CN104811441A - Big data acquiring and processing method and system - Google Patents
Big data acquiring and processing method and system Download PDFInfo
- Publication number
- CN104811441A CN104811441A CN201510145023.6A CN201510145023A CN104811441A CN 104811441 A CN104811441 A CN 104811441A CN 201510145023 A CN201510145023 A CN 201510145023A CN 104811441 A CN104811441 A CN 104811441A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- server end
- user side
- large data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to a big data acquiring and processing method and system. According to the method, a server side transmits data information to be acquired to a user side, and the data information is unidirectionally spread between users, and single-type data are fed back, so that big data are directly acquired. By the aid of questioning of a plurality of data types and feedback of single data type, processing complexity of the big data is effectively reduced, cost is reduced, and wide requirements of people for the big data are met.
Description
Technical field
The present invention relates to a kind of method of data acquisition, particularly relate to a kind of method and system of large data acquisition and procession.
Background technology
Existing large data are all by the click of user, make a speech, the behavior such as to browse gathers indirectly, and then go out hobby and the custom of user according to these behaviors of user and signature analysis, such as google, facebook.This method needs the data type of collection various, network log, video, picture, geographical location information etc.; The method of data analysis and process is complicated, needs various instrument, various data model, various dimensions ground analyzing and processing; The time of analyzing and processing is longer, can not meet the demand of instantaneity; High cost also seriously hinders the extensive use of large data simultaneously.
Summary of the invention
The object of the invention is to solve the problem, provide a kind of method and system of large data acquisition and procession, it sends the data message that will gather to user side by server end, data message one way propagation feed back the data of single type between user, thus achieve the direct collection of large data.This acquisition mode is putd question to by numerous types of data, single data type feedback, significantly reduces the complexity of large data processing, reduces cost, meet the widespread demand of people to large data.
Technical solution of the present invention is: the method and system that the invention provides a kind of large data acquisition and procession, and described method comprises:
Server end provides to user side or sends the information and requirement that will gather; After user side game server end, answering server end propose problem and by the information feed back of single type to server end; Meanwhile, user side transmits oneself browsed information or link by user totem information to other user sides, and other user sides transmit to other user sides after completing the work of itself user side again, forms the unidirectional Information Communication between user; Server end gathers the feedback information of the single type of user side, and carries out data processing.
Comprise further: during user side game server end, the machine identification information and presence will be uploaded; The user information database of server end checks this user by black and white lists, if not black list user, just allows this user to log in and records information and the state of this user; Upload the machine identification information and off-line state when user side exits, the user information database of server end deletes this user.
Comprise further: after user side game server end, according to the requirement of self position, authority, the hardware attributes of terminal, self-defining condition, the type of information, the classification of information and server end optionally reception server end or other user sides or server end and other both user sides in conjunction with the information of transmission, file, download, link or list, comprise following methods:
A) directly comparison, directly by the requirement comparison of the hardware attributes of the position of user side, authority, terminal, self-defining condition, the type of information, the classification of information and server end, qualified just reception;
B) the requirement digitlization of server end or character or the two are combined form numerical character, be put in information, file, download, link or list, combine with the position of user side, authority, the hardware attributes of terminal, self-defining condition, the type of information, the classification digitlization of information or character or the two and form numerical character and compare, qualifiedly just to receive.
Comprise further: server end gather feedback information time or user side receive, transmission of information time to carry out legitimacy and security inspection to this information, comprise black list user's inspection, keyword inspection, chaining check, information source inspection, duplicate message inspection, report information inspection, enciphered message inspection.
Comprise further: when user side is to other user side transmission of informations, first will input or load the identification information of the reception user preset, and whether to exist and online to server end inquire-receive user; Server end inquire-receive user, if exist and online, then return to user side or server end and receive the IP address of user or the wap interface of cryptographic IP address or wap interface or encryption.
Comprise further: user side has do-not-disturb functionality, the user of reception information can shield certain user side or certain information or come from the information of server end, and the method for realization comprises direct shielding, shields according to black and white lists, shields according to self-position, shields according to authority, shields according to the hardware attributes of terminal, according to self-defining condition mask, shield, shield according to the classification of information, shield according to the time, shield according to the requirement of server end, shield according to the combination in any of above various shielding mode according to the type of information.
Comprise further: user side is to adding oneself recommendation information during other user side transmission of informations, recommendation information comprises text, picture, voice, video, or the combination in any formed on this basis.
Comprise further: when user side is to other user side transmission of informations, the mode of transmission of information comprise user side directly to other user side transmission, user side by server end indirectly to other user side transmission, above two kinds of modes in conjunction with transmission; The information transmitted comprises the information coming from server end, the information coming from user side, comes from the information that both server end and user side combine; The mode of feedback information comprises that user side directly feeds back to server end, user side to combine to both server end, user side and reception user feed back to server end by receiving user's indirect feedback.
Comprise further: server end provides or sends the information that will gather and comprises arbitrary information, file, download, link or list with the information of requirement and user side transmission, or the combination in any formed on this basis, sequence or encryption; The feedback information of user side is arbitrary single type, comprises text, picture, voice, video, or single type new arbitrarily.
Comprise further: user side is any terminal with network savvy, comprises mobile terminal and terminal; User totem information is the information of identifying user end uniqueness, the combination in any that the place name phonetic at the domain name of country at the place name at the country name at the identification information that it is set by the cell-phone number of user, cell phone apparatus number, SIM card identification number, random number, sequence number, timestamp, the numbering relevant to computer hardware, operating system, user-defined identification information, user place or abbreviation, user place or abbreviation, user place, the country name phonetic at user place or Pinyin abbreviation, user place or Pinyin abbreviation are formed separately or jointly, sequence or encryption.
The present invention contrasts prior art following beneficial effect: sent the data message that will gather to user side by server end, data message one way propagation feed back the data of single type between user, thus achieve the direct collection of large data, the large data that more people can be made to obtain them want, and will not be wasted in their useless data by time and money.This mode is putd question to by numerous types of data, single data type feedback, effectively reduces the complexity of large data processing, has saved cost, meet the widespread demand of people to large data.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of one embodiment of the invention.
Fig. 2 is the flow chart of one embodiment of the invention.
Fig. 3 is the flow chart of another embodiment of the present invention.
Embodiment
The method and system of a kind of large data acquisition and procession provided by the invention as shown in Figure 1, comprises server end and user side.User side is any terminal with network savvy, comprises mobile terminal and terminal.
Fig. 2 shows the flow process of an embodiment provided by the invention.Here is the detailed description to each step of this flow process.
Step 201: server end provides to user side or sends the information and requirement that will gather.
In this step, server end can provide the information that will gather according to the form of information, file, download, link or list, server end requirement is a kind of restriction, can only be received by the user side in a certain area as limited certain information, limiting certain information can only be received by the user side of a certain authority.
Step 202: user side game server end, uploads the machine identification information and presence.
Step 203: by black and white lists, the user information database of server end checks whether this user is black list user, if black list user then enters step 204, if not black list user then enters step 205.
In this step, black list user is the user that absolute prohibition logs in, and white list user is the user of internal communication.When user side logs in, the black and white lists comparison of first preserving with server end, is only had and could normally be logged in by the user of comparison.
In this step, user information database is a database, and have recorded identification information and the presence of user side, it does not preserve the information of domestic consumer, and when domestic consumer exits, all information of this domestic consumer can be deleted.User information database also can store according to the form of file.
In this step, user totem information is the information of identifying user end uniqueness, it is by the cell-phone number of user, cell phone apparatus number, SIM card identification number, random number, sequence number, timestamp, the numbering relevant to computer hardware, the identification information of operating system setting, user-defined identification information, the country name at user place or abbreviation, the place name at user place or abbreviation, the domain name of the country at user place, the country name phonetic at user place or Pinyin abbreviation, the combination in any that the place name phonetic at user place or Pinyin abbreviation are formed separately or jointly, sequence or encryption.Such as can using the cell-phone number of the abbreviation of on-site for user side name of the country and user side as user totem information, as CN13800000000, being shown to be the cell-phone number being positioned at China is the user side of 13800000000, US13800000000 is, being shown to be the cell-phone number being positioned at the U.S. is the user side of 13800000000, can distinguish the user of countries in the world like this.
Step 204: forbid logging in.
Step 205: allow this user to log in and record information and the state of this user.
Step 206: user side according to circumstances optionally reception server end or other user sides or server end and other both user sides in conjunction with the information of transmission.
In this step, user side according to the requirement of self position, authority, the hardware attributes of terminal, self-defining condition, the type of information, the classification of information and server end optionally reception server end or other user sides or server end and other both user sides in conjunction with the information of transmission, file, download, link or list, include but not limited to following methods:
A) directly comparison, directly by the requirement comparison of the hardware attributes of the position of user side, authority, terminal, self-defining condition, the type of information, the classification of information and server end, qualified just reception;
B) the requirement digitlization of server end or character or the two are combined form numerical character, be put in information, file, download, link or list, combine with the position of user side, authority, the hardware attributes of terminal, self-defining condition, the type of information, the classification digitlization of information or character or the two and form numerical character and compare, qualifiedly just to receive.
The requirement of such as server end can receive this information the user of all mobile terminals of China, what then this information was possible is numbered CN01, and wherein CN represents China, and 01 represents mobile terminal, if user side be numbered CN01XXX, then this user side can receive this information.
In this step, the method for user side determination self-position comprises network location technology, GPS location technology, user side input position information.
In this step, the hardware attributes of terminal is divided into mobile terminal and terminal.
In this step, the type of information comprises text, picture, voice, video, or the combination in any formed on this basis.
In this step, the classification of information can according to the division of teaching contents of information, comprises advertising message, internal information that survey information, commonweal information, personal information, server end send.
In this step, user side receive information mode comprise being received from server end information, receive come from user side information, receive the information coming from both server end and user side and combine.
Step 207: judge whether this information is legal, safety or not conductively-closed.If illegal, information that is unsafe or conductively-closed then enters step 208, if information legal, safety, not conductively-closed then enters step 209.
Whether in this step, judge the legitimacy of information, fail safe or shield, the method for realization: directly comparison, digitlization or character or the two combination form numerical character, and concrete condition can refer step 206 if including but not limited to following several.
In this step, legitimacy and security inspection comprise that black list user checks, keyword inspection, chaining check, information source inspection, duplicate message inspection, report information inspection, enciphered message inspection.If this information comes from black list user, disregard, if this information contains the keyword forbidden or the link forbidden, disregard, if this information comes from other server ends or other program ends, disregard, if this information is the information of repetition or processed information, disregard, if this information is by the information reported, disregard.To repeat information or processed information screen be in order to guarantee information transmit one-way.
In this step, user side has do-not-disturb functionality, the user of reception information can shield certain user side or certain information or come from the information of server end, the method for realization comprises direct shielding, shields according to black and white lists, shields according to self-position, shields according to authority, shields according to the hardware attributes of terminal, according to self-defining condition mask, the combination in any shielding that shields according to the type of information, shield according to the classification of information, shield, shield according to the requirement of server end, formed according to above various shielding mode according to the time.Such as user side is not want to receive any information after 22 of every day time, just can arrange do-not-disturb functionality.And for example user side does not want the information receiving a certain user side, just can shield this user side by do-not-disturb functionality.
Step 208: disregard.
Step 209: user side browses the information of reception, and answer is provided to the problem that server end proposes.
Step 210: user side input or load the identification information of reception user preset, and whether to exist and online to server end inquire-receive user.
Step 211: server end inquire-receive user, if exist and online, then return to user side and receive the IP address of user or the wap interface of cryptographic IP address or wap interface or encryption, allow it to transmit.
Step 212: user side transmits oneself browsed information to reception user, adds the recommendation information of oneself simultaneously, and returns feedback information to server end.
In this step, recommendation information comprises text, picture, voice, video, or the combination in any formed on this basis.
In this step, the feedback information of user side is arbitrary single type, comprises text, picture, voice, video, or single type new arbitrarily.Such as server end asks a question in the mode of multiple-choice question, and the answer of user side just can be classified as single type, ABCD or 1234.
In this step, the mode of feedback information comprises that user side directly feeds back to server end, user side to combine to both server end, user side and reception user feed back to server end by receiving user indirect feedback.
Step 213: receive user and start to transmit, form the unidirectional Information Communication between user.
In this step, receive user by with the identity of the identity of user side, transmitting terminal to other user side transmission of informations.
Step 214: server end gathers the feedback information of user side, and carries out large data processing.
In this step, server end can gather in usage data storehouse, also can according to the form collection of file.
In this step, because feedback information is single type, during data processing, just directly statistical analysis can be carried out by database.
Step 215: judge whether user side exits.If exit, enter step 217, if do not exit, enter step 216.
Step 216: continue to transmit next information.
Step 217: user side quits a program, uploads the machine identification information and off-line state simultaneously, and the user information database of server end deletes this user.
Fig. 3 shows the flow process of another embodiment provided by the invention.What transmit unlike this example with Fig. 2 is link instead of information, receives user and returns to server end the feedback information that sends user side instead of user side returns feedback information to server end.Here is the detailed description to each step of this flow process.
Step 301: server end provides to user side or sends the information and requirement that will gather.
Step 302: user side game server end, uploads the machine identification information and presence.
Step 303: by black and white lists, the user information database of server end checks whether this user is black list user, if black list user then enters step 304, if not black list user then enters step 305.
Step 304: forbid logging in.
Step 305: allow this user to log in and record information and the state of this user.
Step 306: user side according to circumstances optionally reception server end or other user sides or server end and other both user sides in conjunction with the link of transmission.
Step 307: judge whether this link is legal, safety or not conductively-closed.If not link that is legal, safety or conductively-closed then enters step 308, if link that is legal, safety or not conductively-closed then enters step 309.
Step 308: disregard.
Step 309: receive user and return the feedback information sending user side to server end.
In this step, if receive the feedback information that user does not receive user side, then step 311 is entered.
Step 310: server end gathers the feedback information of user side, and carries out large data processing.
In this step, if server end does not collect the feedback information of user side, then step 311 is entered.
Step 311: judge whether user side exits.If exit, enter step 312, if do not exit, enter step 313.
Step 312: user side quits a program, uploads the machine identification information and off-line state simultaneously, and the user information database of server end deletes this user.
Step 313: user side is downloaded and browsed the information of reception, and answer is provided to the problem that server end proposes.
Step 314: user side input or load the identification information of reception user preset, and whether to exist and online to server end inquire-receive user.
Step 315: server end inquire-receive user, if exist and online, then return to user side and receive the IP address of user or the wap interface of cryptographic IP address or wap interface or encryption, allow it to transmit.
Step 316: user side transmits oneself browsed link to reception user, adds the recommendation information of oneself simultaneously.
Step 317: receive user and start to transmit, form the unidirectional Information Communication between user.
Should be understood that above-described embodiment only for illustration of the present invention, and be not limitation of the present invention.Any those skilled in the art, in technical scope disclosed by the invention, all can carry out suitable change or change to it, and this change or change all should be encompassed within protection scope of the present invention.
Claims (10)
1. a method and system for large data acquisition and procession, is characterized in that, described method comprises: server end provides to user side or sends the information and requirement that will gather; After user side game server end, answering server end propose problem and by the information feed back of single type to server end; Meanwhile, user side transmits oneself browsed information or link by user totem information to other user sides, and other user sides transmit to other user sides after completing the work of itself user side again, forms the unidirectional Information Communication between user; Server end gathers the feedback information of the single type of user side, and carries out data processing.
2. the method and system of large data acquisition and procession according to claim 1, is characterized in that, will upload the machine identification information and presence when also comprising user side game server end; The user information database of server end checks this user by black and white lists, if not black list user, just allows this user to log in and records information and the state of this user; Upload the machine identification information and off-line state when user side exits, the user information database of server end deletes this user.
3. the method and system of large data acquisition and procession according to claim 1, it is characterized in that, after also comprising user side game server end, according to the requirement of self position, authority, the hardware attributes of terminal, self-defining condition, the type of information, the classification of information and server end optionally reception server end or other user sides or server end and other both user sides in conjunction with the information of transmission, file, download, link or list, comprise following methods:
A) directly comparison, directly by the requirement comparison of the hardware attributes of the position of user side, authority, terminal, self-defining condition, the type of information, the classification of information and server end, qualified just reception;
B) the requirement digitlization of server end or character or the two are combined form numerical character, be put in information, file, download, link or list, combine with the position of user side, authority, the hardware attributes of terminal, self-defining condition, the type of information, the classification digitlization of information or character or the two and form numerical character and compare, qualifiedly just to receive.
4. the method and system of large data acquisition and procession according to claim 1, it is characterized in that, also comprise server end gather feedback information time or user side receive, transmission of information time to carry out legitimacy and security inspection to this information, comprise black list user's inspection, keyword inspection, chaining check, information source inspection, duplicate message inspection, report information inspection, enciphered message inspection.
5. the method and system of large data acquisition and procession according to claim 1, it is characterized in that, when also comprising user side to other user side transmission of informations, first to input or load the identification information of the reception user preset, and whether exist and online to server end inquire-receive user; Server end inquire-receive user, if exist and online, then return to user side or server end and receive the IP address of user or the wap interface of cryptographic IP address or wap interface or encryption.
6. the method and system of large data acquisition and procession according to claim 1, it is characterized in that, also comprise user side and there is do-not-disturb functionality, the user of reception information can shield certain user side or certain information or come from the information of server end, the method realized comprises direct shielding, shield according to black and white lists, shield according to self-position, shield according to authority, hardware attributes according to terminal shields, according to self-defining condition mask, type according to information shields, classification according to information shields, shield according to the time, requirement according to server end shields, combination in any according to above various shielding mode shields.
7. the method and system of large data acquisition and procession according to claim 1, it is characterized in that, also comprise user side to adding oneself recommendation information during other user side transmission of informations, recommendation information comprises text, picture, voice, video, or the combination in any formed on this basis.
8. the method and system of large data acquisition and procession according to claim 1, it is characterized in that, when user side is to other user side transmission of informations, the mode of transmission of information comprise user side directly to other user side transmission, user side by server end indirectly to other user side transmission, above two kinds of modes in conjunction with transmission; The information transmitted comprises the information coming from server end, the information coming from user side, comes from the information that both server end and user side combine; The mode of feedback information comprises that user side directly feeds back to server end, user side to combine to both server end, user side and reception user feed back to server end by receiving user's indirect feedback.
9. the method and system of large data acquisition and procession according to claim 1, it is characterized in that, server end provides or sends the information that will gather and comprises arbitrary information, file, download, link or list with the information of requirement and user side transmission, or the combination in any formed on this basis, sequence or encryption; The feedback information of user side is arbitrary single type, comprises text, picture, voice, video, or single type new arbitrarily.
10. the method and system of large data acquisition and procession according to claim 1, is characterized in that, user side is any terminal with network savvy, comprises mobile terminal and terminal; User totem information is the information of identifying user end uniqueness, the combination in any that the place name phonetic at the domain name of country at the place name at the country name at the identification information that it is set by the cell-phone number of user, cell phone apparatus number, SIM card identification number, random number, sequence number, timestamp, the numbering relevant to computer hardware, operating system, user-defined identification information, user place or abbreviation, user place or abbreviation, user place, the country name phonetic at user place or Pinyin abbreviation, user place or Pinyin abbreviation are formed separately or jointly, sequence or encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510145023.6A CN104811441A (en) | 2015-03-31 | 2015-03-31 | Big data acquiring and processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510145023.6A CN104811441A (en) | 2015-03-31 | 2015-03-31 | Big data acquiring and processing method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104811441A true CN104811441A (en) | 2015-07-29 |
Family
ID=53695935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510145023.6A Pending CN104811441A (en) | 2015-03-31 | 2015-03-31 | Big data acquiring and processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104811441A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016177051A1 (en) * | 2015-09-15 | 2016-11-10 | 中兴通讯股份有限公司 | Security authentication method and device |
CN109558561A (en) * | 2018-12-04 | 2019-04-02 | 深圳创维数字技术有限公司 | A kind of user behavior path acquisition method, device, equipment and medium |
CN110363553A (en) * | 2018-04-02 | 2019-10-22 | 阿里巴巴集团控股有限公司 | Information collecting method, device, equipment, medium and system |
CN114124376A (en) * | 2021-11-23 | 2022-03-01 | 中国标准化研究院 | Data processing method and system based on network data acquisition |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070069029A1 (en) * | 2005-09-28 | 2007-03-29 | International Business Machines Corporation | Method and systems for collecting user's choices using RFIDs |
CN101145253A (en) * | 2007-11-08 | 2008-03-19 | 高翔 | Questionnaire voting system based on bar code identification |
CN101256654A (en) * | 2007-02-28 | 2008-09-03 | 陈国飞 | Method for automatically inviting and tracing answer sheet of on-line questionnaire investigation system |
CN102129641A (en) * | 2011-02-16 | 2011-07-20 | 电子科技大学 | Radio frequency identification (RFID)-based exhibitor information survey analysis method |
CN103065110A (en) * | 2012-12-20 | 2013-04-24 | 华南理工大学 | On-line question and answer method and system towards wireless radio frequency mobile terminal |
CN103942870A (en) * | 2013-01-18 | 2014-07-23 | 杜月林 | On-line voting investigating system |
CN103971258A (en) * | 2013-01-30 | 2014-08-06 | 苏州达芯微电子有限公司 | Electronic questionnaire investigation service system and investigation method using same |
-
2015
- 2015-03-31 CN CN201510145023.6A patent/CN104811441A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070069029A1 (en) * | 2005-09-28 | 2007-03-29 | International Business Machines Corporation | Method and systems for collecting user's choices using RFIDs |
CN101256654A (en) * | 2007-02-28 | 2008-09-03 | 陈国飞 | Method for automatically inviting and tracing answer sheet of on-line questionnaire investigation system |
CN101145253A (en) * | 2007-11-08 | 2008-03-19 | 高翔 | Questionnaire voting system based on bar code identification |
CN102129641A (en) * | 2011-02-16 | 2011-07-20 | 电子科技大学 | Radio frequency identification (RFID)-based exhibitor information survey analysis method |
CN103065110A (en) * | 2012-12-20 | 2013-04-24 | 华南理工大学 | On-line question and answer method and system towards wireless radio frequency mobile terminal |
CN103942870A (en) * | 2013-01-18 | 2014-07-23 | 杜月林 | On-line voting investigating system |
CN103971258A (en) * | 2013-01-30 | 2014-08-06 | 苏州达芯微电子有限公司 | Electronic questionnaire investigation service system and investigation method using same |
Non-Patent Citations (2)
Title |
---|
赵旭辉等: "在线问卷调研综合化平台系统及其应用", <网络安全技术与应用> * |
陈望挺等: "基于JSP和Android的C/S结构问卷系统", <计算机应用> * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016177051A1 (en) * | 2015-09-15 | 2016-11-10 | 中兴通讯股份有限公司 | Security authentication method and device |
CN110363553A (en) * | 2018-04-02 | 2019-10-22 | 阿里巴巴集团控股有限公司 | Information collecting method, device, equipment, medium and system |
CN109558561A (en) * | 2018-12-04 | 2019-04-02 | 深圳创维数字技术有限公司 | A kind of user behavior path acquisition method, device, equipment and medium |
CN114124376A (en) * | 2021-11-23 | 2022-03-01 | 中国标准化研究院 | Data processing method and system based on network data acquisition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103078868B (en) | The application process of a kind of Quick Response Code and system | |
CN102546914A (en) | Automatic login system based on smart phone and control method | |
CN103647695A (en) | Client application program user registration method, mobile terminal and server | |
CN104125485B (en) | A kind of user profile shared method, equipment and system | |
CN103840944A (en) | Short message authentication method, server and system | |
WO2014108003A1 (en) | Method for verifying sensitive operations, terminal device, server, and verification system | |
CN107046518A (en) | The detection method and device of network attack | |
CN106327637A (en) | Bluetooth door opening system based on community management and method | |
CN106796708A (en) | Electronic voting system and method | |
CN104811441A (en) | Big data acquiring and processing method and system | |
CN103023930A (en) | Webpage sharing method and device | |
CN107484152A (en) | The management method and device of terminal applies | |
CN103401686B (en) | A kind of user's OTP WEB Authentication System and application process thereof | |
CN109728996A (en) | Methods of exhibiting, user equipment, storage medium and the device of communication information | |
CN107707529A (en) | A kind of client validation method for realizing limitation identifying code transmission times | |
CN104750723A (en) | File sharing method, system, browser and server | |
CN106713242A (en) | Data request processing method and device | |
CN104967525B (en) | Method and device that news is shared, system | |
CN104158766A (en) | Network surfing control method | |
CN104954227B (en) | A kind of cross-platform information push method of preemptive type and server | |
CN104901862A (en) | Method, device and system for displaying application information of third-party application in customized interface | |
CN108092947A (en) | A kind of method and device that identity discriminating is carried out to third-party application | |
CN103532979A (en) | Method for generating and verifying multi-conversation verification codes under CGI (common gateway interface) for web | |
CN105490913A (en) | Instant message processing method and device | |
CN105788055A (en) | Voting system and method for social networking site |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150729 |