CN111625855B - Multi-mechanism information sharing system and method based on block chain - Google Patents

Multi-mechanism information sharing system and method based on block chain Download PDF

Info

Publication number
CN111625855B
CN111625855B CN202010461300.5A CN202010461300A CN111625855B CN 111625855 B CN111625855 B CN 111625855B CN 202010461300 A CN202010461300 A CN 202010461300A CN 111625855 B CN111625855 B CN 111625855B
Authority
CN
China
Prior art keywords
information
information data
resource library
submodule
data resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010461300.5A
Other languages
Chinese (zh)
Other versions
CN111625855A (en
Inventor
邵峥业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CITIC digital intelligence (Wuhan) Technology Co.,Ltd.
Original Assignee
Citic Digital Intelligence Wuhan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citic Digital Intelligence Wuhan Technology Co ltd filed Critical Citic Digital Intelligence Wuhan Technology Co ltd
Priority to CN202010461300.5A priority Critical patent/CN111625855B/en
Publication of CN111625855A publication Critical patent/CN111625855A/en
Application granted granted Critical
Publication of CN111625855B publication Critical patent/CN111625855B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a system and a method for sharing information of a plurality of organizations based on a block chain, the system comprises a plurality of organization information data resource library construction modules, a resource library information encryption grade analysis module, a plurality of organization access identity verification modules, a plurality of organization information priority judgment modules and a plurality of organization credit judgment centers, the plurality of organization information data resource library construction modules lead a plurality of organizations to upload collected information and then centralize the information to form an information data resource library, the resource library information encryption grade analysis module carries out encryption judgment according to information data uploaded by the organizations, the plurality of organization access identity verification modules carry out identity verification judgment on the organizations accessing the information data resource library, the plurality of organization information priority judgment modules carry out priority judgment on the organizations needing information sharing, the plurality of organization credit judgment centers carry out credit analysis on the organizations accessing the information data resource library, the information in the information data resource library and the mechanism of information sharing are doubly limited.

Description

Multi-mechanism information sharing system and method based on block chain
Technical Field
The invention relates to the field of block chains, in particular to a system and a method for sharing information of a plurality of mechanisms based on a block chain.
Background
The information sharing refers to the communication and sharing of information and information products among information systems of different levels and different departments, namely, the information, which is a resource with more obvious importance in the internet era, is shared with other people together, so that the aims of more reasonably achieving resource allocation, saving social cost and creating more wealth are fulfilled. The method is an important means for improving the utilization rate of information resources and avoiding repeated waste in information acquisition, storage and management. The basis is information standardization and normalization, and is guaranteed by law or statute forms.
Information sharing refers to the activity of realizing communication and sharing of information and information products among information systems of different levels and different departments according to the technology and transmission technology of the information systems and laws and regulations on the basis of information standardization and normalization. The method aims to share the more and more important information resource with other people in the Internet era, optimize resource allocation, save social cost, improve the utilization rate of the information resource and create more wealth together.
Information sharing is an important means for improving the utilization rate of information resources and avoiding repeated waste in information acquisition, storage and management. The basis is information standardization and normalization, and is guaranteed by law or statute forms. The efficiency of information sharing depends on the technical development of information systems and the improvement of transmission technology, and must be realized strictly under the conditions of information security and confidentiality. Of course, the information sharing degree of different countries is different, and the information sharing degree of western countries is much larger in current view, which is also an intangible index for promoting economic development of the countries. The lack of information sharing has a great barrier to the cooperation of all departments and industries and the data requirement of scientific research. Therefore, how to solve the global information sharing standard as early as possible will be a very milestone event.
At present, most information shared among devices is not limited information, all devices can refer to information of a database through login, but partial information which cannot be referred and downloaded by all devices possibly exists in the database.
Disclosure of Invention
The invention aims to provide a system and a method for sharing information of a plurality of mechanisms based on a block chain, which aim to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
a multi-organization information sharing system based on a block chain comprises a plurality of organization information data resource library construction modules, a resource library information encryption grade analysis module, a plurality of organization access identity verification modules, a plurality of organization information priority judgment modules and a plurality of organization credit judgment centers, wherein the resource library information encryption grade analysis module, the plurality of organization access identity verification modules, the plurality of organization information priority judgment modules and the plurality of organization credit judgment centers are respectively connected with the plurality of organization information data resource library construction modules through an intranet;
the mechanism information data resource library construction modules are used for enabling a plurality of mechanisms to upload acquired information and then centralizedly form an information data resource library, the resource library information encryption grade analysis module is used for carrying out encryption judgment according to information data uploaded by the mechanisms, the mechanism access identity verification modules are used for carrying out identity verification judgment on mechanisms accessed into the information data resource library, the mechanism information priority judgment modules are used for carrying out priority judgment on the mechanisms needing information sharing, and the mechanism credit judgment centers are used for carrying out credit analysis judgment on the mechanisms accessed into the information data resource library.
By adopting the technical scheme: the mechanism information data resource library construction module comprises a plurality of mechanism acquisition information data uploading sub-modules and an information data classification sub-module, the mechanism acquisition information data uploading sub-modules are used for enabling a plurality of mechanisms to upload acquired information data to the information data resource library in a unified mode, the information data resource library collects all uploaded information, the information data classification sub-module is used for classifying the information data collected by the information data resource library, the information data are divided into text type information and audio type information, and the classified data are sent to the resource library information encryption level analysis module.
By adopting the technical scheme: the resource library information encryption grade analysis module comprises an information data screening and retrieving submodule and an encryption word related judging and analyzing submodule, wherein the information data screening and retrieving submodule is used for screening encryption words from information data in an information data resource library, the encryption words are manually set in real time, text information is directly retrieved for the encryption words, after voice of audio information is converted into words, encryption word retrieval is carried out on the word information, the encryption word related judging and analyzing submodule is used for segmenting information data uploaded by different mechanisms, encryption word statistical analysis is carried out on the segmented information data, and the encryption performance of the current information data is judged.
By adopting the technical scheme: the sub-module for judging and analyzing the related encrypted words is used for segmenting the information data uploaded by different mechanisms, and the information data segment uploaded by one mechanism is set to be L1、L2、L3、…、Ln-1、LnSetting the encryption words in different current segmentsNumber C1、C2、C3、…、Cn-1、CnWherein, when CnNot less than 80 or
Figure BDA0002511020150000041
Judging that the current information data is confidentiality information, and when C is more than or equal to 70n< 80 or
Figure BDA0002511020150000042
Determining that the current information data is secret information when
Figure BDA0002511020150000043
And judging that the current information data is the common information, and marking different encryptions of information data analysis by the encrypted word judgment and analysis submodule.
By adopting the technical scheme: the mechanism access identity verification modules comprise a plurality of mechanism original information data uploading confirmation sub-modules and a plurality of mechanism account identification corresponding sub-modules, the mechanism original information data uploading confirmation sub-modules are used for confirming that the mechanism uploads effective information data to a data resource base, a mechanism list with confirmed effective information uploading is sent to the mechanism account identification corresponding sub-modules, the mechanism account identification corresponding sub-modules are used for checking the integrity of identity information when the mechanisms on the mechanism list are registered, when the integrity of the identity information is more than or equal to 80%, the mechanism accounts are authorized, and the mechanism logs in the information data resource base through account passwords during registration to send shared information requests.
By adopting the technical scheme: the mechanism information priority judging modules comprise a sharing request sending frequency counting submodule and a plurality of mechanism risk detection analysis judging submodules, the sharing request sending frequency counting submodule is used for counting the sharing information request frequency sent by different mechanisms, the sharing information request frequency sent by the different mechanisms is sequenced, the sequencing result is sent to the mechanism risk detection analysis judging submodules, the mechanism risk detection analysis judging submodules are used for carrying out sequential risk detection analysis on the mechanisms on the sequencing list for sending the sharing information request frequency, and information sharing is carried out on different encrypted marker files in the information data resource library according to the risk detection grades of the different mechanisms.
By adopting the technical scheme: the organization credit judgment centers comprise a plurality of organization effective information uploading occupation ratio counting sub-modules and a plurality of organization authority opening level obtaining sub-modules, wherein the organization effective information uploading occupation ratio counting sub-modules are used for counting the occupation ratio of effective information uploaded by each organization in an information data resource library, counting the proportion of the effective information uploaded by the organizations in the information data resource library, sending the statistical data to the organization authority opening level obtaining sub-modules, the organization authority opening level obtaining sub-modules are used for carrying out authority level opening marking on the organizations with the uploading effective information occupying ratio exceeding 40% in the information data resource library, sending the marked organizations to a plurality of organization information priority judgment modules, and the organization information priority judgment modules do not carry out risk detection analysis on the organizations marked with the opened authority levels any more, and directly sharing all information in the information data resource library.
A method for sharing information of a plurality of mechanisms based on block chains comprises the following steps:
s1: uploading the acquired information by a plurality of mechanisms by using a plurality of mechanism information data resource base construction modules and then centralizing to form an information data resource base;
s2: carrying out encryption judgment by utilizing a resource library information encryption grade analysis module according to information data uploaded by a plurality of mechanisms;
s3: utilizing a plurality of mechanisms to access an identity authentication module to carry out identity authentication judgment on the mechanisms accessing the information data resource library;
s4: utilizing a plurality of mechanism information priority judging modules to judge the priority of the mechanism needing information sharing;
s5: and utilizing a plurality of institution credit judgment centers to perform credit analysis judgment on the institution accessing the information data resource library.
By adopting the technical scheme: the sharing method further comprises the following steps:
s1-1: the information data classification submodule classifies the information data collected by the information data resource library into text type information and audio type information and sends the classified data to the resource library information encryption grade analysis module;
s2-1: the information data screening and retrieving submodule is used for screening encrypted words from the information data in the information data resource library, wherein the encrypted words are manually set in real time, text information is directly retrieved from the encrypted words, voice conversion is carried out on audio information into words, encrypted word retrieval is carried out on the word information, the encrypted word judgment and analysis submodule is involved for segmenting the information data uploaded by different mechanisms, the information data of the segmented part is subjected to encrypted word statistical analysis, and the encryption of the current information data is judged;
s3-1: the method comprises the steps that a plurality of mechanism original information data uploading confirmation sub-modules are used for confirming that effective information data uploading of a mechanism to a data resource library is carried out, a mechanism list with the confirmed effective information uploading is sent to a plurality of mechanism account identification corresponding sub-modules, the identity information integrity of the mechanism on the mechanism list during registration of the mechanism is checked by the mechanism account identification corresponding sub-modules, when the identity information integrity is larger than or equal to 80%, an account of the mechanism is authorized, and the mechanism logs in the information data resource library through an account password during registration to send a shared information request;
s4-1: utilizing a sharing request sending frequency counting submodule to count the sharing information request frequency sent by different mechanisms, sequencing the sharing information request frequency sent by different mechanisms, sending a sequencing result to a plurality of mechanism risk detection analysis and judgment submodules, carrying out sequential risk detection and analysis on the mechanisms on the sharing information request sending frequency sequencing list by the plurality of mechanism risk detection analysis and judgment submodules, and carrying out information sharing on different encrypted marker files in an information data resource library according to the risk detection grades of different mechanisms;
s5-1: the method comprises the steps that the occupation ratio of effective information uploaded by each mechanism in an information data resource library is counted by utilizing a plurality of mechanism effective information uploading occupation ratio counting sub-modules, the proportion of the effective information uploaded by the mechanisms in the information data resource library is counted, statistical data are sent to a plurality of mechanism permission opening grade acquisition sub-modules, the authority permission opening grade acquisition sub-modules conduct permission grade opening marking on mechanisms with the occupation ratio of the effective information uploaded in the information data resource library exceeding 40%, marking mechanisms are sent to a plurality of mechanism information priority judging modules, the mechanism information priority judging modules do not conduct risk detection analysis on the mechanisms with the marked permission grade opening any more, and all information in the information data resource library is directly shared.
By adopting the technical scheme: in step S4-1, the mechanism risk detection analysis and determination sub-modules perform sequential risk detection analysis on the mechanisms on the ordered list of times of sending shared information requests, and perform information sharing on different encrypted markup files in the information data resource library according to risk detection levels of different mechanisms, and the method further includes the following steps:
the mechanism risk detection analysis judgment submodule detects the registered safety factors of different mechanisms, and the safety factors detected by the different mechanisms are set to be K1、K2、K3、…、Kn-1、KnSetting a safety factor of a certain mechanism as KnSetting the risk index of different mechanisms which are predicted to be logged at present as R0, setting the actual risk value of different mechanisms as Rm, and according to the formula:
Rm=100-[Kn*(1-R0)]
and calculating to obtain an actual risk value of the current mechanism, judging that the current mechanism can share information of all information in the information data resource library when the actual risk value Rm of the mechanism is less than or equal to 20, judging that the current mechanism can share information of secret information and general information in the information data resource library when the actual risk value of the mechanism is more than 20 and less than or equal to 50, and judging that the current mechanism can share information of the general information in the information data resource library when the Rm is more than 50.
Compared with the prior art, the invention has the beneficial effects that: the invention aims to carry out double limitation on information and an information sharing mechanism in an information data resource library, carry out grade judgment on the shared information and the information sharing mechanism and ensure the confidentiality of partial information;
the mechanism information data resource library construction module is used for enabling a plurality of mechanisms to upload acquired information and then centralizedly form an information data resource library, the resource library information encryption grade analysis module is used for carrying out encryption judgment according to information data uploaded by the mechanisms, the mechanism access identity verification module is used for carrying out identity verification judgment on mechanisms accessed into the information data resource library, the mechanism information priority judgment module is used for carrying out priority judgment on the mechanisms needing information sharing, and the mechanism credit judgment centers are used for carrying out credit analysis judgment on the mechanisms accessed into the information data resource library.
Drawings
In order that the present invention may be more readily and clearly understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings.
FIG. 1 is a block diagram illustrating a block chain-based multi-organization information sharing system according to the present invention;
FIG. 2 is a block chain-based method for sharing information among a plurality of organizations according to the present invention;
FIG. 3 is a diagram illustrating specific steps of a block chain-based method for sharing information among a plurality of organizations according to the present invention;
fig. 4 is a schematic diagram of an implementation method of a block chain-based method for sharing information among multiple organizations according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 to 4, in the embodiment of the present invention, a system and a method for sharing information of multiple organizations based on a block chain are provided, where the system includes a plurality of organization information data repository construction modules, a repository information encryption level analysis module, a plurality of organization access authentication modules, a plurality of organization information priority determination modules, and a plurality of organization credit determination centers, where the repository information encryption level analysis module, the plurality of organization access authentication modules, the plurality of organization information priority determination modules, and the plurality of organization credit determination centers are respectively connected to the plurality of organization information data repository construction modules through an intranet, and the plurality of organization access authentication modules, the plurality of organization information priority determination modules, and the plurality of organization credit determination centers are sequentially connected through the intranet;
the mechanism information data resource library construction modules are used for enabling a plurality of mechanisms to upload acquired information and then centralizedly form an information data resource library, the resource library information encryption grade analysis module is used for carrying out encryption judgment according to information data uploaded by the mechanisms, the mechanism access identity verification modules are used for carrying out identity verification judgment on mechanisms accessed into the information data resource library, the mechanism information priority judgment modules are used for carrying out priority judgment on the mechanisms needing information sharing, and the mechanism credit judgment centers are used for carrying out credit analysis judgment on the mechanisms accessed into the information data resource library.
By adopting the technical scheme: the mechanism information data resource library construction module comprises a plurality of mechanism acquisition information data uploading sub-modules and an information data classification sub-module, the mechanism acquisition information data uploading sub-modules are used for enabling a plurality of mechanisms to upload acquired information data to the information data resource library in a unified mode, the information data resource library collects all uploaded information, the information data classification sub-module is used for classifying the information data collected by the information data resource library, the information data are divided into text type information and audio type information, and the classified data are sent to the resource library information encryption level analysis module.
By adopting the technical scheme: the resource library information encryption grade analysis module comprises an information data screening and retrieving submodule and an encryption word related judging and analyzing submodule, wherein the information data screening and retrieving submodule is used for screening encryption words from information data in an information data resource library, the encryption words are manually set in real time, text information is directly retrieved for the encryption words, after voice of audio information is converted into words, encryption word retrieval is carried out on the word information, the encryption word related judging and analyzing submodule is used for segmenting information data uploaded by different mechanisms, encryption word statistical analysis is carried out on the segmented information data, and the encryption performance of the current information data is judged.
By adopting the technical scheme: the sub-module for judging and analyzing the related encrypted words is used for segmenting the information data uploaded by different mechanisms, and the information data segment uploaded by one mechanism is set to be L1、L2、L3、…、Ln-1、LnSetting the number of encrypted words in different current segments as C1、C2、C3、…、Cn-1、CnWherein, when CnNot less than 80 or
Figure BDA0002511020150000111
Judging that the current information data is confidentiality information, and when C is more than or equal to 70n< 80 or
Figure BDA0002511020150000112
Determining that the current information data is secret information when
Figure BDA0002511020150000113
And judging that the current information data is the common information, and marking different encryptions of information data analysis by the encrypted word judgment and analysis submodule.
By adopting the technical scheme: the mechanism access identity verification modules comprise a plurality of mechanism original information data uploading confirmation sub-modules and a plurality of mechanism account identification corresponding sub-modules, the mechanism original information data uploading confirmation sub-modules are used for confirming that the mechanism uploads effective information data to a data resource base, a mechanism list with confirmed effective information uploading is sent to the mechanism account identification corresponding sub-modules, the mechanism account identification corresponding sub-modules are used for checking the integrity of identity information when the mechanisms on the mechanism list are registered, when the integrity of the identity information is more than or equal to 80%, the mechanism accounts are authorized, and the mechanism logs in the information data resource base through account passwords during registration to send shared information requests.
By adopting the technical scheme: the mechanism information priority judging modules comprise a sharing request sending frequency counting submodule and a plurality of mechanism risk detection analysis judging submodules, the sharing request sending frequency counting submodule is used for counting the sharing information request frequency sent by different mechanisms, the sharing information request frequency sent by the different mechanisms is sequenced, the sequencing result is sent to the mechanism risk detection analysis judging submodules, the mechanism risk detection analysis judging submodules are used for carrying out sequential risk detection analysis on the mechanisms on the sequencing list for sending the sharing information request frequency, and information sharing is carried out on different encrypted marker files in the information data resource library according to the risk detection grades of the different mechanisms.
By adopting the technical scheme: the organization credit judgment centers comprise a plurality of organization effective information uploading occupation ratio counting sub-modules and a plurality of organization authority opening level obtaining sub-modules, wherein the organization effective information uploading occupation ratio counting sub-modules are used for counting the occupation ratio of effective information uploaded by each organization in an information data resource library, counting the proportion of the effective information uploaded by the organizations in the information data resource library, sending the statistical data to the organization authority opening level obtaining sub-modules, the organization authority opening level obtaining sub-modules are used for carrying out authority level opening marking on the organizations with the uploading effective information occupying ratio exceeding 40% in the information data resource library, sending the marked organizations to a plurality of organization information priority judgment modules, and the organization information priority judgment modules do not carry out risk detection analysis on the organizations marked with the opened authority levels any more, and directly sharing all information in the information data resource library.
A method for sharing information of a plurality of mechanisms based on block chains comprises the following steps:
s1: uploading the acquired information by a plurality of mechanisms by using a plurality of mechanism information data resource base construction modules and then centralizing to form an information data resource base;
s2: carrying out encryption judgment by utilizing a resource library information encryption grade analysis module according to information data uploaded by a plurality of mechanisms;
s3: utilizing a plurality of mechanisms to access an identity authentication module to carry out identity authentication judgment on the mechanisms accessing the information data resource library;
s4: utilizing a plurality of mechanism information priority judging modules to judge the priority of the mechanism needing information sharing;
s5: and utilizing a plurality of institution credit judgment centers to perform credit analysis judgment on the institution accessing the information data resource library.
By adopting the technical scheme: the sharing method further comprises the following steps:
s1-1: the information data classification submodule classifies the information data collected by the information data resource library into text type information and audio type information and sends the classified data to the resource library information encryption grade analysis module;
s2-1: the information data screening and retrieving submodule is used for screening encrypted words from the information data in the information data resource library, wherein the encrypted words are manually set in real time, text information is directly retrieved from the encrypted words, voice conversion is carried out on audio information into words, encrypted word retrieval is carried out on the word information, the encrypted word judgment and analysis submodule is involved for segmenting the information data uploaded by different mechanisms, the information data of the segmented part is subjected to encrypted word statistical analysis, and the encryption of the current information data is judged;
s3-1: the method comprises the steps that a plurality of mechanism original information data uploading confirmation sub-modules are used for confirming that effective information data uploading of a mechanism to a data resource library is carried out, a mechanism list with the confirmed effective information uploading is sent to a plurality of mechanism account identification corresponding sub-modules, the identity information integrity of the mechanism on the mechanism list during registration of the mechanism is checked by the mechanism account identification corresponding sub-modules, when the identity information integrity is larger than or equal to 80%, an account of the mechanism is authorized, and the mechanism logs in the information data resource library through an account password during registration to send a shared information request;
s4-1: utilizing a sharing request sending frequency counting submodule to count the sharing information request frequency sent by different mechanisms, sequencing the sharing information request frequency sent by different mechanisms, sending a sequencing result to a plurality of mechanism risk detection analysis and judgment submodules, carrying out sequential risk detection and analysis on the mechanisms on the sharing information request sending frequency sequencing list by the plurality of mechanism risk detection analysis and judgment submodules, and carrying out information sharing on different encrypted marker files in an information data resource library according to the risk detection grades of different mechanisms;
s5-1: the method comprises the steps that the occupation ratio of effective information uploaded by each mechanism in an information data resource library is counted by utilizing a plurality of mechanism effective information uploading occupation ratio counting sub-modules, the proportion of the effective information uploaded by the mechanisms in the information data resource library is counted, statistical data are sent to a plurality of mechanism permission opening grade acquisition sub-modules, the authority permission opening grade acquisition sub-modules conduct permission grade opening marking on mechanisms with the occupation ratio of the effective information uploaded in the information data resource library exceeding 40%, marking mechanisms are sent to a plurality of mechanism information priority judging modules, the mechanism information priority judging modules do not conduct risk detection analysis on the mechanisms with the marked permission grade opening any more, and all information in the information data resource library is directly shared.
By adopting the technical scheme: in step S4-1, the mechanism risk detection analysis and determination sub-modules perform sequential risk detection analysis on the mechanisms on the ordered list of times of sending shared information requests, and perform information sharing on different encrypted markup files in the information data resource library according to risk detection levels of different mechanisms, and the method further includes the following steps:
the mechanism risk detection analysis judgment submodule detects the registered safety factors of different mechanisms, and the safety factors detected by the different mechanisms are set to be K1、K2、K3、…、Kn-1、KnSetting a safety factor of a certain mechanism as KnSetting the risk index of different mechanisms which are predicted to be logged at present as R0, setting the actual risk value of different mechanisms as Rm, and according to the formula:
Rm=100-[Kn*(1-R0)]
and calculating to obtain an actual risk value of the current mechanism, judging that the current mechanism can share information of all information in the information data resource library when the actual risk value Rm of the mechanism is less than or equal to 20, judging that the current mechanism can share information of secret information and general information in the information data resource library when the actual risk value of the mechanism is more than 20 and less than or equal to 50, and judging that the current mechanism can share information of the general information in the information data resource library when the Rm is more than 50.
Example 1: the related encrypted word judgment and analysis submodule segments the information data uploaded by different mechanisms and sets the segment of the information data uploaded by a certain mechanism to be L1、L2、L3、L4And setting the number of encrypted words in different current segments to be 79, 61, 42 and 82, wherein 82 is more than or equal to 80, judging that the current information data is confidentiality information, and marking the encryption of information data analysis by an encrypted word judgment and analysis submodule.
Example 2: the related encrypted word judgment and analysis submodule segments the information data uploaded by different mechanisms and sets the segment of the information data uploaded by a certain mechanism to be L1、L2、L3、L4、L5The number of encrypted words inside the current different segment is set to 41, 64, 69, 55, 49, wherein,
Figure BDA0002511020150000161
judging the current information data as secret information, relating to the encrypted wordAnd the judgment analysis submodule marks the encryption of the information data analysis.
Example 3: and (4) limiting conditions, detecting the safety factors of the different registered mechanisms by the risk detection, analysis and judgment submodules of the mechanisms, and setting the safety factors detected by the different mechanisms as K1、K2、K3、…、Kn-1、KnSetting the safety coefficient of a certain mechanism as 87, setting the risk index of different mechanisms which are predicted to be logged at present as 7%, setting the actual risk value of different mechanisms as Rm, and according to the formula:
Rm=100-[87*(1-7%)]=19.09
and calculating to obtain that the actual risk value of the current mechanism is 19.09, and when the actual risk value of the mechanism is less than 19.09 and less than 20, judging that the current mechanism can share information of all information in the information data resource library.
Example 4: and (4) limiting conditions, detecting the safety factors of the different registered mechanisms by the risk detection, analysis and judgment submodules of the mechanisms, and setting the safety factors detected by the different mechanisms as K1、K2、K3、…、Kn-1、KnSetting a safety coefficient of a certain mechanism as 63, setting a risk index of different mechanisms for predicting current login as 8%, setting actual risk values of different mechanisms as Rm, and according to a formula:
Rm=100-[63*(1-8%)]=42.04
and calculating to obtain an actual risk value of the current organization as 42.04, and an actual risk value of the organization as 20 & lt 42.04 & lt 50, and judging that the current organization can share secret information and general information in the information data resource library.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (1)

1. A block chain-based information sharing system for multiple organizations, comprising: the system comprises a mechanism information data resource library construction module, a resource library information encryption grade analysis module, a mechanism access identity verification module, a mechanism information priority judgment module and a mechanism credit judgment center, wherein the resource library information encryption grade analysis module, the mechanism access identity verification module, the mechanism information priority judgment module and the mechanism credit judgment center are respectively connected with the mechanism information data resource library construction module through an intranet, and the mechanism access identity verification module, the mechanism information priority judgment module and the mechanism credit judgment center are sequentially connected through the intranet;
the mechanism information data resource library construction module is used for enabling a mechanism to upload acquired information and then centralizedly form an information data resource library, the resource library information encryption grade analysis module is used for carrying out encryption judgment according to information data uploaded by the mechanism, the mechanism access identity verification module is used for carrying out identity verification judgment on a mechanism accessed into the information data resource library, the mechanism information priority judgment module is used for carrying out priority judgment on a mechanism needing information sharing, and the mechanism credit judgment center is used for carrying out credit analysis judgment on the mechanism accessed into the information data resource library;
the resource library information encryption grade analysis module comprises an information data screening and retrieving submodule and an encryption word related judging and analyzing submodule, wherein the information data screening and retrieving submodule is used for screening encryption words from information data in an information data resource library, the encryption words are manually set in real time, text information is directly retrieved for the encryption words, after voice of audio information is converted into words, encryption word retrieval is carried out on the word information, the encryption word related judging and analyzing submodule is used for segmenting information data uploaded by different mechanisms, encryption word statistical analysis is carried out on the segmented information data, and the encryption property of the current information data is judged;
the sub-module for judging and analyzing the related encrypted words is used for segmenting the information data uploaded by different mechanisms, and the information data segment uploaded by one mechanism is set to be L1、L2、L3、…、Lq-1、LqSetting the number of encrypted words in different current segments as C1、C2、C3、…、Cn-1、CnWherein, when CnNot less than 80 or
Figure FDA0003256523770000021
Judging that the current information data is confidentiality information, and when C is more than or equal to 70n< 80 or
Figure FDA0003256523770000022
Figure FDA0003256523770000023
Determining that the current information data is secret information when
Figure FDA0003256523770000024
Judging that the current information data is the ordinary information, and marking different encryptions of the information data by an encrypted word judgment and analysis submodule;
the mechanism access identity verification module comprises a mechanism original information data uploading confirmation submodule and a mechanism account identification corresponding submodule, wherein the mechanism original information data uploading confirmation submodule is used for confirming that the mechanism uploads effective information data to a data resource library, a mechanism list with the effective information uploading confirmed is sent to the mechanism account identification corresponding submodule, the mechanism account identification corresponding submodule is used for verifying the integrity of identity information when the mechanism on the mechanism list is registered, when the integrity of the identity information is more than or equal to 80%, the mechanism is authorized, and the mechanism logs in the information data resource library through an account password when the mechanism is registered and sends a shared information request;
the mechanism information priority judging module comprises a sharing request sending frequency counting submodule and a mechanism risk detection analysis judging submodule, wherein the sharing request sending frequency counting submodule is used for counting the sharing information request frequency sent by different mechanisms, sequencing the sharing information request frequency sent by the different mechanisms and sending a sequencing result to the mechanism risk detection analysis judging submodule, and the mechanism risk detection analysis judging submodule is used for carrying out sequential risk detection analysis on the mechanisms on the sharing information request sending frequency sequencing list and carrying out information sharing on different encrypted marker files in the information data resource library according to the risk detection grades of the different mechanisms;
the mechanism information data resource library construction module comprises a mechanism acquisition information data uploading submodule and an information data classification submodule, wherein the mechanism acquisition information data uploading submodule is used for enabling a mechanism to uniformly upload acquired information data to an information data resource library, the information data resource library summarizes all uploaded information, and the information data classification submodule is used for classifying the information data summarized by the information data resource library, dividing the information data into text type information and audio type information and sending the classified data to the resource library information encryption grade analysis module;
the institution credit judgment center comprises an institution effective information uploading occupation ratio statistics submodule and an institution authority opening level acquisition submodule, wherein the institution effective information uploading occupation ratio statistics submodule is used for counting the occupation ratio of effective information uploaded by each institution in an information data resource library, the method comprises the steps of counting the proportion of effective information uploaded by a mechanism in an information data resource library, sending statistical data to a mechanism authority opening level acquisition submodule, wherein the mechanism authority opening level acquisition submodule is used for carrying out authority level opening marking on mechanisms with the effective information uploaded accounting for more than 40% in the information data resource library, sending a marking mechanism to a mechanism information priority judging module, and the mechanism information priority judging module does not carry out risk detection analysis on the mechanisms with the marked authority level opening and directly carries out all information sharing in the information data resource library;
the multiple organization information sharing system realizes the multiple organization information sharing method through the following steps:
s1: the mechanism uploads the collected information by using a mechanism information data resource library construction module and then centralizes the information to form an information data resource library;
s2: carrying out encryption judgment by utilizing a resource library information encryption grade analysis module according to information data uploaded by a mechanism;
s3: the identity authentication judgment is carried out on the mechanism accessed to the information data resource library by utilizing a mechanism access identity authentication module;
s4: utilizing a mechanism information priority judging module to judge the priority of the mechanism needing information sharing;
s5: utilizing an institution credit judgment center to perform credit analysis judgment on an institution accessing the information data resource library;
the sharing method further comprises the following steps:
s1-1: the information data classification submodule classifies the information data into text type information and audio type information and sends the classified data to the information encryption grade analysis module of the information base;
s2-1: the information data screening and retrieving submodule is used for screening encrypted words from the information data in the information data resource library, wherein the encrypted words are manually set in real time, text information is directly retrieved from the encrypted words, voice conversion is carried out on audio information into words, encrypted word retrieval is carried out on the word information, the encrypted word judgment and analysis submodule is involved for segmenting the information data uploaded by different mechanisms, the information data of the segmented part is subjected to encrypted word statistical analysis, and the encryption of the current information data is judged;
s3-1: the method comprises the steps that an original information data uploading confirmation submodule of a mechanism is used for confirming that the mechanism uploads effective information data to a data resource base, a mechanism list with the effective information uploading confirmed is sent to a mechanism account identification corresponding submodule, the mechanism account identification corresponding submodule verifies the integrity of identity information when the mechanism registers on the mechanism list, when the integrity of the identity information is more than or equal to 80%, the mechanism is authorized, and the mechanism logs in the information data resource base through an account password when registering to send a shared information request;
s4-1: utilizing a sharing request sending frequency counting submodule to count the sharing information request frequency sent by different mechanisms, sequencing the sharing information request frequency sent by different mechanisms, sending a sequencing result to a mechanism risk detection analysis and judgment submodule, carrying out sequential risk detection and analysis on the mechanisms on the sharing information request sending frequency sequencing list by the mechanism risk detection analysis and judgment submodule, and carrying out information sharing on different encrypted marker files in an information data resource library according to the risk detection levels of different mechanisms;
s5-1: the mechanism effective information uploading occupation ratio counting submodule is used for counting the occupation ratio of effective information uploaded by each mechanism in an information data resource library, the proportion of the effective information uploaded by the mechanisms in the information data resource library is counted, the statistical data are sent to the mechanism authority opening grade acquisition submodule, the mechanism authority opening grade acquisition submodule conducts authority grade opening marking on mechanisms with the occupation ratio of the effective information uploaded in the information data resource library exceeding 40%, the marking mechanisms are sent to the mechanism information priority judging module, the mechanism information priority judging module does not conduct risk detection analysis on the mechanisms with the marked authority grade opening, and all information in the information data resource library is directly shared;
in step S4-1, the mechanism risk detection analysis and determination submodule performs sequential risk detection analysis on the mechanisms on the ordered list of times of sending shared information requests, and performs information sharing on different encrypted markup files in the information data resource library according to risk detection levels of different mechanisms, and the method further includes the following steps:
the mechanism risk detection analysis judgment submodule detects the registered safety factors of different mechanisms, and the safety factors detected by the different mechanisms are set to be K1、K2、K3、…、Kp-1、KpSetting a safety factor of a certain mechanism as KuDifferent mechanisms for setting and estimating current loginSetting the risk index as R0, setting the actual risk value of different mechanisms as Rm, and according to the formula:
Rm=100-[Ku*(1-R0)]
and calculating to obtain an actual risk value of the current mechanism, judging that the current mechanism can share information of all information in the information data resource library when the actual risk value Rm of the mechanism is less than or equal to 20, judging that the current mechanism can share information of secret information and general information in the information data resource library when the actual risk value of the mechanism is more than 20 and less than or equal to 50, and judging that the current mechanism can share information of the general information in the information data resource library when the Rm is more than 50.
CN202010461300.5A 2020-05-27 2020-05-27 Multi-mechanism information sharing system and method based on block chain Active CN111625855B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010461300.5A CN111625855B (en) 2020-05-27 2020-05-27 Multi-mechanism information sharing system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010461300.5A CN111625855B (en) 2020-05-27 2020-05-27 Multi-mechanism information sharing system and method based on block chain

Publications (2)

Publication Number Publication Date
CN111625855A CN111625855A (en) 2020-09-04
CN111625855B true CN111625855B (en) 2022-01-14

Family

ID=72271196

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010461300.5A Active CN111625855B (en) 2020-05-27 2020-05-27 Multi-mechanism information sharing system and method based on block chain

Country Status (1)

Country Link
CN (1) CN111625855B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115714666B (en) * 2022-10-19 2023-08-04 上海蜂高科技有限公司 Encryption method based on robot communication and block chain consensus control

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device
CN108256814A (en) * 2017-08-18 2018-07-06 平安科技(深圳)有限公司 Item information processing method, device, server and storage medium
US10373158B1 (en) * 2018-02-12 2019-08-06 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256814A (en) * 2017-08-18 2018-07-06 平安科技(深圳)有限公司 Item information processing method, device, server and storage medium
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device
US10373158B1 (en) * 2018-02-12 2019-08-06 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens

Also Published As

Publication number Publication date
CN111625855A (en) 2020-09-04

Similar Documents

Publication Publication Date Title
US11663364B2 (en) Whole-lifecycle encrypted big data analysis method and system for the data from the different sources
CN105303503B (en) Internet traffic transports political affairs service cloud
CN106295349A (en) Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN112837195B (en) Block chain-based environment monitoring system and method
CN116074843B (en) Zero trust security trusted audit method for 5G dual-domain private network
CN113132311B (en) Abnormal access detection method, device and equipment
CN104504538A (en) Distributed personnel file management system
CN111625855B (en) Multi-mechanism information sharing system and method based on block chain
CN112699357A (en) Big data security system access operation platform and data retrieval method
CN109886031B (en) Smart city information safety guarantee system
CN110826094A (en) Information leakage monitoring method and device
Miller et al. Data Management Life Cycle, Final report
Izrailov et al. Threats classification method for the transport infrastructure of a smart city
CN112507304A (en) Information management system for retired soldiers
CN110489947B (en) Safe office management and control system
CN116089541B (en) Abnormal identification method for massive real estate registration data
CN113010909A (en) Data security classification method and device for scientific data sharing platform
CN114240314B (en) Administrative law enforcement case management method, device and system based on-cloud inspection
CN115086028A (en) Block chain-based data security acquisition method
CN115202999A (en) Method for analyzing and alarming abnormal behavior based on personnel behavior baseline
CN114218316A (en) Vehicle safety management method and system based on Internet of vehicles
CN118018332B (en) Machine learning-based network data leakage early warning system and method thereof
CN115174190B (en) Information security management and control system and method based on network traffic
CN116305314A (en) Website complaint method, equipment and medium based on blockchain
CN118037133A (en) Urban event standardized processing and distributing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20211228

Address after: 430014 No. 88, chenjiaji Avenue, Jiang'an District, Wuhan City, Hubei Province

Applicant after: CITIC digital intelligence (Wuhan) Technology Co.,Ltd.

Address before: 222000 No. 475, Cangwu Road, Haizhou District, Lianyungang City, Jiangsu Province

Applicant before: Shao Zhengye

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant