Full text search system based on ciphertext

A retrieval system and full-text technology, applied in the field of full-text retrieval systems based on ciphertext, can solve problems such as increased information volume and ciphertext information processing, and achieve the effects of ensuring secure retrieval, strong security, and high execution efficiency

Inactive Publication Date: 2007-03-21
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although full-text retrieval technology and encryption algorithms are very mature and there are good commercial products, how to realize full-text retrieval under the premise of ciphertext is still blank in the field of related research and products at home and abroad.
There are many difficulties in the combination of encryption technology and full-text indexing. First, in order to ensure the security and reliability of index information, the information of index items must be encrypted. After encryption technology processing, the ciphertext information cannot be in the plaintext state. Therefore, the text information processed by the encryption technology cannot be directly combined with the existing full-text search mechanism to realize the ciphertext full-text search
Secondly, existing full-text retrieval systems often build full-text indexes, so the amount of data indexed is often large, and encryption technology will further increase the amount of information. As a practical system, encryption technology is introduced into the full-text retrieval system Efficiency issues must be considered and highly valued

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Full text search system based on ciphertext
  • Full text search system based on ciphertext
  • Full text search system based on ciphertext

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Below in conjunction with accompanying drawing and example the present invention is described in further detail.

[0028] As shown in Figure 1, the function of the system of the present invention can be divided into: build ciphertext index, ciphertext full-text search and background management, this system comprises database 100, login module 200, query module 300, result set processing module 400, electronic document Processing module 500 , index module 600 , audit management module 700 , user management module 800 and authority management module 900 .

[0029] The database 100 is used for storing information on users and user rights.

[0030] The login module 200 is used to receive the service request from the user input information, and verify the service request by interacting with the information of the database 100. If the verification is successful, the user is allowed to enter the system, and at the login module 200, the relevant information of the user in the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Full text index system based on cryptograph relates to data bank, enter module, demand module, result gather dispose module, electronic document dispose module, index module, audit manage module, user manage module and purview manage module. The demand module relates to demand participle module, demand encryption module, logic combination module, demand sub-module, visiting controlled module and result gather dispose module. Result gather dispose module relates to tabloid module and snapshot module. Index module relates to index participle module, index encryption module and index sub-module. The system offers a kind of participle strategy-the Chinese acceptation combines with automatic syncopation, without the position instance for index words in the original text. During the user visiting the document, add visiting domination to restrict user purview and to keep the security of sensitive information. It can realize full text index with cryptograph and keep the security of sensitive information with strong safety and high efficiency.

Description

technical field [0001] The invention belongs to the technical field of computer retrieval, and in particular relates to a ciphertext-based full-text retrieval system. Background technique [0002] The information age has produced a large amount of digital information, among which text information is the most basic and most commonly used storage form. In order to find what they need in the vast amount of text information, people urgently need an efficient retrieval tool. How to efficiently store and query unstructured data such as text is a problem worthy of research. Among them, full-text retrieval technology and full-text database technology have become the research hotspots of domestic and foreign scholars. [0003] Full-text retrieval is a technology that takes text data as the main processing object, based on full-text indexing, and uses natural language for retrieval. In the field of information retrieval, full-text retrieval has always been a relatively complicated p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/00G06F21/62
Inventor 李瑞轩卢正鼎宋伟左翠华张茂元文坤梅何云天万宇涛
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products