CN115933993B - Karst fracture network type aqueous medium antifouling function evaluation system and method - Google Patents

Karst fracture network type aqueous medium antifouling function evaluation system and method Download PDF

Info

Publication number
CN115933993B
CN115933993B CN202310005896.1A CN202310005896A CN115933993B CN 115933993 B CN115933993 B CN 115933993B CN 202310005896 A CN202310005896 A CN 202310005896A CN 115933993 B CN115933993 B CN 115933993B
Authority
CN
China
Prior art keywords
server
client
information
data block
data blocks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310005896.1A
Other languages
Chinese (zh)
Other versions
CN115933993A (en
Inventor
高文锋
殷东方
朱腾桥
韩子晨
徐仲仪
孟庆斋
任洪玲
蒋磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
No 801 Hydrogeological Engineering Geology Brigade of Shandong Bureau of Geology and Mineral Resources
Original Assignee
No 801 Hydrogeological Engineering Geology Brigade of Shandong Bureau of Geology and Mineral Resources
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by No 801 Hydrogeological Engineering Geology Brigade of Shandong Bureau of Geology and Mineral Resources filed Critical No 801 Hydrogeological Engineering Geology Brigade of Shandong Bureau of Geology and Mineral Resources
Priority to CN202310005896.1A priority Critical patent/CN115933993B/en
Publication of CN115933993A publication Critical patent/CN115933993A/en
Application granted granted Critical
Publication of CN115933993B publication Critical patent/CN115933993B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to the technical field of data communication, and particularly relates to an antifouling function evaluation system and method for karst fracture network type aqueous medium, wherein the method comprises the following steps: the client generates first sending information according to the determined data block and sends the first sending information to the receiving server; the receiving server extracts the determined data block from the first sending information, and meanwhile, the receiving server performs conversion processing on the determined data block to generate security authentication information; the client performs recovery processing on the security authentication information to extract a certain data block, and when the extracted certain data block is consistent with the self-stored certain data block, encrypts other data blocks by using the certain data block, and simultaneously transmits second transmission information including an encryption processing result to the receiving server; the receiving server decrypts the encryption processing result, and combines the data block determined by processing with other data blocks.

Description

Karst fracture network type aqueous medium antifouling function evaluation system and method
Technical Field
The invention belongs to the technical field of data communication, and particularly relates to an antifouling function evaluation system and method for karst fracture network type aqueous medium.
Background
The karst water system is complex in structure, different types of karst areas have different karst hydrogeological characteristics, the anti-fouling function of the karst areas is accurately evaluated, the karst water system has very important practical significance in the aspects of regional treatment and regulation of underground water pollution of the karst areas, the karst water system often has a double-layer structure, the karst underground water is generally stored in pores and cracks, the pores and the cracks can adsorb stable pollutants, a karst pipeline mainly performs migration, the karst pipeline can rapidly migrate non-persistent pollutants, and when the anti-fouling function of the karst areas is evaluated, a large amount of karst area hydrogeological investigation data are generally obtained by adopting a field investigation method, and different indexes such as the development condition, rainfall infiltration condition, protection layer characteristics and the like of the karst pipeline are obtained, so that the anti-fouling function is evaluated through an analysis program.
However, there are many factors affecting the anti-fouling ability of groundwater in karst areas, and the more indexes are used in the evaluation of anti-fouling function, the larger the corresponding data processing amount is, and the problem of large data processing amount can be solved by transmitting data including investigation data and analysis programs from a personal computer to a server, but there is a risk of data leakage when transmitting data to the server, and a solution is urgently needed for the technical problem.
Disclosure of Invention
The client of the invention divides the sending data into different sending data blocks and randomly determines the data block which is firstly sent to the server, the server of the invention carries out conversion processing on the data block which is firstly received and simultaneously sends the data block to the client of the invention to verify the identity of the client, and when the verification is passed, the client of the invention sends the residual data block to the server of the invention again, thereby aiming at avoiding the data of the client of the invention from being leaked.
In order to achieve the aim of the invention, the invention provides a method for evaluating the antifouling function of a karst fracture network type aqueous medium, which mainly comprises the following steps:
the method comprises the steps that a client divides transmission data into different transmission data blocks to be stored, a plurality of data blocks in the transmission data blocks are randomly determined, the client generates first transmission information according to the determined data blocks, the first transmission information further comprises an identification for carrying out security authentication on a receiving server, and the client further transmits the first transmission information to the receiving server;
when the receiving server receives first sending information from the client, the receiving server takes out the determined data block from the first sending information and stores the data block, and meanwhile, conversion processing is carried out on the determined data block according to the identification of the client in the first sending information for carrying out security authentication on the receiving server so as to generate security authentication information;
the client judges whether the safety authentication information from the receiving server is received within a preset time after the first sending information is sent out, if the safety authentication information is not received, the client judges that the data transmission between the client and the receiving server is unsafe, if the safety authentication information is received, the client carries out recovery processing on the safety authentication information to extract a determined data block, verifies the consistency of the extracted determined data block and the self-stored determined data block, and when the two are consistent, the client uses the self-stored determined data block to encrypt other self-stored data blocks and simultaneously sends second sending information comprising an encryption processing result to the receiving server, and when the two are inconsistent, the client judges that the data transmission between the client and the receiving server is unsafe;
the receiving server decrypts the encryption processing result in the second transmission information by using the determined data block stored by itself to obtain other data blocks, and processes the determined data block stored by itself and the other data blocks in combination.
As a preferable embodiment of the present invention, the receiving server performs conversion processing for the determined data block, including encrypting the determined data block using a symmetric encryption key, and including encrypting the determined data block using a self private key.
As a preferable technical scheme of the invention, the client performs recovery processing on the security authentication information, including decrypting the security authentication information using a symmetric decryption key, and including decrypting the security authentication information using a public key of the receiving server.
As a preferable technical scheme of the invention, the client divides the transmission data into different transmission data blocks for storage, randomly determines a plurality of data blocks therein, and further comprises the steps of firstly representing the transmission data into a binary form, calculating a hash value of the binary transmission data, secondly using the hash value and the binary transmission data to carry out binary multiplication operation to obtain result data for covering the original transmission data, finally dividing the current transmission data into different transmission data blocks, and randomly determining a plurality of transmission data blocks in the different transmission data blocks.
As a preferred technical solution of the present invention, the present transmission data is finally divided into different transmission data blocks, and after a plurality of transmission data blocks are randomly determined in the different transmission data blocks, the present invention further includes the following steps:
the client generates first sending information, wherein the first sending information comprises a determined data block and a target address of the determined data block, and the client sends the first sending information to a first server, and meanwhile deletes the determined data block stored by the client and only stores the rest other data blocks and the hash value; the first server receives first sending information from the client, stores the determined data block and the target address of the determined data block according to the first sending information, sets a storage validity period, and sends first notification information comprising the storage address and the storage validity period back to the client;
the client receives and stores the first notification information and transmits second transmission information including other data blocks to a second server; when the second server receives the second sending information, extracting other data blocks from the second sending information and storing the data blocks, and simultaneously sending second notification information to the client, wherein the second notification information comprises the address of the second server;
the client compares the address of the second server included in the second notification information with a target address stored in the client, and when the address of the second server and the target address are consistent, the client transmits third transmission information including the storage address of the determined data block to the second server; the second server sends third notification information to the first server according to a storage address in the third sending information, wherein the third notification information comprises the address of the second server;
the first server verifies whether the address of the second server in the third notification information is the same as the target address stored by the first server, if so, the first server sends the determined data block stored by the first server to the second server when the storage validity period is reached, and meanwhile, the first server sends fourth sending information to the client; after receiving the fourth transmission information, the client transmits fourth known information comprising the hash value stored by the client to the second server; the second server processes the determined data block and other data blocks in combination, and performs a binary division operation using the result data of the combination processing and the hash value.
As a preferable technical solution of the present invention, the determined data amount of the data block in the first transmission information sent by the client to the first server is larger than the data amount of the other data blocks in the second transmission information sent by the client to the second server.
The invention also provides an antifouling function evaluation system of the karst fracture network type aqueous medium, which mainly comprises the following modules:
the client module is used for dividing the sending data into different sending data blocks, randomly determining a plurality of data blocks in the sending data blocks and transmitting the data blocks to the receiving server, transmitting the rest of other data blocks to the receiving server when the data transmission between the receiving server and the receiving server is judged to be safe, transmitting the determined data blocks to the first server, transmitting the rest of other data blocks to the second server, transmitting the storage address of the determined data blocks to the second server after the verification of the second server is passed, and transmitting the hash value to the second server after the verification of the first server to the second server is passed;
the network module is used for carrying out bidirectional transmission of information between the client module and the server module;
the server module comprises a receiving server, a first server and a second server, wherein the receiving server is used for receiving the determined data block and the rest other data blocks from the client module, simultaneously combining and processing the determined data block and the other data blocks, sending security authentication information to the client module, the first server is used for storing the determined data block and the target address of the determined data block from the client module, verifying the second server, sending the determined data block to the second server when the verification passes, the second server is used for receiving the rest other data blocks sent by the client module, simultaneously sending verification information to the client module, further sending verification information to the first server, receiving the hash value from the client module and the determined data block from the first server, and performing operation processing in combination with the stored other data blocks.
Compared with the prior art, the invention has the following beneficial effects:
the invention transmits the transmitting data including the investigation data and the analysis program from the client to the server, solves the problem of large data processing amount when carrying out the anti-fouling function evaluation of the karst fracture network type water-containing medium, can also ensure that the transmitting data is not leaked, the client and the first server always store only part of the transmitting data, even if the client and the first server are illegally attacked, the data leakage can not be caused, and the second server can only have complete transmitting data when the safety authentication of the client and the first server to the second server is passed, and can also shorten the total communication distance between the client and the second server and reduce the data transmission time.
Drawings
FIG. 1 is a flow chart of the steps of a method for evaluating the anti-fouling function of a karst fracture network type aqueous medium according to the present invention;
FIG. 2 is a diagram showing the construction of an evaluation system for the antifouling function of a karst fracture network type aqueous medium according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of the present application.
The inventors found in practice that factors affecting the anti-fouling ability of groundwater in a karst region are many, for example, the more indexes are used in the anti-fouling function evaluation such as karst pipeline development conditions, rainfall infiltration conditions, protection layer characteristics, etc., the larger the corresponding data processing amount is, the problem of large data processing amount can be solved by transmitting data including investigation data and analysis programs from a personal computer to a server, but there is a risk of data leakage when transmitting data to the server.
Aiming at the risk of data leakage when data are transmitted to a server, the invention firstly provides a karst fracture network type aqueous medium antifouling function evaluation method shown in figure 1, which is realized by executing the following steps:
dividing the transmission data into different transmission data blocks by a client for storage, randomly determining a plurality of data blocks therein, generating first transmission information by the client according to the determined data blocks, wherein the first transmission information also comprises an identifier for carrying out security authentication on a receiving server, and transmitting the first transmission information to the receiving server by the client;
step two, when the receiving server receives the first sending information from the client, the receiving server takes out the determined data block from the first sending information and stores the data block, and meanwhile, the receiving server carries out conversion processing on the determined data block according to the identification of the receiving server for security authentication by the client in the first sending information so as to generate security authentication information;
step three, the client judges whether the safety authentication information from the receiving server is received within a preset time after the first sending information is sent out, if the safety authentication information is not received, the client judges that the data transmission between the client and the receiving server is unsafe, if the safety authentication information is received, the client carries out recovery processing on the safety authentication information to extract a determined data block, verifies the consistency of the extracted determined data block and the self-stored determined data block, when the extracted determined data block and the self-stored determined data block are consistent, the client uses the self-stored determined data block to encrypt other self-stored data blocks, and simultaneously sends second sending information comprising an encryption processing result to the receiving server, and when the extracted data block and the self-stored data block are inconsistent, the client judges that the data transmission between the client and the receiving server is unsafe;
and step four, the receiving server uses the determined data block stored by the receiving server to decrypt the encryption processing result in the second sending information to obtain other data blocks, and processes the determined data block stored by the receiving server and the other data blocks in a combined way.
Specifically, in the first step, the client divides the transmission data into a plurality of data blocks to be stored, and generates the first transmission information to be transmitted to the receiving server, the first transmission information includes a plurality of randomly determined data blocks, and the client and the receiving server agree in advance on an identifier by which the client decides to verify the identity of the receiving server, in the second step, the receiving server receives the determined data blocks transmitted by the client, and converts the determined data blocks according to the identifier to generate security authentication information, in the third step, the client always judges whether the security authentication information is received after the first transmission information is transmitted, if the security authentication information is not received for a certain period of time, then the data transmission with the receiving server is considered to be unsafe, and the receiving server is refused to be illegally attacked by the receiving server, or a network problem between them, if the security authentication information is received, the receiving server recovers the security authentication information according to the identifier selected before it, and processes the recovered data blocks and the same as the data blocks before the data blocks are not received by the receiving server, and if the data blocks are determined to be further encrypted by the receiving server, and the key is further considered to be encrypted, in order to further ensure that the key is transmitted between the receiving server and the other steps, and the key is further encrypted if the data is not determined to be transmitted, and the receiving server uses the previously stored determined data blocks to decrypt the encryption processing result of the client so as to obtain other data blocks, and finally, the receiving server performs combination processing with the previously stored determined data blocks. Through the first step to the fourth step, the client will not send the complete sending data to the receiving server before determining that the data transmission with the receiving server is safe, so that the sending data can be prevented from being leaked.
Further, the receiving server performs conversion processing on the determined data block, including encrypting the determined data block using a symmetric encryption key, and including encrypting the determined data block using a private key thereof;
further, the client performs recovery processing on the security authentication information, including decrypting the security authentication information using a symmetric decryption key, and including decrypting the security authentication information using a public key of the receiving server.
Specifically, when generating the first transmission information sent to the receiving server, the client determines an identifier for performing security authentication on the receiving server, different identifiers represent different security authentication modes, the receiving server can complete authentication on own identity according to the identifier, if the receiving server uses a symmetric encryption key to encrypt a determined data block according to the identifier, the client uses the symmetric decryption key to decrypt the security authentication information, if the receiving server uses an own private key to encrypt the determined data block according to the identifier, the client uses a public key of the receiving server to decrypt the security authentication information, wherein the symmetric encryption key and the private key of the receiving server only are owned by the receiving server.
Further, the process that the client divides the transmission data into different transmission data blocks to store, and randomly determines a plurality of data blocks therein may further include that firstly the transmission data is represented in a binary form, and a hash value of the binary transmission data is calculated, secondly the original transmission data is covered by the result data of binary multiplication operation performed by using the hash value and the binary transmission data, and finally the present transmission data is divided into different transmission data blocks, and a plurality of transmission data blocks are randomly determined in the different transmission data blocks.
In particular, in the first step, the transmission data is directly divided into a plurality of different transmission data blocks, so that a plurality of data blocks are determined in the plurality of different transmission data blocks, which has the advantages of being convenient and fast, and the disadvantage of lacking the transformation processing for the transmission data, when an illegal third party which is an impossibility of a receiving server has acquired the determined data blocks transmitted by a client, there may be a risk that the illegal third party presumes the meaning of the determined data blocks or is complete transmission data based on the determined data blocks, so that the invention also proposes that the transformation processing can be performed on the transmission data before dividing the transmission data, namely, the hash value of the binary original transmission data is calculated, so that the hash value and the binary original transmission data are calculated, and the binary original transmission data is replaced by the result data.
Further, the inventor also found that in the method described in the first step to the fourth step, the client always stores the complete transmission data, if the client is attacked illegally, the transmission data is likely to be leaked, and in the case that the communication distance between the client and the receiving server is far, a long transmission time is required from the client to the receiving server, and the risk of data leakage is increased, so the invention further proposes the following steps to solve the technical problems on the basis of transforming the original transmission data:
step one, the client generates first sending information, wherein the first sending information comprises a determined data block and a target address of the determined data block, and the client sends the first sending information to a first server, and meanwhile deletes the determined data block stored by the client and only stores the rest other data blocks and the hash value; the first server receives first sending information from the client, stores the determined data block and the target address of the determined data block according to the first sending information, sets a storage validity period, and sends first notification information comprising the storage address and the storage validity period back to the client;
step two, the client receives and stores the first notification information, and sends second sending information comprising other data blocks to a second server; when the second server receives the second transmission information, extracting other data blocks from the second transmission information and storing the data blocks, and simultaneously transmitting second notification information to the client, wherein the second notification information comprises the address of the second server;
step three, the client compares the address of the second server included in the second notification information with the target address stored by the client, and when the address of the second server and the target address are consistent, the client transmits third transmission information including the storage address of the determined data block to the second server; the second server sends third notification information to the first server according to a storage address in the third sending information, wherein the third notification information comprises the address of the second server;
step four, the first server verifies whether the address of the second server in the third notification information is the same as the self-stored target address, if so, the first server sends the self-stored determined data block to the second server when the storage validity period is in the storage validity period, and meanwhile, the first server sends fourth sending information to the client; after receiving the fourth transmission information, the client transmits fourth known information including the hash value stored in the client to the second server; the second server processes the determined data block and other data blocks in combination, and performs binary division operation using the result data of the combination processing and the hash value.
Specifically, in the above step one, the client generates first transmission information to be transmitted to the first server based on the determined transmission data block obtained after the conversion processing of the original transmission data, the first transmission information further includes a destination address of the determined transmission data block, while the client deletes the determined transmission data block stored by itself, the client at this time no longer stores the entire transmission data, when the first server receives the first transmission information, stores the determined transmission data block, and the corresponding destination address, further sets a validity period for the stored contents, exceeding the validity period, and includes the stored address and the validity period in the first notification information, in the above step two, the client receives and stores the content of the first notification information while generating second transmission information to be transmitted to the second server using the remaining other data blocks, it is noted that the above first server is interposed between the client and the second server at a communication distance, the second server stores the second transmission information block in accordance with the client before the first transmission information, and sets the validity period for the stored contents, and when the second server receives the second transmission information, and the second transmission information is not included in the second notification information, the client is not included in the second notification information, and the second transmission information is not included in the second notification information, the second transmission information is stored in the second notification information, and the second transmission information is not included in the second notification information, and the second transmission information is stored in the second notification information, and the second transmission information is not included in the second transmission information, and the second transmission information is stored in the second transmission information, and the second transmission information is sent to the second transmission information, and the second transmission information is used, therefore, after the second server receives the third transmission information, the second server can send third notification information to the first server according to the storage address to verify the identity of the second server, the third notification information comprises the address of the second server, in the fourth step, the first server checks whether the address of the second server in the third notification information is identical to the target address stored by the second server, when the address of the second server is different from the target address stored by the second server, the first server considers that the data transmission with the second server is unsafe, when the address of the second server is identical to the target address, the first server further checks whether the data transmission with the second server is unsafe, if the data transmission with the second server is not, the data transmission with the second server is still considered unsafe, the second server is refused to send a determined data block to the second server, when the second server possibly suffers illegal attack, the second server reduces the possibility that the illegal third party is illegal to act as the second server, if the address is different from the second server, the fourth transmission information is sent to the client, the client knows that the second server is safe when the second server is received, the second server is safe, the data transmission with the second server is safe, the second server is stored in the second server, the second server is safe, the data is the second data is stored in the second server, the second data is the second server, and the second data is different from the first data.
By the method described above, the client and the first server always store only a part of the transmitted data, so that even if the client and the first server are illegally attacked, data leakage cannot be caused, in addition, before the client and the first server pass multiple security authentications, the second server cannot have complete data, and only when the client and the first server pass the authentication, the second server can have complete data, so that the data cannot be leaked.
Further, the data amount of the determined data block in the first transmission information sent to the first server by the client is larger than the data amount of the other data block in the second transmission information sent to the second server by the client. Specifically, the single communication distance between the first server and the second server is smaller than the single communication distance between the client and the second server, so that the first server sends the determined data block to the second server, the total communication distance between the client and the second server can be shortened, the data transmission time between the client and the second server is shortened, the data volume of the determined data block is set to be larger than the data volume of other data blocks, and the data transmission time can be further shortened.
Referring to fig. 2, the invention further provides an anti-fouling function evaluation system of a karst fracture network type aqueous medium, which comprises a client module, a network module and a server module, wherein the client module, the network module and the server module are used for realizing the anti-fouling function evaluation method of the karst fracture network type aqueous medium, and specifically, the functions of the modules are described as follows:
the client module is used for dividing the sending data into different sending data blocks, randomly determining a plurality of data blocks in the sending data blocks and transmitting the data blocks to the receiving server, transmitting the rest of other data blocks to the receiving server when the data transmission between the receiving server and the receiving server is judged to be safe, transmitting the determined data blocks to the first server, transmitting the rest of other data blocks to the second server, transmitting the storage address of the determined data blocks to the second server after the verification of the second server is passed, and transmitting the hash value to the second server after the verification of the first server to the second server is passed;
the network module is used for carrying out bidirectional transmission of information between the client module and the server module;
the server module comprises a receiving server, a first server and a second server, wherein the receiving server is used for receiving the determined data block and the rest other data blocks from the client module, simultaneously combining and processing the determined data block and the other data blocks, sending security authentication information to the client module, the first server is used for storing the determined data block and the target address of the determined data block from the client module, verifying the second server, sending the determined data block to the second server when the verification passes, the second server is used for receiving the rest other data blocks sent by the client module, simultaneously sending verification information to the client module, further sending verification information to the first server, receiving the hash value from the client module and the determined data block from the first server, and performing operation processing in combination with the stored other data blocks.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of computer programs, which may be stored on a non-transitory computer readable storage medium, and which, when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and for brevity, all of the possible combinations of the technical features of the above embodiments are not described, however, they should be considered as the scope of the description of the present specification as long as there is no contradiction between the combinations of the technical features.
The foregoing examples have been presented to illustrate only a few embodiments of the invention and are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (7)

1. The method for evaluating the antifouling function of the karst fracture network type aqueous medium is characterized by comprising the following steps of:
the method comprises the steps that a client divides transmission data into different transmission data blocks to be stored, a plurality of data blocks in the transmission data blocks are randomly determined, the client generates first transmission information according to the determined data blocks, the first transmission information further comprises an identification for carrying out security authentication on a receiving server, and the client further transmits the first transmission information to the receiving server;
when the receiving server receives first sending information from the client, the receiving server takes out the determined data block from the first sending information and stores the data block, and meanwhile, conversion processing is carried out on the determined data block according to the identification of the client in the first sending information for carrying out security authentication on the receiving server so as to generate security authentication information;
the client judges whether the safety authentication information from the receiving server is received within a preset time after the first sending information is sent out, if the safety authentication information is not received, the client judges that the data transmission between the client and the receiving server is unsafe, if the safety authentication information is received, the client carries out recovery processing on the safety authentication information to extract a determined data block, verifies the consistency of the extracted determined data block and the self-stored determined data block, and when the two are consistent, the client uses the self-stored determined data block to encrypt other self-stored data blocks and simultaneously sends second sending information comprising an encryption processing result to the receiving server, and when the two are inconsistent, the client judges that the data transmission between the client and the receiving server is unsafe;
the receiving server decrypts the encryption processing result in the second transmission information by using the determined data block stored by itself to obtain other data blocks, and processes the determined data block stored by itself and the other data blocks in combination.
2. The method for evaluating an antifouling function of a karst fracture network type aqueous medium according to claim 1, wherein the receiving server performs a conversion process for the determined data block, includes encrypting the determined data block using a symmetric encryption key, and includes encrypting the determined data block using a self private key.
3. The method for evaluating an antifouling function of a karst-crack network-type aqueous medium according to claim 1, wherein the client performs recovery processing on the security authentication information, including decrypting the security authentication information using a symmetric decryption key, and including decrypting the security authentication information using a public key of the reception server.
4. The method for evaluating an antifouling function of a karst fracture network type aqueous medium according to claim 1, wherein the client divides the transmission data into different transmission data blocks to store, randomly determines a plurality of the transmission data blocks, and further comprises the steps of firstly expressing the transmission data in a binary form, calculating a hash value of the binary transmission data, secondly covering the original transmission data with the result data of the binary multiplication operation using the hash value and the binary transmission data, finally dividing the present transmission data into different transmission data blocks, and randomly determining the plurality of transmission data blocks in the different transmission data blocks.
5. The method for evaluating an antifouling function of a karst fracture network type aqueous medium according to claim 4, wherein the method is characterized in that the present transmission data is divided into different transmission data blocks, and a plurality of transmission data blocks are randomly determined in the different transmission data blocks, and then the method further comprises the steps of:
the client generates first sending information, wherein the first sending information comprises a determined data block and a target address of the determined data block, and the client sends the first sending information to a first server, and meanwhile deletes the determined data block stored by the client and only stores the rest other data blocks and the hash value; the first server receives first sending information from the client, stores the determined data block and the target address of the determined data block according to the first sending information, sets a storage validity period, and sends first notification information comprising the storage address and the storage validity period back to the client;
the client receives and stores the first notification information and transmits second transmission information including other data blocks to a second server; when the second server receives the second sending information, extracting other data blocks from the second sending information and storing the data blocks, and simultaneously sending second notification information to the client, wherein the second notification information comprises the address of the second server;
the client compares the address of the second server included in the second notification information with a target address stored in the client, and when the address of the second server and the target address are consistent, the client transmits third transmission information including the storage address of the determined data block to the second server; the second server sends third notification information to the first server according to a storage address in the third sending information, wherein the third notification information comprises the address of the second server;
the first server verifies whether the address of the second server in the third notification information is the same as the target address stored by the first server, if so, the first server sends the determined data block stored by the first server to the second server when the storage validity period is reached, and meanwhile, the first server sends fourth sending information to the client; after receiving the fourth transmission information, the client transmits fourth known information comprising the hash value stored by the client to the second server; the second server processes the determined data block and other data blocks in combination, and performs a binary division operation using the result data of the combination processing and the hash value.
6. The method for evaluating an antifouling function of a karst-crack network-type aqueous medium according to claim 5, wherein the data amount of the determined data block in the first transmission information transmitted from the client to the first server is larger than the data amount of the other data blocks in the second transmission information transmitted from the client to the second server.
7. A system for evaluating the anti-fouling function of a karst-crack network-type aqueous medium, for implementing the method according to any one of claims 1 to 6, characterized by comprising the following modules:
the client module is used for dividing the sending data into different sending data blocks, randomly determining a plurality of data blocks in the sending data blocks and transmitting the data blocks to the receiving server, transmitting the rest of other data blocks to the receiving server when the data transmission between the receiving server and the receiving server is judged to be safe, transmitting the determined data blocks to the first server, transmitting the rest of other data blocks to the second server, transmitting the storage address of the determined data blocks to the second server after the verification of the second server is passed, and transmitting the hash value to the second server after the verification of the first server to the second server is passed;
the network module is used for carrying out bidirectional transmission of information between the client module and the server module;
the server module comprises a receiving server, a first server and a second server, wherein the receiving server is used for receiving the determined data block and the rest other data blocks from the client module, simultaneously combining and processing the determined data block and the other data blocks, sending security authentication information to the client module, the first server is used for storing the determined data block and the target address of the determined data block from the client module, verifying the second server, sending the determined data block to the second server when the verification passes, the second server is used for receiving the rest other data blocks sent by the client module, simultaneously sending verification information to the client module, further sending verification information to the first server, receiving the hash value from the client module and the determined data block from the first server, and performing operation processing in combination with the stored other data blocks.
CN202310005896.1A 2023-01-04 2023-01-04 Karst fracture network type aqueous medium antifouling function evaluation system and method Active CN115933993B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310005896.1A CN115933993B (en) 2023-01-04 2023-01-04 Karst fracture network type aqueous medium antifouling function evaluation system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310005896.1A CN115933993B (en) 2023-01-04 2023-01-04 Karst fracture network type aqueous medium antifouling function evaluation system and method

Publications (2)

Publication Number Publication Date
CN115933993A CN115933993A (en) 2023-04-07
CN115933993B true CN115933993B (en) 2023-05-30

Family

ID=85818379

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310005896.1A Active CN115933993B (en) 2023-01-04 2023-01-04 Karst fracture network type aqueous medium antifouling function evaluation system and method

Country Status (1)

Country Link
CN (1) CN115933993B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6154840A (en) * 1998-05-01 2000-11-28 Northern Telecom Limited System and method for transferring encrypted sections of documents across a computer network
CN103685162A (en) * 2012-09-05 2014-03-26 ***通信集团公司 File storing and sharing method
WO2018076365A1 (en) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof
CN112019566A (en) * 2020-09-25 2020-12-01 中国农业银行股份有限公司 Data transmission method, server, client and computer storage medium
CN114969803A (en) * 2021-04-27 2022-08-30 中移互联网有限公司 Data storage method, device and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6154840A (en) * 1998-05-01 2000-11-28 Northern Telecom Limited System and method for transferring encrypted sections of documents across a computer network
CN103685162A (en) * 2012-09-05 2014-03-26 ***通信集团公司 File storing and sharing method
WO2018076365A1 (en) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof
CN112019566A (en) * 2020-09-25 2020-12-01 中国农业银行股份有限公司 Data transmission method, server, client and computer storage medium
CN114969803A (en) * 2021-04-27 2022-08-30 中移互联网有限公司 Data storage method, device and storage medium

Also Published As

Publication number Publication date
CN115933993A (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN110581860B (en) Identity authentication method, device, storage medium and equipment based on block chain
CN109361669B (en) Identity authentication method, device and equipment of communication equipment
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN111031047B (en) Device communication method, device, computer device and storage medium
CN109728914B (en) Digital signature verification method, system, device and computer readable storage medium
CN106452770B (en) Data encryption method, data decryption method, device and system
CN111970114B (en) File encryption method, system, server and storage medium
CN109347813B (en) Internet of things equipment login method and system, computer equipment and storage medium
CN101771680B (en) Method for writing data to smart card, system and remote writing-card terminal
CN110941861B (en) File protection method and device, computer equipment and medium
CN111008374A (en) Block chain-based password processing method, device and medium
CN106257859A (en) A kind of password using method
CN115933993B (en) Karst fracture network type aqueous medium antifouling function evaluation system and method
CN116366289B (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN115828290A (en) Encryption and decryption method and device based on distributed object storage
CN114679299B (en) Communication protocol encryption method, device, computer equipment and storage medium
CN110418342B (en) Long-term secret key management method, device and equipment
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp
CN110443325B (en) Graphic code generation method, graphic code processing method, device and storage medium
CN116980228B (en) Method and system for realizing anonymous identity login in Internet environment
CN116108474B (en) Big data system password service method and system
CN117040760B (en) Layout file signing method supporting double algorithms
CN114338152B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant