CN118410511B - Business data theft prevention method and system based on artificial intelligence - Google Patents
Business data theft prevention method and system based on artificial intelligence Download PDFInfo
- Publication number
- CN118410511B CN118410511B CN202410830897.4A CN202410830897A CN118410511B CN 118410511 B CN118410511 B CN 118410511B CN 202410830897 A CN202410830897 A CN 202410830897A CN 118410511 B CN118410511 B CN 118410511B
- Authority
- CN
- China
- Prior art keywords
- binary
- service data
- binary coding
- segments
- binary code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000013473 artificial intelligence Methods 0.000 title claims abstract description 32
- 230000002265 prevention Effects 0.000 title claims abstract description 19
- 108091026890 Coding region Proteins 0.000 claims abstract description 9
- 238000000605 extraction Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a service data theft prevention method and system based on artificial intelligence, and relates to the technical field of data security. The method comprises the following steps: extracting characters in the service data according to step length and then combining to obtain the processed service data; converting the processed service data into a binary code sequence; dividing the binary coding sequence into a plurality of binary coding segments; performing logic operation on the initial binary code segment and the first binary code segment, and encrypting an operation result through an encryption key to obtain a ciphertext segment corresponding to the first binary code segment; carrying out logic operation on the (i+1) th binary code segment and a ciphertext segment corresponding to the (i) th binary code segment, and then encrypting an operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment; and sequentially combining ciphertext segments corresponding to the binary code segments to obtain encrypted data. The method and the system disclosed by the invention can realize multiple encryption and improve the security of service data.
Description
Technical Field
The invention belongs to the technical field of data security, and particularly relates to a service data theft prevention method and system based on artificial intelligence.
Background
In enterprise production management, a large amount of service data is generated, and the service data often contains some sensitive information, which may cause serious security risks and economic losses if the service data is leaked, so that the service data needs to be encrypted to prevent illegal theft.
At present, in order to prevent the illegal theft of the service data, the encryption is performed by a symmetric encryption algorithm or an asymmetric encryption algorithm in a more common way, however, the encryption method is adopted in a single encryption way, and the risk of the theft of the service data still exists.
Therefore, how to provide an effective solution to prevent the theft of the service data has become a challenge in the prior art.
Disclosure of Invention
The invention aims to provide an artificial intelligence-based service data theft prevention method and system, which are used for solving the problems in the prior art.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
in a first aspect, the present invention provides an artificial intelligence based service data theft prevention method, including:
according to at least one preset step length, extracting characters in the service data according to the step length, and then combining the extracted characters to obtain the processed service data;
converting each character in the processed service data into binary codes to obtain binary code sequences;
Dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
Carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections;
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
Based on the above disclosure, the invention extracts characters in the service data according to a preset step size and combines the extracted characters to obtain the processed service data, thereby realizing one-time encryption of the service data; then converting each character in the processed service data into binary codes to obtain binary code sequences; dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments; carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer; and sequentially combining ciphertext segments corresponding to each binary code segment in the plurality of binary code segments to obtain encrypted data corresponding to the service data, so that the service data after primary encryption can be secondarily encrypted through the initial binary code segment and the encryption key. Therefore, multiple encryption of the service data can be realized, the safety of the service data is improved, the service data is further effectively prevented from being stolen, and serious safety risks and economic losses caused by the leakage of the service data are avoided.
In one possible design, the at least one step length includes K step lengths, and the step length extracting and then combining the characters in the service data according to the preset at least one step length to obtain the processed service data includes:
extracting characters in the latest business data according to the kth step length to obtain a plurality of character segments, wherein the initial value of k is 1;
sequentially combining the extracted character segments to obtain new service data;
And enabling K to be added with 1 automatically, extracting characters in the latest service data according to the kth step length to obtain a plurality of character segments, and sequentially combining the extracted plurality of character segments to obtain new service data, wherein the extraction of the characters in the latest service data is stopped until k=K.
In one possible design, the performing a logic operation on the preset initial binary segment and the first binary segment of the plurality of binary segments includes:
Performing exclusive OR operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections;
The logic operation of the (i+1) th binary code segment in the plurality of binary code segments and the ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments comprises the following steps:
and performing exclusive OR operation on the (i+1) th binary coding section in the plurality of binary coding sections and a ciphertext section corresponding to the (i) th binary coding section in the plurality of binary coding sections.
In one possible design, the encrypting the logical operation result by the encryption key includes:
And encrypting the logic operation result by an advanced encryption standard algorithm based on the encryption key.
In one possible design, the method further comprises:
Inserting a designated character before the first character of the service data;
The step of extracting the characters in the service data according to the preset at least one step length and then combining the characters comprises the following steps:
And extracting the characters in the business data inserted with the designated characters according to the preset at least one step length, and then combining the extracted characters.
In one possible design, the method further comprises:
and if the length of the last binary coding section in the plurality of binary coding sections is lower than the appointed length, performing data filling on the last binary coding section in the plurality of binary coding sections so that the length of the last binary coding section in the plurality of binary coding sections is equal to the appointed length.
In one possible design, the specified length is 16 bits.
In a second aspect, the present invention provides an artificial intelligence based service data theft prevention system, comprising:
The data processing unit is used for extracting and combining characters in the service data according to the preset at least one step length to obtain the processed service data;
The coding unit is used for converting each character in the processed service data into binary codes to obtain binary code sequences;
The dividing unit is used for dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
The operation unit is used for carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; and
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And the combining unit is used for sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
In a third aspect, the present invention provides an electronic device, comprising a memory, a processor and a transceiver, which are communicatively connected in sequence, wherein the memory is configured to store a computer program, the transceiver is configured to send and receive messages, and the processor is configured to read the computer program, and perform the artificial intelligence based service data theft prevention method according to any one of the first aspect or the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium having instructions stored thereon which, when executed on a computer, perform the artificial intelligence based business data theft prevention method of the first aspect or any one of the first aspects.
In a fifth aspect, the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the artificial intelligence based business data theft prevention method as described in the first aspect or any one of the possible designs of the first aspect.
The beneficial effects are that:
The service data anti-theft method and system based on artificial intelligence can realize multiple encryption of service data, improve the safety of the service data, further effectively prevent the service data from being stolen, avoid serious safety risk and economic loss caused by service data leakage, and facilitate practical application and popularization.
Drawings
FIG. 1 is a flowchart of an artificial intelligence based method for preventing theft of business data according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a system for preventing access to service data based on artificial intelligence according to an embodiment of the present application;
Fig. 3 is a schematic block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be briefly described below with reference to the accompanying drawings and the description of the embodiments or the prior art, and it is obvious that the following description of the structure of the drawings is only some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort to a person skilled in the art. It should be noted that the description of these examples is for aiding in understanding the present invention, but is not intended to limit the present invention.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another element. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
It should be understood that for the term "and/or" that may appear herein, it is merely one association relationship that describes an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a alone, B alone, and both a and B; for the term "/and" that may appear herein, which is descriptive of another associative object relationship, it means that there may be two relationships, e.g., a/and B, it may be expressed that: a alone, a alone and B alone; in addition, for the character "/" that may appear herein, it is generally indicated that the context associated object is an "or" relationship.
In order to prevent the service data from being stolen, the embodiment of the application provides a service data theft preventing method and system based on artificial intelligence.
The service data theft prevention method based on artificial intelligence provided by the embodiment of the application can be applied to a user terminal or a server. It will be appreciated that the execution body is not to be construed as limiting the embodiments of the application.
The service data anti-theft method based on artificial intelligence provided by the embodiment of the application is described in detail below.
As shown in fig. 1, a flowchart of an artificial intelligence-based service data theft prevention method according to a first aspect of the present application may include, but is not limited to, the following steps S101 to S106.
And S101, extracting characters in the service data according to a preset step length and then combining the extracted characters according to the step length to obtain the processed service data.
In the embodiment of the application, one or more step sizes can be preset according to the requirement, a plurality of step sizes can be preferably set for improving the safety of the data, and characters in the service data are sequentially extracted according to the step sizes and then combined according to the step sizes, so that the processed service data are obtained.
For example, the step size is K, where K is a positive integer greater than or equal to 2, and the characters in the service data are extracted according to the step size and then combined to obtain the processed service data, which may include, but is not limited to, the following steps S1011-S1013.
And S1011, extracting the characters in the latest service data according to the kth step length to obtain a plurality of character segments, wherein the initial value of k is 1.
The content of the service data is "ABCDEFGHIJKL", and the 1 st step is 3, and then one character can be extracted every 3 characters to be combined, so as to obtain 3 character segments "ADGJ", "BEHK" and "CFIL".
And S1012, sequentially combining the extracted plurality of character segments to obtain new service data.
Still based on the example in the aforementioned step S1011, the 3 character segments are sequentially combined to obtain new service data, i.e. "ADGJBEHKCFIL".
Step S1013, let K add 1 by itself, and extract the character in the latest business data according to the kth step length, get multiple character segments, and combine the multiple extracted character segments in turn, get new business data, until k=K, stop extracting the character in the latest business data.
After new service data is obtained by extraction and combination based on the 1 st step length, k is self-added with 1, characters in the latest service data are extracted again according to the k th step length, a plurality of character segments are obtained, and the extracted plurality of character segments are combined in sequence, so that the new service data is obtained. At this time, the characters in the latest service data can be extracted according to the 2 nd step length to obtain a plurality of character segments, and the extracted plurality of character segments are sequentially combined to obtain new service data.
After new service data is obtained by extraction and combination based on the 2 nd step length, the character in the latest service data can be extracted continuously according to the 3 rd step length to obtain a plurality of character segments, and the extracted plurality of character segments are combined in sequence to obtain the new service data. And so on until new service data is obtained by extraction and combination based on the Kth step length.
In the embodiment of the application, characters in the service data are extracted according to step length and then combined to obtain the processed service data. It will be appreciated that in other embodiments, the characters in the service data may be converted into a binary code sequence, and then the binary codes in the binary code sequence are extracted and combined according to step sizes, so as to obtain the processed service data (binary code sequence).
Based on the above mode, the business data can be encrypted once, and the more complex the processed business data is, the less easily the business data is cracked along with the increase of the step size. However, in this way, since the first character in the service data is in the first position, after being extracted and combined according to a plurality of step sizes, the first character still does not change in the new service data, that is, the first character in the service data cannot be encrypted.
Based on this, in order to encrypt the whole service data, before extracting and combining the characters in the service data according to at least one preset step, a designated character may be inserted before the first character of the service data, and when the characters in the service data are extracted and combined according to the step, the characters in the service data inserted with the designated character may be extracted and combined according to the step according to at least one preset step. Thus, the first character in the service data is changed into the second character, so that the encryption of the whole service data can be realized. It will be appreciated that in this way, the first character in the decrypted service data needs to be removed during subsequent decryption.
S102, converting each character in the processed service data into a binary code to obtain a binary code sequence.
S103, dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments.
The specified length may be set according to practical situations, for example, may be 8 bits, 16 bits, 32 bits, or the like, and in the embodiment of the present application, the specified length is 16 bits.
In one or more embodiments, after dividing the binary sequence into code segments with a specified length to obtain a plurality of binary code segments, the length of the last binary code segment in the plurality of binary code segments may be lower than the specified length (for example, the specified length is 16 bits, and the length of the last binary code segment is 8 bits), and then the data of the last binary code segment in the plurality of binary code segments may be padded so that the length of the last binary code segment in the plurality of binary code segments is equal to the specified length.
Wherein, when data is filled, a binary character 0 can be added after the last binary coding segment. For example, the length is designated as 16 bits, and the last binary segment is 00110011, and after data padding is performed on the last binary segment, the obtained binary segment may be 0011001100000000.
S104, carrying out logic operation on the preset initial binary code segment and a first binary code segment in the plurality of binary code segments, and encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the first binary code segment in the plurality of binary code segments.
The length of the initial binary code is the same as the length of any binary code segment in the plurality of binary code segments, for example, the lengths of the plurality of binary code segments are all 16 bits, and then the length of the initial binary code is also 16 bits.
The initial binary segment is logically operated on with a first binary segment of the plurality of binary segments, which may be, but is not limited to, an exclusive or operation or an exclusive or operation. In the embodiment of the application, the exclusive OR operation can be performed on the preset initial binary coding section and the first binary coding section in the plurality of binary coding sections.
After the exclusive-or operation is performed, the logical operation result may be encrypted by an encryption key to obtain a ciphertext segment corresponding to a first binary code segment of the plurality of binary code segments, where the ciphertext segment has a length identical to a length of the binary code segment. In the embodiment of the application, the logic operation result can be encrypted by an advanced encryption standard (Advanced Encryption Standard, AES) algorithm based on the encryption key. The AES algorithm includes four steps of key expansion, initial round, repetition round, and final round, the specific principles of which are not described in detail in the embodiments of the present application.
S105, carrying out logic operation on the (i+1) th binary code segment in the plurality of binary code segments and the ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain the ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments.
Wherein i is a positive integer.
Specifically, the 2 nd binary code segment and the ciphertext segment corresponding to the 1 st binary code segment in the plurality of binary code segments are subjected to logic operation, and then the logic operation result is encrypted through an encryption key to obtain the ciphertext segment corresponding to the 2 nd binary code segment in the plurality of binary code segments. And then carrying out logic operation on the 3 rd binary coding section and the ciphertext section corresponding to the 2 nd binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain the ciphertext section corresponding to the 3 rd binary coding section in the plurality of binary coding sections, and the like to obtain the ciphertext section corresponding to each binary coding section in the plurality of binary coding sections.
In the embodiment of the application, since the initial binary code segment and the first binary code segment in the plurality of binary code segments are subjected to exclusive or operation, the subsequent logic operation is also an exclusive or operation, that is, the (i+1) th binary code segment in the plurality of binary code segments is subjected to exclusive or operation with the ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments.
S106, sequentially combining ciphertext segments corresponding to the binary coding segments in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
In one or more embodiments, after sequentially combining ciphertext segments corresponding to each binary code segment in the plurality of binary code segments to obtain encrypted data corresponding to service data, the encrypted data may be converted into a character according to binary codes of every 8 bits, and the encrypted data may be converted into a character sequence.
According to the service data theft prevention method based on artificial intelligence, characters in service data are extracted according to the preset step length and then combined to obtain processed service data, so that primary encryption of the service data can be realized; then converting each character in the processed service data into binary codes to obtain binary code sequences; dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments; carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer; and sequentially combining ciphertext segments corresponding to each binary code segment in the plurality of binary code segments to obtain encrypted data corresponding to the service data, so that the service data after primary encryption can be secondarily encrypted through the initial binary code segment and the encryption key. Therefore, multiple encryption of the service data can be realized, the security of the service data is improved, the service data is further effectively prevented from being stolen, serious safety risks and economic losses caused by the leakage of the service data are avoided, and the method is convenient for practical application and popularization.
Referring to fig. 2, a second aspect of the embodiment of the present application provides an artificial intelligence based service data anti-theft system, which includes:
The data processing unit is used for extracting and combining characters in the service data according to the preset at least one step length to obtain the processed service data;
The coding unit is used for converting each character in the processed service data into binary codes to obtain binary code sequences;
The dividing unit is used for dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
The operation unit is used for carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; and
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And the combining unit is used for sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
The working process, working details and technical effects of the service data anti-theft system based on artificial intelligence provided in the second aspect of the present embodiment may be referred to in the first aspect of the present embodiment, and will not be described herein again.
As shown in fig. 3, a third aspect of the embodiment of the present application provides an electronic device, including a memory, a processor and a transceiver, which are sequentially communicatively connected, where the memory is configured to store a computer program, the transceiver is configured to send and receive a message, and the processor is configured to read the computer program, and perform the service data theft prevention method based on artificial intelligence according to the first aspect of the embodiment.
By way of specific example, the Memory may include, but is not limited to, random Access Memory (RAM), read Only Memory (ROM), flash Memory (Flash Memory), first-in-first-out Memory (FIFO), and/or first-in-last-out Memory (FILO), etc.; the processor may not be limited to a microprocessor of the STM32F105 family, ARM (Advanced RISC Machines), X86 or other architecture processor or a processor of an integrated NPU (neural-network processing units); the transceiver may be, but is not limited to, a WiFi (wireless fidelity) wireless transceiver, a bluetooth wireless transceiver, a General Packet Radio Service (GPRS) wireless transceiver, a ZigBee (low power local area network protocol based on the ieee802.15.4 standard) wireless transceiver, a 3G transceiver, a 4G transceiver, and/or a 5G transceiver, etc.
A fourth aspect of the present embodiment provides a computer readable storage medium storing instructions comprising the method for preventing theft of service data based on artificial intelligence according to the first aspect of the present embodiment, i.e. the computer readable storage medium has instructions stored thereon, which when executed on a computer, perform the method for preventing theft of service data based on artificial intelligence according to the first aspect. The computer readable storage medium refers to a carrier for storing data, and may include, but is not limited to, a floppy disk, an optical disk, a hard disk, a flash Memory, and/or a Memory Stick (Memory Stick), etc., where the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
A fifth aspect of the present embodiment provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the artificial intelligence based traffic data theft prevention method according to the first aspect of the embodiment, wherein the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus.
It should be understood that specific details are provided in the following description to provide a thorough understanding of the example embodiments. However, it will be understood by those of ordinary skill in the art that the example embodiments may be practiced without these specific details. For example, a system may be shown in block diagrams in order to avoid obscuring the examples with unnecessary detail. In other instances, well-known processes, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the example embodiments.
Finally, it should be noted that: the foregoing description is only of the preferred embodiments of the invention and is not intended to limit the scope of the invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (8)
1. An artificial intelligence-based service data theft prevention method is characterized by comprising the following steps:
according to at least one preset step length, extracting characters in the service data according to the step length, and then combining the extracted characters to obtain the processed service data;
converting each character in the processed service data into binary codes to obtain binary code sequences;
Dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
Carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections;
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
2. The method for preventing theft of service data based on artificial intelligence according to claim 1, wherein the at least one step length includes K step lengths, the step length extracting the characters in the service data according to the preset at least one step length, and then combining the extracted characters to obtain the processed service data, including:
extracting characters in the latest business data according to the kth step length to obtain a plurality of character segments, wherein the initial value of k is 1;
sequentially combining the extracted character segments to obtain new service data;
And enabling K to be added with 1 automatically, extracting characters in the latest service data according to the kth step length to obtain a plurality of character segments, and sequentially combining the extracted plurality of character segments to obtain new service data, wherein the extraction of the characters in the latest service data is stopped until k=K.
3. The method for preventing traffic data theft based on artificial intelligence according to claim 1, wherein the performing a logic operation on a preset initial binary segment and a first binary segment of the plurality of binary segments comprises:
Performing exclusive OR operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections;
The logic operation of the (i+1) th binary code segment in the plurality of binary code segments and the ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments comprises the following steps:
and performing exclusive OR operation on the (i+1) th binary coding section in the plurality of binary coding sections and a ciphertext section corresponding to the (i) th binary coding section in the plurality of binary coding sections.
4. The method for preventing theft of service data based on artificial intelligence according to claim 1, wherein encrypting the logical operation result by the encryption key comprises:
And encrypting the logic operation result by an advanced encryption standard algorithm based on the encryption key.
5. The artificial intelligence based business data theft prevention method according to claim 1, further comprising:
Inserting a designated character before the first character of the service data;
The step of extracting the characters in the service data according to the preset at least one step length and then combining the characters comprises the following steps:
And extracting the characters in the business data inserted with the designated characters according to the preset at least one step length, and then combining the extracted characters.
6. The artificial intelligence based business data theft prevention method according to claim 1, further comprising:
and if the length of the last binary coding section in the plurality of binary coding sections is lower than the appointed length, performing data filling on the last binary coding section in the plurality of binary coding sections so that the length of the last binary coding section in the plurality of binary coding sections is equal to the appointed length.
7. The method for preventing theft of business data based on artificial intelligence according to claim 6, wherein the specified length is 16 bits.
8. An artificial intelligence based service data theft prevention system, comprising:
The data processing unit is used for extracting and combining characters in the service data according to the preset at least one step length to obtain the processed service data;
The coding unit is used for converting each character in the processed service data into binary codes to obtain binary code sequences;
The dividing unit is used for dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
The operation unit is used for carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; and
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And the combining unit is used for sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410830897.4A CN118410511B (en) | 2024-06-26 | 2024-06-26 | Business data theft prevention method and system based on artificial intelligence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410830897.4A CN118410511B (en) | 2024-06-26 | 2024-06-26 | Business data theft prevention method and system based on artificial intelligence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118410511A CN118410511A (en) | 2024-07-30 |
CN118410511B true CN118410511B (en) | 2024-09-24 |
Family
ID=92001226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410830897.4A Active CN118410511B (en) | 2024-06-26 | 2024-06-26 | Business data theft prevention method and system based on artificial intelligence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118410511B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114580001A (en) * | 2022-03-11 | 2022-06-03 | 合肥工业大学 | Encryption and decryption algorithm and file protection method for excel file |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8031865B2 (en) * | 2004-01-08 | 2011-10-04 | Encryption Solutions, Inc. | Multiple level security system and method for encrypting data within documents |
US7752453B2 (en) * | 2004-01-08 | 2010-07-06 | Encryption Solutions, Inc. | Method of encrypting and transmitting data and system for transmitting encrypted data |
AU2008327506B2 (en) * | 2007-07-31 | 2012-06-07 | Artus, Karen Mary | Method and system for encryption of data |
EP2351288B1 (en) * | 2008-10-23 | 2014-12-10 | University Of Ulster | An encryption method |
CN109951268B (en) * | 2019-02-18 | 2020-12-22 | 吉林大学珠海学院 | Encryption and decryption method and device based on bit permutation and bit permutation |
-
2024
- 2024-06-26 CN CN202410830897.4A patent/CN118410511B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114580001A (en) * | 2022-03-11 | 2022-06-03 | 合肥工业大学 | Encryption and decryption algorithm and file protection method for excel file |
Also Published As
Publication number | Publication date |
---|---|
CN118410511A (en) | 2024-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116032474B (en) | Safety protection system based on big data computer network | |
Nohl | Attacking phone privacy | |
CN115865523B (en) | Data encryption transmission method for information analysis system | |
US20120134490A1 (en) | Selective Data Encryption and Decryption Method and Apparatus | |
EP3185466B1 (en) | Encrypted communications method and communications terminal, and computer storage medium | |
CN103475463B (en) | Encryption implementation method and device | |
CN110401527A (en) | Data encryption, decryption method, device and storage medium | |
CN112073372B (en) | Dual encryption method and decryption method for communication message of power system and message interaction system | |
CN115659409B (en) | Financial asset transaction data safe storage method | |
CN108830096A (en) | Data processing method, device, electronic equipment and storage medium | |
CN111224974A (en) | Method, system, electronic device and storage medium for network communication content encryption | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN117708847B (en) | 3C product leasing platform data processing method based on data compression and encryption | |
CN105303075A (en) | PDF format based adaptive text watermarking method | |
CN112199699A (en) | Character string encryption and decryption method and device, storage medium and processor | |
CN115941189A (en) | Encryption method for document data | |
CN118410511B (en) | Business data theft prevention method and system based on artificial intelligence | |
CN112737767B (en) | Method and system for generating message authentication code resisting differential power analysis and time attack | |
CN114285610A (en) | Method for encrypting and transmitting information | |
US20240178999A1 (en) | Method for data encryption, terminal device and non-transitory computer-readable storage medium | |
CN108173906A (en) | Installation kit method for down loading, device, storage medium and electronic equipment | |
CN106059748B (en) | A kind of lightweight secure storage method of data regenerating code safely based on block | |
CN107527084A (en) | Electronic card processing method and processing device | |
CN107135064B (en) | Information encryption method based on depth self-encoder | |
CN111859436B (en) | Data security encryption method for vehicle insurance anti-fraud platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |