CN106203166A - A kind of auto navigation information data sharing method - Google Patents
A kind of auto navigation information data sharing method Download PDFInfo
- Publication number
- CN106203166A CN106203166A CN201610538251.4A CN201610538251A CN106203166A CN 106203166 A CN106203166 A CN 106203166A CN 201610538251 A CN201610538251 A CN 201610538251A CN 106203166 A CN106203166 A CN 106203166A
- Authority
- CN
- China
- Prior art keywords
- information data
- navigation information
- auto navigation
- user
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Navigation (AREA)
Abstract
The invention provides a kind of auto navigation information data sharing method, store safely including auto navigation information data and have secure access to auto navigation information data;Described auto navigation information data stores safely and comprises the following steps: (1) carries out safety verification to storage user identity;(2) auto navigation information data is carried out pretreatment;(3) encode;(4) hardware store Resource Abstract is concentrated, be mapped to a complete unified resource pool, and operating system of user is virtualized;(5) auto navigation information data is stored in resource pool with the form of final code;The secure access of described auto navigation information data comprises the following steps: (1) carries out safety verification to accessing user identity;(2) the auto navigation information data being stored on resource pool is read.The present invention can realize accessible sharing, and decreases EMS memory occupation, improves data call speed, and improves the safety that auto navigation information data is shared on the premise of ensureing convenience.
Description
Technical field
The present invention relates to auto navigation information data technical field, in particular to a kind of auto navigation information data
Sharing method.
Background technology
Auto navigation information data sharing method in correlation technique can not realize safely and efficiently depositing of information of sharing
Storage and the issue of shared information so that promptness and safety that auto navigation information data is shared are poor.
Summary of the invention
It is an object of the invention to provide a kind of auto navigation information data sharing method, to solve above-mentioned problem.
The purpose of the present invention realizes by the following technical solutions:
A kind of auto navigation information data sharing method, is characterized in that, including preliminary treatment, auto navigation information data peace
Full storage and auto navigation information data have secure access to;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request
The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of
Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified
Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge
With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition
Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types
Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised
M attribute is S1,S2,…,Sm;
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of
Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition
RnDegree, span is [0,1];
2) defined attribute weight wi:
Attribute weight is normalized and obtains normalization attribute weight w 'i:
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
4) set up attribute and choose Optimized model:
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped
Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity
Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two
Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into
Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value
Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Preferably, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if
Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes
Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext
The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so
After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user
Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously
Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge
Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system
Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side
After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user
Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity
It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end
Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption
The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base
Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal
Report.
Preferably, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated
The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption,
And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two
Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request
Pond, if incorrect, provides terminal to return error reporting to local service.
The present invention can include following beneficial effect:
1, auto navigation information data is encoded, facilitate Back ground Information and realize with all kinds of business information accessible common
Enjoy;
2, according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, subtracts
Lack EMS memory occupation, improve data call speed;
3, to storage user carry out safety verification time, User Identity and finger print information the most encrypted after transmit,
Not havinging plaintext version, knowledge store certification end is just true after verifying the User Identity after encryption and finger print information
Whether fixed be that storage user's configuration asks corresponding virtual resource pond with storage, limits the illegal storage of disabled user, and tests
Card speed is fast, further increases the safety that auto navigation information data is shared on the premise of ensureing convenience;
4, to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all with close
Literary composition form is transmitted, and does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key,
Via the user profile ciphertext of passage transmission, there is unipolarity, even data are intercepted and captured, be intended to it is cracked the most highly difficult,
When taking precautions against transmission with this, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases auto navigation Information Number
According to shared safety.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, can not be limited this
Open.
Accompanying drawing explanation
Fig. 1 is the method flow diagram that the auto navigation information data of the present invention stores safely;
Fig. 2 is the method flow diagram of the auto navigation information data secure access of the present invention
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the present invention
Example, and for explaining the principle of the present invention together with description.
Detailed description of the invention
Below by specific embodiment and combine accompanying drawing the present invention is described in further detail.
Embodiment 1
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating
Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request
The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of
Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified
Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge
With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition
Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types
Encode;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped
Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity
Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two
Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into
Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch;
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Auto navigation information data is encoded by the present embodiment, facilitates Back ground Information and realizes nothing with all kinds of business information
Obstacle is shared;According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, subtracts
Lack EMS memory occupation, improve data call speed.
Embodiment 2
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating
Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request
The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of
Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified
Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge
With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition
Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types
Encode;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped
Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity
Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two
Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into
Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch;
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, the custom coding method of the present embodiment is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised
M attribute is S1,S2,…,Sm;
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of
Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition
RnDegree, span is [0,1];
2) defined attribute weight wi:
Attribute weight is normalized and obtains normalization attribute weight w 'i:
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
4) set up attribute and choose Optimized model:
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Auto navigation information data is encoded by the present embodiment, facilitates Back ground Information and realizes nothing with all kinds of business information
Obstacle is shared;According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, subtracts
Having lacked EMS memory occupation, improve data call speed, the present embodiment sets threshold value T2Value be m/2, data call speed carries
High by 0.5%.
Embodiment 3
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating
Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request
The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of
Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified
Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge
With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition
Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types
Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised
M attribute is S1,S2,…,Sm;
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of
Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition
RnDegree, span is [0,1];
2) defined attribute weight wi:
Attribute weight is normalized and obtains normalization attribute weight w 'i:
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
4) set up attribute and choose Optimized model:
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped
Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity
Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two
Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into
Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value
Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if
Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes
Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext
The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so
After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user
Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously
Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge
Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system
Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side
After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user
Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity
It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end
Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption
The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base
Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal
Report.
The present embodiment to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number
All transmit with ciphertext form, do not have plaintext version;Meanwhile, according to symmetry and the one-way hash function of user key
Feature, has unipolarity via the user profile ciphertext of passage transmission, even data are intercepted and captured, is intended to crack it the most very
Difficulty, when taking precautions against transmission with this, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases auto navigation letter
The safety of breath data sharing;Auto navigation information data is encoded, facilitates Back ground Information real with all kinds of business information
Existing accessible shared;According to cluster result and auto navigation information data positional information, auto navigation information data is adjusted
Degree, decreases EMS memory occupation, improves data call speed, and the present embodiment sets threshold value T2Value be 9m/16, data call
Speed improves 0.7%.
Embodiment 4
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating
Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request
The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of
Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified
Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge
With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition
Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types
Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised
M attribute is S1,S2,…,Sm;
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2..., Rn, according to attribute and constraints thereof, obtain attribute weight because of
Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition
RnDegree, span is [0,1];
2) defined attribute weight wi:
Attribute weight is normalized and obtains normalization attribute weight w 'i:
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
4) set up attribute and choose Optimized model:
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped
Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity
Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two
Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into
Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value
Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if
Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes
Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext
The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so
After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user
Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously
Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge
Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system
Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side
After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user
Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity
It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end
Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption
The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base
Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal
Report.
Wherein, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated
The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption,
And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two
Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request
Pond, if incorrect, provides terminal to return error reporting to local service.
The present embodiment to storage user carry out safety verification time, User Identity and finger print information the most encrypted after carry out
Transmission, does not haves plaintext version, and the User Identity after encryption and finger print information are verified by knowledge store certification end
Rear just determine whether to ask corresponding virtual resource pond for storage user's configuration with storage, limit illegally depositing of disabled user
Storage, and verifying speed is fast, further increases the safety that auto navigation information data is shared on the premise of ensureing convenience,
And to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all entered with ciphertext form
Row transmission, does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, via passage
The user profile ciphertext of transmission has unipolarity, even data are intercepted and captured, is intended to crack it the most highly difficult, takes precautions against with this
During transmission, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases what auto navigation information data was shared
Safety;Auto navigation information data is encoded, facilitates Back ground Information and realize accessible sharing with all kinds of business information;
According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, decreases internal memory and account for
With, improve data call speed, the present embodiment sets threshold value T2Value be 5m/8, data call speed improves 0.9%.
Embodiment 5
See Fig. 1, Fig. 2, the present embodiment one auto navigation information data sharing method, it is characterized in that, including tentatively locating
Reason, auto navigation information data store safely and the secure access of auto navigation information data;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include layering according to described more newly downloaded request
The map datum of piecemeal storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
Preferably, it is characterized in that, the detailed process that described auto navigation information data carries out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
Preferably, it is characterized in that, described download terminal is the computer having information processing capability, described computer pass through because of
Special net is connected with auto navigation server.
Preferably, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is pacified
Full checking;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge
With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition
Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is used custom coding method respectively by Step 103 according to classified types
Encoding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if what auto navigation information data Z comprised
M attribute is S1,S2,…,Sm;
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of
Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition
RnDegree, span is [0,1];
2) defined attribute weight wi:
Attribute weight is normalized and obtains normalization attribute weight w 'i:
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
4) set up attribute and choose Optimized model:
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped
Make system virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, pacify accessing user identity
Full checking;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two
Auto navigation information data Z in individual class1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into
Ask auto navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Value
Scope is [m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if
Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes
Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext
The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so
After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user
Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously
Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge
Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system
Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side
After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user
Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity
It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end
Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption
The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base
Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal
Report.
Wherein, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated
The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption,
And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two
Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request
Pond, if incorrect, provides terminal to return error reporting to local service.
The present embodiment to storage user carry out safety verification time, User Identity and finger print information the most encrypted after carry out
Transmission, does not haves plaintext version, and the User Identity after encryption and finger print information are verified by knowledge store certification end
Rear just determine whether to ask corresponding virtual resource pond for storage user's configuration with storage, limit illegally depositing of disabled user
Storage, and verifying speed is fast, further increases the safety that auto navigation information data is shared on the premise of ensureing convenience,
And to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all entered with ciphertext form
Row transmission, does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, via passage
The user profile ciphertext of transmission has unipolarity, even data are intercepted and captured, is intended to crack it the most highly difficult, takes precautions against with this
During transmission, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases what auto navigation information data was shared
Safety;Auto navigation information data is encoded, facilitates Back ground Information and realize accessible sharing with all kinds of business information;
According to cluster result and auto navigation information data positional information, auto navigation information data is scheduling, decreases internal memory and account for
With, improve data call speed, the present embodiment sets threshold value T2Value be 11m/16, data call speed improves
1.2%.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made any repaiies
Change, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (6)
1. an auto navigation information data sharing method, is characterized in that, including preliminary treatment, auto navigation information data safety
Storage and auto navigation information data have secure access to;
Described preliminary treatment comprises the following steps:
Auto navigation server receives the more newly downloaded request that download terminal sends;
Determine that auto navigation information data, described auto navigation information data include hierarchical block according to described more newly downloaded request
The map datum of storage;
Download described auto navigation information data from auto navigation data base and send;
Download terminal receives described auto navigation information data and processes described auto navigation information data;
Described download terminal sends auto navigation information data to car navigation terminal;
This car navigation terminal utilizes described auto navigation information data to update existing auto navigation information data.
A kind of auto navigation information data sharing method the most according to claim 1, is characterized in that, described auto navigation is believed
The detailed process that breath data carry out processing is:
The map datum downloaded is compiled, i.e. arranges according to level and block number.
A kind of auto navigation information data sharing method the most according to claim 2, is characterized in that, described download terminal is
Having the computer of information processing capability, described computer is connected with auto navigation server by the Internet.
A kind of auto navigation information data sharing method the most according to claim 3, it is characterised in that
Described auto navigation information data stores safely and comprises the following steps:
When Step 101 stores the storage request that user submits auto navigation information data to, storage user identity is carried out safety and tests
Card;
Step 102 carries out pretreatment to auto navigation information data, and auto navigation information data is divided into rudimentary knowledge and industry
Business knowledge two types data, described rudimentary knowledge includes text and the image that can reflect information O&M service basic condition,
Described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated auto navigation information data is carried out by custom coding method respectively by Step 103 according to classified types
Coding, described custom coding method is as follows:
(1) using pretreated auto navigation information data as coded object, if m that auto navigation information data Z comprises
Attribute is S1,S2,…,Sm;
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight factor square
Battle array W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition Rn's
Degree, span is [0,1];
2) defined attribute weight wi:
Attribute weight is normalized and obtains normalization attribute weight w 'i:
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
4) set up attribute and choose Optimized model:
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of auto navigation information data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and by user operation system
System virtualization;
Auto navigation information data is stored in resource pool by Step 105 with the form of final code;
The secure access of described auto navigation information data comprises the following steps:
When Step 201 accesses the access request that user submits auto navigation information data to, carry out testing safely to accessing user identity
Card;
When Step 202 responds access request, read the auto navigation information data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in auto navigation information data to be divided, to any two class
Interior auto navigation information data Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter inquire about automobile
Navigation information data Z1Or Z2, all to auto navigation information data Z1And Z2Prefetch, wherein threshold value T2Span be
[m/2,3m/4];
(2) concrete auto navigation information data positional information is obtained according to cluster index;
(3) according to cluster result and auto navigation information data positional information, auto navigation information data is scheduling.
A kind of auto navigation information data sharing method the most according to claim 4, it is characterised in that described to accessing use
Family identity carries out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if correctly,
Access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge services device recognizes
Card end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password code of user's input ciphertext
It is decrypted calculating with the ciphertext of identity, extracts password code and the value of identity accessing user's input, then exist
Find identity relative recording that password is decrypted calculating in authentication database, if system exists this accesses user's note
Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will refer to simultaneously
Stricture of vagina acquisition instructions, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, and knowledge takes
Business device certification end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification end in system
Terminal is provided to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption session are received when resource request user side
After random number, verify that this session key and an encryption session random number are the most correct, if correctly, send finger to accessing user
The input instruction of stricture of vagina information, is decrypted calculating, simultaneously by identity with defeated to this session key and encryption session random number
The finger print information entered is sent to knowledge services device certification end after being encrypted;If incorrect, send to knowledge services device certification end
Illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, to the body after encryption
Part mark is decrypted calculating with the finger print information of input, and the fingerprint that would correspond to identity extracts in data base
Compare with the finger print information of input, if the two is identical, then respond access request, if the two differs, return illegal report.
A kind of auto navigation information data sharing method the most according to claim 5, it is characterised in that described to storage use
Family identity carries out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user's input will be stored
Fingerprint and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, and will
Extract in data base corresponding to the fingerprint of identity and compare with the fingerprint storing user's input, if the two phase
With, it is determined that this storage user is legal storage user, configures the virtual resource pond corresponding with storage request for legal storage user,
If incorrect, terminal is provided to return error reporting to local service.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610538251.4A CN106203166A (en) | 2016-07-07 | 2016-07-07 | A kind of auto navigation information data sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610538251.4A CN106203166A (en) | 2016-07-07 | 2016-07-07 | A kind of auto navigation information data sharing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106203166A true CN106203166A (en) | 2016-12-07 |
Family
ID=57472920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610538251.4A Withdrawn CN106203166A (en) | 2016-07-07 | 2016-07-07 | A kind of auto navigation information data sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203166A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111107114A (en) * | 2018-10-25 | 2020-05-05 | 上海博泰悦臻电子设备制造有限公司 | Information synchronization method, terminal and computer readable storage medium |
CN112753026A (en) * | 2018-09-26 | 2021-05-04 | 美光科技公司 | Memory pooling between selected memory resources by a base station |
-
2016
- 2016-07-07 CN CN201610538251.4A patent/CN106203166A/en not_active Withdrawn
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112753026A (en) * | 2018-09-26 | 2021-05-04 | 美光科技公司 | Memory pooling between selected memory resources by a base station |
CN112753026B (en) * | 2018-09-26 | 2022-04-05 | 美光科技公司 | Memory pooling between selected memory resources by a base station |
CN111107114A (en) * | 2018-10-25 | 2020-05-05 | 上海博泰悦臻电子设备制造有限公司 | Information synchronization method, terminal and computer readable storage medium |
CN111107114B (en) * | 2018-10-25 | 2022-11-04 | 博泰车联网科技(上海)股份有限公司 | Information synchronization method, terminal and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11681790B2 (en) | System and method for user enrollment in a secure biometric verification system | |
US10248783B2 (en) | Methods and systems for identity creation, verification and management | |
US8275995B2 (en) | Identity authentication and secured access systems, components, and methods | |
US7802723B2 (en) | System and method for nameless biometric authentication and non-repudiation validation | |
CN106096061A (en) | A kind of environmental monitoring information data sharing method | |
CN106131010A (en) | A kind of electric network data sharing method | |
CN108134791A (en) | A kind of data center's total management system login validation method | |
CN109768983A (en) | Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain | |
CN106202415A (en) | A kind of earth geography information data sharing method | |
CN105827571A (en) | UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment | |
CN106056005A (en) | Method for sharing satellite information data | |
CN104038509A (en) | Fingerprint authentication cloud system | |
CN106156640B (en) | Information O&M service knowledge sharing method based on big data trust computing | |
CN106203166A (en) | A kind of auto navigation information data sharing method | |
Hamer et al. | Private digital identity on blockchain | |
CN105262747A (en) | Polymorphic terminal identity verification system and method based on biological characteristic recognition | |
CN101655893B (en) | Manufacture method of intelligent blog lock, Blog access control method and system thereof | |
Fumy et al. | Handbook of EID Security: Concepts, Practical Experiences, Technologies | |
AU2020344601A1 (en) | Enhanced biometric authentication | |
CN111931230A (en) | Data authorization method and device, storage medium and electronic device | |
CN106130737A (en) | A kind of road congestion information data sharing method | |
CN109785456A (en) | A kind of distributed Work attendance management system and Work attendance method based on mobile terminal | |
CN109165491A (en) | Security certificate method, apparatus, electronic equipment and storage medium | |
CN106209846A (en) | A kind of weather information data sharing method | |
CN106203169A (en) | A kind of railway information data sharing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C04 | Withdrawal of patent application after publication (patent law 2001) | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161207 |