CN113377578A - Compound encryption system for geographic information data and use method thereof - Google Patents

Compound encryption system for geographic information data and use method thereof Download PDF

Info

Publication number
CN113377578A
CN113377578A CN202110678332.5A CN202110678332A CN113377578A CN 113377578 A CN113377578 A CN 113377578A CN 202110678332 A CN202110678332 A CN 202110678332A CN 113377578 A CN113377578 A CN 113377578A
Authority
CN
China
Prior art keywords
data
submodule
module
user
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110678332.5A
Other languages
Chinese (zh)
Inventor
祖瑾伟
张宗伟
卢宇森
冯兴龙
李侃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Xingxun Intelligent Communication Technology Co ltd
Original Assignee
Xi'an Xingxun Intelligent Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Xingxun Intelligent Communication Technology Co ltd filed Critical Xi'an Xingxun Intelligent Communication Technology Co ltd
Priority to CN202110678332.5A priority Critical patent/CN113377578A/en
Publication of CN113377578A publication Critical patent/CN113377578A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Remote Sensing (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a composite encryption system of geographic information data and a using method thereof, relating to the technical field of geographic information data; the method aims to solve the problem that the geographic information data cannot be encrypted in a segmented and multistage manner; the system specifically comprises an operation unit and a data storage encryption unit, wherein the operation unit comprises a login module, an abnormal login processing module and a geographic information display module, the data storage encryption unit comprises a classified storage module, a data encryption module and a data extraction module, and the operation unit is in communication connection with the data storage encryption unit; according to the invention, the data segmentation sub-module is arranged, the binary data stored by the classification storage module can be segmented by the data segmentation sub-module, a user divides the data into a plurality of sections according to requirements, and a check password is independently arranged for each section of data, so that the secrecy effect of the file is improved, and even if one section of the file is divulged, lawless persons cannot easily obtain the rest of the plurality of sections of files.

Description

Compound encryption system for geographic information data and use method thereof
Technical Field
The invention relates to the technical field of geographic information data, in particular to a composite encryption system of geographic information data and a using method thereof.
Background
The geographic data is data directly or indirectly related to a certain place relative to the earth, is a plurality of element files of natural phenomena and social phenomena representing geographic positions and distribution characteristics, and comprises natural geographic data and social and economic data, such as land cover type data, landform data, soil data, hydrology data, vegetation data, residential area data, river data, administrative and social and economic data and the like, wherein the data are characteristics in an area, and after the data are recorded and stored, in order to prevent the data from being stolen by non-users, encryption processing is usually carried out on plaintext data to encrypt plaintext data into ciphertext.
Through retrieval, the patent with the Chinese patent application number of CN201910553420.5 discloses a geographic information data composite encryption system, which comprises an IT infrastructure layer, a data layer, a logic layer and an application layer, wherein the IT infrastructure layer is used for providing basic equipment for the system and ensuring the normal operation of the system; the data layer is used for providing storage and query of data files for a system, and the data files comprise keys and operation logs; the logic layer is used for providing interfaces for processing various service logics in the application layer, but in the technical scheme, a corresponding module capable of carrying out segmented multi-encryption on the geographic information data is not arranged, so that the problem that the segmented multi-level encryption on the geographic information data cannot be carried out exists.
Disclosure of Invention
The invention aims to solve the defects in the prior art and provides a geographic information data composite encryption system and a using method thereof.
In order to achieve the purpose, the invention adopts the following technical scheme:
the composite encryption system comprises an operation unit and a data storage encryption unit, wherein the operation unit comprises a login module, an abnormal login processing module and a geographic information display module, the data storage encryption unit comprises a classification storage module, a data encryption module and a data extraction module, and the operation unit is in communication connection with the data storage encryption unit.
Preferably: the login module comprises a password authentication submodule, a fingerprint identification submodule and a face identification submodule, wherein a first-level password and a second-level password input by a user are encrypted by an MD5 algorithm through the password authentication submodule, then the encrypted codes are compared with MD5 codes corresponding to the user passwords stored in a database to judge whether the passwords are input correctly, the fingerprint identification submodule and the face identification submodule identify the fingerprints and the faces of the user, and the face identification submodule shoots the faces of the user and stores the faces through a data storage encryption unit while identifying the faces.
Further: the abnormal login processing module comprises a monitoring submodule, a data destruction submodule and an abnormal information sending submodule, wherein the monitoring submodule monitors the operation of a user through a face identification submodule, the data destruction submodule deletes and destroys a file displayed by inputting a primary password under the conditions that the monitoring submodule is abnormal, a secondary password is wrongly input and fingerprint verification is failed, and the abnormal information sending submodule sends an abnormal short message to an administrator and an uploading user of an encrypted file when the password authentication submodule, the fingerprint identification submodule and the face identification submodule are abnormally logged in, and extracts picture video information shot by the monitoring submodule through the face identification submodule to be checked by the administrator and the uploading user.
Further preferred is: the geographic information display module comprises a classification display submodule, a data retrieval submodule and a data downloading submodule, wherein the classification display submodule displays data required to be queried by a user in a classification mode according to time, place and file types, the data retrieval submodule retrieves data information required to be queried and input by the user, then the data required by the user is transmitted to the classification display submodule from a data storage encryption unit according to a retrieval result, and the data downloading submodule judges whether the user has the permission to download the data and whether the file is allowed to be downloaded according to the user permission and the file classification.
As a preferable aspect of the present invention: the classified storage module comprises a classified retrieval submodule and a data timing cleaning submodule, the classified retrieval submodule classifies and stores files according to the file types, storage time and places corresponding to geographic information data of the files stored by a user, the user sets different file timeliness for different files, and the data timing cleaning submodule deletes the files after the files exceed the set timeliness so as to reduce data storage pressure.
Further preferred as the invention: the classified storage module further comprises a cloud uploading submodule, the cloud uploading submodule can transmit the data stored in the classified storage module to the cloud for storage and backup, and meanwhile, a user retrieves the data stored in the cloud through the data retrieval submodule.
As a still further scheme of the invention: the data encryption module comprises a data segmentation submodule, a segmentation encryption submodule and a password encryption submodule, wherein the first-level and second-level multi-level passwords input when the password encryption submodule registers and uploads a file are encrypted through an MD5 algorithm, then the encrypted password data are uploaded to the cloud through the cloud uploading submodule to be stored, the data segmentation submodule segments binary data stored by the classification storage module, a user divides the data into multiple segments according to requirements, a check password is independently set for each segment of data, and the data divided into the multiple segments by the segmentation encryption submodule are encrypted through an RSA and DES encryption algorithm in multiple stages.
On the basis of the scheme: the data extraction module comprises a data segmentation extraction submodule, a data segmentation decryption submodule and an error reporting submodule, after a user inputs a password corresponding to each segment of a multi-segment file through the password authentication submodule and verifies the password, the data segmentation extraction submodule extracts the corresponding segmented file to the classification display submodule to display according to the password input sequence, the data segmentation decryption submodule decrypts the encrypted file extracted by the data segmentation extraction submodule, and the error reporting submodule generates a log file according to errors generated during decryption and file extraction and sends the log file to an administrator to help the administrator to process the error file.
A method for using a composite encryption system for geographic information data comprises the following steps:
s1: the user performs identity verification through the password authentication sub-module, the fingerprint identification sub-module and the face identification sub-module;
s2: when a user searches geographic information data, inputting corresponding time, place and file type information through the data retrieval submodule, after the data retrieval submodule searches the information, inputting the multistage passwords corresponding to the multiple sections of files through the password authentication module again by the user, and displaying the geographic information data on the classification display submodule for the user to check after the passwords are input correctly;
s3: when a user stores geographic information data, the data is divided into a plurality of sections through the selection of the data segmentation submodule, then corresponding checking passwords are set for each section of file, and meanwhile, the user permission level capable of downloading the file is set and can also be set to be not downloadable;
s4: when a user inputs a corresponding segmented file viewing password and errors continuously, the abnormal information sending sub-module sends the abnormal information to a file uploading user and a system administrator in a short message mode to remind the file uploading user to change the file viewing password as soon as possible or to upload the file again and encrypt the file again.
The invention has the beneficial effects that:
1. the data segmenting submodule segments the binary data stored in the classifying storage module, a user divides the data into multiple segments according to requirements, and a check password is independently set for each segment of data, so that the security effect of the file is improved, a lawless person cannot easily obtain the remaining multiple segments of files even if one segment of files is divulged, and the segmenting encryption submodule performs multi-stage encryption on the data divided into multiple segments through an RSA and DES encryption algorithm, so that the encryption level of the geographic information data is improved.
2. The monitoring submodule monitors the operation of a user through the face recognition submodule, so that lawless persons can be caught conveniently, the data destruction submodule deletes and destroys files displayed by inputting a primary password under the conditions that the monitoring submodule is abnormal, a secondary password is input wrongly and fingerprint verification is failed, the safety of the files is improved, the abnormal information sending submodule sends abnormal short messages to an administrator and an uploading user of an encrypted file when the password authentication submodule, the fingerprint recognition submodule and the face recognition submodule are abnormally logged in, and picture video information shot by the monitoring submodule through the face recognition submodule is extracted for the administrator and the uploading user to check.
3. The data download submodule judges whether the user has the permission to download the data and whether the file is allowed to be downloaded according to the user permission and the file classification, and avoids the problem that various subsequent copyright occurs due to random downloading of the file.
4. The classified retrieval submodule is used for classified storage of the files according to the file types, storage time and places corresponding to geographic information data of the files stored by a user, the user sets different file timeliness for different files, the data timed cleaning submodule can delete the files after the files exceed the set timeliness so as to reduce data storage pressure, the cloud uploading submodule can transmit the data stored in the classified storage module to the cloud for storage and backup, and meanwhile the user retrieves the data stored in the cloud through the data retrieval submodule.
5. The data segmentation decryption submodule decrypts the encrypted file extracted by the data segmentation extraction submodule and sends the decrypted file to the classification display submodule to be displayed, and the error reporting submodule generates a log file according to an error generated during decryption and file extraction and sends the log file to an administrator to help the administrator to process the error file.
Drawings
Fig. 1 is a schematic diagram of an operation unit of a complex encryption system for geographic information data according to the present invention;
fig. 2 is a schematic diagram of a data storage encryption unit of a complex encryption system for geographic information data according to the present invention.
Detailed Description
The technical solution of the present patent will be described in further detail with reference to the following embodiments.
Reference will now be made in detail to embodiments of the present patent, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present patent and are not to be construed as limiting the present patent.
In the description of this patent, it is to be understood that the terms "center," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in the orientations and positional relationships indicated in the drawings for the convenience of describing the patent and for the simplicity of description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are not to be considered limiting of the patent.
In the description of this patent, it is noted that unless otherwise specifically stated or limited, the terms "mounted," "connected," and "disposed" are to be construed broadly and can include, for example, fixedly connected, disposed, detachably connected, disposed, or integrally connected and disposed. The specific meaning of the above terms in this patent may be understood by those of ordinary skill in the art as appropriate.
Example 1:
the composite encryption system for the geographic information data comprises an operation unit and a data storage encryption unit, wherein the operation unit comprises a login module, an abnormal login processing module and a geographic information display module, the data storage encryption unit comprises a classified storage module, a data encryption module and a data extraction module, and the operation unit is in communication connection with the data storage encryption unit.
In order to be able to verify the identity of the login person; the login module comprises a password authentication submodule, a fingerprint identification submodule and a face identification submodule, wherein the password authentication submodule can encrypt a primary password and a secondary password input by a user through an MD5 algorithm, the encrypted codes are compared with MD5 codes corresponding to the user passwords stored in a database so as to judge whether the passwords are input correctly, the fingerprint identification submodule and the face identification submodule can identify fingerprints and faces of the user, and the face identification submodule can shoot the face of the user while identifying the face and stores the face through a data storage encryption unit.
To avoid leakage of encryption information; the abnormal login processing module comprises a monitoring submodule, a data destruction submodule and an abnormal information sending submodule, wherein the monitoring submodule can monitor the operation of a user through a face identification submodule, the data destruction submodule can delete and destroy a file displayed by inputting a primary password under the conditions that the monitoring submodule is abnormal, a secondary password is input incorrectly and fingerprint verification is not passed, the abnormal information sending submodule sends an abnormal short message to an administrator and an uploading user of an encrypted file when the password authentication submodule, the fingerprint identification submodule and the face identification submodule are abnormally logged in, and picture video information shot by the monitoring submodule through the face identification submodule is extracted and provided for the administrator and the uploading user to check.
In order to display the geographic information data which needs to be viewed by the user in a classified manner; the geographic information display module comprises a classification display submodule, a data retrieval submodule and a data downloading submodule, wherein the classification display submodule displays data required to be queried by a user in a classification mode according to time, place and file types, the data retrieval submodule retrieves data information required to be queried and input by the user, then the data required by the user is transmitted to the classification display submodule from a data storage encryption unit according to a retrieval result, and the data downloading submodule can judge whether the user has the permission to download the data and whether the file is allowed to be downloaded according to the user permission and the file classification.
In order to store the data stored by the user in a classified manner; the classified storage module comprises a classified retrieval submodule and a data timing cleaning submodule, the classified retrieval submodule can store the files in a classified mode according to the types of the files stored in the files by a user, storage time and places corresponding to geographic information data, the user can set different file timeliness for different files, and the data timing cleaning submodule can delete the files after the files exceed the set timeliness so as to reduce data storage pressure.
In order to improve the data storage and transmission efficiency; the classified storage module further comprises a cloud uploading submodule, the cloud uploading submodule can transmit the data stored in the classified storage module to the cloud for storage and backup, and meanwhile, a user can retrieve the data stored in the cloud through the data retrieval submodule.
In order to be able to encrypt the stored geographic information data; the data encryption module comprises a data segmentation submodule, a segmentation encryption submodule and a password encryption submodule, the password encryption submodule can encrypt first-level and second-level multi-level passwords input when a user registers and uploads a file through an MD5 algorithm, then encrypted password data are uploaded to the cloud end through the cloud end uploading submodule to be stored, the data segmentation submodule can segment binary data stored in the classification storage module, the user can divide the data into multiple segments according to requirements, a check password can be set for each segment of data independently, and the segmentation encryption submodule can conduct multi-level encryption on the data after being divided into multiple segments through RSA and DES encryption algorithms.
In order to quickly extract data required by a user; the data extraction module comprises a data segmentation extraction submodule, a data segmentation decryption submodule and an error reporting submodule, after a user inputs a password corresponding to each segment of a multi-segment file through the password authentication submodule and verifies the password, the data segmentation extraction submodule extracts the corresponding segmented file to the classification display submodule to display according to the password input sequence, the data segmentation decryption submodule decrypts the encrypted file extracted by the data segmentation extraction submodule, and the error reporting submodule generates a log file according to errors generated during decryption and file extraction and sends the log file to an administrator to help the administrator to process the error file.
When the embodiment is used, a user inputs a login password through the password authentication submodule, then verifies a fingerprint through the fingerprint identification submodule, finally performs face identification through the face identification submodule, and then logs in the system, the face identification submodule can shoot the face of the user while identifying the face and stores the face through the data storage encryption unit, the monitoring submodule can monitor the operation of the user through the face identification submodule, the data destruction submodule deletes and destroys a file which is displayed by inputting a primary password under the conditions that the monitoring submodule is abnormal, the secondary password is input incorrectly and the fingerprint is not verified, the abnormal information sending submodule sends an abnormal short message to an administrator and an uploading user of an encrypted file when the password authentication submodule, the fingerprint identification submodule and the face identification submodule log in an abnormal way, the data retrieval submodule retrieves data information which needs to be queried and is input by a user, and then transmits the data which needs to be queried to the classification display submodule from the data storage encryption unit according to a retrieval result, and the data download submodule can judge whether the user has the authority of downloading data and whether the file is allowed to be downloaded according to the user authority and the file classification.
The classified retrieval submodule can store the files in a classified mode according to the types, storage time and places corresponding to geographic information data of the files stored by a user, the user can set different file aging times for different files, when the files exceed the set aging time, the file is deleted by the data timed cleaning submodule to reduce data storage pressure, the cloud end uploading submodule can transmit the data stored in the classified storage module to the cloud end for storage and backup, the user can retrieve the data stored in the cloud end through the data retrieval submodule, the password encryption submodule can encrypt first-level and second-level multi-level passwords input when the user registers and uploads the files through an MD5 algorithm, then the encrypted password data are uploaded to the cloud end through the cloud end uploading submodule for storage, and the data segmentation submodule can segment binary data stored in the classified storage module, the user can divide the data into a plurality of sections according to the requirement, and can set up a check password for each section of data independently, the subsection encryption submodule can carry out multi-stage encryption on the data after being divided into the plurality of sections through RSA and DES encryption algorithms, the user inputs the corresponding password of each section of the plurality of sections of files through the password authentication submodule and verifies the data after passing, the data subsection extraction submodule can extract the corresponding subsection files to the classification display submodule according to the password input sequence to display, the data subsection decryption submodule can decrypt the encrypted files extracted by the data subsection extraction submodule, the error reporting submodule can generate a log file according to the errors generated during decryption and file extraction, and the log file is sent to an administrator to help the administrator to process the error files.
Example 2:
a method for using a composite encryption system for geographic information data comprises the following steps:
s1: the user performs identity verification through the password authentication sub-module, the fingerprint identification sub-module and the face identification sub-module;
s2: when a user searches geographic information data, the corresponding information such as time, place, file type and the like can be input through the data retrieval submodule, after the data retrieval submodule searches the information, the user inputs the multistage passwords corresponding to the multiple sections of files through the password authentication module again, and after the passwords are input correctly, the geographic information data can be displayed on the classification display submodule for the user to check;
s3: when the user stores the geographic information data, the data is divided into a plurality of sections through the selection of the data segmentation submodule, then corresponding checking passwords are set for each section of file, and meanwhile, the user permission level of the file which can be downloaded is set, and meanwhile, the user permission level can also be set to be not downloadable;
s4: when a user inputs a corresponding segmented file viewing password and errors continuously, the abnormal information sending sub-module sends the abnormal information to a file uploading user and a system administrator in a short message mode to remind the file uploading user to change the file viewing password as soon as possible or to upload the file again and encrypt the file again.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (9)

1. The composite encryption system for the geographic information data comprises an operation unit and a data storage encryption unit, and is characterized in that the operation unit comprises a login module, an abnormal login processing module and a geographic information display module, the data storage encryption unit comprises a classification storage module, a data encryption module and a data extraction module, and the operation unit is in communication connection with the data storage encryption unit.
2. The system of claim 1, wherein the login module comprises a password authentication sub-module, a fingerprint recognition sub-module and a face recognition sub-module, the password authentication sub-module encrypts a first-level password and a second-level password input by a user through an MD5 algorithm, the encrypted codes are compared with an MD5 code corresponding to the user password stored in a database to determine whether the passwords are input correctly, the fingerprint recognition sub-module and the face recognition sub-module recognize the fingerprint and the face of the user, and the face recognition sub-module photographs the face of the user while recognizing the face and stores the photographed face through the data storage encryption unit.
3. A complex encryption system for geographic information data according to claim 2, the abnormal login processing module comprises a monitoring submodule, a data destruction submodule and an abnormal information sending submodule, wherein the monitoring submodule monitors the operation of a user through a face identification submodule, the data destruction submodule deletes and destroys a file displayed by inputting a primary password under the conditions that the monitoring submodule is abnormal, a secondary password is input wrongly and fingerprint verification is not passed, the abnormal information sending submodule sends an abnormal short message to an administrator and an uploading user of an encrypted file when the password authentication submodule, the fingerprint identification submodule and the face identification submodule are abnormally logged in, and the monitoring submodule extracts the picture video information shot by the face recognition submodule for an administrator and an uploading user to check.
4. A composite encryption system for geographic information data according to claim 3 and characterized in that said geographic information display module comprises a classification display sub-module, a data retrieval sub-module and a data download sub-module, wherein the classification display sub-module displays the data to be queried by the user in a classification manner according to time, place and file type, the data retrieval sub-module retrieves the data information to be queried input by the user, then transmits the data required by the user from the data storage encryption unit to the classification display sub-module according to the retrieval result, and the data download sub-module judges whether the user has the right to download the data and whether the file is allowed to be downloaded according to the user right and file classification.
5. The composite encryption system for geographic information data according to claim 4, wherein the classification storage module comprises a classification retrieval submodule and a data timing cleaning submodule, the classification retrieval submodule classifies and stores the files according to the file types, storage time and places corresponding to the geographic information data of the files stored by a user, the user sets different file aging times for different files, and the data timing cleaning submodule deletes the files after the files exceed the set aging times so as to reduce the data storage pressure.
6. The system of claim 5, wherein the classified storage module further comprises a cloud uploading sub-module, the cloud uploading sub-module transmits the data stored in the classified storage module to a cloud for storage and backup, and a user retrieves the data stored in the cloud through the data retrieval sub-module.
7. The composite encryption system for geographic information data according to claim 6, wherein the data encryption module comprises a data segmentation submodule, a segmentation encryption submodule and a password encryption submodule, the password encryption submodule encrypts first-level, second-level and other multi-level passwords input during user registration and file uploading through an MD5 algorithm, then encrypted password data are uploaded to a cloud end through the cloud end uploading submodule to be stored, the data segmentation submodule segments binary data stored in the classification storage module, a user divides the data into multiple segments according to requirements, a check password is independently set for each segment of data, and the segmentation encryption submodule encrypts the data divided into the multiple segments through RSA and DES encryption algorithms in multiple stages.
8. The system of claim 7, wherein the data extraction module comprises a data segmentation extraction submodule, a data segmentation decryption submodule and an error reporting submodule, wherein after a user inputs a password corresponding to each of the plurality of sections of files through the password authentication submodule and verifies the password, the data segmentation extraction submodule extracts the corresponding segmented files to the classification display submodule to display according to the password input sequence, the data segmentation decryption submodule decrypts the encrypted files extracted by the data segmentation extraction submodule, and the error reporting submodule generates a log file according to errors generated during decryption and file extraction and sends the log file to the administrator to help the administrator process the error files.
9. A method of using a composite encryption system for geographic information data according to any of claims 1-8, comprising the steps of:
s1: the user performs identity verification through the password authentication sub-module, the fingerprint identification sub-module and the face identification sub-module;
s2: when a user searches geographic information data, inputting corresponding time, place and file type information through the data retrieval submodule, after the data retrieval submodule searches the information, inputting the multistage passwords corresponding to the multiple sections of files through the password authentication module again by the user, and displaying the geographic information data on the classification display submodule for the user to check after the passwords are input correctly;
s3: when a user stores geographic information data, the data is divided into a plurality of sections through the selection of the data segmentation submodule, then corresponding checking passwords are set for each section of file, and meanwhile, the user permission level capable of downloading the file is set and can also be set to be not downloadable;
s4: when a user inputs a corresponding segmented file viewing password and errors continuously, the abnormal information sending sub-module sends the abnormal information to a file uploading user and a system administrator in a short message mode to remind the file uploading user to change the file viewing password as soon as possible or to upload the file again and encrypt the file again.
CN202110678332.5A 2021-06-18 2021-06-18 Compound encryption system for geographic information data and use method thereof Withdrawn CN113377578A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110678332.5A CN113377578A (en) 2021-06-18 2021-06-18 Compound encryption system for geographic information data and use method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110678332.5A CN113377578A (en) 2021-06-18 2021-06-18 Compound encryption system for geographic information data and use method thereof

Publications (1)

Publication Number Publication Date
CN113377578A true CN113377578A (en) 2021-09-10

Family

ID=77577712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110678332.5A Withdrawn CN113377578A (en) 2021-06-18 2021-06-18 Compound encryption system for geographic information data and use method thereof

Country Status (1)

Country Link
CN (1) CN113377578A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113722367A (en) * 2021-09-16 2021-11-30 北京航空航天大学 Cache database data organization method and system
CN114253484A (en) * 2021-12-25 2022-03-29 东莞市微三云大数据科技有限公司 Big data cloud storage server
CN114547690A (en) * 2022-02-24 2022-05-27 深圳市裕熙科技有限公司 Information security risk management system based on big data and edge calculation
CN116192947A (en) * 2023-04-25 2023-05-30 单县不动产登记中心 Real estate data safety storage management system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113722367A (en) * 2021-09-16 2021-11-30 北京航空航天大学 Cache database data organization method and system
CN114253484A (en) * 2021-12-25 2022-03-29 东莞市微三云大数据科技有限公司 Big data cloud storage server
CN114253484B (en) * 2021-12-25 2023-06-09 东莞市微三云大数据科技有限公司 Big data cloud storage server
CN114547690A (en) * 2022-02-24 2022-05-27 深圳市裕熙科技有限公司 Information security risk management system based on big data and edge calculation
CN114547690B (en) * 2022-02-24 2024-05-14 深圳市裕熙科技有限公司 Information security risk management system based on big data and edge calculation
CN116192947A (en) * 2023-04-25 2023-05-30 单县不动产登记中心 Real estate data safety storage management system

Similar Documents

Publication Publication Date Title
CN113377578A (en) Compound encryption system for geographic information data and use method thereof
CN106097470B (en) A kind of intelligent inspection system of high secrecy of anti-cheating
US8490164B2 (en) User authentication method, user authenticating device and program product
CN112000975B (en) Key management system
CN107147652A (en) A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
CN111726345B (en) Video real-time face encryption and decryption method based on authorization authentication
CN105933280A (en) Identity authentication method and system
CN103281340A (en) Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN112182519A (en) Computer storage system security access method and access system
CN112688972B (en) Method and system for protecting account security
CN108881298A (en) A kind of network safety system and implementation method based on big data platform
CN113472793A (en) Personal data protection system based on hardware password equipment
CN112329042A (en) Big data secure storage system and method
CN110022314A (en) A kind of big data safe transmission method based on matrix two-dimensional code
CN112565265A (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN115641067A (en) Student information integrated management system based on cloud platform
CN109190343A (en) A kind of identity verification secure Verification System based on fingerprint recognition
CN108696508A (en) System and method based on CN39 code authentication resident identification card numbers
CN111600712A (en) Safety encryption processing system for geographic information data
CN107358084A (en) The cloud storage method and apparatus of data
CN112637172A (en) Novel data security and confidentiality method
CN110049487A (en) A kind of high safety encryption storage remote destroying management system and its working method based on Beidou
CN114553528A (en) Internal and external network data safety transmission system and transmission method thereof
TWI656454B (en) Method and system for preventing password file leakage detection
CN114189359A (en) Internet of things equipment for avoiding data tampering, and data secure transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210910