CN115996194B - User information sharing management method, system and storage medium based on big data - Google Patents

User information sharing management method, system and storage medium based on big data Download PDF

Info

Publication number
CN115996194B
CN115996194B CN202310283848.9A CN202310283848A CN115996194B CN 115996194 B CN115996194 B CN 115996194B CN 202310283848 A CN202310283848 A CN 202310283848A CN 115996194 B CN115996194 B CN 115996194B
Authority
CN
China
Prior art keywords
port
transmission
shared
transmission port
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310283848.9A
Other languages
Chinese (zh)
Other versions
CN115996194A (en
Inventor
金磊
刘凌
金健鹏
余金明
赵建林
刘新刚
周逸文
黄挺
孙赟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guoan Guangchuan Network Technology Co Ltd
Original Assignee
Beijing Guoan Guangchuan Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guoan Guangchuan Network Technology Co Ltd filed Critical Beijing Guoan Guangchuan Network Technology Co Ltd
Priority to CN202310283848.9A priority Critical patent/CN115996194B/en
Publication of CN115996194A publication Critical patent/CN115996194A/en
Application granted granted Critical
Publication of CN115996194B publication Critical patent/CN115996194B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a user information sharing management method, a system and a storage medium based on big data. According to the invention, through carrying out hierarchical division on each port in advance, the parent-level transmission port and the child-level transmission port are determined, and when data sharing is carried out, the parent-level transmission port participates in, and can be watched by a special person or supervised according to an encryption means built in the parent-level transmission port, so that the safety of the data sharing is ensured; in addition, when data sharing is carried out between the sub-level transmission ports, after monitoring and management are carried out by the main-level transmission port, the two sub-level transmission ports can carry out direct information sharing transmission work, and the high efficiency of data sharing is ensured. The method and the device effectively solve the defect that the shared transmission is inconvenient because of different transmission port levels when the shared transmission is carried out on data in the prior art.

Description

User information sharing management method, system and storage medium based on big data
Technical Field
The present invention relates to the field of information management technologies, and in particular, to a method, a system, and a storage medium for user information sharing management based on big data.
Background
The appearance and the upgrading of the informatization management change the content and the form of the competitive advantage of the enterprise and provide a powerful weapon for the enterprise to get the competitive advantage. It can be said that whether or not the competition advantage can be obtained by using the information technology will have a great influence on the survival and development of future enterprises. Successful enterprise informatization construction should become a trigger for promoting enterprise management transformation, and together with other transformation ideas and practices, promote optimization of enterprise management systems. A large amount of practical experience shows that the popularization and application of the computer and modern communication technology require the change of management ideas and management environments, and meanwhile, the popularization of the information technology continuously promotes the development and change of management modes. The appearance of new management modes requires new technical means to be supported, and the appearance of new technical means inevitably promotes the appearance of new management modes.
The information revolution has profound effects on various fields of society, along with the development of the Internet and informatization, users can apply information to different service platforms in the process of daily service, and in the process of realizing the service, the different service platforms can correspondingly record and accumulate the information of the users, including service execution records and user behavior information derived from the service execution records. Different types of service platforms respectively accumulate data information of users in different aspects continuously.
However, because the user data volume in the enterprise is huge, the classification is wide, when the enterprise exists a primary-secondary level company, the situations of low sharing transmission efficiency, low sharing transmission safety and the like can possibly occur when the data is shared and transmitted, and great inconvenience is caused to the enterprise when the information is transmitted and shared.
Disclosure of Invention
The invention aims to solve the defect that the sharing transmission is inconvenient because of different transmission port levels in the prior art when data is shared and transmitted, and provides a user information sharing management method, system and storage medium based on big data.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the first aspect of the invention provides a user information sharing management method based on big data
A method, comprising:
acquiring all user data information of each port, and performing deduplication operation on all user data information of each port respectively;
wherein, all user data information of each port comprises: writing user data into the content;
preliminary authority attachment is carried out on each port, and authority information of each port is obtained;
according to all user data information of each port, counting and classifying by combining authority information of each port to obtain authority parent-end information and a plurality of authority child-end information;
performing secondary authority addition on each port according to the authority master terminal information and the plurality of authority slave terminal information to obtain a master transmission port and a plurality of slave transmission ports;
the master transmission port and the slave transmission port carry out shared transmission, the master transmission port obtains a shared transmission instruction of the slave transmission port and carries out encryption transmission, the slave transmission port receives and decrypts the shared transmission instruction, and the slave transmission port and the master transmission port complete data shared transmission;
every two sub-level transmission ports perform pre-sharing transmission, and the parent level transmission ports obtain two sub-level transmission ports
The preshared transmission instructions of the sub-level transmission ports are paired, and the main level transmission port enables the two sub-level transmission ports to directly carry out data sharing transmission.
In a preferred embodiment, the method for performing preliminary authority attachment on each port includes:
and carrying out preliminary authority-added labeling work on each port according to one or more combinations of the establishment time of each port, the rights attribution among the ports and the manager of each port, and obtaining authority information with different labeling numbers by each port.
In a preferred embodiment, the method for obtaining the rights master information and the plurality of rights child information includes:
and processing according to one or more of the total user data, the attribution information of the ports and the authority size of each port.
In a preferred embodiment, the method for the parent transmission port to obtain the shared transmission instruction of the child transmission port and perform encrypted transmission includes:
the secondary transmission port sends a shared transmission instruction to the primary transmission port;
the master transmission port obtains the shared transmission instruction of the slave transmission port, and encrypts data according to different labeling numbers in the authority information of the slave transmission port to obtain an encrypted data packet with a decryption instruction;
the sub-level transmission port obtains the packet data encryption packet with the decryption instruction of the parent level transmission port, and then decrypts the encryption packet according to the decryption instruction.
In a preferred embodiment, the method for obtaining an encrypted data packet with decryption instructions comprises:
an encryption matrix is arranged in the parent transmission port, and the encryption matrix is as follows:
wherein,,for different numbers of labels in the sub-level transmission port rights information,/for each sub-level transmission port rights information>Is a controllable variable +.>For outputting parameters +.>For n-th pair->Performing configuration;
wherein, the encrypted data packet with the decryption instruction is: data source compression packet corresponding to shared transmission instruction of sub-level transmission port and data source pressureShrink wrap is written with、/>、/>Any two of these.
In a preferred embodiment, the method for the parent transmission port to directly perform data sharing transmission by two child transmission ports includes:
the method comprises the steps that a parent-level transmission port obtains a shared transmission instruction of a pre-shared child-level transmission port, and the shared child-level transmission port corresponding to the shared transmission instruction of the pre-shared child-level transmission port is paired according to the shared transmission instruction of the pre-shared child-level transmission port;
the master-level transmission port respectively acquires different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port;
the master-level transmission port processes according to different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port to obtain a shared encryption instruction and a pre-shared decryption instruction;
the shared sub-level transmission port encrypts data according to the encryption instruction to obtain a shared encrypted data packet;
and the preshared sub-level transmission port acquires the shared encrypted data packet, and decrypts the shared encrypted data packet by utilizing the preshared decryption instruction to complete data sharing transmission of the preshared sub-level transmission port and the shared sub-level transmission port.
In a preferred embodiment, the method of deriving shared encryption instructions and pre-shared decryption instructions comprises:
different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port are respectively defined as:
will beReplacement->Substituting the encryption matrix into the parent transmission port, wherein the encryption matrix is:
wherein the encryption instruction is;
The decryption instruction is as follows: comprises、/>、/>Any two of these.
The second aspect of the present invention provides a big data based user information sharing management system, which adopts the big data based user information sharing management method according to any one of the first aspect, and the management system further includes:
the acquisition module is used for acquiring all user data information of each port;
the data processing module is used for processing the user data;
the permission adding module is used for writing permission into each port;
the central processing module is used for controlling shared transmission among all ports;
and the storage module is used for recording data and storing a shared transmission path between the ports.
In a preferred embodiment, the rights addition module includes:
the primary additional unit is used for marking each port;
and the secondary attaching unit is used for carrying out secondary authority attachment on each port.
A third aspect of the present invention provides a computer-readable medium having stored thereon a computer program, wherein the program when executed by a processor implements a big data based user information sharing management method as set forth in any of the first aspects.
The beneficial effects of the invention are as follows:
in the embodiment of the invention, the primary transmission ports and the secondary transmission ports are determined by carrying out hierarchical division on each port in advance, and the primary transmission ports participate in the data sharing process, so that the primary transmission ports can be attended by a special person and can be supervised according to the built-in encryption means, thereby ensuring the safety of the data sharing; in addition, when data sharing is carried out between the sub-level transmission ports, after monitoring and management are carried out by the main-level transmission port, the two sub-level transmission ports can carry out direct information sharing transmission work, and the high efficiency of data sharing is ensured. The method and the device effectively solve the defect that the shared transmission is inconvenient because of different transmission port levels when the shared transmission is carried out on data in the prior art.
Drawings
Fig. 1 is a schematic overall flow chart of a user information sharing management method based on big data provided in an embodiment of the present invention;
FIG. 2 is a schematic diagram of a part of a user information sharing management method based on big data according to an embodiment of the present invention;
fig. 3 is a schematic control structure diagram of a user information sharing management system based on big data according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that all directional indicators (such as up, down, left, right, front, and rear … …) in the embodiments of the present invention are merely used to explain the relative positional relationship, movement, etc. between the components in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly.
In the present invention, unless specifically stated and limited otherwise, the terms "connected," "affixed," and the like are to be construed broadly, and for example, "affixed" may be a fixed connection, a removable connection, or an integral body; can be mechanically or electrically connected; either directly or indirectly, through intermediaries, or both, may be in communication with each other or in interaction with each other, unless expressly defined otherwise. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
In addition, if there is a description of "first", "second", etc. in the embodiments of the present invention, the description of "first", "second", etc. is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the meaning of "and/or" as it appears throughout includes three parallel schemes, for example "A and/or B", including the A scheme, or the B scheme, or the scheme where A and B are satisfied simultaneously. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
Referring to fig. 1, 2 and 3, in order to solve the existing data in the prior art
The invention obtains a parent-level transmission port and a plurality of child-level transmission ports with different levels by carrying out authority additional processing on each port in advance, and then judges a management method for user data sharing transmission according to the sharing transmission paths of the parent-level transmission port, the child-level transmission port and every two child-level transmission ports.
Specifically, the first aspect of the invention provides a big data-based user information sharing method
The management method comprises the following steps:
acquiring all user data information of each port, and performing deduplication operation on all user data information of each port respectively; wherein, all user data information of each port comprises: writing user data into the content; all user data information built in each port is subjected to the de-duplication operation, so that repeated redundant data information existing in each port is reduced, the subsequent working process of user data processing is reduced, and the efficiency of subsequent data sharing transmission is ensured.
Preliminary authority attachment is carried out on each port, and authority information of each port is obtained; the preliminary rights addition in each port may be employed here: and carrying out preliminary authority-added labeling work on each port according to one or more combinations of the establishment time of each port, the rights attribution among the ports and the manager of each port, and obtaining authority information with different labeling numbers by each port. The different numbers of the ports can be marked according to the establishment time of the ports, the rights and interests in the ports, whether the ports have the same management responsible person or not, and the like, so that the ports can obtain the unique special number marks which can represent the ports. In a possible embodiment, the serial numbers of the different numbers of the ports can be marked according to the above basis, so that the subsequent management is facilitated.
According to all user data information of each port, counting and classifying by combining authority information of each port to obtain authority parent-end information and a plurality of authority child-end information; and carrying out secondary authority addition on each port according to the authority master terminal information and the plurality of authority slave terminal information to obtain a master-level transmission port and a plurality of slave-level transmission ports. In this embodiment, the method for obtaining the rights master information and the plurality of rights child information includes: the hierarchical relationship of the parent or child transmission ports in each port may be determined according to the total amount of user data in each port, attribution information (e.g., attribution, equity, etc.) between each port, authority size of each port (which may be manually determined by an operator), etc.
When the master-stage transmission port and the slave-stage transmission port carry out user data information sharing transmission, the master-stage transmission port obtains a sharing transmission instruction of the slave-stage transmission port and carries out encryption transmission, the slave-stage transmission port receives and decrypts the data, and the data sharing transmission is completed by the slave-stage transmission port and the master-stage transmission port. Specifically, in this embodiment, the method for the parent transmission port to obtain the shared transmission instruction of the child transmission port and perform encrypted transmission includes:
the secondary transmission port sends a shared transmission instruction to the primary transmission port;
the master transmission port obtains the shared transmission instruction of the slave transmission port, and encrypts data according to different labeling numbers in the authority information of the slave transmission port to obtain an encrypted data packet with a decryption instruction; the parent transmission port pairs corresponding user data content according to the shared transmission instruction sent by the child transmission port. And then, according to the different marking numbers of the sub-level transmission ports, the shared transmission instructions sent by the sub-level transmission ports are matched with corresponding user data contents to carry out data encryption, so as to obtain a data encryption packet with a decryption instruction.
And the secondary transmission port obtains the packet data encryption packet with the decryption instruction of the primary transmission port, and then decrypts the encryption packet according to the decryption instruction. Optionally, the encryption method at the parent transmission port includes: one or more of symmetric encryption or asymmetric encryption.
In an alternative embodiment, to facilitate clarity in explaining how the parent transmission port encrypts data information, the method for obtaining an encrypted data packet with decryption instructions includes:
an encryption matrix is arranged in the parent transmission port, and the encryption matrix is as follows:
wherein,,for different numbers of labels in the sub-level transmission port rights information,/for each sub-level transmission port rights information>For controllable variables (so as to regulate and control corresponding variable values at any time and ensure the safety effect of an encryption matrix)>For outputting parameters +.>For n-th pair->Performing configuration;
wherein, the encrypted data packet with the decryption instruction is: data source compression packet corresponding to shared transmission instruction of sub-level transmission port, and the data source compression packet is written with、/>、/>Any two of these. Namely, after the data encryption processing is completed by the master-stage transmission port, the slave-stage transmission portAccording to the received data encryption packet with decryption instruction, the marking number of the sub-level transmission ports is known, the +.>,/>,/>Any two items can finish the decryption work of the encryption matrix.
In this embodiment, user data information is required between every two sub-level transmission ports
And carrying out preshared transmission, wherein the master-stage transmission port is used for carrying out pairing according to the preshared transmission instruction obtained by the two slave-stage transmission ports, and the master-stage transmission port is used for directly carrying out data sharing transmission by the two slave-stage transmission ports. In this embodiment, a sub-level transmission port that initiates data information sharing transmission is defined as: the pre-shared sub-level transmission port, the sub-level transmission port that needs to output data information is defined as: shared sub-level transmission ports. Specifically, the method for the master-stage transmission port to directly perform data sharing transmission by the two slave-stage transmission ports includes:
the method comprises the steps that a parent-level transmission port obtains a shared transmission instruction of a pre-shared child-level transmission port, and the shared child-level transmission port corresponding to the shared transmission instruction of the pre-shared child-level transmission port is paired according to the shared transmission instruction of the pre-shared child-level transmission port;
the master-level transmission port respectively acquires different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port;
the master-level transmission port processes according to different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port to obtain a shared encryption instruction and a pre-shared decryption instruction;
the shared sub-level transmission port encrypts data according to the encryption instruction to obtain a shared encrypted data packet;
and the preshared sub-level transmission port acquires the shared encrypted data packet, and decrypts the shared encrypted data packet by utilizing the preshared decryption instruction to complete data sharing transmission of the preshared sub-level transmission port and the shared sub-level transmission port. In this embodiment, when data information is shared and transmitted between every two sub-level transmission ports, pairing and verification are needed through the parent level transmission port, so that the parent level transmission port performs data encryption processing according to the labeling number of the two sub-level transmission ports. Specifically, in this embodiment, the method for obtaining the shared encryption instruction and the pre-shared decryption instruction includes:
different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port are respectively defined as:
will beReplacement->Substituting the encryption matrix into the parent transmission port, wherein the encryption matrix is:
wherein the encryption instruction isThe shared sub-level transmission port is substituted into an encryption matrix in the main-level transmission port according to the encryption instruction, and the encryption matrix is utilized to carry out encryption redundancy compression processing on the output data information, so as to obtain an encrypted data packet.
The decryption instruction is as follows: comprises、/>、/>Any two of these. I.e. shared sub-level transmission port according to +.>、/>、/>Meanwhile, as the number labels of the two sub-level transmission ports are known, the decryption work of the encrypted data packet sent by the shared sub-level transmission port can be completed, and the information sharing transmission work of the two sub-level transmission ports can be completed.
In the embodiment, the invention determines the master-level transmission port and the slave-level transmission port by carrying out hierarchical division on each port in advance, and the master-level transmission port participates in the data sharing process, so that the master-level transmission port can be attended by a special person or can be supervised according to an encryption means built in the master-level transmission port, thereby ensuring the safety of the data sharing; in addition, when data sharing is carried out between the sub-level transmission ports, after monitoring and management are carried out by the main-level transmission port, the two sub-level transmission ports can carry out direct information sharing transmission work, and the high efficiency of data sharing is ensured. The method and the device effectively solve the defect that the shared transmission is inconvenient because of different transmission port levels when the shared transmission is carried out on data in the prior art.
Referring to fig. 1, 2 and 3, a second aspect of the present invention provides a big data based user information sharing management system, which adopts the big data based user information sharing management method according to any one of the first aspect, the management system further includes:
the acquisition module is used for acquiring all user data information of each port; the acquisition module is used for acquiring all user data information of each port, including the data information which is written and stored later.
The data processing module is used for processing the user data; the data processing module is used for performing data processing operation on user data information sent by each port, including but not limited to data deduplication operation.
The permission adding module is used for writing permission into each port; the permission adding module is used for performing permission adding according to permission adding conditions so as to ensure that each port can be clearly distinguished.
The central processing module is used for controlling shared transmission among all ports;
and the storage module is used for recording data and storing a shared transmission path between the ports.
In a preferred embodiment, the rights addition module includes:
the primary additional unit is used for marking each port;
and the secondary attaching unit is used for carrying out secondary authority attachment on each port.
The third aspect of the present invention also provides a computer-readable medium having stored thereon a computer program, wherein the program when executed by a processor implements a big data based user information sharing management method as described in any of the first aspects.
It should be noted that, the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing. A fourth aspect of the present invention provides an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon; the one or more programs, when executed by the one or more processors, cause the one or more processors to implement a big data based user information sharing management method as described in the first aspect.
In some embodiments, the sharing management method may communicate using any currently known or future developed network protocol, such as HTTP (Hyper Text Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
A fifth aspect of the present invention provides a computer program product comprising a computer program which, when executed by a processor, implements a big data based user information sharing management method as described in the first aspect.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (10)

1. The user information sharing management method based on big data is characterized by comprising the following steps:
acquiring all user data information of each port, and performing deduplication operation on all user data information of each port respectively;
wherein, all user data information of each port comprises: writing user data into the content;
preliminary authority attachment is carried out on each port, and authority information of each port is obtained;
according to all user data information of each port, counting and classifying by combining authority information of each port to obtain authority parent-end information and a plurality of authority child-end information;
performing secondary authority addition on each port according to the authority master terminal information and the plurality of authority slave terminal information to obtain a master transmission port and a plurality of slave transmission ports;
the master transmission port and the slave transmission port carry out shared transmission, the master transmission port obtains a shared transmission instruction of the slave transmission port and carries out encryption transmission, the slave transmission port receives and decrypts the shared transmission instruction, and the slave transmission port and the master transmission port complete data shared transmission;
and each two sub-level transmission ports perform pre-sharing transmission, the master-level transmission port acquires a sharing transmission instruction of the pre-sharing sub-level transmission port, and the master-level transmission port enables the two sub-level transmission ports to directly perform data sharing transmission according to the sharing transmission instruction pairing of the pre-sharing sub-level transmission port and the corresponding shared sub-level transmission port.
2. The method for managing user information sharing based on big data according to claim 1, wherein the method for attaching preliminary rights to each port comprises:
and carrying out preliminary authority-added labeling work on each port according to one or more combinations of the establishment time of each port, the rights attribution among the ports and the manager of each port, and obtaining authority information with different labeling numbers by each port.
3. The method for managing user information sharing based on big data according to claim 2, wherein the method for obtaining rights master information and a plurality of rights child information comprises:
and processing according to one or more of the total user data, the attribution information of the ports and the authority size of each port.
4. The method for managing user information sharing based on big data according to claim 3, wherein the method for the parent transmission port to obtain the shared transmission instruction of the child transmission port and perform encrypted transmission comprises:
the secondary transmission port sends a shared transmission instruction to the primary transmission port;
the master transmission port obtains the shared transmission instruction of the slave transmission port, and encrypts data according to different labeling numbers in the authority information of the slave transmission port to obtain an encrypted data packet with a decryption instruction;
the sub-level transmission port obtains the data encryption packet with the decryption instruction of the parent level transmission port, and then decrypts the encrypted data packet according to the decryption instruction.
5. The method for managing user information sharing based on big data according to claim 4, wherein the method for obtaining the encrypted data packet with the decryption instruction comprises:
an encryption matrix is arranged in the parent transmission port, and the encryption matrix is as follows:
wherein,,for different numbers of labels in the sub-level transmission port rights information,/for each sub-level transmission port rights information>Is a controllable variable +.>For outputting parameters +.>For n-th pair->Performing configuration;
wherein, the encrypted data packet with the decryption instruction is: and sub-levelData source compression packets corresponding to the shared transmission instructions of the transmission ports are written with、/>、/>Any two of these.
6. The method for managing user information sharing based on big data according to claim 5, wherein the method for the parent transmission port to directly perform data sharing transmission by two child transmission ports includes:
the master-level transmission port respectively acquires different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port;
the master-level transmission port processes according to different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port to obtain a shared encryption instruction and a pre-shared decryption instruction;
the shared sub-level transmission port encrypts data according to the encryption instruction to obtain a shared encrypted data packet;
and the preshared sub-level transmission port acquires the shared encrypted data packet, and decrypts the shared encrypted data packet by utilizing the preshared decryption instruction to complete data sharing transmission of the preshared sub-level transmission port and the shared sub-level transmission port.
7. The big data based user information sharing management method according to claim 6, wherein the method of obtaining the shared encryption instruction and the pre-shared decryption instruction comprises:
different labeling numbers in the permission information of the pre-shared sub-level transmission port and the shared sub-level transmission port are respectively defined as:
will beReplacement->Substituting the encryption matrix into the parent transmission port, wherein the encryption matrix is:
wherein the encryption instruction is;
The decryption instruction is as follows: comprises、/>、/>Any two of these.
8. A big data based user information sharing management system, characterized in that the big data based user information sharing management method according to any one of claims 1-7 is adopted, the management system further comprising:
the acquisition module is used for acquiring all user data information of each port;
the data processing module is used for processing the user data;
the permission adding module is used for writing permission into each port;
the central processing module is used for controlling shared transmission among all ports;
and the storage module is used for recording data and storing a shared transmission path between the ports.
9. The big data based user information sharing management system of claim 8, wherein the rights addition module comprises:
the primary additional unit is used for marking each port;
and the secondary attaching unit is used for carrying out secondary authority attachment on each port.
10. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements a big data based user information sharing management method as claimed in any of claims 1-7.
CN202310283848.9A 2023-03-22 2023-03-22 User information sharing management method, system and storage medium based on big data Active CN115996194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310283848.9A CN115996194B (en) 2023-03-22 2023-03-22 User information sharing management method, system and storage medium based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310283848.9A CN115996194B (en) 2023-03-22 2023-03-22 User information sharing management method, system and storage medium based on big data

Publications (2)

Publication Number Publication Date
CN115996194A CN115996194A (en) 2023-04-21
CN115996194B true CN115996194B (en) 2023-07-25

Family

ID=85993758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310283848.9A Active CN115996194B (en) 2023-03-22 2023-03-22 User information sharing management method, system and storage medium based on big data

Country Status (1)

Country Link
CN (1) CN115996194B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635101A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 The invention discloses a roaming register processing method, a multi-domain split-type mobile terminal control device and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105207916B (en) * 2014-06-30 2020-04-24 北京奇虎科技有限公司 Routing device and method for associating equipment connected by routing device
CN107403105B (en) * 2017-06-30 2020-09-04 华为技术有限公司 Permission setting method and device for file system
CN112311748A (en) * 2019-12-16 2021-02-02 深圳新阳蓝光能源科技股份有限公司 Data sharing authority management method and device, client and server
CN115632837A (en) * 2022-10-09 2023-01-20 上海和数软件有限公司 Privacy data sharing method and system based on decentralized digital identity

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635101A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 The invention discloses a roaming register processing method, a multi-domain split-type mobile terminal control device and system

Also Published As

Publication number Publication date
CN115996194A (en) 2023-04-21

Similar Documents

Publication Publication Date Title
US20210385200A1 (en) Blockchain-based service data encryption methods and apparatuses
CN109243583B (en) Method and equipment for decentralized management of medical image data based on block chain
US11095615B2 (en) Selective encryption delineation
US10609010B2 (en) System, methods and software application for sending secured messages on decentralized networks
US20180109530A1 (en) Peer to peer enterprise file sharing
WO2020233049A1 (en) Data authorization method and apparatus of blockchain system, storage medium, and electronic device
CN107666386B (en) Data secure transmission method and device
US10581804B2 (en) End-to-end caching of secure content via trusted elements
ES2925190T3 (en) Multicast Encryption Scheme for Data Ownership Platform
KR20200085095A (en) Electronic apparatus and method for managing data based on block chain
US20090208015A1 (en) Offline consumption of protected information
US11509637B2 (en) Data transmission method, system and platform using blockchain, and storage medium
CN111698537B (en) Multimedia data processing method, device, equipment and storage medium
CN115996194B (en) User information sharing management method, system and storage medium based on big data
US20210344483A1 (en) Methods, apparatus, and articles of manufacture to securely audit communications
Lee et al. Addressing IoT storage constraints: A hybrid architecture for decentralized data storage and centralized management
US11575524B2 (en) Selective encryption delineation
CN111861489B (en) Block chain-based financial product transaction share determining method and device
CN113535663A (en) Data sharing processing method, device, equipment and medium based on block chain
US10958423B2 (en) Automated changeover of transfer encryption key
CN111859351A (en) Method, system, server and storage medium for writing information into chip
CN116545724B (en) Trusted computing method, system, equipment and storage medium based on blockchain
CN113206837B (en) Information transmission method and device, electronic equipment and computer readable medium
CN113312637B (en) Proxy server and method for matching encrypted subscription with event
CN117892286B (en) Collaborative server data interaction processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant