[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115942262B - Short message service system with data security mechanism and method thereof - Google Patents

Short message service system with data security mechanism and method thereof Download PDF

Info

Publication number
CN115942262B
CN115942262B CN202211516671.4A CN202211516671A CN115942262B CN 115942262 B CN115942262 B CN 115942262B CN 202211516671 A CN202211516671 A CN 202211516671A CN 115942262 B CN115942262 B CN 115942262B
Authority
CN
China
Prior art keywords
data
short message
information
abnormal
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211516671.4A
Other languages
Chinese (zh)
Other versions
CN115942262A (en
Inventor
康明华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Xunmei Network Technology Co ltd
Original Assignee
Xiamen Xunmei Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Xunmei Network Technology Co ltd filed Critical Xiamen Xunmei Network Technology Co ltd
Priority to CN202211516671.4A priority Critical patent/CN115942262B/en
Publication of CN115942262A publication Critical patent/CN115942262A/en
Application granted granted Critical
Publication of CN115942262B publication Critical patent/CN115942262B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a short message service system with a data security mechanism and a method thereof, which relate to the technical field of short message service and aim to solve the security problem of short message data. The short message service system with the data security mechanism and the method thereof provided by the invention determine the single maximum aggregate data volume of each aggregation node, receive the second data sent by the risk data receiving terminal by utilizing the shared data transmission channel, effectively improve the security of the data after the risk data is screened, label the first abnormal data and the second abnormal data as final effective abnormal data, and ensure the definition and accuracy of the final effective abnormal data, thereby providing basis for realizing the judgment and decision of the numerical value of the data, being convenient for the self-judgment of the data, ensuring the security of the data to the greatest extent by a plurality of encryption matrixes, improving the security mechanism of the whole data and enabling the service port of the short message to be more excellent in use.

Description

一种具有数据安全机制的短信服务系统及其方法A short message service system with data security mechanism and method thereof

技术领域Technical Field

本发明涉及短信服务技术领域,具体为一种具有数据安全机制的短信服务系统及其方法。The present invention relates to the technical field of short message services, and in particular to a short message service system with a data security mechanism and a method thereof.

背景技术Background Art

短信服务是最早的短消息业务,也是普及率最高的一种短消息业务。SMS service is the earliest short message service and also the most popular short message service.

公开号为CN114599032A的中国专利公开了一种基于盐值加密的短信传输方法和装置,方法包括:短信服务端利用有效盐值对待发送短信进行加密,有效盐值信息包括有效盐值和盐值标识,主要解决了短信服务端利用有效盐值对待发送短信进行加密,由于盐值具有有效期限,一旦盐值超过有效期限将会失效而无法再用于加密,从而增加了信息加密的安全性,提高了客户的敏感信息在链路传输过程中被抓包的难度,而且由于盐值的定时刷新机制存在,一旦信息解密的不及时,解密也变得很困难,保护了客户隐私数据的安全性,上述问题虽然数据加密的问题,但是在实际操作中还存在以下问题:The Chinese patent with publication number CN114599032A discloses a method and device for SMS transmission based on salt value encryption. The method includes: the SMS service end uses the effective salt value to encrypt the SMS to be sent, and the effective salt value information includes the effective salt value and the salt value identifier. The method mainly solves the problem that the SMS service end uses the effective salt value to encrypt the SMS to be sent. Since the salt value has a validity period, once the salt value exceeds the validity period, it will become invalid and can no longer be used for encryption, thereby increasing the security of information encryption and increasing the difficulty of capturing the sensitive information of the customer during the link transmission process. Moreover, due to the existence of a timed refresh mechanism of the salt value, once the information is not decrypted in time, decryption becomes very difficult, thereby protecting the security of the customer's privacy data. Although the above problem is a problem of data encryption, there are still the following problems in actual operation:

1.对短信数据进行接收时没有对数据传输时的流量变动进行有效的评估,流量过大容易造成传输时的流量爆炸,在数据进行传输时,没有利用历史成功数据对现有数据进行解析,同时对于数据中的异常数据没有及时的进行风险排查,从而造成数据的完整性和安全性降低。1. When receiving SMS data, there is no effective assessment of the traffic changes during data transmission. Excessive traffic can easily cause traffic explosion during transmission. When data is transmitted, historical successful data is not used to parse the existing data. At the same time, abnormal data in the data is not promptly checked for risks, resulting in reduced data integrity and security.

2.在对异常数据进行接收后,没有对异常数据进行比较,从而倒是异常数据冗余性的增加,同时没有对异常数据进行及时的判断,从而导致数据的准确性降低。2. After receiving the abnormal data, there is no comparison of the abnormal data, which increases the redundancy of the abnormal data. At the same time, there is no timely judgment on the abnormal data, which reduces the accuracy of the data.

3.异常数据和有效数据没有进行区分,导致在进行加密时,将异常数据也同时进行了加密,导致了加密后的存储量过大。3. Abnormal data and valid data are not distinguished, resulting in the abnormal data being encrypted at the same time during encryption, resulting in an excessive amount of storage after encryption.

发明内容Summary of the invention

本发明的目的在于提供一种具有数据安全机制的短信服务系统及其方法,确定每个汇聚节点的单次最大汇集数据量,利用所述共享数据传输通道接收所述风险数据接收终端发送的第二数据,风险数据筛选出来后可以有效的提高数据的安全性,对第一异常数据和第二异常数据进行标注作为最终的有效异常数据,保证最终得到的有效异常数据的清晰明确和准确性,从而为实现对数据的数值进行判定和决策提供依据,便于了数据的自行判断,多个加密矩阵可以最大程度的保护数据的安全性,同时也提高了整体数据的安全机制,使短信的服务端口使用更加优良,可以解决现有技术中的问题。The purpose of the present invention is to provide a short message service system and method with a data security mechanism, determine the single maximum aggregated data volume of each aggregation node, use the shared data transmission channel to receive the second data sent by the risk data receiving terminal, and effectively improve the security of the data after the risk data is screened out. The first abnormal data and the second abnormal data are marked as the final effective abnormal data to ensure the clarity and accuracy of the effective abnormal data finally obtained, thereby providing a basis for determining and making decisions on the numerical value of the data, facilitating the self-judgment of the data, and multiple encryption matrices can protect the security of the data to the greatest extent. At the same time, the overall data security mechanism is also improved, so that the service port of the short message can be used better, and the problems in the prior art can be solved.

为实现上述目的,本发明提供如下技术方案:To achieve the above object, the present invention provides the following technical solutions:

一种具有数据安全机制的短信服务方法,所述方法包括如下步骤:A short message service method with a data security mechanism, the method comprising the following steps:

S1:短信数据采集:通过网关端口将短信数据信息进行采集,并将将采集的短信数据进行独立存储;S1: SMS data collection: collect SMS data information through the gateway port and store the collected SMS data independently;

S2:数据缓存提取:将独立存储的短信数据信息进行缓存,并且提取缓存数据中的风险数据;S2: Data cache extraction: cache the independently stored SMS data information and extract the risk data in the cache data;

S3:风险数据读取计算:将提取出的风险数据进行数据读取,并且将异常数据与正常范围值内的数据进行差别计算;S3: Risk data reading and calculation: the extracted risk data is read, and the difference between abnormal data and data within the normal range is calculated;

S4:差别数据读取:将差别计算完成的序列数据进行读取与分析,并将分析的数据进行有效数据整合;S4: Differential data reading: Read and analyze the sequence data after differential calculation, and perform effective data integration on the analyzed data;

S5:有效数据加密:将有效数据进行加密处理,并将加密完成的数据进行优先启动。S5: Valid data encryption: Encrypt valid data and start the encrypted data first.

优选的,所述短信数据采集,还包括:Preferably, the SMS data collection further includes:

信息数据采集系统,用于:Information data collection system for:

获取每个数据接收终端的网络层在传输数据时的流量变动情况;Obtain the traffic changes of the network layer of each data receiving terminal when transmitting data;

根据每个数据接收终端的网络层在传输数据时的流量变动情况评估出每个网络层的重要度;Evaluate the importance of each network layer based on the traffic changes of each data receiving terminal's network layer when transmitting data;

将每个数据接收终端重要度大于等于预设阈值的目标网络层进行统计;Count the target network layers where the importance of each data receiving terminal is greater than or equal to a preset threshold;

获取每个数据接收终端的历史传输成功数据。Get the historical transmission success data of each data receiving terminal.

优选的,所述采集完成的风险数据读取,还包括:Preferably, the risk data reading after the collection is completed further includes:

异常数据分析单元,用于:Abnormal data analysis unit, used to:

根据信息数据采集系统中获取的每个数据接收终端的历史传输成功数据;According to the historical transmission success data of each data receiving terminal obtained in the information data collection system;

解析所述历史传输成功数据确定其完整性和安全性,根据所述完整性和安全性评估出该数据接收终端的威胁风险指数和漏洞风险指数;Parsing the historical successful transmission data to determine its integrity and security, and evaluating the threat risk index and vulnerability risk index of the data receiving terminal based on the integrity and security;

根据每个数据接收终端的目标网络层的工作强度和该数据接收终端的威胁风险指数和漏洞风险指数利用预设风险评估体系计算出该数据接收终端的安全性指数;Calculate the security index of the data receiving terminal using a preset risk assessment system according to the working intensity of the target network layer of each data receiving terminal and the threat risk index and vulnerability risk index of the data receiving terminal;

根据每个数据接收终端的安全性指数筛选出安全数据接收终端和风险数据接收终端;Screen out safe data receiving terminals and risky data receiving terminals according to the security index of each data receiving terminal;

接收所述安全数据接收终端发送的第一数据;receiving first data sent by the security data receiving terminal;

获取所述风险数据接收终端的配置信息和网络信息;Acquiring configuration information and network information of the risk data receiving terminal;

根据所述网络信息构建风险数据接收终端的共享数据传输通道;Constructing a shared data transmission channel for a risk data receiving terminal according to the network information;

获取所述共享数据传输通道中的多个汇聚节点,确定每个汇聚节点的单次最大汇集数据量;Acquire multiple aggregation nodes in the shared data transmission channel, and determine a single maximum aggregation data volume of each aggregation node;

确定所述风险数据接收终端的第二数据中数据量最大的目标第二数据;Determine the target second data with the largest data volume among the second data of the risk data receiving terminal;

根据所述目标第二数据和共享数据传输通道中每个汇聚节点的数据最大汇集数据量计算出共享数据传输通道的目标数据传输效率;Calculating a target data transmission efficiency of the shared data transmission channel according to the target second data and a maximum aggregated data volume of data of each aggregation node in the shared data transmission channel;

设置所述共享数据传输通道的数据传输效率为所述目标数据传输效率,设置完毕后,利用所述共享数据传输通道接收所述风险数据接收终端发送的第二数据。The data transmission efficiency of the shared data transmission channel is set to the target data transmission efficiency. After the setting is completed, the shared data transmission channel is used to receive the second data sent by the risk data receiving terminal.

优选的,所述异常数据与正常范围值内的数据差别计算,还包括:Preferably, the calculation of the difference between the abnormal data and the data within the normal range value also includes:

差别计算模块,用于:Difference calculation module for:

获取风险数据后将风险数据转换为具体数值,再将风险数据的数据与正常范围内的数据数值进行差别计算;After obtaining the risk data, the risk data is converted into specific values, and then the difference between the risk data and the data values within the normal range is calculated;

判断模块,用于获取所述数据差别计算的数值序列,对所述数值序列进行周期性检测,判断所述数值序列是否为周期序列;A judgment module, used for obtaining the numerical sequence of the data difference calculation, performing periodicity detection on the numerical sequence, and judging whether the numerical sequence is a periodic sequence;

分析模块,用于当确定所述数值序列为周期序列后,对所述数值序列按照周期进行分割得到多组相同的第一子序列,判断所述第一子序列中的全部数值是否大于预设数值,若是,提取出所述第一子序列中大于预设数值的第一异常数值,并确定所述第一异常数值之间相邻的时间间隔,并判断所述时间间隔是否在预设时间间隔范围内,若是,将所述第一异常数值和时间间隔作为第一异常数据,否则,确定所述第一异常数值无效;an analysis module, configured to, after determining that the numerical sequence is a periodic sequence, divide the numerical sequence according to the periodicity to obtain a plurality of identical first subsequences, determine whether all the numerical values in the first subsequence are greater than a preset numerical value, if so, extract a first abnormal numerical value in the first subsequence that is greater than the preset numerical value, determine the adjacent time intervals between the first abnormal numerical values, and determine whether the time intervals are within a preset time interval range, if so, use the first abnormal numerical value and the time interval as first abnormal data, otherwise, determine that the first abnormal numerical value is invalid;

数据整合模块,用于将所述第一异常数据进行周期标注,得到第一有效异常数据,对所述第二异常数据进行非周期标注,得到第二有效异常数据,将所述第一有效异常数据和第二有效异常数据作为最终的有效异常数据进行独立存储,并不将其数据发送至下一读取模块。The data integration module is used to periodically mark the first abnormal data to obtain first valid abnormal data, non-periodically mark the second abnormal data to obtain second valid abnormal data, and independently store the first valid abnormal data and the second valid abnormal data as final valid abnormal data, and do not send their data to the next reading module.

优选的,所述分析模块,还包括:Preferably, the analysis module further includes:

所述分析模块,还用于当确定所述数值序列为非周期序列后,利用一维聚类方法对所述数值序列进行聚类运算,得到多个分割点,并利用所述多个分割点对所述数值序列进行划分,得到多组不同的第二子序列,从所述第二子序列中获取存在大于预设数值的第三子序列,并基于第三子序列在所述数值序列中的位置,确定所述第三子序列的异常时间间隔,并从获取相邻的第三子序列的异常时间间隔在所述预设时间间隔范围内的第四子序列,且将所述第四子序列和异常时间间隔作为第二异常数据。The analysis module is further used to, after determining that the numerical sequence is a non-periodic sequence, perform a clustering operation on the numerical sequence using a one-dimensional clustering method to obtain multiple segmentation points, and use the multiple segmentation points to divide the numerical sequence to obtain multiple groups of different second subsequences, obtain a third subsequence with a value greater than a preset value from the second subsequence, and determine the abnormal time interval of the third subsequence based on the position of the third subsequence in the numerical sequence, and obtain a fourth subsequence whose abnormal time interval of an adjacent third subsequence is within the preset time interval range, and use the fourth subsequence and the abnormal time interval as second abnormal data.

优选的,所述有效数据读取和加密,还包括:Preferably, the valid data reading and encryption further includes:

有效数据读取模块,用于:Valid data reading module, used for:

基于数据整合模块中的第一有效异常数据和第二有效异常数据作为最终的有效异常数据进行数据为基准进行排查,将排查完成其他数据作为有效数据;Based on the first valid abnormal data and the second valid abnormal data in the data integration module as the final valid abnormal data, the data is checked as a benchmark, and the other data after the check is taken as the valid data;

数据解码加密模块,用于:Data decoding and encryption module, used for:

将有效数据进行解码,并且将解码后的数据作为原始数据并将其划分为预设长度的待加密段,基于所述待加密段建立加密序列;Decoding the valid data, taking the decoded data as the original data and dividing it into segments to be encrypted of a preset length, and establishing an encryption sequence based on the segments to be encrypted;

根据所述待加密段的数量,将所述加密序列作为矩阵的第一列,建立第一加密矩阵;According to the number of the segments to be encrypted, the encryption sequence is used as the first column of the matrix to establish a first encryption matrix;

基于预设干扰因子调节每一待加密段在所述第一加密矩阵对应行上的第一位置,调节完毕后对其进行第一加密;adjusting a first position of each to-be-encrypted segment on a corresponding row of the first encryption matrix based on a preset interference factor, and performing a first encryption on the segment after the adjustment is completed;

基于所述干扰次数在预设密码集中获取对应的干扰密码,同时利用加密骰子掷出随机数;Based on the number of interferences, a corresponding interference password is obtained from a preset password set, and a random number is rolled using an encrypted dice;

在所述第一加密矩阵的每一行中标记与所述第一位置相隔随机数的第二位置;marking a second position in each row of the first encryption matrix that is separated from the first position by a random number;

将所述干扰密码依次输入到所述第二位置进行第二加密,建立第二加密矩阵;Inputting the interference password into the second position in sequence for second encryption to establish a second encryption matrix;

当所述第二加密矩阵中的空白位置的第一数量大于非空白位置的第二数量时,确定当前加密程度不足;When a first number of blank positions in the second encryption matrix is greater than a second number of non-blank positions, determining that the current encryption level is insufficient;

依次剔除所述第二矩阵的最外围位置,生成若干个子加密矩阵;The outermost positions of the second matrix are removed in sequence to generate a plurality of sub-encryption matrices;

分别计算每一子加密矩阵的加密秩,基于所有的加密秩生成秩密码;Calculate the encryption rank of each sub-encryption matrix respectively, and generate a rank password based on all the encryption ranks;

将所述秩密码输入到所述第二加密矩阵中进行第三加密,获取第三加密矩阵;Inputting the rank password into the second encryption matrix for third encryption to obtain a third encryption matrix;

基于所述第三加密矩阵的规格,随机生成一个同型矩阵;Based on the specification of the third encryption matrix, randomly generate a homogeneous matrix;

在所述第三加密矩阵上标记剩余空白位置,并将标记后的所述第三加密矩阵与所述同型矩阵进行叠加,获取标记位置产生的叠加数;Marking the remaining blank positions on the third encrypted matrix, and superimposing the marked third encrypted matrix with the isotype matrix to obtain a superposition number generated by the marked positions;

将所述叠加数输入到所述剩余空白位置上,获取全加密矩阵;Input the superposition number into the remaining blank positions to obtain a fully encrypted matrix;

提取所述第全加密矩阵中每一位置对应的数据,获取加密数据。The data corresponding to each position in the first encryption matrix is extracted to obtain encrypted data.

优选的,对数据进行缓存,包括:Preferably, caching the data includes:

数据调取模块,用于获取独立存储的短信数据信息,并提取短信数据信息的关键信息片段,且基于关键信息片段的目标语义确定短信数据信息的信息类型;A data retrieval module is used to obtain independently stored SMS data information, extract key information fragments of the SMS data information, and determine the information type of the SMS data information based on the target semantics of the key information fragments;

缓存空间确定模块,用于基于信息类型确定短信数据信息对应的目标缓存空间,并提取目标缓存空间的容量信息,且基于容量信息确定目标缓存空间的第一剩余可用空间容量;A cache space determination module, used to determine a target cache space corresponding to the SMS data information based on the information type, extract capacity information of the target cache space, and determine a first remaining available space capacity of the target cache space based on the capacity information;

所述缓存空间确定模块,用于获取短信数据信息的数据长度,且当第一剩余可用空间容量大于数据长度时,对短信数据信息进行聚类,得到短信数据信息对应的子数据类型集合,并对每一子数据类型设定类型标识;The cache space determination module is used to obtain the data length of the SMS data information, and when the first remaining available space capacity is greater than the data length, cluster the SMS data information to obtain a set of sub-data types corresponding to the SMS data information, and set a type identifier for each sub-data type;

缓存空间划分模块,用于基于类型标识将目标缓存空间进行第一区块划分,并对划分后的子目标缓存空间添加块标识,同时,将每一子目标缓存空间进行第二划分,得到每一子目标缓存空间对应的第一存储条目和第二存储条目,其中,块标识与类型标识相对应;a cache space division module, for dividing the target cache space into first blocks based on the type identifier, and adding block identifiers to the divided sub-target cache spaces, and at the same time, performing a second division on each sub-target cache space to obtain a first storage entry and a second storage entry corresponding to each sub-target cache space, wherein the block identifier corresponds to the type identifier;

数据缓存模块,用于基于类型标识分别提取每一子数据类型对应的短信数据信息的目标内容,并将类型标识以及目标内容分别缓存至第一存储条目和第二存储条目;A data cache module, used to extract the target content of the SMS data information corresponding to each sub-data type based on the type identifier, and cache the type identifier and the target content to the first storage entry and the second storage entry respectively;

数据更新模块,用于实时监测短信数据信息读取操作,并当检测到对短信数据信息进行读取时,基于读取进程确定对短信数据信息实时读取量,且基于读取量确定目标缓存空间中剩余短信数据信息的数据尾部;The data update module is used to monitor the reading operation of the SMS data information in real time, and when the reading of the SMS data information is detected, determine the real-time reading amount of the SMS data information based on the reading process, and determine the data tail of the remaining SMS data information in the target cache space based on the reading amount;

空间更新模块,用于将预设游标指向移动至目标缓存空间中的短信数据信息的尾部,并基于移动结果确定目标缓存空间的第二剩余可用空间容量,且基于预设游标指向对目标缓存空间的第二剩余可用空间容量进行指示。The space update module is used to move the preset cursor to the tail of the SMS data information in the target cache space, determine the second remaining available space capacity of the target cache space based on the movement result, and indicate the second remaining available space capacity of the target cache space based on the preset cursor.

优选的,S1中,通过网关端口将短信数据信息进行采集,包括:Preferably, in S1, the SMS data information is collected through the gateway port, including:

基于网关端口确定短信数据信息进行采集的数据包总个数,并对短信数据信息进行完整性校验,基于校验结果计算网关端口接收到短信数据信息的完整指数;Determine the total number of data packets collected by the SMS data information based on the gateway port, perform integrity check on the SMS data information, and calculate the integrity index of the SMS data information received by the gateway port based on the check result;

;

其中,表示网关端口接收到短信数据信息的完整指数;表示未通过完整性校验的数据包个数;表示数据包总个数;in, Indicates the complete index of the SMS data information received by the gateway port; Indicates the number of data packets that failed the integrity check; Indicates the total number of data packets;

将通过完整性校验的数据包对应的短信数据信息映射至网关端口的存储空间内,并根据映射结果计算网关端口对短信数据信息进行接收的安全指数;Map the SMS data information corresponding to the data packet that has passed the integrity check to the storage space of the gateway port, and calculate the security index of the gateway port for receiving the SMS data information based on the mapping result;

;

其中,表示网关端口对短信数据信息进行接收的安全指数;表示数据映射均匀度因子;表示短信数据信息进行映射时数据的未丢失概率;表示短信数据信息在存储空间内的当前映射长度;表示存储空间的最小长度;表示存储空间的最大长度;表示以2为底的对数;in, Indicates the security index of the gateway port receiving SMS data information; Represents the data mapping uniformity factor; Indicates the probability of no data loss when SMS data information is mapped; Indicates the current mapping length of SMS data information in the storage space; Indicates the minimum length of storage space; Indicates the maximum length of the storage space; represents the logarithm with base 2;

基于网关端口接收到短信数据信息的完整指数以及网关端口对短信数据信息进行接收的安全指数,对网关端口采集到短信数据信息的质量进行评估,并获得评估分值;Based on the integrity index of the SMS data information received by the gateway port and the security index of the SMS data information received by the gateway port, the quality of the SMS data information collected by the gateway port is evaluated and an evaluation score is obtained;

将评估分值与设定阈值进行比较,判断网关端口采集到短信数据信息是否合格;Compare the evaluation score with the set threshold to determine whether the SMS data information collected by the gateway port is qualified;

当评估分值等于或大于设定分值时,则判定网关端口采集到短信数据信息合格;When the evaluation score is equal to or greater than the set score, it is determined that the SMS data information collected by the gateway port is qualified;

否则,则判定网关端口采集到短信数据信息不合格,并进行报警操作。Otherwise, it is determined that the SMS data information collected by the gateway port is unqualified and an alarm operation is performed.

与现有技术相比,本发明的有益效果如下:Compared with the prior art, the present invention has the following beneficial effects:

1.本发明提供一种具有数据安全机制的短信服务系统及其方法,根据流量变动情况评估出每个网络层的重要度,及时的关注流量的变化,可以避免流量过大导致的流量爆炸,再通过采集的短信数据将其与传输成功的历史数据进行解析,并确定其完整性和安全性,再根据完整性和安全性对数据的威胁风险指数和漏洞风险指数进行评估,利用预设风险评估体系计算出该数据接收终端的安全性指数,根据安全性指数筛选出安全数据接收终端和风险数据接收终端,根据安全数据接收终端和风险数据接收终端获取共享数据传输通道中的多个汇聚节点,确定每个汇聚节点的单次最大汇集数据量,利用所述共享数据传输通道接收所述风险数据接收终端发送的第二数据,风险数据筛选出来后可以有效的提高数据的安全性。1. The present invention provides a short message service system and method with a data security mechanism. The importance of each network layer is evaluated according to the traffic change situation, and the traffic change is paid attention to in time, so as to avoid the traffic explosion caused by excessive traffic. Then, the collected short message data is analyzed with the historical data of successful transmission to determine its integrity and security. Then, the threat risk index and vulnerability risk index of the data are evaluated according to the integrity and security. The security index of the data receiving terminal is calculated by using a preset risk assessment system. The safe data receiving terminal and the risk data receiving terminal are screened out according to the security index. According to the safe data receiving terminal and the risk data receiving terminal, multiple aggregation nodes in the shared data transmission channel are obtained, and the single maximum aggregation data volume of each aggregation node is determined. The second data sent by the risk data receiving terminal is received by using the shared data transmission channel. After the risk data is screened out, the security of the data can be effectively improved.

2.本发明提供一种具有数据安全机制的短信服务系统及其方法,对周期序列和非周期序列采用不同的方式进行分析,保证对序列分析的重点和效率,将周期序列划分为相同的第一子序列进行数值判断和时间间隔进行,在保证数值满足异常要求的同时,对时间间隔也进行判断,超过预设时间间隔表示两次第一异常数值之间发生的时间较长,不能作为有效的异常数据,将所述第一异常数值和时间间隔作为第一异常数据,减少异常数据冗余性,保证得到的第一异常数据的准确性,对非周期序列首先通过一维聚类方法对所述数值序列进行聚类运算,得到多个分割点,使得分割点的划分更为准确客观,在对非周期序列划分后,同样的,对数值和异常时间间隔进行判断,最终得到为第二异常数据,保证得到的第二异常数据的准确性,最后,对第一异常数据和第二异常数据进行标注作为最终的有效异常数据,保证最终得到的有效异常数据的清晰明确和准确性,从而为实现对数据的数值进行判定和决策提供依据,便于了数据的自行判断。2. The present invention provides a short message service system and method with a data security mechanism. Different methods are used to analyze periodic sequences and non-periodic sequences to ensure the focus and efficiency of sequence analysis. The periodic sequence is divided into the same first subsequence for numerical judgment and time interval. While ensuring that the numerical value meets the abnormal requirement, the time interval is also judged. If the time interval exceeds the preset time interval, it means that the time between two first abnormal values is long and cannot be used as valid abnormal data. The first abnormal value and time interval are used as the first abnormal data to reduce the redundancy of the abnormal data and ensure the accuracy of the obtained first abnormal data. For the non-periodic sequence, the numerical sequence is first clustered by a one-dimensional clustering method to obtain multiple segmentation points, so that the division of the segmentation points is more accurate and objective. After the non-periodic sequence is divided, the numerical value and the abnormal time interval are judged in the same way, and the second abnormal data are finally obtained to ensure the accuracy of the obtained second abnormal data. Finally, the first abnormal data and the second abnormal data are marked as the final effective abnormal data to ensure the clarity and accuracy of the final effective abnormal data, thereby providing a basis for determining and making decisions on the numerical value of the data and facilitating the self-judgment of the data.

3.本发明提供一种具有数据安全机制的短信服务系统及其方法,将所有数据中的异常数据排查在外,从而可以得到有效数据,先将有效数据进行解码,将解码后的数据作为原始数据并将其划分为预设长度的待加密段,根据待加密段的数量,将加密序列作为矩阵的第一列,建立第一加密矩阵,将干扰密码依次输入到所述第二位置进行第二加密,建立第二加密矩阵,将秩密码输入到第二加密矩阵中进行第三加密,获取第三加密矩阵,并将标记后的第三加密矩阵与同型矩阵进行叠加,获取标记位置产生的叠加数;将叠加数输入到所述剩余空白位置上,获取全加密矩阵,提取第全加密矩阵中每一位置对应的数据,获取加密数据,多个加密矩阵可以最大程度的保护数据的安全性,同时也提高了整体数据的安全机制,使短信的服务端口使用更加优良。3. The present invention provides a short message service system and method with a data security mechanism, which excludes abnormal data in all data, so as to obtain valid data, first decode the valid data, use the decoded data as the original data and divide it into segments to be encrypted with a preset length, and use the encryption sequence as the first column of the matrix according to the number of segments to be encrypted, establish a first encryption matrix, input the interference password into the second position in sequence for the second encryption, establish a second encryption matrix, input the rank password into the second encryption matrix for the third encryption, obtain the third encryption matrix, and superimpose the marked third encryption matrix with the same type matrix to obtain the superposition number generated by the marked position; input the superposition number into the remaining blank position to obtain a full encryption matrix, extract the data corresponding to each position in the full encryption matrix, and obtain the encrypted data. Multiple encryption matrices can protect the security of data to the greatest extent, and also improve the overall data security mechanism, so that the service port of the short message can be used better.

4、本发明提供一种具有数据安全机制的短信服务系统及其方法,通过对短信数据信息进行分析,实现对短信数据信息的信息类型进行准确有效的确认,从而便于确定对短信数据信息进行缓存的目标缓存空间,其次,通过对短信数据信息进行聚类,并根据聚类结果实现对短信数据信息包含的不同的数据类型进行归类,且根据归类结果实现对目标缓存空间进行划分,便于将不同类型的数据在相应的存储区域进行存储,同时,将每一子目标存储空间再次进行划分,保障了对每一类型的数据内容以及类型标识的缓存效果以及缓存准确率,最终,将不同类型的数据在对应的子目标缓存空间进行缓存,且实时监测对短信数据信息的读取操作,且在存在读取操作后,实时确定目标缓存空间的剩余可用空间容量,并通过预设游标指向进行指示,保障了对短信数据信息的缓存效果,也提高了短信数据信息的安全系数。4. The present invention provides a short message service system and method with a data security mechanism. By analyzing the short message data information, the information type of the short message data information can be accurately and effectively confirmed, so as to facilitate the determination of the target cache space for caching the short message data information. Secondly, by clustering the short message data information, and classifying the different data types contained in the short message data information according to the clustering results, and dividing the target cache space according to the classification results, it is convenient to store different types of data in corresponding storage areas. At the same time, each sub-target storage space is divided again to ensure the cache effect and cache accuracy of each type of data content and type identifier. Finally, different types of data are cached in the corresponding sub-target cache space, and the reading operation of the short message data information is monitored in real time. After the reading operation, the remaining available space capacity of the target cache space is determined in real time, and indicated by a preset cursor pointing, thereby ensuring the cache effect of the short message data information and improving the security factor of the short message data information.

5、本发明提供一种具有数据安全机制的短信服务系统及其方法,通过计算网关端口接收到短信数据信息的完整指数以及网关端口对短信数据信息进行接收的安全指数,从而有效衡量网关端口采集到短信数据信息是否合格,进而及时掌握采集到的短信数据信息质量。5. The present invention provides a text message service system and method with a data security mechanism. By calculating the integrity index of the text message data information received by the gateway port and the security index of the text message data information received by the gateway port, it is effectively measured whether the text message data information collected by the gateway port is qualified, and then the quality of the collected text message data information is timely grasped.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为本发明的整体方法流程示意图;FIG1 is a schematic diagram of the overall method flow of the present invention;

图2为本发明的整体系统示意图。FIG. 2 is a schematic diagram of the overall system of the present invention.

具体实施方式DETAILED DESCRIPTION

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.

为了解决现有技术中,在对短信数据进行接收时没有对数据传输时的流量变动进行有效的评估,流量过大容易造成传输时的流量爆炸,在数据进行传输时,没有利用历史成功数据对现有数据进行解析,同时对于数据中的异常数据没有及时的进行风险排查,从而造成数据的完整性和安全性降低的问题,请参阅图1和图2,本实施例提供以下技术方案:In order to solve the problem in the prior art that when receiving SMS data, the traffic change during data transmission is not effectively evaluated, and excessive traffic easily causes traffic explosion during transmission. When data is transmitted, the existing data is not analyzed using historical successful data, and the abnormal data in the data is not promptly checked for risks, thereby reducing the integrity and security of the data, please refer to Figures 1 and 2. This embodiment provides the following technical solutions:

一种具有数据安全机制的短信服务方法,所述方法包括如下步骤:A short message service method with a data security mechanism, the method comprising the following steps:

S1:短信数据采集:通过网关端口将短信数据信息进行采集,并将将采集的短信数据进行独立存储;S1: SMS data collection: collect SMS data information through the gateway port and store the collected SMS data independently;

S2:数据缓存提取:将独立存储的短信数据信息进行缓存,并且提取缓存数据中的风险数据;S2: Data cache extraction: cache the independently stored SMS data information and extract the risk data in the cache data;

S3:风险数据读取计算:将提取出的风险数据进行数据读取,并且将异常数据与正常范围值内的数据进行差别计算;S3: Risk data reading and calculation: the extracted risk data is read, and the difference between abnormal data and data within the normal range is calculated;

S4:差别数据读取:将差别计算完成的序列数据进行读取与分析,并将分析的数据进行有效数据整合;S4: Differential data reading: Read and analyze the sequence data after differential calculation, and perform effective data integration on the analyzed data;

S5:有效数据加密:将有效数据进行加密处理,并将加密完成的数据进行优先启动。S5: Valid data encryption: Encrypt valid data and start the encrypted data first.

所述短信数据采集,还包括:信息数据采集系统,用于:获取每个数据接收终端的网络层在传输数据时的流量变动情况;根据每个数据接收终端的网络层在传输数据时的流量变动情况评估出每个网络层的重要度;将每个数据接收终端重要度大于等于预设阈值的目标网络层进行统计;获取每个数据接收终端的历史传输成功数据。The SMS data collection also includes: an information data collection system, which is used to: obtain the traffic changes of the network layer of each data receiving terminal when transmitting data; evaluate the importance of each network layer based on the traffic changes of the network layer of each data receiving terminal when transmitting data; count the target network layers whose importance of each data receiving terminal is greater than or equal to a preset threshold; and obtain the historical transmission success data of each data receiving terminal.

所述采集完成的风险数据读取,还包括:异常数据分析单元,用于:根据信息数据采集系统中获取的每个数据接收终端的历史传输成功数据;解析所述历史传输成功数据确定其完整性和安全性,根据所述完整性和安全性评估出该数据接收终端的威胁风险指数和漏洞风险指数;根据每个数据接收终端的目标网络层的工作强度和该数据接收终端的威胁风险指数和漏洞风险指数利用预设风险评估体系计算出该数据接收终端的安全性指数;根据每个数据接收终端的安全性指数筛选出安全数据接收终端和风险数据接收终端;接收所述安全数据接收终端发送的第一数据;获取所述风险数据接收终端的配置信息和网络信息;根据所述网络信息构建风险数据接收终端的共享数据传输通道;获取所述共享数据传输通道中的多个汇聚节点,确定每个汇聚节点的单次最大汇集数据量;确定所述风险数据接收终端的第二数据中数据量最大的目标第二数据;根据所述目标第二数据和共享数据传输通道中每个汇聚节点的数据最大汇集数据量计算出共享数据传输通道的目标数据传输效率;设置所述共享数据传输通道的数据传输效率为所述目标数据传输效率,设置完毕后,利用所述共享数据传输通道接收所述风险数据接收终端发送的第二数据。The risk data reading after the collection also includes: an abnormal data analysis unit, which is used to: according to the historical transmission success data of each data receiving terminal obtained in the information data collection system; analyze the historical transmission success data to determine its integrity and security, and evaluate the threat risk index and vulnerability risk index of the data receiving terminal according to the integrity and security; calculate the security index of the data receiving terminal according to the working intensity of the target network layer of each data receiving terminal and the threat risk index and vulnerability risk index of the data receiving terminal using a preset risk assessment system; screen out safe data receiving terminals and risky data receiving terminals according to the security index of each data receiving terminal; receive the first data sent by the safe data receiving terminal; Acquire the configuration information and network information of the risk data receiving terminal; construct a shared data transmission channel of the risk data receiving terminal according to the network information; acquire multiple aggregation nodes in the shared data transmission channel, and determine the single maximum aggregated data volume of each aggregation node; determine the target second data with the largest data volume among the second data of the risk data receiving terminal; calculate the target data transmission efficiency of the shared data transmission channel according to the target second data and the maximum aggregated data volume of the data of each aggregation node in the shared data transmission channel; set the data transmission efficiency of the shared data transmission channel to the target data transmission efficiency. After the setting is completed, use the shared data transmission channel to receive the second data sent by the risk data receiving terminal.

具体的,先通过网关端口将传输来的短信数据信息进采集,在采集的同时获取每个数据接收终端的网络层在传输数据时的流量变动情况,再根据流量变动情况评估出每个网络层的重要度,及时的关注流量的变化,可以避免流量过大导致的流量爆炸,再通过采集的短信数据将其与传输成功的历史数据进行解析,并确定其完整性和安全性,再根据完整性和安全性对数据的威胁风险指数和漏洞风险指数进行评估,利用预设风险评估体系计算出该数据接收终端的安全性指数,根据安全性指数筛选出安全数据接收终端和风险数据接收终端,根据安全数据接收终端和风险数据接收终端获取共享数据传输通道中的多个汇聚节点,确定每个汇聚节点的单次最大汇集数据量,利用所述共享数据传输通道接收所述风险数据接收终端发送的第二数据,风险数据筛选出来后可以有效的提高数据的安全性。Specifically, the transmitted SMS data information is first collected through the gateway port, and the traffic changes of the network layer of each data receiving terminal during data transmission are obtained during the collection. Then, the importance of each network layer is evaluated according to the traffic changes. Timely attention to traffic changes can avoid traffic explosions caused by excessive traffic. The collected SMS data is then analyzed with the historical data of successful transmission, and its integrity and security are determined. Then, the threat risk index and vulnerability risk index of the data are evaluated based on the integrity and security. The security index of the data receiving terminal is calculated using a preset risk assessment system, and safe data receiving terminals and risky data receiving terminals are screened out based on the security index. Based on the safe data receiving terminals and risky data receiving terminals, multiple aggregation nodes in the shared data transmission channel are obtained, and the single maximum aggregated data volume of each aggregation node is determined. The shared data transmission channel is used to receive the second data sent by the risky data receiving terminal. After the risky data is screened out, the security of the data can be effectively improved.

为了解决现有技术中,在对异常数据进行接收后,没有对异常数据进行比较,从而倒是异常数据冗余性的增加,同时没有对异常数据进行及时的判断,从而导致数据的准确性降低的问题,请参阅图1和图2,本实施例提供以下技术方案:In order to solve the problem in the prior art that after receiving abnormal data, the abnormal data is not compared, thereby increasing the redundancy of the abnormal data, and failing to make a timely judgment on the abnormal data, thereby reducing the accuracy of the data, please refer to FIG. 1 and FIG. 2 , this embodiment provides the following technical solutions:

所述异常数据与正常范围值内的数据差别计算,还包括:差别计算模块,用于:获取风险数据后将风险数据转换为具体数值,再将风险数据的数据与正常范围内的数据数值进行差别计算;判断模块,用于获取所述数据差别计算的数值序列,对所述数值序列进行周期性检测,判断所述数值序列是否为周期序列;分析模块,用于当确定所述数值序列为周期序列后,对所述数值序列按照周期进行分割得到多组相同的第一子序列,判断所述第一子序列中的全部数值是否大于预设数值,若是,提取出所述第一子序列中大于预设数值的第一异常数值,并确定所述第一异常数值之间相邻的时间间隔,并判断所述时间间隔是否在预设时间间隔范围内,若是,将所述第一异常数值和时间间隔作为第一异常数据,否则,确定所述第一异常数值无效;所述分析模块,还用于当确定所述数值序列为非周期序列后,利用一维聚类方法对所述数值序列进行聚类运算,得到多个分割点,并利用所述多个分割点对所述数值序列进行划分,得到多组不同的第二子序列,从所述第二子序列中获取存在大于预设数值的第三子序列,并基于第三子序列在所述数值序列中的位置,确定所述第三子序列的异常时间间隔,并从获取相邻的第三子序列的异常时间间隔在所述预设时间间隔范围内的第四子序列,且将所述第四子序列和异常时间间隔作为第二异常数据;数据整合模块,用于将所述第一异常数据进行周期标注,得到第一有效异常数据,对所述第二异常数据进行非周期标注,得到第二有效异常数据,将所述第一有效异常数据和第二有效异常数据作为最终的有效异常数据进行独立存储,并不将其数据发送至下一读取模块。The calculation of the difference between the abnormal data and the data within the normal range also includes: a difference calculation module, which is used to: after obtaining the risk data, convert the risk data into a specific numerical value, and then perform a difference calculation between the risk data and the data value within the normal range; a judgment module, which is used to obtain the numerical sequence of the data difference calculation, perform periodic detection on the numerical sequence, and judge whether the numerical sequence is a periodic sequence; an analysis module, which is used to divide the numerical sequence according to the period to obtain multiple groups of identical first subsequences after determining that the numerical sequence is a periodic sequence, and judge whether all the numerical values in the first subsequence are greater than a preset numerical value. If so, extract the first abnormal numerical value in the first subsequence that is greater than the preset numerical value, and determine the adjacent time intervals between the first abnormal numerical values, and judge whether the time interval is within the preset time interval range. If so, use the first abnormal numerical value and the time interval as the first abnormal data, otherwise, determine that the first abnormal numerical value is invalid; the analysis module , and is also used for, after determining that the numerical sequence is a non-periodic sequence, using a one-dimensional clustering method to perform a clustering operation on the numerical sequence to obtain multiple segmentation points, and using the multiple segmentation points to divide the numerical sequence to obtain multiple groups of different second subsequences, obtaining a third subsequence with a value greater than a preset value from the second subsequence, and determining the abnormal time interval of the third subsequence based on the position of the third subsequence in the numerical sequence, and obtaining a fourth subsequence whose abnormal time interval of the adjacent third subsequence is within the preset time interval range, and using the fourth subsequence and the abnormal time interval as second abnormal data; a data integration module, used for periodically marking the first abnormal data to obtain first valid abnormal data, non-periodically marking the second abnormal data to obtain second valid abnormal data, and independently storing the first valid abnormal data and the second valid abnormal data as final valid abnormal data, and not sending their data to the next reading module.

具体的,首先将数值序列进行周期性判断,对周期序列和非周期序列采用不同的方式进行分析,保证对序列分析的重点和效率,将周期序列划分为相同的第一子序列进行数值判断和时间间隔进行,在保证数值满足异常要求的同时,对时间间隔也进行判断,超过预设时间间隔表示两次第一异常数值之间发生的时间较长,不能作为有效的异常数据,将所述第一异常数值和时间间隔作为第一异常数据,减少异常数据冗余性,保证得到的第一异常数据的准确性,对非周期序列首先通过一维聚类方法对所述数值序列进行聚类运算,得到多个分割点,使得分割点的划分更为准确客观,在对非周期序列划分后,同样的,对数值和异常时间间隔进行判断,最终得到为第二异常数据,保证得到的第二异常数据的准确性,最后,对第一异常数据和第二异常数据进行标注作为最终的有效异常数据,保证最终得到的有效异常数据的清晰明确和准确性,从而为实现对数据的数值进行判定和决策提供依据,便于了数据的自行判断。Specifically, firstly, the periodicity of the numerical sequence is judged, and different methods are used to analyze the periodic sequence and the non-periodic sequence to ensure the focus and efficiency of the sequence analysis. The periodic sequence is divided into the same first subsequence for numerical judgment and time interval. While ensuring that the numerical value meets the abnormal requirement, the time interval is also judged. If the time interval exceeds the preset time interval, it means that the time between two first abnormal values is long and cannot be used as valid abnormal data. The first abnormal value and time interval are used as the first abnormal data to reduce the redundancy of the abnormal data and ensure the accuracy of the obtained first abnormal data. For the non-periodic sequence, the numerical sequence is first clustered by a one-dimensional clustering method to obtain multiple segmentation points, so that the division of the segmentation points is more accurate and objective. After the non-periodic sequence is divided, the numerical value and the abnormal time interval are judged in the same way, and the second abnormal data are finally obtained to ensure the accuracy of the obtained second abnormal data. Finally, the first abnormal data and the second abnormal data are marked as the final effective abnormal data to ensure the clarity and accuracy of the final effective abnormal data, thereby providing a basis for determining and making decisions on the numerical value of the data and facilitating the self-judgment of the data.

为了解决现有技术中,异常数据和有效数据没有进行区分,导致在进行加密时,将异常数据也同时进行了加密,导致了加密后的存储量过大的问题,请参阅图1和图2,本实施例提供以下技术方案:In order to solve the problem in the prior art that abnormal data and valid data are not distinguished, resulting in the abnormal data being encrypted at the same time during encryption, resulting in an excessive amount of encrypted storage, please refer to Figures 1 and 2, this embodiment provides the following technical solutions:

所述有效数据读取和加密,还包括:有效数据读取模块,用于:基于数据整合模块中的第一有效异常数据和第二有效异常数据作为最终的有效异常数据进行数据为基准进行排查,将排查完成其他数据作为有效数据;数据解码加密模块,用于:将有效数据进行解码,并且将解码后的数据作为原始数据并将其划分为预设长度的待加密段,基于所述待加密段建立加密序列;根据所述待加密段的数量,将所述加密序列作为矩阵的第一列,建立第一加密矩阵;基于预设干扰因子调节每一待加密段在所述第一加密矩阵对应行上的第一位置,调节完毕后对其进行第一加密;基于所述干扰次数在预设密码集中获取对应的干扰密码,同时利用加密骰子掷出随机数;在所述第一加密矩阵的每一行中标记与所述第一位置相隔随机数的第二位置;将所述干扰密码依次输入到所述第二位置进行第二加密,建立第二加密矩阵;当所述第二加密矩阵中的空白位置的第一数量大于非空白位置的第二数量时,确定当前加密程度不足;依次剔除所述第二矩阵的最外围位置,生成若干个子加密矩阵;分别计算每一子加密矩阵的加密秩,基于所有的加密秩生成秩密码;将所述秩密码输入到所述第二加密矩阵中进行第三加密,获取第三加密矩阵;基于所述第三加密矩阵的规格,随机生成一个同型矩阵;在所述第三加密矩阵上标记剩余空白位置,并将标记后的所述第三加密矩阵与所述同型矩阵进行叠加,获取标记位置产生的叠加数;将所述叠加数输入到所述剩余空白位置上,获取全加密矩阵;提取所述第全加密矩阵中每一位置对应的数据,获取加密数据。The effective data reading and encryption also includes: an effective data reading module, which is used to: perform data screening based on the first effective abnormal data and the second effective abnormal data in the data integration module as the final effective abnormal data, and take other data after screening as effective data; a data decoding and encryption module, which is used to: decode the effective data, and use the decoded data as the original data and divide it into segments to be encrypted of a preset length, and establish an encryption sequence based on the segments to be encrypted; according to the number of segments to be encrypted, use the encryption sequence as the first column of the matrix to establish a first encryption matrix; adjust the first position of each segment to be encrypted on the corresponding row of the first encryption matrix based on a preset interference factor, and perform a first encryption on it after the adjustment is completed; obtain the corresponding interference password in the preset password set based on the number of interferences, and use the encryption dice to roll a random number; mark the random number separated from the first position in each row of the first encryption matrix. the second position of the encryption matrix; inputting the interference password into the second position in turn for second encryption to establish a second encryption matrix; when the first number of blank positions in the second encryption matrix is greater than the second number of non-blank positions, determining that the current encryption level is insufficient; removing the outermost positions of the second matrix in turn to generate a number of sub-encryption matrices; calculating the encryption rank of each sub-encryption matrix respectively, and generating a rank password based on all encryption ranks; inputting the rank password into the second encryption matrix for third encryption to obtain a third encryption matrix; based on the specifications of the third encryption matrix, randomly generating a homogeneous matrix; marking the remaining blank positions on the third encryption matrix, and superimposing the marked third encryption matrix with the homogeneous matrix to obtain the superposition number generated by the marked position; inputting the superposition number into the remaining blank positions to obtain a full encryption matrix; extracting the data corresponding to each position in the full encryption matrix to obtain encrypted data.

具体的,先将异常数据作为基准,再将所有数据中的异常数据排查在外,从而可以得到有效数据,先将有效数据进行解码,将解码后的数据作为原始数据并将其划分为预设长度的待加密段,根据待加密段的数量,将加密序列作为矩阵的第一列,建立第一加密矩阵,将干扰密码依次输入到所述第二位置进行第二加密,建立第二加密矩阵,将秩密码输入到第二加密矩阵中进行第三加密,获取第三加密矩阵,并将标记后的第三加密矩阵与同型矩阵进行叠加,获取标记位置产生的叠加数;将叠加数输入到所述剩余空白位置上,获取全加密矩阵,提取第全加密矩阵中每一位置对应的数据,获取加密数据,多个加密矩阵可以最大程度的保护数据的安全性,同时也提高了整体数据的安全机制,使短信的服务端口使用更加优良。Specifically, the abnormal data is first used as a benchmark, and then the abnormal data in all the data is excluded, so that valid data can be obtained, the valid data is first decoded, and the decoded data is used as the original data and divided into segments to be encrypted with a preset length. According to the number of segments to be encrypted, the encryption sequence is used as the first column of the matrix to establish a first encryption matrix, and the interference password is input into the second position in sequence for the second encryption to establish a second encryption matrix, and the rank password is input into the second encryption matrix for the third encryption to obtain the third encryption matrix, and the marked third encryption matrix is superimposed with the same type matrix to obtain the superposition number generated by the marked position; the superposition number is input into the remaining blank position to obtain a full encryption matrix, and the data corresponding to each position in the full encryption matrix is extracted to obtain encrypted data. Multiple encryption matrices can protect the security of data to the greatest extent, and also improve the overall data security mechanism, so that the service port of SMS can be used better.

具体的,对数据进行缓存,包括:Specifically, data is cached, including:

数据调取模块,用于获取独立存储的短信数据信息,并提取短信数据信息的关键信息片段,且基于关键信息片段的目标语义确定短信数据信息的信息类型;A data retrieval module is used to obtain independently stored SMS data information, extract key information fragments of the SMS data information, and determine the information type of the SMS data information based on the target semantics of the key information fragments;

缓存空间确定模块,用于基于信息类型确定短信数据信息对应的目标缓存空间,并提取目标缓存空间的容量信息,且基于容量信息确定目标缓存空间的第一剩余可用空间容量;A cache space determination module, used to determine a target cache space corresponding to the SMS data information based on the information type, extract capacity information of the target cache space, and determine a first remaining available space capacity of the target cache space based on the capacity information;

所述缓存空间确定模块,用于获取短信数据信息的数据长度,且当第一剩余可用空间容量大于数据长度时,对短信数据信息进行聚类,得到短信数据信息对应的子数据类型集合,并对每一子数据类型设定类型标识;The cache space determination module is used to obtain the data length of the SMS data information, and when the first remaining available space capacity is greater than the data length, cluster the SMS data information to obtain a set of sub-data types corresponding to the SMS data information, and set a type identifier for each sub-data type;

缓存空间划分模块,用于基于类型标识将目标缓存空间进行第一区块划分,并对划分后的子目标缓存空间添加块标识,同时,将每一子目标缓存空间进行第二划分,得到每一子目标缓存空间对应的第一存储条目和第二存储条目,其中,块标识与类型标识相对应;a cache space division module, for dividing the target cache space into first blocks based on the type identifier, and adding block identifiers to the divided sub-target cache spaces, and at the same time, performing a second division on each sub-target cache space to obtain a first storage entry and a second storage entry corresponding to each sub-target cache space, wherein the block identifier corresponds to the type identifier;

数据缓存模块,用于基于类型标识分别提取每一子数据类型对应的短信数据信息的目标内容,并将类型标识以及目标内容分别缓存至第一存储条目和第二存储条目;A data cache module, used to extract the target content of the SMS data information corresponding to each sub-data type based on the type identifier, and cache the type identifier and the target content to the first storage entry and the second storage entry respectively;

数据更新模块,用于实时监测短信数据信息读取操作,并当检测到对短信数据信息进行读取时,基于读取进程确定对短信数据信息实时读取量,且基于读取量确定目标缓存空间中剩余短信数据信息的数据尾部;The data update module is used to monitor the reading operation of the SMS data information in real time, and when the reading of the SMS data information is detected, determine the real-time reading amount of the SMS data information based on the reading process, and determine the data tail of the remaining SMS data information in the target cache space based on the reading amount;

空间更新模块,用于将预设游标指向移动至目标缓存空间中的短信数据信息的尾部,并基于移动结果确定目标缓存空间的第二剩余可用空间容量,且基于预设游标指向对目标缓存空间的第二剩余可用空间容量进行指示。The space update module is used to move the preset cursor to the tail of the SMS data information in the target cache space, determine the second remaining available space capacity of the target cache space based on the movement result, and indicate the second remaining available space capacity of the target cache space based on the preset cursor.

该实施例中,关键信息片段可以是能够表征短信数据信息的数据内容的某一数据段。In this embodiment, the key information segment may be a data segment that can represent the data content of the SMS data information.

该实施例中,目标语义可以是关键信息片段表征的主旨内容,即表征短信数据信息的具体内容表达。In this embodiment, the target semantics may be the main content represented by the key information fragment, that is, the specific content expression representing the SMS data information.

该实施例中,目标缓存空间可以是适用于对当前类型的短信数据信息进行缓存的空间。In this embodiment, the target cache space may be a space suitable for caching SMS data information of the current type.

该实施例中,第一剩余可用空间容量可以是目标缓存空间在对短信数据信息进行存储前剩余的存储空间。In this embodiment, the first remaining available space capacity may be the remaining storage space of the target cache space before storing the SMS data information.

该实施例中,短信数据信息的数据长度可以是短信数据信息的数据字节量,用于表征短信数据信息的需要的存储空间。In this embodiment, the data length of the SMS data information may be the amount of data bytes of the SMS data information, which is used to represent the required storage space of the SMS data information.

该实施例中,对短信数据信息进行聚类的目的是将同一类型的数据进行归类,从而实现对短信数据信息各类型的数据进行分类。In this embodiment, the purpose of clustering the SMS data information is to classify the data of the same type, thereby achieving classification of data of different types of the SMS data information.

该实施例中,子数据类型集合可以是将短信数据信息进行分类后得到的不同数据类型的数据集合。In this embodiment, the sub-data type set may be a data set of different data types obtained by classifying the SMS data information.

该实施例中,类型标识可以是用于标记不同类型数据的一种标记标签。In this embodiment, the type identifier may be a marking tag used to mark different types of data.

该实施例中,第一区块划分可以是将目标缓存空间根据待存储的数据类型种类将目标缓存空间划分成对应的存储区域。In this embodiment, the first block division may be to divide the target cache space into corresponding storage areas according to the type of data to be stored.

该实施例中,子目标缓存空间可以是对目标缓存空间进行划分后得到的不同的存储区域。In this embodiment, the sub-target cache space may be different storage areas obtained by dividing the target cache space.

该实施例中,块标识可以是用于标记不同子目标缓存空间的存储类型的一种标记标签,与类型标识相对应。In this embodiment, the block identifier may be a marking tag used to mark the storage types of different sub-target cache spaces, corresponding to the type identifier.

该实施例中,第二划分可以是将每一子目标缓存空间进行划分,分别用于存储具体的数据内容以及数据标识。In this embodiment, the second division may be to divide each sub-target cache space into two parts, one for storing specific data content and the other for storing data identifiers.

该实施例中,第一存储条目和第二存储条目可以是对子目标缓存空间进行划分后得到的存储区域,分别存储类型标识以及目标内容。In this embodiment, the first storage entry and the second storage entry may be storage areas obtained by dividing the sub-target cache space, and store the type identifier and the target content respectively.

该实施例中,目标内容可以是每一子数据类型对应的短信数据信息的具体数据取值以及内容表达。In this embodiment, the target content may be the specific data value and content expression of the SMS data information corresponding to each sub-data type.

该实施例中,实时读取量可以是对目标缓存空间中缓存的短信数据信息进行读取的数据量。In this embodiment, the real-time read amount may be the amount of data read from the SMS data information cached in the target cache space.

该实施例中,数据尾部可以是目标缓存空间中剩余短信数据信息的最后一个字节。In this embodiment, the data tail may be the last byte of the remaining SMS data information in the target cache space.

该实施例中,预设游标指向是提前设定好的,用于指示短信数据信息在牧宝缓存空间中的当前位置情况。In this embodiment, the preset cursor pointing is set in advance and is used to indicate the current position of the SMS data information in the Mubao cache space.

该实施例中,第二剩余可用空间容量可以是对目标缓存空间中的短信数据信息进行部分读取后,目标缓存空间剩余的可用存储容量。In this embodiment, the second remaining available space capacity may be the remaining available storage capacity of the target cache space after partially reading the SMS data information in the target cache space.

上述技术方案的工作原理及有益效果是:通过对短信数据信息进行分析,实现对短信数据信息的信息类型进行准确有效的确认,从而便于确定对短信数据信息进行缓存的目标缓存空间,其次,通过对短信数据信息进行聚类,并根据聚类结果实现对短信数据信息包含的不同的数据类型进行归类,且根据归类结果实现对目标缓存空间进行划分,便于将不同类型的数据在相应的存储区域进行存储,同时,将每一子目标存储空间再次进行划分,保障了对每一类型的数据内容以及类型标识的缓存效果以及缓存准确率,最终,将不同类型的数据在对应的子目标缓存空间进行缓存,且实时监测对短信数据信息的读取操作,且在存在读取操作后,实时确定目标缓存空间的剩余可用空间容量,并通过预设游标指向进行指示,保障了对短信数据信息的缓存效果,也提高了短信数据信息的安全系数。The working principle and beneficial effects of the above technical solution are: by analyzing the SMS data information, the information type of the SMS data information can be accurately and effectively confirmed, so as to facilitate the determination of the target cache space for caching the SMS data information; secondly, by clustering the SMS data information, and classifying the different data types contained in the SMS data information according to the clustering results, and dividing the target cache space according to the classification results, it is convenient to store different types of data in corresponding storage areas; at the same time, each sub-target storage space is divided again to ensure the cache effect and cache accuracy of each type of data content and type identification; finally, different types of data are cached in the corresponding sub-target cache space, and the reading operation of the SMS data information is monitored in real time; after the reading operation, the remaining available space capacity of the target cache space is determined in real time, and indicated by a preset cursor pointing, thereby ensuring the cache effect of the SMS data information and improving the safety factor of the SMS data information.

具体的,S1中,通过网关端口将短信数据信息进行采集,包括:Specifically, in S1, SMS data information is collected through the gateway port, including:

基于网关端口确定短信数据信息进行采集的数据包总个数,并对短信数据信息进行完整性校验,基于校验结果计算网关端口接收到短信数据信息的完整指数;Determine the total number of data packets collected by the SMS data information based on the gateway port, perform integrity check on the SMS data information, and calculate the integrity index of the SMS data information received by the gateway port based on the check result;

;

其中,表示网关端口接收到短信数据信息的完整指数;表示未通过完整性校验的数据包个数;表示数据包总个数;in, Indicates the complete index of the SMS data information received by the gateway port; Indicates the number of data packets that failed the integrity check; Indicates the total number of data packets;

将通过完整性校验的数据包对应的短信数据信息映射至网关端口的存储空间内,并根据映射结果计算网关端口对短信数据信息进行接收的安全指数;Map the SMS data information corresponding to the data packet that has passed the integrity check to the storage space of the gateway port, and calculate the security index of the gateway port for receiving the SMS data information based on the mapping result;

;

其中,表示网关端口对短信数据信息进行接收的安全指数;表示数据映射均匀度因子;表示短信数据信息进行映射时数据的未丢失概率;表示短信数据信息在存储空间内的当前映射长度;表示存储空间的最小长度;表示存储空间的最大长度;表示以2为底的对数;in, Indicates the security index of the gateway port receiving SMS data information; Represents the data mapping uniformity factor; Indicates the probability of no data loss when SMS data information is mapped; Indicates the current mapping length of SMS data information in the storage space; Indicates the minimum length of storage space; Indicates the maximum length of the storage space; represents the logarithm with base 2;

基于网关端口接收到短信数据信息的完整指数以及网关端口对短信数据信息进行接收的安全指数,对网关端口采集到短信数据信息的质量进行评估,并获得评估分值;Based on the integrity index of the SMS data information received by the gateway port and the security index of the SMS data information received by the gateway port, the quality of the SMS data information collected by the gateway port is evaluated and an evaluation score is obtained;

将评估分值与设定阈值进行比较,判断网关端口采集到短信数据信息是否合格;Compare the evaluation score with the set threshold to determine whether the SMS data information collected by the gateway port is qualified;

当评估分值等于或大于设定分值时,则判定网关端口采集到短信数据信息合格;When the evaluation score is equal to or greater than the set score, it is determined that the SMS data information collected by the gateway port is qualified;

否则,则判定网关端口采集到短信数据信息不合格,并进行报警操作。Otherwise, it is determined that the SMS data information collected by the gateway port is unqualified and an alarm operation is performed.

该实施例中,存储空间的最大长度与最小长度是提前设定好的,是存储空间的存储数据量的范围,当短信数据信息在存储空间内的当前映射长度小于最小长度或者大于最大长度时,则取1。In this embodiment, the maximum length and the minimum length of the storage space are set in advance, which is the range of the storage data volume of the storage space. When the current mapping length of the SMS data information in the storage space is less than the minimum length or greater than the maximum length, Take 1.

该实施例中,设定阈值可以是提前设定好的,用来衡量网关端口采集到短信数据信息是否合格的标准。In this embodiment, the threshold value may be set in advance and is used as a standard to measure whether the SMS data information collected by the gateway port is qualified.

该实施例中,报警操作可以是灯光、声音以及振动中的一种或多种。In this embodiment, the alarm operation may be one or more of light, sound, and vibration.

上述技术方案的工作原理及有益效果是:通过计算网关端口接收到短信数据信息的完整指数以及网关端口对短信数据信息进行接收的安全指数,从而有效衡量网关端口采集到短信数据信息是否合格,进而及时掌握采集到的短信数据信息质量。The working principle and beneficial effect of the above technical solution are: by calculating the integrity index of the SMS data information received by the gateway port and the security index of the SMS data information received by the gateway port, it is effectively measured whether the SMS data information collected by the gateway port is qualified, and then the quality of the collected SMS data information is grasped in time.

需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。It should be noted that, in this article, relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any such actual relationship or order between these entities or operations. Moreover, the terms "include", "comprise" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements includes not only those elements, but also other elements not explicitly listed, or also includes elements inherent to such process, method, article or device.

尽管已经示出和描述了本发明的实施例,对于本领域的普通技术人员而言,可以理解在不脱离本发明的原理和精神的情况下可以对这些实施例进行多种变化、修改、替换和变型,本发明的范围由所附权利要求及其等同物限定。Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that various changes, modifications, substitutions and variations may be made to the embodiments without departing from the principles and spirit of the present invention, and that the scope of the present invention is defined by the appended claims and their equivalents.

Claims (6)

1. A short message service method with a data security mechanism is characterized in that: the method comprises the following steps:
S1: and (3) short message data acquisition: collecting short message data information through a gateway port, and independently storing the collected short message data;
S2: data cache extraction: caching the independently stored short message data information, and extracting risk data in the cached data;
s3: risk data reading calculation: reading the extracted risk data, and performing differential calculation on the abnormal data and the data in the normal range value;
S4: differential data reading: reading and analyzing the sequence data with the difference calculated, and integrating the analyzed data into effective data;
s5: effective data encryption: encrypting the effective data, and starting the encrypted data with priority;
Wherein the short message data acquisition further comprises:
The information data acquisition system is used for:
acquiring the flow variation condition of a network layer of each data receiving terminal when transmitting data;
According to the flow variation condition of the network layer of each data receiving terminal when transmitting data, the importance of each network layer is estimated;
Counting the target network layers with importance degrees of each data receiving terminal being greater than or equal to a preset threshold value;
acquiring historical transmission success data of each data receiving terminal;
Wherein, gather risk data reading of accomplishing still includes:
an abnormal data analysis unit configured to:
According to the historical transmission success data of each data receiving terminal acquired in the information data acquisition system;
Analyzing the historical transmission success data to determine the integrity and the safety of the data, and evaluating threat risk indexes and vulnerability risk indexes of the data receiving terminal according to the integrity and the safety;
Calculating the security index of each data receiving terminal by using a preset risk assessment system according to the working intensity of the target network layer of the data receiving terminal, the threat risk index and the vulnerability risk index of the data receiving terminal;
screening out a safe data receiving terminal and a risk data receiving terminal according to the safety index of each data receiving terminal;
Receiving first data sent by the secure data receiving terminal;
Acquiring configuration information and network information of the risk data receiving terminal;
constructing a shared data transmission channel of the risk data receiving terminal according to the network information;
Acquiring a plurality of sink nodes in the shared data transmission channel, and determining a single maximum collected data volume of each sink node;
determining target second data with the largest data quantity in the second data of the risk data receiving terminal;
calculating the target data transmission efficiency of the shared data transmission channel according to the target second data and the data maximum collected data of each sink node in the shared data transmission channel;
Setting the data transmission efficiency of the shared data transmission channel as the target data transmission efficiency, and after the setting is finished, receiving second data sent by the risk data receiving terminal by utilizing the shared data transmission channel.
2. The method for serving short messages with data security mechanism of claim 1, wherein: the data difference calculation between the abnormal data and the normal range value further comprises:
The difference calculation module is used for:
after acquiring the risk data, converting the risk data into specific values, and then performing differential calculation on the data of the risk data and the data values in a normal range;
the judging module is used for acquiring the numerical value sequence calculated by the data difference, periodically detecting the numerical value sequence and judging whether the numerical value sequence is a periodic sequence or not;
the analysis module is used for dividing the numerical sequence according to the period to obtain a plurality of groups of identical first subsequences after determining that the numerical sequence is a period sequence, judging whether all numerical values in the first subsequences are larger than a preset numerical value, if so, extracting first abnormal numerical values larger than the preset numerical value in the first subsequences, determining adjacent time intervals between the first abnormal numerical values, judging whether the time intervals are in a preset time interval range, if so, taking the first abnormal numerical values and the time intervals as first abnormal data, and otherwise, determining that the first abnormal numerical values are invalid;
The data integration module is used for marking the first abnormal data periodically to obtain first effective abnormal data, marking the second abnormal data aperiodically to obtain second effective abnormal data, and independently storing the first effective abnormal data and the second effective abnormal data as final effective abnormal data without sending the data to the next reading module.
3. The method for serving short messages with data security mechanism according to claim 2, wherein: the analysis module further comprises:
The analysis module is further configured to perform a clustering operation on the numerical sequence by using a one-dimensional clustering method after determining that the numerical sequence is an aperiodic sequence, obtain a plurality of division points, divide the numerical sequence by using the plurality of division points, obtain a plurality of groups of different second subsequences, obtain a third subsequence having a value greater than a preset value from the second subsequences, determine an abnormal time interval of the third subsequence based on a position of the third subsequence in the numerical sequence, and obtain a fourth subsequence with an abnormal time interval of an adjacent third subsequence within the preset time interval range, and use the fourth subsequence and the abnormal time interval as second abnormal data.
4. The method for serving short messages with data security mechanism according to claim 2, wherein: the effective data reading and encrypting method further comprises the following steps:
The effective data reading module is used for:
based on the first effective abnormal data and the second effective abnormal data in the data integration module, performing data as a reference to check, and taking other checked data as effective data;
the data decoding and encrypting module is used for:
Decoding effective data, taking the decoded data as original data, dividing the original data into segments to be encrypted with preset lengths, and establishing an encryption sequence based on the segments to be encrypted;
According to the number of the segments to be encrypted, taking the encryption sequence as a first column of a matrix, and establishing a first encryption matrix;
Adjusting a first position of each segment to be encrypted on a corresponding row of the first encryption matrix based on a preset interference factor, and carrying out first encryption on the segment to be encrypted after adjustment;
acquiring a corresponding interference password in a preset password set based on the interference times, and rolling out a random number by using the encrypted dice;
Marking a second location in each row of the first encryption matrix that is separated from the first location by a random number;
Sequentially inputting the interference passwords to the second position for second encryption, and establishing a second encryption matrix;
Determining that the current encryption degree is insufficient when the first number of blank positions in the second encryption matrix is greater than the second number of non-blank positions;
sequentially removing the outermost peripheral position of the second encryption matrix to generate a plurality of sub-encryption matrices;
Respectively calculating the encryption rank of each sub encryption matrix, and generating a rank password based on all the encryption ranks;
inputting the rank password into the second encryption matrix for third encryption to obtain a third encryption matrix;
Randomly generating a homotype matrix based on the specification of the third encryption matrix;
marking the residual blank positions on the third encryption matrix, and superposing the marked third encryption matrix and the homotype matrix to obtain the superposition number generated by the marked positions;
inputting the superposition number to the residual blank position to obtain a full encryption matrix;
and extracting data corresponding to each position in the full encryption matrix to obtain encrypted data.
5. The method for serving short messages with a data security mechanism of claim 1, wherein buffering the data comprises:
The data calling module is used for acquiring the independently stored short message data information, extracting key information fragments of the short message data information and determining the information type of the short message data information based on the target semantics of the key information fragments;
The buffer space determining module is used for determining a target buffer space corresponding to the short message data information based on the information type, extracting capacity information of the target buffer space and determining a first residual available space capacity of the target buffer space based on the capacity information;
the buffer space determining module is used for acquiring the data length of the short message data information, clustering the short message data information when the first residual available space capacity is larger than the data length to obtain a sub-data type set corresponding to the short message data information, and setting a type identifier for each sub-data type;
The cache space dividing module is used for dividing the target cache space into a first block based on the type identifier, adding a block identifier to the divided sub-target cache space, and simultaneously, dividing each sub-target cache space into a second block to obtain a first storage item and a second storage item corresponding to each sub-target cache space, wherein the block identifier corresponds to the type identifier;
The data caching module is used for respectively extracting target contents of the short message data information corresponding to each sub-data type based on the type identifier, and respectively caching the type identifier and the target contents into a first storage item and a second storage item;
The data updating module is used for monitoring the reading operation of the short message data information in real time, determining the real-time reading quantity of the short message data information based on the reading process when the reading of the short message data information is detected, and determining the data tail of the residual short message data information in the target cache space based on the reading quantity;
And the space updating module is used for pointing a preset cursor to the tail part of the short message data information moved to the target cache space, determining the second residual available space capacity of the target cache space based on the movement result, and indicating the second residual available space capacity of the target cache space based on the preset cursor pointing.
6. The method for short message service with data security mechanism as claimed in claim 1, wherein in S1, the collecting the short message data information through the gateway port comprises:
determining the total number of data packets acquired by the short message data information based on the gateway port, carrying out integrity check on the short message data information, and calculating the integrity index of the short message data information received by the gateway port based on the check result;
Wherein, I int represents the integrity index of the short message data information received by the gateway port; n err represents the number of data packets that fail the integrity check; n tot represents the total number of data packets;
mapping the short message data information corresponding to the data packet passing through the integrity check into a storage space of the gateway port, and calculating a security index of the gateway port for receiving the short message data information according to the mapping result;
S h represents a security index of the gateway port for receiving the short message data information; omega represents a data mapping uniformity factor; delta represents the non-lost probability of the data when the short message data information is mapped; i hash represents the current mapping length of the short message data information in the storage space; i hash-min denotes the minimum length of the storage space; i hash-max denotes the maximum length of the storage space; log 2 (·) represents the base 2 logarithm;
based on the integrity index of the short message data information received by the gateway port and the safety index of the gateway port for receiving the short message data information, evaluating the quality of the short message data information acquired by the gateway port and obtaining an evaluation value;
comparing the evaluation value with a set threshold value, and judging whether the short message data information acquired by the gateway port is qualified or not;
when the evaluation score is equal to or greater than the set score, judging that the short message data information collected by the gateway port is qualified;
otherwise, judging that the short message data information acquired by the gateway port is unqualified, and carrying out alarm operation.
CN202211516671.4A 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof Active CN115942262B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211516671.4A CN115942262B (en) 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211516671.4A CN115942262B (en) 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof

Publications (2)

Publication Number Publication Date
CN115942262A CN115942262A (en) 2023-04-07
CN115942262B true CN115942262B (en) 2024-10-29

Family

ID=86551709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211516671.4A Active CN115942262B (en) 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof

Country Status (1)

Country Link
CN (1) CN115942262B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116189896B (en) * 2023-04-24 2023-08-08 北京快舒尔医疗技术有限公司 A cloud-based early warning method and system for diabetes health data
CN116566677B (en) * 2023-05-15 2024-02-13 深圳市智联物联科技有限公司 Short message receiving and transmitting system of serial server
CN116996220B (en) * 2023-09-27 2023-12-12 无锡市锡容电力电器有限公司 Safe storage method and system for big data of power grid
CN117828644B (en) * 2024-01-05 2024-07-02 江苏商贸职业学院 Computer storage system with information security protection mode
CN117688620B (en) * 2024-01-29 2024-04-23 江苏悉宁科技有限公司 Certificate verification optimization method and system based on big data information security

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257671A (en) * 2007-07-06 2008-09-03 浙江大学 Real-time filtering method of large-scale spam text messages based on content
CN102368842A (en) * 2011-10-12 2012-03-07 中国联合网络通信集团有限公司 Detection method of abnormal behavior of mobile terminal and detection system thereof

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2478299C (en) * 2002-03-08 2012-05-22 Ciphertrust, Inc. Systems and methods for enhancing electronic communication security
US10129211B2 (en) * 2011-09-15 2018-11-13 Stephan HEATH Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms
KR101187023B1 (en) * 2012-05-11 2012-09-28 주식회사 이글루시큐리티 A network abnormal traffic analysis system
KR102255366B1 (en) * 2015-04-16 2021-05-25 한국전자통신연구원 Apparatus and method for Mobile Trusted Module based security of Short Message Service
CN108289088B (en) * 2017-01-09 2020-12-11 中国移动通信集团河北有限公司 Abnormal traffic detection system and method based on business model
CN114826691B (en) * 2022-04-02 2023-08-18 上海硕曜科技有限公司 Network information security intelligent analysis early warning management system based on multidimensional analysis
CN114997750B (en) * 2022-08-03 2022-10-25 广东知得失网络科技有限公司 A risk information push method, system, device and medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257671A (en) * 2007-07-06 2008-09-03 浙江大学 Real-time filtering method of large-scale spam text messages based on content
CN102368842A (en) * 2011-10-12 2012-03-07 中国联合网络通信集团有限公司 Detection method of abnormal behavior of mobile terminal and detection system thereof

Also Published As

Publication number Publication date
CN115942262A (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN115942262B (en) Short message service system with data security mechanism and method thereof
CN111277570A (en) Data security monitoring method and device, electronic equipment and readable medium
CN117544420B (en) Fusion system safety management method and system based on data analysis
CN111866024A (en) Network encryption traffic identification method and device
CN113645182B (en) A random forest detection method for denial of service attacks based on secondary feature screening
CN114785563B (en) Encryption malicious traffic detection method of soft voting strategy
CN117692257B (en) High-speed encryption method and device for service data of electric power Internet of things
CN117614978A (en) An information security communication management system for digital workshops
CN116881948A (en) Data encryption management system and method based on general database
CN116132199B (en) Method for processing liquid nitrogen tank monitoring data based on blockchain
CN118381672A (en) Data security dynamic protection method and system based on artificial intelligence
CN112383504A (en) Electric power thing networking block chain data management system
CN113630425B (en) A secure transmission method of financial data with multiple power subjects
CN117354024A (en) DNS malicious domain name detection system and method based on big data
CN112733188B (en) Sensitive file management method
CN118587635B (en) Adaptive video content security monitoring method and system based on deep learning
CN118018332B (en) Machine learning-based network data leakage early warning system and method thereof
CN118353670B (en) Network link state evaluation method and system for state data superposition analysis
CN114006725B (en) Network attack situation real-time sensing method for multi-level information fusion
CN118646764B (en) A unique identifier generation method and system based on blockchain
CN118631585B (en) Network data security processing method and platform
CN118740521B (en) Network attack detection system based on pattern recognition
CN114095279B (en) An encryption security analysis system of image encryption technology
CN116112289B (en) Malicious encryption traffic detection method and device
CN114726600B (en) Gateway protection method based on Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant