[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114531302B - Data encryption method, device and storage medium - Google Patents

Data encryption method, device and storage medium Download PDF

Info

Publication number
CN114531302B
CN114531302B CN202210362172.8A CN202210362172A CN114531302B CN 114531302 B CN114531302 B CN 114531302B CN 202210362172 A CN202210362172 A CN 202210362172A CN 114531302 B CN114531302 B CN 114531302B
Authority
CN
China
Prior art keywords
migration
data
species
target object
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210362172.8A
Other languages
Chinese (zh)
Other versions
CN114531302A (en
Inventor
孙科
王乾
蒋艳军
赵轶新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Publication of CN114531302A publication Critical patent/CN114531302A/en
Application granted granted Critical
Publication of CN114531302B publication Critical patent/CN114531302B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data encryption method, a device and a storage medium, wherein the method comprises the following steps: responding to a service request initiated by a target object to determine the geographic position of the target object; determining species migration data corresponding to the geographic position of the target object, wherein the species migration data is used for indicating a migration rule of a species; generating a key of service data corresponding to the service request of the target object according to the species migration data, and encrypting the service data corresponding to the service request of the target object according to the secret key, by adopting the technical scheme, the problem of lower security when encrypting the data is solved.

Description

Data encryption method, device and storage medium
Technical Field
The present application relates to the field of communications, and in particular, to a data encryption method, apparatus, and storage medium.
Background
The current internet industry has the industrial advantages of large-scale, systemization and continuous high-speed development, along with the continuous development of internet technology, the illegal key decoding technology is iterated rapidly, so that a constant data security policy is decoded continuously, and the problem of user data leakage is caused, therefore, users enjoy the convenience brought by the industrial advantages of the internet industry and simultaneously pay more attention to the security and confidentiality of own information data. Currently, encryption strategies in the industry generally adopt a core encryption algorithm matched with a security key to encrypt data, and the security key is mostly formed by combining characters with special meanings with random character strings, time stamps and the like, or is directly generated by using a key tool. These keys generated by the method of generating the keys are generally used by non-strong secure data encryption algorithms, but because of the availability of the keys, there is a certain security risk, so that the security of the data encryption algorithm using these keys is lower when encrypting the data.
In the related art, security is low when data is encrypted.
Aiming at the problem of lower security when encrypting data in the related art, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a data encryption method, a data encryption device and a storage medium, which are used for at least solving the problem of lower security when encrypting data in the related technology.
According to an embodiment of the present application, there is provided a data encryption method including: responding to a service request initiated by a target object to determine the geographic position of the target object; determining species migration data corresponding to the geographic position of the target object, wherein the species migration data is used for indicating a migration rule of a species; generating a secret key of service data corresponding to the service request of the target object according to the species migration data, and encrypting the service data corresponding to the service request of the target object according to the secret key.
In an exemplary embodiment, determining species migration data corresponding to a geographic location of the target object includes: acquiring a species migration track in a coverage area corresponding to the geographic position of the target object; classifying species migration tracks in a coverage area corresponding to the geographic position according to species types to obtain a plurality of groups of species migration data; wherein any one of the plurality of sets of species migration data includes at least one of: species type, migration longitude, migration latitude, migration altitude, migration country area code, and migration climate.
In an exemplary embodiment, generating a key for service data corresponding to a service request of the target object according to the species migration data includes: determining the security level of service data corresponding to the service request of the target object; according to the security level, a corresponding secret key generation algorithm is matched with the service data, wherein the encryption level of the secret key generation algorithm and the security level are in a corresponding relation; generating a first key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a common security level; generating a second key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a strong security level; wherein the first key string or the second key string is a key of service data corresponding to a service request of the target object.
In one exemplary embodiment, where the encryption level of the key generation algorithm comprises a normal security level, generating a first key string using the key generation algorithm and the species migration data comprises: determining a migration altitude in the species migration data and a migration country area code in the species migration data; the first key string F is determined by the following formula: f=g×a/r 2; wherein G represents a mobile country area code in the species mobile data, a represents a first security string, wherein the first security string is used for indicating an initial security string corresponding to the service data, and r represents a mobile altitude in the species mobile data.
In one exemplary embodiment, where the encryption level of the key generation algorithm comprises a strong security level, generating a second key string using the key generation algorithm and the species migration data comprises: determining a migration altitude in the species migration data, a migration country code in the species migration data, a species type in the species migration data, and a migration climate in the species migration data; determining a random number of the key generation algorithm and determining a time stamp of service data corresponding to the service request of the target object; generating a second security string by using the species type in the species migration data, the migration climate in the species migration data, the random number of the key generation algorithm and the timestamp of the service data corresponding to the service request of the target object; and determining the splicing result of the first key string and the second security string as the second key string.
In an exemplary embodiment, before determining the first key string F, the method further comprises: determining a migration longitude in the species migration data and a migration latitude in the species migration data; the first security string is generated using the migration longitude in the species migration data and the migration latitude in the species migration data.
In one exemplary embodiment, generating the first security string using the migration longitude in the species migration data and the migration latitude in the species migration data comprises: determining a product of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string; or determining a sum of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string; or respectively processing the migration longitude in the species migration data and the migration latitude in the species migration data into at least two encrypted data according to a preset rule; determining a multiplication result corresponding to a non-zero value in each of the at least two encrypted data; and determining the splice result of all the multiplication results as the first safety string.
In one exemplary embodiment, determining a product of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string comprises: obtaining a conversion rule for performing format conversion on migration longitude in the species migration data and migration latitude in the species migration data, wherein the conversion rule comprises a longitude conversion coefficient and a latitude conversion coefficient; determining a first sum value between longitude values corresponding to different longitude units in migration longitude in the species migration data, and determining a second sum value between latitude values corresponding to different latitude units in migration latitude in the species migration data; a third sum of a product between the first sum and the longitude conversion factor and a product between the second sum and the latitude conversion factor is determined as the first security string.
According to another embodiment of the present application, there is also provided a data encryption apparatus including: the first determining module is used for responding to a service request initiated by a target object so as to determine the geographic position of the target object; the second determining module is used for determining species migration data corresponding to the geographic position of the target object, wherein the species migration data is used for indicating the migration rule of the species; and the encryption module is used for generating a secret key of the service data corresponding to the service request of the target object according to the species migration data and encrypting the service data corresponding to the service request of the target object according to the secret key.
According to yet another aspect of the embodiments of the present application, there is also provided a computer-readable storage medium having a computer program stored therein, wherein the computer program is configured to perform the above-described data encryption method when run.
According to still another aspect of the embodiments of the present application, there is further provided an electronic device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the data encryption method described above through the computer program.
In the embodiment of the application, the geographic position of the target object is determined through the service request initiated by the target object, species migration data corresponding to the geographic position of the target object is determined, a key of service data corresponding to the service request of the target object is generated according to the species migration data, and the service data corresponding to the service request of the target object is encrypted according to the key. By adopting the technical scheme, the problem of lower security when encrypting the data is solved, and the security of data encryption is further improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
Fig. 1 is a block diagram of a hardware configuration of a computer terminal of a data encryption method according to an embodiment of the present application;
FIG. 2 is a flow chart of a data encryption method according to an embodiment of the application;
FIG. 3 is a schematic diagram of a key generation flow according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a classification flow of species migration data according to an embodiment of the application;
fig. 5 is a block diagram of a data encryption apparatus according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The method embodiments provided by the embodiments of the present application may be executed in a computer terminal or similar computing device. Taking a computer terminal as an example, fig. 1 is a block diagram of a hardware structure of a computer terminal of a data encryption method according to an embodiment of the present application. As shown in fig. 1, the computer terminal may include one or more (only one is shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA) and a memory 104 for storing data, and in one exemplary embodiment, may also include a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those skilled in the art that the configuration shown in fig. 1 is merely illustrative and is not intended to limit the configuration of the computer terminal described above. For example, a computer terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than the equivalent functions shown in FIG. 1 or more than the functions shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to a data encryption method in an embodiment of the present application, and the processor 102 executes the computer program stored in the memory 104 to perform various functional applications and data processing, that is, implement the above-mentioned method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located relative to the processor 102, which may be connected to the computer terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of a computer terminal. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as a NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
In this embodiment, a data encryption method is provided and applied to the computer terminal, and fig. 2 is a flowchart of the data encryption method according to an embodiment of the present application, where the flowchart includes the following steps:
Step S202, responding to a service request initiated by a target object to determine the geographic position of the target object;
step S204, species migration data corresponding to the geographic position of the target object is determined, wherein the species migration data is used for indicating the migration rule of the species;
It should be noted that the above species migration data may be understood as data of migration behavior of a living organism at a certain distance due to its own cause or environmental cause, and has a periodic rule.
Step S206, generating a key of service data corresponding to the service request of the target object according to the species migration data, and encrypting the service data corresponding to the service request of the target object according to the key.
Through the steps, responding to a service request initiated by a target object to determine the geographic position of the target object; determining species migration data corresponding to the geographic position of the target object, wherein the species migration data is used for indicating a migration rule of a species; according to the species migration data, a secret key of service data corresponding to the service request of the target object is generated, and the service data corresponding to the service request of the target object is encrypted according to the secret key, so that the problem of low security in encrypting the data in the related technology is solved, and the security of data encryption is further improved.
It should be noted that, the service data corresponding to the service request of the target object corresponds to the identity information of the target object, and different security levels of the service data may be determined according to different identity information, for example, in an embodiment, in a case where the identity information of the target object is a member client, the security level of the service data of the member client is determined to be a strong security level; and under the condition that the identity information of the target object is the common client, determining the security level of the service data of the member client as the common security level.
In other embodiments, the service data corresponding to the service request of the target object further corresponds to a data type of the service data, and the security level of the service data may be determined according to the data type of the service data, for example, in one embodiment, in a case where the data type of the service data is privacy data, the security level of the service data of the member client is determined to be a strong security level; and determining the security level of the service data of the member client as the common security level under the condition that the data type of the service data is daily data. The private data may include identity document information, communication information, consumption information, image information and the like of the user, and the daily data may be understood as data which the user allows to be disclosed.
Optionally, in an exemplary embodiment, determining species migration data corresponding to a geographic location of the target object includes: acquiring a species migration track in a coverage area corresponding to the geographic position of the target object; classifying species migration tracks in a coverage area corresponding to the geographic position according to species types to obtain a plurality of groups of species migration data; wherein any one of the plurality of sets of species migration data includes at least one of: species type, migration longitude, migration latitude, migration altitude, migration country area code, and migration climate.
It should be noted that, the coverage area corresponding to the geographic position of the target object may be understood as a coverage area with the geographic position of the target object as a center and a preset distance as a radius.
It should be noted that the above species types are expressed by species names, and include units of species, genus, family, order, class, phylum, kingdom, and the like, and in addition, new units such as strands, groups, families, groups, or secondary units may be added under the units, which is not limited in the present invention.
The migration longitude and the migration latitude indicate the geographical location where the living organism corresponding to the species type passes through when performing the migration operation.
It should be noted that the above-mentioned mobile country area code can be understood as a code assigned to each country by the international telecommunications union.
It should be noted that the migration climate is understood to be a climate of an area through which the organisms corresponding to the species type pass when performing the migration action, including, but not limited to, a tropical rain forest climate, a tropical grassland climate, a tropical desert climate, a tropical monsoon climate, a mediterranean climate, a temperate marine climate, a temperate continental climate, and a temperate monsoon climate.
Optionally, in an exemplary embodiment, generating a key of service data corresponding to the service request of the target object according to the species migration data includes: determining the security level of service data corresponding to the service request of the target object; according to the security level, a corresponding secret key generation algorithm is matched with the service data, wherein the encryption level of the secret key generation algorithm and the security level are in a corresponding relation; generating a first key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a common security level; generating a second key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a strong security level; wherein the first key string or the second key string is a key of service data corresponding to a service request of the target object.
Optionally, in an exemplary embodiment, where the encryption level of the key generation algorithm includes a common security level, generating the first key string using the key generation algorithm and the species migration data includes: determining a migration altitude in the species migration data and a migration country area code in the species migration data; the first key string F is determined by the following formula: f=g×a/r 2; wherein G represents a mobile country area code in the species mobile data, a represents a first security string, wherein the first security string is used for indicating an initial security string corresponding to the service data, and r represents a mobile altitude in the species mobile data.
Optionally, in an exemplary embodiment, where the encryption level of the key generation algorithm includes a strong security level, generating the second key string using the key generation algorithm and the species migration data includes: determining a migration altitude in the species migration data, a migration country code in the species migration data, a species type in the species migration data, and a migration climate in the species migration data; determining a random number of the key generation algorithm and determining a time stamp of service data corresponding to the service request of the target object; generating a second security string by using the species type in the species migration data, the migration climate in the species migration data, the random number of the key generation algorithm and the timestamp of the service data corresponding to the service request of the target object; and determining the splicing result of the first key string and the second security string as the second key string.
Optionally, in an exemplary embodiment, before determining the first key string F, the method further includes: determining a migration longitude in the species migration data and a migration latitude in the species migration data; the first security string is generated using the migration longitude in the species migration data and the migration latitude in the species migration data.
Optionally, in an exemplary embodiment, generating the first security string using the migration longitude in the species migration data and the migration latitude in the species migration data includes: determining a product of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string; or determining a sum of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string; or respectively processing the migration longitude in the species migration data and the migration latitude in the species migration data into at least two encrypted data according to a preset rule; determining a multiplication result corresponding to a non-zero value in each of the at least two encrypted data; and determining the splice result of all the multiplication results as the first safety string.
The above-mentioned preset rule may be understood as a rule for performing encryption processing on a longitude value of a migration longitude in the species migration data and a latitude value of a migration latitude in the species migration data, for example, the longitude value and the latitude value may be processed into different letters according to a size of a number, and the processed letters may be used as encrypted data.
Optionally, in an exemplary embodiment, determining a product of the migration longitude in the species migration data and the migration latitude in the species migration data as the first security string includes: obtaining a conversion rule for performing format conversion on migration longitude in the species migration data and migration latitude in the species migration data, wherein the conversion rule comprises a longitude conversion coefficient and a latitude conversion coefficient; determining a first sum value between longitude values corresponding to different longitude units in migration longitude in the species migration data, and determining a second sum value between latitude values corresponding to different latitude units in migration latitude in the species migration data; a third sum of a product between the first sum and the longitude conversion factor and a product between the second sum and the latitude conversion factor is determined as the first security string.
In one embodiment, in the case that the user performs the order of the system product, the encryption type (equivalent to the encryption level of the above-mentioned key generation algorithm) of the secure encryption algorithm matched with the user's request at this time and the key to be used may be obtained by performing intelligent analysis on the security level of the data of the order request initiated by the user and the geographical location of the user, which is illustrated here by the process of generating the second key string according to the key generation algorithm with a strong security level.
Specifically, firstly, format conversion is performed on migration longitude in the species migration data and migration latitude in the species migration data, and a conversion algorithm (a conversion rule equivalent to the format conversion) is as follows:
1. Longitude conversion
East meridian: east Longitude, corresponding longitude units including degrees, minutes, seconds, adding different longitude units to corresponding longitude values, and multiplying by an east longitude coefficient (corresponding to the longitude conversion coefficient), which may be set to 1;
Western-style menstruation: west Longitude, a west warp factor (equivalent to the above longitude conversion factor) may be set to 2;
2. latitude conversion
North latitude: north Latitude, corresponding Latitude units including degrees, minutes, seconds, adding different Latitude units to corresponding Latitude values, and multiplying the sum by a North Latitude coefficient (corresponding to the Latitude conversion coefficient), which may be set to 3;
South latitude: south Latitude, corresponding Latitude unit includes degree, minute, second, add different Latitude units and corresponding Latitude value, and multiply the South Latitude coefficient (corresponding to the above-mentioned Latitude conversion coefficient), can set up as 4;
Examples: east longitude 116 ° 25'29 ", longitude value: m1= (116+25+29) ×1; north latitude 39 ° 54'20 ", latitude value: m2= (39+54+20) ×3; then, an initial security string (corresponding to the first security string) is obtained: a=m1+m2= 170+339=509.
Then, the country region code (corresponding to the mobile country code in the above species mobile data, for example 8110000) and the altitude data (corresponding to the mobile altitude in the species mobile data, for example 8848 m) are added to form a complex key string F (corresponding to the above first key string): f=g×a r 2 = 8110000 ×509/8848=53.
Next, climate classification data and species data are added: climate classification data (corresponding to the migration climate in the species migration data, for example, temperate monsoon-WDJF, denoted by C), species data (corresponding to the species type in the species migration data, for example, anserindicus, denoted by H), 8-bit random numbers (corresponding to the random numbers of the key generation algorithm, for example, 32464351, denoted by X), determining a timestamp (corresponding to the timestamp of the service data corresponding to the service request of the target object, for example, 1634394862, denoted by T), character-stitching the climate classification data, the species data, the random numbers, and the timestamp, forming a second security string Y:
Y=C+H+X+T=WDJFAnserindicus324643511634394862 (1)。
Further, the complex key string F is spliced with the second security string Y to form a strong security key string (corresponding to the second key string) Z:
Z=F+Y=53WDJFAnserindicus324643511634394862 (2)。
and then, encrypting the data of the subscription request initiated by the user according to the obtained strong security key string Z.
In order to better understand the process of the data encryption method, the following description is provided with reference to an optional embodiment to describe the implementation method flow of the data encryption, but the implementation method flow is not limited to the technical scheme of the embodiment of the present application.
In this embodiment, a data encryption method is provided, fig. 3 is a schematic diagram of a key generation flow according to an embodiment of the present application, and as shown in fig. 3, the method specifically includes the following steps:
Step S301: determining a security level and a time node (corresponding to a time stamp of service data corresponding to the service request of the target object) of user interaction data (corresponding to the service data corresponding to the service request of the target object);
step S302: triggering an encryption algorithm;
step S303: obtaining a secret key required by an encryption algorithm;
step S304: determining a key generation algorithm matched with the user interaction data by performing intelligent analysis on the user interaction data;
Step S305: determining coordinate data (corresponding to the geographic position of the target object) corresponding to the user interaction data;
step S306: determining species trajectory data (corresponding to the species migration data) from the coordinate data;
In one embodiment, for example, if it is determined that the user initiates a data interaction request in beijing, a migration track of a species having a coincidence point with a borderline of beijing is determined, and migration track data corresponding to a species having a largest coincidence point is selected as the species migration data for generating the key.
Step S307: determining the encryption level of a key generation algorithm according to the security level of the user interaction data;
in the case where the encryption level is the normal security level, steps S308 to S309 are performed;
step S308: longitude (m 1 '), latitude (m 2') data processing to form an initial security string, a=m1×m2;
Step S309: processing the national region code (G) and the altitude (r) data to form a complex key string F, wherein F=G×A/r 2;
In the case that the encryption level is a strong security level, steps S310 to S312 are performed, wherein steps S310 to S311 are the same as steps S308 to S309, and are not described herein.
Step S312: adding climate (C), species (H) and 8 into random numbers (X) and time stamps (T) for data processing to form a strong security key string Z, wherein Z=F+C+H+X+T;
Step S313: the generated key, i.e., the complex key string generated in step S309 (corresponding to the first key string) or the strong security key string generated in step S312 (corresponding to the second key string) is acquired, and step S314 is executed.
Step S314: the user interaction data is encrypted using a key and an encryption algorithm.
By the embodiment, the dynamic configurable encryption algorithm is realized, and compared with the traditional encryption algorithm which is solidified in a generation mode, has single mode, is easy to be illegally cracked and causes leakage of a large amount of data. According to the embodiment, the security level of the user interaction data is intelligently analyzed, the security encryption algorithm is dynamically matched, different track coordinate data and a multi-mode security key strategy are combined, a complex formula algorithm is added, and mechanisms such as random numbers are spliced, so that a real security barrier is provided for the system, and the probability of illegal cracking of the data is reduced.
In this embodiment, a method for classifying species migration data is provided, and fig. 4 is a schematic diagram of a classification flow of species migration data according to an embodiment of the present application, as shown in fig. 4, and specifically includes the following steps:
step S402: acquiring migration track data (corresponding to the above-mentioned species migration data) of different species types (such as the species a, the species B, the species C in fig. 4), wherein the migration track data comprises the species type, migration longitude, migration latitude, migration altitude, migration country area code, migration climate and the like;
step S404: classifying and storing migration track data according to species types;
Step S406: and obtaining a plurality of groups of migration track data.
In one embodiment, the intelligent AI robot intelligent learning track data can be trained in real time, the data of longitude and latitude, altitude, climate and the like of the species migration track converged in real time can be continuously adjusted, and the indestructibility of encryption processing of the system is improved.
According to the embodiment, real-time data of species migration routes can be collected, intelligent learning is conducted on the species migration track data, and because track data of different species migration routes are different, track data of the species migration routes are dynamically classified and converged to a track database according to categories of different species, secret keys generated by different species migration track data can be provided corresponding to safety requirements of user interaction data, complexity of a secret key obtaining method is improved, and safety of the user interaction data is improved.
The following embodiments are used to describe a data encryption algorithm, and the embodiment is based on species migration data, and performs intelligent analysis on the region to which the user interaction data belongs, and the specific steps are as follows:
first, data acquisition: and acquiring species migration route data, classifying and summarizing data factors such as longitude, latitude, altitude, species type, climate and the like in the route, and storing the data into a track database.
Secondly, species track data are acquired: the user performs data interaction with the system, and after the system receives the data, the system triggers a data encryption algorithm. The server of the server dynamically matches different secret key generation algorithms and species track data according to the security level of the data by performing intelligent analysis on the user interaction data, for example, the user interaction data is user identity document information and is strong security data, and the encryption level of the matched secret key generation algorithm is strong security level;
In one embodiment, the corresponding species migration data may be determined from the geographic location of the user initiated request: if the user initiates a data interaction request in Hangzhou, determining migration tracks of species with coincident points on boundary lines of Hangzhou, and selecting migration track data corresponding to the species with any coincident point as species migration data for generating a secret key.
Third step, data encryption-longitude and latitude data processing: for the coordinate track data: longitude (m 1 '), latitude (m 2'), and performing custom format conversion on the converted values: the longitude value (m 1) and the latitude value (m 2) are multiplied, so that longitude and latitude value data are tightly combined to form an initial security string: a=m1+m2, completing the first line of defense for key security.
Fourth, encryption processing of country region code and altitude data: using the quadratic number of altitude data r: r2, as a dividend of a, uses the country region code G as a product coefficient of a/r2 to form a complex key string (result rounding): f=gxa/r 2, the key string has strong security, and can be applied to the security encryption of most systems;
Fifth, climate and species encryption treatment: using climate classification data of the region where the track points are located: c, a mobile species academic name string: h, taking 8-bit random numbers: x, timestamp: and T, splicing to form a safety string: y=c+h +x+t. The complex key string F splices the security string Y to form a strong security key string Z=F+Y;
Sixth, outputting the secret key: and generating matched secret keys according to the strategies of the secret key generation algorithms with different encryption levels, and carrying out encryption processing on the user interaction data by combining the encryption algorithm and the secret keys.
According to the embodiment, the security policy is dynamically distributed, and the probability of illegally decoding the encrypted data is reduced by combining a dynamically changeable security algorithm, so that the security of data encryption is improved.
The present embodiment is innovated by the existing key string encryption scheme. Traditional key strings are solidified in a mode, mechanical splicing modes such as a single mode, a time stamp, a random number and the like cannot provide effective prevention for continuously updated illegal cracking technologies, and once the key strings are illegally cracked, a large amount of data can be leaked. The secret key generation algorithm dynamically distributes the security policy by intelligently analyzing the time and the region of the user interaction data, combines the flexible and changeable security algorithm, almost prevents illegal decoding, and ensures the security of system data; in addition, after the key of the traditional encryption algorithm is generated, the security processing of all data is kept consistent, the security experience is poor, the security level of the key generation algorithm can be dynamically adjusted according to different security levels of the data, key strings with different complexity are generated, and the multi-level requirement of the data security processing of the system is greatly met.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method of the various embodiments of the present application.
Fig. 5 is a block diagram of a data encryption apparatus according to an embodiment of the present application. As shown in fig. 5, includes:
A first determining module 52, configured to determine a geographic location of a target object in response to a service request initiated by the target object;
It should be noted that the above species migration data may be understood as data of migration behavior of a living organism at a certain distance due to its own cause or environmental cause, and has a periodic rule.
A second determining module 54, configured to determine species migration data corresponding to a geographic location of the target object, where the species migration data is used to indicate a migration rule of a species;
An encryption module 56, configured to generate a key of service data corresponding to the service request of the target object according to the species migration data, and encrypt the service data corresponding to the service request of the target object according to the key.
By the device, the geographic position of the target object is determined by responding to the service request initiated by the target object; determining species migration data corresponding to the geographic position of the target object, wherein the species migration data is used for indicating a migration rule of a species; according to the species migration data, a secret key of service data corresponding to the service request of the target object is generated, and the service data corresponding to the service request of the target object is encrypted according to the secret key, so that the problem of low security in encrypting the data in the related technology is solved, and the security of data encryption is further improved.
It should be noted that, the service data corresponding to the service request of the target object corresponds to the identity information of the target object, and different security levels of the service data may be determined according to different identity information, for example, in an embodiment, in a case where the identity information of the target object is a member client, the security level of the service data of the member client is determined to be a strong security level; and under the condition that the identity information of the target object is the common client, determining the security level of the service data of the member client as the common security level.
In other embodiments, the service data corresponding to the service request of the target object further corresponds to a data type of the service data, and the security level of the service data may be determined according to the data type of the service data, for example, in one embodiment, in a case where the data type of the service data is privacy data, the security level of the service data of the member client is determined to be a strong security level; and determining the security level of the service data of the member client as the common security level under the condition that the data type of the service data is daily data. The private data may include identity document information, communication information, consumption information, image information and the like of the user, and the daily data may be understood as data which the user allows to be disclosed.
Optionally, in an exemplary embodiment, the second determining module is further configured to obtain a species migration track in a coverage area corresponding to a geographic location of the target object; classifying species migration tracks in a coverage area corresponding to the geographic position according to species types to obtain a plurality of groups of species migration data; wherein any one of the plurality of sets of species migration data includes at least one of: species type, migration longitude, migration latitude, migration altitude, migration country area code, and migration climate.
It should be noted that, the coverage area corresponding to the geographic position of the target object may be understood as a coverage area with the geographic position of the target object as a center and a preset distance as a radius.
It should be noted that the above species types are expressed by species names, and include units of species, genus, family, order, class, phylum, kingdom, and the like, and in addition, new units such as strands, groups, families, groups, or secondary units may be added under the units, which is not limited in the present invention.
The migration longitude and the migration latitude indicate the geographical location where the living organism corresponding to the species type passes through when performing the migration operation.
It should be noted that the above-mentioned mobile country area code can be understood as a code assigned to each country by the international telecommunications union.
It should be noted that the migration climate is understood to be a climate of an area through which the organisms corresponding to the species type pass when performing the migration action, including, but not limited to, a tropical rain forest climate, a tropical grassland climate, a tropical desert climate, a tropical monsoon climate, a mediterranean climate, a temperate marine climate, a temperate continental climate, and a temperate monsoon climate.
Optionally, in an exemplary embodiment, the encryption module is further configured to determine a security level of service data corresponding to the service request of the target object; according to the security level, a corresponding secret key generation algorithm is matched with the service data, wherein the encryption level of the secret key generation algorithm and the security level are in a corresponding relation; generating a first key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a common security level; generating a second key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a strong security level; wherein the first key string or the second key string is a key of service data corresponding to a service request of the target object.
Optionally, in an exemplary embodiment, the data encryption device further includes a first key string generating module, configured to determine a migration altitude in the species migration data and a migration country area code in the species migration data; the first key string F is determined by the following formula: f=g×a/r2; wherein G represents a mobile country area code in the species mobile data, a represents a first security string, wherein the first security string is used for indicating an initial security string corresponding to the service data, and r represents a mobile altitude in the species mobile data.
Optionally, in an exemplary embodiment, the data encryption device further includes a second key string generating module, configured to determine a migration altitude in the species migration data, a migration country area code in the species migration data, a species type in the species migration data, and a migration climate in the species migration data; determining a random number of the key generation algorithm and determining a time stamp of service data corresponding to the service request of the target object; generating a second security string by using the species type in the species migration data, the migration climate in the species migration data, the random number of the key generation algorithm and the timestamp of the service data corresponding to the service request of the target object; and determining the splicing result of the first key string and the second security string as the second key string.
Optionally, in an exemplary embodiment, the data encryption device further includes a first security string generation module, configured to determine a migration longitude in the species migration data and a migration latitude in the species migration data; the first security string is generated using the migration longitude in the species migration data and the migration latitude in the species migration data.
Optionally, in an exemplary embodiment, the first security string generating module is further configured to determine a product of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string; or determining a sum of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string; or respectively processing the migration longitude in the species migration data and the migration latitude in the species migration data into at least two encrypted data according to a preset rule; determining a multiplication result corresponding to a non-zero value in each of the at least two encrypted data; and determining the splice result of all the multiplication results as the first safety string.
The above-mentioned preset rule may be understood as a rule for performing encryption processing on a longitude value of a migration longitude in the species migration data and a latitude value of a migration latitude in the species migration data, for example, the longitude value and the latitude value may be processed into different letters according to a size of a number, and the processed letters may be used as encrypted data.
Optionally, in an exemplary embodiment, the first security string generating module is further configured to obtain a conversion rule for performing format conversion on a migration longitude in the species migration data and a migration latitude in the species migration data, where the conversion rule includes a longitude conversion coefficient and a latitude conversion coefficient; determining a first sum value between longitude values corresponding to different longitude units in migration longitude in the species migration data, and determining a second sum value between latitude values corresponding to different latitude units in migration latitude in the species migration data; a third sum of a product between the first sum and the longitude conversion factor and a product between the second sum and the latitude conversion factor is determined as the first security string.
An embodiment of the present application also provides a storage medium including a stored program, wherein the program executes the method of any one of the above.
Alternatively, in the present embodiment, the above-described storage medium may be configured to store program code for performing the steps of:
s1, responding to a service request initiated by a target object to determine the geographic position of the target object;
S2, species migration data corresponding to the geographic position of the target object are determined, wherein the species migration data are used for indicating the migration rule of the species;
S3, generating a secret key of service data corresponding to the service request of the target object according to the species migration data, and encrypting the service data corresponding to the service request of the target object according to the secret key.
An embodiment of the application also provides an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, where the transmission device is connected to the processor, and the input/output device is connected to the processor.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
s1, responding to a service request initiated by a target object to determine the geographic position of the target object;
S2, species migration data corresponding to the geographic position of the target object are determined, wherein the species migration data are used for indicating the migration rule of the species;
S3, generating a secret key of service data corresponding to the service request of the target object according to the species migration data, and encrypting the service data corresponding to the service request of the target object according to the secret key.
Alternatively, in the present embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory RAM), a removable hard disk, a magnetic disk, or an optical disk, etc., which can store program codes.
Alternatively, specific examples in this embodiment may refer to examples described in the foregoing embodiments and optional implementations, and this embodiment is not described herein.
It will be appreciated by those skilled in the art that the modules or steps of the application described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may alternatively be implemented in program code executable by computing devices, so that they may be stored in a memory device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module for implementation. Thus, the present application is not limited to any specific combination of hardware and software.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the principle of the present application should be included in the protection scope of the present application.

Claims (9)

1. A data encryption method, comprising:
responding to a service request initiated by a target object to determine the geographic position of the target object;
Determining species migration data corresponding to the geographic position of the target object, wherein the species migration data is used for indicating a migration rule of a species;
Generating a secret key of service data corresponding to the service request of the target object according to the species migration data, and encrypting the service data corresponding to the service request of the target object according to the secret key;
determining species migration data corresponding to the geographic location of the target object, including:
acquiring a species migration track in a coverage area corresponding to the geographic position of the target object;
Classifying species migration tracks in a coverage area corresponding to the geographic position according to species types to obtain a plurality of groups of species migration data; wherein any one of the plurality of sets of species migration data at least comprises: species type, migration longitude, migration latitude, migration altitude, migration country area code, and migration climate.
2. The data encryption method according to claim 1, wherein generating a key of service data corresponding to the service request of the target object from the species migration data, comprises:
Determining the security level of service data corresponding to the service request of the target object;
according to the security level, a corresponding secret key generation algorithm is matched with the service data, wherein the encryption level of the secret key generation algorithm and the security level are in a corresponding relation;
generating a first key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a common security level;
Generating a second key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a strong security level;
Wherein the first key string or the second key string is a key of service data corresponding to a service request of the target object.
3. The data encryption method according to claim 2, wherein in the case where the encryption level of the key generation algorithm includes a normal security level, generating a first key string using the key generation algorithm and the species migration data includes:
determining a migration altitude in the species migration data and a migration country area code in the species migration data;
The first key string F is determined by the following formula:
F=G×A/r2
wherein G represents a mobile country area code in the species mobile data, a represents a first security string, wherein the first security string is used for indicating an initial security string corresponding to the service data, and r represents a mobile altitude in the species mobile data.
4. The data encryption method of claim 2, wherein generating a second key string using the key generation algorithm and the species migration data, where the encryption level of the key generation algorithm includes a strong security level, comprises:
determining a migration altitude in the species migration data, a migration country code in the species migration data, a species type in the species migration data, and a migration climate in the species migration data;
Determining a random number of the key generation algorithm and determining a time stamp of service data corresponding to the service request of the target object;
Generating a second security string by using the species type in the species migration data, the migration climate in the species migration data, the random number of the key generation algorithm and the timestamp of the service data corresponding to the service request of the target object;
and determining the splicing result of the first key string and the second security string as the second key string.
5. A data encryption method according to claim 3, wherein prior to determining the first key string F, the method further comprises:
determining a migration longitude in the species migration data and a migration latitude in the species migration data;
the first security string is generated using the migration longitude in the species migration data and the migration latitude in the species migration data.
6. The method for encrypting data according to claim 5, wherein,
Generating the first security string using the migration longitude in the species migration data and the migration latitude in the species migration data comprises:
Determining a product of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string;
Or determining a sum of a migration longitude in the species migration data and a migration latitude in the species migration data as the first security string;
Or respectively processing the migration longitude in the species migration data and the migration latitude in the species migration data into at least two encrypted data according to a preset rule;
Determining a multiplication result corresponding to a non-zero value in each of the at least two encrypted data;
And determining the splice result of all the multiplication results as the first safety string.
7. The data encryption method according to claim 6, wherein determining the product of the migration longitude in the species migration data and the migration latitude in the species migration data as the first security string includes:
Obtaining a conversion rule for performing format conversion on migration longitude in the species migration data and migration latitude in the species migration data, wherein the conversion rule comprises a longitude conversion coefficient and a latitude conversion coefficient;
Determining a first sum value between longitude values corresponding to different longitude units in migration longitude in the species migration data, and determining a second sum value between latitude values corresponding to different latitude units in migration latitude in the species migration data;
A third sum of a product between the first sum and the longitude conversion factor and a product between the second sum and the latitude conversion factor is determined as the first security string.
8. A data encryption apparatus, comprising:
the first determining module is used for responding to a service request initiated by a target object so as to determine the geographic position of the target object;
The second determining module is used for determining species migration data corresponding to the geographic position of the target object, wherein the species migration data is used for indicating the migration rule of the species;
The encryption module is used for generating a secret key of service data corresponding to the service request of the target object according to the species migration data and encrypting the service data corresponding to the service request of the target object according to the secret key;
The second determining module is further configured to: acquiring a species migration track in a coverage area corresponding to the geographic position of the target object; classifying species migration tracks in a coverage area corresponding to the geographic position according to species types to obtain a plurality of groups of species migration data; wherein any one of the plurality of sets of species migration data at least comprises: species type, migration longitude, migration latitude, migration altitude, migration country area code, and migration climate.
9. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored program, wherein the program when run performs the method of any of the preceding claims 1 to 7.
CN202210362172.8A 2021-12-28 2022-04-07 Data encryption method, device and storage medium Active CN114531302B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111633644 2021-12-28
CN2021116336440 2021-12-28

Publications (2)

Publication Number Publication Date
CN114531302A CN114531302A (en) 2022-05-24
CN114531302B true CN114531302B (en) 2024-09-13

Family

ID=81628133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210362172.8A Active CN114531302B (en) 2021-12-28 2022-04-07 Data encryption method, device and storage medium

Country Status (1)

Country Link
CN (1) CN114531302B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277143B (en) * 2022-07-19 2023-10-20 中天动力科技(深圳)有限公司 Data security transmission method, device, equipment and storage medium
CN116305047A (en) * 2023-03-01 2023-06-23 华能信息技术有限公司 Secure access virtual password processing method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124974A (en) * 2010-06-01 2013-05-29 巴黎矿业电信学院 Method for securing digital data and identities in particular in a process using information and communication technologies
CN103842984A (en) * 2011-09-29 2014-06-04 亚马逊技术股份有限公司 Parameter based key derivation

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1621955B1 (en) * 2004-07-30 2017-06-07 Irdeto B.V. Method and device for providing access to encrypted content
US12109704B2 (en) * 2018-04-15 2024-10-08 Siemens Industry Software Ltd. Simulation signature keys for robotic simulations
CN109873700B (en) * 2019-01-16 2023-10-10 内蒙古惠强科技有限公司 Key generation method, device, computer readable storage medium and terminal equipment
CN110598461B (en) * 2019-09-27 2024-09-27 腾讯科技(深圳)有限公司 Wild animal information management method, device, terminal, system and storage medium
CN114424494A (en) * 2019-12-24 2022-04-29 深圳市欢太科技有限公司 Key management method and device, terminal and storage medium
CN113365264B (en) * 2021-05-31 2023-01-31 中国工商银行股份有限公司 Block chain wireless network data transmission method, device and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124974A (en) * 2010-06-01 2013-05-29 巴黎矿业电信学院 Method for securing digital data and identities in particular in a process using information and communication technologies
CN103842984A (en) * 2011-09-29 2014-06-04 亚马逊技术股份有限公司 Parameter based key derivation

Also Published As

Publication number Publication date
CN114531302A (en) 2022-05-24

Similar Documents

Publication Publication Date Title
CN110263936B (en) Horizontal federal learning method, device, equipment and computer storage medium
CN109165725B (en) Neural network federal modeling method, equipment and storage medium based on transfer learning
CN109688160B (en) Data encryption transmission control method and device, computer equipment and storage medium
CN114531302B (en) Data encryption method, device and storage medium
CN111428887B (en) Model training control method, device and system based on multiple computing nodes
CN105577368A (en) Two-way privacy protective system and method for inquiring medical diagnostic service
CN113362048B (en) Data label distribution determining method and device, computer equipment and storage medium
CN111340247A (en) Longitudinal federated learning system optimization method, device and readable storage medium
CN110581839B (en) Content protection method and device
CN104601596A (en) Data privacy protection method in classification data mining system
CN113449048A (en) Data label distribution determining method and device, computer equipment and storage medium
CN109583227A (en) A kind of method for protecting privacy, apparatus and system
CN112801307B (en) Block chain-based federal learning method and device and computer equipment
CN108377319A (en) picture transmission method and device
CN114255037A (en) Multi-party combined sorting method and data processing method under privacy protection
CN115884110B (en) Method and system for judging short message verification code
CN107196918A (en) A kind of method and apparatus of matched data
CN112948883A (en) Multi-party combined modeling method, device and system for protecting private data
CN106254226A (en) A kind of information synchronization method and device
CN115604035B (en) City brain data sharing method based on alliance chain
CN114726524B (en) Target data sorting method and device, electronic equipment and storage medium
CN112417478B (en) Data processing method, device, equipment and storage medium
CN116451279A (en) Data processing method, device, equipment and readable storage medium
JP2016042632A (en) Information concealment device, information concealment method, and information concealment program
CN103297962A (en) Opportunity network route method and system based on encrypted fuzzy keywords

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant