Disclosure of Invention
In order to solve the technical problems in the related art, the present disclosure provides a communication data processing method and apparatus.
The invention provides a communication data processing method, which is applied to a communication terminal and comprises the following steps:
receiving target communication data sent by a target terminal, wherein the target communication data comprise data tags, and extracting data tag attributes from the data tags according to a preset attribute extraction method;
determining a data transmission path corresponding to the target communication data through the data tag attribute; encrypting the target communication data based on the data transmission path to obtain encrypted data;
acquiring a data code corresponding to data to be transmitted, and adding the encrypted data into the data to be transmitted and carrying out interleaving coding processing on the encrypted data based on the data label attribute and a code field and a code identifier corresponding to the data code in the data to be transmitted to obtain a data code encrypted packet corresponding to the data code in the data to be transmitted;
for the data code encryption package in the data to be transmitted, determining a verification ratio of the data code encryption package in a preset transmission path based on a first weight cumulative value verified by the data code encryption package in the preset transmission path and a second weight cumulative value verified by the data to be transmitted in the preset transmission path;
determining the safety factor of the data coding encryption packet in the preset transmission path according to the verification ratio of the data coding encryption packet in the preset transmission path;
judging whether the data coding encryption package in the data to be transmitted is a safety data encryption package or not based on the safety factor; and if so, sending the security data encryption packet to the user side according to a preset sending path.
In an alternative embodiment, extracting the data tag attribute from the data tag according to a preset attribute extraction method specifically includes:
determining identification information corresponding to a target data tag in the data tags and tag type information corresponding to the target data tag, wherein the tag type information represents type information of the target data tag in the data tags;
acquiring a data label set corresponding to the identification information, wherein the data label set comprises different types of pre-stored subsets, and the different types of subsets are matched with the type information of the target data label corresponding to the identification information;
according to the identification information and the label type information, searching a target subset matched with the data labels in the data label set, and determining a set attribute value of the target subset according to the matching degree;
extracting data label attributes from the data labels according to a preset attribute extraction method and the set attribute values; the preset attribute extraction method comprises the step of extracting the data label attribute according to an extraction path determined by the set attribute value.
In an alternative embodiment, a data transmission path corresponding to the target communication data is determined through the data tag attribute; encrypting the target communication data based on the data transmission path to obtain encrypted data, specifically comprising:
analyzing state information of a communication network state corresponding to the target communication data, and extracting a state information list corresponding to the target communication data through multiple state information analyses; the extracting of the state information list corresponding to the target communication data through multiple state information analysis comprises the following steps: dividing the target communication data into a data transmission path corresponding to the target communication data determined by the data tag attribute and path information corresponding to the data transmission path; extracting the path parameters of the data transmission path to obtain path parameter values; extracting a path coding factor corresponding to the path information, and integrating the path parameter value and the path coding factor to obtain a state information list corresponding to the target communication data;
filtering redundant data in the target communication data according to a preset screening standard to obtain target communication data reserved after filtering;
and encrypting the target communication data which is reserved after filtering based on the state information list corresponding to the target communication data and the data transmission path to obtain encrypted data.
In an alternative embodiment, based on the data tag attribute and the coding field and the coding identifier corresponding to the data code in the data to be transmitted, adding the encrypted data to the data to be transmitted and performing interleaving coding processing to obtain a data code encrypted packet corresponding to the data code in the data to be transmitted, specifically including:
acquiring data fusion weight and associated data between the encrypted data and the data to be transmitted based on the data label attribute and a coding field and a coding identifier corresponding to a data code in the data to be transmitted;
under the condition that the encrypted data contains abnormal data information according to the data fusion weight, determining normal state data information in the encrypted data according to the abnormal data information in the encrypted data and the data fusion weight between the encrypted data and the data to be transmitted, and adding the normal state data information to the data to be transmitted;
pre-extracting a reference data stream corresponding to any data stream of normal state data information in the encrypted data, and determining a data stream with the minimum data updating frequency in the data to be transmitted as an appointed data stream;
interleaving the reference data stream and the specified data stream according to a preset interleaving method, obtaining a target interleaved data set in the specified data stream, and generating a data set library between the encrypted data and the data to be transmitted according to the reference data stream and the target interleaved data set;
and searching a target data code matched with the data code in the data to be transmitted in the data set library, matching the target data code with the data stream where the reference data stream is located, and encrypting to obtain a data code encryption package corresponding to the data code in the data to be transmitted.
In an alternative embodiment, determining the safety factor of the data encoding encryption packet in the preset transmission path according to the verification ratio of the data encoding encryption packet in the preset transmission path specifically includes:
determining a transmission link factor corresponding to the preset transmission path through the data coding encryption packet;
carrying out ratio evaluation on a verification ratio obtained according to the times of the verification of a plurality of adjacent parameter nodes in the transmission link factor in a preset transmission path to obtain an evaluation value and a corresponding evaluation index;
evaluating the data coding encryption package based on the evaluation value, and screening out the difference data codes obtained by matching evaluation indexes corresponding to the evaluation values in the data coding encryption package to obtain a target data encryption package;
and judging the confidence coefficient corresponding to the transmission link factor in the preset transmission path based on the target data encryption packet, if the confidence coefficient corresponding to the transmission link factor in the preset transmission path is greater than or equal to the preset confidence coefficient, judging that the preset transmission path is a safe path, and determining the safety coefficient of the data coding encryption packet in the preset transmission path according to the confidence coefficient corresponding to the safe path.
The invention also provides a communication data processing device, which is applied to a communication terminal, and the device comprises:
the system comprises a tag attribute extraction module, a data tag identification module and a tag attribute extraction module, wherein the tag attribute extraction module is used for receiving target communication data sent by a target terminal, the target communication data comprise data tags, and data tag attributes are extracted from the data tags according to a preset attribute extraction method;
the encrypted data determining module is used for determining a data transmission path corresponding to the target communication data through the data label attribute; encrypting the target communication data based on the data transmission path to obtain encrypted data;
the encryption package determining module is used for acquiring a data code corresponding to data to be transmitted, adding the encrypted data to the data to be transmitted and carrying out interleaving coding processing on the encrypted data based on the data label attribute and a code field and a code identification corresponding to the data code in the data to be transmitted, so as to obtain a data code encryption package corresponding to the data code in the data to be transmitted;
a verification ratio obtaining module, configured to determine, for the data coded encrypted packet in the data to be transmitted, a verification ratio of the data coded encrypted packet in a preset transmission path based on a first weight cumulative value of the data coded encrypted packet verified in the preset transmission path and a second weight cumulative value of the data to be transmitted verified in the preset transmission path;
the safety factor determining module is used for determining the safety factor of the data coding encryption packet in the preset transmission path according to the verification ratio of the data coding encryption packet in the preset transmission path;
the safety data judgment module is used for judging whether the data coding encryption package in the data to be transmitted is a safety data encryption package or not based on the safety coefficient; and if so, sending the security data encryption packet to the user side according to a preset sending path.
In an alternative embodiment, the tag attribute extraction module is specifically configured to:
determining identification information corresponding to a target data tag in the data tags and tag type information corresponding to the target data tag, wherein the tag type information represents type information of the target data tag in the data tags;
acquiring a data label set corresponding to the identification information, wherein the data label set comprises different types of pre-stored subsets, and the different types of subsets are matched with the type information of the target data label corresponding to the identification information;
according to the identification information and the label type information, searching a target subset matched with the data labels in the data label set, and determining a set attribute value of the target subset according to the matching degree;
extracting data label attributes from the data labels according to a preset attribute extraction method and the set attribute values; the preset attribute extraction method comprises the step of extracting the data label attribute according to an extraction path determined by the set attribute value.
In an alternative embodiment, the encrypted data determining module is specifically configured to:
analyzing state information of a communication network state corresponding to the target communication data, and extracting a state information list corresponding to the target communication data through multiple state information analyses; the extracting of the state information list corresponding to the target communication data through multiple state information analysis comprises the following steps: dividing the target communication data into a data transmission path corresponding to the target communication data determined by the data tag attribute and path information corresponding to the data transmission path; extracting the path parameters of the data transmission path to obtain path parameter values; extracting a path coding factor corresponding to the path information, and integrating the path parameter value and the path coding factor to obtain a state information list corresponding to the target communication data;
filtering redundant data in the target communication data according to a preset screening standard to obtain target communication data reserved after filtering;
and encrypting the target communication data which is reserved after filtering based on the state information list corresponding to the target communication data and the data transmission path to obtain encrypted data.
In an alternative embodiment, the encrypted packet determining module is specifically configured to:
acquiring data fusion weight and associated data between the encrypted data and the data to be transmitted based on the data label attribute and a coding field and a coding identifier corresponding to a data code in the data to be transmitted;
under the condition that the encrypted data contains abnormal data information according to the data fusion weight, determining normal state data information in the encrypted data according to the abnormal data information in the encrypted data and the data fusion weight between the encrypted data and the data to be transmitted, and adding the normal state data information to the data to be transmitted;
pre-extracting a reference data stream corresponding to any data stream of normal state data information in the encrypted data, and determining a data stream with the minimum data updating frequency in the data to be transmitted as an appointed data stream;
interleaving the reference data stream and the specified data stream according to a preset interleaving method, obtaining a target interleaved data set in the specified data stream, and generating a data set library between the encrypted data and the data to be transmitted according to the reference data stream and the target interleaved data set;
and searching a target data code matched with the data code in the data to be transmitted in the data set library, matching the target data code with the data stream where the reference data stream is located, and encrypting to obtain a data code encryption package corresponding to the data code in the data to be transmitted.
In an alternative embodiment, the safety factor determining module is specifically configured to:
determining a transmission link factor corresponding to the preset transmission path through the data coding encryption packet;
carrying out ratio evaluation on a verification ratio obtained according to the times of the verification of a plurality of adjacent parameter nodes in the transmission link factor in a preset transmission path to obtain an evaluation value and a corresponding evaluation index;
evaluating the data coding encryption package based on the evaluation value, and screening out the difference data codes obtained by matching evaluation indexes corresponding to the evaluation values in the data coding encryption package to obtain a target data encryption package;
and judging the parameter value corresponding to the transmission link factor in the preset transmission path based on the target data encryption packet, if the parameter value corresponding to the transmission link factor in the preset transmission path is greater than or equal to the preset parameter value, judging the preset transmission path to be a safe path, and determining the safety coefficient of the data coding encryption packet in the preset transmission path according to the parameter value corresponding to the safe path.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects.
The utility model provides a communication data processing method and device, through extracting the data label attribute of the data label in the target communication data, confirm the data transmission route that the target communication data correspond and carry out encryption processing to the target communication data based on the data label attribute, further add the encrypted data to the data of treating transmission and carry out the interweaving coding processing, obtain the data code encryption package, verify the data code encryption package in setting up the transmission route, confirm the verification ratio, confirm the factor of safety of data code encryption package in presetting the transmission route according to the verification ratio, judge whether the data code encryption package is the security data encryption package based on the factor of safety, if, send the security data encryption package to the user according to the transmission route that predetermines. Therefore, when the data is attacked or tampered by a third party in the transmission process, the data leakage is avoided, and meanwhile, the safety of data transmission is ensured.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Fig. 1 is a flowchart of a communication data processing method according to the present disclosure, which may be applied to a communication terminal, and the method may include the following.
Step S110, receiving target communication data sent by a target terminal, wherein the target communication data comprises a data label, and extracting a data label attribute from the data label according to a preset attribute extraction method.
Step S120, determining a data transmission path corresponding to the target communication data through the data label attribute; and encrypting the target communication data based on the data transmission path to obtain encrypted data.
Step S130, acquiring a data code corresponding to the data to be transmitted, adding the encrypted data to the data to be transmitted and performing interleaving coding processing based on the data label attribute and a code field and a code identification corresponding to the data code in the data to be transmitted, so as to obtain a data code encrypted packet corresponding to the data code in the data to be transmitted.
Step S140, for the data coded encrypted packet in the data to be transmitted, determining a verification ratio of the data coded encrypted packet in a preset transmission path based on a first weight cumulative value verified by the data coded encrypted packet in the preset transmission path and a second weight cumulative value verified by the data to be transmitted in the preset transmission path.
Step S150, determining the safety factor of the data coding encryption packet in the preset transmission path according to the verification ratio of the data coding encryption packet in the preset transmission path.
Step S160, judging whether the data coding encryption package in the data to be transmitted is a safety data encryption package or not based on the safety factor; and if so, sending the security data encryption packet to the user side according to a preset sending path.
By executing the steps S110 to S160, by extracting the data tag attribute of the data tag in the target communication data, determining a data transmission path corresponding to the target communication data based on the data tag attribute and encrypting the target communication data, further adding the encrypted data to the data to be transmitted and performing interleaving coding processing to obtain a data coding encryption packet, verifying the data coding encryption packet in a preset transmission path to determine a verification ratio, determining a safety factor of the data coding encryption packet in a preset transmission path according to the verification ratio, judging whether the data coding encryption packet is a safety data encryption packet based on the safety factor, and if so, sending the safety data encryption packet to the user side according to a preset sending path. Therefore, when the data is attacked or tampered by a third party in the transmission process, the data leakage is avoided, and meanwhile, the safety of data transmission is ensured.
In a specific implementation, in order to accurately extract the data tag attribute in the data tag, what is described in step S110 may specifically include the following steps.
Step S1101 is to determine identification information corresponding to a target data tag among the data tags and tag type information corresponding to the target data tag, where the tag type information indicates type information of the target data tag among the data tags.
Step S1102, acquiring a data tag set corresponding to the identification information, where the data tag set includes pre-stored subsets of different types, and the subsets of different types are matched with the type information of the target data tag corresponding to the identification information.
Step S1103, searching a target subset matched with the data tag in the data tag set according to the identification information and the tag type information, and determining a set attribute value of the target subset according to a matching degree.
Step S1104, extracting a data tag attribute from the data tag according to a preset attribute extraction method and the set attribute value; the preset attribute extraction method comprises the step of extracting the data label attribute according to an extraction path determined by the set attribute value.
By executing steps S1101-S1104, acquiring a data tag set corresponding to the identification information, where the data tag set includes different types of pre-stored subsets, searching a target subset matched with the data tag in the data tag set, merging the target subset to determine a set attribute value of the target subset, and extracting the data tag attribute in the data tag based on the set attribute value. Thus, the data label attribute in the data label can be accurately extracted.
In the implementation, in order to occupy a large amount of processing resources and ensure the integrity of the target communication data, the content described in step S120 may specifically include the following steps.
Step S1201, analyzing the state information of the communication network state corresponding to the target communication data, and extracting a state information list corresponding to the target communication data through multiple times of state information analysis; the extracting of the state information list corresponding to the target communication data through multiple state information analysis comprises the following steps: dividing the target communication data into a data transmission path corresponding to the target communication data determined by the data tag attribute and path information corresponding to the data transmission path; extracting the path parameters of the data transmission path to obtain path parameter values; and extracting a path coding factor corresponding to the path information, and integrating the path parameter value and the path coding factor to obtain a state information list corresponding to the target communication data.
Step S1202, filtering the redundant data in the target communication data according to a preset filtering standard, to obtain target communication data retained after filtering.
Step S1203, performing encryption processing on the filtered reserved target communication data based on the state information list corresponding to the target communication data and the data transmission path, to obtain encrypted data.
By executing the steps S1201 to S1203, first performing state information analysis on the communication network state corresponding to the target communication data, further extracting a state information list corresponding to the target communication data, then filtering redundant data in the target communication data according to a preset screening standard, and finally performing encryption processing on the state information list corresponding to the target communication data and the filtered and retained target communication data to obtain encrypted code data. Therefore, by filtering the redundant data in the target communication data, the occupation of a large amount of processing resources due to the redundant data in the target communication data is avoided, the encryption processing efficiency is improved, and the integrity of the target communication data is further improved.
In the implementation, in order to ensure the security of the data encoding encryption packet, the following steps may be specifically included in the content described in step S130.
Step S1301, acquiring a data fusion weight and associated data between the encrypted data and the data to be transmitted based on the data tag attribute and a code field and a code identifier corresponding to a data code in the data to be transmitted.
Step S1302, determining normal state data information in the encrypted data according to the data information with abnormal state in the encrypted data and the data fusion weight between the encrypted data and the data to be transmitted, and adding the normal state data information to the data to be transmitted, when it is determined that the encrypted data contains data information with abnormal state according to the data fusion weight.
Step S1303, pre-extracting a reference data stream corresponding to any data stream of the normal state data information in the encrypted data, and determining a data stream with the minimum data update frequency in the to-be-transmitted data as an appointed data stream.
Step S1304, performing interleaving processing on the reference data stream and the specified data stream according to a preset interleaving method, obtaining a target interleaved data set in the specified data stream, and generating a data set library between the encrypted data and the data to be transmitted according to the reference data stream and the target interleaved data set.
Step 1305, searching a target data code matched with the data code in the data to be transmitted in the data set library, matching the target data code with the data stream where the reference data stream is located, and encrypting to obtain a data code encryption package corresponding to the data code in the data to be transmitted.
By executing the steps S1301 to S1305, determining data information with abnormal state in the encrypted data through data fusion weight between the encrypted data and the data to be transmitted, further determining a normal state in the encrypted data according to the data information with abnormal state and the data fusion weight, adding the data information with the normal state into the data to be transmitted, further performing interleaving processing on a reference data stream in the encrypted data and an appointed data stream in the data to be transmitted to obtain a target interleaved data set, generating a data set library between the encrypted data and the data to be transmitted based on the target interleaved data set and the reference data stream, further searching and encrypting matched target data codes in the data set library to obtain a data code encrypted package. By the design, on one hand, the quality of the data coding encryption packet can be improved, and on the other hand, the safety of the data coding encryption packet can be ensured.
During specific implementation, the security and the integrity of the data encoding encryption package are improved in order to avoid the data encoding encryption package from being tampered by third-party software in the transmission process. The content described in step S150 may specifically include the following steps.
Step S1501, determining a transmission link factor corresponding to the preset transmission path through the data encoding encryption packet.
Step S1502 performs ratio evaluation on a verification ratio obtained according to the number of times that a plurality of adjacent parameter nodes in the transmission link factor are verified in a preset transmission path, to obtain an evaluation value and a corresponding evaluation index.
And S1503, evaluating the data code encryption package based on the evaluation value, and screening out the difference data codes obtained by matching the evaluation indexes corresponding to the evaluation values in the data code encryption package to obtain the target data encryption package.
Step S1504, determining a confidence coefficient corresponding to the transmission link factor in the preset transmission path based on the target data encryption packet, if the confidence coefficient corresponding to the transmission link factor in the preset transmission path is greater than or equal to a preset confidence coefficient, determining that the preset transmission path is a safe path, and determining the safety coefficient of the data coding encryption packet in the preset transmission path according to the confidence coefficient corresponding to the safe path.
By executing the steps S1501 to S1504, the verification ratio values obtained by verifying a plurality of adjacent parameter nodes in the transmission link factor in the preset transmission path are evaluated, the data encoding encryption packet is evaluated based on the evaluation values obtained by the evaluation, and then the differential data encoding in the data encoding encryption packet is screened out, so that the target data encryption packet is obtained. And judging the confidence coefficient corresponding to the transmission link factor in the preset transmission path based on the target data encryption packet, judging to obtain that the preset transmission path is a safe path, and determining the safety coefficient of the data coding encryption packet in the preset transmission path according to the confidence coefficient corresponding to the safe path. Therefore, the data encoding encryption package can be prevented from being tampered by third-party software in the transmission process through verification, and the safety and the integrity of the data encoding encryption package are further improved.
In practical implementation, in order to quickly obtain the security data encryption packet and improve the transmission efficiency of the security data encryption packet, the following sub-contents may be specifically included in step S160.
And judging whether the transmission time length and the transmission time point of the data coding encryption package in the data to be transmitted and the data encryption quality parameter corresponding to the data coding encryption package accord with preset indexes or not based on the safety factor, if so, judging whether the data coding encryption package is a safety data encryption package or not, and sending the safety data encryption package to a user side according to a preset sending path.
Through the content, the safety data encryption package can be obtained through the judging method, and meanwhile, the transmission efficiency of the safety data encryption package can be improved.
On the basis of the above, please refer to fig. 2, the present invention provides a communication data processing apparatus 100, which is applied to a communication terminal, and the apparatus may specifically include the following functional modules.
The tag attribute extraction module 110 is configured to receive target communication data sent by a target terminal, where the target communication data includes a data tag, and extract a data tag attribute from the data tag according to a preset attribute extraction method.
An encrypted data determining module 120, configured to determine, according to the data tag attribute, a data transmission path corresponding to the target communication data; and encrypting the target communication data based on the data transmission path to obtain encrypted data.
The encryption packet determining module 130 is configured to obtain a data code corresponding to data to be transmitted, add the encrypted data to the data to be transmitted based on the data tag attribute and a code field and a code identifier corresponding to the data code in the data to be transmitted, and perform interleaving coding processing to obtain a data code encryption packet corresponding to the data code in the data to be transmitted.
A verification ratio obtaining module 140, configured to determine, for the data coded encrypted packet in the data to be transmitted, a verification ratio of the data coded encrypted packet in a preset transmission path based on a first weight cumulative value of the data coded encrypted packet verified in the preset transmission path and a second weight cumulative value of the data to be transmitted verified in the preset transmission path.
And a safety factor determining module 150, configured to determine a safety factor of the data encoding encryption packet in the preset transmission path according to a verification ratio of the data encoding encryption packet in the preset transmission path.
The safety data judgment module 160 is configured to judge whether the data coding encryption packet in the data to be transmitted is a safety data encryption packet based on the safety factor; and if so, sending the security data encryption packet to the user side according to a preset sending path.
In an alternative embodiment, the tag attribute extraction module 110 is specifically configured to:
and determining identification information corresponding to a target data tag in the data tags and tag type information corresponding to the target data tag, wherein the tag type information represents type information of the target data tag in the data tags.
And acquiring a data label set corresponding to the identification information, wherein the data label set comprises different types of pre-stored subsets, and the different types of subsets are matched with the type information of the target data label corresponding to the identification information.
And searching a target subset matched with the data labels in the data label set according to the identification information and the label type information, and determining a set attribute value of the target subset according to the matching degree.
Extracting data label attributes from the data labels according to a preset attribute extraction method and the set attribute values; the preset attribute extraction method comprises the step of extracting the data label attribute according to an extraction path determined by the set attribute value.
In an alternative embodiment, the encrypted data determining module 120 is specifically configured to:
analyzing state information of a communication network state corresponding to the target communication data, and extracting a state information list corresponding to the target communication data through multiple state information analyses; the extracting of the state information list corresponding to the target communication data through multiple state information analysis comprises the following steps: dividing the target communication data into a data transmission path corresponding to the target communication data determined by the data tag attribute and path information corresponding to the data transmission path; extracting the path parameters of the data transmission path to obtain path parameter values; and extracting a path coding factor corresponding to the path information, and integrating the path parameter value and the path coding factor to obtain a state information list corresponding to the target communication data.
And filtering redundant data in the target communication data according to a preset screening standard to obtain the target communication data reserved after filtering.
And encrypting the target communication data which is reserved after filtering based on the state information list corresponding to the target communication data and the data transmission path to obtain encrypted data.
In an alternative embodiment, the encrypted packet determining module 130 is specifically configured to:
and acquiring data fusion weight and associated data between the encrypted data and the data to be transmitted based on the data label attribute and the coding field and the coding identification corresponding to the data code in the data to be transmitted.
And under the condition that the encrypted data contains abnormal data information according to the data fusion weight, determining normal state data information in the encrypted data according to the abnormal data information in the encrypted data and the data fusion weight between the encrypted data and the data to be transmitted, and adding the normal state data information to the data to be transmitted.
And pre-extracting a reference data stream corresponding to any data stream of the normal state data information in the encrypted data, and determining the data stream with the minimum data updating frequency in the data to be transmitted as a specified data stream.
And interleaving the reference data stream and the specified data stream according to a preset interleaving method, obtaining a target interleaved data set in the specified data stream, and generating a data set library between the encrypted data and the data to be transmitted according to the reference data stream and the target interleaved data set.
And searching a target data code matched with the data code in the data to be transmitted in the data set library, matching the target data code with the data stream where the reference data stream is located, and encrypting to obtain a data code encryption package corresponding to the data code in the data to be transmitted.
In an alternative embodiment, the safety factor determining module 150 is specifically configured to:
and determining a transmission link factor corresponding to the preset transmission path through the data coding encryption packet.
Carrying out ratio evaluation on a verification ratio obtained according to the times of the verification of a plurality of adjacent parameter nodes in the transmission link factor in a preset transmission path to obtain an evaluation value and a corresponding evaluation index;
and evaluating the data coding encryption package based on the evaluation value, and screening out the difference data codes obtained by matching the evaluation indexes corresponding to the evaluation values in the data coding encryption package to obtain the target data encryption package.
And judging the parameter value corresponding to the transmission link factor in the preset transmission path based on the target data encryption packet, if the parameter value corresponding to the transmission link factor in the preset transmission path is greater than or equal to the preset parameter value, judging the preset transmission path to be a safe path, and determining the safety coefficient of the data coding encryption packet in the preset transmission path according to the parameter value corresponding to the safe path.
On the basis of the above, please refer to fig. 3 in combination, which provides a terminal 200, including a processor 211, a memory 212 and a bus 213 connected to the processor 211; wherein, the processor 211 and the memory 212 complete the communication with each other through the bus 213; the processor 211 is configured to call the program instructions in the memory 212 to execute the above-mentioned method.
Further, a readable storage medium is provided, on which a program is stored, which when executed by a processor implements the method described above.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.