CN105786974B - A kind of computer data storage inquiry system - Google Patents
A kind of computer data storage inquiry system Download PDFInfo
- Publication number
- CN105786974B CN105786974B CN201610077121.5A CN201610077121A CN105786974B CN 105786974 B CN105786974 B CN 105786974B CN 201610077121 A CN201610077121 A CN 201610077121A CN 105786974 B CN105786974 B CN 105786974B
- Authority
- CN
- China
- Prior art keywords
- module
- data
- specific
- input
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/285—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Collating Specific Patterns (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of computer datas to store inquiry system, including keyboard input module, handwriting input module, voice input module, picture input module, data import modul, vena metacarpea data input module and the interior human-machine operation module for setting encrypting module, data categorization module, the central processing unit of authentication module and encrypting module is inside set, contrast module is retrieved.The present invention realizes the input and inquiry of various modes data, the use of staff is greatly facilitated, and the transmission of data is all made of automatic encryption mode, the inquiry of data is also required to authentication, the safety of data is substantially increased, avoids the leakage of information well.
Description
Technical field
The present invention relates to data storages to inquire field, and in particular to a kind of computer data storage inquiry system.
Background technique
Currently, existing computer data storage mostly uses greatly exposed mode to be stored, once cause attacking for hacker
It hits, the safety of data is just difficult to be guaranteed, and anyone can according to need and inquires, it is easy to lead to the outer of data
It lets out.
Meanwhile the existing calculating data query for being can only be inquired mostly by keyword, that is, the input of text,
Inconvenient to use, when especially encountering some rarely used words or additional character, inquiry often can not be successfully progress, this undoubtedly gives work
Certain puzzlement is brought as personnel.
Summary of the invention
To solve the above problems, the present invention provides a kind of computer datas to store inquiry system, various modes are realized
The input and inquiry of data greatly facilitate the use of staff, and the transmission of data is all made of automatic encryption mode, number
According to inquiry be also required to authentication, substantially increase the safety of data, avoid the leakage of information well.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of computer data storage inquiry system, including
Human-machine operation module, inside sets encrypting module, for inputting the data for needing to store, and by the data of input by adding
Close module is sent to data categorization module after being encrypted;For inputting certificate data, and send these data to
Authentication module in central processor;Centre is sent to for input data inquiry request, and by the inquiry request of input
Manage device;
Data categorization module, for being separately stored in number after the data received are classified by preset classifying rules
According in database corresponding in library module;
Central processing unit inside sets authentication module and encrypting module, for the authentication result according to authentication module
Carry out the inquiry of data;If authentication mistake is refused to inquire;If authentication is correct, corresponding inquiry request is sent out
It is sent to retrieval contrast module, and according to user right, by addressable data in the retrieval contrast module and database module
Connection is established in library;After being also used to encrypt query result by encrypting module, it is sent to display screen decryption, is checked for user;Also
For adding user, deleting user, password modification, rights management;
Retrieve contrast module, for receive central processing unit transmission inquiry request, and by the inquiry request received by
Rule is established after index and carries out similar degree comparison with the data in database addressable in database module, and by comparison result
After carrying out ascending or descending order sequence according to similarity, it is sent to central processing unit.
Preferably, the human-machine operation module includes keyboard input module, handwriting input module, voice input module, figure
Piece input module, data import modul, vena metacarpea data input module.
Preferably, the voice input module uses microphone, and the picture input module uses camera or scanner,
The data import modul uses USB interface.
Preferably, input is imaged after the vena metacarpea data are scanned by infrared vena metacarpea scanning recognition device.
Preferably, the human-machine operation module is communicated with central processing unit by mutually independent binary channels, any one
When a channel is communicated, another alternate channel carries out key updating.
Preferably, the encrypting module is encrypted by following steps:
S1, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number
Cryptographic calculation is carried out, specific cipher text section is obtained;
S2, the rank value for calculating each individual in gained specific cipher text section, and according to resulting rank value in specific cipher text section
Individual carry out descending arrangement, then on the basis of above-mentioned sequence, according still further to crowding distance value in specific cipher text section
Body carries out ascending order arrangement;
S3, random sampling is carried out to the current specific cipher text section after sequence, obtains random number;
S4, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number
Cryptographic calculation is carried out, specific cipher text section is obtained;
S5, using specific cipher text section as specific key, extract a specific random numbers, generated using specific random numbers operation
Then specific cipher text section, remaining plaintext section and redundant segments are carried out cryptographic calculation, obtain final ciphertext by one redundant segments.
Preferably, after every progress once accesses, that is, a key updating is carried out.
The invention has the following advantages:
The input and inquiry for realizing various modes data greatly facilitate the use of staff, and the biography of data
Defeated to be all made of automatic encryption mode, the inquiry of data is also required to authentication, substantially increases the safety of data, keeps away well
The leakage of information is exempted from.
Detailed description of the invention
Fig. 1 is the system block diagram that a kind of computer data of the embodiment of the present invention stores inquiry system.
Specific embodiment
In order to which objects and advantages of the present invention are more clearly understood, the present invention is carried out with reference to embodiments further
It is described in detail.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to limit this hair
It is bright.
As shown in Figure 1, the embodiment of the invention provides a kind of computer datas to store inquiry system, including
Human-machine operation module, inside sets encrypting module, for inputting the data for needing to store, and by the data of input by adding
Close module is sent to data categorization module after being encrypted;For inputting certificate data, and send these data to
Authentication module in central processor;Centre is sent to for input data inquiry request, and by the inquiry request of input
Manage device;
Data categorization module, for being separately stored in number after the data received are classified by preset classifying rules
According in database corresponding in library module;
Central processing unit inside sets authentication module and encrypting module, for the authentication result according to authentication module
Carry out the inquiry of data;If authentication mistake is refused to inquire;If authentication is correct, corresponding inquiry request is sent out
It is sent to retrieval contrast module, and according to user right, by addressable data in the retrieval contrast module and database module
Connection is established in library;After being also used to encrypt query result by encrypting module, it is sent to display screen decryption, is checked for user;Also
For adding user, deleting user, password modification, rights management;
Retrieve contrast module, for receive central processing unit transmission inquiry request, and by the inquiry request received by
Rule is established after index and carries out similar degree comparison with the data in database addressable in database module, and by comparison result
After carrying out ascending or descending order sequence according to similarity, it is sent to central processing unit.
The human-machine operation module includes keyboard input module, handwriting input module, voice input module, picture input mould
Block, data import modul, vena metacarpea data input module.
The voice input module uses microphone, and the picture input module uses camera or scanner, the number
USB interface is used according to import modul.
Input is imaged after being scanned by infrared vena metacarpea scanning recognition device in the vena metacarpea data.
The human-machine operation module is communicated with central processing unit by mutually independent binary channels, any one channel into
When row communication, another alternate channel carries out key updating.
The encrypting module is encrypted by following steps:
S1, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number
Cryptographic calculation is carried out, specific cipher text section is obtained;
S2, the rank value for calculating each individual in gained specific cipher text section, and according to resulting rank value in specific cipher text section
Individual carry out descending arrangement, then on the basis of above-mentioned sequence, according still further to crowding distance value in specific cipher text section
Body carries out ascending order arrangement;
S3, random sampling is carried out to the current specific cipher text section after sequence, obtains random number;
S4, a specific plaintext section is selected using the extraction operation rule in key, by specific plaintext section and random number
Cryptographic calculation is carried out, specific cipher text section is obtained;
S5, using specific cipher text section as specific key, extract a specific random numbers, generated using specific random numbers operation
Then specific cipher text section, remaining plaintext section and redundant segments are carried out cryptographic calculation, obtain final ciphertext by one redundant segments.
After every progress once accesses, that is, carry out a key updating.
This specific implementation carries out the data input of various modes by human-machine operation module, is then encrypted by encrypting module
It is sent to after data categorization module carries out separation filing and is stored in corresponding database, when needing data query, pass through people
The request of machine operation module input inquiry and infrared vena metacarpea scanning recognition data, inquiry request can be text data, voice number
According to or image data, central processing unit receives the infrared vena metacarpea scanning recognition data of input, and the infrared palm received is quiet
Arteries and veins scanning recognition data and preset identification authentication data carry out the identification that identity is completed after similarity comparison and search access right
It determines, if authentication mistake, refuses to inquire;If authentication is correct, retrieval pair is sent by corresponding inquiry request
Than module, and according to user right, the retrieval contrast module is connect with Database addressable in database module;
Wherein, search access right need to carry out presetting configuration, retrieve contrast module according to the access request received and establish rope by rule
Draw and carry out similar degree comparison with the data in database addressable in database module afterwards, and by comparison result according to similarity
After carrying out ascending or descending order sequence, it is sent to central processing unit;Central processing unit receives retrieval comparing result, and retrieval is compared
As a result it is sent to display screen decryption after encrypting by encrypting module, is checked for user.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (6)
1. a kind of computer data stores inquiry system, which is characterized in that including
Human-machine operation module, inside sets encrypting module, passes through encryption mould for inputting the data for needing to store, and by the data of input
Block is sent to data categorization module after being encrypted;Centre is sent to for inputting certificate data, and by these data
Manage the authentication module in device;Central processing unit is sent to for input data inquiry request, and by the inquiry request of input;
Data categorization module, for being separately stored in database after the data received are classified by preset classifying rules
In module in corresponding database;
Central processing unit inside sets authentication module and encrypting module, for being carried out according to the authentication result of authentication module
The inquiry of data;If authentication mistake is refused to inquire;If authentication is correct, send corresponding inquiry request to
Contrast module is retrieved, and according to user right, the retrieval contrast module and database addressable in database module are built
Vertical connection;After being also used to encrypt query result by encrypting module, it is sent to display screen decryption, is checked for user;It is also used to
It adds user, delete user, password modification, rights management;
Contrast module is retrieved, for receiving the inquiry request of central processing unit transmission, and by the inquiry request received by rule
Establish index after in database addressable in database module data carry out similar degree comparison, and by comparison result according to
After similarity carries out ascending or descending order sequence, it is sent to central processing unit;
The encrypting module is encrypted by following steps:
S1, a specific plaintext section is selected using the extraction operation rule in key, specific plaintext section and random number is carried out
Cryptographic calculation obtains specific cipher text section;
S2, the rank value for calculating each individual in gained specific cipher text section, and according to resulting rank value in specific cipher text section
Body carry out descending arrangement, then on the basis of above-mentioned sequence, according still further to crowding distance value in specific cipher text section individual into
The arrangement of row ascending order;
S3, random sampling is carried out to the current specific cipher text section after sequence, obtains random number;
S4, a specific plaintext section is selected using the extraction operation rule in key, specific plaintext section and random number is carried out
Cryptographic calculation obtains specific cipher text section;
S5, using specific cipher text section as specific key, extract a specific random numbers, use specific random numbers operation generate one
Then specific cipher text section, remaining plaintext section and redundant segments are carried out cryptographic calculation, obtain final ciphertext by redundant segments.
2. a kind of computer data according to claim 1 stores inquiry system, which is characterized in that the human-machine operation mould
Block includes keyboard input module, handwriting input module, voice input module, picture input module, data import modul, vena metacarpea
Data input module.
3. a kind of computer data according to claim 2 stores inquiry system, which is characterized in that the voice inputs mould
Block uses microphone, and the picture input module uses camera or scanner, and the data import modul uses USB interface.
4. a kind of computer data according to claim 2 stores inquiry system, which is characterized in that vena metacarpea data pass through
Input is imaged after being scanned in infrared vena metacarpea scanning recognition device.
5. a kind of computer data according to claim 1 stores inquiry system, which is characterized in that the human-machine operation mould
Block is communicated with central processing unit by mutually independent binary channels, and when any one channel is communicated, another is spare logical
Road carries out key updating.
6. a kind of computer data according to claim 1 stores inquiry system, which is characterized in that every once to be accessed
Afterwards, that is, a key updating is carried out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610077121.5A CN105786974B (en) | 2016-01-30 | 2016-01-30 | A kind of computer data storage inquiry system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610077121.5A CN105786974B (en) | 2016-01-30 | 2016-01-30 | A kind of computer data storage inquiry system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105786974A CN105786974A (en) | 2016-07-20 |
CN105786974B true CN105786974B (en) | 2019-07-16 |
Family
ID=56402510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610077121.5A Active CN105786974B (en) | 2016-01-30 | 2016-01-30 | A kind of computer data storage inquiry system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105786974B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709050A (en) * | 2017-01-05 | 2017-05-24 | 黑河学院 | Environment law case storage inquiring system |
CN106777319A (en) * | 2017-01-05 | 2017-05-31 | 黑河学院 | A kind of Environmental Jurisprudence evidence stores inquiry system |
CN107809555A (en) * | 2017-09-22 | 2018-03-16 | 苏州大成有方数据科技有限公司 | A kind of high security company information includes filing system |
CN110321718A (en) * | 2018-03-29 | 2019-10-11 | 北京连心医疗科技有限公司 | Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium |
CN110232264A (en) * | 2019-06-12 | 2019-09-13 | 郑州西亚斯学院 | A kind of computer big data processing unit |
CN110223047A (en) * | 2019-06-17 | 2019-09-10 | 谢昱 | One kind being used for ancient books printed matter that indicates the type form or partial content of books and periodicals searching and managing platform and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8042155B1 (en) * | 2006-09-29 | 2011-10-18 | Netapp, Inc. | System and method for generating a single use password based on a challenge/response protocol |
CN104660551A (en) * | 2013-11-20 | 2015-05-27 | 上海海典软件有限公司 | Webservice-based database access device and method |
CN104836792A (en) * | 2015-03-28 | 2015-08-12 | 南阳理工学院 | Enterprise management data processing system |
CN104933181A (en) * | 2015-07-01 | 2015-09-23 | 周口师范学院 | Mathematical formula searching method and device |
CN104966026A (en) * | 2015-06-03 | 2015-10-07 | 西安科技大学 | Arithmetical operation system |
-
2016
- 2016-01-30 CN CN201610077121.5A patent/CN105786974B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8042155B1 (en) * | 2006-09-29 | 2011-10-18 | Netapp, Inc. | System and method for generating a single use password based on a challenge/response protocol |
CN104660551A (en) * | 2013-11-20 | 2015-05-27 | 上海海典软件有限公司 | Webservice-based database access device and method |
CN104836792A (en) * | 2015-03-28 | 2015-08-12 | 南阳理工学院 | Enterprise management data processing system |
CN104966026A (en) * | 2015-06-03 | 2015-10-07 | 西安科技大学 | Arithmetical operation system |
CN104933181A (en) * | 2015-07-01 | 2015-09-23 | 周口师范学院 | Mathematical formula searching method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105786974A (en) | 2016-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105786974B (en) | A kind of computer data storage inquiry system | |
CN106412907B (en) | Network access method, related equipment and system | |
CN107332659B (en) | Identity authentication method, storage medium and system based on biological characteristics | |
TWI578749B (en) | Methods and apparatus for migrating keys | |
US9888382B2 (en) | Mobile data communication using biometric encryption | |
US9189612B2 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
Abd Razak et al. | Data anonymization using pseudonym system to preserve data privacy | |
CN105429761B (en) | A kind of key generation method and device | |
US9634833B2 (en) | Gesture-based password entry to unlock an encrypted device | |
CN106022039A (en) | Secure storage system and storage method of electronic information | |
CN105335642B (en) | The processing method and processing system of picture | |
CN105933281B (en) | A kind of quantum homomorphism symmetrically can search for the method and system of encryption | |
US11704420B2 (en) | Terminal device and computer program | |
CN108363689B (en) | Privacy protection multi-keyword Top-k ciphertext retrieval method and system facing hybrid cloud | |
CN106228080B (en) | A kind of computer data enciphering system | |
CN112567441A (en) | Information processing system, information processing method, and information processing apparatus | |
CN106936775A (en) | A kind of authentication method and system based on fingerprint recognition | |
KR101052294B1 (en) | Apparatus and method for contents security | |
Faragallah et al. | Efficient chaotic-Baker-map-based cancelable face recognition | |
CN105208045A (en) | Identity authentication method, equipment and system | |
CN112860933B (en) | Ciphertext image retrieval method, device, terminal equipment and storage medium | |
CN110826038B (en) | Data encryption and decryption method and device | |
Kumar et al. | A graphical password based authentication based system for mobile devices | |
Santos et al. | Medical Systems Data Security and Biometric Authentication in Public Cloud Servers | |
US20220166777A1 (en) | Access control method, system, device, terminal, and computer program product using multimodal authenticity determination |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |