CN106227783B - A kind of government data polyplant, data provide end, system and method - Google Patents

A kind of government data polyplant, data provide end, system and method Download PDF

Info

Publication number
CN106227783B
CN106227783B CN201610566335.9A CN201610566335A CN106227783B CN 106227783 B CN106227783 B CN 106227783B CN 201610566335 A CN201610566335 A CN 201610566335A CN 106227783 B CN106227783 B CN 106227783B
Authority
CN
China
Prior art keywords
data
encrypted characters
characters string
encryption
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610566335.9A
Other languages
Chinese (zh)
Other versions
CN106227783A (en
Inventor
赵兵旗
国丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Original Assignee
Shandong ICity Information Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong ICity Information Technology Co., Ltd. filed Critical Shandong ICity Information Technology Co., Ltd.
Priority to CN201610566335.9A priority Critical patent/CN106227783B/en
Publication of CN106227783A publication Critical patent/CN106227783A/en
Application granted granted Critical
Publication of CN106227783B publication Critical patent/CN106227783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2272Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of government data polyplant, data to provide end, system and method, the government data polyplant receives each data by polymerized unit and provides the corresponding first encrypted characters string that end is sent, each first encrypted characters string is polymerize, and provides each first encrypted characters string to end with corresponding data and establishes corresponding relationship;It searches indexing units and receives the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent, and the second encrypted characters string and each first encrypted characters string are matched, determining and the first encrypted characters of target string, according to corresponding relationship, the second encrypted characters string and authorized agreement is sent to target data, end is provided;Data transmission unit receives target data and provides the encryption data that end is sent, and according to authorized agreement, the encryption data is sent to terminal.Scheme provided by the invention can guarantee that carrying out safety to government data shares.

Description

A kind of government data polyplant, data provide end, system and method
Technical field
The present invention relates to field of computer technology, in particular to a kind of government data polyplant, data provide end, system And method.
Background technique
With the continuous development of information age, data sharing degree has become the one of the important signs that of information development, especially For government data, if realizing data sharing, the trend of national development will be more accurately analyzed.Existing number It is mainly that data are announced out so that data collection terminal acquires data, and for government affairs number by data publication end according to sharing mode For, since it involves more private data, and existing this data sharing mode does not ensure that the safety of data Property, it causes government data still and not can be carried out safe share.
Summary of the invention
The embodiment of the invention provides a kind of government data polyplant, data to provide end, system and method, can guarantee Safety is carried out to government data to share.
A kind of government data polyplant provides end with each data of peripheral hardware and is connected, comprising: polymerized unit searches rope Draw unit and data transmission unit, wherein
The polymerized unit, each data for receiving the peripheral hardware provide each data in end and provide what end was sent Corresponding first encrypted characters string, by each first encrypted characters string polymerize, and by each first encrypted characters string with it is corresponding Data provide end establish corresponding relationship;
The lookup indexing units, for receiving the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent, and Each first encrypted characters string that the second encrypted characters string is polymerize with the polymerized unit matches, determining with described the Target the first encrypted characters string that two encrypted characters strings match will be described according to the corresponding relationship that the polymerized unit is established The target data that second encrypted characters string and authorized agreement are sent to the corresponding peripheral hardware of the first encrypted characters of target string provides End;
The data transmission unit, the target data for receiving the peripheral hardware provide the encryption data that end is sent, and root According to the authorized agreement that the lookup indexing units receive, the encryption data is sent to the terminal of the peripheral hardware.
Preferably, the polymerized unit, comprising: the first encryption interface and index generate subelement, wherein
The first encryption interface provides end hair to each data of peripheral hardware for irreversible encryption method to be arranged The critical data sent is encrypted, and the first encrypted characters string is formed, and the first encrypted characters string is sent respectively to described Index generates subelement;
The index generates subelement, the first encrypted characters string sent for receiving the first encryption interface, And the data of the first encrypted characters string and corresponding peripheral hardware are provided to client information storage into pre-set index list, Association between the first encrypted characters string and the data offer client information of corresponding peripheral hardware is provided.
Preferably, the lookup indexing units, comprising: the second encryption interface, coupling subelement and transmission sub-unit, In,
The second encryption interface receives the search pass that the terminal of peripheral hardware is sent for irreversible encryption method to be arranged Key word and authorized agreement encrypt described search keyword, form the second encrypted characters string;
The coupling subelement, the second encrypted characters string for forming the second encryption interface polymerize list with described Each first encrypted characters string of member polymerization is matched, when the second encrypted characters string belongs to each first encrypted word When a part of target the first encrypted characters string in symbol string, determine that the second encrypted characters string and the target first encrypt Character string matches, and according to the corresponding relationship that the polymerized unit is established, determines that the target data of peripheral hardware provides end;
The transmission sub-unit, the second encryption of authorized agreement and formation for arriving the second encryption interface Character string is sent to the target data that the coupling subelement determines and provides end.
A kind of data offer end, comprising: separative unit, symmetric cryptography unit, indexing units and transmission unit, wherein
The separative unit, the data stored for identification, by the data critical data and sensitive data separate, And the critical data is sent to the government data polyplant of peripheral hardware;
The symmetric cryptography unit for symmetric encryption method to be arranged, and utilizes the symmetric encryption method, will be described point The sensitive data encryption isolated from unit;
The indexing units, the encryption key data that the government data polyplant for receiving the peripheral hardware is sent The the first encrypted characters string formed afterwards, and establish the sensitive number of the first encrypted characters string and symmetric cryptography unit encryption Index relative between, and the second encrypted characters string that the government data polyplant for receiving peripheral hardware is sent, according to described the Two encrypted characters strings determine the target susceptibility data of encryption;
The transmission unit, for sending the target susceptibility data for the encryption that the indexing units determine to the peripheral hardware Government data polyplant.
Preferably, the data provide end, comprising:
Any one or more open provided in end and collage-credit data offer end of government data.
A kind of government data paradigmatic system, comprising: any of the above-described government data polyplant and any of the above-described institute The data stated provide end.
A kind of government data polymerization provides end with each data and is connected, comprising:
It receives each data and the corresponding first encrypted characters string that each data offer end is sent in end is provided, it will Each first encrypted characters string polymerization;
Each first encrypted characters string is provided to end with corresponding data establish corresponding relationship;
When receiving the second encrypted characters string and authorized agreement of terminal transmission, by the second encrypted characters string and gather The each first encrypted characters string closed matches;
Determining target the first encrypted characters string to match with the second encrypted characters string;
According to the corresponding relationship, the second encrypted characters string and authorized agreement are sent to the target first and encrypted The corresponding target data of character string provides end;
It receives the target data and the encryption data that end is sent is provided, and according to the authorized agreement, by the encryption number According to being sent to the terminal.
Preferably, the above method further comprises: setting the first encryption interface, and is arranged in the first encryption interface Irreversible encryption method;
It is described to receive corresponding first encrypted characters that each data offer end is sent in each data offer end String, comprising: provide the critical data that end is sent to each data by the first encryption interface and encrypt, form first Encrypted characters string, and by the first encrypted characters string storage into pre-set index list.
Preferably, the above method further comprises: setting the second encryption interface, and is arranged in the second encryption interface Symmetric encryption method;
The second encrypted characters string and authorized agreement for receiving terminal transmission, comprising:
The search key and authorized agreement sent by the second encryption interface terminal, to described search key Word is encrypted, and the second encrypted characters string is formed;
Obtain the second encrypted characters string.
Preferably, target the first encrypted characters string that the determination and the second encrypted characters string match,
When the second encrypted characters string belongs to target the first encrypted characters string in each first encrypted characters string A part when, determine that the second encrypted characters string matches with the first encrypted characters of target string.
The embodiment of the invention provides a kind of government data polyplant, data to provide end, system and method, government data Polyplant, the government data polyplant provide end with each data of peripheral hardware and are connected, and are received by polymerized unit described outer If each data provide end in each data provide end send corresponding first encrypted characters string, each first is encrypted Character string polymerization, and provide each first encrypted characters string to end with corresponding data and establish corresponding relationship;By searching for rope Draw unit and receive the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent, and by the second encrypted characters string and institute The each first encrypted characters string for stating polymerized unit polymerization matches, the determining target to match with the second encrypted characters string First encrypted characters string, according to the corresponding relationship that the polymerized unit is established, by the second encrypted characters string and authorized agreement The target data for being sent to the corresponding peripheral hardware of the first encrypted characters of target string provides end;Institute is received by data transmission unit The target data for stating peripheral hardware provides the encryption data that end is sent, and the authorized agreement received according to the lookup indexing units, The encryption data is sent to the terminal of the peripheral hardware, the process carried out data transmission due to above-mentioned government data polyplant It is data such as the encrypted characters string and encryption data etc. of encryption, is shared to ensure that and carry out safety to government data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is a kind of structural schematic diagram of government data polyplant provided by one embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram for government data polyplant that another embodiment of the present invention provides;
Fig. 3 is a kind of structural schematic diagram for government data polyplant that another embodiment of the invention provides;
Fig. 4 is that a kind of data provided by one embodiment of the present invention provide the structural schematic diagram at end;
Fig. 5 is a kind of structural schematic diagram of government data paradigmatic system provided by one embodiment of the present invention;
Fig. 6 is a kind of flow chart of government data polymerization provided by one embodiment of the present invention;
Fig. 7 is a kind of flow chart for government data polymerization that another embodiment of the present invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments, based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
As shown in Figure 1, the embodiment of the present invention provides a kind of government data polyplant, the government data polyplant and outer If each data end be provided be connected, comprising: polymerized unit 101 searches indexing units 102 and data transmission unit 103, In,
The polymerized unit 101, each data for receiving the peripheral hardware provide each data in end and provide end hair The corresponding first encrypted characters string sent, by each first encrypted characters string polymerize, and by each first encrypted characters string with Corresponding data provide end and establish corresponding relationship;
The lookup indexing units 102, for receiving the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent, And each first encrypted characters string that the second encrypted characters string polymerize with the polymerized unit 101 is matched, determine with Target the first encrypted characters string that the second encrypted characters string matches, the corresponding pass established according to the polymerized unit 101 The second encrypted characters string and authorized agreement, are sent to the target of the corresponding peripheral hardware of the first encrypted characters of target string by system Data provide end;
The data transmission unit 103, the target data for receiving the peripheral hardware provide the encryption data that end is sent, and According to the authorized agreement that the lookup indexing units 102 receive, the encryption data is sent to the terminal of the peripheral hardware.
In the embodiment shown in fig. 1, each in end is provided by each data that polymerized unit receives the peripheral hardware Data provide end send corresponding first encrypted characters string, will each first encrypted characters string polymerization, and by each first Encrypted characters string provides end with corresponding data and establishes corresponding relationship;It is sent by searching for the terminal that indexing units receive peripheral hardware Second encrypted characters string and authorized agreement, and each first that the second encrypted characters string is polymerize with the polymerized unit adds Close character string matches, determining target the first encrypted characters string to match with the second encrypted characters string, according to described poly- The corresponding relationship that unit is established is closed, the second encrypted characters string and authorized agreement are sent to first encrypted characters of target Go here and there corresponding peripheral hardware target data provide end;End is provided by the target data that data transmission unit receives the peripheral hardware to send Encryption data the encryption data is sent to described outer and according to the authorized agreement that receives of lookup indexing units If terminal, the process carried out data transmission due to above-mentioned government data polyplant is the data such as encrypted characters string of encryption With encryption data etc., shared to ensure that and carry out safety to government data.
As shown in Fig. 2, in an alternative embodiment of the invention, the polymerized unit 101, comprising: the first encryption 201 He of interface Index generates subelement 202, wherein
The first encryption interface 201 provides end to each data of peripheral hardware for irreversible encryption method to be arranged The critical data of transmission is encrypted, and forms the first encrypted characters string, and the first encrypted characters string is sent respectively to institute It states index and generates subelement 202;
The index generates subelement 202, first encrypted word sent for receiving the first encryption interface 201 Symbol string, and the data of the first encrypted characters string and corresponding peripheral hardware are provided to client information storage to pre-set index column In table, the association between the first encrypted characters string and the data offer client information of corresponding peripheral hardware is established.
As shown in figure 3, in still another embodiment of the process, the lookup indexing units 102, comprising: the second encryption interface 301, coupling subelement 302 and transmission sub-unit 303, wherein
The second encryption interface 301 receives the search that the terminal of peripheral hardware is sent for irreversible encryption method to be arranged Keyword and authorized agreement encrypt described search keyword, form the second encrypted characters string;
The coupling subelement 302, for by the second second encrypted characters string that is formed of encryption interface 301 with it is described Polymerized unit 101 polymerize each first encrypted characters string matched, when the second encrypted characters string belong to it is described each When a part of target the first encrypted characters string in the first encrypted characters string, the second encrypted characters string and the mesh are determined It marks the first encrypted characters string to match, according to the corresponding relationship that the polymerized unit 101 is established, determines that the target data of peripheral hardware mentions For end;
The transmission sub-unit 303, for by second authorized agreement that receives of encryption interface 301 and formed the Two encrypted characters strings are sent to the target data that the coupling subelement 302 determines and provide end.
As shown in figure 4, the embodiment of the present invention, which provides a kind of data, provides end, which provides end, and any of the above-described described Government data polyplant be connected, comprising: separative unit 401, symmetric cryptography unit 402, indexing units 403 and transmission unit 404, wherein
The separative unit 401, the critical data and sensitive data in data stored for identification, by the crucial number It is separated according to sensitive data, and the critical data is sent to the government data polyplant of peripheral hardware;
The symmetric cryptography unit 402 for symmetric encryption method to be arranged, and utilizes the symmetric encryption method, by institute State the sensitive data encryption that separative unit 401 is isolated;
The indexing units 403, the critical data that the government data polyplant for receiving the peripheral hardware is sent The the first encrypted characters string formed after encryption, and establish the first encrypted characters string and the symmetric cryptography unit 402 encryption Sensitive data between index relative, and receive peripheral hardware government data polyplant send the second encrypted characters string, root According to the second encrypted characters string, the target susceptibility data of encryption are determined;
The transmission unit 404, for sending the target susceptibility data for the encryption that the indexing units 403 determine to described The government data polyplant of peripheral hardware.
In an alternative embodiment of the invention, the data provide end, comprising: government data is open to provide end and collage-credit data Any one or more in end is provided.
The contents such as the information exchange between each unit, implementation procedure in above-mentioned apparatus, due to implementing with the method for the present invention Example is based on same design, and particular content can be found in the narration in following embodiment of the present invention method, and details are not described herein again.
As shown in figure 5, the embodiment of the present invention provides a kind of government data paradigmatic system, comprising: any of the above-described political affairs Data aggregate device 501 and at least one any of the above-described described data of being engaged in provide end 502.
As shown in fig. 6, providing end phase with each data the embodiment of the invention provides a kind of government data polymerization Even, this method may comprise steps of:
Step 601: receiving each data and corresponding first encrypted characters that each data offer end is sent in end are provided Each first encrypted characters string polymerize by string;
Step 602: providing each first encrypted characters string to end with corresponding data and establish corresponding relationship;
Step 603: when receiving the second encrypted characters string and authorized agreement of terminal transmission, by the second encrypted characters string Match with each first encrypted characters string polymerizeing;
Step 604: determining target the first encrypted characters string to match with the second encrypted characters string;
Step 605: according to corresponding relationship, the second encrypted characters string and authorized agreement being sent to the first encrypted characters of target Corresponding target data of going here and there provides end;
Step 606: receiving target data and the encryption data that end is sent is provided, and according to authorized agreement, encryption data is sent out Give terminal.
In an embodiment of the invention, in order to provide the critical data in end by each data, the first encryption is obtained Character string, the above method further comprise: setting first encryption interface, and it is described first encryption interface in be arranged it is irreversible Encryption method;The specific embodiment of step 601, comprising: provide end hair to each data by the first encryption interface The critical data sent is encrypted, and forms the first encrypted characters string, and by the first encrypted characters string storage to presetting Index list in.Irreversible encryption method being arranged in this step such as HSAH method, md5 encryption method etc., Ke Yidan To data are encrypted, and cannot be decrypted, when utilizing same encryption method, when to same data encryption, formation plus Close character string is identical, then, it is only necessary to encrypted characters string can determine corresponding information, and government data polyplant passes through It stores the first encrypted characters string and data provides the relationship at end, then can determine when determining target the first encrypted characters string Target data provides end while guaranteeing data security, and provides the foundation for data sharing.Such as: to critical data name, Identification card number and gender carry out encryption and form the first encrypted characters string to be abcdefg.
In an embodiment of the invention, in order to guarantee to provide the accuracy of data, and realize to the keyword of search into Row encryption, the above method further comprises: setting the second encryption interface, and symmetric cryptography is arranged in the second encryption interface Method;In step 603, the second encrypted characters string and authorized agreement for receiving terminal transmission, comprising: pass through described second The search key and authorized agreement that interface terminal is sent are encrypted, described search keyword is encrypted, forms second Encrypted characters string;Obtain the second encrypted characters string.When the encryption method and the first encrypted characters string of the second encrypted characters string Encryption method it is consistent when, identical information can correspond to identical encrypted characters string, such as: search key is in the method Name, corresponding second encrypted characters string are ab.
In an embodiment of the invention, in order to guarantee matched accuracy, the specific embodiment of step 604, comprising: When the second encrypted characters string belongs to a part of target the first encrypted characters string in each first encrypted characters string When, determine that the second encrypted characters string matches with the first encrypted characters of target string.Such as: above-mentioned second encrypted characters String ab is a part of the first encrypted characters string abcdefg, then illustrates the second encrypted characters string and the first encrypted characters String matching.
Below by taking government data polyplant, data provide the interactive process at end and terminal room as an example, expansion illustrates government affairs Data aggregation method, as shown in fig. 7, the government data polymerization may include steps of:
Step 701: the first encryption interface of government data polyplant setting and the second encryption interface;
The first encryption interface is primarily to mention the open offer end of data offer end such as government data and collage-credit data For end etc. in critical data encrypted, this second encryption interface primarily to ciphering terminal send search key, In addition, government data polyplant is respectively that irreversible encryption method is arranged in the first encryption interface in this step, second adds Touch mouth and irreversible encryption method is set, and the irreversible encryption method in this two encryption interfaces is consistent, from And guarantee that the subsequent encrypted characters String matching to formation is accurate.
Step 702: providing end in data and symmetric encryption method is set;
In the symmetric encryption method that the step is arranged primarily to providing what end was separated to data in subsequent step The information of paying taxes etc. of sensitive data such as user encrypts, and the symmetric encryption method can make the terminal solution with authorized agreement The sensitive data of the close encryption, to guarantee the safety of data.
Step 703: data provide the data that end identifies itself storage;
Such as: when it is tax system that data, which provide end, the data of tax system storage are mainly relevant with the tax Government data, when it is public security system that data, which provide end, which is mainly personal essential information of user etc..
Step 704: data provide end and isolate critical data and sensitive data from data;
Such as: for tax system from the data that itself is stored, the critical data isolated is Business Name, legal person, company Address etc., sensitive data are company's tax affairs etc.;From the data that itself is stored, the critical data isolated is public security system Name, identification card number, gender etc., sensitive data are home address, phone, work unit etc..
Step 705: data are provided end and are encrypted sensitive data using symmetric cryptography;
That is the tax system of above-mentioned steps 704 encrypts tax affairs;Public security system is to home address, phone, work Office etc. is encrypted
Step 706: data provide end and critical data are sent to government data polyplant;
Step 707: providing the critical data that end is sent to each data by the first encryption interface and encrypt, formed First encrypted characters string;
The process of step 706 and step 707 completes the encryption to critical data, since encryption is irreversible encryption, i.e., Encrypted critical data is also encryption for government data polyplant, and government data polyplant can not be to this The critical data of encryption is decrypted, to ensure that the safety of critical data.
Step 708: government data polyplant stores the first encrypted characters string into pre-set index list;
Step 709: providing each first encrypted characters string to end with corresponding data and establish corresponding relationship;
By taking the tax system and public security system that above-mentioned steps refer to as an example, the detailed process of step 708 and step 709: right Critical data Business Name, legal person, the CompanyAddress etc. that tax system is isolated, which encrypt, forms encrypted characters string 1, and Make the encrypted characters string 1 corresponding with tax system in index list;It is name, identity to the critical data that public security system is isolated Card number, gender etc. carry out encryption and form encrypted characters string 2, and make the encrypted characters string 2 and public security system pair in index list It answers.
Step 710: data provide end and store corresponding first encrypted characters string, and establish the first encrypted characters string and sensitivity Index relative between data;
The data of the step provide end and store the first encrypted characters string primarily to being further ensured that data provide end Safety, even if the process of entire data sharing is completed in the case where data encryption.Such as: tax system is to encryption Character string 1 is stored, and establishes the index relative between the corresponding encrypted sensitive data 1 of the encrypted characters string 1, i.e., from Encrypted characters string 1 can find sensitive data 1.
Above-mentioned each step is primarily to the basis that the realization of subsequent step carries out prepares, by above steps Each data provide the respective data that end is still respectively held, while being encrypted to data, guarantee the peace of data sharing Quan Xing, and government data polyplant only stores encrypted critical data, and critical data cannot be decrypted, it is protecting While holding government data privatization, the shared of government data is realized.
Step 711: the search key and authorized agreement sent by the second encryption interface terminal, it is crucial to search Word is encrypted, and the second encrypted characters string is formed;
Such as: user sends the authorized agreement that search key is Business Name and the terminal by terminal, then to key Word Business Name is encrypted.For another example search key is name, corresponding second encryption of name formed by the step Character string is ab.
Step 712: the second encrypted characters string and each first encrypted characters string in index list are matched;
Such as: the second encrypted characters string ab successively with the first encrypted characters string 12345,67890 in index list, Abcdefg etc. is matched.
Step 713: determining target the first encrypted characters string to match with the second encrypted characters string;
The specific implementation process of the step: when the second encrypted characters string belongs to the target in each first encrypted characters string When a part of one encrypted characters string, determine that the second encrypted characters string matches with target the first encrypted characters string.Such as: it is above-mentioned A part in second encrypted characters string ab and the first encrypted characters string abcdefg is consistent, then illustrates the second encrypted characters string ab It is matched with the first encrypted characters string abcdefg.Two not quite identical reasons of encrypted characters string are, search key is often only It is a part of above-mentioned critical data and is not necessarily complete critical data.
Step 714: according to corresponding relationship, the second encrypted characters string and authorized agreement being sent to the first encrypted characters of target Corresponding target data of going here and there provides end;
Above-mentioned steps 709 have had built up the corresponding relationship between the first encrypted characters string and data offer end, then logical Above-mentioned corresponding relationship is crossed to be easy to find target the first encrypted characters string corresponding target data offer end.
Step 715: target data provides end according to the second encrypted characters string and authorized agreement, determines encrypted sensitive number According to, and encrypted sensitive data is sent to government data polyplant;
Step 716: government data polyplant receives encrypted sensitive data, and according to authorized agreement, after encryption Sensitive data be sent to terminal.
Since in above-mentioned steps 710, providing end in each data is the first encrypted characters string and encrypted sensitive number Corresponding relationship is established after data offer end confirms that authorized agreement is correct again according to, and encrypted sensitive data is passed through into political affairs Business data aggregate device is sent to terminal, and what this process government data polyplant obtained is the sensitive data of encryption, and only There is the terminal with authorized agreement that sensitive data could be decrypted, to ensure that the safety of government data.
According to above scheme, various embodiments of the present invention are at least had the following beneficial effects:
1. providing each data in end by each data that polymerized unit receives the peripheral hardware provides pair that end is sent The the first encrypted characters string answered, by each first encrypted characters string polymerize, and by each first encrypted characters string with it is corresponding Data provide end and establish corresponding relationship;The second encrypted characters string of the terminal transmission of peripheral hardware is received by searching for indexing units and is awarded Agreement is weighed, and each first encrypted characters string that the second encrypted characters string is polymerize with the polymerized unit matches, really Fixed target the first encrypted characters string to match with the second encrypted characters string, the corresponding pass established according to the polymerized unit The second encrypted characters string and authorized agreement, are sent to the target of the corresponding peripheral hardware of the first encrypted characters of target string by system Data provide end;The encryption data sent by the target data offer end that data transmission unit receives the peripheral hardware, and according to The encryption data, is sent to the terminal of the peripheral hardware, due to above-mentioned by the authorized agreement searching indexing units and receiving The process that government data polyplant carries out data transmission is data such as the encrypted characters string and encryption data etc. of encryption, from And it ensure that carrying out safety to government data shares.
2. providing end hair to each data of peripheral hardware by the way that irreversible encryption method is arranged in the first encryption interface The critical data sent is encrypted, and the first encrypted characters string is formed, by the way that irreversible encryption side is arranged in the second encryption interface Method, the keyword sent to the terminal of peripheral hardware encrypt, and form the second encrypted characters string, fill so that polymerizeing into government data The data set are that ensure that the safety of data transmission procedure by encryption.
3. the government data polyplant in the embodiment of the present invention only carries out the encryption of critical data, encrypted crucial number According to the matching between encrypted keyword, and determine that target data provides end, and sensitive data is still each data It provides end oneself to hold, while keeping government data privatization, realizes the shared of government data.
It should be noted that, in this document, such as first and second etc relational terms are used merely to an entity Or operation is distinguished with another entity or operation, is existed without necessarily requiring or implying between these entities or operation Any actual relationship or order.Moreover, the terms "include", "comprise" or its any other variant be intended to it is non- It is exclusive to include, so that the process, method, article or equipment for including a series of elements not only includes those elements, It but also including other elements that are not explicitly listed, or further include solid by this process, method, article or equipment Some elements.In the absence of more restrictions, the element limited by sentence " including a 〃 ", is not arranged Except there is also other identical factors in the process, method, article or apparatus that includes the element.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light In the various media that can store program code such as disk.
Finally, it should be noted that the foregoing is merely presently preferred embodiments of the present invention, it is merely to illustrate skill of the invention Art scheme, is not intended to limit the scope of the present invention.Any modification for being made all within the spirits and principles of the present invention, Equivalent replacement, improvement etc., are included within the scope of protection of the present invention.

Claims (8)

1. a kind of government data polyplant, which is characterized in that provide end with each data of peripheral hardware and be connected, comprising: polymerization is single Member searches indexing units and data transmission unit, wherein
The polymerized unit, each data for receiving the peripheral hardware provide each data in end and provide the correspondence that end is sent The first encrypted characters string, each first encrypted characters string is polymerize, and by each first encrypted characters string and corresponding number Corresponding relationship is established according to end is provided;
The lookup indexing units, for receiving the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent, and by institute It states each first encrypted characters string that the second encrypted characters string polymerize with the polymerized unit to match, determines and add with described second Target the first encrypted characters string that close character string matches, according to the corresponding relationship that the polymerized unit is established, by described second The target data that encrypted characters string and authorized agreement are sent to the corresponding peripheral hardware of the first encrypted characters of target string provides end;
The data transmission unit, the target data for receiving the peripheral hardware provide the encryption data that end is sent, and according to institute It states and searches the authorized agreement that indexing units receive, the encryption data is sent to the terminal of the peripheral hardware;
The polymerized unit, comprising: the first encryption interface and index generate subelement, wherein
The first encryption interface provides what end was sent to each data of peripheral hardware for irreversible encryption method to be arranged Critical data is encrypted, and forms the first encrypted characters string, and the first encrypted characters string is sent respectively to the index Generate subelement;
The index generates subelement, the first encrypted characters string sent for receiving the first encryption interface, and will The data of the first encrypted characters string and corresponding peripheral hardware provide client information storage into pre-set index list, establish The data of the first encrypted characters string and corresponding peripheral hardware provide the association between client information.
2. government data polyplant according to claim 1, which is characterized in that the lookup indexing units, comprising: the Two encryption interfaces, coupling subelement and transmission sub-unit, wherein
The second encryption interface receives the search key that the terminal of peripheral hardware is sent for irreversible encryption method to be arranged And authorized agreement, described search keyword is encrypted, the second encrypted characters string is formed;
The coupling subelement, the second encrypted characters string for forming the second encryption interface gather with the polymerized unit The each first encrypted characters string closed is matched, when the second encrypted characters string belongs to each first encrypted characters string In target the first encrypted characters string a part when, determine the second encrypted characters string and first encrypted characters of target String matches, and according to the corresponding relationship that the polymerized unit is established, determines that the target data of peripheral hardware provides end;
The transmission sub-unit, the second encrypted characters of authorized agreement and formation for arriving the second encryption interface String is sent to the target data that the coupling subelement determines and provides end.
3. a kind of data provide end characterized by comprising separative unit, symmetric cryptography unit, indexing units and transmission are single Member, wherein
The separative unit, the data stored for identification, by the critical data and sensitive data separation in the data, and will The critical data is sent to the government data polyplant of peripheral hardware;
The symmetric cryptography unit for symmetric encryption method to be arranged, and utilizes the symmetric encryption method, and the separation is single The sensitive data encryption that member is isolated;
The indexing units, for receive the peripheral hardware government data polyplant send the encryption key data after shape At the first encrypted characters string, and establish the first encrypted characters string and the symmetric cryptography unit encryption sensitive data it Between index relative, and the second encrypted characters string that the government data polyplant for receiving peripheral hardware is sent, according to described second plus Close character string determines the target susceptibility data of encryption;
The transmission unit, for sending government affairs of the target susceptibility data to the peripheral hardware for the encryption that the indexing units determine Data aggregate device.
4. data according to claim 3 provide end, which is characterized in that the data provide end, comprising:
Any one or more open provided in end and collage-credit data offer end of government data.
5. a kind of government data paradigmatic system characterized by comprising any government data polymerization of claim 1 to 2 Data described in device and at least one claim 3 or 4 provide end.
6. a kind of government data polymerization, which is characterized in that provide end with each data and be connected, comprising:
It receives each data and the corresponding first encrypted characters string that each data offer end is sent in end is provided, it will be each The polymerization of first encrypted characters string;
Each first encrypted characters string is provided to end with corresponding data establish corresponding relationship;
When the second encrypted characters string for receiving terminal transmission and when authorized agreement, by the second encrypted characters string with polymerize Each first encrypted characters string matches;
Determining target the first encrypted characters string to match with the second encrypted characters string;
According to the corresponding relationship, the second encrypted characters string and authorized agreement are sent to first encrypted characters of target Corresponding target data of going here and there provides end;
It receives the target data and the encryption data that end is sent is provided, and according to the authorized agreement, the encryption data is sent out Give the terminal;
Further comprise: setting the first encryption interface, and irreversible encryption method is set in the first encryption interface;
It is described to receive the corresponding first encrypted characters string that each data offer end is sent in each data offer end, packet It includes: providing the critical data that end is sent to each data by the first encryption interface and encrypt, form the first encryption Character string, and by the first encrypted characters string storage into pre-set index list.
7. according to the method described in claim 6, it is characterized in that, further comprising: setting the second encryption interface, and described Symmetric encryption method is set in second encryption interface;
The second encrypted characters string and authorized agreement for receiving terminal transmission, comprising:
By it is described second encryption interface terminal send search key and authorized agreement, to described search keyword into Row encryption, forms the second encrypted characters string;
Obtain the second encrypted characters string.
8. according to any method of claim 6 to 7, which is characterized in that the determination and the second encrypted characters string Target the first encrypted characters string to match,
When the second encrypted characters string belongs to one of target the first encrypted characters string in each first encrypted characters string When part, determine that the second encrypted characters string matches with the first encrypted characters of target string.
CN201610566335.9A 2016-07-18 2016-07-18 A kind of government data polyplant, data provide end, system and method Active CN106227783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610566335.9A CN106227783B (en) 2016-07-18 2016-07-18 A kind of government data polyplant, data provide end, system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610566335.9A CN106227783B (en) 2016-07-18 2016-07-18 A kind of government data polyplant, data provide end, system and method

Publications (2)

Publication Number Publication Date
CN106227783A CN106227783A (en) 2016-12-14
CN106227783B true CN106227783B (en) 2019-10-25

Family

ID=57530932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610566335.9A Active CN106227783B (en) 2016-07-18 2016-07-18 A kind of government data polyplant, data provide end, system and method

Country Status (1)

Country Link
CN (1) CN106227783B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108092768B (en) * 2017-12-21 2021-06-01 中国联合网络通信集团有限公司 Data fusion method and system
CN110149326A (en) * 2019-05-14 2019-08-20 中国农业银行股份有限公司 Data introducing method, apparatus and system
CN113407760B (en) * 2021-08-18 2021-11-12 云上(江西)大数据发展有限公司 Government affair data analysis system for sharing platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859306A (en) * 2009-04-07 2010-10-13 日电(中国)有限公司 Method and equipment for generating blind index table, and united keyword search method and equipment
CN102255900A (en) * 2011-07-05 2011-11-23 中兴通讯股份有限公司 Method, system and device for providing multimedia service
US8281125B1 (en) * 2009-02-12 2012-10-02 Symantec Corporation System and method for providing secure remote email access
CN103634360A (en) * 2012-08-28 2014-03-12 中国电信股份有限公司 Sharing application method, system and server of sensor function, and mobile terminals
CN104394155A (en) * 2014-11-27 2015-03-04 暨南大学 Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8281125B1 (en) * 2009-02-12 2012-10-02 Symantec Corporation System and method for providing secure remote email access
CN101859306A (en) * 2009-04-07 2010-10-13 日电(中国)有限公司 Method and equipment for generating blind index table, and united keyword search method and equipment
CN102255900A (en) * 2011-07-05 2011-11-23 中兴通讯股份有限公司 Method, system and device for providing multimedia service
CN103634360A (en) * 2012-08-28 2014-03-12 中国电信股份有限公司 Sharing application method, system and server of sensor function, and mobile terminals
CN104394155A (en) * 2014-11-27 2015-03-04 暨南大学 Multi-user cloud encryption keyboard searching method capable of verifying integrity and completeness

Also Published As

Publication number Publication date
CN106227783A (en) 2016-12-14

Similar Documents

Publication Publication Date Title
US20210406495A1 (en) Large data transfer using visual codes with feedback confirmation
US10740584B2 (en) Transferring data files using a series of visual codes
Durham et al. Composite bloom filters for secure record linkage
WO2021031460A1 (en) Block chain transaction settlement method and system, and related device
WO2017140248A1 (en) Data exchange method, data exchange device and computing device
US8966597B1 (en) Electronic signatures
Mujahid et al. RCIA: A new ultralightweight RFID authentication protocol using recursive hash
CN104715187B (en) Method and apparatus for the node in certification electronic communication system
CN109257342A (en) Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain
CN110110163A (en) Safe substring search is with filtering enciphered data
US20160180075A1 (en) Registration and authentication of computing devices using a digital skeleton key
US20130238646A1 (en) Partial-Match Searches of Encrypted Data Sets
CN105827582B (en) A kind of communication encrypting method, device and system
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
Ali et al. A secure and efficient multi-factor authentication algorithm for mobile money applications
CN104821942B (en) Face identification method and system
CN106227783B (en) A kind of government data polyplant, data provide end, system and method
WO2023273070A1 (en) Registration method and system, and electronic device, storage medium and computer program product
CN107196840B (en) Data processing method, device and equipment
CN107122449A (en) File classification method and system based on public key encryption in multi-user environment
CN111563243A (en) Credible identity authentication platform based on WeChat applet
CN109992563A (en) A kind of service scripts storage method and device based on block chain
KR20200020382A (en) Crypto currency electronic wallet system
JP2013145420A (en) High-speed similarity retrieval processing system of encrypted data
CN111475690B (en) Character string matching method and device, data detection method and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190920

Address after: 250100 Room 3110, S01 Building, Tidal Building, 1036 Tidal Road, Jinan High-tech Zone, Shandong Province

Applicant after: Shandong Aicheng Network Information Technology Co., Ltd.

Address before: 250100 Ji'nan science and Technology Development Zone, Shandong Branch Road No. 2877

Applicant before: Wave Software Group Co., Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200812

Address after: No.999, gaolang East Road, Binhu District, Wuxi City, Jiangsu Province (software R & D building) 707

Patentee after: Chaozhou Zhuoshu Big Data Industry Development Co.,Ltd.

Address before: 250100 Room 3110, S01 Building, Tidal Building, 1036 Tidal Road, Jinan High-tech Zone, Shandong Province

Patentee before: Shandong Aicheng Network Information Technology Co.,Ltd.