[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN118410511B - Business data theft prevention method and system based on artificial intelligence - Google Patents

Business data theft prevention method and system based on artificial intelligence Download PDF

Info

Publication number
CN118410511B
CN118410511B CN202410830897.4A CN202410830897A CN118410511B CN 118410511 B CN118410511 B CN 118410511B CN 202410830897 A CN202410830897 A CN 202410830897A CN 118410511 B CN118410511 B CN 118410511B
Authority
CN
China
Prior art keywords
binary
service data
binary coding
segments
binary code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410830897.4A
Other languages
Chinese (zh)
Other versions
CN118410511A (en
Inventor
赵龙
刘超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hsd Information Security Technology Co ltd
Original Assignee
Beijing Hsd Information Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hsd Information Security Technology Co ltd filed Critical Beijing Hsd Information Security Technology Co ltd
Priority to CN202410830897.4A priority Critical patent/CN118410511B/en
Publication of CN118410511A publication Critical patent/CN118410511A/en
Application granted granted Critical
Publication of CN118410511B publication Critical patent/CN118410511B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a service data theft prevention method and system based on artificial intelligence, and relates to the technical field of data security. The method comprises the following steps: extracting characters in the service data according to step length and then combining to obtain the processed service data; converting the processed service data into a binary code sequence; dividing the binary coding sequence into a plurality of binary coding segments; performing logic operation on the initial binary code segment and the first binary code segment, and encrypting an operation result through an encryption key to obtain a ciphertext segment corresponding to the first binary code segment; carrying out logic operation on the (i+1) th binary code segment and a ciphertext segment corresponding to the (i) th binary code segment, and then encrypting an operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment; and sequentially combining ciphertext segments corresponding to the binary code segments to obtain encrypted data. The method and the system disclosed by the invention can realize multiple encryption and improve the security of service data.

Description

Business data theft prevention method and system based on artificial intelligence
Technical Field
The invention belongs to the technical field of data security, and particularly relates to a service data theft prevention method and system based on artificial intelligence.
Background
In enterprise production management, a large amount of service data is generated, and the service data often contains some sensitive information, which may cause serious security risks and economic losses if the service data is leaked, so that the service data needs to be encrypted to prevent illegal theft.
At present, in order to prevent the illegal theft of the service data, the encryption is performed by a symmetric encryption algorithm or an asymmetric encryption algorithm in a more common way, however, the encryption method is adopted in a single encryption way, and the risk of the theft of the service data still exists.
Therefore, how to provide an effective solution to prevent the theft of the service data has become a challenge in the prior art.
Disclosure of Invention
The invention aims to provide an artificial intelligence-based service data theft prevention method and system, which are used for solving the problems in the prior art.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
in a first aspect, the present invention provides an artificial intelligence based service data theft prevention method, including:
according to at least one preset step length, extracting characters in the service data according to the step length, and then combining the extracted characters to obtain the processed service data;
converting each character in the processed service data into binary codes to obtain binary code sequences;
Dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
Carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections;
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
Based on the above disclosure, the invention extracts characters in the service data according to a preset step size and combines the extracted characters to obtain the processed service data, thereby realizing one-time encryption of the service data; then converting each character in the processed service data into binary codes to obtain binary code sequences; dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments; carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer; and sequentially combining ciphertext segments corresponding to each binary code segment in the plurality of binary code segments to obtain encrypted data corresponding to the service data, so that the service data after primary encryption can be secondarily encrypted through the initial binary code segment and the encryption key. Therefore, multiple encryption of the service data can be realized, the safety of the service data is improved, the service data is further effectively prevented from being stolen, and serious safety risks and economic losses caused by the leakage of the service data are avoided.
In one possible design, the at least one step length includes K step lengths, and the step length extracting and then combining the characters in the service data according to the preset at least one step length to obtain the processed service data includes:
extracting characters in the latest business data according to the kth step length to obtain a plurality of character segments, wherein the initial value of k is 1;
sequentially combining the extracted character segments to obtain new service data;
And enabling K to be added with 1 automatically, extracting characters in the latest service data according to the kth step length to obtain a plurality of character segments, and sequentially combining the extracted plurality of character segments to obtain new service data, wherein the extraction of the characters in the latest service data is stopped until k=K.
In one possible design, the performing a logic operation on the preset initial binary segment and the first binary segment of the plurality of binary segments includes:
Performing exclusive OR operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections;
The logic operation of the (i+1) th binary code segment in the plurality of binary code segments and the ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments comprises the following steps:
and performing exclusive OR operation on the (i+1) th binary coding section in the plurality of binary coding sections and a ciphertext section corresponding to the (i) th binary coding section in the plurality of binary coding sections.
In one possible design, the encrypting the logical operation result by the encryption key includes:
And encrypting the logic operation result by an advanced encryption standard algorithm based on the encryption key.
In one possible design, the method further comprises:
Inserting a designated character before the first character of the service data;
The step of extracting the characters in the service data according to the preset at least one step length and then combining the characters comprises the following steps:
And extracting the characters in the business data inserted with the designated characters according to the preset at least one step length, and then combining the extracted characters.
In one possible design, the method further comprises:
and if the length of the last binary coding section in the plurality of binary coding sections is lower than the appointed length, performing data filling on the last binary coding section in the plurality of binary coding sections so that the length of the last binary coding section in the plurality of binary coding sections is equal to the appointed length.
In one possible design, the specified length is 16 bits.
In a second aspect, the present invention provides an artificial intelligence based service data theft prevention system, comprising:
The data processing unit is used for extracting and combining characters in the service data according to the preset at least one step length to obtain the processed service data;
The coding unit is used for converting each character in the processed service data into binary codes to obtain binary code sequences;
The dividing unit is used for dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
The operation unit is used for carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; and
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And the combining unit is used for sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
In a third aspect, the present invention provides an electronic device, comprising a memory, a processor and a transceiver, which are communicatively connected in sequence, wherein the memory is configured to store a computer program, the transceiver is configured to send and receive messages, and the processor is configured to read the computer program, and perform the artificial intelligence based service data theft prevention method according to any one of the first aspect or the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium having instructions stored thereon which, when executed on a computer, perform the artificial intelligence based business data theft prevention method of the first aspect or any one of the first aspects.
In a fifth aspect, the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the artificial intelligence based business data theft prevention method as described in the first aspect or any one of the possible designs of the first aspect.
The beneficial effects are that:
The service data anti-theft method and system based on artificial intelligence can realize multiple encryption of service data, improve the safety of the service data, further effectively prevent the service data from being stolen, avoid serious safety risk and economic loss caused by service data leakage, and facilitate practical application and popularization.
Drawings
FIG. 1 is a flowchart of an artificial intelligence based method for preventing theft of business data according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a system for preventing access to service data based on artificial intelligence according to an embodiment of the present application;
Fig. 3 is a schematic block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be briefly described below with reference to the accompanying drawings and the description of the embodiments or the prior art, and it is obvious that the following description of the structure of the drawings is only some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort to a person skilled in the art. It should be noted that the description of these examples is for aiding in understanding the present invention, but is not intended to limit the present invention.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another element. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
It should be understood that for the term "and/or" that may appear herein, it is merely one association relationship that describes an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a alone, B alone, and both a and B; for the term "/and" that may appear herein, which is descriptive of another associative object relationship, it means that there may be two relationships, e.g., a/and B, it may be expressed that: a alone, a alone and B alone; in addition, for the character "/" that may appear herein, it is generally indicated that the context associated object is an "or" relationship.
In order to prevent the service data from being stolen, the embodiment of the application provides a service data theft preventing method and system based on artificial intelligence.
The service data theft prevention method based on artificial intelligence provided by the embodiment of the application can be applied to a user terminal or a server. It will be appreciated that the execution body is not to be construed as limiting the embodiments of the application.
The service data anti-theft method based on artificial intelligence provided by the embodiment of the application is described in detail below.
As shown in fig. 1, a flowchart of an artificial intelligence-based service data theft prevention method according to a first aspect of the present application may include, but is not limited to, the following steps S101 to S106.
And S101, extracting characters in the service data according to a preset step length and then combining the extracted characters according to the step length to obtain the processed service data.
In the embodiment of the application, one or more step sizes can be preset according to the requirement, a plurality of step sizes can be preferably set for improving the safety of the data, and characters in the service data are sequentially extracted according to the step sizes and then combined according to the step sizes, so that the processed service data are obtained.
For example, the step size is K, where K is a positive integer greater than or equal to 2, and the characters in the service data are extracted according to the step size and then combined to obtain the processed service data, which may include, but is not limited to, the following steps S1011-S1013.
And S1011, extracting the characters in the latest service data according to the kth step length to obtain a plurality of character segments, wherein the initial value of k is 1.
The content of the service data is "ABCDEFGHIJKL", and the 1 st step is 3, and then one character can be extracted every 3 characters to be combined, so as to obtain 3 character segments "ADGJ", "BEHK" and "CFIL".
And S1012, sequentially combining the extracted plurality of character segments to obtain new service data.
Still based on the example in the aforementioned step S1011, the 3 character segments are sequentially combined to obtain new service data, i.e. "ADGJBEHKCFIL".
Step S1013, let K add 1 by itself, and extract the character in the latest business data according to the kth step length, get multiple character segments, and combine the multiple extracted character segments in turn, get new business data, until k=K, stop extracting the character in the latest business data.
After new service data is obtained by extraction and combination based on the 1 st step length, k is self-added with 1, characters in the latest service data are extracted again according to the k th step length, a plurality of character segments are obtained, and the extracted plurality of character segments are combined in sequence, so that the new service data is obtained. At this time, the characters in the latest service data can be extracted according to the 2 nd step length to obtain a plurality of character segments, and the extracted plurality of character segments are sequentially combined to obtain new service data.
After new service data is obtained by extraction and combination based on the 2 nd step length, the character in the latest service data can be extracted continuously according to the 3 rd step length to obtain a plurality of character segments, and the extracted plurality of character segments are combined in sequence to obtain the new service data. And so on until new service data is obtained by extraction and combination based on the Kth step length.
In the embodiment of the application, characters in the service data are extracted according to step length and then combined to obtain the processed service data. It will be appreciated that in other embodiments, the characters in the service data may be converted into a binary code sequence, and then the binary codes in the binary code sequence are extracted and combined according to step sizes, so as to obtain the processed service data (binary code sequence).
Based on the above mode, the business data can be encrypted once, and the more complex the processed business data is, the less easily the business data is cracked along with the increase of the step size. However, in this way, since the first character in the service data is in the first position, after being extracted and combined according to a plurality of step sizes, the first character still does not change in the new service data, that is, the first character in the service data cannot be encrypted.
Based on this, in order to encrypt the whole service data, before extracting and combining the characters in the service data according to at least one preset step, a designated character may be inserted before the first character of the service data, and when the characters in the service data are extracted and combined according to the step, the characters in the service data inserted with the designated character may be extracted and combined according to the step according to at least one preset step. Thus, the first character in the service data is changed into the second character, so that the encryption of the whole service data can be realized. It will be appreciated that in this way, the first character in the decrypted service data needs to be removed during subsequent decryption.
S102, converting each character in the processed service data into a binary code to obtain a binary code sequence.
S103, dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments.
The specified length may be set according to practical situations, for example, may be 8 bits, 16 bits, 32 bits, or the like, and in the embodiment of the present application, the specified length is 16 bits.
In one or more embodiments, after dividing the binary sequence into code segments with a specified length to obtain a plurality of binary code segments, the length of the last binary code segment in the plurality of binary code segments may be lower than the specified length (for example, the specified length is 16 bits, and the length of the last binary code segment is 8 bits), and then the data of the last binary code segment in the plurality of binary code segments may be padded so that the length of the last binary code segment in the plurality of binary code segments is equal to the specified length.
Wherein, when data is filled, a binary character 0 can be added after the last binary coding segment. For example, the length is designated as 16 bits, and the last binary segment is 00110011, and after data padding is performed on the last binary segment, the obtained binary segment may be 0011001100000000.
S104, carrying out logic operation on the preset initial binary code segment and a first binary code segment in the plurality of binary code segments, and encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the first binary code segment in the plurality of binary code segments.
The length of the initial binary code is the same as the length of any binary code segment in the plurality of binary code segments, for example, the lengths of the plurality of binary code segments are all 16 bits, and then the length of the initial binary code is also 16 bits.
The initial binary segment is logically operated on with a first binary segment of the plurality of binary segments, which may be, but is not limited to, an exclusive or operation or an exclusive or operation. In the embodiment of the application, the exclusive OR operation can be performed on the preset initial binary coding section and the first binary coding section in the plurality of binary coding sections.
After the exclusive-or operation is performed, the logical operation result may be encrypted by an encryption key to obtain a ciphertext segment corresponding to a first binary code segment of the plurality of binary code segments, where the ciphertext segment has a length identical to a length of the binary code segment. In the embodiment of the application, the logic operation result can be encrypted by an advanced encryption standard (Advanced Encryption Standard, AES) algorithm based on the encryption key. The AES algorithm includes four steps of key expansion, initial round, repetition round, and final round, the specific principles of which are not described in detail in the embodiments of the present application.
S105, carrying out logic operation on the (i+1) th binary code segment in the plurality of binary code segments and the ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain the ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments.
Wherein i is a positive integer.
Specifically, the 2 nd binary code segment and the ciphertext segment corresponding to the 1 st binary code segment in the plurality of binary code segments are subjected to logic operation, and then the logic operation result is encrypted through an encryption key to obtain the ciphertext segment corresponding to the 2 nd binary code segment in the plurality of binary code segments. And then carrying out logic operation on the 3 rd binary coding section and the ciphertext section corresponding to the 2 nd binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain the ciphertext section corresponding to the 3 rd binary coding section in the plurality of binary coding sections, and the like to obtain the ciphertext section corresponding to each binary coding section in the plurality of binary coding sections.
In the embodiment of the application, since the initial binary code segment and the first binary code segment in the plurality of binary code segments are subjected to exclusive or operation, the subsequent logic operation is also an exclusive or operation, that is, the (i+1) th binary code segment in the plurality of binary code segments is subjected to exclusive or operation with the ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments.
S106, sequentially combining ciphertext segments corresponding to the binary coding segments in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
In one or more embodiments, after sequentially combining ciphertext segments corresponding to each binary code segment in the plurality of binary code segments to obtain encrypted data corresponding to service data, the encrypted data may be converted into a character according to binary codes of every 8 bits, and the encrypted data may be converted into a character sequence.
According to the service data theft prevention method based on artificial intelligence, characters in service data are extracted according to the preset step length and then combined to obtain processed service data, so that primary encryption of the service data can be realized; then converting each character in the processed service data into binary codes to obtain binary code sequences; dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments; carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer; and sequentially combining ciphertext segments corresponding to each binary code segment in the plurality of binary code segments to obtain encrypted data corresponding to the service data, so that the service data after primary encryption can be secondarily encrypted through the initial binary code segment and the encryption key. Therefore, multiple encryption of the service data can be realized, the security of the service data is improved, the service data is further effectively prevented from being stolen, serious safety risks and economic losses caused by the leakage of the service data are avoided, and the method is convenient for practical application and popularization.
Referring to fig. 2, a second aspect of the embodiment of the present application provides an artificial intelligence based service data anti-theft system, which includes:
The data processing unit is used for extracting and combining characters in the service data according to the preset at least one step length to obtain the processed service data;
The coding unit is used for converting each character in the processed service data into binary codes to obtain binary code sequences;
The dividing unit is used for dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
The operation unit is used for carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; and
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And the combining unit is used for sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
The working process, working details and technical effects of the service data anti-theft system based on artificial intelligence provided in the second aspect of the present embodiment may be referred to in the first aspect of the present embodiment, and will not be described herein again.
As shown in fig. 3, a third aspect of the embodiment of the present application provides an electronic device, including a memory, a processor and a transceiver, which are sequentially communicatively connected, where the memory is configured to store a computer program, the transceiver is configured to send and receive a message, and the processor is configured to read the computer program, and perform the service data theft prevention method based on artificial intelligence according to the first aspect of the embodiment.
By way of specific example, the Memory may include, but is not limited to, random Access Memory (RAM), read Only Memory (ROM), flash Memory (Flash Memory), first-in-first-out Memory (FIFO), and/or first-in-last-out Memory (FILO), etc.; the processor may not be limited to a microprocessor of the STM32F105 family, ARM (Advanced RISC Machines), X86 or other architecture processor or a processor of an integrated NPU (neural-network processing units); the transceiver may be, but is not limited to, a WiFi (wireless fidelity) wireless transceiver, a bluetooth wireless transceiver, a General Packet Radio Service (GPRS) wireless transceiver, a ZigBee (low power local area network protocol based on the ieee802.15.4 standard) wireless transceiver, a 3G transceiver, a 4G transceiver, and/or a 5G transceiver, etc.
A fourth aspect of the present embodiment provides a computer readable storage medium storing instructions comprising the method for preventing theft of service data based on artificial intelligence according to the first aspect of the present embodiment, i.e. the computer readable storage medium has instructions stored thereon, which when executed on a computer, perform the method for preventing theft of service data based on artificial intelligence according to the first aspect. The computer readable storage medium refers to a carrier for storing data, and may include, but is not limited to, a floppy disk, an optical disk, a hard disk, a flash Memory, and/or a Memory Stick (Memory Stick), etc., where the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
A fifth aspect of the present embodiment provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the artificial intelligence based traffic data theft prevention method according to the first aspect of the embodiment, wherein the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus.
It should be understood that specific details are provided in the following description to provide a thorough understanding of the example embodiments. However, it will be understood by those of ordinary skill in the art that the example embodiments may be practiced without these specific details. For example, a system may be shown in block diagrams in order to avoid obscuring the examples with unnecessary detail. In other instances, well-known processes, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the example embodiments.
Finally, it should be noted that: the foregoing description is only of the preferred embodiments of the invention and is not intended to limit the scope of the invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. An artificial intelligence-based service data theft prevention method is characterized by comprising the following steps:
according to at least one preset step length, extracting characters in the service data according to the step length, and then combining the extracted characters to obtain the processed service data;
converting each character in the processed service data into binary codes to obtain binary code sequences;
Dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
Carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, and encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections;
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
2. The method for preventing theft of service data based on artificial intelligence according to claim 1, wherein the at least one step length includes K step lengths, the step length extracting the characters in the service data according to the preset at least one step length, and then combining the extracted characters to obtain the processed service data, including:
extracting characters in the latest business data according to the kth step length to obtain a plurality of character segments, wherein the initial value of k is 1;
sequentially combining the extracted character segments to obtain new service data;
And enabling K to be added with 1 automatically, extracting characters in the latest service data according to the kth step length to obtain a plurality of character segments, and sequentially combining the extracted plurality of character segments to obtain new service data, wherein the extraction of the characters in the latest service data is stopped until k=K.
3. The method for preventing traffic data theft based on artificial intelligence according to claim 1, wherein the performing a logic operation on a preset initial binary segment and a first binary segment of the plurality of binary segments comprises:
Performing exclusive OR operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections;
The logic operation of the (i+1) th binary code segment in the plurality of binary code segments and the ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments comprises the following steps:
and performing exclusive OR operation on the (i+1) th binary coding section in the plurality of binary coding sections and a ciphertext section corresponding to the (i) th binary coding section in the plurality of binary coding sections.
4. The method for preventing theft of service data based on artificial intelligence according to claim 1, wherein encrypting the logical operation result by the encryption key comprises:
And encrypting the logic operation result by an advanced encryption standard algorithm based on the encryption key.
5. The artificial intelligence based business data theft prevention method according to claim 1, further comprising:
Inserting a designated character before the first character of the service data;
The step of extracting the characters in the service data according to the preset at least one step length and then combining the characters comprises the following steps:
And extracting the characters in the business data inserted with the designated characters according to the preset at least one step length, and then combining the extracted characters.
6. The artificial intelligence based business data theft prevention method according to claim 1, further comprising:
and if the length of the last binary coding section in the plurality of binary coding sections is lower than the appointed length, performing data filling on the last binary coding section in the plurality of binary coding sections so that the length of the last binary coding section in the plurality of binary coding sections is equal to the appointed length.
7. The method for preventing theft of business data based on artificial intelligence according to claim 6, wherein the specified length is 16 bits.
8. An artificial intelligence based service data theft prevention system, comprising:
The data processing unit is used for extracting and combining characters in the service data according to the preset at least one step length to obtain the processed service data;
The coding unit is used for converting each character in the processed service data into binary codes to obtain binary code sequences;
The dividing unit is used for dividing the binary coding sequence into coding segments with specified lengths to obtain a plurality of binary coding segments;
The operation unit is used for carrying out logic operation on a preset initial binary coding section and a first binary coding section in the plurality of binary coding sections, encrypting a logic operation result through an encryption key to obtain a ciphertext section corresponding to the first binary coding section in the plurality of binary coding sections, wherein the length of the initial binary coding is the same as the length of any binary coding section in the plurality of binary coding sections; and
Performing logic operation on the (i+1) th binary code segment in the plurality of binary code segments and a ciphertext segment corresponding to the (i) th binary code segment in the plurality of binary code segments, and then encrypting a logic operation result through an encryption key to obtain a ciphertext segment corresponding to the (i+1) th binary code segment in the plurality of binary code segments, wherein i is a positive integer;
And the combining unit is used for sequentially combining ciphertext segments corresponding to each binary coding segment in the plurality of binary coding segments to obtain encrypted data corresponding to the service data.
CN202410830897.4A 2024-06-26 2024-06-26 Business data theft prevention method and system based on artificial intelligence Active CN118410511B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410830897.4A CN118410511B (en) 2024-06-26 2024-06-26 Business data theft prevention method and system based on artificial intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410830897.4A CN118410511B (en) 2024-06-26 2024-06-26 Business data theft prevention method and system based on artificial intelligence

Publications (2)

Publication Number Publication Date
CN118410511A CN118410511A (en) 2024-07-30
CN118410511B true CN118410511B (en) 2024-09-24

Family

ID=92001226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410830897.4A Active CN118410511B (en) 2024-06-26 2024-06-26 Business data theft prevention method and system based on artificial intelligence

Country Status (1)

Country Link
CN (1) CN118410511B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114580001A (en) * 2022-03-11 2022-06-03 合肥工业大学 Encryption and decryption algorithm and file protection method for excel file

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8031865B2 (en) * 2004-01-08 2011-10-04 Encryption Solutions, Inc. Multiple level security system and method for encrypting data within documents
US7752453B2 (en) * 2004-01-08 2010-07-06 Encryption Solutions, Inc. Method of encrypting and transmitting data and system for transmitting encrypted data
AU2008327506B2 (en) * 2007-07-31 2012-06-07 Artus, Karen Mary Method and system for encryption of data
EP2351288B1 (en) * 2008-10-23 2014-12-10 University Of Ulster An encryption method
CN109951268B (en) * 2019-02-18 2020-12-22 吉林大学珠海学院 Encryption and decryption method and device based on bit permutation and bit permutation

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114580001A (en) * 2022-03-11 2022-06-03 合肥工业大学 Encryption and decryption algorithm and file protection method for excel file

Also Published As

Publication number Publication date
CN118410511A (en) 2024-07-30

Similar Documents

Publication Publication Date Title
CN116032474B (en) Safety protection system based on big data computer network
Nohl Attacking phone privacy
CN115865523B (en) Data encryption transmission method for information analysis system
US20120134490A1 (en) Selective Data Encryption and Decryption Method and Apparatus
EP3185466B1 (en) Encrypted communications method and communications terminal, and computer storage medium
CN103475463B (en) Encryption implementation method and device
CN110401527A (en) Data encryption, decryption method, device and storage medium
CN112073372B (en) Dual encryption method and decryption method for communication message of power system and message interaction system
CN115659409B (en) Financial asset transaction data safe storage method
CN108830096A (en) Data processing method, device, electronic equipment and storage medium
CN111224974A (en) Method, system, electronic device and storage medium for network communication content encryption
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN117708847B (en) 3C product leasing platform data processing method based on data compression and encryption
CN105303075A (en) PDF format based adaptive text watermarking method
CN112199699A (en) Character string encryption and decryption method and device, storage medium and processor
CN115941189A (en) Encryption method for document data
CN118410511B (en) Business data theft prevention method and system based on artificial intelligence
CN112737767B (en) Method and system for generating message authentication code resisting differential power analysis and time attack
CN114285610A (en) Method for encrypting and transmitting information
US20240178999A1 (en) Method for data encryption, terminal device and non-transitory computer-readable storage medium
CN108173906A (en) Installation kit method for down loading, device, storage medium and electronic equipment
CN106059748B (en) A kind of lightweight secure storage method of data regenerating code safely based on block
CN107527084A (en) Electronic card processing method and processing device
CN107135064B (en) Information encryption method based on depth self-encoder
CN111859436B (en) Data security encryption method for vehicle insurance anti-fraud platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant