Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present applicationAttached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is onlyThe embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill peopleMember's every other embodiment obtained without making creative work, all should belong to the model of the application protectionIt encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this wayData be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " toolHave " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or unitsProcess, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clearOther step or units listing to Chu or intrinsic for these process, methods, product or equipment.
In this application, term " on ", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outside"," in ", "vertical", "horizontal", " transverse direction ", the orientation or positional relationship of the instructions such as " longitudinal direction " be orientation based on the figure orPositional relationship.These terms are not intended to limit indicated dress primarily to better describe the present invention and embodimentSet, element or component must have particular orientation, or constructed and operated with particular orientation.
Also, above-mentioned part term is other than it can be used to indicate that orientation or positional relationship, it is also possible to for indicating itHis meaning, such as term " on " also are likely used for indicating certain relations of dependence or connection relationship in some cases.For abilityFor the those of ordinary skill of domain, the concrete meaning of these terms in the present invention can be understood as the case may be.
In addition, term " installation ", " setting ", " being equipped with ", " connection ", " connected ", " socket " shall be understood in a broad sense.For example,It may be a fixed connection, be detachably connected or monolithic construction;It can be mechanical connection, or electrical connection;It can be direct phaseIt even, or indirectly connected through an intermediary, or is two connections internal between device, element or component.For those of ordinary skills, the specific meanings of the above terms in the present invention can be understood according to specific conditions.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phaseMutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
According to embodiments of the present invention, a kind of large-scale data circulation method is provided, as shown in Figure 1, this method includes such asUnder step S100 to step S108:
Step S100, the ciphertext from multiple data sources is stored;
Specifically, as shown in Fig. 2, ciphertext of the storage from multiple data sources includes:
Step S200, safety caculation module stores the encrypted running data from the first data source;
Step S202, safety caculation module stores the encrypted violation data from the second data source;
Step S204, safety caculation module stores the encrypted insurance data from third data source.
First data source refers to user mobile phone and onboard system, and the second data source refers to traffic management department, third dataSource refers to insurance company;Traveling number can be collected by user mobile phone and onboard system, traffic management department, insurance companyAccording to, violation data and insurance data, and complete to calculate the safety being sent to after the encryption of above-mentioned data in safety caculation moduleArea;Calculating and data reallocation may be implemented by calculating area safely, provided safeguard for large-scale data circulation.
In some embodiments, it can also be preference, maintenance, used car data etc., the source of the unlimited fixed number evidence of the present invention,Data source can be multiple.
Step S102, it receives through the decryption key after RSA public key encryption;
Specifically, as shown in figure 3, reception includes: by the decryption key after RSA public key encryption
Step S300, pass through decryption key described in the RSA public key encryption in encrypting module;
Step S302, safety caculation module receives the encrypted decryption key.
RSA public key is preset in encrypting module, obtains the ciphertext of key by encrypting the RSA public key decryptions key, is led toNetwork sending is crossed, which is received by safety caculation module.
Step S104, the ciphertext is decrypted;
Specifically, as shown in figure 4, decrypting the ciphertext and including:
Step S400, it decrypts to obtain decryption key by RSA private key combination decipherment algorithm;
Step S402, the ciphertext is decrypted by the decryption key.
After safety caculation module receives the decryption key after the decryption, by be set in advance in decipherment algorithm therein andRSA private key, solution lock out decryption key from encrypted decryption key, and decrypts ciphertext by decryption key and obtain in original textHold.Guarantee the data safety in large-scale data circulation.
Step S106, the original text that decryption obtains is calculated according to default computation rule;
Specifically, as shown in figure 5, including: according to the original text that the calculating decryption of default computation rule obtains
Step S500, the incidence relation of the original text is determined according to preset matching rule;
Step S502, data are calculated by computation model and use report;
Step S504, the data are fed back according to associated relationship and uses report.
The association completed between decryption and data inside safety caculation module calculates.Specifically, in safety caculation moduleThe specified external input of middle storage, such as fingerprint, but the data external in safety caculation module can not directly obtain, and can only holdWhether the specific computation rule of row, such as two fingerprints of storage, match consistent.Computation rule is defined by data user's.The encryption data of multiple data sources, such as the form track of certain vehicle, violating the regulations and insurance data are stored in from three data sourcesInto safety caculation module, second-hand car trader or insurance company can obtain quotation or the guarantor of used car by default computation modelDanger quotation is not related to the output of data detail to realize, can but feed back to user's data and use report.
Step S108, calculated result is exported in one or more data sources.
User mobile phone, onboard system, traffic control system, insurance company management system interface in output calculate knotFruit is not carried out data dealing directly, but is calculated and carried out indirectly based on data safety to realize the application and circulation of dataThe circulation of data equity, final application value dimension complete data to the closed loop applied in the service of data holder itself.
Preferably, as shown in fig. 6, after one or more data source output calculated results further include:
Step S600, original text, ciphertext, decryption key and calculated result are destroyed.
After calculated result generation, original text that safety caculation module auto-destruct stores in the database, ciphertext, decryptionKey and calculated result;Guarantee that data will not be revealed, or is illegally accessed.
It can be seen from the above description that the present invention realizes following technical effect:
In the embodiment of the present application, by the way of large-scale data circulation, by safety caculation module storage from moreThe ciphertext of a data source;It receives through the decryption key after RSA public key encryption;Decrypt the ciphertext;According to default computation ruleCalculate the original text that decryption obtains;And calculated result is exported in one or more data sources;Realize large-scale dataCirculate and prevent the side of procurement data from carrying out two time selling;Reach the point-to-point data circulation of substitution and has two time selling hiddenThe purpose of trouble to realize the technical effect for greatly promoting data circulation efficiency, and then solves point-to-point due to being only capable ofTransaction circulation, and there is also the technologies of the data circulation low efficiency that may cause of two time selling to ask by a side of procurement dataTopic.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructionsIt is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with notThe sequence being same as herein executes shown or described step.
According to embodiments of the present invention, additionally provide it is a kind of for implementing the device of above-mentioned large-scale data circulation method, such asShown in Fig. 7, which includes:
Storage unit 10, for storing the ciphertext from multiple data sources;
The storage unit 10 includes:
Safety caculation module stores the encrypted running data from the first data source;
Safety caculation module stores the encrypted violation data from the second data source;
Safety caculation module stores the encrypted insurance data from third data source.
First data source refers to user mobile phone and onboard system, and the second data source refers to traffic management department, third dataSource refers to insurance company;Traveling number can be collected by user mobile phone and onboard system, insurance company, traffic management departmentAccording to, violation data and insurance data, and complete to being sent to safety caculation module after the encryption of above-mentioned data;By calculating safelyModule may be implemented to calculate and data are reallocated, and provides safeguard for large-scale data circulation.
In some embodiments, it can also be preference, maintenance, used car data etc., the source of the unlimited fixed number evidence of the present invention,Data source can be multiple.
Receiving unit 20, for receiving the decryption key after passing through RSA public key encryption;
The receiving unit 20 includes:
Pass through decryption key described in the RSA public key encryption in encrypting module;
Safety caculation module receives the encrypted decryption key.
RSA public key is preset in encrypting module, the ciphertext of key is obtained by the RSA public key encryption decryption key, is led toNetwork sending is crossed, which is received by safety caculation module.
Decryption unit 30, for decrypting the ciphertext;
The decryption unit 30 includes:
It decrypts to obtain decryption key by RSA private key combination decipherment algorithm;
The ciphertext is decrypted by the decryption key.
After safety caculation module receives the decryption key after the decryption, by be set in advance in decipherment algorithm therein andRSA private key, solution lock out decryption key from encrypted decryption key, and decrypts ciphertext by decryption key and obtain in original textHold.Guarantee the data safety in large-scale data circulation.
Computing unit 40, for calculating the original text that decryption obtains according to default computation rule;
Specifically, the computing unit 40 includes:
The incidence relation of the original text is determined according to preset matching rule;
Data are calculated by computation model and use report;
The data, which are fed back, according to associated relationship uses report.
The association completed between decryption and data inside safety caculation module calculates.Specifically, in safety caculation moduleThe specified external input of middle storage, such as fingerprint, but the data external in safety caculation module can not directly obtain, and can only holdWhether the specific computation rule of row, such as two fingerprints of storage, match consistent.Computation rule is defined by data user's.The encryption data of multiple data sources, such as the form track of certain vehicle, violating the regulations and insurance data are stored in from three data sourcesInto safety caculation module, second-hand car trader or insurance company can obtain quotation or the guarantor of used car by default computation modelDanger quotation is not related to the output of data detail to realize, can but feed back to user's data and use report.
Output unit 50, for exporting calculated result in one or more data sources.
User mobile phone, onboard system, traffic control system, insurance company management system interface in output calculate knotFruit is not carried out data dealing directly, but is calculated and carried out indirectly based on data safety to realize the application and circulation of dataThe circulation of data equity, final application value dimension complete data to the closed loop applied in the service of data holder itself.
Preferably, after one or more data source output calculated results further include:
Destroy original text, ciphertext, decryption key and calculated result.
After calculated result generation, original text that safety caculation module auto-destruct stores in the database, ciphertext, decryptionKey and calculated result;Guarantee that data will not be revealed, or is illegally accessed.
It can be seen from the above description that the present invention realizes following technical effect:
In the embodiment of the present application, by the way of large-scale data circulation, by safety caculation module storage from moreThe ciphertext of a data source;It receives through the decryption key after RSA public key encryption;Decrypt the ciphertext;According to default computation ruleCalculate the original text that decryption obtains;And calculated result is exported in one or more data sources;Realize large-scale dataCirculate and prevent the side of procurement data from carrying out two time selling;Reach the point-to-point data circulation of substitution and has two time selling hiddenThe purpose of trouble to realize the technical effect for greatly promoting data circulation efficiency, and then solves point-to-point due to being only capable ofTransaction circulation, and there is also the technologies of the data circulation low efficiency that may cause of two time selling to ask by a side of procurement dataTopic.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with generalComputing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formedNetwork on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are storedBe performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by theyIn multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specificHardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this fieldFor art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repairChange, equivalent replacement, improvement etc., should be included within the scope of protection of this application.