CN106156640A - Information O&M service knowledge sharing method based on big data trust computing - Google Patents

Information O&M service knowledge sharing method based on big data trust computing Download PDF

Info

Publication number
CN106156640A
CN106156640A CN201610525152.2A CN201610525152A CN106156640A CN 106156640 A CN106156640 A CN 106156640A CN 201610525152 A CN201610525152 A CN 201610525152A CN 106156640 A CN106156640 A CN 106156640A
Authority
CN
China
Prior art keywords
information
knowledge
attribute
user
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610525152.2A
Other languages
Chinese (zh)
Other versions
CN106156640B (en
Inventor
陈祖斌
谢铭
胡继军
翁小云
袁勇
邓戈锋
莫英红
谢菁
张鹏
唐玲丽
黄连月
陈勇銘
贺冠博
苏宇琦
林孔升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Isomorphism Mdt Infotech Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610525152.2A priority Critical patent/CN106156640B/en
Publication of CN106156640A publication Critical patent/CN106156640A/en
Application granted granted Critical
Publication of CN106156640B publication Critical patent/CN106156640B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/061Improving I/O performance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides information O&M service knowledge sharing method based on big data trust computing; the method is to have a kind of reliability assessment mechanism of structure in the feature base such as protecting function, certification and integrity measurement and trusted relationships pass through mechanism, accessing and credible evaluation including the storage of information O&M knowledge security, information O&M knowledge security;Described information O&M knowledge security storage comprises the following steps: (1) carries out safety verification to storage user identity;(2) information O&M service knowledge data are carried out pretreatment;(3) encode;(4) hardware store Resource Abstract is concentrated, be mapped to a complete unified resource pool, and operating system of user is virtualized;(5) information O&M service knowledge data are stored in resource pool with the form of final code;Described information O&M knowledge security accesses and comprises the following steps: (1) carries out safety verification to accessing user identity;(2) the information O&M service knowledge data being stored on resource pool are read.The present invention can realize accessible sharing, and decreases EMS memory occupation, improves data call speed, and improves the safety that information O&M service knowledge is shared on the premise of ensureing convenience.

Description

Information O&M service knowledge sharing method based on big data trust computing
Technical field
The present invention relates to Information Sharing Technology field, in particular to information O&M based on big data trust computing Service knowledge sharing method.
Background technology
Information O&M service knowledge sharing method in correlation technique can not realize safely and efficiently depositing of information of sharing Storage and the issue of shared information so that promptness and safety that information O&M service knowledge is shared are poor.
Trust computing is to calculate and trust computing based on hardware security module support under is widely used in communication system Platform, the safety overall to improve system.Information security has four sides: equipment safety, data safety, content safety with Behavior safety.Behavior safety includes: the confidentiality of behavior, the integrity of behavior, the feature such as verity of behavior.Trust computing is Behavior safety and give birth to.
Summary of the invention
It is an object of the invention to provide information O&M service knowledge sharing method based on big data trust computing, to solve The most above-mentioned problem.
The purpose of the present invention realizes by the following technical solutions:
Information O&M service knowledge sharing method based on big data trust computing, it includes that information O&M knowledge security is deposited Storage, information O&M knowledge security access and credible evaluation;
Described information O&M knowledge security storage comprises the following steps:
When Step 101 stores the storage request that user submits O&M information knowledge security service knowledge to, to storage user's body Part carries out safety verification;
Step 102 carries out pretreatment to information O&M service knowledge data, and information O&M service knowledge is divided into basis Knowledge and professional knowledge two types data, described rudimentary knowledge includes the text that can reflect information O&M service basic condition And image, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated information O&M service knowledge data are used custom coding respectively by Step 103 according to classified types Method encodes, and described custom coding method is as follows:
(1) using pretreated information O&M service knowledge data as coded object, if information O&M service knowledge Z bag M the attribute contained is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = Σ j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight wi':
w i ′ = w i Σ i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of information O&M service knowledge data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Information O&M service knowledge data are stored in resource pool by Step 105 with the form of final code;
Described information O&M knowledge security accesses and comprises the following steps:
When Step 201 accesses the access request that user submits O&M information knowledge security service knowledge to, to accessing user's body Part carries out safety verification;
When Step 202 responds access request, read the information O&M service knowledge data being stored on resource pool, specifically For:
(1) K-means clustering method is used all kinds of business in information O&M service knowledge to be divided, to any two Individual class internal information O&M service knowledge Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Inquiry information O&M service knowledge Z1Or Z2, all to information O&M service knowledge Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete information O&M service knowledge positional information is obtained according to cluster index;
(3) according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling.
Preferably, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
Preferably, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request Pond, if incorrect, provides terminal to return error reporting to local service.
Preferably, described credible evaluation comprises the steps of
Step 1: definition is for every credible attribute of assessment, and credible attribute is classification, and credible attribute can be divided downwards Solve as sub-attribute;
Step 2: for each credible attribute or sub-attribute, extract the evaluation index to it, can refer to these evaluations Mark is evaluated from different sides to credible attribute or sub-attribute;
Step 3: for each credible attribute or sub-attribute, define the evaluation criterion to it, evaluation criterion is divided into level Four: Excellent, good, in, poor, evaluation criterion, based on evaluation index, i.e. determines credible genus according to the valued combinations of each evaluation index Which rank of evaluation criterion property or sub-attribute have reached;
Step 4: before carrying out credible evaluation activity, according to the difference of assessment emphasis, forms different credible evaluation template, And it is movable to carry out credible evaluation based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
The present invention can include following beneficial effect:
1, information O&M service knowledge is encoded, facilitate Back ground Information and realize with all kinds of business information accessible common Enjoy;
2, according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling, subtracts Lack EMS memory occupation, improve data call speed;
3, to storage user carry out safety verification time, User Identity and finger print information the most encrypted after transmit, Not havinging plaintext version, knowledge store certification end is just true after verifying the User Identity after encryption and finger print information Whether fixed be that storage user's configuration asks corresponding virtual resource pond with storage, limits the illegal storage of disabled user, and tests Card speed is fast, further increases the safety that information O&M service knowledge is shared on the premise of ensureing convenience;
4, to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all with close Literary composition form is transmitted, and does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, Via the user profile ciphertext of passage transmission, there is unipolarity, even data are intercepted and captured, be intended to it is cracked the most highly difficult, When taking precautions against transmission with this, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increase information O&M service and know Know the safety shared.
5, protect the data storage area specified, prevent opponent from implementing certain types of physical access;Impart all Calculate the code that performs on platform to prove that it is not tampered with in environment, at one, the ability run, from the angle of broad sense, credible Calculating platform is that the network user provides a security context the broadest, and it describes safety from the angle of security system and asks Topic, it is ensured that the secure execution environments of user, breaks through Passive Defence patch installing mode.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, can not be limited this Open.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of the information O&M knowledge security storage of the present invention;
Fig. 2 is the method flow diagram of the information O&M knowledge security access of the present invention
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the present invention Example, and for explaining the principle of the present invention together with description.
Detailed description of the invention
Below by specific embodiment and combine accompanying drawing the present invention is described in further detail.
Embodiment 1
See Fig. 1, Fig. 2, the present embodiment information based on big data trust computing O&M service knowledge sharing method, including The storage of information O&M knowledge security, information O&M knowledge security access and credible evaluation;
Described information O&M knowledge security storage comprises the following steps:
When Step 101 stores the storage request that user submits O&M information knowledge security service knowledge to, to storage user's body Part carries out safety verification;
Step 102 carries out pretreatment to information O&M service knowledge data, and information O&M service knowledge is divided into basis Knowledge and professional knowledge two types data, described rudimentary knowledge includes the text that can reflect information O&M service basic condition And image, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated information O&M service knowledge data are used custom coding respectively by Step 103 according to classified types Method encodes;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Information O&M service knowledge data are stored in resource pool by Step 105 with the form of final code;
Described information O&M knowledge security accesses and comprises the following steps:
When Step 201 accesses the access request that user submits O&M information knowledge security service knowledge to, to accessing user's body Part carries out safety verification;
When Step 202 responds access request, read the information O&M service knowledge data being stored on resource pool, specifically For:
(1) K-means clustering method is used all kinds of business in information O&M service knowledge to be divided, to any two Individual class internal information O&M service knowledge Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Inquiry information O&M service knowledge Z1Or Z2, all to information O&M service knowledge Z1And Z2Prefetch;
(2) concrete information O&M service knowledge positional information is obtained according to cluster index;
(3) according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling.
Preferably, described credible evaluation comprises the steps of
Step 1: definition is for every credible attribute of assessment, and credible attribute is classification, and credible attribute can be divided downwards Solve as sub-attribute;
Step 2: for each credible attribute or sub-attribute, extract the evaluation index to it, can refer to these evaluations Mark is evaluated from different sides to credible attribute or sub-attribute;
Step 3: for each credible attribute or sub-attribute, define the evaluation criterion to it, evaluation criterion is divided into level Four: Excellent, good, in, poor, evaluation criterion, based on evaluation index, i.e. determines credible genus according to the valued combinations of each evaluation index Which rank of evaluation criterion property or sub-attribute have reached;
Step 4: before carrying out credible evaluation activity, according to the difference of assessment emphasis, forms different credible evaluation template, And it is movable to carry out credible evaluation based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
Information O&M service knowledge is encoded by the present embodiment, facilitates Back ground Information and realizes nothing with all kinds of business information Obstacle is shared;According to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling, subtracts Lack EMS memory occupation, improve data call speed;Protect the data storage area specified, prevent opponent from implementing certain types of Physical access;Impart all codes performed on calculating platform to prove that it is at an energy being not tampered with in environment operation Power, from the angle of broad sense, credible calculating platform is that the network user provides a security context the broadest, and it is from safety body The angle of system describes safety problem, it is ensured that the secure execution environments of user, breaks through Passive Defence patch installing mode.
Embodiment 2
See Fig. 1, Fig. 2, the present embodiment information based on big data trust computing O&M service knowledge sharing method, including The storage of information O&M knowledge security, information O&M knowledge security access and credible evaluation;
Described information O&M knowledge security storage comprises the following steps:
When Step 101 stores the storage request that user submits O&M information knowledge security service knowledge to, to storage user's body Part carries out safety verification;
Step 102 carries out pretreatment to information O&M service knowledge data, and information O&M service knowledge is divided into basis Knowledge and professional knowledge two types data, described rudimentary knowledge includes the text that can reflect information O&M service basic condition And image, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated information O&M service knowledge data are used custom coding respectively by Step 103 according to classified types Method encodes;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Information O&M service knowledge data are stored in resource pool by Step 105 with the form of final code;
Described information O&M knowledge security accesses and comprises the following steps:
When Step 201 accesses the access request that user submits O&M information knowledge security service knowledge to, to accessing user's body Part carries out safety verification;
When Step 202 responds access request, read the information O&M service knowledge data being stored on resource pool, specifically For:
(1) K-means clustering method is used all kinds of business in information O&M service knowledge to be divided, to any two Individual class internal information O&M service knowledge Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Inquiry information O&M service knowledge Z1Or Z2, all to information O&M service knowledge Z1And Z2Prefetch;
(2) concrete information O&M service knowledge positional information is obtained according to cluster index;
(3) according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling.
Wherein, the custom coding method of the present embodiment is as follows:
(1) using pretreated information O&M service knowledge data as coded object, if information O&M service knowledge Z bag M the attribute contained is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight wi':
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of information O&M service knowledge data;
Preferably, described credible evaluation comprises the steps of
Step 1: definition is for every credible attribute of assessment, and credible attribute is classification, and credible attribute can be divided downwards Solve as sub-attribute;
Step 2: for each credible attribute or sub-attribute, extract the evaluation index to it, can refer to these evaluations Mark is evaluated from different sides to credible attribute or sub-attribute;
Step 3: for each credible attribute or sub-attribute, define the evaluation criterion to it, evaluation criterion is divided into level Four: Excellent, good, in, poor, evaluation criterion, based on evaluation index, i.e. determines credible genus according to the valued combinations of each evaluation index Which rank of evaluation criterion property or sub-attribute have reached;
Step 4: before carrying out credible evaluation activity, according to the difference of assessment emphasis, forms different credible evaluation template, And it is movable to carry out credible evaluation based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
Information O&M service knowledge is encoded by the present embodiment, facilitates Back ground Information and realizes nothing with all kinds of business information Obstacle is shared;According to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling, subtracts Having lacked EMS memory occupation, improve data call speed, the present embodiment sets threshold value T2Value be m/2, data call speed carries High by 0.5%;Protect the data storage area specified, prevent opponent from implementing certain types of physical access;Impart all Calculate the code that performs on platform to prove that it is not tampered with in environment, at one, the ability run, from the angle of broad sense, credible Calculating platform is that the network user provides a security context the broadest, and it describes safety from the angle of security system and asks Topic, it is ensured that the secure execution environments of user, breaks through Passive Defence patch installing mode.
Embodiment 3
See Fig. 1, Fig. 2, the present embodiment information based on big data trust computing O&M service knowledge sharing method, including The storage of information O&M knowledge security, information O&M knowledge security access and credible evaluation;
Described information O&M knowledge security storage comprises the following steps:
When Step 101 stores the storage request that user submits O&M information knowledge security service knowledge to, to storage user's body Part carries out safety verification;
Step 102 carries out pretreatment to information O&M service knowledge data, and information O&M service knowledge is divided into basis Knowledge and professional knowledge two types data, described rudimentary knowledge includes the text that can reflect information O&M service basic condition And image, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated information O&M service knowledge data are used custom coding respectively by Step 103 according to classified types Method encodes, and described custom coding method is as follows:
(1) using pretreated information O&M service knowledge data as coded object, if information O&M service knowledge Z bag M the attribute contained is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight wi':
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of information O&M service knowledge data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Information O&M service knowledge data are stored in resource pool by Step 105 with the form of final code;
Described information O&M knowledge security accesses and comprises the following steps:
When Step 201 accesses the access request that user submits O&M information knowledge security service knowledge to, to accessing user's body Part carries out safety verification;
When Step 202 responds access request, read the information O&M service knowledge data being stored on resource pool, specifically For:
(1) K-means clustering method is used all kinds of business in information O&M service knowledge to be divided, to any two Individual class internal information O&M service knowledge Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Inquiry information O&M service knowledge Z1Or Z2, all to information O&M service knowledge Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete information O&M service knowledge positional information is obtained according to cluster index;
(3) according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
Preferably, described credible evaluation comprises the steps of
Step 1: definition is for every credible attribute of assessment, and credible attribute is classification, and credible attribute can be divided downwards Solve as sub-attribute;
Step 2: for each credible attribute or sub-attribute, extract the evaluation index to it, can refer to these evaluations Mark is evaluated from different sides to credible attribute or sub-attribute;
Step 3: for each credible attribute or sub-attribute, define the evaluation criterion to it, evaluation criterion is divided into level Four: Excellent, good, in, poor, evaluation criterion, based on evaluation index, i.e. determines credible genus according to the valued combinations of each evaluation index Which rank of evaluation criterion property or sub-attribute have reached;
Step 4: before carrying out credible evaluation activity, according to the difference of assessment emphasis, forms different credible evaluation template, And it is movable to carry out credible evaluation based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
The present embodiment to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number All transmit with ciphertext form, do not have plaintext version;Meanwhile, according to symmetry and the one-way hash function of user key Feature, has unipolarity via the user profile ciphertext of passage transmission, even data are intercepted and captured, is intended to crack it the most very Difficulty, when taking precautions against transmission with this, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases information O&M clothes The safety of business knowledge sharing;Information O&M service knowledge is encoded, facilitates Back ground Information real with all kinds of business information Existing accessible shared;According to cluster result and information O&M service knowledge positional information, information O&M service knowledge is adjusted Degree, decreases EMS memory occupation, improves data call speed, and the present embodiment sets threshold value T2Value be 9m/16, data call Speed improves 0.7%;Protect the data storage area specified, prevent opponent from implementing certain types of physical access;Impart All calculating the codes that perform on platform to prove that it is not tampered with in environment, at one, the ability run, from the angle of broad sense Degree, credible calculating platform is that the network user provides a security context the broadest, and it is retouched from the angle of security system State safety problem, it is ensured that the secure execution environments of user, break through Passive Defence patch installing mode.
Embodiment 4
See Fig. 1, Fig. 2, the present embodiment information based on big data trust computing O&M service knowledge sharing method, including The storage of information O&M knowledge security, information O&M knowledge security access and credible evaluation;
Described information O&M knowledge security storage comprises the following steps:
When Step 101 stores the storage request that user submits O&M information knowledge security service knowledge to, to storage user's body Part carries out safety verification;
Step 102 carries out pretreatment to information O&M service knowledge data, and information O&M service knowledge is divided into basis Knowledge and professional knowledge two types data, described rudimentary knowledge includes the text that can reflect information O&M service basic condition And image, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated information O&M service knowledge data are used custom coding respectively by Step 103 according to classified types Method encodes, and described custom coding method is as follows:
(1) using pretreated information O&M service knowledge data as coded object, if information O&M service knowledge Z bag M the attribute contained is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight wi':
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of information O&M service knowledge data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Information O&M service knowledge data are stored in resource pool by Step 105 with the form of final code;
Described information O&M knowledge security accesses and comprises the following steps:
When Step 201 accesses the access request that user submits O&M information knowledge security service knowledge to, to accessing user's body Part carries out safety verification;
When Step 202 responds access request, read the information O&M service knowledge data being stored on resource pool, specifically For:
(1) K-means clustering method is used all kinds of business in information O&M service knowledge to be divided, to any two Individual class internal information O&M service knowledge Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Inquiry information O&M service knowledge Z1Or Z2, all to information O&M service knowledge Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete information O&M service knowledge positional information is obtained according to cluster index;
(3) according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
Wherein, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request Pond, if incorrect, provides terminal to return error reporting to local service.
Preferably, described credible evaluation comprises the steps of
Step 1: definition is for every credible attribute of assessment, and credible attribute is classification, and credible attribute can be divided downwards Solve as sub-attribute;
Step 2: for each credible attribute or sub-attribute, extract the evaluation index to it, can refer to these evaluations Mark is evaluated from different sides to credible attribute or sub-attribute;
Step 3: for each credible attribute or sub-attribute, define the evaluation criterion to it, evaluation criterion is divided into level Four: Excellent, good, in, poor, evaluation criterion, based on evaluation index, i.e. determines credible genus according to the valued combinations of each evaluation index Which rank of evaluation criterion property or sub-attribute have reached;
Step 4: before carrying out credible evaluation activity, according to the difference of assessment emphasis, forms different credible evaluation template, And it is movable to carry out credible evaluation based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
The present embodiment to storage user carry out safety verification time, User Identity and finger print information the most encrypted after carry out Transmission, does not haves plaintext version, and the User Identity after encryption and finger print information are verified by knowledge store certification end Rear just determine whether to ask corresponding virtual resource pond for storage user's configuration with storage, limit illegally depositing of disabled user Storage, and verifying speed is fast, further increases the safety that information O&M service knowledge is shared on the premise of ensureing convenience, And to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all entered with ciphertext form Row transmission, does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, via passage The user profile ciphertext of transmission has unipolarity, even data are intercepted and captured, is intended to crack it the most highly difficult, takes precautions against with this During transmission, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases what information O&M service knowledge was shared Safety;Information O&M service knowledge is encoded, facilitates Back ground Information and realize accessible sharing with all kinds of business information; According to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling, decreases internal memory and account for With, improve data call speed, the present embodiment sets threshold value T2Value be 5m/8, data call speed improves 0.9%; Protect the data storage area specified, prevent opponent from implementing certain types of physical access;Impart all calculating on platform Perform code with prove it one be not tampered with in environment run ability, from the angle of broad sense, credible calculating platform is The network user provides a security context the broadest, and it describes safety problem from the angle of security system, it is ensured that use The secure execution environments at family, breaks through Passive Defence patch installing mode.
Embodiment 5
See Fig. 1, Fig. 2, the present embodiment information based on big data trust computing O&M service knowledge sharing method, including The storage of information O&M knowledge security, information O&M knowledge security access and credible evaluation;
Described information O&M knowledge security storage comprises the following steps:
When Step 101 stores the storage request that user submits O&M information knowledge security service knowledge to, to storage user's body Part carries out safety verification;
Step 102 carries out pretreatment to information O&M service knowledge data, and information O&M service knowledge is divided into basis Knowledge and professional knowledge two types data, described rudimentary knowledge includes the text that can reflect information O&M service basic condition And image, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated information O&M service knowledge data are used custom coding respectively by Step 103 according to classified types Method encodes, and described custom coding method is as follows:
(1) using pretreated information O&M service knowledge data as coded object, if information O&M service knowledge Z bag M the attribute contained is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight because of Submatrix W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition RnDegree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight wi':
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of information O&M service knowledge data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and user is grasped Make system virtualization;
Information O&M service knowledge data are stored in resource pool by Step 105 with the form of final code;
Described information O&M knowledge security accesses and comprises the following steps:
When Step 201 accesses the access request that user submits O&M information knowledge security service knowledge to, to accessing user's body Part carries out safety verification;
When Step 202 responds access request, read the information O&M service knowledge data being stored on resource pool, specifically For:
(1) K-means clustering method is used all kinds of business in information O&M service knowledge to be divided, to any two Individual class internal information O&M service knowledge Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter look into Inquiry information O&M service knowledge Z1Or Z2, all to information O&M service knowledge Z1And Z2Prefetch, wherein threshold value T2Value Scope is [m/2,3m/4];
(2) concrete information O&M service knowledge positional information is obtained according to cluster index;
(3) according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling.
Wherein, described to access user identity carry out safety verification, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if Correctly, access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge clothes Business device certification end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password of user's input ciphertext The ciphertext of password and identity is decrypted calculating, extracts password code and the value of identity accessing user's input, so After find identity relative recording that password is decrypted calculating in authentication database, if system exist this access user Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will simultaneously Fingerprint collecting instruction, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, knowledge Server authentication end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification in system Hold and provide terminal to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption are received when resource request user side After session random number, verify that this session key and an encryption session random number are the most correct, if correctly, send out to accessing user Go out finger print information input instruction, this session key and encryption session random number are decrypted calculating, simultaneously by identity It is sent to knowledge services device certification end after being encrypted with the finger print information of input;If it is incorrect, to knowledge services device certification end Send illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, after encryption The finger print information of identity and input be decrypted calculating, and the fingerprint that would correspond to identity extracts in data base Out the finger print information with input compares, if the two is identical, then responds access request, if the two differs, returns illegal Report.
Wherein, described to storage user identity carry out safety verification, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user will be stored defeated The fingerprint entered and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, And the fingerprint that would correspond to identity extracts in data base and compares with the fingerprint storing user's input, if the two Identical, it is determined that this storage user is legal storage user, for the virtual resource that legal storage user's configuration is corresponding with storage request Pond, if incorrect, provides terminal to return error reporting to local service.
Preferably, described credible evaluation comprises the steps of
Step 1: definition is for every credible attribute of assessment, and credible attribute is classification, and credible attribute can be divided downwards Solve as sub-attribute;
Step 2: for each credible attribute or sub-attribute, extract the evaluation index to it, can refer to these evaluations Mark is evaluated from different sides to credible attribute or sub-attribute;
Step 3: for each credible attribute or sub-attribute, define the evaluation criterion to it, evaluation criterion is divided into level Four: Excellent, good, in, poor, evaluation criterion, based on evaluation index, i.e. determines credible genus according to the valued combinations of each evaluation index Which rank of evaluation criterion property or sub-attribute have reached;
Step 4: before carrying out credible evaluation activity, according to the difference of assessment emphasis, forms different credible evaluation template, And it is movable to carry out credible evaluation based on this template, so that credible evaluation is more targeted, the result of assessment is more accurate.
The present embodiment to storage user carry out safety verification time, User Identity and finger print information the most encrypted after carry out Transmission, does not haves plaintext version, and the User Identity after encryption and finger print information are verified by knowledge store certification end Rear just determine whether to ask corresponding virtual resource pond for storage user's configuration with storage, limit illegally depositing of disabled user Storage, and verifying speed is fast, further increases the safety that information O&M service knowledge is shared on the premise of ensureing convenience, And to access user carry out safety verification time, the information such as user name, password, fingerprint and session random number is all entered with ciphertext form Row transmission, does not haves plaintext version;Meanwhile, according to symmetry and the one-way hash function feature of user key, via passage The user profile ciphertext of transmission has unipolarity, even data are intercepted and captured, is intended to crack it the most highly difficult, takes precautions against with this During transmission, user data is divulged a secret, and privacy of user can obtain guarantee, thus further increases what information O&M service knowledge was shared Safety;Information O&M service knowledge is encoded, facilitates Back ground Information and realize accessible sharing with all kinds of business information; According to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling, decreases internal memory and account for With, improve data call speed, the present embodiment sets threshold value T2Value be 11m/16, data call speed improves 1.2%;Protect the data storage area specified, prevent opponent from implementing certain types of physical access;Impart all calculating On platform perform code with prove it one be not tampered with in environment run ability, from the angle of broad sense, trust computing Platform is that the network user provides a security context the broadest, and it describes safety problem from the angle of security system, Guarantee the secure execution environments of user, break through Passive Defence patch installing mode.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made any repaiies Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (4)

1. information O&M service knowledge sharing method based on big data trust computing, it is characterised in that include that information O&M is known Know credible and secure storage, the credible and secure access of information O&M knowledge and credible evaluation;
The described information credible and secure storage of O&M knowledge comprises the following steps:
When Step 101 stores the storage request that user submits O&M information knowledge security service knowledge to, storage user identity is entered The credible and secure checking of row;
Step 102 carries out pretreatment to information O&M service knowledge data, and information O&M service knowledge is divided into rudimentary knowledge With professional knowledge two types data, described rudimentary knowledge includes text and the figure that can reflect information O&M service basic condition Picture, described professional knowledge includes the text relevant to each business in the service of information O&M and image;
Pretreated information O&M service knowledge data are used custom coding method respectively by Step 103 according to classified types Encoding, described custom coding method is as follows:
(1) using pretreated information O&M service knowledge data as coded object, if what information O&M service knowledge Z comprised M attribute is S1,S2,…,Sm
(2) attribute of coded object is chosen, particularly as follows:
1) n constraints of attribute is set as R1,R2,…,Rn, according to attribute and constraints thereof, obtain attribute weight factor square Battle array W:
In formula, aijFor weight factor, wherein, i=1,2 ..., m, j=1,2 ..., n, represent attribute SmMeet restriction condition Rn's Degree, span is [0,1];
2) defined attribute weight wi:
w i = &Sigma; j = 1 n a i j
Attribute weight is normalized and obtains normalization attribute weight w 'i:
w i &prime; = w i &Sigma; i = 1 m w i
3) attribute weight threshold value T is set1, defined attribute Selection of Function Xi:
X i = 1 , w i &prime; &GreaterEqual; T 1 0 , w i &prime; < T 1
4) set up attribute and choose Optimized model:
Z = &Sigma; i = 1 m S i X i
5) choose Optimized model according to attribute, the attribute of coded object is optimized and chooses;
(3) attribute of optimum option is encoded, obtain the final code of information O&M service knowledge data;
Hardware store Resource Abstract is concentrated by Step 104, is mapped to a complete unified resource pool, and by user operation system System virtualization;
Information O&M service knowledge data are stored in resource pool by Step 105 with the form of final code;
The described information credible and secure access of O&M knowledge comprises the following steps:
When Step 201 accesses the access request that user submits O&M information knowledge security service knowledge to, enter accessing user identity Row safety verification;
When Step 202 responds access request, read the information O&M service knowledge data being stored on resource pool, particularly as follows:
(1) K-means clustering method is used all kinds of business in information O&M service knowledge to be divided, to any two class Internal information O&M service knowledge Z1And Z2, definition distance function D:
D(Z1,Z2)=Y
In formula, Y represents Z1And Z2The number that the attribute of optimum option is identical, sets threshold value T2If, D >=T2, the most no matter Query Information O&M service knowledge Z1Or Z2, all to information O&M service knowledge Z1And Z2Prefetch, wherein threshold value T2Span be [m/2,3m/4];
(2) concrete information O&M service knowledge positional information is obtained according to cluster index;
(3) according to cluster result and information O&M service knowledge positional information, information O&M service knowledge is scheduling.
Information O&M service knowledge sharing method based on big data trust computing the most according to claim 1, its feature Be, described to access user identity carry out credible and secure checking, particularly as follows:
(1) provide the password code of terminal authentication access user's input and identity the most correct in local service, if correctly, Access request, password code and identity are encrypted, form ciphertext collection, and ciphertext collection is sent to knowledge services device recognizes Card end, if incorrect, returns error reporting;
(2), after knowledge services device certification end receives described ciphertext collection, correspondence is concentrated to access the password code of user's input ciphertext It is decrypted calculating with the ciphertext of identity, extracts password code and the value of identity accessing user's input, then exist Find identity relative recording that password is decrypted calculating in authentication database, if system exists this accesses user's note Record, and the password decrypted is consistent with the password code that family inputs, then judge that described access user, as validated user, will refer to simultaneously Stricture of vagina acquisition instructions, ciphertext collection, this session key and an encryption session random number are sent to knowledge request user side, and knowledge takes Business device certification end preserves identity and association key simultaneously;If there is not this user record, knowledge services device certification end in system Terminal is provided to return error reporting to local service;
(3) instruction of described fingerprint collecting, ciphertext collection, this session key and an encryption session are received when resource request user side After random number, verify that this session key and an encryption session random number are the most correct, if correctly, send finger to accessing user The input instruction of stricture of vagina information, is decrypted calculating, simultaneously by identity with defeated to this session key and encryption session random number The finger print information entered is sent to knowledge services device certification end after being encrypted;If incorrect, send to knowledge services device certification end Illegal report;
(4) during the finger print information of the identity after knowledge services device certification end receives encryption and input, to the body after encryption Part mark is decrypted calculating with the finger print information of input, and the fingerprint that would correspond to identity extracts in data base Compare with the finger print information of input, if the two is identical, then respond access request, if the two differs, return illegal report.
Information O&M service knowledge sharing method based on big data trust computing the most according to claim 1, its feature Be, described to storage user identity carry out credible and secure checking, particularly as follows:
(1), when local service provides terminal to receive fingerprint and the identity storing user's input, user's input will be stored Fingerprint and identity are sent to knowledge store certification end after being encrypted;
(2) knowledge store certification end is decrypted calculating to fingerprint and the identity of the storage user's input after encryption, and will Extract in data base corresponding to the fingerprint of identity and compare with the fingerprint storing user's input, if the two phase With, it is determined that this storage user is legal storage user, configures the virtual resource pond corresponding with storage request for legal storage user, If incorrect, terminal is provided to return error reporting to local service.
Information O&M service knowledge sharing method based on big data trust computing the most according to claim 1, its feature Being, described credible evaluation comprises the steps of
Step 1: definition is for every credible attribute of assessment, and credible attribute is classification, and credible attribute can be decomposed into downwards Sub-attribute;
Step 2: for each credible attribute or sub-attribute, extract the evaluation index to it, can with these evaluation indexes from Credible attribute or sub-attribute are evaluated by different sides;
Step 3: for each credible attribute or sub-attribute, define the evaluation criterion to it, evaluation criterion is divided into level Four: excellent, Good, in, poor, evaluation criterion, based on evaluation index, i.e. determines credible attribute according to the valued combinations of each evaluation index Or which rank of evaluation criterion sub-attribute has reached;
Step 4: before carrying out credible evaluation activity, according to the difference of assessment emphasis, forms different credible evaluation template, and base Carrying out credible evaluation in this template movable, so that credible evaluation is more targeted, the result of assessment is more accurate.
CN201610525152.2A 2016-07-01 2016-07-01 Information O&M service knowledge sharing method based on big data trust computing Active CN106156640B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610525152.2A CN106156640B (en) 2016-07-01 2016-07-01 Information O&M service knowledge sharing method based on big data trust computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610525152.2A CN106156640B (en) 2016-07-01 2016-07-01 Information O&M service knowledge sharing method based on big data trust computing

Publications (2)

Publication Number Publication Date
CN106156640A true CN106156640A (en) 2016-11-23
CN106156640B CN106156640B (en) 2017-09-29

Family

ID=58061266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610525152.2A Active CN106156640B (en) 2016-07-01 2016-07-01 Information O&M service knowledge sharing method based on big data trust computing

Country Status (1)

Country Link
CN (1) CN106156640B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107994990A (en) * 2017-11-28 2018-05-04 江苏信源久安信息科技有限公司 A kind of trusted identity secure coding method of thing
CN111291429A (en) * 2020-01-21 2020-06-16 李岗 Data protection method and system
CN113844817A (en) * 2021-11-01 2021-12-28 江苏昱博自动化设备有限公司 Linear positioning transfer robot for storage and transfer and control method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419832A (en) * 2010-09-28 2012-04-18 上海可鲁***软件有限公司 Method and system for locating resource in distributed environment
CN103970842A (en) * 2014-04-24 2014-08-06 河海大学 Water conservancy big data access system and method for field of flood control and disaster reduction
US20140280257A1 (en) * 2013-03-15 2014-09-18 Konstantinos (Constantin) F. Aliferis Data Analysis Computer System and Method For Parallelized and Modularized Analysis of Big Data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419832A (en) * 2010-09-28 2012-04-18 上海可鲁***软件有限公司 Method and system for locating resource in distributed environment
US20140280257A1 (en) * 2013-03-15 2014-09-18 Konstantinos (Constantin) F. Aliferis Data Analysis Computer System and Method For Parallelized and Modularized Analysis of Big Data
CN103970842A (en) * 2014-04-24 2014-08-06 河海大学 Water conservancy big data access system and method for field of flood control and disaster reduction

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107994990A (en) * 2017-11-28 2018-05-04 江苏信源久安信息科技有限公司 A kind of trusted identity secure coding method of thing
CN107994990B (en) * 2017-11-28 2023-08-22 江苏信源久安信息科技有限公司 Trusted identity security coding method for object
CN111291429A (en) * 2020-01-21 2020-06-16 李岗 Data protection method and system
CN111291429B (en) * 2020-01-21 2023-04-25 李岗 Data protection method and system
CN113844817A (en) * 2021-11-01 2021-12-28 江苏昱博自动化设备有限公司 Linear positioning transfer robot for storage and transfer and control method
CN113844817B (en) * 2021-11-01 2023-09-26 江苏昱博自动化设备有限公司 Linear positioning transfer robot for warehouse transfer and control method

Also Published As

Publication number Publication date
CN106156640B (en) 2017-09-29

Similar Documents

Publication Publication Date Title
Campisi Security and privacy in biometrics: towards a holistic approach
CN110046482A (en) Identity verification method and its system
CN112182519B (en) Computer storage system security access method and access system
CN106096061A (en) A kind of environmental monitoring information data sharing method
US20080120698A1 (en) Systems and methods for authenticating a device
US20080120707A1 (en) Systems and methods for authenticating a device by a centralized data server
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN106131010A (en) A kind of electric network data sharing method
CN109768983A (en) Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain
US20210099304A1 (en) Composite identity authentication method and composite identity authentication system using same
CN105978855B (en) Personal information safety protection system and method under a kind of system of real name
CN109802942A (en) A kind of voiceprint authentication method and system, mobile terminal of secret protection
CN109918881A (en) The online face authentication method and system of secret protection, intelligent movable equipment
CN106202415A (en) A kind of earth geography information data sharing method
CN106156640A (en) Information O&amp;M service knowledge sharing method based on big data trust computing
CN100412840C (en) User identification with improved password input method
CN106056005A (en) Method for sharing satellite information data
CN108989038A (en) It is a kind of for the identification equipment of geographic position authentication, system and method
CN106203166A (en) A kind of auto navigation information data sharing method
CN113010909A (en) Data security classification method and device for scientific data sharing platform
CN113271591B (en) Two-standard four-real data encryption interaction method and device based on 5G slice network
CN106130737A (en) A kind of road congestion information data sharing method
CN106209846A (en) A kind of weather information data sharing method
Lourinho et al. Securing the digital witness identity using blockchain and zero-knowledge proofs
Martin et al. Security and privacy impacts of a unique personal identifier

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Chen Zubin

Inventor after: Tang Lingli

Inventor after: Huang Lianyue

Inventor after: Chen Yongming

Inventor after: He Guanbo

Inventor after: Su Yuqi

Inventor after: Lin Kongsheng

Inventor after: He Zhongzhu

Inventor after: Xie Ming

Inventor after: Hu Jijun

Inventor after: Weng Xiaoyun

Inventor after: Yuan Yong

Inventor after: Deng Gefeng

Inventor after: Mo Yinghong

Inventor after: Xie Jing

Inventor after: Zhang Peng

Inventor before: Chen Zubin

Inventor before: Tang Lingli

Inventor before: Huang Lianyue

Inventor before: Chen Yongming

Inventor before: He Guanbo

Inventor before: Su Yuqi

Inventor before: Lin Kongsheng

Inventor before: Xie Ming

Inventor before: Hu Jijun

Inventor before: Weng Xiaoyun

Inventor before: Yuan Yong

Inventor before: Deng Gefeng

Inventor before: Mo Yinghong

Inventor before: Xie Jing

Inventor before: Zhang Peng

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20170217

Address after: 530000 Xingning, Nanning District, democratic road, No. 6,

Applicant after: GUANGXI POWER GRID CO., LTD.

Address before: 530000 Xingning, Nanning District, democratic road, No. 6,

Applicant before: He Zhongzhu

CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Ou Hao

Inventor after: Li Xiaohua

Inventor after: Liu Shuiping

Inventor before: Chen Zubin

Inventor before: Tang Lingli

Inventor before: Huang Lianyue

Inventor before: Chen Yongming

Inventor before: He Guanbo

Inventor before: Su Yuqi

Inventor before: Lin Kongsheng

Inventor before: He Zhongzhu

Inventor before: Xie Ming

Inventor before: Hu Jijun

Inventor before: Weng Xiaoyun

Inventor before: Yuan Yong

Inventor before: Deng Gefeng

Inventor before: Mo Yinghong

Inventor before: Xie Jing

Inventor before: Zhang Peng

TA01 Transfer of patent application right

Effective date of registration: 20170901

Address after: 510000 room 15, 203 Cheng Cheng Road, Guangzhou, Guangdong, Tianhe District

Applicant after: Guangzhou isomorphism Mdt InfoTech Ltd

Address before: 530000 Xingning, Nanning District, democratic road, No. 6,

Applicant before: GUANGXI POWER GRID CO., LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Knowledge sharing method of information operation and maintenance service based on big data trusted computing

Effective date of registration: 20200910

Granted publication date: 20170929

Pledgee: Bank of China Limited by Share Ltd. Guangzhou Tianhe branch

Pledgor: Guangzhou isomorphism Mdt InfoTech Ltd.

Registration number: Y2020440000260

PE01 Entry into force of the registration of the contract for pledge of patent right
CP02 Change in the address of a patent holder

Address after: 510000 room 611, 1933 Huaguan Road, Tianhe District, Guangzhou City, Guangdong Province (office only)

Patentee after: Guangzhou isomorphism Mdt InfoTech Ltd.

Address before: 510000 Room 203, 15 Sicheng Road, Tianhe District, Guangzhou City, Guangdong Province

Patentee before: Guangzhou isomorphism Mdt InfoTech Ltd.

CP02 Change in the address of a patent holder