CN113515555B - Working method for carrying out government affair data security through big data network - Google Patents

Working method for carrying out government affair data security through big data network Download PDF

Info

Publication number
CN113515555B
CN113515555B CN202110284771.8A CN202110284771A CN113515555B CN 113515555 B CN113515555 B CN 113515555B CN 202110284771 A CN202110284771 A CN 202110284771A CN 113515555 B CN113515555 B CN 113515555B
Authority
CN
China
Prior art keywords
network
data
cloud platform
wireless
touch display
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110284771.8A
Other languages
Chinese (zh)
Other versions
CN113515555A (en
Inventor
杨琴
师铭
姚平波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Yangcheng Big Data Technology Co ltd
Original Assignee
Chongqing Yangcheng Big Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Yangcheng Big Data Technology Co ltd filed Critical Chongqing Yangcheng Big Data Technology Co ltd
Priority to CN202110284771.8A priority Critical patent/CN113515555B/en
Publication of CN113515555A publication Critical patent/CN113515555A/en
Application granted granted Critical
Publication of CN113515555B publication Critical patent/CN113515555B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a working method for government affair data security through a big data network, which comprises an inquiry terminal, wherein the inquiry terminal comprises a box body, a touch display screen is fixedly arranged on a touch display screen mounting seat, an identity ID card reader is fixedly arranged on the identity ID card reader mounting seat, peep-proof plates protruding outwards are arranged on two sides of the front surface of the box body, a control circuit board mounting seat for fixedly mounting a control circuit board is arranged in the box body, and the control circuit board is fixedly arranged on the control circuit board mounting seat; after the user information is read by the identity ID card reader, the user information is processed and then transmitted to the cloud platform for verification, and the data information corresponding to the user is called and displayed on the touch display screen. The invention can protect and prevent other inquirers waiting from browsing the privacy content and protect inquirers; and data security may be achieved.

Description

Working method for carrying out government affair data security through big data network
Technical Field
The invention relates to the technical field of inquiry terminals, in particular to a working method for carrying out government affair data security through a big data network.
Background
With the development of big data technology, government departments open business cooperation through data sharing, so that the efficiency of mass business handling is improved. At present, large data center construction projects with large and small sizes are developed all over the country, the project contents mainly take data aggregation as means, and data sharing is targeted, and the project contents comprise a basic library, a business library, a main body library and the like for short, so that various sharing services are formed. When the service is applied, the application needs to be provided by a use department, and the service can be used after the service passes the audit of the data attribution department. The patent application number 201922253946X, named as a comprehensive government affair cooperative service system, discloses a cooperative server device for providing data support of the government affair cooperative service system, an intelligent desktop integrated machine terminal for providing the government affair cooperative service function, and computer terminal management equipment for performing configuration operation on a background government affair cooperative service system, wherein the three devices are connected through a communication line; the intelligent desktop all-in-one terminal comprises a touch display screen for providing touch interaction operation, an identity information reading device for reading and identifying personnel identity information, a bill printing device for printing a bill number after the touch display screen is used for taking a number, accepting a receipt and a material circulation label, and a processor device for providing information storage and processing capacity, wherein the three devices are respectively connected with the processor device. The system can realize the cooperation and intelligent handling of the government affair service and improve the efficiency of the government affair cooperation service. But the patent application does not prevent the inquirer waiting to browse the privacy content on the screen, so that the privacy of the inquirer is not convenient to protect.
Disclosure of Invention
The invention aims at least solving the technical problems in the prior art, and particularly creatively provides a working method for carrying out government affair data security through a big data network.
In order to achieve the above-mentioned purpose of the invention, the invention provides a carry on the security inquiry terminal of government affair data through the big data network, including the body, there is space sunken inwards in the front of said body, there are touch display screen mounting seats used for fixedly installing the touch display screen in the sunken space, the touch display screen is fixedly installed on touch display screen mounting seat, there are identity ID card reader mounting seats used for fixedly installing the identity ID card reader in the sunken space underside, the identity ID card reader is fixedly installed on identity ID card reader mounting seat, there are outwards protruding peep-proof boards in the front both sides of the body, there are control circuit board mounting seats used for fixedly installing the control circuit board in said body, the control circuit board is fixedly installed on control circuit board mounting seat, there are controllers and network transmission modules on the control circuit board, the network transmission data end of the said controllers is connected with network transmission data end of the network transmission module, the identity information data output end of the said identity ID card reader is connected with identity information data input end of the controller, the touch display end of the controller is connected with touch display end of the touch display screen;
After the user information is read by the identity ID card reader, the user information is processed and then transmitted to the cloud platform for verification, and the data information corresponding to the user is called and displayed on the touch display screen.
The camera is fixedly arranged on the camera fixed installation area; the camera is positioned above the touch display screen; the image data output end of the camera is connected with the image data input end of the controller.
In a preferred embodiment of the invention, the anti-sight glass fixing and installing device further comprises an anti-sight glass fixing and installing area which is arranged on the front surface of the box body and used for fixing the anti-sight glass, wherein the anti-sight glass is positioned above the touch display screen and positioned on the left side or the right side of the camera; the anti-sight glass is fixedly arranged on the anti-sight glass fixing installation area.
In a preferred embodiment of the present invention, the network transmission module includes a network wireless transmission unit or/and a network wired transmission unit;
the wireless data end of the network wireless transmission unit is connected with the wireless data end of the controller, and the wired data end of the network wired transmission unit is connected with the wired data end of the controller.
In a preferred embodiment of the present invention, the network wireless transmission unit includes one or any combination of a network wireless WiFi transmission subunit, a network wireless 5G transmission subunit, and a network wireless 4G transmission subunit;
The wireless WiFi data end of the network wireless WiFi transmission subunit is connected with the wireless WiFi data end of the controller, the wireless 5G data end of the network wireless 5G transmission subunit is connected with the wireless 5G data end of the controller, and the wireless 4G data end of the network wireless 4G transmission subunit is connected with the wireless 4G data end of the controller.
In a preferred embodiment of the present invention, the network wired transmission unit includes a hundred meganetwork wired transmission subunit or/and a gigabit network wireless transmission subunit; the hundred mega network wired data end of the hundred mega network wired transmission unit is connected with the hundred mega wired data end of the controller, and the gigabit network wired data end of the gigabit network wired transmission unit is connected with the gigabit wired data end of the controller.
The invention also discloses a working method for carrying out government affair data security through the big data network, which comprises the following steps of:
s1, acquiring user information;
s2, processing the user information obtained in the step S1 and transmitting the processed user information to the cloud platform;
and S3, after the cloud platform verifies, displaying the data information corresponding to the user on the touch display screen.
In summary, by adopting the technical scheme, the invention can protect and prevent other inquirers waiting from browsing the private content and protect inquirers; and data security may be achieved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 is a schematic block diagram of a flow of the present invention.
Fig. 2 is a schematic structural view of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
The invention discloses a government affair data safety inquiry terminal through a big data network, which comprises a box body 5, wherein the front surface of the box body 5 is provided with an inward concave space, the concave space is provided with a touch display screen mounting seat for fixedly mounting a touch display screen 3, the touch display screen 3 is fixedly mounted on the touch display screen mounting seat, the lower side of the concave space is provided with an identity ID card reader mounting seat for fixedly mounting an identity ID card reader 4, the identity ID card reader 4 is fixedly mounted on the identity ID card reader mounting seat, the two sides of the front surface of the box body 5 are provided with outward convex peeping prevention plates 6, the inside of the box body 5 is provided with a control circuit board mounting seat for fixedly mounting a control circuit board, the control circuit board is fixedly mounted on the control circuit board mounting seat, the control circuit board is provided with a controller and a network transmission module, the network transmission data end of the controller is connected with the network transmission data end of the network transmission module, the identity information data output end of the identity ID card reader 4 is connected with the identity information data input end of the controller, and the touch display end of the controller is connected with the touch display end of the touch display screen 3;
After the user information is read by the identity ID card reader 4, the user information is processed and then transmitted to the cloud platform for verification, and the data information corresponding to the user is called and displayed on the touch display screen 3.
In a preferred embodiment of the present invention, the network transmission module includes a network wireless transmission unit or/and a network wired transmission unit;
the wireless data end of the network wireless transmission unit is connected with the wireless data end of the controller, and the wired data end of the network wired transmission unit is connected with the wired data end of the controller;
the network wireless transmission unit comprises one or any combination of a network wireless WiFi transmission subunit, a network wireless 5G transmission subunit and a network wireless 4G transmission subunit;
the wireless WiFi data end of the network wireless WiFi transmission subunit is connected with the wireless WiFi data end of the controller, the wireless 5G data end of the network wireless 5G transmission subunit is connected with the wireless 5G data end of the controller, and the wireless 4G data end of the network wireless 4G transmission subunit is connected with the wireless 4G data end of the controller;
the network wired transmission unit comprises a hundred mega network wired transmission subunit and/or a giga network wireless transmission subunit; the hundred mega network wired data end of the hundred mega network wired transmission unit is connected with the hundred mega wired data end of the controller, and the gigabit network wired data end of the gigabit network wired transmission unit is connected with the gigabit wired data end of the controller.
In a preferred embodiment of the present invention, the camera fixing device further comprises a camera fixing area arranged on the front surface of the case 5 for fixing the camera 1, wherein the camera 1 is fixedly installed on the camera fixing area; the camera 1 is positioned above the touch display screen 3; the image data output end of the camera 1 is connected with the image data input end of the controller.
In a preferred embodiment of the present invention, the anti-sight glass fixing and installing device further comprises an anti-sight glass fixing and installing area which is arranged on the front surface of the box body 5 and used for fixing the anti-sight glass 2, wherein the anti-sight glass 2 is positioned above the touch display screen 3 and positioned on the left side or the right side of the camera 1; the endoscope 2 is fixedly mounted on the endoscope fixing mounting area.
The invention also provides a working method for carrying out government affair data security through a big data network, as shown in figure 2, comprising the following steps:
s1, acquiring user information;
s2, processing the user information obtained in the step S1 and transmitting the processed user information to the cloud platform;
and S3, after the cloud platform verifies, displaying the data information corresponding to the user on the touch display screen.
In a preferred embodiment of the present invention, step S2 comprises the steps of:
s21, performing the following operation on the acquired user information to obtain an operation result value;
ORV=MD(User Info),
Wherein MD () represents a hash algorithm employing MD 5;
user Info represents User information including one or any combination of ID card number, telephone number and license plate number;
ORV represents the operation result value;
s22, converting the operation result value ORV obtained by operation in the step S21 into a B system, wherein B is a positive integer greater than or equal to 2, and obtaining a B system operation result;
judging whether the operation result value ORV is B scale:
if the operation result value ORV is B, then V B =orv; wherein ORV is the operation result value, V B A B-ary result value;
if the operation result value ORV is not B, the method comprises the steps S221-S222;
s221, converting the operation result value ORV into a C-level result, wherein the preferable C-level result is a 10-level result. The method for converting the operation result value ORV into the C-system result comprises the following steps:
wherein < ORV > represents the total number of bits of the operation result value ORV;
ORV a representing the value corresponding to the a-th bit in the sequence from the low order to the high order of the operation result value ORV;
[A] representing a binary value corresponding to the operation result value ORV;
[A] a-1 representation [ A ]]To the a-1 power of (2);
V ORV→C representing the conversion of its operation result value ORV into a C-ary result;
s222, C is a result of V ORV→C Converting into B-system operation result, and converting C-system result V ORV→C The method for converting the B-ary operation result comprises the following steps:
s2221, let the round robin rounding parameter i=1; a, a 1 =V ORV→C
Where int () represents a rounding function;
[B] representing a binary value corresponding to the B binary system;
a i represents an ith round robin rounding amount;
a i+1 represents the i+1th round robin rounding amount;
judging a thereof i+1 And 0, [ B ]]-1 and [ B ]]Relationship between:
if a is i+1 ≥[B]I=i+1, returning to step S2222;
if 0 is less than or equal to a i+1 ≤([B]-1), steps S22221 to S22222 are included;
s22221, letting the cyclic redundancy parameter j=1;
S22222,b j =a j %[B],
wherein,% represents the remainder;
[B] representing a binary value corresponding to the B binary system;
a j represents a j-th round robin rounding amount;
b j represents the j-th cycle margin;
judging the relation between j and i:
if j+.i, j=j+1, return S22132;
if j=i, { B } =b i b i-1 b i-2 …b 3 b 2 b 1 The method comprises the steps of carrying out a first treatment on the surface of the In the present embodiment, when b is Q Q=1, 2,3, > 10, i-2, i-1, i; the letters A, B, C, D, E, F, … …, Z can be used to denote 10, 11, 12, 13, 14, 15, … …, 35 in that order; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z. Other values, if greater than or equal to 10, may be represented by capital letters A, B, C, D, E, F, … …, Z, in order 10, 11, 12, 13, 14, 15, … …, 35; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z.
Wherein { B } represents the result of the B-ary operation;
b 1 represents the 1 st cycle margin;
b 2 represents the 2 nd cycle margin;
b 3 represents the 3 rd cycle margin;
b i-2 indicating the i-2 th cycle margin;
b i-1 indicating the i-1 th cycle margin;
b i indicating the ith cyclic margin;
s23, counting 0 to [ B ] in the B-system operation result { B }, wherein]The number of-1 is denoted as I (0, u) 0 ),(1,u 1 ),(2,u 2 ),(3,u 3 ),…,([B]-1,u [B]-1 )|| {B} Wherein, the highest bit in the B-system operation result { B } is not 0, namely the first bit is not 0; when it is 1-bit, it can only be written as 1-bit, for example, if it is 0, it can only be written as 0, it cannot be written as 00, or several 0's are connected before or after 0's; if 1, only 1 can be written, not 01, or a plurality of 0 s are connected in front of 1.
Wherein, (0, u 0 ) The number of 0 is u 0 And (u) is as follows 0 Is greater than or equal to 0 and less than or equal to<{B}>Is a positive integer of (2);<{B}>representing the total number of bits of the B-ary operation result { B };
(1,u 1 ) The number of 1 is u 1 And (u) is as follows 1 Is greater than or equal to 0 and less than or equal to<{B}>Is a positive integer of (2);
(2,u 2 ) The number denoted by 2 is u 2 And (u) is as follows 2 Is greater than or equal to 0 and less than or equal to<{B}>Is a positive integer of (2);
(3,u 3 ) The number denoted by 3 is u 3 And (u) is as follows 3 Is greater than or equal to 0 and less than or equal to<{B}>Is a positive integer of (2);
([B]-1,u [B]-1 ) Representation [ B ] ]The number of-1 is u [B]-1 And (u) is as follows [B]-1 Is greater than or equal to 0 and less than or equal to<{B}>Is a positive integer of (2); u (u) 0 +u 1 +u 2 +u 3 +…+u [B]-1 =<{B}>;
S24, expressing the quantity u of the B system number 0 u 1 u 2 u 3 …u [B]-1 .[B]Or B-ary number expression quantity u 0 u 1 u 2 u 3 …u [B]-1 The following operation is carried out to obtain a first encryption result value; wherein the number of B-ary expression quantity u 0 u 1 u 2 u 3 …u [B]-1 .[B]Or u 0 u 1 u 2 u 3 …u [B]-1 Indicating that there is u in B-ary expression 0 0, u 1 1, u 2 2 u 3 3, … …, u [B]-1 [ B ]]-1. For example, a number of 2 expressions 22.2 or 22 indicates that there are 20 s and 21 s in the number of 2 expressions; its corresponding 2-ary operation result may be 1010, 1001, 1100. The number of 2 values 02.2 or 02 indicates 0 s and 21 s (i.e., only 21 s) in the number of 2 values; its corresponding result of the 2-ary operation may be 11. The number expression quantity 15.2 or 15 of the 2 scale indicates that 1 number 0 and 5 number 1 in the 2 scale expression; its corresponding 2-ary operation result may be 101111, 110111, 111011, 111101, 111110. The 3-ary number expression amounts 120.3 or 120 indicate that 1 in the 3-ary expression has 0, 21, 02 (only 10 and 2 1); its corresponding 3-ary operation result may be 101, 110. The 3-ary number expression quantity 111.3 or 111 indicates that 1 in the 3-ary expression has 0, 1 and 1 2; its corresponding 3-ary operation result may be 102, 120, 201, 210. The number of 4 scale expressions 1011.4 or 1011 indicate that there are 10, 01, 12, 13 (i.e., 10, 12, 1 3) in the number of 4 scale expressions; its corresponding 4-ary operation may be 203, 230, 302, 320. The number representation amount 1101.4 or 1101 indicates that 1 number 0, 1 number 1, 0 number 2, 1 number 3 (i.e., 1 number 0, 1 number 1, 1 number 3) in the number 4 representation; its corresponding 4-ary operation result may be 103, 130, 301, 310. The 8-ary number expression amounts 00110010.8 or 00110010 indicate that there are 0, 1, 2, 1, 3, 0, 4, 0, 5, 1, 6, 0, 7 (i.e., only 1, 2, 1, 3, 1, 6) in 0-ary expression; its corresponding 8-ary operation may result in 236, 263, 326, 362, 623, 632. The 16-ary number expression amounts 0000100000010001.16 or 0000100000010001 indicate that there are 0, 1, 0, 2, 0, 3, 1, 4, 0, 5, 0, 6, 0, 7, 0, 8, 0, 9, 0A, 1B, 0C, 0D, 0E, 1F (i.e., only 1, 4, 1B, 1) in the 16-ary expression F) F); its corresponding 16-ary operation result may be 4BF, 4FB, B4F, BF4, F4B, FB4.
ERV=MD(u 0 u 1 u 2 u 3 …u [B]-1 .[B]),
Wherein MD () represents a hash algorithm employing MD 5;
u 0 u 1 u 2 u 3 …u [B]-1 .[B]representing the number expression quantity of the B system;
ERV represents the first encryption result value;
and S25, sending the first encryption result value ERV to the cloud platform.
A specific example is given below, taking the telephone number 13333333333, [ B ] 8, [ C ] 10 as an example:
step one, obtaining an operation result value:
orv=md (User Info), i.e.
Orv=md (13333333333) = 34347C343003E57232A5D21F14FE399E, which is a 32-bit 16-ary operation result value.
Second, solving a 10-system result:
i.e.
Third, solving the value of i:
i.e. < ->
……,
Because 0 is less than or equal to a 42 Not less than (8-1), namely not less than 0 and not more than 6 and not more than 7; so i=42.
Fourth, solving 8 system operation results:
b j =a j %[B]i.e.
……,
Since j=i, i.e. j=i=42,
then
Fifthly, counting the number of 0 to 7 in 641507606414001745344312456441742477434636, and recording as I (0, u) 0 ),(1,u 1 ),(2,u 2 ),(3,u 3 ),…,([B]-1,u [B]-1 )|| 641507606414001745344312456441742477434636 I.e.
Sixth, obtain the first encryption result value:
ERV=MD(u 0 u 1 u 2 u 3 …u [B]-1 .[B]),
i.e.
Seventh, B0DE35E8C50FCB14A7765B73C196A8AA is sent to the cloud platform.
In a preferred embodiment of the present invention, steps S22 to S25 are:
s22, converting the operation result value ORV obtained by operation in the step S21 into a B ' system, wherein B ' is a positive integer greater than or equal to 2, and B ' noteqis B; obtaining a B' system operation result;
Judging whether the operation result value ORV is B' system:
if the operation result value ORV is B' system, then V B′ =orv; wherein ORV is the operation result value, V B′ A B' binary result value;
if the operation result value ORV is not B', the method comprises the steps S221-S222;
s221, converting the operation result value ORV into a C-system result, and converting the operation result value ORV into the C-system result by the following steps:
wherein < ORV > represents the total number of bits of the operation result value ORV;
ORV a representing the value corresponding to the a-th bit in the sequence from the low order to the high order of the operation result value ORV;
[A] representing a binary value corresponding to the operation result value ORV;
[A] a-1 representation [ A ]]To the a-1 power of (2);
V ORV→C representing the conversion of its operation result value ORV into a C-ary result;
s222, C is a result of V ORV→C Converting into B' system operation result, and converting C system result V ORV→C The method for converting the B' system operation result comprises the following steps:
s2221, rounding the first parameter i' =1; a, a 1 =V ORV→C
Where int () represents a rounding function;
[ B '] represents the value of the corresponding system of B';
a i′ representing the i' th round robin rounding amount;
a i′+1 represents an i' +1 th round robin rounding amount;
judging a thereof i′+1 And 0, [ B ]']-1 and [ B ]']Relationship between:
if a is i′+1 ≥[B′]I '=i' +1, returning to step S2222;
If 0 is less than or equal to a i′+1 ≤([B′]-1), steps S22221 to S22222 are included;
s22221, letting the loop remainder first parameter j' =1;
S22222,b j′ =a j′ %[B′],
wherein,% represents the remainder;
[ B '] represents the value of the corresponding system of B';
a j′ represents a j' th round robin rounding amount;
b j′ represents the j' th cycle margin;
judging the relation between j 'and i':
if j '+.i', j '=j' +1, return S22132;
if j ' =i ', then { B ' } =b i′ b i′-1 b i′-2 …b 3 b 2 b 1 The method comprises the steps of carrying out a first treatment on the surface of the In the present embodiment, when b is Q′ Q ' =1, 2,3, > 10,/2, i ' -1, i '; the letters A, B, C, D, E, F, … …, Z can be used to denote 10, 11, 12, 13, 14, 15, … …, 35 in that order; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z. Other values, if greater than or equal to 10, may be represented by capital letters A, B, C, D, E, F, … …, Z, in order 10, 11, 12, 13, 14, 15, … …, 35; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z.
Wherein { B '} represents the B' system operation result;
b 1 represents the 1 st cycle margin;
b 2 represents the 2 nd cycle margin;
b 3 represents the 3 rd cycle margin;
b i′-2 Represents the i' -2 th cycle margin;
b i′-1 represents the i' -1 th cycle margin;
b i′ indicating the i' th cycle margin;
s23, counting 0 to [ B 'in the B' system operation result { B '} of the method']The number of-1 is denoted as I (0, u) 0 ′),(1,u 1 ′),(2,u 2 ′),(3,u 3 ′),…,([B′]-1,u [B′]-1 ′)|| {B′} Wherein, the highest bit in the B 'system operation result { B' } is not 0, namely the first bit is not 0; when it is 1 bit, it can only write1 digit, for example, if 0, only 0 can be written, not 00, or a plurality of 0 s can be added before or after 0; if 1, only 1 can be written, not 01, or a plurality of 0 s are connected in front of 1.
Wherein, (0, u 0 ' indicates that the number of 0 is u 0 ' A, the u 0 ' is greater than or equal to 0 and less than or equal to<{B′}>Is a positive integer of (2);<{B′}>representing the total number of bits of the B 'system operation result { B' };
(1,u 1 ' indicates that the number of 1 is u 1 ' A, the u 1 ' is greater than or equal to 0 and less than or equal to<{B′}>Is a positive integer of (2);
(2,u 2 ' indicates that the number of 2 is u 2 ' A, the u 2 ' is greater than or equal to 0 and less than or equal to<{B′}>Is a positive integer of (2);
(3,u 3 ') indicates that the number of 3 is u 3 ' A, the u 3 ' is greater than or equal to 0 and less than or equal to<{B′}>Is a positive integer of (2);
([B′]-1,u [B′]-1 'indicates [ B ]']The number of-1 is u [B′]-1 ' A, the u [B]′-1 ' is greater than or equal to 0 and less than or equal to <{B′}>Is a positive integer of (2); u (u) 0 ′+u 1 ′+u 2 ′+u 3 ′+…+u [B′]-1 ′=<{B′}>;
S24, expressing the quantity u of the B' system number 0 ′u 1 ′u 2 ′u 3 ′…u [B′]-1 ′.[B′]Or u 0 ′u 1 ′u 2 ′u 3 ′…u [B′]-1 ' performing the following operation to obtain a second encryption result value thereof; wherein B' is the number expression u 0 ′u 1 ′u 2 ′u 3 ′…u [B′]-1 ′.[B′]Or u 0 ′u 1 ′u 2 ′u 3 ′…u [B′]-1 'indicate that there is u in B' scale expression 0 ' 0, u 1 ' 1, u 2 ' 2, u 3 ' 3, … …, u [B′]-1 'number [ B ]']-1. For example, a number of 2 expressions 22.2 or 22 indicates that there are 20 s and 21 s in the number of 2 expressions; its corresponding 2-ary operation result may be 1010, 1001, 1100. The number of 2 values 02.2 or 02 indicates 0 s and 21 s (i.e., only 21 s) in the number of 2 values; its corresponding result of the 2-ary operation may be 11. The number expression quantity 15.2 or 15 of the 2 scale indicates that 1 number 0 and 5 number 1 in the 2 scale expression; its corresponding 2-ary operation result may be 101111, 110111, 111011, 111101, 111110. The 3-ary number expression amounts 120.3 or 120 indicate that 1 in the 3-ary expression has 0, 21, 02 (only 10 and 2 1); its corresponding 3-ary operation result may be 101, 110. The 3-ary number expression quantity 111.3 or 111 indicates that 1 in the 3-ary expression has 0, 1 and 1 2; its corresponding 3-ary operation result may be 102, 120, 201, 210. The number of 4 scale expressions 1011.4 or 1011 indicate that there are 10, 01, 12, 13 (i.e., 10, 12, 1 3) in the number of 4 scale expressions; its corresponding 4-ary operation may be 203, 230, 302, 320. The number representation amount 1101.4 or 1101 indicates that 1 number 0, 1 number 1, 0 number 2, 1 number 3 (i.e., 1 number 0, 1 number 1, 1 number 3) in the number 4 representation; its corresponding 4-ary operation result may be 103, 130, 301, 310. The 8-ary number expression amounts 00110010.8 or 00110010 indicate that there are 0, 1, 2, 1, 3, 0, 4, 0, 5, 1, 6, 0, 7 (i.e., only 1, 2, 1, 3, 1, 6) in 0-ary expression; its corresponding 8-ary operation may result in 236, 263, 326, 362, 623, 632. The 16-ary number expression amounts 0000100000010001.16 or 0000100000010001 indicate that there are 0, 1, 0, 2, 0, 3, 1, 4, 0, 5, 0, 6, 0, 7, 0, 8, 0, 9, 0 a, 1B, 0C, 0D, 0E, 1F (i.e., only 1 4, 1B, 1F) in 16-ary expressions; its corresponding 16-ary operation result may be 4BF, 4FB, B4F, BF4, F4B, FB4.
ERV′=MD(u 0 ′u 1 ′u 2 ′u 3 ′…u [B′]-1 ′.[B′]),
Wherein MD () represents a hash algorithm employing MD 5;
u 0 ′u 1 ′u 2 ′u 3 ′…u [B′]-1 ′.[B′]representing the number expression quantity of the B' system;
ERV' represents the second encryption result value;
and S25, sending the second encryption result value ERV' to the cloud platform.
A specific example is given below, taking the telephone number 13333333333, [ B' ] 16, [ C ] 10 as an example:
step one, obtaining an operation result value:
orv=md (User Info), i.e.
Orv=md (13333333333) = 34347C343003E57232A5D21F14FE399E, which is a 32-bit 16-ary operation result value.
Second, solving a 10-system result:
i.e. < ->
Third, solving the value of i':
i.e.
/>
……,
Because 0 is less than or equal to a 32 Not less than (16-1), namely not less than 0 and not more than 3 and not more than 15; so i' =32.
Fourth, solving a 16-system operation result:
b j′ =a j′ %[B′]i.e.
……,
Since j '=i', i.e. j '=i' =32,
then
Fifthly, counting the number of 0-F in 34347C343003E57232A5D21F14FE399E, and recording as I (0, u) 0 ′),(1,u 1 ′),(2,u 2 ′),(3,u 3 ′),…,([B′]-1,u [B′]-1 ′)|| 34347C343003E57232A5D21F14FE399E I.e.
Sixth, obtain the second encryption result value:
ERV′=MD(u 0 ′u 1 ′u 2 ′u 3 ′…u [B′]-1 ′.[B′]) I.e.
ERV=MD(2237420202101132.16)=B2A509D26266599F38C799BF1599100A。
Seventh, B2a509D26266599F38C799BF1599100a is sent to the cloud platform.
In a preferred embodiment of the present invention, steps S22 to S25 are:
s22, converting the operation result value ORV obtained by operation in the step S21 into a B 'system, wherein B' is a positive integer greater than or equal to 2, and B 'noteqis B' noteqB; obtaining the B' system operation result;
Judging whether the operation result value ORV is B' system:
if the operation result value ORV is B' system, then V B″ =orv; wherein ORV is the operation result value, V B″ A B' binary result value;
if the operation result value ORV is not B', the method comprises the steps S221 to S222;
s221, converting the operation result value ORV into a C-system result, and converting the operation result value ORV into the C-system result by the following steps:
wherein < ORV > represents the total number of bits of the operation result value ORV;
ORV a representing the value corresponding to the a-th bit in the sequence from the low order to the high order of the operation result value ORV;
[A] representing a binary value corresponding to the operation result value ORV;
[A] a-1 representation [ A ]]To the a-1 power of (2);
V ORV→C representing the conversion of its operation result value ORV into a C-ary result;
s222, C is a result of V ORV→C Converting into B' system operation result, and converting C system result V ORV→C The method for converting the B' system operation result comprises the following steps:
s2221, rounding the second parameter i "=1; a, a 1 =V ORV→C
/>
Where int () represents a rounding function;
[ B "] represents the value of the bin corresponding to the bin of B";
a i″ represents an i "th round robin integer;
a i″+1 represents the i "+1 cycle rounding amount;
judging a thereof i″+1 And 0, [ B ]]-1 and [ B ] "]Relationship between:
if a is i″+1 ≥[B″]I "=i" +1, returning to step S2222;
If 0 is less than or equal to a i″+1 ≤([B″]-1), steps S22221 to S22222 are included;
s22221 causes the loop to leave the second parameter j "=1;
S22222,b j″ =a j″ %[B″],
wherein,% represents the remainder;
[ B "] represents the value of the bin corresponding to the bin of B";
a j″ represents a j "th round robin integer;
b j″ represents the j "th loop margin;
judging the relation between j 'and i':
if j "+.i", j "=j" +1, return S22132;
if j "=i", then { B "} =b } i″ b i″-1 b i″-2 …b 3 b 2 b 1 The method comprises the steps of carrying out a first treatment on the surface of the In the present embodiment, when b is Q″ Q "=1, 2,3,..i" -2, i "-1, i"; the letters A, B, C, D, E, F, … …, Z can be used to denote 10, 11, 12, 13, 14, 15, … …, 35 in that order; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z. Other values, if greater than or equal to 10, may be represented by capital letters A, B, C, D, E, F, … …, Z, in order 10, 11, 12, 13, 14, 15, … …, 35; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z.
Wherein { B '} represents the result of the B' binary operation;
b 1 represents the 1 st cycle margin;
b 2 represents the 2 nd cycle margin;
b 3 represents the 3 rd cycle margin;
b i″-2 Indicating the i "-2 th cycle margin;
b i″-1 represents the i "-1 th cycle margin;
b i″ represents the i "th loop margin;
s23, counting 0 to [ B ] in the B 'system operation result { B' } of the method]The number of-1 is denoted as I (0, u) 0 ″),(1,u 1 ″),(2,u 2 ″),(3,u 3 ″),…,([B″]-1,u [B″]-1 ″)|| {B″} Wherein, the highest bit in the B 'system operation result { B' } is not 0, namely the first bit is not 0; when it is 1-bit, it can only be written as 1-bit, for example, if it is 0, it can only be written as 0, it cannot be written as 00, or several 0's are connected before or after 0's; if 1, only 1 can be written, not 01, or a plurality of 0 s are connected in front of 1.
Wherein, (0, u 0 ") indicates that the number of 0 is u 0 "number, the u 0 "is greater than or equal to 0 and less than or equal to<{B″}>Is a positive integer of (2);<{B″}>representing the total number of bits of the B 'system operation result { B' };
(1,u 1 ") indicates that the number of 1 is u 1 "number, the u 1 "is greater than or equal to 0 and less than or equal to<{B″}>Is a positive integer of (2);
(2,u 2 ") indicates that the number of 2 is u 2 "number, the u 2 "is greater than or equal to 0 and less than or equal to<{B″}>Is a positive integer of (2);
(3,u 3 ") indicates that the number of 3 is u 3 "number, the u 3 "is greater than or equal to 0 and less than or equal to<{B″}>Is a positive integer of (2);
([B″]-1,u [B″]-1 "means [ B ]]The number of-1 is u [B″]-1 "number, the u [B″]-1 "is greater than or equal to 0 and less than or equal to <{B″}>Is a positive integer of (2); u (u) 0 ″+u 1 ″+u 2 ″+u 3 ″+…+u [B″]-1 ″=<{B″}>;
S24, expressing the quantity u of the B' system number 0 ″u 1 ″u 2 ″u 3 ″…u [B″]-1 ″.[B″]Or u 0 ″u 1 ″u 2 ″u 3 ″…u [B″]-1 "the following operation is performed to obtain a third encryption result value thereof; wherein B' is a number expression quantity u 0 ″u 1 ″u 2 ″u 3 ″…u [B″]-1 ″.[B″]Or u 0 ″u 1 ″u 2 ″u 3 ″…u [B″]-1 "indicate that there is u in the B" scale expression 0 "0, u 1 "1, u 2 "2, u 3 "3, … …, u [B″]-1 "number [ B ]]-1. For example, a number of 2 expressions 22.2 or 22 indicates that there are 20 s and 21 s in the number of 2 expressions; its corresponding 2-ary operation result may be 1010, 1001, 1100. The number of 2 values 02.2 or 02 indicates 0 s and 21 s (i.e., only 21 s) in the number of 2 values; its corresponding result of the 2-ary operation may be 11. The number expression quantity 15.2 or 15 of the 2 scale indicates that 1 number 0 and 5 number 1 in the 2 scale expression; its corresponding 2-ary operation result may be 101111, 110111, 111011, 111101, 111110.3 system ofThe number expression amounts 120.3 or 120 indicate that 1 in the 3 scale expression is 0, 21, 02 (only 10 and 2 1); its corresponding 3-ary operation result may be 101, 110. The 3-ary number expression quantity 111.3 or 111 indicates that 1 in the 3-ary expression has 0, 1 and 1 2; its corresponding 3-ary operation result may be 102, 120, 201, 210. The number of 4 scale expressions 1011.4 or 1011 indicate that there are 10, 01, 12, 13 (i.e., 10, 12, 1 3) in the number of 4 scale expressions; its corresponding 4-ary operation may be 203, 230, 302, 320. The number representation amount 1101.4 or 1101 indicates that 1 number 0, 1 number 1, 0 number 2, 1 number 3 (i.e., 1 number 0, 1 number 1, 1 number 3) in the number 4 representation; its corresponding 4-ary operation result may be 103, 130, 301, 310. The 8-ary number expression amounts 00110010.8 or 00110010 indicate that there are 0, 1, 2, 1, 3, 0, 4, 0, 5, 1, 6, 0, 7 (i.e., only 1, 2, 1, 3, 1, 6) in 0-ary expression; its corresponding 8-ary operation may result in 236, 263, 326, 362, 623, 632. The 16-ary number expression amounts 0000100000010001.16 or 0000100000010001 indicate that there are 0, 1, 0, 2, 0, 3, 1, 4, 0, 5, 0, 6, 0, 7, 0, 8, 0, 9, 0 a, 1B, 0C, 0D, 0E, 1F (i.e., only 1 4, 1B, 1F) in 16-ary expressions; its corresponding 16-ary operation result may be 4BF, 4FB, B4F, BF4, F4B, FB4.
ERV″=MD(u 0 ″u 1 ″u 2 ″u 3 ″…u [B″]-1 ″.[B″]),
Wherein MD () represents a hash algorithm employing MD 5;
u 0 ″u 1 ″u 2 ″u 3 ″…u [B″]-1 ″.[B″]representing the number expression of the B' system;
ERV "represents a third encryption result value;
and S25, sending the third encryption result value ERV' to the cloud platform.
In a preferred embodiment of the present invention, the following steps are included in step S3:
s31, the cloud platform receives the first encryption result value ERV and the second encryption result value E according to the cloud platformThe RV 'inquires to obtain a cloud platform storage first value corresponding to the first encryption result value ERV and a cloud platform storage second value corresponding to the second encryption result value ERV'; namely, a first encryption result value ERV and a second encryption result value ERV' belong to a cloud platform encryption result set; the cloud platform corresponding to the first encryption result value ERV stores the first value equivalent to the element e in the cloud platform encryption result set 1 The corresponding cloud platform expression quantity, the cloud platform storage second value corresponding to the second encryption result value ERV' is equivalent to element e in the cloud platform encryption result set 2 The corresponding cloud platform expression quantity.
S32, calculating according to the cloud platform storage first value and the cloud platform storage second value to obtain a first set of cloud platform combination values corresponding to the cloud platform storage first value and a second set of cloud platform combination values corresponding to the cloud platform storage second value;
Judging whether the first set of cloud platform combination values and the second set of cloud platform combination values have equal actual values or not:
if the first set of cloud platform combination values and the second set of cloud platform combination values have equal actual values, inquiring according to the actual values to obtain user information, and executing step S33;
if the first set of cloud platform combination values and the second set of cloud platform combination values do not have equal actual values, the first encryption result value ERV and the second encryption result value ERV' are received again;
and S33, transmitting the data information corresponding to the user to the query terminal for display.
In a preferred embodiment of the present invention, the following steps are included in step S3:
s31, the cloud platform inquires according to the received first encryption result value ERV, second encryption result value ERV 'and third encryption result value ERV' to obtain a cloud platform storage first value corresponding to the first encryption result value ERV, a cloud platform storage second value corresponding to the second encryption result value ERV 'and a cloud platform storage third value corresponding to the third encryption result value ERV'; namely, the first encryption result value ERV, the second encryption result value ERV 'and the third encryption result value ERV' all belong to The cloud platform corresponding to the first encryption result value ERV stores a first value equivalent to an element e in the cloud platform encryption result set 1 The corresponding cloud platform expression quantity, the cloud platform storage second value corresponding to the second encryption result value ERV' is equivalent to element e in the cloud platform encryption result set 2 The corresponding cloud platform expression quantity and the cloud platform storage third value corresponding to the third encryption result value ERV' are equivalent to element e in the cloud platform encryption result set 3 The corresponding cloud platform expression quantity.
S32, calculating according to the cloud platform storage first value, the cloud platform storage second value and the cloud platform storage third value to obtain a cloud platform combination value first set corresponding to the cloud platform storage first value, a cloud platform combination value second set corresponding to the cloud platform storage second value and a cloud platform combination value third set corresponding to the cloud platform storage third value; in this embodiment, for example, if the cloud platform expression level (the cloud platform stores the first value) is 14.2 or 14, it indicates that there are 10 and 4 1 in the 2-ary expression, and the elements in the first set of the cloud platform combination values corresponding to the cloud platform stored first value are 1011, 1101, 1110; if the cloud platform expression quantity (the cloud platform stores the second value) is 00020000.8 or 00020000, the method indicates that only 2 elements 3 in the 8-ary expression are provided, and the elements in the second set of the cloud platform combination values corresponding to the cloud platform storage second value are 33; if the cloud platform expression level (the cloud platform stores the third value) is 0111.4 or 0111, it indicates that 1, 2 and 1, 3 in the 4-ary expression are included, and the elements in the third set of the cloud platform combination values corresponding to the cloud platform stored third value are 123, 132, 213, 231, 312 and 321.
Judging whether equal actual values exist in a first set of cloud platform combination values, a second set of cloud platform combination values and a third set of cloud platform combination values or not:
if there are equal actual values (the actual values are values under the condition that the system is the same) in the first set of cloud platform combination values, the second set of cloud platform combination values and the third set of cloud platform combination values, user information is obtained according to the actual value query, and step S33 is executed; in this embodiment, for example, if the cloud platform expression level (the cloud platform stores the first value) is 14.2 or 14, it indicates that there are 10 and 4 1 in the 2-ary expression, and the elements in the first set of the cloud platform combination values corresponding to the cloud platform storage first value are 10111, 11011, 11101, 11110; if the cloud platform expression quantity (the cloud platform stores the second value) is 00020000.8 or 00020000, the method indicates that only 2 elements 3 in the 8-ary expression are provided, and the elements in the second set of the cloud platform combination values corresponding to the cloud platform storage second value are 33; if the cloud platform expression level (the cloud platform stores the third value) is 0111.4 or 0111, it indicates that 1, 2 and 1, 3 in the 4-ary expression are included, and the elements in the third set of the cloud platform combination values corresponding to the cloud platform stored third value are 123, 132, 213, 231, 312 and 321. Converting 2 system values in the first set of the cloud platform combination values into 10 system values which are sequentially corresponding to 23, 27, 29 and 30; the 8-system values in the second set of the cloud platform combination values are converted into 10-system values which sequentially correspond to 27; the values of 4 in the third set of cloud platform combination values are converted into 10 values which sequentially correspond to 27, 30, 39, 45, 54 and 57. Since there are equal actual values 27 in the first set of cloud platform combination values, the second set of cloud platform combination values, and the third set of cloud platform combination values. Converting the 2-system values in the first set of the cloud platform combination values into 16-system values which are sequentially corresponding to 17, 1B, 1D and 1E; the 8-system values in the second set of the cloud platform combination values are converted into 16-system values which sequentially correspond to 1B; the values of 4 in the third set of cloud platform combination values are converted into 16 values which sequentially correspond to 1B, 1E, 27, 2D, 36 and 39. Since there are equal actual values 1B in the first set of cloud platform combination values, the second set of cloud platform combination values, and the third set of cloud platform combination values.
If the first set of cloud platform combination values, the second set of cloud platform combination values and the third set of cloud platform combination values do not have equal actual values, the first encryption result value ERV, the second encryption result value ERV' and the third encryption result value ERV″ are received again;
and S33, transmitting the data information corresponding to the user to the query terminal for display.
In a preferred embodiment of the invention, step S0 is included before step S1,
s01, the cloud platform performs the following operation on the acquired user information to obtain an operation result value of the cloud platform;
ORV″′=MD(User Info″′),
wherein MD () represents a hash algorithm employing MD 5;
user Info' "represents User information acquired by the cloud platform, including one or any combination of an identity card number, a telephone number and a license plate number;
ORV' "represents a cloud platform operation result value;
s02, converting the cloud platform operation result value ORV '"obtained by operation in the step S01 into a B'" system, wherein B '"is a positive integer which is more than or equal to 2, and obtaining a B'" system cloud platform operation result;
judging whether the cloud platform operation result value ORV '"is B'" system:
if the cloud platform operation result value ORV '"is B'" system, V B″′ =orv' "; wherein ORV' "is a cloud platform operation result value, V B″′ The result value is B' "is a cloud platform result value;
if the cloud platform operation result value ORV '"is not B'" system, the method comprises the steps of S021-S022;
s021, converting the cloud platform operation result value ORV '"into a C'" system cloud platform result, and converting the cloud platform operation result value ORV '"into the C'" system cloud platform result comprises the following steps:
wherein, < ORV '"> represents the total number of bits of the cloud platform operation result value ORV'";
ORV″′ a″′ representing a numerical value corresponding to an a 'bit in the sequence from low order to high order of the cloud platform operation result value ORV';
[ A '"] represents a binary value corresponding to the cloud platform operation result value ORV'";
[A″′] a″′-1 represent [ A '']To the power a' "1;
V ORV″′→C″′ the cloud platform operation result value ORV '"is converted into a C'" system cloud platform result;
s022, C' "is carried out on the cloud platform result V ORV″′→C″′ Converting the result into a B '"system cloud platform operation result, and converting the result into a C'" system cloud platform result V ORV″′→C″′ The method for converting the B' system cloud platform operation result comprises the following steps:
s0221, let the round-robin cloud platform parameter i' "=1; a, a 1 ″′=V ORV″′→C″′
Where int () represents a rounding function;
[ B '"] represents a binary value corresponding to the B'" binary;
a i″′ "represents the ith'" round robin cloud deck amount;
a i″′+1 "represents the i' +1 th round robin rounding cloud deck amount;
judging a thereof i″′+1 "and 0, [ B ]']-1 and [ B '']Relationship between:
if a is i″′+1 ″′≥[B″′]I '"=i'" +1, returning to step S0222;
if 0 is less than or equal to a i″′+1 ″′≤([B″′]-1), steps S02221-S02222 are included;
s02221, let the cyclic redundancy cloud platform parameter j' "=1;
S02222,b j″′ ″′=a j″′ ″′%[B″′],
wherein,% represents the remainder;
[ B '"] represents a binary value corresponding to the B'" binary;
a j″′ "represents the j' th round-robin cloud deck amount;
b j″′ "means jThe 'circulating surplus cloud platform quantity' is obtained;
judging the relation between j '"and i'" of the formula:
if j '"is not equal to i'", j '"=j'" +1, returning to S22132;
if j ' "=i '", then { B ' "} =b i″′ ″′b i″′-1 ″′b i″′-2 ″′…b 3 ″′b 2 ″′b 1 "3"; in the present embodiment, when b is Q″′ When ". Gtoreq.10, Q '" =1, 2,3,. I' "-2, i '" -1, i' "; the letters A, B, C, D, E, F, … …, Z can be used to denote 10, 11, 12, 13, 14, 15, … …, 35 in that order; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z. Other values, if greater than or equal to 10, may be represented by capital letters A, B, C, D, E, F, … …, Z, in order 10, 11, 12, 13, 14, 15, … …, 35; 36, 37, 38, 39, 40, 41, … …, 61 are indicated in turn by lower case letters a, b, c, d, e, f, … …, z.
Wherein { B '"represents the B'" binary cloud platform result;
b 1 "represents the remainder cloud platform amount of the 1 st cycle;
b 2 "represents the remainder cloud platform amount of the 2 nd cycle;
b 3 "represents the 3 rd cycle remainder cloud platform amount;
b i″′-2 "represents the i' -2 th cycle remainder cloud deck amount;
b i″′-1 "represents the i' -1 th cycle remainder cloud deck amount;
b i″′ "represents the i' th cycle remainder cloud deck amount;
s03, the step of performing a step of, statistics of B ' "system cloud platform operation results { B '" } of 0 to [ B "']The number of-1 is denoted as I (0, u) 0 ″′),(1,u 1 ″′),(2,u 2 ″′),(3,u 3 ″′),…,([B″′]-1,u [B″′]-1 ″′)|| {B″′} Wherein, B '"is the result of the binary operation { B'" }The highest order of the two is not 0, namely the first order is not 0; when it is 1-bit, it can only be written as 1-bit, for example, if it is 0, it can only be written as 0, it cannot be written as 00, or several 0's are connected before or after 0's; if 1, only 1 can be written, not 01, or a plurality of 0 s are connected in front of 1.
Wherein, (0, u 0 "represents the number of 0's u 0 "number of, the u 0 "is greater than or equal to 0 and less than or equal to<{B″′}>Is a positive integer of (2);<{B″′}>representing the total number of bits of the B '"binary cloud platform operation result { B'";
(1,u 1 "') represents the number of 1 is u 1 "number of, the u 1 "is greater than or equal to 0 and less than or equal to <{B″′}>Is a positive integer of (2);
(2,u 2 "') represents the number of 2 is u 2 "number of, the u 2 "is greater than or equal to 0 and less than or equal to<{B″′}>Is a positive integer of (2);
(3,u 3 "') represents 3, which is u 3 "number of, the u 3 "is greater than or equal to 0 and less than or equal to<{B″′}>Is a positive integer of (2);
([B″′]-1,u [B″′]-1 "means [ B" "']The number of-1 is u [B″′]-1 "number of, the u [B″′]-1 "is greater than or equal to 0 and less than or equal to<{B″′}>Is a positive integer of (2); u (u) 0 ″′+u 1 ″′+u 2 ″′+u 3 ″′+…+u [B″′]-1 ″′=<{B″′}>;
S04, carrying out B' system number cloud platform expression quantity u 0 ″′u 1 ″′u 2 ″′u 3 ″′…u [B″′]-1 ″′.[B″′]Or u 0 ″′u 1 ″′u 2 ″′u 3 ″′…u [B″′]-1 The cloud platform encryption result value is obtained by the following operation; wherein B' "is a number expression u 0 ″′u 1 ″′u 2 ″′u 3 ″′…u [B″′]-1 ″′.[B″′]Or u 0 ″′u 1 ″′u 2 ″′u 3 ″′…u [B″′]-1 "indicates that there is u in the B'" system 0 "0, u 1 "1, u 2 "2, u 3 "3, … …, u [B″′]-1 "2" [ B "")']-1. For example, a number of 2 expressions 22.2 or 22 indicates that there are 20 s and 21 s in the number of 2 expressions; its corresponding 2-ary operation result may be 1010, 1001, 1100. The number of 2 values 02.2 or 02 indicates 0 s and 21 s (i.e., only 21 s) in the number of 2 values; its corresponding result of the 2-ary operation may be 11. The number expression quantity 15.2 or 15 of the 2 scale indicates that 1 number 0 and 5 number 1 in the 2 scale expression; its corresponding 2-ary operation result may be 101111, 110111, 111011, 111101, 111110. The 3-ary number expression amounts 120.3 or 120 indicate that 1 in the 3-ary expression has 0, 21, 02 (only 10 and 2 1); its corresponding 3-ary operation result may be 101, 110. The 3-ary number expression quantity 111.3 or 111 indicates that 1 in the 3-ary expression has 0, 1 and 1 2; its corresponding 3-ary operation result may be 102, 120, 201, 210. The number of 4 scale expressions 1011.4 or 1011 indicate that there are 10, 01, 12, 13 (i.e., 10, 12, 1 3) in the number of 4 scale expressions; its corresponding 4-ary operation may be 203, 230, 302, 320. The number representation amount 1101.4 or 1101 indicates that 1 number 0, 1 number 1, 0 number 2, 1 number 3 (i.e., 1 number 0, 1 number 1, 1 number 3) in the number 4 representation; its corresponding 4-ary operation result may be 103, 130, 301, 310. The 8-ary number expression amounts 00110010.8 or 00110010 indicate that there are 0, 1, 2, 1, 3, 0, 4, 0, 5, 1, 6, 0, 7 (i.e., only 1, 2, 1, 3, 1, 6) in 0-ary expression; its corresponding 8-ary operation may result in 236, 263, 326, 362, 623, 632. The 16-ary number expression amounts 0000100000010001.16 or 0000100000010001 indicate that there are 0, 1, 0, 2, 0, 3, 1, 4, 0, 5, 0, 6, 0, 7, 0, 8, 0, 9, 0 a, 1B, 0C, 0D, 0E, 1F (i.e., only 1 4, 1B, 1F) in 16-ary expressions; its corresponding 16-ary operation result may be 4BF, 4FB, B4F, BF4, F4B, FB4.
ERV″′=MD(u 0 ″′u 1 ″′u 2 ″′u 3 ″′…u [B″′]-1 ″′.[B″′]),
Wherein MD () represents a hash algorithm employing MD 5;
u 0 ″′u 1 ″′u 2 ″′u 3 ″′…u [B″′]-1 ″′.[B″′]representing the expression quantity of the B' system number cloud platform;
ERV' "represents the cloud platform encryption result value;
s05, forming all cloud platform encryption result values ERV '"into a cloud platform encryption result set, storing cloud platform expression amounts corresponding to each element in the cloud platform encryption result set and the cloud platform encryption result set in a cloud platform database, and storing user information corresponding to a B'" system cloud platform operation result in the cloud platform database.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (6)

1. The utility model provides a carry out government affair data safety inquiry terminal through big data network, includes box (5), its characterized in that box (5) openly is provided with the space of inwards sunken, is provided with the touch display screen mount pad that is used for fixed mounting touch display screen (3) in sunken space, touch display screen (3) fixed mounting is on touch display screen mount pad, is provided with the identity ID card reader mount pad that is used for fixed mounting identity ID card reader (4) in sunken space downside, identity ID card reader (4) fixed mounting is on identity ID card reader mount pad, is provided with outwards protruding peeping-proof board (6) in box (5) openly both sides be provided with the control circuit board mount pad that is used for fixed mounting control circuit board in box (5), control circuit board fixed mounting is on control circuit board mount pad, is provided with controller and network transmission module on control circuit board, the network transmission data end of controller links to each other with the network transmission data end of network transmission module, the identity information data output end of identity ID card reader (4) links to each other with the identity information data input end of controller's identity information touch display end touch screen touch display screen (3);
After the user information is read by the identity ID card reader (4), the user information is processed and then transmitted to the cloud platform for verification, and the data information corresponding to the user is called and displayed on the touch display screen (3); the working method for the government affair data safety inquiry terminal through the big data network comprises the following steps:
s1, acquiring user information;
s2, processing the user information obtained in the step S1 and transmitting the processed user information to the cloud platform; step S2 comprises the steps of:
s21, performing the following operation on the acquired user information to obtain an operation result value;
ORV=MD(User Info),
wherein MD () represents a hash algorithm employing MD 5;
user Info represents User information;
ORV represents the operation result value;
s22, converting the operation result value ORV obtained by operation in the step S21 into a B system, wherein B is a positive integer greater than or equal to 2, and obtaining a B system operation result;
s23, counting the number of 0 to [ B ] -1 in the B-system operation result { B };
s24, expressing the quantity u of the B system number 0 u 1 u 2 u 3 …u [B]-1 .[B]The following operation is carried out to obtain a first encryption result value;
ERV=MD(u 0 u 1 u 2 u 3 …u [B]-1 .[B]),
wherein MD () represents a hash algorithm employing MD 5;
u 0 u 1 u 2 u 3 …u [B]-1 .[B]representing the number expression quantity of the B system;
ERV represents the first encryption result value;
S25, sending the first encryption result value ERV to the cloud platform;
and S3, after the cloud platform is verified, displaying the data information corresponding to the user on the touch display screen (3).
2. The terminal for performing government affair data safety inquiry through a big data network according to claim 1, further comprising a camera fixed installation area arranged on the front surface of the box body (5) for fixedly installing the camera (1), wherein the camera (1) is fixedly installed on the camera fixed installation area; the camera (1) is positioned above the touch display screen (3); the image data output end of the camera (1) is connected with the image data input end of the controller.
3. The terminal for performing government affair data safety inquiry through a big data network according to claim 1, further comprising an anti-sight glass fixing installation area which is arranged on the front surface of the box body (5) and used for fixing an anti-sight glass (2), wherein the anti-sight glass (2) is positioned above the touch display screen (3) and is positioned on the left side or the right side of the camera (1); the anti-sight glass (2) is fixedly arranged on the fixed installation area of the anti-sight glass.
4. The terminal for performing government affair data safety inquiry through big data network according to claim 1, wherein the network transmission module comprises a network wireless transmission unit and/or a network wired transmission unit;
The wireless data end of the network wireless transmission unit is connected with the wireless data end of the controller, and the wired data end of the network wired transmission unit is connected with the wired data end of the controller.
5. The terminal for performing government affair data security inquiry through big data network according to claim 4, wherein the network wireless transmission unit comprises one or any combination of a network wireless WiFi transmission subunit, a network wireless 5G transmission subunit and a network wireless 4G transmission subunit;
the wireless WiFi data end of the network wireless WiFi transmission subunit is connected with the wireless WiFi data end of the controller, the wireless 5G data end of the network wireless 5G transmission subunit is connected with the wireless 5G data end of the controller, and the wireless 4G data end of the network wireless 4G transmission subunit is connected with the wireless 4G data end of the controller.
6. The terminal for performing government affair data security inquiry through big data network according to claim 4, wherein the network wire transmission unit comprises a hundred mega network wire transmission subunit and/or a giga network wireless transmission subunit; the hundred mega network wired data end of the hundred mega network wired transmission unit is connected with the hundred mega wired data end of the controller, and the gigabit network wired data end of the gigabit network wired transmission unit is connected with the gigabit wired data end of the controller.
CN202110284771.8A 2021-03-17 2021-03-17 Working method for carrying out government affair data security through big data network Active CN113515555B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110284771.8A CN113515555B (en) 2021-03-17 2021-03-17 Working method for carrying out government affair data security through big data network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110284771.8A CN113515555B (en) 2021-03-17 2021-03-17 Working method for carrying out government affair data security through big data network

Publications (2)

Publication Number Publication Date
CN113515555A CN113515555A (en) 2021-10-19
CN113515555B true CN113515555B (en) 2024-02-02

Family

ID=78061784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110284771.8A Active CN113515555B (en) 2021-03-17 2021-03-17 Working method for carrying out government affair data security through big data network

Country Status (1)

Country Link
CN (1) CN113515555B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201723060U (en) * 2010-06-29 2011-01-26 深圳市科羽科技发展有限公司 Intelligent transaction channel device capable of identifying identity information
CN103500299A (en) * 2013-10-12 2014-01-08 陈璞 Random electronic cipher system and method
CN206058190U (en) * 2016-08-12 2017-03-29 西安鼎蓝通信技术有限公司 A kind of government affairs information inquires about terminal
CN206892935U (en) * 2017-05-04 2018-01-16 山东省计算中心(国家超级计算济南中心) A kind of government information resources catalogue combs system
EP2856380B1 (en) * 2012-05-28 2018-06-06 Swivel Secure Limited Method and system for secure user identification
CN208044754U (en) * 2018-02-11 2018-11-02 东方通信股份有限公司 A kind of self-service processing equipment of deposit receipt
CN108875437A (en) * 2018-05-29 2018-11-23 大唐终端技术有限公司 A kind of ID card information querying method and system
CN210136507U (en) * 2019-12-16 2020-03-10 上海讯久网络科技有限公司 Comprehensive government affair cooperative service system
CN210348684U (en) * 2019-11-22 2020-04-17 重庆工贸职业技术学院 Internet financial security transaction terminal
CN210534924U (en) * 2019-11-29 2020-05-15 交通银行股份有限公司 Financial self-service machine capable of forcibly returning certificates
CN111341460A (en) * 2020-03-18 2020-06-26 重庆市智权之路科技有限公司 Medical archive data mining system based on block chain and working method thereof
CN211058635U (en) * 2019-10-21 2020-07-21 牟康 Safety anti-theft device that intelligence house used
CN111464541A (en) * 2020-04-01 2020-07-28 重庆德信建信息技术有限公司 Electronic government affair multifunctional intelligent hardware terminal based on biological recognition and working method
CN112437042A (en) * 2020-10-30 2021-03-02 重庆恢恢信息技术有限公司 Intelligent construction site material data security certification working method through cloud platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9041671B2 (en) * 2013-03-12 2015-05-26 Google Technology Holdings LLC Adaptive touch sensor control based on identification of attached accessory

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201723060U (en) * 2010-06-29 2011-01-26 深圳市科羽科技发展有限公司 Intelligent transaction channel device capable of identifying identity information
EP2856380B1 (en) * 2012-05-28 2018-06-06 Swivel Secure Limited Method and system for secure user identification
CN103500299A (en) * 2013-10-12 2014-01-08 陈璞 Random electronic cipher system and method
CN206058190U (en) * 2016-08-12 2017-03-29 西安鼎蓝通信技术有限公司 A kind of government affairs information inquires about terminal
CN206892935U (en) * 2017-05-04 2018-01-16 山东省计算中心(国家超级计算济南中心) A kind of government information resources catalogue combs system
CN208044754U (en) * 2018-02-11 2018-11-02 东方通信股份有限公司 A kind of self-service processing equipment of deposit receipt
CN108875437A (en) * 2018-05-29 2018-11-23 大唐终端技术有限公司 A kind of ID card information querying method and system
CN211058635U (en) * 2019-10-21 2020-07-21 牟康 Safety anti-theft device that intelligence house used
CN210348684U (en) * 2019-11-22 2020-04-17 重庆工贸职业技术学院 Internet financial security transaction terminal
CN210534924U (en) * 2019-11-29 2020-05-15 交通银行股份有限公司 Financial self-service machine capable of forcibly returning certificates
CN210136507U (en) * 2019-12-16 2020-03-10 上海讯久网络科技有限公司 Comprehensive government affair cooperative service system
CN111341460A (en) * 2020-03-18 2020-06-26 重庆市智权之路科技有限公司 Medical archive data mining system based on block chain and working method thereof
CN111464541A (en) * 2020-04-01 2020-07-28 重庆德信建信息技术有限公司 Electronic government affair multifunctional intelligent hardware terminal based on biological recognition and working method
CN112437042A (en) * 2020-10-30 2021-03-02 重庆恢恢信息技术有限公司 Intelligent construction site material data security certification working method through cloud platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
智慧城市中政务数据清洗融合系统设计;田淼等;《 电子技术与软件工程》;第161-162页 *

Also Published As

Publication number Publication date
CN113515555A (en) 2021-10-19

Similar Documents

Publication Publication Date Title
US8190872B2 (en) Sending service data to an RFID tag while an attached computer system is powered off
TWI465059B (en) Communications device for intelligently routing information among multiple user interfaces
CN103209211A (en) Meter reading recognizing method, meter self-service reading system and reading method thereof
CN102547679B (en) Number conversion method, device and access system for Internet of things
CN113051589B (en) Big data government affair analysis and processing safety application platform
CN106873915A (en) A kind of data transmission method and device based on RDMA registers memory blocks
CN113515555B (en) Working method for carrying out government affair data security through big data network
CN113141348B (en) Four-network-based data government affair security guarantee working method
CN209496412U (en) A kind of punch card system
CN111324645B (en) Block chain data processing method and device
CN111985491A (en) Similar information merging method, device, equipment and medium based on deep learning
CN116610671A (en) Standardized storage method and device for vehicle data information
CN104243597B (en) A kind of business card under environment based on WLAN provides collection system and method
CN116382916A (en) Resource scheduling method and system for cloud computer computing power cluster and electronic equipment
CN104636377B (en) Data compression method and equipment
CN202939639U (en) RFID-based warehouse management system
CN112445622B (en) Terminal data transmission method, device, equipment and medium based on gateway box
CN113596095A (en) Rapid Internet of things method and device, computer equipment and computer readable storage medium
CN113127109A (en) Interface calling method and device, electronic equipment and readable storage medium
CN202720683U (en) Wireless logistics business sign-in system
CN105956729A (en) Financial early-warning control system
CN108460889B (en) Intelligent cloud lock and vehicle
CN106506687A (en) A kind of information processing method and system
CN207833521U (en) A kind of electric power field work terminal based on image recognition
CN111984202A (en) Data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant