of the efficient detection quality of data;Using three-level evaluation model, memory space is saved, improved
Computational efficiency;Using brand-new similarity function, the effect of larger relative error is exaggerated so that credit rating more science
Accurately;Introduce data correction submodule to be modified coefficient correlation, can fully overcome artificial destruction and user's ballot logarithm
According to influence, take C=T/8, point out data area to increase by 3%, but amount of calculation increased 2.7%;Region division will be based on
Association rule mining application is combined with the classification of useful data, it is only necessary to divided in the sorted tables of data of three-level
Layer is excavated, and only when current data table does not have satisfactory data, can just be excavated in next tables of data, is calculated
Amount declines to a great extent, and the excavation of the data can associate useful data classification, excavate purpose stronger;Authentication module is set,
Electric network information is effectively ensured safely;All codes performed in calculating platform are imparted not usurped at one to prove it
Change the ability run in environment, from the angle of broad sense, credible calculating platform provides a more broad peace for the network user
Full ambient engine, it describes safety problem from the angle of security system, it is ensured that the secure execution environments of user, breaks through Passive Defence and beats
Patch mode.
Embodiment 5:
A kind of electric network information secure and trusted work system based on big data as shown in Figure 1, including data quality management
Module 1, useful data excavates module 2, authentication module 3 and credible evaluation module 4, and wherein quality management module 1 includes number
According to description submodule 11, quality testing submodule 12 and data quality grading management submodule 13, useful data excavates mould
Block 2 includes that data prediction submodule 21, useful data builds submodule 22, useful data amendment submodule 23 and useful data
Layer digging submodule 24, authentication module 3 includes fingerprint recognition submodule 31 and alarm submodule 32.
(1) data describe submodule 11:
Data, data attribute number in itself are described by introducing the attribute of data attribute in itself and data influencer
Represented according to size, date created, comprising picture number, related data amount, wherein, related data amount is other that current data is pointed to
The summation of other data of data and sensing current data;The attribute of data influence person influencer's network clustering coefficientCarry out table
Show,Obtained by following methods:
Build data influence person and describe network, for each data, influencer includes multiple users and a pipe
Reason person, each of which influencer represents a node, and user may browse through data, it is also possible to which data are proposed with the suggestion of modification,
And manager voluntarily can both modify to data, it is also possible to modified according to user's suggestion,
Then influencer's network clustering coefficientIt is defined as:
In formula, σ1Represent that user often browses the factor of influence of secondary data applying, m represents that user browses total degree;σ2Represent
User often proposes the factor of influence that suggestion for revision applies, and l represents that user advises total degree;σ3Represent manager often certainly
The factor of influence that row one secondary data of modification applies, σ4Represent the influence that manager often applies according to user's suggestion one secondary data of modification
The factor, δ1And δ2Respectively σ3And σ4Weights, n represents that manager changes total degree;It is user's modification frequency system
Number, for representing satisfaction of the user to data, the coefficient shows that more greatly modification of the user to data is more frequent.
(2) quality testing submodule 12:
The quality of data is evaluated using " three-level evaluation model ", three classes is splitted data into according to size of data first,
Then all other attribute in addition to size of data of integrated data is evaluated its quality of data, and specific method is as follows:
Sample data is divided into quality data, middle qualitative data and low quality data, if size of data is more than threshold value
T1, then the data belong to quality data, if size of data is more than threshold values T2But it is less than threshold values T1, then the data belong to middle matter
Amount data, if size of data is less than threshold values T2, then the data belong to low quality data, T1> T2And T1、T2Span be
[1KB, 1MB];Quality data and low quality are further divided into different brackets, all other attribute composition of data is chosen
Vector, and the average of each data attribute of each grade is calculated according to sample data, it is that each grade sets up corresponding average
Vector, new data vector X=(x1,…,xN) represent, the mean vector Y=(y of certain grade1,…,yN) represent, N is represented
All other attribute number of data in addition to size of data, two similarities of vector are represented with similarity function R (X, Y):
R (X, Y) value is smaller, then show that similarity is bigger, conversely, then similarity is smaller, each data calculate respectively with not
The similarity of the mean vector of ad eundem, so as to confirm its credit rating.
(3) quality of data differentiated control submodule 13:
Data by being divided into different quality grade after quality testing submodule, according to data level different pairs
According to carrying out differentiated control.
(4) fingerprint recognition submodule 31:
Accessing electric network information data needs to be input into fingerprint, is matched with the fingerprint in fingerprint base, is only known by fingerprint
Others could conduct interviews to electric network information data.
(5) alarm submodule 32:
If not passing through fingerprint recognition, it is impossible to electric network information is conducted interviews, system sends alarm.
Preferably, it is characterised in that
(1) data prediction submodule 21:
Data are divided into different field, the data fields according to needed for user's request determines client use above-mentioned three-level
Evaluation model is screened to the high-quality High-level Data in field, constitutes a new tables of data K.
(2) useful data builds submodule 22:
By the data for pre-processing, each data fields contains different classification, introduces coefficient correlation P and screens useful number
According to classification:
In formula, ZsRepresent the quantity of data double-way sensing in mono- classification of new data table K, i.e., for data A and B, can
B is pointed to from A, also A can be pointed to from B, Z represents the related data amount in mono- classification of tables of data K,Wherein N represents one
The sum of data in classification.
(3) useful data amendment submodule 23:
Useful data in use, can be influenceed by artificial destruction and user two aspects of voting, according to this two
The revised coefficient correlation of aspect is P ';Concurrently set threshold value T, T ∈ (0,0.1], if P ' > T, show that this classification is that have
Use data;When from quality data qualified useful data cannot be obtained, successively in middle qualitative data and low quality number
Carry out searching qualified useful data in, and after all data search are finished, if the P ' for finally giving is maximum
Value is less than T, although or P ' maximum more than T its absolute value with the difference of threshold values T less than setting value C, show nothing
Although method finds useful data or can find useful data but the useful data degree of correlation that obtains is already below expection, then
Prompting, modification or increase related data are now sent to manager automatically.C=T/5 is taken, data area increase by 5% is pointed out, but
It is that amount of calculation increased 3.7%.
(4) useful data layer digging submodule 24:
Scan data table K first, it is assumed that the maximum and minimum value of P ' are respectively P 'maxWith P 'min, by tables of data K segmentations
IntoIndividual Non-overlapping Domain, P mining goes out Local frequent itemset, and wherein int is bracket function;Then it is sharp
Priori property is used, connection Local frequent itemset obtains global candidate;Scanning K counts the actual branch of each candidate again
Degree of holding is determining global frequentItemset.
It is according to artificial destruction and user's specific correction formula for being modified of ballot in useful data amendment submodule 23:
P '=P × (1-Y) × (1+H)
In formula, Y represents that data are subject to the probability of artificial destruction, H to represent that ballot user accounts for the ratio of total number of persons.
Preferably, credible evaluation module 4 includes following submodule:
Submodule 1:Define the every credible attribute for evaluation module, credible attribute is classification, credible attribute can be with
Sub- attribute is decomposed into downwards;
Submodule 2:For each credible attribute or sub- attribute, the evaluation index to it is extracted, can be evaluated with these
Index is evaluated credible attribute or sub- attribute from different sides;
Submodule 3:For each credible attribute or sub- attribute, the evaluation criterion to it is defined, evaluation criterion is divided into four
Level:It is excellent, good, in, it is poor, evaluation criterion is determined based on evaluation index, the i.e. valued combinations according to each evaluation index can
Which rank of evaluation criterion letter attribute or sub- attribute have reached;
Submodule 4:The standard of classification that determining module is credible, credible grade scale is divided into Pyatyi, is according to each credible category
The evaluation conclusion of property and draw;
Submodule 5:Before credible evaluation activity is carried out, according to the difference of assessment emphasis, different credible evaluation moulds are formed
Plate, and credible evaluation activity is carried out based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
In the invention of the present embodiment, introduce network clustering coefficient and data are described, consider data in itself
Attribute and the attribute of data influencer, improve the accuracy rate of classification, while being subtracted by the introducing of user's modification coefficient of frequency
Small manual intervention, realizes the target of the efficient detection quality of data;Using three-level evaluation model, memory space is saved, improved
Computational efficiency;Using brand-new similarity function, the effect of larger relative error is exaggerated so that credit rating more science
Accurately;Introduce data correction submodule to be modified coefficient correlation, can fully overcome artificial destruction and user's ballot logarithm
According to influence, take C=T/9, point out data area to increase by 2.7%, but amount of calculation increased 2.5%;Will be based on region division
Association rule mining application be combined with the classification of useful data, it is only necessary to carried out in the sorted tables of data of three-level
Layer digging, only when current data table does not have satisfactory data, can just be excavated in next tables of data, be counted
Calculation amount declines to a great extent, and the excavation of the data can associate useful data classification, excavate purpose stronger;Authentication mould is set
Block, electric network information is effectively ensured safely;All codes performed in calculating platform are imparted to prove it at one not
Be tampered the ability run in environment, from the angle of broad sense, credible calculating platform for the network user provide one it is more broad
Security context, it describes safety problem from the angle of security system, it is ensured that the secure execution environments of user, and it is passive anti-to break through
Imperial patch installing mode.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than the present invention is protected
The limitation of scope is protected, although being explained to the present invention with reference to preferred embodiment, one of ordinary skill in the art should
Work as understanding, technical scheme can be modified or equivalent, without deviating from the reality of technical solution of the present invention
Matter and scope.