CN108763955A - Running data sharing method and device, system and computer storage media - Google Patents
Running data sharing method and device, system and computer storage media Download PDFInfo
- Publication number
- CN108763955A CN108763955A CN201810484912.9A CN201810484912A CN108763955A CN 108763955 A CN108763955 A CN 108763955A CN 201810484912 A CN201810484912 A CN 201810484912A CN 108763955 A CN108763955 A CN 108763955A
- Authority
- CN
- China
- Prior art keywords
- data
- running data
- access request
- running
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The embodiment of the invention discloses a kind of running data sharing method and device, system and computer storage medias, wherein method includes:The access request that request accesses running data is received, the access request includes user account information;The corresponding default access of the access request is obtained based on the user account information, the corresponding accessible database of the default access is obtained in the intelligent contract to prestore from block chain;Arrange at least one default access and its accessible database in the intelligence contract;Based on the running data access request corresponding running data or result of calculation are obtained from the accessible database, the result of calculation is that running data calculates acquisition by Secure, the embodiment of the present invention ensure that running data is not easy to be tampered and cancel, and ensure that the authenticity of running data, improves the safety of running data.
Description
Technical field
The present invention relates to data sharing technology, especially a kind of running data sharing method and device, system and computer
Storage medium.
Background technology
As the technologies such as internet, big data, cloud computing, artificial intelligence, 3D printing enter automotive field, automobile industry into
Enter the particular time changed comprehensively.The challenge greatly of the energy, environment, traffic congestion, safety four forces automobile industry to make the energy, mutual
Connection, the intelligent three great revolutionary movements are changed.The arriving in big data epoch makes data sharing become inevitable, but is related to the number of privacy of user
It is desirable to be protected according to, user.
Invention content
A kind of running data technology of sharing provided in an embodiment of the present invention.
One side according to the ... of the embodiment of the present invention, a kind of running data sharing method provided, including:
The access request that request accesses running data is received, the access request includes user account information;
The corresponding default access of the access request, the intelligence to prestore from block chain are obtained based on the user account information
The corresponding accessible database of the default access is obtained in contract;Arrange in the intelligence contract at least one default access and
Its accessible database;
Corresponding running data is obtained from the accessible database or calculate knot based on the running data access request
Fruit, the result of calculation are that running data calculates acquisition by Secure.
Optionally, the traveling object includes following any one or more:Vehicle, aircraft, robot, ship.
Optionally, the running data includes at least one of following:Spare parts logistics data, running state data.
Optionally, the accessible database includes the block chain and database.
Optionally, in the block chain further include the corresponding relevant information of running data or result of calculation in the database
Corresponding relevant information;
It is described that corresponding running data or meter are obtained from the accessible database based on the running data access request
It calculates as a result, including:
Block chain is corresponded in response to the default access, is obtained from the block chain based on the running data access request
Running data or result of calculation;
In response to the default access correspondence database, passed through in the block chain based on the running data access request
Relevant information obtain running data or result of calculation from the database.
Optionally, the corresponding relevant information of the running data or the corresponding relevant information of the result of calculation include following
It is at least one:Summary info, file id information, running data access request uniform resource locator.
Optionally, the corresponding relevant information of the running data further includes digital signature;
The digital signature is obtained by digital digest by asymmetric encryption, and the digital digest is based on the traveling number
It is obtained according to Hash operation is carried out.
Optionally, described that corresponding traveling number is obtained from the accessible database based on the running data access request
According to, including:
Based on the running data access request corresponding traveling report is obtained from the accessible database;The traveling
It reports to encode based on the running data for reaching preset condition and obtain, the preset condition includes following at least one:Preset quantity,
Preset period of time, predeterminable event;
The traveling is reported and is decoded, running data is obtained.
Optionally, described that corresponding traveling report is obtained from the accessible database based on the running data access request
It accuses, including:
Based on the running data access request from the accessible database obtain corresponding encryption data and it is described plus
The corresponding key of ciphertext data obtains the traveling report based on encryption data described in the secret key decryption;
Or, obtaining corresponding traveling report from the accessible database based on the running data access request.
Optionally, the traveling report includes following at least one:Urgent running data report, common running data report
It accuses;
Described report the traveling decodes, and obtains running data, including:
Include time data memory or datum number storage amount in response to the running data access request, to described common
Running data report decoding, obtains corresponding running data;
Include data storage events in response to the running data access request, to the urgent running data report solution
Code, obtains corresponding running data.
Optionally, further include:
Running data based on acquisition traveling object corresponding to the running data of the acquisition carries out analyzing processing,
Determine the operating status of the traveling object and/or the spare parts logistics of the traveling object.
Other side according to the ... of the embodiment of the present invention, a kind of running data sharing means provided, including:
Request reception unit, the access request of running data is accessed for receiving request, and the access request includes using
Family account information;
Permission determination unit, for obtaining the corresponding default access of the access request based on the user account information,
The corresponding accessible database of the default access is obtained in the intelligent contract to prestore from block chain;Arrange in the intelligence contract
At least one default access and its accessible database;
Data capture unit, it is corresponding for being obtained from the accessible database based on the running data access request
Running data or result of calculation, the result of calculation are that running data calculates acquisition by Secure.
Optionally, the traveling object includes following any one or more:Vehicle, aircraft, robot, ship.
Optionally, the running data includes at least one of following:Spare parts logistics data, running state data.
Optionally, the accessible database includes the block chain and database.
Optionally, in the block chain further include the corresponding relevant information of running data or result of calculation in the database
Corresponding relevant information;
The data capture unit is specifically used for corresponding to block chain in response to the default access, is based on the traveling number
According to access request running data or result of calculation are obtained from the block chain;In response to the default access correspondence database, base
Running data or meter are obtained from the database by the relevant information in the block chain in the running data access request
Calculate result.
Optionally, the corresponding relevant information of the running data or the corresponding relevant information of the result of calculation include following
It is at least one:Summary info, file id information, running data access request uniform resource locator.
Optionally, the corresponding relevant information of the running data further includes digital signature;
The digital signature carries out asymmetric encryption acquisition by digital digest, and the digital digest is based on the traveling number
It is obtained according to Hash operation is carried out.
Optionally, the data capture unit, including:
Report acquisition module, it is corresponding for being obtained from the accessible database based on the running data access request
Traveling report;The traveling report is obtained based on the running data for reaching preset condition by coding, and the preset condition includes
Following at least one:Preset quantity, preset period of time, predeterminable event;
Decoder module is decoded for reporting the traveling, obtains running data.
Optionally, the report acquisition module is specifically used for may have access to from described based on the running data access request
Database obtains corresponding encryption data and the corresponding key of the encryption data, based on encrypting number described in the secret key decryption
According to the acquisition traveling report;Or, obtaining corresponding row from the accessible database based on the running data access request
Sail report.
Optionally, the traveling report includes following at least one:Urgent running data report, common running data report
It accuses;
The decoder module is specifically used in response to the running data access request including time data memory or number
Corresponding running data is obtained to the common running data report decoding according to storage quantity;It is visited in response to the running data
It asks that request includes data storage events, to the urgent running data report decoding, obtains corresponding running data.
Optionally, further include:
Data analysis unit, for the running data based on the acquisition to the corresponding traveling of the running data of the acquisition
Object carries out analyzing processing, determines the operating status of the traveling object and/or the spare parts logistics of the traveling object.
Other side according to the ... of the embodiment of the present invention, a kind of running data shared system provided, including:As described above
Running data sharing means.
Other side according to the ... of the embodiment of the present invention, a kind of computer storage media provided, for storing computer
The instruction that can be read, described instruction are performed the operation for executing running data sharing method as described above.
A kind of running data sharing method and device, the system and computer provided based on the above embodiment of the present invention is stored
Medium receives the access request that request accesses running data;The corresponding default power of access request is obtained based on user account information
It limits, the corresponding accessible database of default access is obtained in the intelligent contract to prestore from block chain;Arrange at least in intelligent contract
A kind of default access and its accessible database;Based on running data access request corresponding traveling is obtained from accessible database
Data or result of calculation ensure that running data is not easy to be tampered and cancel, and ensure that the authenticity of running data, improve row
Sail the safety of data.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Description of the drawings
The attached drawing of a part for constitution instruction describes the embodiment of the present invention, and together with description for explaining
The principle of the present invention.
The present invention can be more clearly understood according to following detailed description with reference to attached drawing, wherein:
Fig. 1 is the flow chart of running data sharing method one embodiment of the present invention.
Fig. 2 is the structural schematic diagram of running data sharing means one embodiment of the present invention.
Specific implementation mode
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should be noted that:Unless in addition having
Body illustrates that the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
The range of invention.
Simultaneously, it should be appreciated that for ease of description, the size of attached various pieces shown in the drawings is not according to reality
Proportionate relationship draw.
It is illustrative to the description only actually of at least one exemplary embodiment below, is never used as to the present invention
And its application or any restrictions that use.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as part of specification.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it need not be further discussed in subsequent attached drawing in a attached drawing.
Existing data sharing method includes two kinds:When it is open shared, it is accessed second is that authorizing, and running data is related to
Privacy concern, the problem of being related to data ownership, access so belonging to mandate mostly.At present information leakage have become one it is general
Time social concern, by authorize access can not thoroughly solve the problems, such as information leakage.
Fig. 1 is the flow chart of running data sharing method one embodiment of the present invention.As shown in Figure 1, the embodiment method
Including:
Step 110, the access request that request accesses running data is received.
Wherein, access request includes user account information.
Optionally, running data can be received by external client or other equipment that can be communicated with block chain
Access request, such as:Access request institute acquisition request is running data.
Step 120, it is based on user account information and obtains the corresponding default access of access request, the intelligence to prestore from block chain
The corresponding accessible database of default access is obtained in contract.
Accessible database includes block chain and database,
Wherein, arrange at least one default access and its accessible database in intelligent contract.Intelligent contract (Smart
Contract) it is a kind of computer protocol for being intended to that contract is propagated, verified or executed in a manner of information-based.Intelligent contract allows
Do not have it is third-party in the case of carry out credible transaction, these transaction are traceable and irreversible.The intelligent contract of the present embodiment application
Appointment function, the accessible database that can be accessed the corresponding default access of user account information arranges, difference power
Limit may have access to the database of different security classifications.
Step 130, running data access request is based on to obtain corresponding running data from accessible database or calculate knot
Fruit.
Wherein, result of calculation is that running data calculates acquisition by Secure.
Optionally, traveling object can include but is not limited to following any one or more:Vehicle, aircraft, robot, ship
Only.Wherein vehicle may include various vehicles, such as:Automobile, train, subway and other modes of transport.
Optionally, running data can include but is not limited at least one of following:Spare parts logistics data, operation shape
State data.
Spare parts logistics data refer to the operating state data of each parts in traveling object, such as:Engine data, wheel
Tyre data, transmission system data etc..Running state data refers to each item data for travelling object in operating status, such as:Vehicle
GPS location data, vehicle speed data etc..The embodiment of the present invention does not do the type and quantity for the running data that traveling object reports
It limits.
Under the conditions of multi-party computations are mainly for the peer-to-peer network based on block chain, management or operation data between tissue,
Not only there is the characteristics of distributivity, isomerism, key also relates to numerous tissues and is unwilling disclosed private data information, weight
Point solves while the private data information for protecting each tissue, and can realize data sharing, data verification and data analysis
The Coordination Decisions problems such as excavation, support is provided for coordination Optimal Decision-making.
Multi-party computations mainly realize following several respects function:
(1) privacy inputted:More information, Neng Goucong can be obtained without either party from output as defined in it
Obtaining information in the input of its other party can only derive from output.
(2) correctness:The result that each party obtains should be ensured that it is correct.
(3) independence inputted:It is to be necessarily independent of the input of honesty side to carry out that destruction side, which selects the input of oneself,.
(4) ensure the correct delivery of output:Destruction side cannot prevent honesty side from obtaining their output.
(5) fairness:Their output is obtained and if only if honesty side, destruction side should also acquire their output.
It is divided into cryptography base support and multi-party computations realizes two large divisions.Wherein, multi-party computations achievement unit
Divide and includes:Data anonymousization processing, the data verification based on zero-knowledge proof, the distributed data digging based on homomorphic cryptography
Deng.
Optionally, running data may include the spare parts logistics data and operating status in travelling object driving process
At least one of data.Such as:Running data may include:Travel the current GPS location data of object, engine data,
Tire data, temperature data, vehicle speed data, transmission system data etc..Type of the embodiment of the present invention to the running data of acquisition
It is not limited with quantity.
Based on a kind of running data sharing method that the above embodiment of the present invention provides, receives request and access running data
Access request;Based on the corresponding default access of user account information acquisition access request, in the intelligent contract to prestore from block chain
Obtain the corresponding accessible database of default access;Arrange at least one default access and its addressable data in intelligent contract
Library;Corresponding running data or result of calculation are obtained from accessible database based on running data access request, ensure that traveling
Data are not easy to be tampered and cancel, and ensure that the authenticity of running data, improve the safety of running data.
Further include the corresponding related letter of running data in database in one or more optional embodiments, in block chain
Breath or the corresponding relevant information of result of calculation;
Step 130 includes:
Block chain is corresponded in response to default access, running data or meter are obtained from block chain based on running data access request
Calculate result;
In response to default access correspondence database, based on running data access request by the relevant information in block chain from
Database obtains running data or result of calculation.
Optionally, the corresponding relevant information of running data or the corresponding relevant information of result of calculation can include but is not limited to
Following at least one:Summary info, file id information, running data access request uniform resource locator (URL).By these phases
Close information preservation in block chain, it can be achieved that by block chain to database in running data inquiry.
In the present embodiment, the corresponding authority information of different access account is preserved by block chain, different authority informations can
To access different grades of data, it is alternatively possible to which data are divided by different brackets:1) public data:For example, as long as
It is and travels the data that object identity separates be public data, public data is including but not limited to following two:
1, the specific statistical data for exercising object, such as traveling object real time position cannot be traced, is making region real-time statistics from the background,
These statistical informations can be public data, but its initial data is not public data;2, specific enforcement object can be traced, but
Object is exercised according to initial data disclosed in contract or legal provisions or its statistical data.
2) private data:In particular to the protected data for needing multi-party computations to handle, initial data only has very much
The account of limit can be accessed directly, for example the account of only car owner oneself can access, and other visitors can only pass through safety
In many ways the processing calculated accesses its secondary output information.Such as vehicle insurance price, it can be in the daily travel route of non-disclosre car owner
In the case of, the result of calculation obtained by multi-party computations method is obtained, carries out exercising path risk assessment.Wherein, safety
Multi-party computational methods can realize the demand of data sharing, data operation, while can preferably meet the private data letter of each tissue
The protection of breath solves the collaboration meter of protection privacy between the participant (data providing and comprehensive operation side) of one group of mutual mistrust
Calculation problem, multi-party computations SMC will ensure the independence of input, the correctness of calculating, while not reveal each input value to ginseng
With other members of calculating.Under the conditions of multi-party computations system is mainly for the peer-to-peer network based on block chain, managed between tissue
, not only there is the characteristics of distributivity, isomerism in reason or operation data, key also relate to numerous tissues be unwilling it is disclosed hidden
Private data information, emphasis solves while the private data information for protecting each tissue, and can realize that data sharing, data are tested
The Coordination Decisions problem such as card and data analysis mining, support is provided for coordination Optimal Decision-making.Multi-party computations system master
Realize following several respects function:The privacy of input:It can be obtained from output as defined in it without either party more
Information, can obtain information from the input of its other party can only derive from output;Correctness:The result that each party obtains is answered
The guarantee its be correct;The independence of input:It is to be necessarily independent of the input of honesty side that destruction side, which selects the input of oneself,
It carries out;Ensure the correct delivery of output:Destruction side cannot prevent honesty side from obtaining their output;Fairness:And if only if
Honesty side obtains their output, and destruction side should also acquire their output.
3) data are generally protected:Such data are also private data, but because multi-party computations technique algorithm is more multiple
Miscellaneous, operand is big, from cost performance angle, still needs to retain traditional data mandate access method, that is, referred to herein as one
As protect data.
It for private data, cannot directly read, block chain can be (more according to the mode input of authority information, reading data
Fang Anquan computational methods), reading object (access account) etc., by " data verification based on zero-knowledge proof " and " based on together
The encrypted distributed data digging of state " method obtains the corresponding running data of running data access request and passes through Secure meter
Obtained result of calculation.
Zero-knowledge proof, which refers to a side (certifier), not to provide any privacy information to another party (verifier)
Under the premise of so that another party can be confident that some judgement is correct.It is substantially a kind of agreement being related to two sides, therein
One side is known as certifier, and another party is known as verifier, it was demonstrated that person claims that it has grasped certain information to verifier, and both sides press
It being interacted according to specific protocol so that verifier believes or vetos claiming for certifier, and in the whole process, verifier does not have
Obtain the particular content for institute's Information that certifier claims.Data verification of the present embodiment meaning based on zero-knowledge proof refer to
Obtained result of calculation is verified by zero-knowledge proof realization, to determine its reliability.
Homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.To the number Jing Guo homomorphic cryptography
According to being handled to obtain an output, this output is decrypted, result handles the original of unencryption with Same Way
Output that data obtain is the result is that the same.
Data anonymousization processing ensure that privacy and the safety of data, and data anonymousization processing refers to that data is avoided to dig
Pick person contacts original truthful data, or goes out sensitive pattern or information by individual marking attribute excavation, and then protects private data.
Initial data all properties are divided into two class of Sensitive Attributes and non-sensitive attribute by data anonymousization processing, wherein quick
Sense attribute is the property set comprising user sensitive information, and non-sensitive attribute is the not interested attribute of data miner.The part
Including two big functions:Inhibit function, hides Sensitive Attributes, prevent third party from being in direct contact repressed attribute;Extensive function,
The mode of occurrence, the replacement to original truthful data and summary are substituted by using a range.
The processing of data above anonymization and the data verification based on zero-knowledge proof and the distributed number based on homomorphic cryptography
Individually running data can be handled according to excavating, running data can also be handled respectively;
When data anonymousization processing is used alone, it can be preserved during running data reports, or in running data
Cheng Zhong, or in travelling data sharing process, handled using data anonymousization;It hides for what is handled by data anonymous
Name data, are accessed by access interface;It is real-time by access interface when carrying out data anonymousization processing in shared procedure
Data anonymous processing is carried out to running data.
When data verification based on zero-knowledge proof and the distributed data digging based on homomorphic cryptography is used alone, it can visit
Ask that preserved in database is running data, and in shared procedure, running data is tested by the data based on zero-knowledge proof
Card and the distributed data digging based on homomorphic cryptography handle to obtain result of calculation.
Simultaneously using data anonymousization processing, the data verification based on zero-knowledge proof and the distribution based on homomorphic cryptography
When data mining, what is preserved in accessible database is anonymous data;Anonymous data is the running data to traveling object acquisition
It handles to obtain by data anonymous, data anonymousization processing can be that process is reported to carry out or carry out in preservation process;
In shared procedure, to anonymous data by data verification based on zero-knowledge proof and based on the distributed data of homomorphic cryptography
Excavation handles to obtain result of calculation.
Optionally, private data can also support big data extracts to read, but equally cannot directly access a certain traveling pair
The specifying information of elephant only can extract the method read by big data, read a certain number of traveling object data informations or
Its statistical information of person again may be by " data verification based on zero-knowledge proof " and " the distributed number based on homomorphic cryptography
According to excavation " method acquisition.
Optionally, the corresponding relevant information of running data further includes digital signature, and digital signature is carried out by digital digest
Asymmetric encryption obtains, and digital digest is based on running data progress Hash operation and obtains.
Optionally, can be by travelling the traveling stored in the car-mounted device of object to the asymmetric encryption of digital digest
Object private key carries out asymmetric encryption to digital digest, obtains digital signature, can be with by being digitally signed to running data
Ensure the authenticity of data.
Encryption for running data and being digitally signed is realized in travelling object.
In one or more optional embodiments, step 130 may include:
Based on running data access request corresponding traveling report is obtained from accessible database;Traveling report is based on reaching
The running data of preset condition is obtained by coding;
Wherein, preset condition can include but is not limited to following at least one:Preset quantity, is preset preset period of time
Event;
To traveling report decoding, running data is obtained.
The running data that report can be all in setting time is travelled, or based on all relevant of particular event preservation
Running data preserves running data in the form of travelling and reporting, it is ensured that can obtain related traveling in batches when accessing
Data improve access efficiency.
Optionally, obtaining corresponding traveling report from accessible database based on running data access request may include:
Corresponding encryption data and key are obtained from accessible database based on running data access request, is based on key solution
The close encryption data obtains traveling report;
Or, obtaining corresponding traveling report from accessible database based on running data access request.
When the data of acquisition request are public data, it can be directly obtained traveling report, and when the data of acquisition request are
When general protection data, what is got is to need to be had when acquisition request generally protects data by encrypted encryption data
There are the mandate of certain term of validity, authorization message to be safeguarded in block chain, be equivalent to the intelligent contract of one be stored in block chain,
The intelligence contract can specify that related access parameter (for example may have access to data item), access mandate of the account according to intelligent contract,
The range of data is read in input on demand, and block chain exports a handle, and visitor cannot directly access based on block chain management
Database, but the running data of the database output based on block chain management is received according to the handle.
The general protection data obtained in the present embodiment are based on after the encryption that running data is encrypted
Running data, further according to encrypted running data generate traveling report, by the way that running data is encrypted and can be ensured
The privacy of data.Such as:Traveling can be reported and carry out symmetric cryptography.
In one or more optional embodiments, traveling report can include but is not limited to following at least one:Promptly
Running data report, the report of common running data;
To traveling report decoding, running data is obtained, including:
Include time data memory or datum number storage amount in response to running data access request, to common running data
Report decryption, obtains corresponding common running data;
Include data storage events in response to running data access request, urgent running data is reported and is decoded, obtains
Corresponding urgent running data.
Optionally, travelling obtaining for report can be touched by travelling the improper traveling event occurred in object driving process
Hair generates urgent running data report, i.e., in response to the improper traveling event occurred in traveling object driving process, according to row
It sails data and generates urgent running data report, can be triggered by predetermined period, generate common running data report, that is, be based on pre-
If the period, in response to reaching predetermined period, common running data is generated according to running data and is reported;Or when data volume reaches default
When data volume, running data report is generated according to running data, the preservation triggered based on data volume is realized, is preserved based on data volume
Running data report equally store the corresponding time, access process is identical as common form data report.Such as:It is improper
Traveling event can be traffic accident occurs for traveling object, traveling object parts break down etc..Due to common running data
Report is to be stored based on predetermined period, therefore it is obtained and time correlation, as long as getting what needs accessed from access request
The storage time of data, you can get corresponding common running data report;And urgent running data is reported, due to being
It is triggered based on event, in shared procedure, the storage event of required access is necessarily included in access request, be based on the storage thing
Part can obtain corresponding urgent running data report.
Optionally, the requirement of real-time of usually urgent running data report is higher, the real-time of common running data report
It is required that it is relatively low, therefore can be higher than for the report setting of urgent running data by way of setting priority in being reported in traveling
The priority of common running data report makes urgent running data report have the priority higher than the report of common running data,
When sending traveling report, traveling report is made to be sent according to priority, to ensure the real-time of urgent running data report
It is required that.
In one or more optional embodiments, further include:
Analyzing processing is carried out based on the running data of acquisition traveling object corresponding to the running data of acquisition, determines traveling
The operating status of object and/or the spare parts logistics for travelling object.
In a particular application, the running car data based on acquisition can carry out vehicle condition analysis, according to certain specific vapour
Vehicle (such as:Certain brand) operating status and/or spare parts logistics, these automobiles can be analyzed, form the industry of automobile
Analysis report, the access account of Car sharing can be personal or certain collectives (such as:Motor corporation, insurance company etc.), pass through
Analyzing processing is carried out to the running car data of acquisition corresponding automobile to the running car data of acquisition, can be to access account to carry
For more effective information.
Such as:When it is insurance company to access account, vehicle operation data and driving habit data are based on, emphasis is directed to vehicle
Condition information (such as vehicle, service life, maintenance record), vehicle often walk route accident probability, main driver driving custom (as and
The spacing of nearby vehicle, lane change frequency, brake frequency, Hong throttle frequency etc.) data information, carry out intellectual analysis excavation, to
Insurance company proposes vehicle insurance premium suggestion.
Insurance company uses the part, it is good for vehicle condition, often walk route accident rate is low, driving habit is good vehicle can be big
Width reduces premium, promotes vehicle insurance competitiveness;It is general for vehicle condition, the new accident rate of often walking is high, the general vehicle of driving habit can
To promote premium, risk is reduced.From another perspective, driver can be stimulated to promote driving rule by the leverage of vehicle insurance
Model promotes safe driving, and then reduces traffic accident.
Sharing method provided by the invention applies also for transaction data or mantenance data.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light
The various media that can store program code such as disk.
Fig. 2 is the structural schematic diagram of running data sharing means one embodiment of the present invention.The device of the embodiment is available
In the above-mentioned each method embodiment of the realization present invention.As shown in Fig. 2, the device of the embodiment includes:
Request reception unit 21 accesses the access request of running data for receiving request.
Wherein, access request includes user account information.
Permission determination unit 22, for obtaining the corresponding default access of access request based on user account information, from block
The corresponding accessible database of default access is obtained in the intelligent contract that chain prestores.
Wherein, arrange at least one default access and its accessible database in intelligent contract.
Optionally, accessible database includes block chain and database.
Data capture unit 23, for obtaining corresponding traveling number from accessible database based on running data access request
According to or result of calculation.
Wherein, result of calculation is that running data calculates acquisition by Secure.
Optionally, traveling object can include but is not limited to following any one or more:Vehicle, aircraft, robot, ship
Only.Wherein vehicle may include various vehicles, such as:Automobile, train, subway and other modes of transport.
Optionally, running data can include but is not limited at least one of following:Spare parts logistics data, operation shape
State data.
Based on a kind of running data sharing means that the above embodiment of the present invention provides, running data access request is received;
Receive the access request that request accesses running data;The corresponding default access of access request is obtained based on user account information, from
The corresponding accessible database of default access is obtained in the intelligent contract that block chain prestores;Arrange in intelligent contract at least one pre-
If permission and its accessible database;Based on running data access request from accessible database obtain corresponding running data or
Result of calculation ensure that running data is not easy to be tampered and cancel, and ensure that the authenticity of running data, improves running data
Safety.
Further include the corresponding related letter of running data in database in one or more optional embodiments, in block chain
Breath or the corresponding relevant information of result of calculation;
Data capture unit 23 is specifically used for corresponding to block chain in response to default access, is based on running data access request
Running data or result of calculation are obtained from block chain;In response to default access correspondence database, it is based on running data access request
By the relevant information in block chain running data or result of calculation are obtained from database.
Optionally, the corresponding relevant information of running data or the corresponding relevant information of result of calculation can include but is not limited to
Following at least one:Summary info, file id information, running data access request uniform resource locator (URL).
In the present embodiment, the corresponding authority information of different access account is preserved by block chain, different authority informations can
To access different grades of data, it is alternatively possible to which data are divided by different brackets:1) public data:For example, as long as
It is and travels the data that object identity separates be public data, such as traveling object real time position, makees on backstage
Go out region real-time statistics, these statistical informations can be public data, but its initial data is not public data, initial data
The data that can be and travel object identity binding.Also a kind of source of public data, exactly allows through agreement, initial data
Source is disclosed data, such as oil consumption and Relationship between temperature data.
2) private data:In particular to the protected data for needing multi-party computations to handle, initial data only has very much
The account of limit can be accessed directly, for example the account of only car owner oneself can access, and other visitors can only pass through safety
In many ways the processing calculated accesses its secondary output information.Such as vehicle insurance price, it can be in the daily travel route of non-disclosre car owner
In the case of, the result of calculation obtained by multi-party computations method is obtained, carries out exercising path risk assessment.Wherein, safety
Multi-party computational methods can realize the demand of data sharing, data operation, while can preferably meet the private data letter of each tissue
The protection of breath solves the collaboration meter of protection privacy between the participant (data providing and comprehensive operation side) of one group of mutual mistrust
Calculation problem, multi-party computations SMC will ensure the independence of input, the correctness of calculating, while not reveal each input value to ginseng
With other members of calculating.Under the conditions of multi-party computations system is mainly for the peer-to-peer network based on block chain, managed between tissue
, not only there is the characteristics of distributivity, isomerism in reason or operation data, key also relate to numerous tissues be unwilling it is disclosed hidden
Private data information, emphasis solves while the private data information for protecting each tissue, and can realize that data sharing, data are tested
The Coordination Decisions problem such as card and data analysis mining, support is provided for coordination Optimal Decision-making.Multi-party computations system master
Realize following several respects function:The privacy of input:It can be obtained from output as defined in it without either party more
Information, can obtain information from the input of its other party can only derive from output;Correctness:The result that each party obtains is answered
The guarantee its be correct;The independence of input:It is to be necessarily independent of the input of honesty side that destruction side, which selects the input of oneself,
It carries out;Ensure the correct delivery of output:Destruction side cannot prevent honesty side from obtaining their output;Fairness:And if only if
Honesty side obtains their output, and destruction side should also acquire their output.
3) data are generally protected:Such data are also private data, but because multi-party computations technique algorithm is more multiple
Miscellaneous, operand is big, from cost performance angle, still needs to retain traditional data mandate access method, that is, referred to herein as one
As protect data.
Optionally, the corresponding relevant information of running data further includes digital signature, and digital signature is passed through by digital digest
Asymmetric encryption, digital digest are based on running data progress Hash operation and obtain.
In one or more optionally embodiments, data capture unit 23 may include:
Report acquisition module, for obtaining corresponding traveling report from accessible database based on running data access request
It accuses;Traveling report is obtained based on the running data for reaching preset condition by coding;
Wherein, preset condition can include but is not limited to following at least one:Preset quantity, is preset preset period of time
Event.
Decoder module, for traveling report decoding, obtaining running data.
The running data that report can be all in setting time is travelled, or based on all relevant of particular event preservation
Running data preserves running data in the form of travelling and reporting, it is ensured that can obtain related traveling in batches when accessing
Data improve access efficiency.
Optionally, report acquisition module is specifically used for being based on running data access request from accessible database acquisition pair
The encryption data and key answered are based on secret key decryption encryption data, obtain traveling report;Or, being based on running data access request
Corresponding traveling report is obtained from accessible database.
Optionally, traveling report can include but is not limited to following at least one:Urgent running data report, common traveling
Data report;
Decoder module is specifically used in response to running data access request including time data memory or datum number storage
Amount is reported common running data and is decoded, obtains corresponding running data;Include data in response to running data access request
Storage event is reported urgent running data and is decoded, obtains corresponding running data.
Optionally, further include:Data analysis unit corresponds to the running data of acquisition for the running data based on acquisition
Traveling object carry out analyzing processing, determine traveling object operating status and/or travel object spare parts logistics.
In addition, the embodiment of the present invention additionally provides a kind of traveling object data storage system, including:Any of the above-described embodiment
Running data sharing means.
In addition, the embodiment of the present invention additionally provides a kind of computer storage media, for storing computer-readable finger
It enables, described instruction is performed the operation for the running data sharing method for executing any of the above-described embodiment of the present invention.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light
The various media that can store program code such as disk.
Methods and apparatus of the present invention may be achieved in many ways.For example, can by software, hardware, firmware or
Software, hardware, firmware any combinations realize methods and apparatus of the present invention.The said sequence of the step of for the method
Merely to illustrate, the step of method of the invention, is not limited to sequence described in detail above, special unless otherwise
It does not mentionlet alone bright.In addition, in some embodiments, also the present invention can be embodied as to record program in the recording medium, these programs
Include for realizing machine readable instructions according to the method for the present invention.Thus, the present invention also covers storage for executing basis
The recording medium of the program of the method for the present invention.
Description of the invention provides for the sake of example and description, and is not exhaustively or will be of the invention
It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches
It states embodiment and is to more preferably illustrate the principle of the present invention and practical application, and those skilled in the art is enable to manage
Various embodiments with various modifications of the solution present invention to design suitable for special-purpose.
Claims (10)
1. a kind of running data sharing method, which is characterized in that including:
The access request that request accesses running data is received, the access request includes user account information;
The corresponding default access of the access request, the intelligent contract to prestore from block chain are obtained based on the user account information
It is middle to obtain the corresponding accessible database of the default access;Arrange at least one default access in the intelligence contract and its can
Access database;
Based on the running data access request corresponding running data or result of calculation, institute are obtained from the accessible database
It is that running data calculates acquisition by Secure to state result of calculation.
2. according to the method described in claim 1, it is characterized in that, the traveling object includes following any one or more:
Vehicle, aircraft, robot, ship.
3. method according to claim 1 or 2, which is characterized in that the running data includes at least one of following:
Spare parts logistics data, running state data.
4. according to any methods of claim 1-3, which is characterized in that the accessible database includes the block chain
And database.
5. according to the method described in claim 4, it is characterized in that, further including travelling number in the database in the block chain
According to corresponding relevant information or the corresponding relevant information of result of calculation;
It is described that corresponding running data is obtained from the accessible database based on the running data access request or calculates knot
Fruit, including:
Block chain is corresponded in response to the default access, is obtained and is travelled from the block chain based on the running data access request
Data or result of calculation;
In response to the default access correspondence database, the phase in the block chain is passed through based on the running data access request
It closes information and obtains running data or result of calculation from the database.
6. according to the method described in claim 5, it is characterized in that, the corresponding relevant information of the running data or the calculating
As a result corresponding relevant information includes following at least one:Summary info, file id information, running data access request are unified to be provided
Source finger URL.
7. method according to claim 5 or 6, which is characterized in that the corresponding relevant information of the running data further includes
Digital signature;
The digital signature by digital digest by asymmetric encryption obtain, the digital digest be based on the running data into
Row Hash operation obtains.
8. a kind of running data sharing means, which is characterized in that including:
Request reception unit accesses the access request of running data for receiving request, and the access request includes user's account
Family information;
Permission determination unit, for obtaining the corresponding default access of the access request based on the user account information, from area
The corresponding accessible database of the default access is obtained in the intelligent contract that block chain prestores;Arrange at least in the intelligence contract
A kind of default access and its accessible database;
Data capture unit, for obtaining corresponding traveling from the accessible database based on the running data access request
Data or result of calculation, the result of calculation are that running data calculates acquisition by Secure.
9. a kind of running data shared system, which is characterized in that including:Running data sharing means according to any one of claims 8.
10. a kind of computer storage media, for storing computer-readable instruction, which is characterized in that described instruction is held
Perform claim requires the operation of running data sharing method described in 1 to 7 any one when row.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810484912.9A CN108763955B (en) | 2018-05-20 | 2018-05-20 | Travel data sharing method and apparatus, travel data sharing system, and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810484912.9A CN108763955B (en) | 2018-05-20 | 2018-05-20 | Travel data sharing method and apparatus, travel data sharing system, and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108763955A true CN108763955A (en) | 2018-11-06 |
CN108763955B CN108763955B (en) | 2020-11-13 |
Family
ID=64007241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810484912.9A Active CN108763955B (en) | 2018-05-20 | 2018-05-20 | Travel data sharing method and apparatus, travel data sharing system, and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108763955B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617896A (en) * | 2018-12-28 | 2019-04-12 | 浙江省公众信息产业有限公司 | A kind of Internet of Things access control method and system based on intelligent contract |
CN110648244A (en) * | 2019-09-05 | 2020-01-03 | 广州亚美信息科技有限公司 | Block chain-based vehicle insurance scheme generation method and device and driving data processing system |
CN112073508A (en) * | 2020-09-05 | 2020-12-11 | 蔡春梅 | Data processing method and artificial intelligence platform based on cloud computing and block chain service |
CN112149158A (en) * | 2020-08-19 | 2020-12-29 | 成都飞机工业(集团)有限责任公司 | 3D printing multi-database sharing optimization algorithm based on homomorphic encryption technology |
CN113434896A (en) * | 2021-08-27 | 2021-09-24 | 豪符密码检测技术(成都)有限责任公司 | Method for encrypting, protecting and using data in mineral resource and geographic space fields |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8752203B2 (en) * | 2012-06-18 | 2014-06-10 | Lars Reinertsen | System for managing computer data security through portable data access security tokens |
CN106911470A (en) * | 2017-01-23 | 2017-06-30 | 北京航空航天大学 | A kind of bit coin transaction privacy Enhancement Method |
CN106992990A (en) * | 2017-05-19 | 2017-07-28 | 北京牛链科技有限公司 | Data sharing method and system and block catenary system and computing device |
US20170244707A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for establishing secure access for users in a process data network |
CN107274130A (en) * | 2017-06-16 | 2017-10-20 | 合肥维天运通信息科技股份有限公司 | A kind of driver's credit investigation system and method based on block chain technology and Logistics Information Platform |
CN107563846A (en) * | 2017-08-10 | 2018-01-09 | 深圳市易成自动驾驶技术有限公司 | Shared vehicles management method, server, system and computer-readable recording medium |
CN107767265A (en) * | 2017-11-07 | 2018-03-06 | 中积有限公司 | A kind of data sharing method and server |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN107909416A (en) * | 2017-12-29 | 2018-04-13 | 深圳市轱辘车联数据技术有限公司 | The method and vehicle price evaluation device of vehicle price evaluation |
CN107945090A (en) * | 2017-11-30 | 2018-04-20 | 深圳市轱辘车联数据技术有限公司 | Vehicular exhaust data analysing method, device and server based on block chain |
CN108009646A (en) * | 2017-11-30 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | Vehicle data processing method and server |
-
2018
- 2018-05-20 CN CN201810484912.9A patent/CN108763955B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8752203B2 (en) * | 2012-06-18 | 2014-06-10 | Lars Reinertsen | System for managing computer data security through portable data access security tokens |
US20170244707A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for establishing secure access for users in a process data network |
CN106911470A (en) * | 2017-01-23 | 2017-06-30 | 北京航空航天大学 | A kind of bit coin transaction privacy Enhancement Method |
CN106992990A (en) * | 2017-05-19 | 2017-07-28 | 北京牛链科技有限公司 | Data sharing method and system and block catenary system and computing device |
CN107274130A (en) * | 2017-06-16 | 2017-10-20 | 合肥维天运通信息科技股份有限公司 | A kind of driver's credit investigation system and method based on block chain technology and Logistics Information Platform |
CN107563846A (en) * | 2017-08-10 | 2018-01-09 | 深圳市易成自动驾驶技术有限公司 | Shared vehicles management method, server, system and computer-readable recording medium |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN107767265A (en) * | 2017-11-07 | 2018-03-06 | 中积有限公司 | A kind of data sharing method and server |
CN107945090A (en) * | 2017-11-30 | 2018-04-20 | 深圳市轱辘车联数据技术有限公司 | Vehicular exhaust data analysing method, device and server based on block chain |
CN108009646A (en) * | 2017-11-30 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | Vehicle data processing method and server |
CN107909416A (en) * | 2017-12-29 | 2018-04-13 | 深圳市轱辘车联数据技术有限公司 | The method and vehicle price evaluation device of vehicle price evaluation |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617896A (en) * | 2018-12-28 | 2019-04-12 | 浙江省公众信息产业有限公司 | A kind of Internet of Things access control method and system based on intelligent contract |
CN110648244A (en) * | 2019-09-05 | 2020-01-03 | 广州亚美信息科技有限公司 | Block chain-based vehicle insurance scheme generation method and device and driving data processing system |
CN112149158A (en) * | 2020-08-19 | 2020-12-29 | 成都飞机工业(集团)有限责任公司 | 3D printing multi-database sharing optimization algorithm based on homomorphic encryption technology |
CN112073508A (en) * | 2020-09-05 | 2020-12-11 | 蔡春梅 | Data processing method and artificial intelligence platform based on cloud computing and block chain service |
CN112073508B (en) * | 2020-09-05 | 2021-05-04 | 江苏端木软件技术有限公司 | Data processing method and artificial intelligence platform based on cloud computing and block chain service |
CN113434896A (en) * | 2021-08-27 | 2021-09-24 | 豪符密码检测技术(成都)有限责任公司 | Method for encrypting, protecting and using data in mineral resource and geographic space fields |
Also Published As
Publication number | Publication date |
---|---|
CN108763955B (en) | 2020-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108763955A (en) | Running data sharing method and device, system and computer storage media | |
Fraga-Lamas et al. | A review on blockchain technologies for an advanced and cyber-resilient automotive industry | |
CN110519286B (en) | Intelligent traffic data security access method based on alliance block chain | |
CN108734017A (en) | Driving data sharing method and device, system and computer storage media | |
CN111050317B (en) | Intelligent traffic data safety sharing method based on alliance block chain | |
CN111314871B (en) | Safe sharing travel service scheme based on alliance block chain | |
US11223487B2 (en) | Method and system for secure blockchain-based vehicular digital forensics | |
Popa et al. | VPriv: Protecting privacy in location-based vehicular services | |
Wang et al. | Secure data sharing and customized services for intelligent transportation based on a consortium blockchain | |
Zhou et al. | Location privacy in usage-based automotive insurance: Attacks and countermeasures | |
Othmane et al. | A survey of security and privacy in connected vehicles | |
CN102196431B (en) | Internet of things application scene-based protection method of privacy query and private identity verification | |
Wang et al. | Secure ride-sharing services based on a consortium blockchain | |
CN111464980A (en) | Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment | |
Ma et al. | Blockchain-driven trusted data sharing with privacy protection in IoT sensor network | |
CN112292841A (en) | Creating vehicle certificates with blockchains | |
Xu et al. | Blockchain-oriented privacy protection of sensitive data in the internet of vehicles | |
CN112651035A (en) | Data processing method, device, electronic equipment and medium | |
Campanile et al. | Privacy regulations challenges on data-centric and iot systems: A case study for smart vehicles. | |
Philip et al. | Secure incident & evidence management framework (SIEMF) for internet of vehicles using deep learning and blockchain | |
Yao et al. | Accident responsibility identification model for Internet of Vehicles based on lightweight blockchain | |
BelMannoubi et al. | A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues | |
CN113886878A (en) | Vehicle information encryption management method and system | |
CN106657021A (en) | Vehicle message authentication method and device in Internet of Vehicles | |
Patsakis et al. | Privacy-aware event data recorders: cryptography meets the automotive industry again |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |