Movatterモバイル変換


[0]ホーム

URL:


CN109728907A - Large-scale data circulation method and device - Google Patents

Large-scale data circulation method and device
Download PDF

Info

Publication number
CN109728907A
CN109728907ACN201910100666.7ACN201910100666ACN109728907ACN 109728907 ACN109728907 ACN 109728907ACN 201910100666 ACN201910100666 ACN 201910100666ACN 109728907 ACN109728907 ACN 109728907A
Authority
CN
China
Prior art keywords
data
ciphertext
decryption key
decryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910100666.7A
Other languages
Chinese (zh)
Inventor
张翔
吴峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yidianshikong Network Co Ltd
Original Assignee
Shanghai Yidianshikong Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yidianshikong Network Co LtdfiledCriticalShanghai Yidianshikong Network Co Ltd
Priority to CN201910100666.7ApriorityCriticalpatent/CN109728907A/en
Publication of CN109728907ApublicationCriticalpatent/CN109728907A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

This application discloses a kind of large-scale data circulation methods.This method comprises: ciphertext of the storage from multiple data sources;It receives through the decryption key after RSA public key encryption;Decrypt the ciphertext;The original text that decryption obtains is calculated according to default computation rule;And calculated result is exported in one or more data sources.The device includes: storage unit, receiving unit, decryption unit, computing unit and output unit.It realizes large-scale data circulation and prevents a side of procurement data from carrying out two time selling.Present application addresses due to being only capable of point-to-point transaction circulation, and a side of procurement data there is also the data circulation low efficiency that may cause of two time selling the technical issues of.

Description

Large-scale data circulation method and device
Technical field
This application involves the communications fields, in particular to a kind of large-scale data circulation method and device.
Background technique
It is predicted according to the Committee of Development and Reform, the year two thousand twenty China intelligent network connection automobile new car accounting is up to 50%, and automobile will become nextA important mobile terminal.
Appropriate reaction, the autonomous driving vehicle of different stage are made in order to the environmental information around real-time perception and in advanceEquipped with the sensors such as various high-precision cameras and radar.These sensors also record while optimizing automotive performance and serviceA large amount of personal information.
And vehicle and owner information, and generated track, vehicle condition, maintenance and amusement in the process of movingThe information such as preference are mostly possessed and are managed by vehicle enterprise and service provider.On the one hand, user does not know that the automobile of oneself producesWhich data, if wanting to exercise is even more not know where to begin for the right of attribution and administrative power of these data.On the other hand, many vehicle enterprises jailJail rests in the related data that vehicle and user generate in oneself hand, and the storage mode of traditional centralization means onceThere are loophole total datas to all suffer from great risk.To information security, there is no foots at the beginning of Automobile Design for still more many vehicle enterprisesEnough attention, do not recognize yet automobile can as today depth web development.
It is especially too low in point-to-point trading efficiency, and there is also the possibility of two time selling to make by a side of procurement dataAt data negotiability it is weaker.
It circulates for point-to-point data are only capable of in the related technology, and there is also two time sellings by a side of procurement dataThe problem of data circulation low efficiency that may cause, currently no effective solution has been proposed.
Summary of the invention
The main purpose of the application is to provide a kind of large-scale data circulation method and device, point-to-point to solve to be only capable ofData circulation, and a side of procurement data there is also the data that may cause of two time selling circulate low efficiency the problem of.
To achieve the goals above, according to the one aspect of the application, a kind of large-scale data circulation method is provided.
Large-scale data circulation method according to the application includes: ciphertext of the storage from multiple data sources;Reception passes throughDecryption key after RSA public key encryption;Decrypt the ciphertext;The original text that decryption obtains is calculated according to default computation rule;And calculated result is exported in one or more data sources.
Further, ciphertext of the storage from multiple data sources includes: safety caculation module storage from the first data sourceEncrypted running data;Safety caculation module stores the encrypted violation data from the second data source;Safety calculatesModule stores the encrypted insurance data from third data source.
Further, receiving through the decryption key after RSA public key encryption includes: by the RSA public key in encrypting moduleEncrypt the decryption key;Safety caculation module receives the encrypted decryption key.
Further, decrypting the ciphertext includes: to decrypt to obtain decryption key by RSA private key combination decipherment algorithm;It is logicalIt crosses the decryption key and decrypts the ciphertext.
Further, calculating the original text that decryption obtains according to default computation rule includes: to advise according to preset matchingThen determine the incidence relation of the original text;Data are calculated by computation model and use report;It is fed back according to associated relationshipThe data use report.
Further, after one or more data sources output calculated results further include: destroy original text, ciphertext,Decryption key and calculated result.
To achieve the goals above, according to the another aspect of the application, a kind of large-scale data circulation device is provided.
It include: to include: according to the large-scale data circulation device of the application
Storage unit, for storing the ciphertext from multiple data sources;Receiving unit is added for receiving by RSA public keyDecryption key after close;Decryption unit, for decrypting the ciphertext;Computing unit is solved for calculating according to default computation ruleThe close obtained original text;And output unit, for exporting calculated result in one or more data sources.
Further, the storage unit includes: encrypted row of the safety caculation module storage from the first data sourceSail data;Safety caculation module stores the encrypted violation data from the second data source;Safety caculation module storage comes fromThe encrypted insurance data of third data source.
Further, the receiving unit includes: by decryption key described in the RSA public key encryption in encrypting module;PeaceFull computing module receives the encrypted decryption key.
Further, the decryption unit includes: to decrypt to obtain decryption key by RSA private key combination decipherment algorithm;It is logicalIt crosses the decryption key and decrypts the ciphertext.
In the embodiment of the present application, by the way of large-scale data circulation, by safety caculation module storage from moreThe ciphertext of a data source;It receives through the decryption key after RSA public key encryption;Decrypt the ciphertext;According to default computation ruleCalculate the original text that decryption obtains;And calculated result is exported in one or more data sources;Realize large-scale dataCirculate and prevent the side of procurement data from carrying out two time selling;Reach the point-to-point data circulation of substitution and has two time selling hiddenThe purpose of trouble to realize the technical effect for greatly promoting data circulation efficiency, and then solves point-to-point due to being only capable ofTransaction circulation, and there is also the technologies of the data circulation low efficiency that may cause of two time selling to ask by a side of procurement dataTopic.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, so that the application's is otherFeature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, notConstitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the large-scale data circulation method schematic diagram according to the application first embodiment;
Fig. 2 is the large-scale data circulation method schematic diagram according to the application second embodiment;
Fig. 3 is the large-scale data circulation method schematic diagram according to the application 3rd embodiment;
Fig. 4 is the large-scale data circulation method schematic diagram according to the application fourth embodiment;
Fig. 5 is the large-scale data circulation method schematic diagram according to the 5th embodiment of the application;
Fig. 6 is the large-scale data circulation method schematic diagram according to the application sixth embodiment;
Fig. 7 is the large-scale data circulation device schematic diagram according to the application first embodiment.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present applicationAttached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is onlyThe embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill peopleMember's every other embodiment obtained without making creative work, all should belong to the model of the application protectionIt encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this wayData be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " toolHave " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or unitsProcess, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clearOther step or units listing to Chu or intrinsic for these process, methods, product or equipment.
In this application, term " on ", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outside"," in ", "vertical", "horizontal", " transverse direction ", the orientation or positional relationship of the instructions such as " longitudinal direction " be orientation based on the figure orPositional relationship.These terms are not intended to limit indicated dress primarily to better describe the present invention and embodimentSet, element or component must have particular orientation, or constructed and operated with particular orientation.
Also, above-mentioned part term is other than it can be used to indicate that orientation or positional relationship, it is also possible to for indicating itHis meaning, such as term " on " also are likely used for indicating certain relations of dependence or connection relationship in some cases.For abilityFor the those of ordinary skill of domain, the concrete meaning of these terms in the present invention can be understood as the case may be.
In addition, term " installation ", " setting ", " being equipped with ", " connection ", " connected ", " socket " shall be understood in a broad sense.For example,It may be a fixed connection, be detachably connected or monolithic construction;It can be mechanical connection, or electrical connection;It can be direct phaseIt even, or indirectly connected through an intermediary, or is two connections internal between device, element or component.For those of ordinary skills, the specific meanings of the above terms in the present invention can be understood according to specific conditions.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phaseMutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
According to embodiments of the present invention, a kind of large-scale data circulation method is provided, as shown in Figure 1, this method includes such asUnder step S100 to step S108:
Step S100, the ciphertext from multiple data sources is stored;
Specifically, as shown in Fig. 2, ciphertext of the storage from multiple data sources includes:
Step S200, safety caculation module stores the encrypted running data from the first data source;
Step S202, safety caculation module stores the encrypted violation data from the second data source;
Step S204, safety caculation module stores the encrypted insurance data from third data source.
First data source refers to user mobile phone and onboard system, and the second data source refers to traffic management department, third dataSource refers to insurance company;Traveling number can be collected by user mobile phone and onboard system, traffic management department, insurance companyAccording to, violation data and insurance data, and complete to calculate the safety being sent to after the encryption of above-mentioned data in safety caculation moduleArea;Calculating and data reallocation may be implemented by calculating area safely, provided safeguard for large-scale data circulation.
In some embodiments, it can also be preference, maintenance, used car data etc., the source of the unlimited fixed number evidence of the present invention,Data source can be multiple.
Step S102, it receives through the decryption key after RSA public key encryption;
Specifically, as shown in figure 3, reception includes: by the decryption key after RSA public key encryption
Step S300, pass through decryption key described in the RSA public key encryption in encrypting module;
Step S302, safety caculation module receives the encrypted decryption key.
RSA public key is preset in encrypting module, obtains the ciphertext of key by encrypting the RSA public key decryptions key, is led toNetwork sending is crossed, which is received by safety caculation module.
Step S104, the ciphertext is decrypted;
Specifically, as shown in figure 4, decrypting the ciphertext and including:
Step S400, it decrypts to obtain decryption key by RSA private key combination decipherment algorithm;
Step S402, the ciphertext is decrypted by the decryption key.
After safety caculation module receives the decryption key after the decryption, by be set in advance in decipherment algorithm therein andRSA private key, solution lock out decryption key from encrypted decryption key, and decrypts ciphertext by decryption key and obtain in original textHold.Guarantee the data safety in large-scale data circulation.
Step S106, the original text that decryption obtains is calculated according to default computation rule;
Specifically, as shown in figure 5, including: according to the original text that the calculating decryption of default computation rule obtains
Step S500, the incidence relation of the original text is determined according to preset matching rule;
Step S502, data are calculated by computation model and use report;
Step S504, the data are fed back according to associated relationship and uses report.
The association completed between decryption and data inside safety caculation module calculates.Specifically, in safety caculation moduleThe specified external input of middle storage, such as fingerprint, but the data external in safety caculation module can not directly obtain, and can only holdWhether the specific computation rule of row, such as two fingerprints of storage, match consistent.Computation rule is defined by data user's.The encryption data of multiple data sources, such as the form track of certain vehicle, violating the regulations and insurance data are stored in from three data sourcesInto safety caculation module, second-hand car trader or insurance company can obtain quotation or the guarantor of used car by default computation modelDanger quotation is not related to the output of data detail to realize, can but feed back to user's data and use report.
Step S108, calculated result is exported in one or more data sources.
User mobile phone, onboard system, traffic control system, insurance company management system interface in output calculate knotFruit is not carried out data dealing directly, but is calculated and carried out indirectly based on data safety to realize the application and circulation of dataThe circulation of data equity, final application value dimension complete data to the closed loop applied in the service of data holder itself.
Preferably, as shown in fig. 6, after one or more data source output calculated results further include:
Step S600, original text, ciphertext, decryption key and calculated result are destroyed.
After calculated result generation, original text that safety caculation module auto-destruct stores in the database, ciphertext, decryptionKey and calculated result;Guarantee that data will not be revealed, or is illegally accessed.
It can be seen from the above description that the present invention realizes following technical effect:
In the embodiment of the present application, by the way of large-scale data circulation, by safety caculation module storage from moreThe ciphertext of a data source;It receives through the decryption key after RSA public key encryption;Decrypt the ciphertext;According to default computation ruleCalculate the original text that decryption obtains;And calculated result is exported in one or more data sources;Realize large-scale dataCirculate and prevent the side of procurement data from carrying out two time selling;Reach the point-to-point data circulation of substitution and has two time selling hiddenThe purpose of trouble to realize the technical effect for greatly promoting data circulation efficiency, and then solves point-to-point due to being only capable ofTransaction circulation, and there is also the technologies of the data circulation low efficiency that may cause of two time selling to ask by a side of procurement dataTopic.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructionsIt is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with notThe sequence being same as herein executes shown or described step.
According to embodiments of the present invention, additionally provide it is a kind of for implementing the device of above-mentioned large-scale data circulation method, such asShown in Fig. 7, which includes:
Storage unit 10, for storing the ciphertext from multiple data sources;
The storage unit 10 includes:
Safety caculation module stores the encrypted running data from the first data source;
Safety caculation module stores the encrypted violation data from the second data source;
Safety caculation module stores the encrypted insurance data from third data source.
First data source refers to user mobile phone and onboard system, and the second data source refers to traffic management department, third dataSource refers to insurance company;Traveling number can be collected by user mobile phone and onboard system, insurance company, traffic management departmentAccording to, violation data and insurance data, and complete to being sent to safety caculation module after the encryption of above-mentioned data;By calculating safelyModule may be implemented to calculate and data are reallocated, and provides safeguard for large-scale data circulation.
In some embodiments, it can also be preference, maintenance, used car data etc., the source of the unlimited fixed number evidence of the present invention,Data source can be multiple.
Receiving unit 20, for receiving the decryption key after passing through RSA public key encryption;
The receiving unit 20 includes:
Pass through decryption key described in the RSA public key encryption in encrypting module;
Safety caculation module receives the encrypted decryption key.
RSA public key is preset in encrypting module, the ciphertext of key is obtained by the RSA public key encryption decryption key, is led toNetwork sending is crossed, which is received by safety caculation module.
Decryption unit 30, for decrypting the ciphertext;
The decryption unit 30 includes:
It decrypts to obtain decryption key by RSA private key combination decipherment algorithm;
The ciphertext is decrypted by the decryption key.
After safety caculation module receives the decryption key after the decryption, by be set in advance in decipherment algorithm therein andRSA private key, solution lock out decryption key from encrypted decryption key, and decrypts ciphertext by decryption key and obtain in original textHold.Guarantee the data safety in large-scale data circulation.
Computing unit 40, for calculating the original text that decryption obtains according to default computation rule;
Specifically, the computing unit 40 includes:
The incidence relation of the original text is determined according to preset matching rule;
Data are calculated by computation model and use report;
The data, which are fed back, according to associated relationship uses report.
The association completed between decryption and data inside safety caculation module calculates.Specifically, in safety caculation moduleThe specified external input of middle storage, such as fingerprint, but the data external in safety caculation module can not directly obtain, and can only holdWhether the specific computation rule of row, such as two fingerprints of storage, match consistent.Computation rule is defined by data user's.The encryption data of multiple data sources, such as the form track of certain vehicle, violating the regulations and insurance data are stored in from three data sourcesInto safety caculation module, second-hand car trader or insurance company can obtain quotation or the guarantor of used car by default computation modelDanger quotation is not related to the output of data detail to realize, can but feed back to user's data and use report.
Output unit 50, for exporting calculated result in one or more data sources.
User mobile phone, onboard system, traffic control system, insurance company management system interface in output calculate knotFruit is not carried out data dealing directly, but is calculated and carried out indirectly based on data safety to realize the application and circulation of dataThe circulation of data equity, final application value dimension complete data to the closed loop applied in the service of data holder itself.
Preferably, after one or more data source output calculated results further include:
Destroy original text, ciphertext, decryption key and calculated result.
After calculated result generation, original text that safety caculation module auto-destruct stores in the database, ciphertext, decryptionKey and calculated result;Guarantee that data will not be revealed, or is illegally accessed.
It can be seen from the above description that the present invention realizes following technical effect:
In the embodiment of the present application, by the way of large-scale data circulation, by safety caculation module storage from moreThe ciphertext of a data source;It receives through the decryption key after RSA public key encryption;Decrypt the ciphertext;According to default computation ruleCalculate the original text that decryption obtains;And calculated result is exported in one or more data sources;Realize large-scale dataCirculate and prevent the side of procurement data from carrying out two time selling;Reach the point-to-point data circulation of substitution and has two time selling hiddenThe purpose of trouble to realize the technical effect for greatly promoting data circulation efficiency, and then solves point-to-point due to being only capable ofTransaction circulation, and there is also the technologies of the data circulation low efficiency that may cause of two time selling to ask by a side of procurement dataTopic.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with generalComputing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formedNetwork on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are storedBe performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by theyIn multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specificHardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this fieldFor art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repairChange, equivalent replacement, improvement etc., should be included within the scope of protection of this application.

Claims (10)

CN201910100666.7A2019-01-312019-01-31Large-scale data circulation method and devicePendingCN109728907A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910100666.7ACN109728907A (en)2019-01-312019-01-31Large-scale data circulation method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910100666.7ACN109728907A (en)2019-01-312019-01-31Large-scale data circulation method and device

Publications (1)

Publication NumberPublication Date
CN109728907Atrue CN109728907A (en)2019-05-07

Family

ID=66301152

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910100666.7APendingCN109728907A (en)2019-01-312019-01-31Large-scale data circulation method and device

Country Status (1)

CountryLink
CN (1)CN109728907A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101559745A (en)*2009-05-152009-10-21华南理工大学Vehicle control system for preventing stealing and robbery and implementation method thereof
CN102082790A (en)*2010-12-272011-06-01北京握奇数据系统有限公司Method and device for encryption/decryption of digital signature
CN103425933A (en)*2013-07-312013-12-04北京华易互动科技有限公司Data homomorphic encrypting and unloading method of multi-data source
US20150156021A1 (en)*2011-06-202015-06-04Renesas Electronics CorprationCryptographic Communication System and Cryptographic Communication Method
CN105471874A (en)*2015-11-302016-04-06深圳市元征软件开发有限公司Data transmission method and device
CN106453362A (en)*2016-11-022017-02-22中车株洲电力机车研究所有限公司Data transmission method and apparatus of vehicle-mounted device
US20170208045A1 (en)*2014-09-242017-07-20Samsung Electronics Co., Ltd.Method, apparatus and system for secure data communication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101559745A (en)*2009-05-152009-10-21华南理工大学Vehicle control system for preventing stealing and robbery and implementation method thereof
CN102082790A (en)*2010-12-272011-06-01北京握奇数据系统有限公司Method and device for encryption/decryption of digital signature
US20150156021A1 (en)*2011-06-202015-06-04Renesas Electronics CorprationCryptographic Communication System and Cryptographic Communication Method
CN103425933A (en)*2013-07-312013-12-04北京华易互动科技有限公司Data homomorphic encrypting and unloading method of multi-data source
US20170208045A1 (en)*2014-09-242017-07-20Samsung Electronics Co., Ltd.Method, apparatus and system for secure data communication
CN105471874A (en)*2015-11-302016-04-06深圳市元征软件开发有限公司Data transmission method and device
CN106453362A (en)*2016-11-022017-02-22中车株洲电力机车研究所有限公司Data transmission method and apparatus of vehicle-mounted device

Similar Documents

PublicationPublication DateTitle
Wang et al.Secure data sharing and customized services for intelligent transportation based on a consortium blockchain
Avudaiappan et al.Medical image security using dual encryption with oppositional based optimization algorithm
CN113537633B (en)Prediction method, device, equipment, medium and system based on longitudinal federal learning
CN102196431B (en)Internet of things application scene-based protection method of privacy query and private identity verification
CN111292041B (en)Electronic contract generation method, device, equipment and storage medium
CN106407822B (en) A keyword, multi-keyword searchable encryption method and system
Karim et al.TollsOnly please—Homomorphic encryption for toll transponder privacy in Internet of Vehicles
CN113420049B (en)Data circulation method, device, electronic equipment and storage medium
CN111367903A (en)Credit report generation method based on block chain and related system
CN114417258A (en) Carbon emission reduction accounting method and device
CN114401268A (en)Cross-link data sharing method, system, equipment and readable storage medium
CN113821810B (en)Data processing method and system, storage medium and electronic equipment
CN113240145A (en)Network taxi booking platform based on order-preserving encryption and method thereof
BasudanA scalable blockchain framework for secure transactions in iot-based dynamic applications
CN117216786A (en) On-demand sharing method of statistical data on crowdsourcing platform based on blockchain and differential privacy
CN114172655A (en)Secure multi-party computing data system, method, equipment and data processing terminal
CN109714361A (en)Data verification method and device
CN113434845B (en)Business handling method and device, electronic equipment and computer readable storage medium
CN212115339U (en)Movable key supplement device and system based on quantum key
CN119202084A (en) A cross-domain data compliance mutual trust calculation method
CN109728907A (en)Large-scale data circulation method and device
ObimboBB-VDF: Enabling accountability and fine-grained access control for vehicular digital forensics through blockchain
CN106656463A (en)Fixed-secret-key symmetric white box password encryption method, device and equipment
CN105915547A (en)Method for realizing control and leakage prevention of data out of service system
CN117014233A (en)Tamper-resistant contract data acquisition and generation method and tamper-resistant contract data acquisition and generation device

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20190507

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp