Nothing Special   »   [go: up one dir, main page]

CN114860855A - Internet mobile terminal inputting system based on data management - Google Patents

Internet mobile terminal inputting system based on data management Download PDF

Info

Publication number
CN114860855A
CN114860855A CN202210507215.7A CN202210507215A CN114860855A CN 114860855 A CN114860855 A CN 114860855A CN 202210507215 A CN202210507215 A CN 202210507215A CN 114860855 A CN114860855 A CN 114860855A
Authority
CN
China
Prior art keywords
data
module
aggregation
mobile terminal
acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210507215.7A
Other languages
Chinese (zh)
Other versions
CN114860855B (en
Inventor
孙玲玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Sunshine Smart City Technology Co ltd
Original Assignee
Jiangsu Sunshine Smart City Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Sunshine Smart City Technology Co ltd filed Critical Jiangsu Sunshine Smart City Technology Co ltd
Priority to CN202210507215.7A priority Critical patent/CN114860855B/en
Publication of CN114860855A publication Critical patent/CN114860855A/en
Application granted granted Critical
Publication of CN114860855B publication Critical patent/CN114860855B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24553Query execution of query operations
    • G06F16/24554Unary operations; Data partitioning operations
    • G06F16/24556Aggregation; Duplicate elimination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Mathematical Physics (AREA)
  • Evolutionary Computation (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an internet mobile terminal entry system based on data management, which comprises a data integration module, a mobile terminal entry module and a hierarchy storage and calling module, the data integration module is used for collecting, encrypting and aggregating the original data to be input, the mobile terminal input module is used for decrypting, classifying and redundantly checking the aggregated data by the cloud data processing center, the hierarchy storage calling module is used for establishing contract rules of each terminal device for storing and calling data, realizing safe and efficient sharing of the data, the data integration module is electrically connected with the mobile terminal entry module, the mobile terminal entry module is electrically connected with the hierarchy storage calling module, the safe encryption and aggregation of original data are carried out, the redundancy check of the data before storage entry is guaranteed, and the entry quality and accuracy of the data are improved.

Description

Internet mobile terminal inputting system based on data management
Technical Field
The invention relates to the technical field of data management and entry, in particular to an internet mobile terminal entry system based on data management.
Background
The supporting data is used as a unique resource accumulated in the supporting business, not only reflects the specific reason of each user, but also reflects the distribution characteristic of the supporting business, targeted supporting measures are developed according to the acquired data, further the reason analysis and the coping are carried out from the overall view according to the distribution regionality, the regulation and control promotion is carried out by adopting a macroscopic policy, the reasonable application is an excellent way for promotion, the data management is a supervision aiming at the acquisition, the processing and the use of the data, and the overall strategy decision is carried out from how to store and access to how to verify, protect and use the data.
Because the help work is a long-acting work with large coverage area and long duration, a plurality of data of the number of users and the generation reasons are changed in real time, great difficulty is brought to data statistics and summary work, the traditional step-by-step summary and reporting mode is difficult to deal with the information statistics of the scale, the upper-level department is difficult to make decisions due to inaccurate and untimely data grasp, data of various levels of human society, civil affairs, guardianship and residual union are mainly stored respectively, effective comprehensive unification is not carried out in various departments, data cross repetition exists frequently, clear processing is not directly used to realize fund distribution of people required for help data, data generated by the whole work are analyzed from a front-end transaction data processing point, a rear-end service database to a terminal, namely, a data problem of negative feedback exists in each level of a closed-loop system formed by a data source to the terminal and then returning to the source, due to the existing problems, the progress of various help works is slow and even stopped, and therefore, it is necessary to design an internet mobile terminal entry system based on data management, which integrates and enters data and improves the accuracy and efficiency of entry.
Disclosure of Invention
In order to solve the technical problems, the invention provides the following technical scheme: the utility model provides an internet removes end and types system based on data administration, includes data integration module, removes end and types module and level storage and transfer the module, the data integration module is used for gathering the encryption and aggregating to the original data that need type, it is used for cloud data processing center to aggregate data decryption classification and redundancy check to remove the end type module, level storage transfers the module and is used for establishing each terminal equipment storage and transfers the contract rule of data, realizes the high-efficient sharing of data security, the data integration module is connected with removing end type module electricity, it is connected with level storage and transfers the module electricity to remove the end type module.
According to the technical scheme, the data integration module comprises a file data acquisition domain, an edge device module and a data aggregation module, wherein the file data acquisition domain is used for assisting data acquisition of a set region, the edge device module is used for setting communication equipment for collecting and aggregating the acquired data in each acquisition domain, the data aggregation module is used for encrypting the hierarchy in the original data transmission process, the data acquisition domain is in network connection with the edge device module, and the edge device module is electrically connected with the data aggregation module;
the acquisition domain comprises acquisition base stations and a data platform, the acquisition base stations are a plurality of data base stations deployed in the region, the data platform is a network platform consisting of a plurality of deployment base stations and edge equipment, and the acquisition base stations are in network connection with the data platform.
According to the technical scheme, the mobile terminal recording module comprises a cloud processing center, a data classification module, a data redundancy check module and a rear-end service database module, the cloud processing center is a top-layer data processing recording center for summarizing after data aggregation, the data classification module performs large-direction type classification processing according to the type of data, the data redundancy check module performs redundancy check on the data uploaded from the multi-acquisition terminal, the rear-end service database module is used for establishing and storing the data after classification processing for calling and sharing by the terminal, the cloud processing center is electrically connected with the data classification module, and the data classification module, the data redundancy check module and the rear-end service database module are electrically connected;
the data classification module comprises a structured data submodule and an unstructured data submodule, the structured data submodule is used for dividing data information existing according to the set data character type into structured data, the unstructured data submodule is used for dividing text picture data without a fixed structure into unstructured data, and the structured data submodule is electrically connected with the unstructured data submodule.
According to the technical scheme, the hierarchy storage calling module comprises a hierarchy analysis storage module, an update verification module and a cross-domain sharing module, the hierarchy analysis storage module is used for identity verification in a rule contract of data to be called by each terminal device, the update verification module is used for uploading and updating the data in the service database by each terminal device, the cross-domain sharing module is used for realizing cross-domain communication of data information of multiple regional authorities, the hierarchy analysis storage module is electrically connected with the update verification module, and the update verification module is electrically connected with the cross-domain sharing module.
According to the technical scheme, the Internet mobile terminal entry method comprises the following steps:
step S1: deploying a help data acquisition base station to acquire file data of a subregion, forming a file data acquisition layer, and collecting aggregated region data by using edge equipment;
step S2: performing primary aggregation and secondary aggregation on data of the acquisition layer and data of the edge layer, and transmitting the aggregated data to a top cloud data processing and recording center;
step S3: carrying out data structuring and unstructured classification according to the structural property of the data information, and carrying out redundancy check on classified data;
step S4: establishing a back-end service database, setting a data level module, updating and verifying in real time aiming at different authority layers, and realizing cross-domain sharing by setting authority values.
According to the above technical solution, in the step S1, the acquisition layer mainly comprises an authority, i.e. an acquisition base station, and the acquisition base station collects the latest data from the user terminal within a set time, and the data is recorded in a file form and includes various information.
According to the above technical solution, the step S2 further includes the following steps:
step S21: the method comprises the steps that a collecting base station carries out primary security encryption on data, cryptographic signature and verification of original data are carried out through aggregation nodes, and a primary aggregation data ciphertext is generated by combining shared information data;
step S22: the aggregation node records the generated primary aggregation data cipher text into a new block, creates a data aggregation chain passing the primary verification and transmits the data aggregation chain to the edge layer;
step S23: the edge layer uploads the received data aggregation chain to the edge node of the corresponding area, and the node reads the encrypted data in the chain and sends the encrypted data to the edge layer aggregation node
Step S24: and verifying the signature and the aggregation ciphertext by the edge layer aggregation node, performing data convergence on the data passing the verification and the second-level aggregation ciphertext, packaging the data into the edge layer block to form a second-level data aggregation chain, and uploading the second-level data aggregation chain to the cloud data processing center.
According to the above technical solution, the step S3 further includes the following steps:
step S31: the cloud data processing and recording center reads the received two-stage aggregation chain ciphertext and data, and verifies and analyzes the batch of original related data;
step S32: aiming at the data information structure type contained in the data, dividing the data to be recorded into structured data and unstructured data;
step S33: and performing redundancy check on different types of data, performing redundancy judgment and analysis on the structured data by adopting a machine learning algorithm, and performing repeated judgment on unstructured data information by utilizing a proximity sorting algorithm.
According to the above technical solution, the step S4 further includes the following steps:
step S41: inputting all data information obtained through decryption and classified deduplication, establishing a back-end service database, and establishing each level to perform identity authentication by using a rule contract of the database so as to realize data addition, updating, verification and sharing;
step S42: forming a alliance chain among all authorities in the acquisition domain, anchoring data snapshot information on the alliance chain and a public chain, wherein the alliance chain is formed by combining blocks which are encrypted in a previous acquisition domain in a grading manner;
step S43: and building a network architecture between the edge equipment and the authority, designing an alliance chain trust model of the block chain, and performing identity authentication when the terminal equipment shares cross-domain data.
According to the above technical solution, in step S43, the edge device directly authenticates the terminal device, that is, the edge node is directly used to authenticate the identity of the authority by using the architecture from the edge device to the terminal device.
Compared with the prior art, the invention has the following beneficial effects: the invention is provided with a data integration module, a mobile terminal recording module and a hierarchy storage calling module, deploys a help data acquisition base station to acquire sub-region file data to form a file data acquisition layer, collects aggregation region data by using edge equipment, performs primary aggregation and secondary aggregation on the acquisition layer data and the edge layer data, transmits the aggregation data to a top layer cloud data processing recording center, performs data structured and unstructured classification according to the structural property of data information, performs redundancy check on the classified data, establishes a rear-end service database, sets a data hierarchy module, performs real-time updating verification on different authority layers, and realizes cross-domain sharing by setting authority values.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic diagram of the system module composition of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: an internet mobile terminal logging system based on data management comprises a data integration module, a mobile terminal logging module and a hierarchy storage and calling module, wherein the data integration module is used for collecting, encrypting and aggregating original data to be logged, the mobile terminal logging module is used for a cloud data processing center to decrypt, classify and redundantly check the aggregated data, the hierarchy storage and calling module is used for establishing contract rules of the data stored and called by each terminal device to realize safe and efficient sharing of the data, the data integration module is electrically connected with the mobile terminal logging module, the mobile terminal logging module is electrically connected with the hierarchy storage and calling module, aiming at the fact that the original data are collected from a base station to be logged and uploaded to a cloud center, and finally, the whole data processing process shared by each hierarchy terminal is called to perform safe encryption and aggregation of the original data and guarantee redundancy check of the data before storage and logging, the method and the device improve the data entry quality and accuracy, promote the stable operation of the terminal service database, set contract rules aiming at the verification and sharing of the calling and storing data of each terminal device, and improve the processing efficiency and the safety of the data source.
The data integration module comprises a file data acquisition domain, an edge equipment module and a data aggregation module, wherein the file data acquisition domain is used for assisting data acquisition of set regions, the edge equipment module is used for setting communication equipment for collecting and aggregating the acquired data in each acquisition domain, the data aggregation module is used for encrypting the hierarchy in the original data transmission process, the data acquisition domain is in network connection with the edge equipment module, and the edge equipment module is electrically connected with the data aggregation module;
the system comprises an acquisition domain, a plurality of data base stations and a data platform, wherein the acquisition base stations are arranged in the domain, the data platform is a network platform consisting of a plurality of arrangement base stations and edge equipment, the acquisition base stations are in network connection with the data platform, in the process of uploading acquired data of the acquisition domain to a cloud data processing center, privacy information in the data needs to be protected, the region serves as a boundary, and an authoritative verification mechanism of each line serves as the acquisition base station to be responsible for acquiring users, and the integrity and confidentiality of the data are ensured.
The mobile terminal logging module comprises a cloud processing center, a data classification module, a data redundancy check module and a rear-end service database module, wherein the cloud processing center is a top-layer data processing logging center for gathering data after data aggregation, the data classification module performs large-direction type classification processing according to the type of the data, the data redundancy check module performs redundancy check on the data uploaded from the multi-acquisition terminal, the rear-end service database module is used for establishing and storing the data after classification processing for calling and sharing by the terminal, the cloud processing center is electrically connected with the data classification module, and the data classification module and the data redundancy check module are electrically connected with the rear-end service database module;
the data classification module comprises a structured data submodule and an unstructured data submodule, the structured data submodule is used for dividing data information existing according to the type of set data characters into structured data, the unstructured data submodule is used for dividing text picture data without a fixed structure into unstructured data, the structured data submodule and the unstructured data submodule are electrically connected, collected data are collected and processed by a higher-level data cloud processing center and are analyzed, collected data are divided according to the structural type of the data according to repeatability detection algorithm according to the type, the accuracy and the quality of data source entry are enhanced, a sharing rule contract for calling data in a database is set, and the safety of privacy information corresponding to the data is guaranteed, meanwhile, the data cloud processing center can obtain data of the whole data platform and regional data of different regions, and fine-grained formation factor feedback is obtained through the fine-grained regional data by utilizing the analyzed fine-grained aggregation result, so that policy support more conforming to the region is obtained.
The hierarchy storage calling module comprises a hierarchy analysis storage module, an update verification module and a cross-domain sharing module, wherein the hierarchy analysis storage module is used for identity verification in a rule contract of data to be called by each terminal device, the update verification module is used for uploading and updating the data in a service database by each terminal device, the cross-domain sharing module is used for realizing cross-domain communication of data information of a plurality of regional authorities, the hierarchy analysis storage module is electrically connected with the update verification module, and the update verification module is electrically connected with the cross-domain sharing module.
The Internet mobile terminal entry method comprises the following steps:
step S1: deploying a help data acquisition base station to acquire file data of sub-areas to form a file data acquisition layer, collecting aggregated area data by using edge equipment, and acquiring file data by using the help data acquisition base station deployed at a precise area point, wherein the whole precise data platform network is divided into a plurality of sub-areas, each sub-area is deployed with a plurality of acquisition base stations, the acquisition base stations in all the sub-areas form a data acquisition layer, each sub-area is deployed with one edge equipment to collect and aggregate related data from the sub-area of the sub-area, and all the edge equipment form an edge layer;
step S2: the method comprises the steps that first-level aggregation and second-level aggregation are conducted on data of an acquisition layer and data of an edge layer, aggregated data are transmitted to a top-layer cloud data processing and recording center, the data relate to fund distribution, and therefore the situation that some false data are infiltrated or attacked exists, encryption packaging and decryption verification are conducted on an acquisition base station of the most original data acquisition layer, edge equipment for network processing and a processing center before final recording through set and distributed hierarchical ciphertext parameters, and privacy and authenticity of the data are guaranteed;
step S3: carrying out data structuring and unstructured classification according to the structural property of the data information, and carrying out redundancy check on classified data;
step S4: establishing a back-end service database, setting a data level module, updating and verifying in real time aiming at different authority layers, and realizing cross-domain sharing by setting authority values.
In step S1, the acquisition layer mainly comprises an authority, i.e., an acquisition base station, and the acquisition base station collects the latest data from the user terminal within a set time, and the data is recorded in a file form and includes various information.
Step S2 further includes the steps of:
step S21: the method comprises the steps that a collecting base station carries out primary security encryption on data, cryptology signature and verification on original data are carried out through aggregation nodes, a primary aggregation data cipher text is generated by combining shared information data, in order to guarantee confidentiality and integrity of the collected original data, a cryptology technology is utilized, the collecting base station encrypts user assistant data and signs related data, the original data after signature verification is generated by a single account book, the aggregation nodes arranged in the area aggregate the single account books from the collecting base stations to form the primary aggregation cipher text, the primary aggregation cipher text is packaged in related blocks, and finally a data aggregation chain is generated by the aggregation nodes;
step S22: the aggregation node records the generated primary aggregation data cipher text into a new block, creates a data aggregation chain passing the primary verification and transmits the data aggregation chain to the edge layer;
step S23: the method comprises the steps that an edge layer uploads a received data aggregation chain to an edge node of a corresponding area, encrypted data in the chain are read by the node and sent to an edge layer aggregation node, a first-level aggregation chain composed of multiple blocks is sent to the edge layer, the edge layer is deployed at the edge of a network and is located in an intermediate layer between an acquisition layer and a cloud data service support layer, when first-level aggregation data are read from the first-level aggregation chain sent by a user layer aggregation node, security verification is conducted, the first-level aggregation data are sent to the aggregation node of the edge layer for secondary aggregation, then the aggregation node packages related information into a new block, the blocks of the edge layer are combined into a second-level aggregation chain, the second-level aggregation chain is upwards transmitted to a cloud server for further processing, and communication overhead can be remarkably reduced by conducting secondary aggregation on the data at the edge layer;
step S24: and verifying the signature and the aggregation ciphertext by the edge layer aggregation node, performing data convergence on the data passing the verification and the second-level aggregation ciphertext, packaging the data into the edge layer block to form a second-level data aggregation chain, and uploading the second-level data aggregation chain to the cloud data processing center.
Step S3 further includes the steps of:
step S31: the cloud data processing and inputting center reads the received two-stage aggregation chain ciphertext and data, verifies and analyzes batch original related data, and aiming at a top layer data processing center before the original data are finally input, the original data of the whole data platform can be obtained, area data of different areas can be obtained, and fine-grained help cause feedback is obtained through fine-grained area data in the aggregation chain;
step S32: aiming at the data information structure type contained in the data, dividing the data to be input into structured data and unstructured data, wherein the structured data are digital and symbolic data which follow the strictly set data unified format and specification, and the data are logically expressed and realized by a two-dimensional table structure;
step S33: the method is characterized in that redundancy check is carried out on different types of data, a machine learning algorithm is adopted for redundancy judgment and analysis of structured data, a proximity sorting algorithm is utilized for repeated judgment of unstructured data information, data redundancy is also called data repetition, the data redundancy means that in the hierarchical database example, the same data information appears for many times, namely, a large amount of data repetition exists, although records of the same main key exist in the database can be avoided by adopting integrity constraint in the relational database, due to data input error, repeated records still exist in the relational database, and therefore the similar repeated records are found out before data entry, and the large amount of redundancy of the data in the hierarchical database is avoided.
Step S4 further includes the steps of:
step S41: recording all data information obtained through decryption and classified de-duplication, establishing a back-end service database, establishing rule contracts of each hierarchy of use databases for identity authentication, realizing addition, updating, verification and sharing of data, uploading, calling, storing and associating related data by different hierarchy mechanisms, setting corresponding rule contracts for authority setting of different use hierarchies, and performing privacy and safety protection on data sources of the data information;
step S42: forming an alliance chain among all authorities in an acquisition domain, anchoring data snapshot information on the alliance chain and a public chain, wherein the alliance chain is formed by combining blocks which are encrypted in a previous acquisition domain in a grading way, the authorities form the alliance chain to realize the new addition, the update, the verification and the sharing of data in a digital file form, and the data snapshot information of the alliance chain is anchored with the public chain regularly to achieve the purpose of data protection, commonly maintain and manage the block chain and ensure the safety of the data;
step S43: the method comprises the steps of building a network architecture between the edge device and the authority, designing an alliance chain trust model of the block chain, carrying out identity authentication when terminal device cross-domain data are shared, utilizing the characteristics of decentralization of the block chain technology and the like, solving the safety problem existing in cross-domain authentication, simultaneously recording the digital certificate of the terminal device on the block chain, reducing authentication overhead and improving authentication reliability.
In step S43, the edge device directly authenticates the terminal device, that is, the edge node is directly used to authenticate the identity of the authority organization by using the architecture from the edge device to the terminal device, instead of using the traditional network architecture from the data cloud processing center to the terminal device, and the authentication of the terminal device is locally processed, so that the network burden of the cloud data processing center is reduced, and the authentication efficiency and the data processing efficiency are improved.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The utility model provides a system is typeeed to internet mobile end based on data are administered, includes that data integration module, mobile end type module and hierarchical storage call module, its characterized in that: the data integration module is used for collecting, encrypting and aggregating original data to be input, the mobile terminal input module is used for decrypting, classifying and redundantly checking the aggregated data by the cloud data processing center, the hierarchy storage calling module is used for establishing contract rules of the storage calling data of each terminal device, safe and efficient sharing of the data is achieved, the data integration module is electrically connected with the mobile terminal input module, and the mobile terminal input module is electrically connected with the hierarchy storage calling module.
2. The internet mobile terminal entry system based on data governance as claimed in claim 1, wherein: the data integration module comprises a file data acquisition domain, an edge device module and a data aggregation module, wherein the file data acquisition domain is used for acquiring data of a set region, the edge device module is used for setting communication equipment for collecting and aggregating the acquired data in each acquisition domain, the data aggregation module is used for encrypting the hierarchy in the original data transmission process, the data acquisition domain is in network connection with the edge device module, and the edge device module is electrically connected with the data aggregation module;
the acquisition domain comprises acquisition base stations and a data platform, the acquisition base stations are a plurality of data base stations deployed in the region, the data platform is a network platform consisting of a plurality of deployment base stations and edge equipment, and the acquisition base stations are in network connection with the data platform.
3. The internet mobile terminal entry system based on data governance as claimed in claim 2, wherein: the mobile terminal recording module comprises a cloud processing center, a data classification module, a data redundancy check module and a rear-end service database module, wherein the cloud processing center is a top-layer data processing recording center for summarizing after data aggregation, the data classification module performs large-direction type classification processing according to the type of data, the data redundancy check module performs redundancy check on the data uploaded from the multi-acquisition terminal, the rear-end service database module is used for establishing and storing the data after classification processing for calling and sharing by the terminal, the cloud processing center is electrically connected with the data classification module, and the data classification module and the data redundancy check module are electrically connected with the rear-end service database module;
the data classification module comprises a structured data submodule and an unstructured data submodule, the structured data submodule is used for dividing data information existing according to the set data character type into structured data, the unstructured data submodule is used for dividing text picture data without a fixed structure into unstructured data, and the structured data submodule is electrically connected with the unstructured data submodule.
4. The internet mobile terminal entry system based on data governance as claimed in claim 3, wherein: the hierarchy storage calling module comprises a hierarchy analysis storage module, an update verification module and a cross-domain sharing module, the hierarchy analysis storage module is used for identity verification in a rule contract of data to be called by each terminal device, the update verification module is used for uploading and updating the data in a service database by each terminal device, the cross-domain sharing module is used for realizing cross-domain communication of data information of multiple regional authorities, the hierarchy analysis storage module is electrically connected with the update verification module, and the update verification module is electrically connected with the cross-domain sharing module.
5. The internet mobile terminal entry method of the internet mobile terminal entry system based on data governance, according to claim 4, includes the following steps:
step S1: deploying a help data acquisition base station to acquire file data of a subregion, forming a file data acquisition layer, and collecting aggregated region data by using edge equipment;
step S2: performing primary aggregation and secondary aggregation on data of the acquisition layer and data of the edge layer, and transmitting the aggregated data to a top cloud data processing and recording center;
step S3: carrying out data structuring and unstructured classification according to the structural property of the data information, and carrying out redundancy check on the classified data;
step S4: establishing a back-end service database, setting a data level module, updating and verifying in real time aiming at different authority layers, and realizing cross-domain sharing by setting authority values.
6. The internet mobile terminal entry system based on data governance as claimed in claim 5, wherein: in step S1, the acquisition layer mainly comprises an authority, i.e., an acquisition base station, and the acquisition base station collects the latest data from the user terminal within a set time, and the data is recorded in a file form and includes various information.
7. The internet mobile terminal entry system based on data governance as claimed in claim 6, wherein: the step S2 further includes the steps of:
step S21: the method comprises the steps that a collecting base station carries out primary security encryption on data, cryptographic signature and verification of original data are carried out through aggregation nodes, and a primary aggregation data ciphertext is generated by combining shared information data;
step S22: the aggregation node records the generated primary aggregation data cipher text into a new block, creates a data aggregation chain passing the primary verification and transmits the data aggregation chain to the edge layer;
step S23: the edge layer uploads the received data aggregation chain to the edge node of the corresponding area, and the node reads the encrypted data in the chain and sends the encrypted data to the edge layer aggregation node;
step S24: and verifying the signature and the aggregation ciphertext by the edge layer aggregation node, performing data convergence on the data passing the verification and the second-level aggregation ciphertext, packaging the data into the edge layer block to form a second-level data aggregation chain, and uploading the second-level data aggregation chain to the cloud data processing center.
8. The internet mobile terminal entry system based on data governance as claimed in claim 7, wherein: the step S3 further includes the steps of:
step S31: the cloud data processing and recording center reads the received two-stage aggregation chain ciphertext and the data, and verifies and analyzes the batch of original related data;
step S32: dividing data to be input into structured data and unstructured data according to the data information structure type contained in the data;
step S33: and performing redundancy check on different types of data, performing redundancy judgment and analysis on the structured data by adopting a machine learning algorithm, and performing repeated judgment on unstructured data information by utilizing a proximity sorting algorithm.
9. The internet mobile terminal entry system based on data governance as claimed in claim 8, wherein: the step S4 further includes the steps of:
step S41: inputting all data information obtained through decryption and classified deduplication, establishing a back-end service database, and establishing each level to perform identity authentication by using a rule contract of the database so as to realize data addition, updating, verification and sharing;
step S42: forming a alliance chain among all authorities in the acquisition domain, anchoring data snapshot information on the alliance chain and a public chain, wherein the alliance chain is formed by combining blocks which are encrypted in a previous acquisition domain in a grading manner;
step S43: and building a network architecture between the edge equipment and the authority, designing an alliance chain trust model of the block chain, and performing identity authentication when the terminal equipment shares cross-domain data.
10. The internet mobile terminal entry system based on data governance according to claim 9, wherein: in step S43, the edge device directly authenticates the terminal device, that is, the edge node is directly used to authenticate the identity of the authority mechanism by using the framework from the edge device to the terminal device.
CN202210507215.7A 2022-05-10 2022-05-10 Internet mobile terminal inputting system based on data management Active CN114860855B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210507215.7A CN114860855B (en) 2022-05-10 2022-05-10 Internet mobile terminal inputting system based on data management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210507215.7A CN114860855B (en) 2022-05-10 2022-05-10 Internet mobile terminal inputting system based on data management

Publications (2)

Publication Number Publication Date
CN114860855A true CN114860855A (en) 2022-08-05
CN114860855B CN114860855B (en) 2023-03-21

Family

ID=82638149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210507215.7A Active CN114860855B (en) 2022-05-10 2022-05-10 Internet mobile terminal inputting system based on data management

Country Status (1)

Country Link
CN (1) CN114860855B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116938594A (en) * 2023-09-08 2023-10-24 北京数盾信息科技有限公司 Multi-level identity verification system based on high-speed encryption technology
CN117318173A (en) * 2023-09-27 2023-12-29 南方电网数字电网研究院有限公司 Multi-core heterogeneous chip applied to high-power cascading inverter
CN117827896A (en) * 2022-11-17 2024-04-05 郑建毓 Data aggregation method based on block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650116A (en) * 2019-07-04 2020-01-03 浙江工商大学 Multi-type multi-dimensional data aggregation method and system for security smart power grid
CN111200604A (en) * 2019-12-30 2020-05-26 曲阜师范大学 Privacy protection method and system based on data aggregation
CN112486973A (en) * 2020-12-10 2021-03-12 四川瀚库智数科技有限公司 Big data management system and method for colleges and universities
WO2021095926A1 (en) * 2019-11-11 2021-05-20 전자부품연구원 Complex iot device and sharing service providing method using same, and method for recognizing external information through blockchain application and providing information
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device
US20210226784A1 (en) * 2018-08-03 2021-07-22 Istanbul Teknik Universitesi Systems and methods for generating shared keys, identity authentication and data transmission based on simultaneous transmission on wireless multiple- access channels
CN113507458A (en) * 2021-06-28 2021-10-15 电子科技大学 Cross-domain identity authentication method based on block chain
CN114138731A (en) * 2021-12-07 2022-03-04 成都合梦天地信息技术有限公司 Smart city data sharing method and system based on big data

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210226784A1 (en) * 2018-08-03 2021-07-22 Istanbul Teknik Universitesi Systems and methods for generating shared keys, identity authentication and data transmission based on simultaneous transmission on wireless multiple- access channels
CN110650116A (en) * 2019-07-04 2020-01-03 浙江工商大学 Multi-type multi-dimensional data aggregation method and system for security smart power grid
WO2021095926A1 (en) * 2019-11-11 2021-05-20 전자부품연구원 Complex iot device and sharing service providing method using same, and method for recognizing external information through blockchain application and providing information
CN111200604A (en) * 2019-12-30 2020-05-26 曲阜师范大学 Privacy protection method and system based on data aggregation
CN112486973A (en) * 2020-12-10 2021-03-12 四川瀚库智数科技有限公司 Big data management system and method for colleges and universities
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device
CN113507458A (en) * 2021-06-28 2021-10-15 电子科技大学 Cross-domain identity authentication method based on block chain
CN114138731A (en) * 2021-12-07 2022-03-04 成都合梦天地信息技术有限公司 Smart city data sharing method and system based on big data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭叶斌: "基于区块链的加密云存储平台模型研究", 《软件导刊》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117827896A (en) * 2022-11-17 2024-04-05 郑建毓 Data aggregation method based on block chain
CN116938594A (en) * 2023-09-08 2023-10-24 北京数盾信息科技有限公司 Multi-level identity verification system based on high-speed encryption technology
CN116938594B (en) * 2023-09-08 2024-03-22 数盾信息科技股份有限公司 Multi-level identity verification system based on high-speed encryption technology
CN117318173A (en) * 2023-09-27 2023-12-29 南方电网数字电网研究院有限公司 Multi-core heterogeneous chip applied to high-power cascading inverter

Also Published As

Publication number Publication date
CN114860855B (en) 2023-03-21

Similar Documents

Publication Publication Date Title
CN114860855B (en) Internet mobile terminal inputting system based on data management
CN109766673B (en) Alliance type audio and video copyright block chain system and audio and video copyright chaining method
CN111159769B (en) Building engineering cost supervision system and method based on block chain
CN109729168A (en) A kind of data share exchange system and method based on block chain
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN110046521A (en) Decentralization method for secret protection
CN108881160A (en) Medical treatment & health data managing method and system based on block chain intelligence contract
CN110069918A (en) A kind of efficient double factor cross-domain authentication method based on block chain technology
JP2021526682A (en) Blockchain-based sleeve injection quality tracking methods, systems and collection terminals
CN110059503A (en) The retrospective leakage-preventing method of social information
CN108805710A (en) A kind of distribution type electric energy method of commerce based on block chain intelligence contract technology
CN115766795B (en) Intelligent service method of trusted electronic file platform based on blockchain
CN108881327A (en) A kind of computer internet information safety control system based on cloud computing
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN110110552A (en) A kind of electronics license data sharing method and system based on block chain
CN106656792B (en) A kind of BGP routing trust authentication method based on SDN framework
CN110309197A (en) Project data verification method and its device
CN109284426B (en) Multi-data document classification system based on permission level
CN114944223A (en) Traceable medical waste treatment system and method based on double block chains
CN111274614A (en) Electronic license sharing system based on block chain
CN113408752A (en) Garbage recovery supervision system and method based on block chain
CN110430207B (en) Multi-point remote cross-network interaction collaborative authentication method for smart power grid
CN110428215B (en) Intelligent robot data information mutual interaction safe and reliable transmission handling method and system
CN117093654A (en) Accounting marking method based on blockchain technology
CN110071966A (en) The networking of block chain and data processing method based on cloud platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant