CN110008725B - User structured data processing system - Google Patents

User structured data processing system Download PDF

Info

Publication number
CN110008725B
CN110008725B CN201910258397.7A CN201910258397A CN110008725B CN 110008725 B CN110008725 B CN 110008725B CN 201910258397 A CN201910258397 A CN 201910258397A CN 110008725 B CN110008725 B CN 110008725B
Authority
CN
China
Prior art keywords
user
ciphertext
ciphertexts
cloud server
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910258397.7A
Other languages
Chinese (zh)
Other versions
CN110008725A (en
Inventor
王龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Ruide scientific and technological achievement transformation Co.,Ltd.
Original Assignee
Shandong Ruide Scientific And Technological Achievement Transformation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Ruide Scientific And Technological Achievement Transformation Co ltd filed Critical Shandong Ruide Scientific And Technological Achievement Transformation Co ltd
Priority to CN201910258397.7A priority Critical patent/CN110008725B/en
Publication of CN110008725A publication Critical patent/CN110008725A/en
Application granted granted Critical
Publication of CN110008725B publication Critical patent/CN110008725B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a user structured data processing system which comprises a cloud server and a plurality of user terminals, wherein each user terminal is provided with a scanning device for scanning a two-dimensional code graph, and is provided with a user database for storing a user ciphertext; the method has the advantages that the effect of safety and reliability can be achieved, user information of other user terminals is stored in each terminal, only the user information is stored in an encrypted mode, the user information can be decrypted by scanning the two-dimensional codes corresponding to the user information, the method is very simple and effective, the convenience is improved by a centralized information interaction mode, and meanwhile the safety of the user information is guaranteed.

Description

User structured data processing system
Technical Field
The present invention relates to the field of data processing, and more particularly to a user structured data processing system.
Background
Data processing is a technical process of analyzing and processing data (both numerical and non-numerical). Including the processing and processing of various raw data analysis, sorting, calculation, editing, etc. Has wider meaning than data analysis. With the increasing popularity of computers, the proportion of numerical calculation in the field of computer applications is small, and information management through computer data processing has become a major application. Such as mapping management, warehouse management, financial management, transportation management, technical information management, office automation, etc. In the aspect of geographic data, a large amount of natural environment data (various resource data such as land, water, climate, biology and the like) and a large amount of social and economic data (population, traffic, industry and agriculture and the like) are provided, and comprehensive data processing is often required. Therefore, a geographic database needs to be established, geographic data is systematically arranged and stored, redundancy is reduced, data processing software is developed, and database technology is fully utilized for data management and processing.
The current data system has a certain problem, and when the block chain technology is popularized in data application and a decentralized system structure brings convenience, the corresponding terminal needs to keep a response state all the time to read the block data, so that great inconvenience is caused when a target terminal is in a closed state.
Disclosure of Invention
It is therefore an object of the present invention to provide a user-structured data processing system that solves the above-mentioned problems.
In order to solve the technical problems, the technical scheme of the invention is as follows: a user structured data processing system comprises a cloud server and a plurality of user terminals, wherein each user terminal is provided with a scanning device for scanning two-dimensional code graphs, and is provided with a user database for storing user ciphertexts;
the user terminal comprises a user management module, a user encryption module, a two-dimensional code output module, an analysis module and a ciphertext transmission module;
the user management module is used for managing user information of the user;
the user encryption module is configured with a first encryption algorithm, and encrypts the user information through the first encryption algorithm to obtain a user ciphertext and a corresponding user key;
the two-dimensional code output module generates a two-dimensional code graph according to the user key through a preset generation strategy;
the analysis module acquires a graphic code obtained by scanning a two-dimensional code graphic by a scanning device, and the analysis strategy analyzes the graphic code to obtain a user key;
the ciphertext transmission module comprises an uploading unit and a downloading unit, wherein a user of the uploading unit uploads the user ciphertext to the cloud server, and the downloading unit is used for downloading the user ciphertext from the cloud server and storing the user ciphertext to the user database;
the cloud server is used for receiving user ciphertexts of all users and sending the user ciphertexts to the user terminal;
the decoding module is configured with a first decryption algorithm, and decrypts the user ciphertext through the first decryption algorithm and the corresponding user key to obtain the user information.
Further, the user management module generates user index data according to the user information, the two-dimensional code graph is further generated according to the user index data in the generation strategy, and after the user index data is obtained through the analysis strategy, a corresponding user ciphertext is obtained in the user database according to the user index data in an indexing mode and sent to the decoding module.
Further, the generating strategy is configured with a second encryption algorithm, the second encryption algorithm encrypts the user index data and the user key to generate a graph ciphertext, and the generating strategy generates the two-dimensional code graph according to the graph ciphertext;
the decoding module is configured with a second decryption algorithm, and decrypts the obtained graphic ciphertext through the second decryption algorithm to obtain the user key and the user index data.
Further, the cloud server is configured with a screening strategy, the screening strategy groups the received user ciphertexts according to the user terminals corresponding to the user ciphertexts, and all the user ciphertexts in each group of user ciphertexts are sent to the user terminals corresponding to the group.
Furthermore, the screening strategy groups the user ciphertexts according to the time of uploading the user ciphertexts by the user terminal, and divides the user ciphertexts uploaded in the same time period into the same group.
Furthermore, the screening strategy groups the corresponding user ciphertexts according to the type of the user terminal, and divides the user ciphertexts corresponding to the user terminals of the same type into the same group.
Further, the first encryption algorithm is configured as a symmetric encryption algorithm.
Further, the second encryption algorithm is configured as an asymmetric encryption algorithm.
Further, after the cloud server sends a user ciphertext to the corresponding user terminal, the user ciphertext is deleted from the cloud server.
Further, when a new user terminal is connected to the cloud server, the cloud server retrieves a user ciphertext from any user terminal originally connected to the cloud server, and sends the retrieved user ciphertext to the new user terminal.
The technical effects of the invention are mainly reflected in the following aspects: through setting up like this, can play a safe and reliable effect simultaneously, each terminal all stores the user information of other user terminals, and only these user information are saved with the mode after encrypting, and through the two-dimensional code of scanning corresponding user information, just can decipher these user information, very simple effective, decentralized information interaction mode has improved the convenience, guarantees user information's security simultaneously.
Drawings
FIG. 1: the invention discloses a system architecture schematic diagram of a user structured data processing system;
FIG. 2: the invention relates to a user terminal configuration schematic diagram of a user structured data processing system.
Reference numerals: 100. a cloud server; 200. a user terminal; 210. a user management module; 220. a user encryption module; 230. a two-dimensional code output module; 240. an analysis module; 250. and a ciphertext transmission module.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in order to make the technical solution of the present invention easier to understand and understand.
Referring to fig. 1, a user structured data processing system includes a cloud server 100 and a plurality of user terminals 200, where the user terminals 200 have a scanning device for scanning a two-dimensional code graph, and the user terminals 200 are configured with a user database for storing user ciphertexts; the user database is used for storing all encrypted user ciphertexts, and the user ciphertexts of all other users are stored locally, so that data storage redundancy is increased, the efficiency of data acquisition and interaction can be improved, and meanwhile, the safety is ensured.
The user terminal 200 includes a user management module 210, a user encryption module 220, a two-dimensional code output module 230, an analysis module 240, and a ciphertext transmission module 250;
the user management module 210 is configured to manage user information of a user; first, the user management module 210 plays a role of verifying user input and managing user information, for example, if the user a creates the user a, the user a logs in the user management module 210 through the terminal 1, and the terminal 1 associates with the user a corresponding to the user a. The user management module 210 generates a user index data according to the user information, in the generating strategy, the two-dimensional code graph is further generated according to the user index data, and after the user index data is obtained by the analyzing strategy, a corresponding user ciphertext is obtained in the user database according to the user index data and is sent to the decoding module.
The user encryption module 220 is configured with a first encryption algorithm, and the user encryption module 220 encrypts the user information through the first encryption algorithm to obtain a user ciphertext and a corresponding user key; firstly, an encryption step is carried out, in order to realize the encryption of the user, a corresponding user ciphertext and a user key can be obtained through a first encryption algorithm, and thus, an encrypted user a is obtained. The first encryption algorithm is configured as a symmetric encryption algorithm.
The two-dimensional code output module 230 generates a two-dimensional code graph according to the user key through a preset generation strategy; the algorithm for generating the two-dimensional code graph according to the user key is simple to apply, and has a plurality of applications in the existing scene, which is not described herein again.
The analysis module 240 obtains a graphic code obtained by scanning a two-dimensional code graphic by a scanning device, and the analysis strategy obtains a user key by analyzing the graphic code; the graph codes are obtained through the graph codes, and the corresponding graph codes can be obtained through the analysis strategy, so that the method is simple and convenient.
The ciphertext transmission module 250 includes an uploading unit and a downloading unit, the uploading unit uploads the user ciphertext to the cloud server 100, and the downloading unit is configured to download the user ciphertext from the cloud server 100 and store the user ciphertext in the user database; through the arrangement of the uploading unit and the downloading unit, a better data processing effect can be achieved, and the data security and reliability are ensured, it should be noted that each user terminal 200 uploads the corresponding user ciphertext, and downloads all other related user ciphertexts, so that decentralized processing is realized.
The cloud server 100 is configured to receive user ciphertexts of all users and send the user ciphertexts to the user terminal 200; the cloud server 100 is configured with a screening policy, which groups the received user ciphertexts according to the user terminals 200 corresponding to the user ciphertexts, and sends all the user ciphertexts in each group of user ciphertexts to the user terminals 200 corresponding to the group. The screening strategy groups the user ciphertexts according to the time for uploading the user ciphertexts by the user terminal 200, and divides the user ciphertexts uploaded in the same time period into the same group. The screening strategy groups the corresponding user ciphertexts according to the type of the user terminal 200, and divides the user ciphertexts corresponding to the user terminals 200 of the same type into the same group. After the cloud server 100 sends a user ciphertext to the corresponding user terminal 200, the user ciphertext is deleted from the cloud server 100. When a new user terminal 200 is connected to the cloud server 100, the cloud server 100 retrieves a user ciphertext from any user terminal 200 originally connected to the cloud server 100, and sends the retrieved user ciphertext to the new user terminal 200.
The decoding module is configured with a first decryption algorithm, and decrypts the user ciphertext through the first decryption algorithm and the corresponding user key to obtain the user information. The first decryption algorithm corresponds to the first encryption algorithm, for example, a user key and a user ciphertext corresponding to the user a, and the user information of the user a can be obtained through the first decryption algorithm.
Preferably, the generating strategy is configured with a second encryption algorithm, the second encryption algorithm encrypts the user index data and the user key to generate a graph ciphertext, and the generating strategy generates the two-dimensional code graph according to the graph ciphertext; the decoding module is configured with a second decryption algorithm, and decrypts the obtained graphic ciphertext through the second decryption algorithm to obtain the user key and the user index data. The second encryption algorithm is configured as an asymmetric encryption algorithm. The second decryption algorithm corresponds to the second encryption algorithm, the graphic ciphertext is directly decrypted to obtain the user key and the user index data, and the user index data are set to improve the efficiency of obtaining the user ciphertext from the user database.
The above are only typical examples of the present invention, and besides, the present invention may have other embodiments, and all the technical solutions formed by equivalent substitutions or equivalent changes are within the scope of the present invention as claimed.

Claims (3)

1. A user structured data processing system is characterized by comprising a cloud server and a plurality of user terminals, wherein each user terminal is provided with a scanning device for scanning a two-dimensional code graph, and is provided with a user database for storing a user ciphertext;
the user terminal comprises a user management module, a user encryption module, a two-dimensional code output module, an analysis module and a ciphertext transmission module;
the user management module is used for managing user information of the user;
the user encryption module is configured with a first encryption algorithm, and encrypts the user information through the first encryption algorithm to obtain a user ciphertext and a corresponding user key;
the two-dimensional code output module generates a two-dimensional code graph according to the user key through a preset generation strategy;
the analysis module acquires a graphic code obtained by scanning a two-dimensional code graphic by a scanning device, and analyzes the graphic code based on an analysis strategy to obtain a user key;
the ciphertext transmission module comprises an uploading unit and a downloading unit,
the uploading unit user uploads the user ciphertext to a cloud server,
the downloading unit is used for downloading a user ciphertext from the cloud server and storing the user ciphertext into the user database; the cloud server is used for receiving user ciphertexts of all users and sending the user ciphertexts to the user terminal;
the analysis module is configured with a first decryption algorithm, and decrypts the user ciphertext through the first decryption algorithm and the corresponding user key to obtain user information;
each user terminal stores user information of other user terminals;
each user terminal uploads the corresponding user ciphertext and downloads all other related user ciphertexts;
the analysis module (240) acquires a graphic code obtained by scanning a two-dimensional code graphic by a scanning device, and the analysis strategy analyzes the graphic code to obtain a user key; the graph code is obtained through the graph code, and the corresponding graph code can be obtained through an analysis strategy; the ciphertext transmission module (250) comprises an uploading unit and a downloading unit, wherein the uploading unit uploads the user ciphertext to the cloud server (100), and the downloading unit is used for downloading the user ciphertext from the cloud server (100) and storing the user ciphertext in the user database; through the arrangement of the uploading unit and the downloading unit, a better data processing effect can be achieved, the data security and reliability are ensured, each user terminal (200) uploads the corresponding user ciphertext, and downloads all other related user ciphertexts, so that decentralized processing is realized;
the cloud server (100) is used for receiving user ciphertexts of all users and sending the user ciphertexts to the user terminal (200); the cloud server (100) is configured with a screening strategy, the screening strategy groups the received user ciphertexts according to the user terminals (200) corresponding to the user ciphertexts, and all the user ciphertexts in each group of user ciphertexts are sent to the user terminals (200) corresponding to the group; the screening strategy is used for grouping the user ciphertexts according to the time of uploading the user ciphertexts by the user terminal (200), and dividing the user ciphertexts uploaded in the same time period into the same group; after the cloud server (100) sends a user ciphertext to the corresponding user terminal (200), deleting the user ciphertext from the cloud server (100); when a new user terminal (200) is connected to the cloud server (100), the cloud server (100) retrieves a user ciphertext from any user terminal (200) originally connected to the cloud server (100), and sends the retrieved user ciphertext to the new user terminal (200).
2. The system according to claim 1, wherein the user management module generates a user index data according to the user information, the two-dimensional code graph is further generated according to the user index data in the generation policy, and after the analysis policy obtains the user index data, a corresponding user ciphertext is obtained in the user database according to the user index data by indexing to the analysis module.
3. The user structured data processing system of claim 2 wherein said generation strategy is configured with a second encryption algorithm, said second encryption algorithm encrypting user index data and a user key to generate a graphical ciphertext, said generation strategy generating said two-dimensional code graph from said graphical ciphertext;
the analysis module is configured with a second decryption algorithm, and decrypts the obtained graphic ciphertext through the second decryption algorithm to obtain the user key and the user index data.
CN201910258397.7A 2019-04-01 2019-04-01 User structured data processing system Active CN110008725B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910258397.7A CN110008725B (en) 2019-04-01 2019-04-01 User structured data processing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910258397.7A CN110008725B (en) 2019-04-01 2019-04-01 User structured data processing system

Publications (2)

Publication Number Publication Date
CN110008725A CN110008725A (en) 2019-07-12
CN110008725B true CN110008725B (en) 2021-08-24

Family

ID=67169231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910258397.7A Active CN110008725B (en) 2019-04-01 2019-04-01 User structured data processing system

Country Status (1)

Country Link
CN (1) CN110008725B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781985B (en) * 2019-09-04 2023-07-07 杭州利项科技有限公司 Data structuring system based on two-dimensional code
CN110661786B (en) * 2019-09-04 2021-10-08 杭州利项科技有限公司 User data system based on chain relation
CN110737705A (en) * 2019-09-04 2020-01-31 杭州利项科技有限公司 Data acquisition system for forwarding behaviors

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9363259B2 (en) * 2013-05-23 2016-06-07 Symantec Corporation Performing client authentication using onetime values recovered from barcode graphics
EP3155754B1 (en) * 2014-06-13 2018-10-24 Bicdroid Inc. Methods, systems and computer program product for providing encryption on a plurality of devices
CN105207773A (en) * 2015-07-29 2015-12-30 北京石盾科技有限公司 Method, system and device for management, synchronization and backup of data encryption key

Also Published As

Publication number Publication date
CN110008725A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN110008725B (en) User structured data processing system
CN108520183B (en) Data storage method and device
CN110689349B (en) Transaction hash value storage and searching method and device in blockchain
US8392474B2 (en) Web distributed storage system
US9037870B1 (en) Method and system for providing a rotating key encrypted file system
CN113157648A (en) Block chain based distributed data storage method, device, node and system
CN114860735A (en) Method and device for inquiring hiding trace
CN111950030A (en) Data sharing storage method based on block chain, terminal equipment and storage medium
CN108694331B (en) Data storage method, device and system and computer readable storage medium
CN113360953B (en) IPFS and blockchain-based file distributed storage management method and system
CN111611621A (en) Block chain based distributed data encryption storage method and electronic equipment
CN105721156A (en) General Encoding Functions For Modular Exponentiation Encryption Schemes
CN104601681A (en) File fragmentation processing method and device
WO2020167884A1 (en) Systems and methods for blockchain-based secure storage
CN103108009A (en) Method and device for file sharing based on off-line space
CN112182109A (en) Distributed data coding storage method based on block chain and electronic equipment
CN116541320A (en) Intelligent IO module bus communication method, IO module, terminal and medium
CN114338527A (en) IPv6 active identifier processing method and system
CN107229743B (en) Big data classification utilization method and system for business management
CN111414341B (en) Data normalization description method in Internet of things environment
US11165760B2 (en) Increasing security of objects in cloud environments by using a two-part encryption scheme
CN114143098A (en) Data storage method and data storage device
CN113836169A (en) Clickhouse-based data processing method, device and medium
CN111885066A (en) Block chain network platform wage settlement system and method
CN112202453A (en) Information processing method, device, equipment and medium for compressing ciphertext

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210803

Address after: 276800 Rizhao chadu, Jufeng Town, Lanshan District, Rizhao City, Shandong Province

Applicant after: Shandong Ruide scientific and technological achievement transformation Co.,Ltd.

Address before: 652803 Bai Cun 73, village committee of Qinglong Town, Huaning County, Yuxi, Yunnan

Applicant before: Wang Long

GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190712

Assignee: Chuangkebang (Shandong) Technology Service Co.,Ltd.

Assignor: Shandong Ruide scientific and technological achievement transformation Co.,Ltd.

Contract record no.: X2021980017290

Denomination of invention: A user structured data processing system

Granted publication date: 20210824

License type: Common License

Record date: 20220111

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190712

Assignee: Shandong Yunzhi scientific and technological achievements transformation Co.,Ltd.

Assignor: Shandong Ruide scientific and technological achievement transformation Co.,Ltd.

Contract record no.: X2022980000558

Denomination of invention: A user structured data processing system

Granted publication date: 20210824

License type: Common License

Record date: 20220118