Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe distributed database interaction method suitable for mobile positioning system

A technology of mobile positioning and interaction method, applied in the field of computer network communication and distributed database, which can solve the problems of low efficiency, inability to realize one-time pad, no identity authentication, etc.

Active Publication Date: 2019-07-09
SOUTHEAST UNIV
View PDF13 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] In order to solve the above problems, the present invention provides a safe distributed database interaction method suitable for mobile positioning systems, which encrypts the transmitted data by designing an improved SM4 algorithm; for the database without read-write separation and low efficiency, a statistically-based The read-write separation algorithm efficiently reads and writes the database; in view of the interaction between databases without identity authentication and the inability to realize one-time encryption, a key exchange protocol based on pre-shared keys is designed, so that each session communication uses a session key Encryption; To solve the problem that localization processing cannot be realized, a temporary table is established to realize localization processing for non-local users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe distributed database interaction method suitable for mobile positioning system
  • Safe distributed database interaction method suitable for mobile positioning system
  • Safe distributed database interaction method suitable for mobile positioning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described in detail below in conjunction with the drawings and specific embodiments:

[0063] The present invention provides a secure distributed database interaction method suitable for mobile positioning systems. The present invention improves the SM4 encryption algorithm by designing, adopts a pre-shared key to independently design a key agreement protocol, designs a statistically based read-write separation algorithm and has The data integrity protection model provides a safe distributed database interaction method suitable for mobile positioning systems. This method can be applied to the distributed database of the mobile positioning system. The distributed database is separated from reading and writing, and the interaction between the databases is separated. Encrypt data, provide a one-time encryption standard for encryption, and localize non-local users with a temporary table designed for business, which ensures the efficient rea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure distributed database interaction method suitable for a mobile positioning system. The secure distributed database interaction method comprises seven modules, wherein arest data transceiving and attribution region division module is used for receiving client data and determining an attribution through an improved trie tree algorithm; a read-write separation local database module designs a statistical-based read-write separation algorithm to carry out read-write separation and temporary table establishment; a local key agreement module is used for designing a key agreement protocol on the basis of the pre-shared key and generating a session key; an attribution secret key negotiation module interacts with the local secret key negotiation module to generate asession secret key each time; a local data encryption and decryption and integrity protection module is responsible for encryption and decryption of local interaction data through an improved SM4 encryption algorithm; an attribution data encryption and decryption and integrity protection module is used for realizing encryption and decryption of attribution interaction data by designing and improving an SM4 encryption algorithm; and a read-write separation attribution database module is used for realizing read-write of the attribution database based on a statistical read-write separation algorithm.

Description

Technical field [0001] The present invention relates to the field of computer network communication, information security and distributed database fields, in particular to a safe distributed database interaction method suitable for mobile positioning systems. Background technique [0002] The database used by the mobile positioning system targeted by this application has a common feature with the distributed tracking and positioning systems on the market. It cannot provide security services and cannot guarantee data confidentiality and integrity while ensuring high efficiency. . The distributed database studied in the patent of the invention is connected to the open Internet. Due to the openness of the Internet, various attack behaviors threaten the security of the distributed system database. In recent years, data security issues have frequently occurred. For example, in the Ctrip vulnerability incident in 2014, any third party can traverse and download Ctrip’s secure payment l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L29/06H04L9/32
CPCH04L9/0838H04L9/0643H04L63/123H04L9/3297
Inventor 蒋睿郭学心蒋立霄
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products