[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116015766A - Data safety transmission system for computer - Google Patents

Data safety transmission system for computer Download PDF

Info

Publication number
CN116015766A
CN116015766A CN202211585276.1A CN202211585276A CN116015766A CN 116015766 A CN116015766 A CN 116015766A CN 202211585276 A CN202211585276 A CN 202211585276A CN 116015766 A CN116015766 A CN 116015766A
Authority
CN
China
Prior art keywords
data
computer
value
password
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211585276.1A
Other languages
Chinese (zh)
Other versions
CN116015766B (en
Inventor
常逢佳
常逢锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaiyin Normal University
Original Assignee
Huaiyin Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaiyin Normal University filed Critical Huaiyin Normal University
Priority to CN202211585276.1A priority Critical patent/CN116015766B/en
Publication of CN116015766A publication Critical patent/CN116015766A/en
Application granted granted Critical
Publication of CN116015766B publication Critical patent/CN116015766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明属于数据传输领域,涉及数据处理技术,用于解决现有计算机的数据安全传输系统在进行数据传输加密时的加解密效率低下的问题,具体是计算机的数据安全传输系统,包括服务器,服务器通信连接有数据加密模块、数据解密模块、访问验证模块、辅助监控模块以及存储模块,数据加密模块用于对计算机传输的数据进行加密处理:将待传输的数据标记为加密对象,在数字集合中随机抽取一个数字并标记为组值n,对加密对象进行字符排序,将数据内存值按照传输数据的排列方式进行组合得到密钥;本发明可以对计算机传输的数据进行加密处理,同时根据重组逻辑生成对应的密钥,数据重组的方式提高抓包时的数据安全性。

Figure 202211585276

The invention belongs to the field of data transmission, relates to data processing technology, and is used to solve the problem of low encryption and decryption efficiency when the data transmission encryption of the existing computer data transmission system is performed. Specifically, the data security transmission system of the computer includes a server, a server The communication connection includes a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module, and a storage module. The data encryption module is used to encrypt the data transmitted by the computer: mark the data to be transmitted as an encrypted object, and in the digital collection Randomly extract a number and mark it as a group value n, sort the encrypted objects, combine the data memory values according to the arrangement of the transmitted data to obtain the key; the invention can encrypt the data transmitted by the computer, and at the same time, according to the reorganization logic The corresponding key is generated, and the data reorganization method improves the data security when capturing packets.

Figure 202211585276

Description

计算机的数据安全传输系统Computer Data Security Transmission System

技术领域technical field

本发明属于数据传输领域,涉及数据处理技术,具体是计算机的数据安全传输系统。The invention belongs to the field of data transmission, relates to data processing technology, in particular to a computer data security transmission system.

背景技术Background technique

计算机数据信息系统,主要指的是由计算机、数据存储设备、网络、相应的软件构成的,按照一定的应用目标、方法和规则来对信息数据等进行采集、加工、存储、传输及检索的人机系统;The computer data information system mainly refers to the people who collect, process, store, transmit and retrieve information data according to certain application objectives, methods and rules, which are composed of computers, data storage devices, networks and corresponding software. machine system;

现有计算机的数据安全传输系统在进行数据传输加密时需要生成非常复杂的密钥,进而导致在进行数据解密时需要耗费大量时间,加密与解密的效率低下,同时,现有计算机的数据安全传输系统无法对数据传输的外部影响因素进行监控,导致数据传输环境无法得到保证,数据传输安全性低下;The existing computer data security transmission system needs to generate a very complex key when encrypting data transmission, which leads to a lot of time-consuming data decryption and low encryption and decryption efficiency. At the same time, the existing computer data security transmission The system cannot monitor the external influencing factors of data transmission, resulting in the unguaranteed data transmission environment and low data transmission security;

针对上述技术问题,本申请提出一种解决方案。Aiming at the above technical problems, the present application proposes a solution.

发明内容Contents of the invention

本发明的目的在于提供计算机的数据安全传输系统,用于解决现有计算机的数据安全传输系统在进行数据传输加密时的加解密效率低下的问题。The object of the present invention is to provide a computer data security transmission system, which is used to solve the problem of low encryption and decryption efficiency when the existing computer data security transmission system performs data transmission encryption.

本发明需要解决的技术问题为:如何提供一种可以对数据进行高效加解密传输的数据安全传输系统。The technical problem to be solved in the present invention is: how to provide a data security transmission system capable of efficiently encrypting and decrypting transmission of data.

本发明的目的可以通过以下技术方案实现:The purpose of the present invention can be achieved through the following technical solutions:

计算机的数据安全传输系统,包括服务器,所述服务器通信连接有数据加密模块、数据解密模块、访问验证模块、辅助监控模块以及存储模块;The computer's data security transmission system includes a server, and the server is connected with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module;

所述数据加密模块用于对计算机传输的数据进行加密处理:将待传输的数据标记为加密对象,在数字集合中随机抽取一个数字并标记为组值n,对加密对象进行字符排序,由字符序号1,1+n,1+2n,…,1+xn对应的字符构成第一组传输数据,由字符2,2+n,2+2n,…,2+xn对应的字符构成第二组传输数据,以此类推,直至将加密对象分解为n组传输数据,获取每组传输数据的数据内存值,将数据内存值按照传输数据的排列方式进行组合得到密钥,由n组传输数据按照随机排列顺序生成数据包,对数据包的生成时间加盖时间戳,将密钥与数据包发送至服务器进行数据加密传输;The data encryption module is used to encrypt the data transmitted by the computer: mark the data to be transmitted as an encrypted object, randomly extract a number from the number set and mark it as a group value n, and sort the encrypted objects by character. The characters corresponding to serial numbers 1, 1+n, 1+2n, ..., 1+xn form the first group of transmission data, and the characters corresponding to characters 2, 2+n, 2+2n, ..., 2+xn form the second group Transmission data, and so on, until the encrypted object is decomposed into n groups of transmission data, the data memory value of each group of transmission data is obtained, and the data memory value is combined according to the arrangement of the transmission data to obtain the key, and the n groups of transmission data are obtained according to Generate data packets in a random order, stamp the generation time of the data packets, and send the key and data packets to the server for encrypted data transmission;

所述数据解密模块用于在数据调取时对数据进行解密处理得到原始数据,将原始数据发送至服务器,服务器接收到原始数据后将原始数据发送至访问验证模块;The data decryption module is used to decrypt the data to obtain the original data when the data is called, and send the original data to the server, and the server sends the original data to the access verification module after receiving the original data;

所述访问验证模块用于对数据调取合法性进行验证分析;The access verification module is used to verify and analyze the legality of data retrieval;

所述辅助监控模块用于对计算机的数据传输过程进行辅助监控分析,辅助监控模块包括外部监测单元与用户监测单元;所述外部监测单元用于对计算机数据传输的外部影响数据进行监测分析;所述用户监测单元用于对用户的密码习惯进行监测分析。The auxiliary monitoring module is used for auxiliary monitoring and analysis of the data transmission process of the computer, and the auxiliary monitoring module includes an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing the external influence data of the computer data transmission; The user monitoring unit is used for monitoring and analyzing the user's password habits.

作为本发明的一种优选实施方式,数据解密模块在数据调取时对数据进行解密处理的具体过程包括:将数据包中的n组传输数据按照密钥中的数据内存值进行顺序排列得到新序数据,顺序排列的过程包括:将内存值与密钥中第一个数据内存值相对应的传输数据排至第一位,将内存值与密钥中第二个数据内存值相对应的传输数据排至第二位,以此类推,直至将内存值与密钥中第n个数据内存值相对应的传输数据排至最后一位,将新序数据中的字符按照(1,1),(2,1),…,(n,1),(2,1),(2,2),…,(n,1),(n,2),…,(1,x),(2,x),…,(n,x)进行排序还原得到原始数据,其中(1,1)表示第一个传输数据的第一个字符、(n,x)表示第n个传输数据的第x个字符。As a preferred embodiment of the present invention, the specific process for the data decryption module to decrypt the data during data retrieval includes: arranging the n groups of transmission data in the data packet in order according to the data memory values in the key to obtain a new Sequential data, the process of sequential arrangement includes: arrange the transmission data whose memory value corresponds to the first data memory value in the key to the first place, and transfer the memory value corresponding to the second data memory value in the key The data is sorted to the second position, and so on, until the transmission data whose memory value corresponds to the nth data memory value in the key is sorted to the last position, and the characters in the new sequence data are arranged according to (1, 1), (2,1),...,(n,1),(2,1),(2,2),...,(n,1),(n,2),...,(1,x),(2 , x), ..., (n, x) are sorted and restored to get the original data, where (1, 1) represents the first character of the first transmitted data, (n, x) represents the xth of the nth transmitted data characters.

作为本发明的一种优选实施方式,访问验证模块对数据调取合法性进行验证分析的具体过程包括:将接收到原始数据的系统时间标记为调取时间,获取原始数据中的时间戳,将调取时间与时间戳的时间差值标记为调取时长,通过存储模块获取到调取范围,将调取时长与调取范围进行比较:若调取时长位于调取范围之内,则判定数据调取合法性满足要求,访问验证模块将原始数据发送至服务器;若调取时长位于调取范围之外,则判定数据调取合法性不满足要求,访问验证模块将原始数据删除并向服务器发送非法调取信号。As a preferred embodiment of the present invention, the specific process for the access verification module to verify and analyze the legality of data transfer includes: marking the system time when the original data is received as the transfer time, obtaining the timestamp in the original data, and The time difference between the retrieval time and the timestamp is marked as the retrieval duration, and the retrieval range is obtained through the storage module, and the retrieval duration is compared with the retrieval range: if the retrieval duration is within the retrieval range, the data is judged If the retrieval legality meets the requirements, the access verification module will send the original data to the server; if the retrieval duration is outside the retrieval range, it will be determined that the data retrieval legality does not meet the requirements, and the access verification module will delete the original data and send it to the server Illegal calling of signal.

作为本发明的一种优选实施方式,外部监测单元对计算机数据传输的外部影响数据进行监测分析的具体过程包括:获取计算机的温度数据WD、湿度数据SD以及磁场数据CC,通过对计算机的温度数据WD、湿度数据SD以及磁场数据CC进行数值计算得到计算机的外部系数WB;通过存储模块获取到外部阈值WBmax,将计算机的外部系数WB与外部阈值WBmax进行比较:若外部系数WB小于外部阈值WBmax,则判定计算机的外部环境满足要求;若外部系数WB大于等于外部阈值WBmax,则判定计算机的外部环境不满足要求,外部监测单元向服务器发送外部异常信号,服务器接收到外部异常信号后将外部异常信号发送至管理人员的手机终端。As a preferred embodiment of the present invention, the specific process for the external monitoring unit to monitor and analyze the external influence data transmitted by the computer includes: obtaining the temperature data WD, humidity data SD and magnetic field data CC of the computer, and by analyzing the temperature data of the computer WD, humidity data SD and magnetic field data CC are numerically calculated to obtain the external coefficient WB of the computer; the external threshold WBmax is obtained through the storage module, and the external coefficient WB of the computer is compared with the external threshold WBmax: if the external coefficient WB is smaller than the external threshold WBmax, It is determined that the external environment of the computer meets the requirements; if the external coefficient WB is greater than or equal to the external threshold WBmax, it is determined that the external environment of the computer does not meet the requirements, the external monitoring unit sends an external abnormal signal to the server, and the server sends the external abnormal signal to the server after receiving the external abnormal signal. Send it to the mobile terminal of the administrator.

作为本发明的一种优选实施方式,温度数据WD的获取过程包括:获取计算机主机各个侧面的温度值并进行求和取平均值得到温度数据WD,湿度数据SD的获取过程包括:获取计算机主机内部空气的湿度值与湿度范围,将湿度范围的最大值与最小值的平均值标记为湿度均值,将空气湿度值与湿度均值的差值的绝对值标记为湿度数据SD,磁场数据CC的获取过程包括:获取计算机主机所处环境的磁场辐射量与耦合度,将磁场辐射量与耦合度的乘积标记为磁场数据CC。As a preferred embodiment of the present invention, the acquisition process of the temperature data WD includes: acquiring the temperature values of each side of the host computer and summing and taking the average value to obtain the temperature data WD; the acquisition process of the humidity data SD includes: acquiring the temperature values inside the host computer The humidity value and humidity range of the air, mark the average value of the maximum value and the minimum value of the humidity range as the humidity mean value, mark the absolute value of the difference between the air humidity value and the humidity mean value as the humidity data SD, and the acquisition process of the magnetic field data CC The method includes: obtaining the magnetic field radiation amount and the coupling degree of the environment where the computer host is located, and marking the product of the magnetic field radiation amount and the coupling degree as the magnetic field data CC.

作为本发明的一种优选实施方式,用户监测单元对用户的密码习惯进行监测分析的具体过程包括:获取用户的登陆密码并标记为对比字符,获取用户的历史登陆密码并标记为历史字符组,将对比字符与历史字符组进行对照分析:随机选取一个历史字符组作为标记字符,若对比字符中的每一个字符均在标记字符中存在有与其对应的字符,则判定标记字符与对比字符对照不合格,用户密码需要调整,用户监测单元向服务器发送密码调整信号;否则,判定标记字符与对比字符对照合格,重新选取历史字符作为标记字符进行比对,直至所有的历史字符均走位标记字符与对比字符完成比对且对照合格,获取上一次用户修改密码的时间,将当前系统时间与上一次用户修改密码的时间差值标记为密码持续值,通过存储模块获取到密码持续阈值,将密码持续值与密码持续阈值进行比较:若密码持续值小于密码持续阈值,则判定用户的密码习惯满足要求;若密码持续值大于等于密码持续阈值,则判定用户的密码习惯不满足要求,用户监测单元向服务器发送密码调整信号。As a preferred embodiment of the present invention, the specific process for the user monitoring unit to monitor and analyze the user's password habit includes: obtaining the user's login password and marking it as a contrast character, obtaining the user's historical login password and marking it as a historical character group, Contrasting and analyzing the comparison character with the historical character group: randomly select a historical character group as the marking character, if each character in the comparison character has its corresponding character in the marking character, then it is determined that the marking character and the comparison character are not contrasted. Qualified, the user password needs to be adjusted, and the user monitoring unit sends a password adjustment signal to the server; otherwise, it is judged that the marked character and the comparison character are qualified, and the historical character is re-selected as the marked character for comparison until all historical characters are moved. After comparing the characters, the comparison is completed and the comparison is qualified, and the last time the user modifies the password is obtained, and the time difference between the current system time and the last time the user modifies the password is marked as the password persistence value, and the password persistence threshold is obtained through the storage module, and the password persistence value is compared with the password persistence threshold: if the password persistence value is less than the password persistence threshold, it is determined that the user’s password habits meet the requirements; The server sends a password adjustment signal.

该计算机的数据安全传输系统的工作方法,包括以下步骤:The working method of the data security transmission system of the computer comprises the following steps:

步骤一:对计算机传输的数据进行加密处理:将待传输的数据标记为加密对象,在数字集合中随机抽取一个数字并标记为组值n,对加密对象进行字符排序得到n组传输数据,通过传输数据的内存值生成密钥,将密钥与数据包发送至服务器进行数据加密传输;Step 1: Encrypt the data transmitted by the computer: mark the data to be transmitted as an encrypted object, randomly extract a number from the number set and mark it as a group value n, sort the encrypted objects to obtain n groups of transmitted data, and pass The memory value of the transmitted data generates a key, and the key and the data packet are sent to the server for encrypted data transmission;

步骤二:在数据调取时对数据进行解密处理:将数据包中的n组传输数据按照密钥中的数据内存值进行顺序排列得到新序数据,将新序数据中的字符进行排序还原得到原始数据;Step 2: Decrypt the data during data retrieval: Arrange the n sets of transmission data in the data packet according to the data memory values in the key to obtain the new sequence data, and sort and restore the characters in the new sequence data to obtain Raw data;

步骤三:对数据调取合法性进行验证分析:将接收到原始数据的系统时间标记为调取时间,获取原始数据中的时间戳,将调取时间与时间戳的时间差值标记为调取时长,通过存储模块获取到调取范围,将调取时长与调取范围进行比较并通过比较结果对数据调取合法性进行判定;Step 3: Verify and analyze the legitimacy of data retrieval: mark the system time when the original data is received as the retrieval time, obtain the timestamp in the original data, and mark the time difference between the retrieval time and the timestamp as the retrieval time Duration, the retrieval range is obtained through the storage module, the retrieval duration is compared with the retrieval range, and the legitimacy of the data retrieval is judged based on the comparison result;

步骤四:对计算机的数据传输过程进行辅助监控分析并得到外部系数与密码持续值,通过外部系数与密码持续值的数值大小分别对外部环境与用户密码习惯是否满足要求进行判定。Step 4: Perform auxiliary monitoring and analysis on the data transmission process of the computer and obtain the external coefficient and password persistence value, and judge whether the external environment and user password habits meet the requirements through the numerical values of the external coefficient and password persistence value.

本发明具备下述有益效果:The present invention has following beneficial effect:

1、通过数据加密模块可以对计算机传输的数据进行加密处理,通过数据重组的方式生成数据包,同时根据重组逻辑生成对应的密钥,简化数据加密过程,通过数据重组的方式提高抓包时的数据安全性,通过加盖时间戳的方式对数据调取合法性进行验证,进一步保证数据传输的安全性,结合数据解密模块进行数据解密与重组;1. Through the data encryption module, the data transmitted by the computer can be encrypted, and the data packet can be generated by data reorganization. At the same time, the corresponding key can be generated according to the reorganization logic, so as to simplify the data encryption process and improve the packet capture time by means of data reorganization. Data security, verify the legitimacy of data retrieval by stamping time stamps to further ensure the security of data transmission, combined with the data decryption module for data decryption and reorganization;

2、通过外部监测单元可以对计算机数据传输的外部影响数据进行监测分析,通过计算机硬件的各项环境参数计算得到外部系数,通过外部系数的数值大小对计算机的外部环境进行监控,在计算机的外部环境不满足要求时及时进行预警,将计算机数据传输受到的外部因素影响程度降至最低;2. Through the external monitoring unit, the external influence data of computer data transmission can be monitored and analyzed, and the external coefficient can be obtained by calculating various environmental parameters of the computer hardware, and the external environment of the computer can be monitored through the numerical value of the external coefficient. When the environment does not meet the requirements, early warning is given in time to minimize the influence of external factors on computer data transmission;

3、通过用户监测单元可以对用户的密码习惯进行监测分析,通过对用户的密码设置习惯与密码修改习惯对密码安全性进行监控,从而及时对用户进行密码调整提醒,进而提高用户密码的破解难度。3. The user monitoring unit can monitor and analyze the user's password habit, and monitor the password security by monitoring the user's password setting habit and password modification habit, so as to remind the user of password adjustment in time, thereby increasing the difficulty of cracking the user's password .

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.

图1为本发明实施例一的系统框图;Fig. 1 is a system block diagram of Embodiment 1 of the present invention;

图2为本发明实施例二的方法流程图。Fig. 2 is a flow chart of the method of Embodiment 2 of the present invention.

具体实施方式Detailed ways

下面将结合实施例对本发明的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

实施例一Embodiment one

如图1所示,计算机的数据安全传输系统,包括服务器,服务器通信连接有数据加密模块、数据解密模块、访问验证模块、辅助监控模块以及存储模块。As shown in Figure 1, the data security transmission system of the computer includes a server, and the communication connection of the server includes a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module.

数据加密模块用于对计算机传输的数据进行加密处理:将待传输的数据标记为加密对象,在数字集合中随机抽取一个数字并标记为组值n,n是一个能被加密对象字符数整除的正整数,对加密对象进行字符排序,由字符序号1,1+n,1+2n,…,1+xn对应的字符构成第一组传输数据,由字符2,2+n,2+2n,…,2+xn对应的字符构成第二组传输数据,以此类推,直至将加密对象分解为n组传输数据,获取每组传输数据的数据内存值,将数据内存值按照传输数据的排列方式进行组合得到密钥,由n组传输数据按照随机排列顺序生成数据包,对数据包的生成时间加盖时间戳,将密钥与数据包发送至服务器进行数据加密传输;对计算机传输的数据进行加密处理,通过数据重组的方式生成数据包,同时根据重组逻辑生成对应的密钥,简化数据加密过程,数据重组的方式提高抓包时的数据安全性,通过加盖时间戳的方式对数据调取合法性进行验证,进一步保证数据传输的安全性,结合数据解密模块进行数据解密与重组。The data encryption module is used to encrypt the data transmitted by the computer: mark the data to be transmitted as an encrypted object, randomly extract a number from the number set and mark it as a group value n, n is a number that can be divisible by the number of characters of the encrypted object Positive integer, character sorting for encrypted objects, the first group of transmission data is composed of characters corresponding to character serial numbers 1, 1+n, 1+2n, ..., 1+xn, and characters 2, 2+n, 2+2n, ..., the characters corresponding to 2+xn constitute the second group of transmission data, and so on, until the encrypted object is decomposed into n groups of transmission data, the data memory value of each group of transmission data is obtained, and the data memory value is arranged according to the arrangement of the transmission data Combine to obtain the key, generate data packets according to the random order of n groups of transmission data, stamp the generation time of the data packets, and send the key and data packets to the server for data encrypted transmission; data transmitted by the computer Encryption processing, generate data packets by means of data reorganization, and generate corresponding keys according to reorganization logic, simplify the data encryption process, improve data security when capturing packets by means of data reorganization, and adjust data by stamping time stamps The legality is verified to further ensure the security of data transmission, and data decryption and reorganization are performed in combination with the data decryption module.

数据解密模块用于在数据调取时对数据进行解密处理:将数据包中的n组传输数据按照密钥中的数据内存值进行顺序排列得到新序数据,顺序排列的过程包括:将内存值与密钥中第一个数据内存值相对应的传输数据排至第一位,将内存值与密钥中第二个数据内存值相对应的传输数据排至第二位,以此类推,直至将内存值与密钥中第n个数据内存值相对应的传输数据排至最后一位,将新序数据中的字符按照(1,1),(2,1),…,(n,1),(2,1),(2,2),…,(n,1),(n,2),…,(1,x),(2,x),…,(n,x)进行排序还原得到原始数据,其中(1,1)表示第一个传输数据的第一个字符、(n,x)表示第n个传输数据的第x个字符;数据解密模块将原始数据发送至服务器,服务器接收到原始数据后将原始数据发送至访问验证模块。The data decryption module is used to decrypt the data when the data is retrieved: arrange the n sets of transmission data in the data packet in order according to the data memory value in the key to obtain the new sequence data. The process of ordering includes: the memory value The transmission data corresponding to the first data memory value in the key is sorted first, the transmission data corresponding to the second data memory value in the key is sorted to the second position, and so on, until Arrange the transmission data whose memory value corresponds to the nth data memory value in the key to the last bit, and arrange the characters in the new sequence data according to (1, 1), (2, 1), ..., (n, 1 ), (2, 1), (2, 2), ..., (n, 1), (n, 2), ..., (1, x), (2, x), ..., (n, x) Sort and restore to get the original data, where (1, 1) represents the first character of the first transmitted data, (n, x) represents the xth character of the nth transmitted data; the data decryption module sends the original data to the server , the server sends the original data to the access verification module after receiving the original data.

访问验证模块用于对数据调取合法性进行验证分析:将接收到原始数据的系统时间标记为调取时间,获取原始数据中的时间戳,将调取时间与时间戳的时间差值标记为调取时长,通过存储模块获取到调取范围,将调取时长与调取范围进行比较:若调取时长位于调取范围之内,则判定数据调取合法性满足要求,访问验证模块将原始数据发送至服务器;若调取时长位于调取范围之外,则判定数据调取合法性不满足要求,访问验证模块将原始数据删除并向服务器发送非法调取信号。The access verification module is used to verify and analyze the legality of data retrieval: mark the system time when the original data is received as the retrieval time, obtain the timestamp in the original data, and mark the time difference between the retrieval time and the timestamp as Retrieve the duration, obtain the retrieval range through the storage module, and compare the retrieval duration with the retrieval range: if the retrieval duration is within the retrieval range, it is determined that the data retrieval legitimacy meets the requirements, and the access verification module will The data is sent to the server; if the retrieval time is outside the retrieval range, it is determined that the legality of the data retrieval does not meet the requirements, and the access verification module deletes the original data and sends an illegal retrieval signal to the server.

辅助监控模块用于对计算机的数据传输过程进行辅助监控分析,辅助监控模块包括外部监测单元与用户监测单元;外部监测单元用于对计算机数据传输的外部影响数据进行监测分析:获取计算机的温度数据WD、湿度数据SD以及磁场数据CC,温度数据WD的获取过程包括:获取计算机主机各个侧面的温度值并进行求和取平均值得到温度数据WD,湿度数据SD的获取过程包括:获取计算机主机内部空气的湿度值与湿度范围,将湿度范围的最大值与最小值的平均值标记为湿度均值,将空气湿度值与湿度均值的差值的绝对值标记为湿度数据SD,磁场数据CC的获取过程包括:获取计算机主机所处环境的磁场辐射量与耦合度,将磁场辐射量与耦合度的乘积标记为磁场数据CC,通过公式WB=α1*WD+α2*SD+α3*CC得到计算机的外部系数WB,其中α1、α2以及α3均为比例系数,且α3>α2>α1>1;通过存储模块获取到外部阈值WBmax,将计算机的外部系数WB与外部阈值WBmax进行比较:若外部系数WB小于外部阈值WBmax,则判定计算机的外部环境满足要求;若外部系数WB大于等于外部阈值WBmax,则判定计算机的外部环境不满足要求,外部监测单元向服务器发送外部异常信号,服务器接收到外部异常信号后将外部异常信号发送至管理人员的手机终端;对计算机数据传输的外部影响数据进行监测分析,通过计算机硬件的各项环境参数计算得到外部系数,通过外部系数的数值大小对计算机的外部环境进行监控,在计算机的外部环境不满足要求时及时进行预警,将计算机数据传输受到的外部因素影响程度降至最低。The auxiliary monitoring module is used for auxiliary monitoring and analysis of the data transmission process of the computer. The auxiliary monitoring module includes an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing the external influence data of the computer data transmission: obtaining the temperature data of the computer WD, humidity data SD, and magnetic field data CC. The acquisition process of temperature data WD includes: acquiring the temperature values on each side of the computer mainframe and summing and taking the average value to obtain temperature data WD. The acquisition process of humidity data SD includes: obtaining the internal temperature of the computer mainframe The humidity value and humidity range of the air, mark the average value of the maximum value and the minimum value of the humidity range as the humidity mean value, mark the absolute value of the difference between the air humidity value and the humidity mean value as the humidity data SD, and the acquisition process of the magnetic field data CC Including: obtaining the magnetic field radiation amount and coupling degree of the environment where the computer host is located, marking the product of the magnetic field radiation amount and coupling degree as magnetic field data CC, and obtaining the external Coefficient WB, where α1, α2, and α3 are proportional coefficients, and α3>α2>α1>1; the external threshold WBmax is obtained through the storage module, and the external coefficient WB of the computer is compared with the external threshold WBmax: if the external coefficient WB is less than If the external threshold WBmax, it is determined that the external environment of the computer meets the requirements; if the external coefficient WB is greater than or equal to the external threshold WBmax, it is determined that the external environment of the computer does not meet the requirements, the external monitoring unit sends an external abnormal signal to the server, and the server receives the external abnormal signal. Send the external abnormal signal to the mobile phone terminal of the management personnel; monitor and analyze the external influence data of the computer data transmission, calculate the external coefficient through the calculation of various environmental parameters of the computer hardware, and monitor the external environment of the computer through the value of the external coefficient , when the external environment of the computer does not meet the requirements, it will give early warning in time, and minimize the influence of external factors on computer data transmission.

用户监测单元用于对用户的密码习惯进行监测分析:获取用户的登陆密码并标记为对比字符,获取用户的历史登陆密码并标记为历史字符组,将对比字符与历史字符组进行对照分析:随机选取一个历史字符组作为标记字符,若对比字符中的每一个字符均在标记字符中存在有与其对应的字符,则判定标记字符与对比字符对照不合格,用户密码需要调整,用户监测单元向服务器发送密码调整信号;否则,判定标记字符与对比字符对照合格,重新选取历史字符作为标记字符进行比对,直至所有的历史字符均走位标记字符与对比字符完成比对且对照合格,获取上一次用户修改密码的时间,将当前系统时间与上一次用户修改密码的时间差值标记为密码持续值,通过存储模块获取到密码持续阈值,将密码持续值与密码持续阈值进行比较:若密码持续值小于密码持续阈值,则判定用户的密码习惯满足要求;若密码持续值大于等于密码持续阈值,则判定用户的密码习惯不满足要求,用户监测单元向服务器发送密码调整信号;对用户的密码习惯进行监测分析,通过对用户的密码设置习惯与密码修改习惯对密码安全性进行监控,从而及时对用户进行密码调整提醒,进而提高用户密码的破解难度。The user monitoring unit is used to monitor and analyze the user's password habits: obtain the user's login password and mark it as a comparison character, obtain the user's historical login password and mark it as a historical character group, and compare and analyze the comparison character with the historical character group: random Select a historical character group as the marking character, if each character in the comparison character has its corresponding character in the marking character, then it is judged that the marking character and the contrasting character are unqualified, the user password needs to be adjusted, and the user monitoring unit sends a message to the server Send a password adjustment signal; otherwise, it is judged that the comparison between the marked character and the comparison character is qualified, and the historical character is re-selected as the marked character for comparison until all the historical characters are moved. When the user modifies the password, the time difference between the current system time and the last time the user modifies the password is marked as the password persistence value, the password persistence threshold is obtained through the storage module, and the password persistence value is compared with the password persistence threshold: if the password persistence value If it is less than the password persistence threshold, it is determined that the user’s password habits meet the requirements; if the password persistence value is greater than or equal to the password persistence threshold, it is determined that the user’s password habits do not meet the requirements, and the user monitoring unit sends a password adjustment signal to the server; Monitoring and analysis monitors password security by monitoring users' password setting habits and password modification habits, so as to remind users of password adjustments in a timely manner, thereby increasing the difficulty of cracking user passwords.

实施例二Embodiment two

如图2所示,计算机的数据安全传输方法,包括以下步骤:As shown in Figure 2, the computer data security transmission method comprises the following steps:

步骤一:对计算机传输的数据进行加密处理:将待传输的数据标记为加密对象,在数字集合中随机抽取一个数字并标记为组值n,对加密对象进行字符排序得到n组传输数据,通过传输数据的内存值生成密钥,将密钥与数据包发送至服务器进行数据加密传输,简化数据加密过程,通过数据重组的方式提高抓包时的数据安全性;Step 1: Encrypt the data transmitted by the computer: mark the data to be transmitted as an encrypted object, randomly extract a number from the number set and mark it as a group value n, sort the encrypted objects to obtain n groups of transmitted data, and pass The memory value of the transmitted data generates a key, and the key and the data packet are sent to the server for data encryption transmission, which simplifies the data encryption process and improves the data security when capturing packets through data reorganization;

步骤二:在数据调取时对数据进行解密处理:将数据包中的n组传输数据按照密钥中的数据内存值进行顺序排列得到新序数据,将新序数据中的字符进行排序还原得到原始数据;Step 2: Decrypt the data during data retrieval: Arrange the n sets of transmission data in the data packet according to the data memory values in the key to obtain the new sequence data, and sort and restore the characters in the new sequence data to obtain Raw data;

步骤三:对数据调取合法性进行验证分析:将接收到原始数据的系统时间标记为调取时间,获取原始数据中的时间戳,将调取时间与时间戳的时间差值标记为调取时长,通过存储模块获取到调取范围,将调取时长与调取范围进行比较并通过比较结果对数据调取合法性进行判定,在计算机的外部环境不满足要求时及时进行预警,将计算机数据传输受到的外部因素影响程度降至最低;Step 3: Verify and analyze the legitimacy of data retrieval: mark the system time when the original data is received as the retrieval time, obtain the timestamp in the original data, and mark the time difference between the retrieval time and the timestamp as the retrieval time Duration, the retrieval range is obtained through the storage module, the retrieval duration is compared with the retrieval range and the legality of the data retrieval is judged based on the comparison result. When the external environment of the computer does not meet the requirements, an early warning is issued in time, and the computer data The degree to which the transmission is affected by external factors is minimized;

步骤四:对计算机的数据传输过程进行辅助监控分析并得到外部系数与密码持续值,通过外部系数与密码持续值的数值大小分别对外部环境与用户密码习惯是否满足要求进行判定,在用户密码习惯不满足要求时对用户进行密码调整提醒,进而提高用户密码的破解难度。Step 4: Perform auxiliary monitoring and analysis on the data transmission process of the computer and obtain the external coefficient and password persistence value, and judge whether the external environment and user password habits meet the requirements through the numerical values of the external coefficient and password persistence value. When the requirements are not met, the user will be reminded to adjust the password, thereby increasing the difficulty of cracking the user's password.

计算机的数据安全传输系统,工作时,对计算机传输的数据进行加密处理:将待传输的数据标记为加密对象,在数字集合中随机抽取一个数字并标记为组值n,对加密对象进行字符排序得到n组传输数据,通过传输数据的内存值生成密钥,将密钥与数据包发送至服务器进行数据加密传输;在数据调取时对数据进行解密处理:将数据包中的n组传输数据按照密钥中的数据内存值进行顺序排列得到新序数据,将新序数据中的字符进行排序还原得到原始数据;对数据调取合法性进行验证分析:将接收到原始数据的系统时间标记为调取时间,获取原始数据中的时间戳,将调取时间与时间戳的时间差值标记为调取时长,通过调取时长对数据调取合法性进行反馈。The computer's data security transmission system, when working, encrypts the data transmitted by the computer: mark the data to be transmitted as an encrypted object, randomly extract a number from the number set and mark it as a group value n, and sort the encrypted objects Get n sets of transmission data, generate a key by the memory value of the transmission data, send the key and data packet to the server for data encryption and transmission; decrypt the data when calling the data: transfer n sets of transmission data in the data packet According to the order of the data memory value in the key, the new sequence data is obtained, and the characters in the new sequence data are sorted and restored to obtain the original data; the validity of the data retrieval is verified and analyzed: the system time of the received original data is marked as Retrieve the time, obtain the timestamp in the original data, mark the time difference between the retrieval time and the timestamp as the retrieval duration, and provide feedback on the legitimacy of the data retrieval through the retrieval duration.

以上内容仅仅是对本发明结构所作的举例和说明,所属本技术领域的技术人员对所描述的具体实施例做各种各样的修改或补充或采用类似的方式替代,只要不偏离发明的结构或者超越本权利要求书所定义的范围,均应属于本发明的保护范围。The above content is only an example and description of the structure of the present invention. Those skilled in the art make various modifications or supplements to the described specific embodiments or replace them in similar ways, as long as they do not deviate from the structure of the invention or Anything beyond the scope defined in the claims shall belong to the protection scope of the present invention.

上述公式均是采集大量数据进行软件模拟得出且选取与真实值接近的一个公式,公式中的系数是由本领域技术人员根据实际情况进行设置;如:公式WB=α1*WD+α2*SD+α3*CC;由本领域技术人员采集多组样本数据并对每一组样本数据设定对应的外部系数;将设定的外部系数和采集的样本数据代入公式,任意三个公式构成三元一次方程组,将计算得到的系数进行筛选并取均值,得到α1、α2以及α3的取值分别为2.35、3.68和5.79;The above formulas are obtained by collecting a large amount of data for software simulation and selecting a formula close to the real value. The coefficients in the formula are set by those skilled in the art according to the actual situation; for example: formula WB=α1*WD+α2*SD+ α3*CC; multiple sets of sample data are collected by those skilled in the art and corresponding external coefficients are set for each set of sample data; the set external coefficients and collected sample data are substituted into the formula, and any three formulas form a ternary linear equation group, filter the calculated coefficients and take the mean value, and obtain the values of α1, α2 and α3 as 2.35, 3.68 and 5.79 respectively;

系数的大小是为了将各个参数进行量化得到的一个具体的数值,便于后续比较,关于系数的大小,取决于样本数据的多少及本领域技术人员对每一组样本数据初步设定对应的外部系数;只要不影响参数与量化后数值的比例关系即可,如外部系数与磁场数据的数值成正比。The size of the coefficient is a specific value obtained by quantifying each parameter, which is convenient for subsequent comparison. The size of the coefficient depends on the amount of sample data and the initial setting of the corresponding external coefficient for each set of sample data by those skilled in the art. ; As long as the proportional relationship between the parameter and the quantized value is not affected, for example, the external coefficient is directly proportional to the value of the magnetic field data.

在本说明书的描述中,参考术语“一个实施例”、“示例”、“具体示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。In the description of this specification, descriptions with reference to the terms "one embodiment", "example", "specific example" and the like mean that the specific features, structures, materials or characteristics described in conjunction with the embodiment or example are included in at least one embodiment of the present invention. In an embodiment or example. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

以上公开的本发明优选实施例只是用于帮助阐述本发明。优选实施例并没有详尽叙述所有的细节,也不限制该发明仅为的具体实施方式。显然,根据本说明书的内容,可作很多的修改和变化。本说明书选取并具体描述这些实施例,是为了更好地解释本发明的原理和实际应用,从而使所属技术领域技术人员能很好地理解和利用本发明。本发明仅受权利要求书及其全部范围和等效物的限制。The preferred embodiments of the invention disclosed above are only to help illustrate the invention. The preferred embodiments do not exhaust all details nor limit the invention to only specific embodiments. Obviously, many modifications and variations can be made based on the contents of this specification. This description selects and specifically describes these embodiments in order to better explain the principle and practical application of the present invention, so that those skilled in the art can well understand and utilize the present invention. The invention is to be limited only by the claims, along with their full scope and equivalents.

Claims (7)

1. The data security transmission system of the computer is characterized by comprising a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module;
the data encryption module is used for encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number in a number set and marking the number as a group value n, carrying out character sequencing on the encryption object, forming a first group of transmission data by characters corresponding to character numbers 1,1+n,1+2n, … and 1+xn, forming a second group of transmission data by characters corresponding to characters 2,2+n,2+2n, … and 2+xn, and so on until the encryption object is decomposed into n groups of transmission data, acquiring a data memory value of each group of transmission data, combining the data memory values according to the arrangement mode of the transmission data to obtain a secret key, generating a data packet by the n groups of transmission data according to the random arrangement sequence, carrying out time stamping on the generation time of the data packet, and sending the secret key and the data packet to a server for data encryption transmission;
the data decryption module is used for decrypting the data to obtain original data when the data is called, the original data is sent to the server, and the server sends the original data to the access verification module after receiving the original data;
the access verification module is used for verifying and analyzing the validity of the data access;
the auxiliary monitoring module is used for carrying out auxiliary monitoring analysis on the data transmission process of the computer and comprises an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing external influence data of computer data transmission; the user monitoring unit is used for monitoring and analyzing the password habit of the user.
2. The system for securely transmitting data of a computer according to claim 1, wherein the data decryption module decrypts the data when the data is retrieved, comprising: the method comprises the steps of sequentially arranging n groups of transmission data in a data packet according to data memory values in a secret key to obtain new data, wherein the sequential arrangement process comprises the following steps: and (3) arranging the transmission data of which the memory value corresponds to the first data memory value in the key to the first bit, arranging the transmission data of which the memory value corresponds to the second data memory value in the key to the second bit, and so on until the transmission data of which the memory value corresponds to the nth data memory value in the key to the last bit, and arranging the characters in the new sequence data according to (1, 1), (2, 1), …, (n, 1), (2, 2), …, (n, 1), (n, 2), …, (1, x), (2, x), …, (n, x) to perform sorting and restoring to obtain original data, wherein (1, 1) represents the first character of the first transmission data and (n, x) represents the xth character of the nth transmission data.
3. The system for securely transmitting data of a computer according to claim 1, wherein the specific process of verifying and analyzing the validity of the data call by the access verification module comprises: marking the system time of receiving the original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, and comparing the calling duration with the calling range: if the calling duration is within the calling range, judging that the data calling legitimacy meets the requirement, and sending the original data to a server by the access verification module; if the calling duration is outside the calling range, judging that the data calling legitimacy does not meet the requirement, deleting the original data by the access verification module and sending an illegal calling signal to the server.
4. The system for securely transmitting data of a computer according to claim 1, wherein the specific process of monitoring and analyzing the external influence data of the data transmission of the computer by the external monitoring unit comprises: acquiring temperature data WD, humidity data SD and magnetic field data CC of a computer, and obtaining an external coefficient WB of the computer by carrying out numerical calculation on the temperature data WD, the humidity data SD and the magnetic field data CC of the computer; the external threshold value WBmax is acquired through the storage module, and the external coefficient WB of the computer is compared with the external threshold value WBmax: if the external coefficient WB is smaller than the external threshold WBmax, judging that the external environment of the computer meets the requirement; if the external coefficient WB is larger than or equal to an external threshold WBmax, the external environment of the computer is judged to not meet the requirement, the external monitoring unit sends an external abnormal signal to the server, and the server sends the external abnormal signal to the mobile phone terminal of the manager after receiving the external abnormal signal.
5. The data security transmission system of a computer according to claim 4, wherein the process of acquiring the temperature data WD includes: the temperature values of all sides of the computer host are obtained, summation and average value obtaining are carried out, and the obtaining process of the temperature data WD and the humidity data SD comprises the following steps: acquiring a humidity value and a humidity range of air in a computer host, marking an average value of a maximum value and a minimum value of the humidity range as a humidity average value, marking an absolute value of a difference value between the air humidity value and the humidity average value as humidity data SD, and acquiring magnetic field data CC, wherein the acquiring process comprises: and acquiring the magnetic field radiation quantity and the coupling degree of the environment where the computer host is located, and marking the product of the magnetic field radiation quantity and the coupling degree as magnetic field data CC.
6. The system for securely transmitting data of a computer according to claim 1, wherein the specific process of monitoring and analyzing the cryptographic habit of the user by the user monitoring unit comprises: the login password of the user is obtained and marked as a comparison character, the historical login password of the user is obtained and marked as a historical character set, and the comparison character and the historical character set are subjected to comparison analysis: randomly selecting a history character group as a marking character, if each character in the comparison characters has a character corresponding to the character in the marking characters, judging that the marking characters are unqualified in comparison with the comparison characters, and the user password needs to be adjusted, wherein the user monitoring unit sends a password adjustment signal to the server; otherwise, judging that the marked character is qualified by contrast with the contrast character, re-selecting the history character as the marked character for comparison until all the history characters are completely compared with the contrast character and the contrast is qualified, obtaining the time of the last time of user modification of the password, marking the time difference value between the current system time and the last time of user modification of the password as a password continuous value, obtaining a password continuous threshold value through a storage module, and comparing the password continuous value with the password continuous threshold value: if the password persistence value is smaller than the password persistence threshold value, judging that the password habit of the user meets the requirement; if the password duration value is greater than or equal to the password duration threshold, judging that the password habit of the user does not meet the requirement, and sending a password adjustment signal to the server by the user monitoring unit.
7. A data security transmission system of a computer according to any one of claims 1-6, characterized in that the method of operating the data security transmission system of the computer comprises the steps of:
step one: encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, and sending the key and a data packet to a server for data encryption transmission;
step two: and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data;
step three: and verifying and analyzing the validity of the data call: marking the system time of the received original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, comparing the calling duration with the calling range, and judging the validity of the data calling through a comparison result;
step four: and carrying out auxiliary monitoring analysis on the data transmission process of the computer, obtaining an external coefficient and a password continuous value, and respectively judging whether the external environment and the password habit of the user meet the requirements or not according to the numerical values of the external coefficient and the password continuous value.
CN202211585276.1A 2022-12-09 2022-12-09 Computer Data Security Transmission System Active CN116015766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211585276.1A CN116015766B (en) 2022-12-09 2022-12-09 Computer Data Security Transmission System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211585276.1A CN116015766B (en) 2022-12-09 2022-12-09 Computer Data Security Transmission System

Publications (2)

Publication Number Publication Date
CN116015766A true CN116015766A (en) 2023-04-25
CN116015766B CN116015766B (en) 2023-06-27

Family

ID=86020060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211585276.1A Active CN116015766B (en) 2022-12-09 2022-12-09 Computer Data Security Transmission System

Country Status (1)

Country Link
CN (1) CN116015766B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760935A (en) * 2023-08-21 2023-09-15 湖南马栏山视频先进技术研究院有限公司 Data fence system based on image data transmission
CN117395277A (en) * 2023-10-13 2024-01-12 广州锡杨电子股份有限公司 Industrial computer and data monitoring system
CN118300865A (en) * 2024-01-22 2024-07-05 北京天空卫士网络安全技术有限公司 Data transmission safety monitoring system based on internet

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008745A (en) * 2019-03-29 2019-07-12 深圳供电局有限公司 Encryption method, computer equipment and computer storage medium
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN112751855A (en) * 2020-12-30 2021-05-04 合肥大多数信息科技有限公司 Cross-browser user data security management system based on encryption technology
CN113254978A (en) * 2021-06-24 2021-08-13 国能大渡河大数据服务有限公司 Data security management system based on machine learning
CN113918977A (en) * 2021-10-27 2022-01-11 宜兴感知金服物联网技术有限公司 User information transmission device based on Internet of things and big data analysis

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008745A (en) * 2019-03-29 2019-07-12 深圳供电局有限公司 Encryption method, computer equipment and computer storage medium
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN112751855A (en) * 2020-12-30 2021-05-04 合肥大多数信息科技有限公司 Cross-browser user data security management system based on encryption technology
CN113254978A (en) * 2021-06-24 2021-08-13 国能大渡河大数据服务有限公司 Data security management system based on machine learning
CN113918977A (en) * 2021-10-27 2022-01-11 宜兴感知金服物联网技术有限公司 User information transmission device based on Internet of things and big data analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李伟超: "计算机网络信息安全中的数据加密技术", 《网络安全技术与应用》, no. 11, pages 23 - 24 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760935A (en) * 2023-08-21 2023-09-15 湖南马栏山视频先进技术研究院有限公司 Data fence system based on image data transmission
CN116760935B (en) * 2023-08-21 2023-10-17 湖南马栏山视频先进技术研究院有限公司 Data fence system based on image data transmission
CN117395277A (en) * 2023-10-13 2024-01-12 广州锡杨电子股份有限公司 Industrial computer and data monitoring system
CN117395277B (en) * 2023-10-13 2024-04-12 广州锡杨电子股份有限公司 Industrial computer and data monitoring system
CN118300865A (en) * 2024-01-22 2024-07-05 北京天空卫士网络安全技术有限公司 Data transmission safety monitoring system based on internet

Also Published As

Publication number Publication date
CN116015766B (en) 2023-06-27

Similar Documents

Publication Publication Date Title
CN116015766B (en) Computer Data Security Transmission System
CN108717514B (en) Data privacy protection method and system in machine learning
CN107656974A (en) A kind of big data analysis system
JP2019527417A (en) System and method for providing a secure data monitoring system executed in a factory or plant
CN113254947A (en) Vehicle data protection method, system, equipment and storage medium
CN117692257B (en) High-speed encryption method and device for service data of electric power Internet of things
CN118690396B (en) Data storage method and system based on block chain
CN116032464A (en) A Property Data Encryption System Based on Quantum Communication
CN115664629A (en) Homomorphic encryption-based data privacy protection method for intelligent Internet of things platform
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN213122985U (en) PIS authentication system
CN118972038A (en) An encryption management system and method based on communication security
CN118349979A (en) A user information security processing control system for smart medical care
CN117955751A (en) Electronic equipment abnormal data detection method and system based on Internet of things
Burke et al. K-anonymity for privacy preserving crime data publishing in resource constrained environments
CN117592555A (en) A federated learning method and system for multi-source heterogeneous medical data
CN112383504A (en) Electric power thing networking block chain data management system
CN117439799A (en) Anti-tampering method for http request data
CN114510734B (en) Data access control method, device and computer readable storage medium
CN114117499B (en) Trusted data exchange method based on authority management
CN111295656A (en) Privacy Protection Log Analysis
CN113438079A (en) Hybrid encryption method for low-voltage Internet of things sensing terminal and intelligent electric meter
Iavich et al. A Post-Quantum secure e-Health system for the data management
Zhang Optimization of data packet encryption algorithm in network link transport layer
CN101364868A (en) Pseudo-random code generator and its generation method based on generalized information domain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant