Summary of the invention
The embodiment of the invention provides a kind of government data polyplant, data to provide end, system and method, can guarantee
Safety is carried out to government data to share.
A kind of government data polyplant provides end with each data of peripheral hardware and is connected, comprising: polymerized unit searches rope
Draw unit and data transmission unit, wherein
The polymerized unit, each data for receiving the peripheral hardware provide each data in end and provide what end was sent
Corresponding first encrypted characters string, by each first encrypted characters string polymerize, and by each first encrypted characters string with it is corresponding
Data provide end establish corresponding relationship;
The lookup indexing units, for receiving the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent, and
Each first encrypted characters string that the second encrypted characters string is polymerize with the polymerized unit matches, determining with described the
Target the first encrypted characters string that two encrypted characters strings match will be described according to the corresponding relationship that the polymerized unit is established
The target data that second encrypted characters string and authorized agreement are sent to the corresponding peripheral hardware of the first encrypted characters of target string provides
End;
The data transmission unit, the target data for receiving the peripheral hardware provide the encryption data that end is sent, and root
According to the authorized agreement that the lookup indexing units receive, the encryption data is sent to the terminal of the peripheral hardware.
Preferably, the polymerized unit, comprising: the first encryption interface and index generate subelement, wherein
The first encryption interface provides end hair to each data of peripheral hardware for irreversible encryption method to be arranged
The critical data sent is encrypted, and the first encrypted characters string is formed, and the first encrypted characters string is sent respectively to described
Index generates subelement;
The index generates subelement, the first encrypted characters string sent for receiving the first encryption interface,
And the data of the first encrypted characters string and corresponding peripheral hardware are provided to client information storage into pre-set index list,
Association between the first encrypted characters string and the data offer client information of corresponding peripheral hardware is provided.
Preferably, the lookup indexing units, comprising: the second encryption interface, coupling subelement and transmission sub-unit,
In,
The second encryption interface receives the search pass that the terminal of peripheral hardware is sent for irreversible encryption method to be arranged
Key word and authorized agreement encrypt described search keyword, form the second encrypted characters string;
The coupling subelement, the second encrypted characters string for forming the second encryption interface polymerize list with described
Each first encrypted characters string of member polymerization is matched, when the second encrypted characters string belongs to each first encrypted word
When a part of target the first encrypted characters string in symbol string, determine that the second encrypted characters string and the target first encrypt
Character string matches, and according to the corresponding relationship that the polymerized unit is established, determines that the target data of peripheral hardware provides end;
The transmission sub-unit, the second encryption of authorized agreement and formation for arriving the second encryption interface
Character string is sent to the target data that the coupling subelement determines and provides end.
A kind of data offer end, comprising: separative unit, symmetric cryptography unit, indexing units and transmission unit, wherein
The separative unit, the data stored for identification, by the data critical data and sensitive data separate,
And the critical data is sent to the government data polyplant of peripheral hardware;
The symmetric cryptography unit for symmetric encryption method to be arranged, and utilizes the symmetric encryption method, will be described point
The sensitive data encryption isolated from unit;
The indexing units, the encryption key data that the government data polyplant for receiving the peripheral hardware is sent
The the first encrypted characters string formed afterwards, and establish the sensitive number of the first encrypted characters string and symmetric cryptography unit encryption
Index relative between, and the second encrypted characters string that the government data polyplant for receiving peripheral hardware is sent, according to described the
Two encrypted characters strings determine the target susceptibility data of encryption;
The transmission unit, for sending the target susceptibility data for the encryption that the indexing units determine to the peripheral hardware
Government data polyplant.
Preferably, the data provide end, comprising:
Any one or more open provided in end and collage-credit data offer end of government data.
A kind of government data paradigmatic system, comprising: any of the above-described government data polyplant and any of the above-described institute
The data stated provide end.
A kind of government data polymerization provides end with each data and is connected, comprising:
It receives each data and the corresponding first encrypted characters string that each data offer end is sent in end is provided, it will
Each first encrypted characters string polymerization;
Each first encrypted characters string is provided to end with corresponding data establish corresponding relationship;
When receiving the second encrypted characters string and authorized agreement of terminal transmission, by the second encrypted characters string and gather
The each first encrypted characters string closed matches;
Determining target the first encrypted characters string to match with the second encrypted characters string;
According to the corresponding relationship, the second encrypted characters string and authorized agreement are sent to the target first and encrypted
The corresponding target data of character string provides end;
It receives the target data and the encryption data that end is sent is provided, and according to the authorized agreement, by the encryption number
According to being sent to the terminal.
Preferably, the above method further comprises: setting the first encryption interface, and is arranged in the first encryption interface
Irreversible encryption method;
It is described to receive corresponding first encrypted characters that each data offer end is sent in each data offer end
String, comprising: provide the critical data that end is sent to each data by the first encryption interface and encrypt, form first
Encrypted characters string, and by the first encrypted characters string storage into pre-set index list.
Preferably, the above method further comprises: setting the second encryption interface, and is arranged in the second encryption interface
Symmetric encryption method;
The second encrypted characters string and authorized agreement for receiving terminal transmission, comprising:
The search key and authorized agreement sent by the second encryption interface terminal, to described search key
Word is encrypted, and the second encrypted characters string is formed;
Obtain the second encrypted characters string.
Preferably, target the first encrypted characters string that the determination and the second encrypted characters string match,
When the second encrypted characters string belongs to target the first encrypted characters string in each first encrypted characters string
A part when, determine that the second encrypted characters string matches with the first encrypted characters of target string.
The embodiment of the invention provides a kind of government data polyplant, data to provide end, system and method, government data
Polyplant, the government data polyplant provide end with each data of peripheral hardware and are connected, and are received by polymerized unit described outer
If each data provide end in each data provide end send corresponding first encrypted characters string, each first is encrypted
Character string polymerization, and provide each first encrypted characters string to end with corresponding data and establish corresponding relationship;By searching for rope
Draw unit and receive the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent, and by the second encrypted characters string and institute
The each first encrypted characters string for stating polymerized unit polymerization matches, the determining target to match with the second encrypted characters string
First encrypted characters string, according to the corresponding relationship that the polymerized unit is established, by the second encrypted characters string and authorized agreement
The target data for being sent to the corresponding peripheral hardware of the first encrypted characters of target string provides end;Institute is received by data transmission unit
The target data for stating peripheral hardware provides the encryption data that end is sent, and the authorized agreement received according to the lookup indexing units,
The encryption data is sent to the terminal of the peripheral hardware, the process carried out data transmission due to above-mentioned government data polyplant
It is data such as the encrypted characters string and encryption data etc. of encryption, is shared to ensure that and carry out safety to government data.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments, based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
As shown in Figure 1, the embodiment of the present invention provides a kind of government data polyplant, the government data polyplant and outer
If each data end be provided be connected, comprising: polymerized unit 101 searches indexing units 102 and data transmission unit 103,
In,
The polymerized unit 101, each data for receiving the peripheral hardware provide each data in end and provide end hair
The corresponding first encrypted characters string sent, by each first encrypted characters string polymerize, and by each first encrypted characters string with
Corresponding data provide end and establish corresponding relationship;
The lookup indexing units 102, for receiving the second encrypted characters string and authorized agreement that the terminal of peripheral hardware is sent,
And each first encrypted characters string that the second encrypted characters string polymerize with the polymerized unit 101 is matched, determine with
Target the first encrypted characters string that the second encrypted characters string matches, the corresponding pass established according to the polymerized unit 101
The second encrypted characters string and authorized agreement, are sent to the target of the corresponding peripheral hardware of the first encrypted characters of target string by system
Data provide end;
The data transmission unit 103, the target data for receiving the peripheral hardware provide the encryption data that end is sent, and
According to the authorized agreement that the lookup indexing units 102 receive, the encryption data is sent to the terminal of the peripheral hardware.
In the embodiment shown in fig. 1, each in end is provided by each data that polymerized unit receives the peripheral hardware
Data provide end send corresponding first encrypted characters string, will each first encrypted characters string polymerization, and by each first
Encrypted characters string provides end with corresponding data and establishes corresponding relationship;It is sent by searching for the terminal that indexing units receive peripheral hardware
Second encrypted characters string and authorized agreement, and each first that the second encrypted characters string is polymerize with the polymerized unit adds
Close character string matches, determining target the first encrypted characters string to match with the second encrypted characters string, according to described poly-
The corresponding relationship that unit is established is closed, the second encrypted characters string and authorized agreement are sent to first encrypted characters of target
Go here and there corresponding peripheral hardware target data provide end;End is provided by the target data that data transmission unit receives the peripheral hardware to send
Encryption data the encryption data is sent to described outer and according to the authorized agreement that receives of lookup indexing units
If terminal, the process carried out data transmission due to above-mentioned government data polyplant is the data such as encrypted characters string of encryption
With encryption data etc., shared to ensure that and carry out safety to government data.
As shown in Fig. 2, in an alternative embodiment of the invention, the polymerized unit 101, comprising: the first encryption 201 He of interface
Index generates subelement 202, wherein
The first encryption interface 201 provides end to each data of peripheral hardware for irreversible encryption method to be arranged
The critical data of transmission is encrypted, and forms the first encrypted characters string, and the first encrypted characters string is sent respectively to institute
It states index and generates subelement 202;
The index generates subelement 202, first encrypted word sent for receiving the first encryption interface 201
Symbol string, and the data of the first encrypted characters string and corresponding peripheral hardware are provided to client information storage to pre-set index column
In table, the association between the first encrypted characters string and the data offer client information of corresponding peripheral hardware is established.
As shown in figure 3, in still another embodiment of the process, the lookup indexing units 102, comprising: the second encryption interface
301, coupling subelement 302 and transmission sub-unit 303, wherein
The second encryption interface 301 receives the search that the terminal of peripheral hardware is sent for irreversible encryption method to be arranged
Keyword and authorized agreement encrypt described search keyword, form the second encrypted characters string;
The coupling subelement 302, for by the second second encrypted characters string that is formed of encryption interface 301 with it is described
Polymerized unit 101 polymerize each first encrypted characters string matched, when the second encrypted characters string belong to it is described each
When a part of target the first encrypted characters string in the first encrypted characters string, the second encrypted characters string and the mesh are determined
It marks the first encrypted characters string to match, according to the corresponding relationship that the polymerized unit 101 is established, determines that the target data of peripheral hardware mentions
For end;
The transmission sub-unit 303, for by second authorized agreement that receives of encryption interface 301 and formed the
Two encrypted characters strings are sent to the target data that the coupling subelement 302 determines and provide end.
As shown in figure 4, the embodiment of the present invention, which provides a kind of data, provides end, which provides end, and any of the above-described described
Government data polyplant be connected, comprising: separative unit 401, symmetric cryptography unit 402, indexing units 403 and transmission unit
404, wherein
The separative unit 401, the critical data and sensitive data in data stored for identification, by the crucial number
It is separated according to sensitive data, and the critical data is sent to the government data polyplant of peripheral hardware;
The symmetric cryptography unit 402 for symmetric encryption method to be arranged, and utilizes the symmetric encryption method, by institute
State the sensitive data encryption that separative unit 401 is isolated;
The indexing units 403, the critical data that the government data polyplant for receiving the peripheral hardware is sent
The the first encrypted characters string formed after encryption, and establish the first encrypted characters string and the symmetric cryptography unit 402 encryption
Sensitive data between index relative, and receive peripheral hardware government data polyplant send the second encrypted characters string, root
According to the second encrypted characters string, the target susceptibility data of encryption are determined;
The transmission unit 404, for sending the target susceptibility data for the encryption that the indexing units 403 determine to described
The government data polyplant of peripheral hardware.
In an alternative embodiment of the invention, the data provide end, comprising: government data is open to provide end and collage-credit data
Any one or more in end is provided.
The contents such as the information exchange between each unit, implementation procedure in above-mentioned apparatus, due to implementing with the method for the present invention
Example is based on same design, and particular content can be found in the narration in following embodiment of the present invention method, and details are not described herein again.
As shown in figure 5, the embodiment of the present invention provides a kind of government data paradigmatic system, comprising: any of the above-described political affairs
Data aggregate device 501 and at least one any of the above-described described data of being engaged in provide end 502.
As shown in fig. 6, providing end phase with each data the embodiment of the invention provides a kind of government data polymerization
Even, this method may comprise steps of:
Step 601: receiving each data and corresponding first encrypted characters that each data offer end is sent in end are provided
Each first encrypted characters string polymerize by string;
Step 602: providing each first encrypted characters string to end with corresponding data and establish corresponding relationship;
Step 603: when receiving the second encrypted characters string and authorized agreement of terminal transmission, by the second encrypted characters string
Match with each first encrypted characters string polymerizeing;
Step 604: determining target the first encrypted characters string to match with the second encrypted characters string;
Step 605: according to corresponding relationship, the second encrypted characters string and authorized agreement being sent to the first encrypted characters of target
Corresponding target data of going here and there provides end;
Step 606: receiving target data and the encryption data that end is sent is provided, and according to authorized agreement, encryption data is sent out
Give terminal.
In an embodiment of the invention, in order to provide the critical data in end by each data, the first encryption is obtained
Character string, the above method further comprise: setting first encryption interface, and it is described first encryption interface in be arranged it is irreversible
Encryption method;The specific embodiment of step 601, comprising: provide end hair to each data by the first encryption interface
The critical data sent is encrypted, and forms the first encrypted characters string, and by the first encrypted characters string storage to presetting
Index list in.Irreversible encryption method being arranged in this step such as HSAH method, md5 encryption method etc., Ke Yidan
To data are encrypted, and cannot be decrypted, when utilizing same encryption method, when to same data encryption, formation plus
Close character string is identical, then, it is only necessary to encrypted characters string can determine corresponding information, and government data polyplant passes through
It stores the first encrypted characters string and data provides the relationship at end, then can determine when determining target the first encrypted characters string
Target data provides end while guaranteeing data security, and provides the foundation for data sharing.Such as: to critical data name,
Identification card number and gender carry out encryption and form the first encrypted characters string to be abcdefg.
In an embodiment of the invention, in order to guarantee to provide the accuracy of data, and realize to the keyword of search into
Row encryption, the above method further comprises: setting the second encryption interface, and symmetric cryptography is arranged in the second encryption interface
Method;In step 603, the second encrypted characters string and authorized agreement for receiving terminal transmission, comprising: pass through described second
The search key and authorized agreement that interface terminal is sent are encrypted, described search keyword is encrypted, forms second
Encrypted characters string;Obtain the second encrypted characters string.When the encryption method and the first encrypted characters string of the second encrypted characters string
Encryption method it is consistent when, identical information can correspond to identical encrypted characters string, such as: search key is in the method
Name, corresponding second encrypted characters string are ab.
In an embodiment of the invention, in order to guarantee matched accuracy, the specific embodiment of step 604, comprising:
When the second encrypted characters string belongs to a part of target the first encrypted characters string in each first encrypted characters string
When, determine that the second encrypted characters string matches with the first encrypted characters of target string.Such as: above-mentioned second encrypted characters
String ab is a part of the first encrypted characters string abcdefg, then illustrates the second encrypted characters string and the first encrypted characters String matching.
Below by taking government data polyplant, data provide the interactive process at end and terminal room as an example, expansion illustrates government affairs
Data aggregation method, as shown in fig. 7, the government data polymerization may include steps of:
Step 701: the first encryption interface of government data polyplant setting and the second encryption interface;
The first encryption interface is primarily to mention the open offer end of data offer end such as government data and collage-credit data
For end etc. in critical data encrypted, this second encryption interface primarily to ciphering terminal send search key,
In addition, government data polyplant is respectively that irreversible encryption method is arranged in the first encryption interface in this step, second adds
Touch mouth and irreversible encryption method is set, and the irreversible encryption method in this two encryption interfaces is consistent, from
And guarantee that the subsequent encrypted characters String matching to formation is accurate.
Step 702: providing end in data and symmetric encryption method is set;
In the symmetric encryption method that the step is arranged primarily to providing what end was separated to data in subsequent step
The information of paying taxes etc. of sensitive data such as user encrypts, and the symmetric encryption method can make the terminal solution with authorized agreement
The sensitive data of the close encryption, to guarantee the safety of data.
Step 703: data provide the data that end identifies itself storage;
Such as: when it is tax system that data, which provide end, the data of tax system storage are mainly relevant with the tax
Government data, when it is public security system that data, which provide end, which is mainly personal essential information of user etc..
Step 704: data provide end and isolate critical data and sensitive data from data;
Such as: for tax system from the data that itself is stored, the critical data isolated is Business Name, legal person, company
Address etc., sensitive data are company's tax affairs etc.;From the data that itself is stored, the critical data isolated is public security system
Name, identification card number, gender etc., sensitive data are home address, phone, work unit etc..
Step 705: data are provided end and are encrypted sensitive data using symmetric cryptography;
That is the tax system of above-mentioned steps 704 encrypts tax affairs;Public security system is to home address, phone, work
Office etc. is encrypted
Step 706: data provide end and critical data are sent to government data polyplant;
Step 707: providing the critical data that end is sent to each data by the first encryption interface and encrypt, formed
First encrypted characters string;
The process of step 706 and step 707 completes the encryption to critical data, since encryption is irreversible encryption, i.e.,
Encrypted critical data is also encryption for government data polyplant, and government data polyplant can not be to this
The critical data of encryption is decrypted, to ensure that the safety of critical data.
Step 708: government data polyplant stores the first encrypted characters string into pre-set index list;
Step 709: providing each first encrypted characters string to end with corresponding data and establish corresponding relationship;
By taking the tax system and public security system that above-mentioned steps refer to as an example, the detailed process of step 708 and step 709: right
Critical data Business Name, legal person, the CompanyAddress etc. that tax system is isolated, which encrypt, forms encrypted characters string 1, and
Make the encrypted characters string 1 corresponding with tax system in index list;It is name, identity to the critical data that public security system is isolated
Card number, gender etc. carry out encryption and form encrypted characters string 2, and make the encrypted characters string 2 and public security system pair in index list
It answers.
Step 710: data provide end and store corresponding first encrypted characters string, and establish the first encrypted characters string and sensitivity
Index relative between data;
The data of the step provide end and store the first encrypted characters string primarily to being further ensured that data provide end
Safety, even if the process of entire data sharing is completed in the case where data encryption.Such as: tax system is to encryption
Character string 1 is stored, and establishes the index relative between the corresponding encrypted sensitive data 1 of the encrypted characters string 1, i.e., from
Encrypted characters string 1 can find sensitive data 1.
Above-mentioned each step is primarily to the basis that the realization of subsequent step carries out prepares, by above steps
Each data provide the respective data that end is still respectively held, while being encrypted to data, guarantee the peace of data sharing
Quan Xing, and government data polyplant only stores encrypted critical data, and critical data cannot be decrypted, it is protecting
While holding government data privatization, the shared of government data is realized.
Step 711: the search key and authorized agreement sent by the second encryption interface terminal, it is crucial to search
Word is encrypted, and the second encrypted characters string is formed;
Such as: user sends the authorized agreement that search key is Business Name and the terminal by terminal, then to key
Word Business Name is encrypted.For another example search key is name, corresponding second encryption of name formed by the step
Character string is ab.
Step 712: the second encrypted characters string and each first encrypted characters string in index list are matched;
Such as: the second encrypted characters string ab successively with the first encrypted characters string 12345,67890 in index list,
Abcdefg etc. is matched.
Step 713: determining target the first encrypted characters string to match with the second encrypted characters string;
The specific implementation process of the step: when the second encrypted characters string belongs to the target in each first encrypted characters string
When a part of one encrypted characters string, determine that the second encrypted characters string matches with target the first encrypted characters string.Such as: it is above-mentioned
A part in second encrypted characters string ab and the first encrypted characters string abcdefg is consistent, then illustrates the second encrypted characters string ab
It is matched with the first encrypted characters string abcdefg.Two not quite identical reasons of encrypted characters string are, search key is often only
It is a part of above-mentioned critical data and is not necessarily complete critical data.
Step 714: according to corresponding relationship, the second encrypted characters string and authorized agreement being sent to the first encrypted characters of target
Corresponding target data of going here and there provides end;
Above-mentioned steps 709 have had built up the corresponding relationship between the first encrypted characters string and data offer end, then logical
Above-mentioned corresponding relationship is crossed to be easy to find target the first encrypted characters string corresponding target data offer end.
Step 715: target data provides end according to the second encrypted characters string and authorized agreement, determines encrypted sensitive number
According to, and encrypted sensitive data is sent to government data polyplant;
Step 716: government data polyplant receives encrypted sensitive data, and according to authorized agreement, after encryption
Sensitive data be sent to terminal.
Since in above-mentioned steps 710, providing end in each data is the first encrypted characters string and encrypted sensitive number
Corresponding relationship is established after data offer end confirms that authorized agreement is correct again according to, and encrypted sensitive data is passed through into political affairs
Business data aggregate device is sent to terminal, and what this process government data polyplant obtained is the sensitive data of encryption, and only
There is the terminal with authorized agreement that sensitive data could be decrypted, to ensure that the safety of government data.
According to above scheme, various embodiments of the present invention are at least had the following beneficial effects:
1. providing each data in end by each data that polymerized unit receives the peripheral hardware provides pair that end is sent
The the first encrypted characters string answered, by each first encrypted characters string polymerize, and by each first encrypted characters string with it is corresponding
Data provide end and establish corresponding relationship;The second encrypted characters string of the terminal transmission of peripheral hardware is received by searching for indexing units and is awarded
Agreement is weighed, and each first encrypted characters string that the second encrypted characters string is polymerize with the polymerized unit matches, really
Fixed target the first encrypted characters string to match with the second encrypted characters string, the corresponding pass established according to the polymerized unit
The second encrypted characters string and authorized agreement, are sent to the target of the corresponding peripheral hardware of the first encrypted characters of target string by system
Data provide end;The encryption data sent by the target data offer end that data transmission unit receives the peripheral hardware, and according to
The encryption data, is sent to the terminal of the peripheral hardware, due to above-mentioned by the authorized agreement searching indexing units and receiving
The process that government data polyplant carries out data transmission is data such as the encrypted characters string and encryption data etc. of encryption, from
And it ensure that carrying out safety to government data shares.
2. providing end hair to each data of peripheral hardware by the way that irreversible encryption method is arranged in the first encryption interface
The critical data sent is encrypted, and the first encrypted characters string is formed, by the way that irreversible encryption side is arranged in the second encryption interface
Method, the keyword sent to the terminal of peripheral hardware encrypt, and form the second encrypted characters string, fill so that polymerizeing into government data
The data set are that ensure that the safety of data transmission procedure by encryption.
3. the government data polyplant in the embodiment of the present invention only carries out the encryption of critical data, encrypted crucial number
According to the matching between encrypted keyword, and determine that target data provides end, and sensitive data is still each data
It provides end oneself to hold, while keeping government data privatization, realizes the shared of government data.
It should be noted that, in this document, such as first and second etc relational terms are used merely to an entity
Or operation is distinguished with another entity or operation, is existed without necessarily requiring or implying between these entities or operation
Any actual relationship or order.Moreover, the terms "include", "comprise" or its any other variant be intended to it is non-
It is exclusive to include, so that the process, method, article or equipment for including a series of elements not only includes those elements,
It but also including other elements that are not explicitly listed, or further include solid by this process, method, article or equipment
Some elements.In the absence of more restrictions, the element limited by sentence " including a 〃 ", is not arranged
Except there is also other identical factors in the process, method, article or apparatus that includes the element.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light
In the various media that can store program code such as disk.
Finally, it should be noted that the foregoing is merely presently preferred embodiments of the present invention, it is merely to illustrate skill of the invention
Art scheme, is not intended to limit the scope of the present invention.Any modification for being made all within the spirits and principles of the present invention,
Equivalent replacement, improvement etc., are included within the scope of protection of the present invention.