CN105786974B - A kind of computer data storage inquiry system - Google Patents

A kind of computer data storage inquiry system Download PDF

Info

Publication number
CN105786974B
CN105786974B CN201610077121.5A CN201610077121A CN105786974B CN 105786974 B CN105786974 B CN 105786974B CN 201610077121 A CN201610077121 A CN 201610077121A CN 105786974 B CN105786974 B CN 105786974B
Authority
CN
China
Prior art keywords
module
data
specific
input
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610077121.5A
Other languages
Chinese (zh)
Other versions
CN105786974A (en
Inventor
孙蕊
李伟民
毛颖颖
刘江坡
吴艳艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SIAS INTERNATIONAL UNIVERSITY
Original Assignee
SIAS INTERNATIONAL UNIVERSITY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SIAS INTERNATIONAL UNIVERSITY filed Critical SIAS INTERNATIONAL UNIVERSITY
Priority to CN201610077121.5A priority Critical patent/CN105786974B/en
Publication of CN105786974A publication Critical patent/CN105786974A/en
Application granted granted Critical
Publication of CN105786974B publication Critical patent/CN105786974B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of computer datas to store inquiry system, including keyboard input module, handwriting input module, voice input module, picture input module, data import modul, vena metacarpea data input module and the interior human-machine operation module for setting encrypting module, data categorization module, the central processing unit of authentication module and encrypting module is inside set, contrast module is retrieved.The present invention realizes the input and inquiry of various modes data, the use of staff is greatly facilitated, and the transmission of data is all made of automatic encryption mode, the inquiry of data is also required to authentication, the safety of data is substantially increased, avoids the leakage of information well.

Description

A kind of computer data storage inquiry system
Technical field
The present invention relates to data storages to inquire field, and in particular to a kind of computer data storage inquiry system.
Background technique
Currently, existing computer data storage mostly uses greatly exposed mode to be stored, once cause attacking for hacker It hits, the safety of data is just difficult to be guaranteed, and anyone can according to need and inquires, it is easy to lead to the outer of data It lets out.
Meanwhile the existing calculating data query for being can only be inquired mostly by keyword, that is, the input of text, Inconvenient to use, when especially encountering some rarely used words or additional character, inquiry often can not be successfully progress, this undoubtedly gives work Certain puzzlement is brought as personnel.
Summary of the invention
To solve the above problems, the present invention provides a kind of computer datas to store inquiry system, various modes are realized The input and inquiry of data greatly facilitate the use of staff, and the transmission of data is all made of automatic encryption mode, number According to inquiry be also required to authentication, substantially increase the safety of data, avoid the leakage of information well.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of computer data storage inquiry system, including
Human-machine operation module, inside sets encrypting module, for inputting the data for needing to store, and by the data of input by adding Close module is sent to data categorization module after being encrypted;For inputting certificate data, and send these data to Authentication module in central processor;Centre is sent to for input data inquiry request, and by the inquiry request of input Manage device;
Data categorization module, for being separately stored in number after the data received are classified by preset classifying rules According in database corresponding in library module;
Central processing unit inside sets authentication module and encrypting module, for the authentication result according to authentication module Carry out the inquiry of data;If authentication mistake is refused to inquire;If authentication is correct, corresponding inquiry request is sent out It is sent to retrieval contrast module, and according to user right, by addressable data in the retrieval contrast module and database module Connection is established in library;After being also used to encrypt query result by encrypting module, it is sent to display screen decryption, is checked for user;Also For adding user, deleting user, password modification, rights management;
Retrieve contrast module, for receive central processing unit transmission inquiry request, and by the inquiry request received by Rule is established after index and carries out similar degree comparison with the data in database addressable in database module, and by comparison result After carrying out ascending or descending order sequence according to similarity, it is sent to central processing unit.
Preferably, the human-machine operation module includes keyboard input module, handwriting input module, voice input module, figure Piece input module, data import modul, vena metacarpea data input module.
Preferably, the voice input module uses microphone, and the picture input module uses camera or scanner, The data import modul uses USB interface.
Preferably, input is imaged after the vena metacarpea data are scanned by infrared vena metacarpea scanning recognition device.
Preferably, the human-machine operation module is communicated with central processing unit by mutually independent binary channels, any one When a channel is communicated, another alternate channel carries out key updating.
Preferably, the encrypting module is encrypted by following steps:
S1, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number Cryptographic calculation is carried out, specific cipher text section is obtained;
S2, the rank value for calculating each individual in gained specific cipher text section, and according to resulting rank value in specific cipher text section Individual carry out descending arrangement, then on the basis of above-mentioned sequence, according still further to crowding distance value in specific cipher text section Body carries out ascending order arrangement;
S3, random sampling is carried out to the current specific cipher text section after sequence, obtains random number;
S4, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number Cryptographic calculation is carried out, specific cipher text section is obtained;
S5, using specific cipher text section as specific key, extract a specific random numbers, generated using specific random numbers operation Then specific cipher text section, remaining plaintext section and redundant segments are carried out cryptographic calculation, obtain final ciphertext by one redundant segments.
Preferably, after every progress once accesses, that is, a key updating is carried out.
The invention has the following advantages:
The input and inquiry for realizing various modes data greatly facilitate the use of staff, and the biography of data Defeated to be all made of automatic encryption mode, the inquiry of data is also required to authentication, substantially increases the safety of data, keeps away well The leakage of information is exempted from.
Detailed description of the invention
Fig. 1 is the system block diagram that a kind of computer data of the embodiment of the present invention stores inquiry system.
Specific embodiment
In order to which objects and advantages of the present invention are more clearly understood, the present invention is carried out with reference to embodiments further It is described in detail.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to limit this hair It is bright.
As shown in Figure 1, the embodiment of the invention provides a kind of computer datas to store inquiry system, including
Human-machine operation module, inside sets encrypting module, for inputting the data for needing to store, and by the data of input by adding Close module is sent to data categorization module after being encrypted;For inputting certificate data, and send these data to Authentication module in central processor;Centre is sent to for input data inquiry request, and by the inquiry request of input Manage device;
Data categorization module, for being separately stored in number after the data received are classified by preset classifying rules According in database corresponding in library module;
Central processing unit inside sets authentication module and encrypting module, for the authentication result according to authentication module Carry out the inquiry of data;If authentication mistake is refused to inquire;If authentication is correct, corresponding inquiry request is sent out It is sent to retrieval contrast module, and according to user right, by addressable data in the retrieval contrast module and database module Connection is established in library;After being also used to encrypt query result by encrypting module, it is sent to display screen decryption, is checked for user;Also For adding user, deleting user, password modification, rights management;
Retrieve contrast module, for receive central processing unit transmission inquiry request, and by the inquiry request received by Rule is established after index and carries out similar degree comparison with the data in database addressable in database module, and by comparison result After carrying out ascending or descending order sequence according to similarity, it is sent to central processing unit.
The human-machine operation module includes keyboard input module, handwriting input module, voice input module, picture input mould Block, data import modul, vena metacarpea data input module.
The voice input module uses microphone, and the picture input module uses camera or scanner, the number USB interface is used according to import modul.
Input is imaged after being scanned by infrared vena metacarpea scanning recognition device in the vena metacarpea data.
The human-machine operation module is communicated with central processing unit by mutually independent binary channels, any one channel into When row communication, another alternate channel carries out key updating.
The encrypting module is encrypted by following steps:
S1, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number Cryptographic calculation is carried out, specific cipher text section is obtained;
S2, the rank value for calculating each individual in gained specific cipher text section, and according to resulting rank value in specific cipher text section Individual carry out descending arrangement, then on the basis of above-mentioned sequence, according still further to crowding distance value in specific cipher text section Body carries out ascending order arrangement;
S3, random sampling is carried out to the current specific cipher text section after sequence, obtains random number;
S4, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number Cryptographic calculation is carried out, specific cipher text section is obtained;
S5, using specific cipher text section as specific key, extract a specific random numbers, generated using specific random numbers operation Then specific cipher text section, remaining plaintext section and redundant segments are carried out cryptographic calculation, obtain final ciphertext by one redundant segments.
After every progress once accesses, that is, carry out a key updating.
This specific implementation carries out the data input of various modes by human-machine operation module, is then encrypted by encrypting module It is sent to after data categorization module carries out separation filing and is stored in corresponding database, when needing data query, pass through people The request of machine operation module input inquiry and infrared vena metacarpea scanning recognition data, inquiry request can be text data, voice number According to or image data, central processing unit receives the infrared vena metacarpea scanning recognition data of input, and the infrared palm received is quiet Arteries and veins scanning recognition data and preset identification authentication data carry out the identification that identity is completed after similarity comparison and search access right It determines, if authentication mistake, refuses to inquire;If authentication is correct, retrieval pair is sent by corresponding inquiry request Than module, and according to user right, the retrieval contrast module is connect with Database addressable in database module; Wherein, search access right need to carry out presetting configuration, retrieve contrast module according to the access request received and establish rope by rule Draw and carry out similar degree comparison with the data in database addressable in database module afterwards, and by comparison result according to similarity After carrying out ascending or descending order sequence, it is sent to central processing unit;Central processing unit receives retrieval comparing result, and retrieval is compared As a result it is sent to display screen decryption after encrypting by encrypting module, is checked for user.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (6)

1. a kind of computer data stores inquiry system, which is characterized in that including
Human-machine operation module, inside sets encrypting module, passes through encryption mould for inputting the data for needing to store, and by the data of input Block is sent to data categorization module after being encrypted;Centre is sent to for inputting certificate data, and by these data Manage the authentication module in device;Central processing unit is sent to for input data inquiry request, and by the inquiry request of input;
Data categorization module, for being separately stored in database after the data received are classified by preset classifying rules In module in corresponding database;
Central processing unit inside sets authentication module and encrypting module, for being carried out according to the authentication result of authentication module The inquiry of data;If authentication mistake is refused to inquire;If authentication is correct, send corresponding inquiry request to Contrast module is retrieved, and according to user right, the retrieval contrast module and database addressable in database module are built Vertical connection;After being also used to encrypt query result by encrypting module, it is sent to display screen decryption, is checked for user;It is also used to It adds user, delete user, password modification, rights management;
Contrast module is retrieved, for receiving the inquiry request of central processing unit transmission, and by the inquiry request received by rule Establish index after in database addressable in database module data carry out similar degree comparison, and by comparison result according to After similarity carries out ascending or descending order sequence, it is sent to central processing unit;
The encrypting module is encrypted by following steps:
S1, a specific plaintext section is selected using the extraction operation rule in key, specific plaintext section and random number is carried out Cryptographic calculation obtains specific cipher text section;
S2, the rank value for calculating each individual in gained specific cipher text section, and according to resulting rank value in specific cipher text section Body carry out descending arrangement, then on the basis of above-mentioned sequence, according still further to crowding distance value in specific cipher text section individual into The arrangement of row ascending order;
S3, random sampling is carried out to the current specific cipher text section after sequence, obtains random number;
S4, a specific plaintext section is selected using the extraction operation rule in key, specific plaintext section and random number is carried out Cryptographic calculation obtains specific cipher text section;
S5, using specific cipher text section as specific key, extract a specific random numbers, use specific random numbers operation generate one Then specific cipher text section, remaining plaintext section and redundant segments are carried out cryptographic calculation, obtain final ciphertext by redundant segments.
2. a kind of computer data according to claim 1 stores inquiry system, which is characterized in that the human-machine operation mould Block includes keyboard input module, handwriting input module, voice input module, picture input module, data import modul, vena metacarpea Data input module.
3. a kind of computer data according to claim 2 stores inquiry system, which is characterized in that the voice inputs mould Block uses microphone, and the picture input module uses camera or scanner, and the data import modul uses USB interface.
4. a kind of computer data according to claim 2 stores inquiry system, which is characterized in that vena metacarpea data pass through Input is imaged after being scanned in infrared vena metacarpea scanning recognition device.
5. a kind of computer data according to claim 1 stores inquiry system, which is characterized in that the human-machine operation mould Block is communicated with central processing unit by mutually independent binary channels, and when any one channel is communicated, another is spare logical Road carries out key updating.
6. a kind of computer data according to claim 1 stores inquiry system, which is characterized in that every once to be accessed Afterwards, that is, a key updating is carried out.
CN201610077121.5A 2016-01-30 2016-01-30 A kind of computer data storage inquiry system Active CN105786974B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610077121.5A CN105786974B (en) 2016-01-30 2016-01-30 A kind of computer data storage inquiry system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610077121.5A CN105786974B (en) 2016-01-30 2016-01-30 A kind of computer data storage inquiry system

Publications (2)

Publication Number Publication Date
CN105786974A CN105786974A (en) 2016-07-20
CN105786974B true CN105786974B (en) 2019-07-16

Family

ID=56402510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610077121.5A Active CN105786974B (en) 2016-01-30 2016-01-30 A kind of computer data storage inquiry system

Country Status (1)

Country Link
CN (1) CN105786974B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709050A (en) * 2017-01-05 2017-05-24 黑河学院 Environment law case storage inquiring system
CN106777319A (en) * 2017-01-05 2017-05-31 黑河学院 A kind of Environmental Jurisprudence evidence stores inquiry system
CN107809555A (en) * 2017-09-22 2018-03-16 苏州大成有方数据科技有限公司 A kind of high security company information includes filing system
CN110321718A (en) * 2018-03-29 2019-10-11 北京连心医疗科技有限公司 Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium
CN110232264A (en) * 2019-06-12 2019-09-13 郑州西亚斯学院 A kind of computer big data processing unit
CN110223047A (en) * 2019-06-17 2019-09-10 谢昱 One kind being used for ancient books printed matter that indicates the type form or partial content of books and periodicals searching and managing platform and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8042155B1 (en) * 2006-09-29 2011-10-18 Netapp, Inc. System and method for generating a single use password based on a challenge/response protocol
CN104660551A (en) * 2013-11-20 2015-05-27 上海海典软件有限公司 Webservice-based database access device and method
CN104836792A (en) * 2015-03-28 2015-08-12 南阳理工学院 Enterprise management data processing system
CN104933181A (en) * 2015-07-01 2015-09-23 周口师范学院 Mathematical formula searching method and device
CN104966026A (en) * 2015-06-03 2015-10-07 西安科技大学 Arithmetical operation system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8042155B1 (en) * 2006-09-29 2011-10-18 Netapp, Inc. System and method for generating a single use password based on a challenge/response protocol
CN104660551A (en) * 2013-11-20 2015-05-27 上海海典软件有限公司 Webservice-based database access device and method
CN104836792A (en) * 2015-03-28 2015-08-12 南阳理工学院 Enterprise management data processing system
CN104966026A (en) * 2015-06-03 2015-10-07 西安科技大学 Arithmetical operation system
CN104933181A (en) * 2015-07-01 2015-09-23 周口师范学院 Mathematical formula searching method and device

Also Published As

Publication number Publication date
CN105786974A (en) 2016-07-20

Similar Documents

Publication Publication Date Title
CN105786974B (en) A kind of computer data storage inquiry system
CN106412907B (en) Network access method, related equipment and system
CN107332659B (en) Identity authentication method, storage medium and system based on biological characteristics
TWI578749B (en) Methods and apparatus for migrating keys
US9888382B2 (en) Mobile data communication using biometric encryption
US9189612B2 (en) Biometric verification with improved privacy and network performance in client-server networks
Abd Razak et al. Data anonymization using pseudonym system to preserve data privacy
CN105429761B (en) A kind of key generation method and device
US9634833B2 (en) Gesture-based password entry to unlock an encrypted device
CN106022039A (en) Secure storage system and storage method of electronic information
CN105335642B (en) The processing method and processing system of picture
CN105933281B (en) A kind of quantum homomorphism symmetrically can search for the method and system of encryption
US11704420B2 (en) Terminal device and computer program
CN108363689B (en) Privacy protection multi-keyword Top-k ciphertext retrieval method and system facing hybrid cloud
CN106228080B (en) A kind of computer data enciphering system
CN112567441A (en) Information processing system, information processing method, and information processing apparatus
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
KR101052294B1 (en) Apparatus and method for contents security
Faragallah et al. Efficient chaotic-Baker-map-based cancelable face recognition
CN105208045A (en) Identity authentication method, equipment and system
CN112860933B (en) Ciphertext image retrieval method, device, terminal equipment and storage medium
CN110826038B (en) Data encryption and decryption method and device
Kumar et al. A graphical password based authentication based system for mobile devices
Santos et al. Medical Systems Data Security and Biometric Authentication in Public Cloud Servers
US20220166777A1 (en) Access control method, system, device, terminal, and computer program product using multimodal authenticity determination

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant