CN108763955A - Running data sharing method and device, system and computer storage media - Google Patents

Running data sharing method and device, system and computer storage media Download PDF

Info

Publication number
CN108763955A
CN108763955A CN201810484912.9A CN201810484912A CN108763955A CN 108763955 A CN108763955 A CN 108763955A CN 201810484912 A CN201810484912 A CN 201810484912A CN 108763955 A CN108763955 A CN 108763955A
Authority
CN
China
Prior art keywords
data
running data
access request
running
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810484912.9A
Other languages
Chinese (zh)
Other versions
CN108763955B (en
Inventor
吴满原
佘士东
郭成
沈海寅
季申
翟翌华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Turing Singularity Intelligent Technology Co Ltd
Leauto Intelligent Technology Beijing Co Ltd
Original Assignee
Shenzhen Turing Singularity Intelligent Technology Co Ltd
Leauto Intelligent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Turing Singularity Intelligent Technology Co Ltd, Leauto Intelligent Technology Beijing Co Ltd filed Critical Shenzhen Turing Singularity Intelligent Technology Co Ltd
Priority to CN201810484912.9A priority Critical patent/CN108763955B/en
Publication of CN108763955A publication Critical patent/CN108763955A/en
Application granted granted Critical
Publication of CN108763955B publication Critical patent/CN108763955B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the invention discloses a kind of running data sharing method and device, system and computer storage medias, wherein method includes:The access request that request accesses running data is received, the access request includes user account information;The corresponding default access of the access request is obtained based on the user account information, the corresponding accessible database of the default access is obtained in the intelligent contract to prestore from block chain;Arrange at least one default access and its accessible database in the intelligence contract;Based on the running data access request corresponding running data or result of calculation are obtained from the accessible database, the result of calculation is that running data calculates acquisition by Secure, the embodiment of the present invention ensure that running data is not easy to be tampered and cancel, and ensure that the authenticity of running data, improves the safety of running data.

Description

Running data sharing method and device, system and computer storage media
Technical field
The present invention relates to data sharing technology, especially a kind of running data sharing method and device, system and computer Storage medium.
Background technology
As the technologies such as internet, big data, cloud computing, artificial intelligence, 3D printing enter automotive field, automobile industry into Enter the particular time changed comprehensively.The challenge greatly of the energy, environment, traffic congestion, safety four forces automobile industry to make the energy, mutual Connection, the intelligent three great revolutionary movements are changed.The arriving in big data epoch makes data sharing become inevitable, but is related to the number of privacy of user It is desirable to be protected according to, user.
Invention content
A kind of running data technology of sharing provided in an embodiment of the present invention.
One side according to the ... of the embodiment of the present invention, a kind of running data sharing method provided, including:
The access request that request accesses running data is received, the access request includes user account information;
The corresponding default access of the access request, the intelligence to prestore from block chain are obtained based on the user account information The corresponding accessible database of the default access is obtained in contract;Arrange in the intelligence contract at least one default access and Its accessible database;
Corresponding running data is obtained from the accessible database or calculate knot based on the running data access request Fruit, the result of calculation are that running data calculates acquisition by Secure.
Optionally, the traveling object includes following any one or more:Vehicle, aircraft, robot, ship.
Optionally, the running data includes at least one of following:Spare parts logistics data, running state data.
Optionally, the accessible database includes the block chain and database.
Optionally, in the block chain further include the corresponding relevant information of running data or result of calculation in the database Corresponding relevant information;
It is described that corresponding running data or meter are obtained from the accessible database based on the running data access request It calculates as a result, including:
Block chain is corresponded in response to the default access, is obtained from the block chain based on the running data access request Running data or result of calculation;
In response to the default access correspondence database, passed through in the block chain based on the running data access request Relevant information obtain running data or result of calculation from the database.
Optionally, the corresponding relevant information of the running data or the corresponding relevant information of the result of calculation include following It is at least one:Summary info, file id information, running data access request uniform resource locator.
Optionally, the corresponding relevant information of the running data further includes digital signature;
The digital signature is obtained by digital digest by asymmetric encryption, and the digital digest is based on the traveling number It is obtained according to Hash operation is carried out.
Optionally, described that corresponding traveling number is obtained from the accessible database based on the running data access request According to, including:
Based on the running data access request corresponding traveling report is obtained from the accessible database;The traveling It reports to encode based on the running data for reaching preset condition and obtain, the preset condition includes following at least one:Preset quantity, Preset period of time, predeterminable event;
The traveling is reported and is decoded, running data is obtained.
Optionally, described that corresponding traveling report is obtained from the accessible database based on the running data access request It accuses, including:
Based on the running data access request from the accessible database obtain corresponding encryption data and it is described plus The corresponding key of ciphertext data obtains the traveling report based on encryption data described in the secret key decryption;
Or, obtaining corresponding traveling report from the accessible database based on the running data access request.
Optionally, the traveling report includes following at least one:Urgent running data report, common running data report It accuses;
Described report the traveling decodes, and obtains running data, including:
Include time data memory or datum number storage amount in response to the running data access request, to described common Running data report decoding, obtains corresponding running data;
Include data storage events in response to the running data access request, to the urgent running data report solution Code, obtains corresponding running data.
Optionally, further include:
Running data based on acquisition traveling object corresponding to the running data of the acquisition carries out analyzing processing, Determine the operating status of the traveling object and/or the spare parts logistics of the traveling object.
Other side according to the ... of the embodiment of the present invention, a kind of running data sharing means provided, including:
Request reception unit, the access request of running data is accessed for receiving request, and the access request includes using Family account information;
Permission determination unit, for obtaining the corresponding default access of the access request based on the user account information, The corresponding accessible database of the default access is obtained in the intelligent contract to prestore from block chain;Arrange in the intelligence contract At least one default access and its accessible database;
Data capture unit, it is corresponding for being obtained from the accessible database based on the running data access request Running data or result of calculation, the result of calculation are that running data calculates acquisition by Secure.
Optionally, the traveling object includes following any one or more:Vehicle, aircraft, robot, ship.
Optionally, the running data includes at least one of following:Spare parts logistics data, running state data.
Optionally, the accessible database includes the block chain and database.
Optionally, in the block chain further include the corresponding relevant information of running data or result of calculation in the database Corresponding relevant information;
The data capture unit is specifically used for corresponding to block chain in response to the default access, is based on the traveling number According to access request running data or result of calculation are obtained from the block chain;In response to the default access correspondence database, base Running data or meter are obtained from the database by the relevant information in the block chain in the running data access request Calculate result.
Optionally, the corresponding relevant information of the running data or the corresponding relevant information of the result of calculation include following It is at least one:Summary info, file id information, running data access request uniform resource locator.
Optionally, the corresponding relevant information of the running data further includes digital signature;
The digital signature carries out asymmetric encryption acquisition by digital digest, and the digital digest is based on the traveling number It is obtained according to Hash operation is carried out.
Optionally, the data capture unit, including:
Report acquisition module, it is corresponding for being obtained from the accessible database based on the running data access request Traveling report;The traveling report is obtained based on the running data for reaching preset condition by coding, and the preset condition includes Following at least one:Preset quantity, preset period of time, predeterminable event;
Decoder module is decoded for reporting the traveling, obtains running data.
Optionally, the report acquisition module is specifically used for may have access to from described based on the running data access request Database obtains corresponding encryption data and the corresponding key of the encryption data, based on encrypting number described in the secret key decryption According to the acquisition traveling report;Or, obtaining corresponding row from the accessible database based on the running data access request Sail report.
Optionally, the traveling report includes following at least one:Urgent running data report, common running data report It accuses;
The decoder module is specifically used in response to the running data access request including time data memory or number Corresponding running data is obtained to the common running data report decoding according to storage quantity;It is visited in response to the running data It asks that request includes data storage events, to the urgent running data report decoding, obtains corresponding running data.
Optionally, further include:
Data analysis unit, for the running data based on the acquisition to the corresponding traveling of the running data of the acquisition Object carries out analyzing processing, determines the operating status of the traveling object and/or the spare parts logistics of the traveling object.
Other side according to the ... of the embodiment of the present invention, a kind of running data shared system provided, including:As described above Running data sharing means.
Other side according to the ... of the embodiment of the present invention, a kind of computer storage media provided, for storing computer The instruction that can be read, described instruction are performed the operation for executing running data sharing method as described above.
A kind of running data sharing method and device, the system and computer provided based on the above embodiment of the present invention is stored Medium receives the access request that request accesses running data;The corresponding default power of access request is obtained based on user account information It limits, the corresponding accessible database of default access is obtained in the intelligent contract to prestore from block chain;Arrange at least in intelligent contract A kind of default access and its accessible database;Based on running data access request corresponding traveling is obtained from accessible database Data or result of calculation ensure that running data is not easy to be tampered and cancel, and ensure that the authenticity of running data, improve row Sail the safety of data.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Description of the drawings
The attached drawing of a part for constitution instruction describes the embodiment of the present invention, and together with description for explaining The principle of the present invention.
The present invention can be more clearly understood according to following detailed description with reference to attached drawing, wherein:
Fig. 1 is the flow chart of running data sharing method one embodiment of the present invention.
Fig. 2 is the structural schematic diagram of running data sharing means one embodiment of the present invention.
Specific implementation mode
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should be noted that:Unless in addition having Body illustrates that the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The range of invention.
Simultaneously, it should be appreciated that for ease of description, the size of attached various pieces shown in the drawings is not according to reality Proportionate relationship draw.
It is illustrative to the description only actually of at least one exemplary embodiment below, is never used as to the present invention And its application or any restrictions that use.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as part of specification.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it need not be further discussed in subsequent attached drawing in a attached drawing.
Existing data sharing method includes two kinds:When it is open shared, it is accessed second is that authorizing, and running data is related to Privacy concern, the problem of being related to data ownership, access so belonging to mandate mostly.At present information leakage have become one it is general Time social concern, by authorize access can not thoroughly solve the problems, such as information leakage.
Fig. 1 is the flow chart of running data sharing method one embodiment of the present invention.As shown in Figure 1, the embodiment method Including:
Step 110, the access request that request accesses running data is received.
Wherein, access request includes user account information.
Optionally, running data can be received by external client or other equipment that can be communicated with block chain Access request, such as:Access request institute acquisition request is running data.
Step 120, it is based on user account information and obtains the corresponding default access of access request, the intelligence to prestore from block chain The corresponding accessible database of default access is obtained in contract.
Accessible database includes block chain and database,
Wherein, arrange at least one default access and its accessible database in intelligent contract.Intelligent contract (Smart Contract) it is a kind of computer protocol for being intended to that contract is propagated, verified or executed in a manner of information-based.Intelligent contract allows Do not have it is third-party in the case of carry out credible transaction, these transaction are traceable and irreversible.The intelligent contract of the present embodiment application Appointment function, the accessible database that can be accessed the corresponding default access of user account information arranges, difference power Limit may have access to the database of different security classifications.
Step 130, running data access request is based on to obtain corresponding running data from accessible database or calculate knot Fruit.
Wherein, result of calculation is that running data calculates acquisition by Secure.
Optionally, traveling object can include but is not limited to following any one or more:Vehicle, aircraft, robot, ship Only.Wherein vehicle may include various vehicles, such as:Automobile, train, subway and other modes of transport.
Optionally, running data can include but is not limited at least one of following:Spare parts logistics data, operation shape State data.
Spare parts logistics data refer to the operating state data of each parts in traveling object, such as:Engine data, wheel Tyre data, transmission system data etc..Running state data refers to each item data for travelling object in operating status, such as:Vehicle GPS location data, vehicle speed data etc..The embodiment of the present invention does not do the type and quantity for the running data that traveling object reports It limits.
Under the conditions of multi-party computations are mainly for the peer-to-peer network based on block chain, management or operation data between tissue, Not only there is the characteristics of distributivity, isomerism, key also relates to numerous tissues and is unwilling disclosed private data information, weight Point solves while the private data information for protecting each tissue, and can realize data sharing, data verification and data analysis The Coordination Decisions problems such as excavation, support is provided for coordination Optimal Decision-making.
Multi-party computations mainly realize following several respects function:
(1) privacy inputted:More information, Neng Goucong can be obtained without either party from output as defined in it Obtaining information in the input of its other party can only derive from output.
(2) correctness:The result that each party obtains should be ensured that it is correct.
(3) independence inputted:It is to be necessarily independent of the input of honesty side to carry out that destruction side, which selects the input of oneself,.
(4) ensure the correct delivery of output:Destruction side cannot prevent honesty side from obtaining their output.
(5) fairness:Their output is obtained and if only if honesty side, destruction side should also acquire their output.
It is divided into cryptography base support and multi-party computations realizes two large divisions.Wherein, multi-party computations achievement unit Divide and includes:Data anonymousization processing, the data verification based on zero-knowledge proof, the distributed data digging based on homomorphic cryptography Deng.
Optionally, running data may include the spare parts logistics data and operating status in travelling object driving process At least one of data.Such as:Running data may include:Travel the current GPS location data of object, engine data, Tire data, temperature data, vehicle speed data, transmission system data etc..Type of the embodiment of the present invention to the running data of acquisition It is not limited with quantity.
Based on a kind of running data sharing method that the above embodiment of the present invention provides, receives request and access running data Access request;Based on the corresponding default access of user account information acquisition access request, in the intelligent contract to prestore from block chain Obtain the corresponding accessible database of default access;Arrange at least one default access and its addressable data in intelligent contract Library;Corresponding running data or result of calculation are obtained from accessible database based on running data access request, ensure that traveling Data are not easy to be tampered and cancel, and ensure that the authenticity of running data, improve the safety of running data.
Further include the corresponding related letter of running data in database in one or more optional embodiments, in block chain Breath or the corresponding relevant information of result of calculation;
Step 130 includes:
Block chain is corresponded in response to default access, running data or meter are obtained from block chain based on running data access request Calculate result;
In response to default access correspondence database, based on running data access request by the relevant information in block chain from Database obtains running data or result of calculation.
Optionally, the corresponding relevant information of running data or the corresponding relevant information of result of calculation can include but is not limited to Following at least one:Summary info, file id information, running data access request uniform resource locator (URL).By these phases Close information preservation in block chain, it can be achieved that by block chain to database in running data inquiry.
In the present embodiment, the corresponding authority information of different access account is preserved by block chain, different authority informations can To access different grades of data, it is alternatively possible to which data are divided by different brackets:1) public data:For example, as long as It is and travels the data that object identity separates be public data, public data is including but not limited to following two: 1, the specific statistical data for exercising object, such as traveling object real time position cannot be traced, is making region real-time statistics from the background, These statistical informations can be public data, but its initial data is not public data;2, specific enforcement object can be traced, but Object is exercised according to initial data disclosed in contract or legal provisions or its statistical data.
2) private data:In particular to the protected data for needing multi-party computations to handle, initial data only has very much The account of limit can be accessed directly, for example the account of only car owner oneself can access, and other visitors can only pass through safety In many ways the processing calculated accesses its secondary output information.Such as vehicle insurance price, it can be in the daily travel route of non-disclosre car owner In the case of, the result of calculation obtained by multi-party computations method is obtained, carries out exercising path risk assessment.Wherein, safety Multi-party computational methods can realize the demand of data sharing, data operation, while can preferably meet the private data letter of each tissue The protection of breath solves the collaboration meter of protection privacy between the participant (data providing and comprehensive operation side) of one group of mutual mistrust Calculation problem, multi-party computations SMC will ensure the independence of input, the correctness of calculating, while not reveal each input value to ginseng With other members of calculating.Under the conditions of multi-party computations system is mainly for the peer-to-peer network based on block chain, managed between tissue , not only there is the characteristics of distributivity, isomerism in reason or operation data, key also relate to numerous tissues be unwilling it is disclosed hidden Private data information, emphasis solves while the private data information for protecting each tissue, and can realize that data sharing, data are tested The Coordination Decisions problem such as card and data analysis mining, support is provided for coordination Optimal Decision-making.Multi-party computations system master Realize following several respects function:The privacy of input:It can be obtained from output as defined in it without either party more Information, can obtain information from the input of its other party can only derive from output;Correctness:The result that each party obtains is answered The guarantee its be correct;The independence of input:It is to be necessarily independent of the input of honesty side that destruction side, which selects the input of oneself, It carries out;Ensure the correct delivery of output:Destruction side cannot prevent honesty side from obtaining their output;Fairness:And if only if Honesty side obtains their output, and destruction side should also acquire their output.
3) data are generally protected:Such data are also private data, but because multi-party computations technique algorithm is more multiple Miscellaneous, operand is big, from cost performance angle, still needs to retain traditional data mandate access method, that is, referred to herein as one As protect data.
It for private data, cannot directly read, block chain can be (more according to the mode input of authority information, reading data Fang Anquan computational methods), reading object (access account) etc., by " data verification based on zero-knowledge proof " and " based on together The encrypted distributed data digging of state " method obtains the corresponding running data of running data access request and passes through Secure meter Obtained result of calculation.
Zero-knowledge proof, which refers to a side (certifier), not to provide any privacy information to another party (verifier) Under the premise of so that another party can be confident that some judgement is correct.It is substantially a kind of agreement being related to two sides, therein One side is known as certifier, and another party is known as verifier, it was demonstrated that person claims that it has grasped certain information to verifier, and both sides press It being interacted according to specific protocol so that verifier believes or vetos claiming for certifier, and in the whole process, verifier does not have Obtain the particular content for institute's Information that certifier claims.Data verification of the present embodiment meaning based on zero-knowledge proof refer to Obtained result of calculation is verified by zero-knowledge proof realization, to determine its reliability.
Homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.To the number Jing Guo homomorphic cryptography According to being handled to obtain an output, this output is decrypted, result handles the original of unencryption with Same Way Output that data obtain is the result is that the same.
Data anonymousization processing ensure that privacy and the safety of data, and data anonymousization processing refers to that data is avoided to dig Pick person contacts original truthful data, or goes out sensitive pattern or information by individual marking attribute excavation, and then protects private data.
Initial data all properties are divided into two class of Sensitive Attributes and non-sensitive attribute by data anonymousization processing, wherein quick Sense attribute is the property set comprising user sensitive information, and non-sensitive attribute is the not interested attribute of data miner.The part Including two big functions:Inhibit function, hides Sensitive Attributes, prevent third party from being in direct contact repressed attribute;Extensive function, The mode of occurrence, the replacement to original truthful data and summary are substituted by using a range.
The processing of data above anonymization and the data verification based on zero-knowledge proof and the distributed number based on homomorphic cryptography Individually running data can be handled according to excavating, running data can also be handled respectively;
When data anonymousization processing is used alone, it can be preserved during running data reports, or in running data Cheng Zhong, or in travelling data sharing process, handled using data anonymousization;It hides for what is handled by data anonymous Name data, are accessed by access interface;It is real-time by access interface when carrying out data anonymousization processing in shared procedure Data anonymous processing is carried out to running data.
When data verification based on zero-knowledge proof and the distributed data digging based on homomorphic cryptography is used alone, it can visit Ask that preserved in database is running data, and in shared procedure, running data is tested by the data based on zero-knowledge proof Card and the distributed data digging based on homomorphic cryptography handle to obtain result of calculation.
Simultaneously using data anonymousization processing, the data verification based on zero-knowledge proof and the distribution based on homomorphic cryptography When data mining, what is preserved in accessible database is anonymous data;Anonymous data is the running data to traveling object acquisition It handles to obtain by data anonymous, data anonymousization processing can be that process is reported to carry out or carry out in preservation process; In shared procedure, to anonymous data by data verification based on zero-knowledge proof and based on the distributed data of homomorphic cryptography Excavation handles to obtain result of calculation.
Optionally, private data can also support big data extracts to read, but equally cannot directly access a certain traveling pair The specifying information of elephant only can extract the method read by big data, read a certain number of traveling object data informations or Its statistical information of person again may be by " data verification based on zero-knowledge proof " and " the distributed number based on homomorphic cryptography According to excavation " method acquisition.
Optionally, the corresponding relevant information of running data further includes digital signature, and digital signature is carried out by digital digest Asymmetric encryption obtains, and digital digest is based on running data progress Hash operation and obtains.
Optionally, can be by travelling the traveling stored in the car-mounted device of object to the asymmetric encryption of digital digest Object private key carries out asymmetric encryption to digital digest, obtains digital signature, can be with by being digitally signed to running data Ensure the authenticity of data.
Encryption for running data and being digitally signed is realized in travelling object.
In one or more optional embodiments, step 130 may include:
Based on running data access request corresponding traveling report is obtained from accessible database;Traveling report is based on reaching The running data of preset condition is obtained by coding;
Wherein, preset condition can include but is not limited to following at least one:Preset quantity, is preset preset period of time Event;
To traveling report decoding, running data is obtained.
The running data that report can be all in setting time is travelled, or based on all relevant of particular event preservation Running data preserves running data in the form of travelling and reporting, it is ensured that can obtain related traveling in batches when accessing Data improve access efficiency.
Optionally, obtaining corresponding traveling report from accessible database based on running data access request may include:
Corresponding encryption data and key are obtained from accessible database based on running data access request, is based on key solution The close encryption data obtains traveling report;
Or, obtaining corresponding traveling report from accessible database based on running data access request.
When the data of acquisition request are public data, it can be directly obtained traveling report, and when the data of acquisition request are When general protection data, what is got is to need to be had when acquisition request generally protects data by encrypted encryption data There are the mandate of certain term of validity, authorization message to be safeguarded in block chain, be equivalent to the intelligent contract of one be stored in block chain, The intelligence contract can specify that related access parameter (for example may have access to data item), access mandate of the account according to intelligent contract, The range of data is read in input on demand, and block chain exports a handle, and visitor cannot directly access based on block chain management Database, but the running data of the database output based on block chain management is received according to the handle.
The general protection data obtained in the present embodiment are based on after the encryption that running data is encrypted Running data, further according to encrypted running data generate traveling report, by the way that running data is encrypted and can be ensured The privacy of data.Such as:Traveling can be reported and carry out symmetric cryptography.
In one or more optional embodiments, traveling report can include but is not limited to following at least one:Promptly Running data report, the report of common running data;
To traveling report decoding, running data is obtained, including:
Include time data memory or datum number storage amount in response to running data access request, to common running data Report decryption, obtains corresponding common running data;
Include data storage events in response to running data access request, urgent running data is reported and is decoded, obtains Corresponding urgent running data.
Optionally, travelling obtaining for report can be touched by travelling the improper traveling event occurred in object driving process Hair generates urgent running data report, i.e., in response to the improper traveling event occurred in traveling object driving process, according to row It sails data and generates urgent running data report, can be triggered by predetermined period, generate common running data report, that is, be based on pre- If the period, in response to reaching predetermined period, common running data is generated according to running data and is reported;Or when data volume reaches default When data volume, running data report is generated according to running data, the preservation triggered based on data volume is realized, is preserved based on data volume Running data report equally store the corresponding time, access process is identical as common form data report.Such as:It is improper Traveling event can be traffic accident occurs for traveling object, traveling object parts break down etc..Due to common running data Report is to be stored based on predetermined period, therefore it is obtained and time correlation, as long as getting what needs accessed from access request The storage time of data, you can get corresponding common running data report;And urgent running data is reported, due to being It is triggered based on event, in shared procedure, the storage event of required access is necessarily included in access request, be based on the storage thing Part can obtain corresponding urgent running data report.
Optionally, the requirement of real-time of usually urgent running data report is higher, the real-time of common running data report It is required that it is relatively low, therefore can be higher than for the report setting of urgent running data by way of setting priority in being reported in traveling The priority of common running data report makes urgent running data report have the priority higher than the report of common running data, When sending traveling report, traveling report is made to be sent according to priority, to ensure the real-time of urgent running data report It is required that.
In one or more optional embodiments, further include:
Analyzing processing is carried out based on the running data of acquisition traveling object corresponding to the running data of acquisition, determines traveling The operating status of object and/or the spare parts logistics for travelling object.
In a particular application, the running car data based on acquisition can carry out vehicle condition analysis, according to certain specific vapour Vehicle (such as:Certain brand) operating status and/or spare parts logistics, these automobiles can be analyzed, form the industry of automobile Analysis report, the access account of Car sharing can be personal or certain collectives (such as:Motor corporation, insurance company etc.), pass through Analyzing processing is carried out to the running car data of acquisition corresponding automobile to the running car data of acquisition, can be to access account to carry For more effective information.
Such as:When it is insurance company to access account, vehicle operation data and driving habit data are based on, emphasis is directed to vehicle Condition information (such as vehicle, service life, maintenance record), vehicle often walk route accident probability, main driver driving custom (as and The spacing of nearby vehicle, lane change frequency, brake frequency, Hong throttle frequency etc.) data information, carry out intellectual analysis excavation, to Insurance company proposes vehicle insurance premium suggestion.
Insurance company uses the part, it is good for vehicle condition, often walk route accident rate is low, driving habit is good vehicle can be big Width reduces premium, promotes vehicle insurance competitiveness;It is general for vehicle condition, the new accident rate of often walking is high, the general vehicle of driving habit can To promote premium, risk is reduced.From another perspective, driver can be stimulated to promote driving rule by the leverage of vehicle insurance Model promotes safe driving, and then reduces traffic accident.
Sharing method provided by the invention applies also for transaction data or mantenance data.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light The various media that can store program code such as disk.
Fig. 2 is the structural schematic diagram of running data sharing means one embodiment of the present invention.The device of the embodiment is available In the above-mentioned each method embodiment of the realization present invention.As shown in Fig. 2, the device of the embodiment includes:
Request reception unit 21 accesses the access request of running data for receiving request.
Wherein, access request includes user account information.
Permission determination unit 22, for obtaining the corresponding default access of access request based on user account information, from block The corresponding accessible database of default access is obtained in the intelligent contract that chain prestores.
Wherein, arrange at least one default access and its accessible database in intelligent contract.
Optionally, accessible database includes block chain and database.
Data capture unit 23, for obtaining corresponding traveling number from accessible database based on running data access request According to or result of calculation.
Wherein, result of calculation is that running data calculates acquisition by Secure.
Optionally, traveling object can include but is not limited to following any one or more:Vehicle, aircraft, robot, ship Only.Wherein vehicle may include various vehicles, such as:Automobile, train, subway and other modes of transport.
Optionally, running data can include but is not limited at least one of following:Spare parts logistics data, operation shape State data.
Based on a kind of running data sharing means that the above embodiment of the present invention provides, running data access request is received; Receive the access request that request accesses running data;The corresponding default access of access request is obtained based on user account information, from The corresponding accessible database of default access is obtained in the intelligent contract that block chain prestores;Arrange in intelligent contract at least one pre- If permission and its accessible database;Based on running data access request from accessible database obtain corresponding running data or Result of calculation ensure that running data is not easy to be tampered and cancel, and ensure that the authenticity of running data, improves running data Safety.
Further include the corresponding related letter of running data in database in one or more optional embodiments, in block chain Breath or the corresponding relevant information of result of calculation;
Data capture unit 23 is specifically used for corresponding to block chain in response to default access, is based on running data access request Running data or result of calculation are obtained from block chain;In response to default access correspondence database, it is based on running data access request By the relevant information in block chain running data or result of calculation are obtained from database.
Optionally, the corresponding relevant information of running data or the corresponding relevant information of result of calculation can include but is not limited to Following at least one:Summary info, file id information, running data access request uniform resource locator (URL).
In the present embodiment, the corresponding authority information of different access account is preserved by block chain, different authority informations can To access different grades of data, it is alternatively possible to which data are divided by different brackets:1) public data:For example, as long as It is and travels the data that object identity separates be public data, such as traveling object real time position, makees on backstage Go out region real-time statistics, these statistical informations can be public data, but its initial data is not public data, initial data The data that can be and travel object identity binding.Also a kind of source of public data, exactly allows through agreement, initial data Source is disclosed data, such as oil consumption and Relationship between temperature data.
2) private data:In particular to the protected data for needing multi-party computations to handle, initial data only has very much The account of limit can be accessed directly, for example the account of only car owner oneself can access, and other visitors can only pass through safety In many ways the processing calculated accesses its secondary output information.Such as vehicle insurance price, it can be in the daily travel route of non-disclosre car owner In the case of, the result of calculation obtained by multi-party computations method is obtained, carries out exercising path risk assessment.Wherein, safety Multi-party computational methods can realize the demand of data sharing, data operation, while can preferably meet the private data letter of each tissue The protection of breath solves the collaboration meter of protection privacy between the participant (data providing and comprehensive operation side) of one group of mutual mistrust Calculation problem, multi-party computations SMC will ensure the independence of input, the correctness of calculating, while not reveal each input value to ginseng With other members of calculating.Under the conditions of multi-party computations system is mainly for the peer-to-peer network based on block chain, managed between tissue , not only there is the characteristics of distributivity, isomerism in reason or operation data, key also relate to numerous tissues be unwilling it is disclosed hidden Private data information, emphasis solves while the private data information for protecting each tissue, and can realize that data sharing, data are tested The Coordination Decisions problem such as card and data analysis mining, support is provided for coordination Optimal Decision-making.Multi-party computations system master Realize following several respects function:The privacy of input:It can be obtained from output as defined in it without either party more Information, can obtain information from the input of its other party can only derive from output;Correctness:The result that each party obtains is answered The guarantee its be correct;The independence of input:It is to be necessarily independent of the input of honesty side that destruction side, which selects the input of oneself, It carries out;Ensure the correct delivery of output:Destruction side cannot prevent honesty side from obtaining their output;Fairness:And if only if Honesty side obtains their output, and destruction side should also acquire their output.
3) data are generally protected:Such data are also private data, but because multi-party computations technique algorithm is more multiple Miscellaneous, operand is big, from cost performance angle, still needs to retain traditional data mandate access method, that is, referred to herein as one As protect data.
Optionally, the corresponding relevant information of running data further includes digital signature, and digital signature is passed through by digital digest Asymmetric encryption, digital digest are based on running data progress Hash operation and obtain.
In one or more optionally embodiments, data capture unit 23 may include:
Report acquisition module, for obtaining corresponding traveling report from accessible database based on running data access request It accuses;Traveling report is obtained based on the running data for reaching preset condition by coding;
Wherein, preset condition can include but is not limited to following at least one:Preset quantity, is preset preset period of time Event.
Decoder module, for traveling report decoding, obtaining running data.
The running data that report can be all in setting time is travelled, or based on all relevant of particular event preservation Running data preserves running data in the form of travelling and reporting, it is ensured that can obtain related traveling in batches when accessing Data improve access efficiency.
Optionally, report acquisition module is specifically used for being based on running data access request from accessible database acquisition pair The encryption data and key answered are based on secret key decryption encryption data, obtain traveling report;Or, being based on running data access request Corresponding traveling report is obtained from accessible database.
Optionally, traveling report can include but is not limited to following at least one:Urgent running data report, common traveling Data report;
Decoder module is specifically used in response to running data access request including time data memory or datum number storage Amount is reported common running data and is decoded, obtains corresponding running data;Include data in response to running data access request Storage event is reported urgent running data and is decoded, obtains corresponding running data.
Optionally, further include:Data analysis unit corresponds to the running data of acquisition for the running data based on acquisition Traveling object carry out analyzing processing, determine traveling object operating status and/or travel object spare parts logistics.
In addition, the embodiment of the present invention additionally provides a kind of traveling object data storage system, including:Any of the above-described embodiment Running data sharing means.
In addition, the embodiment of the present invention additionally provides a kind of computer storage media, for storing computer-readable finger It enables, described instruction is performed the operation for the running data sharing method for executing any of the above-described embodiment of the present invention.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light The various media that can store program code such as disk.
Methods and apparatus of the present invention may be achieved in many ways.For example, can by software, hardware, firmware or Software, hardware, firmware any combinations realize methods and apparatus of the present invention.The said sequence of the step of for the method Merely to illustrate, the step of method of the invention, is not limited to sequence described in detail above, special unless otherwise It does not mentionlet alone bright.In addition, in some embodiments, also the present invention can be embodied as to record program in the recording medium, these programs Include for realizing machine readable instructions according to the method for the present invention.Thus, the present invention also covers storage for executing basis The recording medium of the program of the method for the present invention.
Description of the invention provides for the sake of example and description, and is not exhaustively or will be of the invention It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches It states embodiment and is to more preferably illustrate the principle of the present invention and practical application, and those skilled in the art is enable to manage Various embodiments with various modifications of the solution present invention to design suitable for special-purpose.

Claims (10)

1. a kind of running data sharing method, which is characterized in that including:
The access request that request accesses running data is received, the access request includes user account information;
The corresponding default access of the access request, the intelligent contract to prestore from block chain are obtained based on the user account information It is middle to obtain the corresponding accessible database of the default access;Arrange at least one default access in the intelligence contract and its can Access database;
Based on the running data access request corresponding running data or result of calculation, institute are obtained from the accessible database It is that running data calculates acquisition by Secure to state result of calculation.
2. according to the method described in claim 1, it is characterized in that, the traveling object includes following any one or more: Vehicle, aircraft, robot, ship.
3. method according to claim 1 or 2, which is characterized in that the running data includes at least one of following: Spare parts logistics data, running state data.
4. according to any methods of claim 1-3, which is characterized in that the accessible database includes the block chain And database.
5. according to the method described in claim 4, it is characterized in that, further including travelling number in the database in the block chain According to corresponding relevant information or the corresponding relevant information of result of calculation;
It is described that corresponding running data is obtained from the accessible database based on the running data access request or calculates knot Fruit, including:
Block chain is corresponded in response to the default access, is obtained and is travelled from the block chain based on the running data access request Data or result of calculation;
In response to the default access correspondence database, the phase in the block chain is passed through based on the running data access request It closes information and obtains running data or result of calculation from the database.
6. according to the method described in claim 5, it is characterized in that, the corresponding relevant information of the running data or the calculating As a result corresponding relevant information includes following at least one:Summary info, file id information, running data access request are unified to be provided Source finger URL.
7. method according to claim 5 or 6, which is characterized in that the corresponding relevant information of the running data further includes Digital signature;
The digital signature by digital digest by asymmetric encryption obtain, the digital digest be based on the running data into Row Hash operation obtains.
8. a kind of running data sharing means, which is characterized in that including:
Request reception unit accesses the access request of running data for receiving request, and the access request includes user's account Family information;
Permission determination unit, for obtaining the corresponding default access of the access request based on the user account information, from area The corresponding accessible database of the default access is obtained in the intelligent contract that block chain prestores;Arrange at least in the intelligence contract A kind of default access and its accessible database;
Data capture unit, for obtaining corresponding traveling from the accessible database based on the running data access request Data or result of calculation, the result of calculation are that running data calculates acquisition by Secure.
9. a kind of running data shared system, which is characterized in that including:Running data sharing means according to any one of claims 8.
10. a kind of computer storage media, for storing computer-readable instruction, which is characterized in that described instruction is held Perform claim requires the operation of running data sharing method described in 1 to 7 any one when row.
CN201810484912.9A 2018-05-20 2018-05-20 Travel data sharing method and apparatus, travel data sharing system, and computer storage medium Active CN108763955B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810484912.9A CN108763955B (en) 2018-05-20 2018-05-20 Travel data sharing method and apparatus, travel data sharing system, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810484912.9A CN108763955B (en) 2018-05-20 2018-05-20 Travel data sharing method and apparatus, travel data sharing system, and computer storage medium

Publications (2)

Publication Number Publication Date
CN108763955A true CN108763955A (en) 2018-11-06
CN108763955B CN108763955B (en) 2020-11-13

Family

ID=64007241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810484912.9A Active CN108763955B (en) 2018-05-20 2018-05-20 Travel data sharing method and apparatus, travel data sharing system, and computer storage medium

Country Status (1)

Country Link
CN (1) CN108763955B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617896A (en) * 2018-12-28 2019-04-12 浙江省公众信息产业有限公司 A kind of Internet of Things access control method and system based on intelligent contract
CN110648244A (en) * 2019-09-05 2020-01-03 广州亚美信息科技有限公司 Block chain-based vehicle insurance scheme generation method and device and driving data processing system
CN112073508A (en) * 2020-09-05 2020-12-11 蔡春梅 Data processing method and artificial intelligence platform based on cloud computing and block chain service
CN112149158A (en) * 2020-08-19 2020-12-29 成都飞机工业(集团)有限责任公司 3D printing multi-database sharing optimization algorithm based on homomorphic encryption technology
CN113434896A (en) * 2021-08-27 2021-09-24 豪符密码检测技术(成都)有限责任公司 Method for encrypting, protecting and using data in mineral resource and geographic space fields

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8752203B2 (en) * 2012-06-18 2014-06-10 Lars Reinertsen System for managing computer data security through portable data access security tokens
CN106911470A (en) * 2017-01-23 2017-06-30 北京航空航天大学 A kind of bit coin transaction privacy Enhancement Method
CN106992990A (en) * 2017-05-19 2017-07-28 北京牛链科技有限公司 Data sharing method and system and block catenary system and computing device
US20170244707A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for establishing secure access for users in a process data network
CN107274130A (en) * 2017-06-16 2017-10-20 合肥维天运通信息科技股份有限公司 A kind of driver's credit investigation system and method based on block chain technology and Logistics Information Platform
CN107563846A (en) * 2017-08-10 2018-01-09 深圳市易成自动驾驶技术有限公司 Shared vehicles management method, server, system and computer-readable recording medium
CN107767265A (en) * 2017-11-07 2018-03-06 中积有限公司 A kind of data sharing method and server
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN107909416A (en) * 2017-12-29 2018-04-13 深圳市轱辘车联数据技术有限公司 The method and vehicle price evaluation device of vehicle price evaluation
CN107945090A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 Vehicular exhaust data analysing method, device and server based on block chain
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8752203B2 (en) * 2012-06-18 2014-06-10 Lars Reinertsen System for managing computer data security through portable data access security tokens
US20170244707A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for establishing secure access for users in a process data network
CN106911470A (en) * 2017-01-23 2017-06-30 北京航空航天大学 A kind of bit coin transaction privacy Enhancement Method
CN106992990A (en) * 2017-05-19 2017-07-28 北京牛链科技有限公司 Data sharing method and system and block catenary system and computing device
CN107274130A (en) * 2017-06-16 2017-10-20 合肥维天运通信息科技股份有限公司 A kind of driver's credit investigation system and method based on block chain technology and Logistics Information Platform
CN107563846A (en) * 2017-08-10 2018-01-09 深圳市易成自动驾驶技术有限公司 Shared vehicles management method, server, system and computer-readable recording medium
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN107767265A (en) * 2017-11-07 2018-03-06 中积有限公司 A kind of data sharing method and server
CN107945090A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 Vehicular exhaust data analysing method, device and server based on block chain
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server
CN107909416A (en) * 2017-12-29 2018-04-13 深圳市轱辘车联数据技术有限公司 The method and vehicle price evaluation device of vehicle price evaluation

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617896A (en) * 2018-12-28 2019-04-12 浙江省公众信息产业有限公司 A kind of Internet of Things access control method and system based on intelligent contract
CN110648244A (en) * 2019-09-05 2020-01-03 广州亚美信息科技有限公司 Block chain-based vehicle insurance scheme generation method and device and driving data processing system
CN112149158A (en) * 2020-08-19 2020-12-29 成都飞机工业(集团)有限责任公司 3D printing multi-database sharing optimization algorithm based on homomorphic encryption technology
CN112073508A (en) * 2020-09-05 2020-12-11 蔡春梅 Data processing method and artificial intelligence platform based on cloud computing and block chain service
CN112073508B (en) * 2020-09-05 2021-05-04 江苏端木软件技术有限公司 Data processing method and artificial intelligence platform based on cloud computing and block chain service
CN113434896A (en) * 2021-08-27 2021-09-24 豪符密码检测技术(成都)有限责任公司 Method for encrypting, protecting and using data in mineral resource and geographic space fields

Also Published As

Publication number Publication date
CN108763955B (en) 2020-11-13

Similar Documents

Publication Publication Date Title
CN108763955A (en) Running data sharing method and device, system and computer storage media
Fraga-Lamas et al. A review on blockchain technologies for an advanced and cyber-resilient automotive industry
CN110519286B (en) Intelligent traffic data security access method based on alliance block chain
CN108734017A (en) Driving data sharing method and device, system and computer storage media
CN111050317B (en) Intelligent traffic data safety sharing method based on alliance block chain
CN111314871B (en) Safe sharing travel service scheme based on alliance block chain
US11223487B2 (en) Method and system for secure blockchain-based vehicular digital forensics
Popa et al. VPriv: Protecting privacy in location-based vehicular services
Wang et al. Secure data sharing and customized services for intelligent transportation based on a consortium blockchain
Zhou et al. Location privacy in usage-based automotive insurance: Attacks and countermeasures
Othmane et al. A survey of security and privacy in connected vehicles
CN102196431B (en) Internet of things application scene-based protection method of privacy query and private identity verification
Wang et al. Secure ride-sharing services based on a consortium blockchain
CN111464980A (en) Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
Ma et al. Blockchain-driven trusted data sharing with privacy protection in IoT sensor network
CN112292841A (en) Creating vehicle certificates with blockchains
Xu et al. Blockchain-oriented privacy protection of sensitive data in the internet of vehicles
CN112651035A (en) Data processing method, device, electronic equipment and medium
Campanile et al. Privacy regulations challenges on data-centric and iot systems: A case study for smart vehicles.
Philip et al. Secure incident & evidence management framework (SIEMF) for internet of vehicles using deep learning and blockchain
Yao et al. Accident responsibility identification model for Internet of Vehicles based on lightweight blockchain
BelMannoubi et al. A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues
CN113886878A (en) Vehicle information encryption management method and system
CN106657021A (en) Vehicle message authentication method and device in Internet of Vehicles
Patsakis et al. Privacy-aware event data recorders: cryptography meets the automotive industry again

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant