Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method for shp line-surface graph layer data hierarchy

A line surface layer and data technology, applied in digital data protection, digital transmission system, electrical components, etc., can solve the problem that GIS vector data is easy to be tampered with

Inactive Publication Date: 2015-05-20
NANJING NORMAL UNIVERSITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, digitally stored GIS vector data are easily tampered with, causing serious consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for shp line-surface graph layer data hierarchy
  • Encryption and decryption method for shp line-surface graph layer data hierarchy
  • Encryption and decryption method for shp line-surface graph layer data hierarchy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] Further details will be given below in conjunction with the accompanying drawings and embodiments.

[0064] This embodiment selects a shp line layer data, for the generation of hierarchical key, the whole process of vector data classification, level-by-level encryption and storage, level-by-level decryption and display (surface layer data can adopt the same method), further The present invention will be described in detail. This embodiment selects the national basic geographic data 1:4 million line layer data (such as Figure 5 ) as experimental data.

[0065] (1) Level-by-level encryption and storage process for line layer data (such as figure 1 )

[0066] Step 11: Use the unidirectionality of the Hash function to construct a hierarchical key chain. The specific methods for generating keys at all levels are as follows:

[0067] a) Enter the key key or select the key file keyfile;

[0068] b) Use the Hash function SHA-256 algorithm to process the input key file to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method for a shp line-surface graph layer data hierarchy. The encryption and decryption method comprises the following processes: (1) a step-by-step encryption and storage process aiming at line-surface graph layer data, wherein the step-by-step encryption and storage process comprises the steps of generation of all-grade secret keys, monotonicity segmentation, building of an LOD model, step-by-step encryption and grading storage; and (2) a step-by-step decryption and display process aiming at the line-surface graph layer data, wherein the step-by-step decryption and display process comprises the steps of generation of decryption key, step-by-step decryption, and level display. By utilizing the method, the speed and safety of vector data transmission can be effectively taken into consideration, and effective technological means for safety access and effective transmission of mass geographic space data are provided.

Description

technical field [0001] The invention discloses a data level encryption and decryption method of a shp line surface layer that can be used for gradual transmission and data security level scheduling, and can realize efficient and fast transmission and safe access of GIS vector data in the field of geographic information systems. Background technique [0002] GIS vector data has a wide range of applications due to its incomparable advantages such as high precision, massive volume, easy storage, automatic processing, and non-destructive zooming, which cannot be compared with traditional paper maps. However, the digitally stored GIS vector data can easily be tampered with, causing serious consequences. To this end, it is necessary to find a technology and method for efficient transmission and safe access of massive data, and the integration of chaotic sequence cryptography and LOD technology provides the possibility to solve this problem. [0003] Sequential ciphers have the ad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62H04L9/00
Inventor 周卫王海荣李安波
Owner NANJING NORMAL UNIVERSITY