CN116389138A - Information security protection method and device based on data transmission - Google Patents

Information security protection method and device based on data transmission Download PDF

Info

Publication number
CN116389138A
CN116389138A CN202310412829.1A CN202310412829A CN116389138A CN 116389138 A CN116389138 A CN 116389138A CN 202310412829 A CN202310412829 A CN 202310412829A CN 116389138 A CN116389138 A CN 116389138A
Authority
CN
China
Prior art keywords
data
transmitted
current
link
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310412829.1A
Other languages
Chinese (zh)
Other versions
CN116389138B (en
Inventor
许婷
金周
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongzhi Tiancheng Technology Co ltd
Original Assignee
Shenzhen Zhongzhi Tiancheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongzhi Tiancheng Technology Co ltd filed Critical Shenzhen Zhongzhi Tiancheng Technology Co ltd
Priority to CN202310412829.1A priority Critical patent/CN116389138B/en
Publication of CN116389138A publication Critical patent/CN116389138A/en
Application granted granted Critical
Publication of CN116389138B publication Critical patent/CN116389138B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Communication Control (AREA)

Abstract

The invention relates to the technical field of information security, and discloses an information security protection method and device based on data transmission, wherein the method comprises the following steps: obtaining a link instruction set for generating current data to be transmitted, calculating an important value according to the link instruction set, determining the important level of the current data to be transmitted according to the important value, calculating encryption complexity according to the important value if the important level of the current data to be transmitted is level B, selecting an encryption algorithm corresponding to the encryption complexity to obtain a matched encryption algorithm, encrypting the current data to be transmitted by utilizing the matched encryption algorithm to obtain current encrypted data, transmitting the current encrypted data to the appointed client, and transmitting the encrypted current data to the appointed client according to a hidden information transmitting device if the important level of the current data to be transmitted is level A. The invention mainly aims to solve the balance problem of transmission efficiency and transmission safety of real-time data in the transmission process.

Description

Information security protection method and device based on data transmission
Technical Field
The invention relates to an information security protection method and device based on data transmission, and belongs to the technical field of information security.
Background
The data transmission is an interactive mode for providing relevant services to users based on the Internet, and with the development of technologies and the increase of informatization degree, the types and the quantity of the data transmission are more and more, such as real-time transmission of logistics data of logistics, real-time transmission of shopping data of online shopping, generation of real-time transmission of production line production data of online, and the like.
However, it should be understood that the rapid development of technology gradually reflects the requirement for real-time data transmission, but the higher the transmission efficiency, the lower the transmission security will be, i.e. the transmission efficiency and the transmission security have an inverse relationship. Because real-time data is continuously transmitted, in order to improve security, conventional methods generally use a curing encryption means, or use different encryption means according to the size and source of the real-time data. However, the above problems are not solved by the solidification or simple encryption selection method, and if the real-time data is not encrypted or transmitted by adopting a simple encryption method, the data security is not ensured; if a complex encryption method is adopted, more transmission resources are consumed, so that the transmission efficiency is greatly reduced, and how to balance the transmission efficiency and the transmission safety is a technical problem to be solved.
Disclosure of Invention
The invention provides an information security protection method and device based on data transmission and a computer readable storage medium, and mainly aims to solve the problem of balance between transmission efficiency and transmission security in the process of transmitting real-time data.
In order to achieve the above object, the present invention provides an information security protection method based on data transmission, including:
receiving a data transmission instruction, determining a transmission period according to the data transmission instruction, and indexing out data to be transmitted at the current moment to obtain the current data to be transmitted;
acquiring all link instructions to be experienced for generating the current data to be transmitted, and obtaining a link instruction set;
calculating an important value of the current data to be transmitted according to the link instruction set;
determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C, wherein the A level is highest, and the C level is lowest;
if the importance level of the current data to be transmitted is C level, the data to be transmitted is not encrypted and is directly transmitted to the appointed client of the data transmission instruction, and the data to be transmitted at the next moment is continuously received until the transmission period is reached to finish data transmission;
If the importance level of the current data to be transmitted is B level, calculating encryption complexity according to the importance value, and selecting an encryption algorithm corresponding to the encryption complexity from a pre-constructed encryption algorithm database to obtain a matched encryption algorithm;
encrypting the current data to be transmitted by using the matching encryption algorithm to obtain current encrypted data, transmitting the current encrypted data to the appointed client, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission;
and if the importance level of the current data to be transmitted is A level, starting a pre-built hidden information sending device when encrypting the current data to be transmitted, transmitting the encrypted current data to be transmitted to the appointed client according to the hidden information sending device, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission.
Optionally, the obtaining all link instructions to be undergone by the data to be transmitted currently to obtain a link instruction set includes:
determining all operation links required for generating the current data to be transmitted to obtain an operation link set;
Obtaining all selectable operation instructions in each operation link to obtain a selectable instruction set, wherein each operation link corresponds to one selectable instruction set;
sequentially determining operation instructions for generating the current data to be transmitted from an optional instruction set corresponding to each operation link to obtain link instructions, wherein each operation link corresponds to one link instruction;
and constructing link instructions of each operation link according to the operation sequence to obtain the link instruction set.
Optionally, the calculating the importance value of the current data to be transmitted according to the link instruction set includes:
sequentially extracting operation links from the operation link set according to the operation sequence for generating the current data to be transmitted;
calculating a selection probability value of a selection link instruction of each operation link in the history record according to the selectable instruction set of each operation link;
and calculating an important value of the current data to be transmitted according to the selected probability value of each link instruction.
Optionally, the calculating the selection probability value of the selection link instruction of each operation link in the history according to the selectable instruction set of each operation link includes:
Figure BDA0004183845980000021
wherein P is i Representing the selection probability value of the ith operation link selection link instruction, wherein omega is a weight factor for calculating a selection probability value formula, S represents the selection times of the ith operation link selection link instruction in the history record, and N total Representing the number of occurrences of the ith operation element in the history, m representing the total number of selectable instructions of the selectable instruction set of the ith operation element.
Optionally, the calculating to obtain the important value of the current data to be transmitted according to the selected probability value of each link instruction includes:
Figure BDA0004183845980000031
wherein F (n) represents the important value of the current data to be transmitted, n operation links of the current data to be transmitted and P n-1 Representing joint probability values when link instructions corresponding to the current data to be transmitted appear in the 1 st, 2 nd, … th and n-1 st operation links,
Figure BDA0004183845980000032
represent the 1 st, 2 nd, … th and n-1 st operations givenWhen link instructions corresponding to the current data to be transmitted appear in the links, the condition probability value of the link instruction corresponding to the current data to be transmitted appears in the nth operation link, wherein the joint probability value and the condition probability value are both calculated by the selected probability value of each link instruction.
Optionally, the calculating the encryption complexity according to the importance value includes:
acquiring the instruction response time of a link instruction corresponding to a first operation link in the link instruction set and the instruction ending time of a link instruction of a last operation link;
Calculating the generation time of the current data to be transmitted according to the instruction response time and the instruction ending time;
and calculating the encryption complexity according to the generation time and the importance value.
Optionally, the calculating the encryption complexity according to the generation time and the importance value includes:
the encryption complexity is calculated according to the following formula:
Figure BDA0004183845980000033
wherein f represents encryption complexity of data to be transmitted currently, t 1 Instruction response time t representing link instruction corresponding to first operation link of current data to be transmitted 2 The instruction end time of the link instruction representing the last operation link of the data to be transmitted currently, alpha is the weight factor calculated by the encryption complexity.
Optionally, the selecting an encryption algorithm corresponding to the encryption complexity from the pre-constructed encryption algorithm database to obtain a matching encryption algorithm includes:
extracting complexity in an encryption algorithm database and a corresponding table of the encryption algorithm, wherein the corresponding table records encryption algorithm sets with different encryption complexity, and the encryption security of the corresponding encryption algorithm is higher as the encryption complexity is higher;
and determining available matching encryption algorithm from the encryption algorithm set according to the encryption complexity of the data to be transmitted currently.
Optionally, the transmitting the encrypted current data to be transmitted to the designated client according to the hidden information sending device includes:
starting a hidden information sending device, wherein the hidden information sending device comprises a sending synchronizer, a hidden jammer and an actual transmitter;
performing a concealing operation on the current data to be transmitted after encryption by using the concealing interference device to obtain current concealing data;
when the generation of the current hidden data is successful, the hidden jammer is utilized again to generate the current interference data with the current hidden data, wherein the data quantity of the current interference data is the same as that of the current hidden data, but the data content of the current interference data is messy code data, and the current interference data and the current hidden data are in a many-to-one relationship;
after each piece of current interference data and the IP address of the current hidden data are recorded by the sending synchronizer, a plurality of pieces of current interference data and the current hidden data are simultaneously sent to the appointed client based on the actual transmitter.
In order to solve the above problems, the present invention further provides an information security protection apparatus based on data transmission, the apparatus comprising:
the link instruction acquisition module is used for receiving the data transmission instruction, determining a transmission period according to the data transmission instruction, indexing out data to be transmitted at the current moment to obtain the current data to be transmitted, and acquiring all link instructions required to be experienced by the current data to be transmitted to obtain a link instruction set;
The important value calculation module is used for calculating the important value of the current data to be transmitted according to the link instruction set;
the encryption module is used for determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C levels, wherein the A level is highest, the C level is lowest, if the importance level of the current data to be transmitted is C level, encryption processing is not executed on the current data to be transmitted and is directly transmitted to a designated client of a data transmission instruction, the data to be transmitted at the next moment is continuously received until the transmission period is completed, if the importance level of the current data to be transmitted is B level, encryption complexity is calculated according to the importance value, an encryption algorithm corresponding to the encryption complexity is selected from a pre-built encryption algorithm database, a matched encryption algorithm is obtained, the current data to be transmitted is encrypted by utilizing the matched encryption algorithm, and the current encrypted data is transmitted to the designated data;
and the hidden information sending module is used for starting a pre-constructed hidden information sending device when the importance level of the current data to be transmitted is A, transmitting the encrypted current data to be transmitted to the appointed client according to the hidden information sending device, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission.
In order to solve the above-mentioned problems, the present invention also provides an electronic apparatus including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to implement the data transmission-based information security protection method described above.
In order to solve the above-mentioned problems, the present invention also provides a computer-readable storage medium having stored therein at least one instruction that is executed by a processor in an electronic device to implement the above-mentioned information security protection method upon data transmission.
Compared with the problems in the background art, the embodiment of the invention firstly receives the data transmission instruction, determines the transmission period according to the data transmission instruction, indexes the data to be transmitted at the current moment, and obtains the current data to be transmitted. It can be understood that, in the embodiment of the invention, the data to be transmitted at the current moment, that is, the current data to be transmitted, is determined first, then all link instructions which need to be undergone by the current data to be transmitted are obtained, a link instruction set is obtained, and the important value of the current data to be transmitted is calculated according to the link instruction set. In particular, compared with other methods, the embodiment of the invention does not directly send or encrypt the current data to be transmitted, but firstly generates all link instructions which the current data to be transmitted needs to go through according to the source of the current data to be transmitted, and calculates the important value corresponding to the current data to be transmitted according to the link instructions, namely, the embodiment of the invention considers the encryption selection of the data to be transmitted generated in real time, more important degrees of generating the real-time data, namely, more complex encryption means are needed to be selected if the data are more important, but because the complex encryption means consume more resources, the embodiment of the invention constructs an algorithm capable of intelligently matching different encryption complexity according to the important value of the current data to be transmitted. Therefore, further, determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C levels, wherein the A level is highest, the C level is lowest, if the importance level of the current data to be transmitted is C level, encryption processing is not executed on the current data to be transmitted and is directly transmitted to a designated client of a data transmission instruction, the data to be transmitted at the next moment is continuously received until the transmission period is completed, if the importance level of the current data to be transmitted is B level, encryption complexity is calculated according to the importance value, an encryption algorithm corresponding to the encryption complexity is selected from a pre-built encryption algorithm database, a matched encryption algorithm is obtained, the current data to be transmitted is encrypted by utilizing the matched encryption algorithm, the current encrypted data is obtained, the current data to be transmitted to the designated client, the data to be transmitted at the next moment is continuously received until the transmission period is completed, if the importance level of the current data to be transmitted is A level, a pre-built information sending device is started when the current data to be transmitted is executed, the current data to be transmitted is transmitted to the designated client is continuously transmitted until the transmission period is completed, and the data to be transmitted is continuously transmitted. From the above description, it can be known that the real-time data with different importance values selects different encryption algorithms, and particularly when the importance level is highest, the embodiment of the invention also starts a hidden information sending mode, so that the balance problem of transmission efficiency and transmission security is reasonably avoided. Therefore, the information security protection method, the device, the electronic equipment and the computer readable storage medium based on data transmission can solve the balance problem of transmission efficiency and transmission security in the transmission process of real-time data.
Drawings
Fig. 1 is a schematic flow chart of an information security protection method based on data transmission according to an embodiment of the present invention;
FIG. 2 is a functional block diagram of an information security protection device during data transmission according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device implementing the information security protection method during data transmission according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment of the application provides an information security protection method based on data transmission. The execution subject of the information security protection method based on data transmission includes, but is not limited to, at least one of a server, a terminal, and the like, which can be configured to execute the method provided by the embodiment of the application. In other words, the information security protection method based on data transmission may be performed by software or hardware installed in a terminal device or a server device. The service end includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
Example 1:
referring to fig. 1, a flow chart of an information security protection method based on data transmission according to an embodiment of the invention is shown. In this embodiment, the method for protecting information security during data transmission includes:
s1, receiving a data transmission instruction, determining a transmission period according to the data transmission instruction, indexing out data to be transmitted at the current moment, and obtaining the current data to be transmitted.
It is explained that the initiator of the data transfer instruction is typically a user with data transfer requirements. The small sheet is an administrator of a certain mobile phone manufacturer, and monitors production data of a certain batch of mobile phones in the production process at present, wherein the production data comprise specifications of mobile phone shells, current and voltage values of mobile phone circuit boards, frequency of mobile phone CPU and the like.
Therefore, the small Zhang Xiangyao monitors the production data of the batch of mobile phones from the month 17 of 2023 to the month 22 of 2023, and initiates the production data transmission instruction of the batch of mobile phones, wherein the month 18 of 2023 to the month 22 of 2023 are the transmission period.
It should be explained that, in order to reduce the loss caused by the leakage of the production data, it is necessary to improve the security of the production data in the transmission process, that is, the technical problem that is mainly solved by the embodiment of the present invention.
S2, acquiring all link instructions which need to be experienced in generating the current data to be transmitted, and obtaining a link instruction set.
It should be explained that, while different types of data may need to be transmitted in one transmission period, and different types of data may correspond to different generation times, different operation instructions may also correspond to different generation times, and in general, the more complex the operation instruction, the more complex the data to be transmitted. Illustratively, the sheetlet initiates a data transmission instruction at 9 days of 2023, 2 and 17, and the cell phone production line just generates the specification parameters of the cell phone shell at 9, so all operation instructions for generating the specification parameters of the cell phone shell are acquired, wherein the operation instructions may include connecting an external interface of the cell phone shell design part, and acquiring the specification parameters of the cell phone shell from the external interface of the cell phone shell design part. And assume that the mobile phone production line just generates a test report of the mobile phone board at 10 points, wherein the generation of the test report comprises the steps of respectively testing the current and voltage of the board according to the starting test instruction, importing the current and voltage test value into the test part, generating the test report after the test part obtains the current and voltage test value, forwarding and storing the test report to the data storage platform and the like.
In the process of generating data in real time and transmitting the data generated in real time, as the transmission efficiency of real time transmission has extremely high requirements, when the real time data is continuously transmitted, the traditional method generally adopts an unchanged or solidified encryption means, or when the part of intelligent method is used for encrypting the data, different encryption means are adopted according to the size and the source of the real time data, but the embodiment of the invention considers that: the encryption selection of the data to be transmitted, which is generated in real time, is more derived from the importance degree of the data to be transmitted, namely, the more important data is the more complex encryption means should be selected, but the complex encryption means consume more resources, and the more common real-time data can be the relatively simple encryption means in order to consider the resource consumption problem, which is the core problem to be solved by the embodiment of the invention.
Therefore, in detail, the obtaining all link instructions to be undergone by the current data to be transmitted to obtain a link instruction set includes:
determining all operation links required for generating the current data to be transmitted to obtain an operation link set;
obtaining all selectable operation instructions in each operation link to obtain a selectable instruction set, wherein each operation link corresponds to one selectable instruction set;
Sequentially determining operation instructions for generating the current data to be transmitted from an optional instruction set corresponding to each operation link to obtain link instructions, wherein each operation link corresponds to one link instruction;
and constructing link instructions of each operation link according to the operation sequence to obtain the link instruction set.
For example, assume that the current data to be transmitted is a mobile phone electric board test report, and all operation links of the mobile phone electric board test report are 6 steps respectively: step 1, a step 2 test result record step 3, a step 4 test result check step 5, a step 5 test result upload step 6 test result generation step.
It is assumed that in the step 1 instruction initiating link, 20 optional instructions are total, including a board test instruction, a CPU test instruction, a GPU test instruction, etc., so it is conceivable that if a mobile phone board test report is to be generated, the instruction to be initiated is the board test instruction, that is, the board test instruction is selected from the 20 optional instructions, but not the CPU test instruction, the GPU test instruction, etc., otherwise, the mobile phone board test report cannot be generated. And so on, determining an optional instruction set of each operation link in the operation links, and determining link instructions corresponding to the current data to be transmitted in the operation links according to the optional instruction set until all the operation links are summarized to obtain the link instruction set.
And S3, calculating an important value of the current data to be transmitted according to the link instruction set.
In detail, the calculating the important value of the current data to be transmitted according to the link instruction set includes:
sequentially extracting operation links from the operation link set according to the operation sequence for generating the current data to be transmitted;
calculating a selection probability value of a selection link instruction of each operation link in the history record according to the selectable instruction set of each operation link;
and calculating an important value of the current data to be transmitted according to the selected probability value of each link instruction.
Further, the calculating a selection probability value of the selection link instruction of each operation link in the history according to the selectable instruction set of each operation link includes:
Figure BDA0004183845980000081
wherein P is i Representing the selection probability value of the ith operation link selection link instruction, wherein omega is a weight factor for calculating a selection probability value formula, S represents the selection times of the ith operation link selection link instruction in the history record, and N total Representing the number of occurrences of the ith operation element in the history, m representing the total number of selectable instructions of the selectable instruction set of the ith operation element.
It can be understood that the selection probability value of each operation link selection link instruction can be calculated in turn according to the calculation formula. For example, all operation links of the above-mentioned electric panel test report include 6 steps, wherein in the step 1 instruction initiating link, there are 20 optional instructions, the electric panel test instruction is the link instruction, and it is assumed that there are 1000 histories, and the calculation is performed according to the 1000 histories: and (3) generating a selection probability value of the electric plate test instruction in the step 1 instruction initiating link to be 0.26, generating a selection probability value of the step 2 test link to be 0.12, and the like to calculate the selection probability values of the step 3, the step 4, the step 5 and the step 6.
Further, the calculating, according to the selected probability value of each link instruction, an important value of the current data to be transmitted includes:
Figure BDA0004183845980000082
wherein F (n) represents the important value of the current data to be transmitted, n operation links of the current data to be transmitted and P n-1 Representing joint probability values when link instructions corresponding to the current data to be transmitted appear in the 1 st, 2 nd, … th and n-1 st operation links,
Figure BDA0004183845980000091
representing that when a link instruction corresponding to the current data to be transmitted appears in the given 1 st, 2 nd, and n-1 st operation links, the condition probability value of the link instruction corresponding to the current data to be transmitted appears in the n-th operation link, wherein the joint probability value and the condition probability value are both the link instruction and the condition probability valueAnd calculating the selection probability value of the instruction.
For example, all the operation links of the mobile phone panel test report have 6 steps, each operation link has a plurality of selectable instructions, and the link instruction set for generating the mobile phone panel test report is from the selectable instruction set of each operation link. In other words, according to the selected probability value of the step 6 and the above-mentioned importance value calculation formula, the importance value of the current data to be transmitted, such as the mobile phone board test report, can be calculated sequentially, so as to evaluate whether the mobile phone board test report is worth using the encryption algorithm with higher complexity.
It should be explained that the above-mentioned important value calculation formula of the data to be transmitted has effective rationality, because the joint probability value and the conditional probability value in the important value calculation formula are both calculated by the selected probability value, according to the probability rate basis, the ordinary probability calculation formula only calculates the probability value on the premise that the event (such as the generation of a certain instruction) is not affected by other influences, and the applicability is poor, and the joint probability and the conditional probability consider the influence among the events, thereby improving the rationality of calculating the important value of the data to be transmitted. In addition, a weight factor is added into a calculation formula of the selected probability value, and the weight factor is manually adjustable, namely, when the type of data is considered important by human subjectiveness, the corresponding weight factor is improved, so that the important value of the data to be transmitted in the embodiment of the invention calculates the important value of the data to be transmitted generated at every moment on the premise of combining the human subjective factor and the objective existence condition, encryption means with different complexity can be intelligently selected according to the important value, and the problem of resource consumption and waste is saved while the information security protection force is improved.
And S4, determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C, respectively, wherein the A level is highest, and the C level is lowest.
It should be explained that, in the embodiment of the present invention, the importance levels include at least 3 levels, but the importance levels are not limited to three levels, that is, the importance levels may be 4 levels, 5 levels, and so on.
And S5, if the importance level of the current data to be transmitted is C level, the data to be transmitted is not encrypted and is directly transmitted to the appointed client of the data transmission instruction, and the data to be transmitted at the next moment is continuously received until the transmission period is reached to finish data transmission.
It can be understood that, in the embodiment of the invention, the data to be transmitted with the lowest importance of the level C is determined, so that the data transmission is directly executed without any encryption means. If the small sheet monitors the production data of the mobile phone from the day of 2023 2 month 17 to the day of 2023 2 month 22, wherein the production shop transmits prompt data of the completion of the production of the first batch of mobile phones at the three afternoon of the day of 2 months 17, wherein the prompt data comprise the completion time, the production quantity and the like of the completion of the production of the first batch of mobile phones.
S6, if the importance level of the data to be transmitted currently is B level, calculating encryption complexity according to the importance value, and selecting an encryption algorithm corresponding to the encryption complexity from a pre-constructed encryption algorithm database to obtain a matched encryption algorithm;
In detail, the calculating the encryption complexity according to the importance value includes:
acquiring the instruction response time of a link instruction corresponding to a first operation link in the link instruction set and the instruction ending time of a link instruction of a last operation link;
calculating the generation time of the current data to be transmitted according to the instruction response time and the instruction ending time;
and calculating the encryption complexity according to the generation time and the importance value.
It should be explained that, when the embodiment of the invention considers that more complex and more important data is generated, more operation instructions are involved, and more time is occupied, so that the embodiment of the invention determines the instruction response time of the link instruction corresponding to the first operation link and the instruction ending time of the link instruction of the last operation link, thereby calculating the generation time of the current data to be transmitted. In an exemplary embodiment, since the mobile phone board test report belongs to important data, the time from the initiation of the step 1 command to the generation and reception of the step 6 test result is counted to obtain the generation time of the mobile phone board test report as 2 hours. The prompt data of the first batch of mobile phone production is low in importance due to the fact that the data is simple, and the generation time is only 1 minute.
Further, the calculating the encryption complexity according to the generation time and the importance value includes:
the encryption complexity is calculated according to the following formula:
Figure BDA0004183845980000101
wherein f represents encryption complexity of data to be transmitted currently, t 1 Instruction response time t representing link instruction corresponding to first operation link of current data to be transmitted 2 The instruction end time of the link instruction representing the last operation link of the data to be transmitted currently, alpha is the weight factor calculated by the encryption complexity.
As can be seen from the above description, when calculating the encryption complexity of the data to be transmitted currently, the embodiment of the invention considers the generation time and the generation process (how many operation instructions are involved) of the data to be transmitted currently, so that the calculation of the encryption complexity is more accurate, and therefore, the corresponding available more accurate encryption algorithm is determined.
Further, the selecting an encryption algorithm corresponding to the encryption complexity from the pre-constructed encryption algorithm database to obtain a matching encryption algorithm includes:
extracting complexity in an encryption algorithm database and a corresponding table of the encryption algorithm, wherein the corresponding table records encryption algorithm sets with different encryption complexity, and the encryption security of the corresponding encryption algorithm is higher as the encryption complexity is higher;
And determining available matching encryption algorithm from the encryption algorithm set according to the encryption complexity of the data to be transmitted currently.
For example, the encryption complexity of the mobile phone board test report is 30, and the encryption complexity of the prompt data of the first batch of mobile phones is 2, so that the encryption algorithm security of the mobile phone board test report is far greater than the encryption algorithm security of the prompt data.
S7, encrypting the current data to be transmitted by using the matching encryption algorithm to obtain current encrypted data, transmitting the current encrypted data to the appointed client, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission;
it can be understood that after the matching encryption algorithm is obtained, the current encrypted data can be obtained by directly using the matching encryption algorithm to perform encryption, and the current encrypted data is further transmitted to complete the data transmission at the current time.
And S8, if the importance level of the current data to be transmitted is A level, starting a pre-built hidden information sending device while encrypting the current data to be transmitted, transmitting the encrypted current data to be transmitted to the appointed client according to the hidden information sending device, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission.
It should be explained that the encryption method of the data to be transmitted currently at level a may be the same as the encryption method of the data to be transmitted currently at level B, which is not described herein, and in addition, one or more encryption algorithms with higher security levels may be directly specified to directly encrypt the data to be transmitted currently at level a.
Further, the main purpose of the hidden information sending device is to improve the security of data transmission, specifically, the method for transmitting the encrypted current data to be transmitted to the designated client according to the hidden information sending device includes:
starting a hidden information sending device, wherein the hidden information sending device comprises a sending synchronizer, a hidden jammer and an actual transmitter;
performing a concealing operation on the current data to be transmitted after encryption by using the concealing interference device to obtain current concealing data;
when the generation of the current hidden data is successful, the hidden jammer is utilized again to generate the current interference data with the current hidden data, wherein the data quantity of the current interference data is the same as that of the current hidden data, but the data content of the current interference data is messy code data, and the current interference data and the current hidden data are in a many-to-one relationship;
After each piece of current interference data and the IP address of the current hidden data are recorded by the sending synchronizer, a plurality of pieces of current interference data and the current hidden data are simultaneously sent to the appointed client based on the actual transmitter.
It can be understood that when the security value of the data to be transmitted is highest, the embodiment of the invention constructs the hidden information transmitting device, and triggers the hidden information transmitting device, so that the transmission process is confused by the transmitting synchronizer, the hidden interference device and the actual transmitter in the hidden information transmitting device, and the data security in the transmission process is further improved.
Compared with the problems in the background art, the embodiment of the invention firstly receives the data transmission instruction, determines the transmission period according to the data transmission instruction, indexes the data to be transmitted at the current moment, and obtains the current data to be transmitted. It can be understood that, in the embodiment of the invention, the data to be transmitted at the current moment, that is, the current data to be transmitted, is determined first, then all link instructions which need to be undergone by the current data to be transmitted are obtained, a link instruction set is obtained, and the important value of the current data to be transmitted is calculated according to the link instruction set. In particular, compared with other methods, the embodiment of the invention does not directly send or encrypt the current data to be transmitted, but firstly generates all link instructions which the current data to be transmitted needs to go through according to the source of the current data to be transmitted, and calculates the important value corresponding to the current data to be transmitted according to the link instructions, namely, the embodiment of the invention considers the encryption selection of the data to be transmitted generated in real time, more important degrees of generating the real-time data, namely, more complex encryption means are needed to be selected if the data are more important, but because the complex encryption means consume more resources, the embodiment of the invention constructs an algorithm capable of intelligently matching different encryption complexity according to the important value of the current data to be transmitted. Therefore, further, determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C levels, wherein the A level is highest, the C level is lowest, if the importance level of the current data to be transmitted is C level, encryption processing is not executed on the current data to be transmitted and is directly transmitted to a designated client of a data transmission instruction, the data to be transmitted at the next moment is continuously received until the transmission period is completed, if the importance level of the current data to be transmitted is B level, encryption complexity is calculated according to the importance value, an encryption algorithm corresponding to the encryption complexity is selected from a pre-built encryption algorithm database, a matched encryption algorithm is obtained, the current data to be transmitted is encrypted by utilizing the matched encryption algorithm, the current encrypted data is obtained, the current data to be transmitted to the designated client, the data to be transmitted at the next moment is continuously received until the transmission period is completed, if the importance level of the current data to be transmitted is A level, a pre-built information sending device is started when the current data to be transmitted is executed, the current data to be transmitted is transmitted to the designated client is continuously transmitted until the transmission period is completed, and the data to be transmitted is continuously transmitted. From the above description, it can be known that the real-time data with different importance values selects different encryption algorithms, and particularly when the importance level is highest, the embodiment of the invention also starts a hidden information sending mode, so that the balance problem of transmission efficiency and transmission security is reasonably avoided. Therefore, the information security protection method, the device, the electronic equipment and the computer readable storage medium based on data transmission can solve the balance problem of transmission efficiency and transmission security in the transmission process of real-time data.
Example 2:
fig. 2 is a functional block diagram of an information security protection device based on data transmission according to an embodiment of the present invention.
The information security protection device 100 based on data transmission according to the present invention may be installed in an electronic device. The information security protection apparatus 100 based on data transmission may include a link instruction acquisition module 101, an importance value calculation module 102, an encryption module 103, and a hidden information transmission module 104 according to the functions implemented. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
The link instruction obtaining module 101 is configured to receive a data transmission instruction, determine a transmission period according to the data transmission instruction, index data to be transmitted at a current moment, obtain current data to be transmitted, and obtain all link instructions required to be undergone by the current data to be transmitted, thereby obtaining a link instruction set;
the important value calculating module 102 is configured to calculate an important value of the current data to be transmitted according to the link instruction set;
The encryption module 103 is configured to determine an importance level of the current data to be transmitted according to an importance value, where the importance level includes at least 3 levels, each level is A, B and C, where level a is highest and level C is lowest, if the importance level of the current data to be transmitted is level C, the current data to be transmitted is not encrypted and is directly transmitted to a designated client of a data transmission instruction, and the data to be transmitted at the next moment is continuously received until the transmission period is reached, if the importance level of the current data to be transmitted is level B, the encryption complexity is calculated according to the importance value, an encryption algorithm corresponding to the encryption complexity is selected from a pre-constructed encryption algorithm database, a matching encryption algorithm is obtained, the current data to be transmitted is encrypted by using the matching encryption algorithm, and the current encrypted data is transmitted to the designated client;
the hidden information sending module 104 is configured to, when the importance level of the current data to be transmitted is level a, start a pre-constructed hidden information sending device while encrypting the current data to be transmitted, transmit the encrypted current data to be transmitted to the designated client according to the hidden information sending device, and continue to receive the data to be transmitted at the next moment until the transmission period is reached to complete data transmission.
In detail, the modules in the data transmission-based information security protection apparatus 100 in the embodiment of the present invention use the same technical means as the data transmission-based information security protection method described in fig. 1, and can produce the same technical effects, which are not described herein.
Example 3:
fig. 3 is a schematic structural diagram of an electronic device for implementing an information security protection method during data transmission according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11, a bus 12 and a communication interface 13, and may further comprise a computer program stored in the memory 11 and executable on the processor 10, such as an information security protection program based on data transmission.
The memory 11 includes at least one type of readable storage medium, including flash memory, a mobile hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may in other embodiments also be an external storage device of the electronic device 1, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only for storing application software installed in the electronic device 1 and various types of data, such as codes based on information security protection programs at the time of data transmission, but also for temporarily storing data that has been output or is to be output.
The processor 10 may be comprised of integrated circuits in some embodiments, for example, a single packaged integrated circuit, or may be comprised of multiple integrated circuits packaged with the same or different functions, including one or more central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors, combinations of various control chips, and the like. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects respective parts of the entire electronic device using various interfaces and lines, executes or executes programs or modules (for example, information security protection program based on data transmission, etc.) stored in the memory 11, and invokes data stored in the memory 11 to perform various functions of the electronic device 1 and process the data.
The bus may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. The bus is arranged to enable a connection communication between the memory 11 and at least one processor 10 etc.
Fig. 3 shows only an electronic device with components, it being understood by a person skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or may combine certain components, or may be arranged in different components.
For example, although not shown, the electronic device 1 may further include a power source (such as a battery) for supplying power to each component, and preferably, the power source may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management, and the like are implemented through the power management device. The power supply may also include one or more of any of a direct current or alternating current power supply, recharging device, power failure detection circuit, power converter or inverter, power status indicator, etc. The electronic device 1 may further include various sensors, bluetooth modules, wi-Fi modules, etc., which will not be described herein.
Further, the electronic device 1 may also comprise a network interface, optionally the network interface may comprise a wired interface and/or a wireless interface (e.g. WI-FI interface, bluetooth interface, etc.), typically used for establishing a communication connection between the electronic device 1 and other electronic devices.
The electronic device 1 may optionally further comprise a user interface, which may be a Display, an input unit, such as a Keyboard (Keyboard), or a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device 1 and for displaying a visual user interface.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
The information security protection program based on data transmission stored in the memory 11 in the electronic device 1 is a combination of a plurality of instructions, which when executed in the processor 10, can realize:
receiving a data transmission instruction, determining a transmission period according to the data transmission instruction, and indexing out data to be transmitted at the current moment to obtain the current data to be transmitted;
acquiring all link instructions to be experienced for generating the current data to be transmitted, and obtaining a link instruction set;
Calculating an important value of the current data to be transmitted according to the link instruction set;
determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C, wherein the A level is highest, and the C level is lowest;
if the importance level of the current data to be transmitted is C level, the data to be transmitted is not encrypted and is directly transmitted to the appointed client of the data transmission instruction, and the data to be transmitted at the next moment is continuously received until the transmission period is reached to finish data transmission;
if the importance level of the current data to be transmitted is B level, calculating encryption complexity according to the importance value, and selecting an encryption algorithm corresponding to the encryption complexity from a pre-constructed encryption algorithm database to obtain a matched encryption algorithm;
encrypting the current data to be transmitted by using the matching encryption algorithm to obtain current encrypted data, transmitting the current encrypted data to the appointed client, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission;
and if the importance level of the current data to be transmitted is A level, starting a pre-built hidden information sending device when encrypting the current data to be transmitted, transmitting the encrypted current data to be transmitted to the appointed client according to the hidden information sending device, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission.
Specifically, the specific implementation method of the above instruction by the processor 10 may refer to descriptions of related steps in the corresponding embodiments of fig. 1 to 2, which are not repeated herein.
Further, the modules/units integrated in the electronic device 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. The computer readable storage medium may be volatile or nonvolatile. For example, the computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
The present invention also provides a computer readable storage medium storing a computer program which, when executed by a processor of an electronic device, can implement:
receiving a data transmission instruction, determining a transmission period according to the data transmission instruction, and indexing out data to be transmitted at the current moment to obtain the current data to be transmitted;
acquiring all link instructions to be experienced for generating the current data to be transmitted, and obtaining a link instruction set;
Calculating an important value of the current data to be transmitted according to the link instruction set;
determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C, wherein the A level is highest, and the C level is lowest;
if the importance level of the current data to be transmitted is C level, the data to be transmitted is not encrypted and is directly transmitted to the appointed client of the data transmission instruction, and the data to be transmitted at the next moment is continuously received until the transmission period is reached to finish data transmission;
if the importance level of the current data to be transmitted is B level, calculating encryption complexity according to the importance value, and selecting an encryption algorithm corresponding to the encryption complexity from a pre-constructed encryption algorithm database to obtain a matched encryption algorithm;
encrypting the current data to be transmitted by using the matching encryption algorithm to obtain current encrypted data, transmitting the current encrypted data to the appointed client, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission;
and if the importance level of the current data to be transmitted is A level, starting a pre-built hidden information sending device when encrypting the current data to be transmitted, transmitting the encrypted current data to be transmitted to the appointed client according to the hidden information sending device, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1. An information security protection method based on data transmission, which is characterized by comprising the following steps:
receiving a data transmission instruction, determining a transmission period according to the data transmission instruction, and indexing out data to be transmitted at the current moment to obtain the current data to be transmitted;
acquiring all link instructions to be experienced for generating the current data to be transmitted, and obtaining a link instruction set;
calculating an important value of the current data to be transmitted according to the link instruction set;
determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C, wherein the A level is highest, and the C level is lowest;
if the importance level of the current data to be transmitted is C level, the data to be transmitted is not encrypted and is directly transmitted to the appointed client of the data transmission instruction, and the data to be transmitted at the next moment is continuously received until the transmission period is reached to finish data transmission;
if the importance level of the current data to be transmitted is B level, calculating encryption complexity according to the importance value, and selecting an encryption algorithm corresponding to the encryption complexity from a pre-constructed encryption algorithm database to obtain a matched encryption algorithm;
Encrypting the current data to be transmitted by using the matching encryption algorithm to obtain current encrypted data, transmitting the current encrypted data to the appointed client, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission;
and if the importance level of the current data to be transmitted is A level, starting a pre-built hidden information sending device when encrypting the current data to be transmitted, transmitting the encrypted current data to be transmitted to the appointed client according to the hidden information sending device, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission.
2. The method for protecting information security during data transmission according to claim 1, wherein the obtaining all link instructions to be undergone by the data to be transmitted currently to obtain the link instruction set includes:
determining all operation links required for generating the current data to be transmitted to obtain an operation link set;
obtaining all selectable operation instructions in each operation link to obtain a selectable instruction set, wherein each operation link corresponds to one selectable instruction set;
Sequentially determining operation instructions for generating the current data to be transmitted from an optional instruction set corresponding to each operation link to obtain link instructions, wherein each operation link corresponds to one link instruction;
and constructing link instructions of each operation link according to the operation sequence to obtain the link instruction set.
3. The method for protecting information security during data transmission according to claim 2, wherein calculating the importance value of the data currently to be transmitted according to the link instruction set comprises:
sequentially extracting operation links from the operation link set according to the operation sequence for generating the current data to be transmitted;
calculating a selection probability value of a selection link instruction of each operation link in the history record according to the selectable instruction set of each operation link;
and calculating an important value of the current data to be transmitted according to the selected probability value of each link instruction.
4. The method for protecting information security during data transmission according to claim 3, wherein calculating the selection probability value of the selection link instruction of each operation link in the history according to the selectable instruction set of each operation link comprises:
Figure FDA0004183845950000021
Wherein P is i Representing the selection probability value of the ith operation link selection link instruction, wherein omega is a weight factor for calculating a selection probability value formula, S represents the selection times of the ith operation link selection link instruction in the history record, and N total Representing the number of occurrences of the ith operation element in the history, m representing the total number of selectable instructions of the selectable instruction set of the ith operation element.
5. The method for protecting information security during data transmission according to claim 4, wherein the calculating the importance value of the data to be transmitted according to the selected probability value of each link instruction comprises:
Figure FDA0004183845950000022
wherein F (n) represents the currentThe important value of the data to be transmitted, wherein the current data to be transmitted has n operation links P n-1 Representing joint probability values when link instructions corresponding to the current data to be transmitted appear in the 1 st, 2 nd, … th and n-1 st operation links,
Figure FDA0004183845950000023
and (2) representing that when a link instruction corresponding to the current data to be transmitted appears in the given 1 st, 2 nd, … nd and n-1 st operation links, the condition probability value of the link instruction corresponding to the current data to be transmitted appears in the nth operation link, wherein the joint probability value and the condition probability value are calculated by the selected probability value of each link instruction.
6. The method for protecting information security during data transmission according to claim 5, wherein calculating the encryption complexity according to the importance value comprises:
acquiring the instruction response time of a link instruction corresponding to a first operation link in the link instruction set and the instruction ending time of a link instruction of a last operation link;
calculating the generation time of the current data to be transmitted according to the instruction response time and the instruction ending time;
and calculating the encryption complexity according to the generation time and the importance value.
7. The method for protecting information security during data transmission according to claim 6, wherein calculating the encryption complexity according to the generation time and the importance value comprises:
the encryption complexity is calculated according to the following formula:
Figure FDA0004183845950000031
wherein f represents encryption complexity of data to be transmitted currently, t 1 A first operation loop for representing the current data to be transmittedInstruction response time, t, of link instruction corresponding to node 2 The instruction end time of the link instruction representing the last operation link of the data to be transmitted currently, alpha is the weight factor calculated by the encryption complexity.
8. The method for protecting information security during data transmission according to claim 7, wherein selecting an encryption algorithm corresponding to encryption complexity from a pre-constructed encryption algorithm database to obtain a matching encryption algorithm comprises:
Extracting complexity in an encryption algorithm database and a corresponding table of the encryption algorithm, wherein the corresponding table records encryption algorithm sets with different encryption complexity, and the encryption security of the corresponding encryption algorithm is higher as the encryption complexity is higher;
and determining available matching encryption algorithm from the encryption algorithm set according to the encryption complexity of the data to be transmitted currently.
9. The method for protecting information security during data transmission according to claim 8, wherein said transmitting the encrypted current data to be transmitted to the designated client according to the hidden information transmitting apparatus comprises:
starting a hidden information sending device, wherein the hidden information sending device comprises a sending synchronizer, a hidden jammer and an actual transmitter;
performing a concealing operation on the current data to be transmitted after encryption by using the concealing interference device to obtain current concealing data;
when the generation of the current hidden data is successful, the hidden jammer is utilized again to generate the current interference data with the current hidden data, wherein the data quantity of the current interference data is the same as that of the current hidden data, but the data content of the current interference data is messy code data, and the current interference data and the current hidden data are in a many-to-one relationship;
After each piece of current interference data and the IP address of the current hidden data are recorded by the sending synchronizer, a plurality of pieces of current interference data and the current hidden data are simultaneously sent to the appointed client based on the actual transmitter.
10. An information security protection apparatus based on data transmission, the apparatus comprising:
the link instruction acquisition module is used for receiving the data transmission instruction, determining a transmission period according to the data transmission instruction, indexing out data to be transmitted at the current moment to obtain the current data to be transmitted, and acquiring all link instructions required to be experienced by the current data to be transmitted to obtain a link instruction set;
the important value calculation module is used for calculating the important value of the current data to be transmitted according to the link instruction set;
the encryption module is used for determining the importance level of the current data to be transmitted according to the importance value, wherein the importance level at least comprises 3 levels, namely A, B and C levels, wherein the A level is highest, the C level is lowest, if the importance level of the current data to be transmitted is C level, encryption processing is not executed on the current data to be transmitted and is directly transmitted to a designated client of a data transmission instruction, the data to be transmitted at the next moment is continuously received until the transmission period is completed, if the importance level of the current data to be transmitted is B level, encryption complexity is calculated according to the importance value, an encryption algorithm corresponding to the encryption complexity is selected from a pre-built encryption algorithm database, a matched encryption algorithm is obtained, the current data to be transmitted is encrypted by utilizing the matched encryption algorithm, and the current encrypted data is transmitted to the designated data;
And the hidden information sending module is used for starting a pre-constructed hidden information sending device when the importance level of the current data to be transmitted is A, transmitting the encrypted current data to be transmitted to the appointed client according to the hidden information sending device, and continuously receiving the data to be transmitted at the next moment until the transmission period is reached to finish data transmission.
CN202310412829.1A 2023-04-07 2023-04-07 Information security protection method and device based on data transmission Active CN116389138B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310412829.1A CN116389138B (en) 2023-04-07 2023-04-07 Information security protection method and device based on data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310412829.1A CN116389138B (en) 2023-04-07 2023-04-07 Information security protection method and device based on data transmission

Publications (2)

Publication Number Publication Date
CN116389138A true CN116389138A (en) 2023-07-04
CN116389138B CN116389138B (en) 2023-11-24

Family

ID=86980531

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310412829.1A Active CN116389138B (en) 2023-04-07 2023-04-07 Information security protection method and device based on data transmission

Country Status (1)

Country Link
CN (1) CN116389138B (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120177199A1 (en) * 2011-01-10 2012-07-12 Samsung Electronics., Ltd. Method and apparatus for encrypting short data in a wireless communication system
JP2012169778A (en) * 2011-02-10 2012-09-06 Fujitsu Broad Solution & Consulting Inc Encryption processing program, encryption processor, and encryption processing method
CN103051638A (en) * 2013-01-09 2013-04-17 中国科学院深圳先进技术研究院 Multimedia data encryption method and multimedia data encryption distributing system
US20150110131A1 (en) * 2013-10-23 2015-04-23 Google Inc. Secure communications using adaptive data compression
KR101521616B1 (en) * 2014-02-24 2015-05-20 (주)헤리트 Selective Encryption Apparatus and Method for Efficient Secure Data Transmission in Internet of Things
WO2018049892A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transmission method and apparatus, and terminal
CN108959941A (en) * 2018-06-21 2018-12-07 Oppo(重庆)智能科技有限公司 Data ciphering method, device and electronic device
CN109617910A (en) * 2019-01-08 2019-04-12 平安科技(深圳)有限公司 Loophole methods of risk assessment, device and storage medium, server
CN110222525A (en) * 2019-05-14 2019-09-10 新华三大数据技术有限公司 Database manipulation auditing method, device, electronic equipment and storage medium
US20200125716A1 (en) * 2018-06-07 2020-04-23 Colorado State University Research Foundation Hardware security for photonic communication architectures
CN112019541A (en) * 2020-08-27 2020-12-01 平安国际智慧城市科技股份有限公司 Data transmission method and device, computer equipment and storage medium
CN112039902A (en) * 2020-09-02 2020-12-04 全球能源互联网研究院有限公司 Data encryption method and device
CN112231735A (en) * 2020-11-02 2021-01-15 北京蜂窝科技有限公司 Data transmission method and system
CN113726768A (en) * 2021-08-26 2021-11-30 北京天融信网络安全技术有限公司 Data transmission method and device, electronic equipment and readable storage medium
CN114157457A (en) * 2021-11-17 2022-03-08 南方电网数字电网研究院有限公司 Authority application and monitoring method for network data information security
CN114599036A (en) * 2022-05-09 2022-06-07 北京乐开科技有限责任公司 Multi-user-participated NAS file security operation method and system
CN115168888A (en) * 2022-09-07 2022-10-11 杭州海康威视数字技术股份有限公司 Service self-adaptive data management method, device and equipment
CN115706977A (en) * 2021-08-03 2023-02-17 华为技术有限公司 Data transmission method and related equipment
CN115758422A (en) * 2022-11-29 2023-03-07 广东职业技术学院 File encryption method and system

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120177199A1 (en) * 2011-01-10 2012-07-12 Samsung Electronics., Ltd. Method and apparatus for encrypting short data in a wireless communication system
JP2012169778A (en) * 2011-02-10 2012-09-06 Fujitsu Broad Solution & Consulting Inc Encryption processing program, encryption processor, and encryption processing method
CN103051638A (en) * 2013-01-09 2013-04-17 中国科学院深圳先进技术研究院 Multimedia data encryption method and multimedia data encryption distributing system
US20150110131A1 (en) * 2013-10-23 2015-04-23 Google Inc. Secure communications using adaptive data compression
KR101521616B1 (en) * 2014-02-24 2015-05-20 (주)헤리트 Selective Encryption Apparatus and Method for Efficient Secure Data Transmission in Internet of Things
WO2018049892A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transmission method and apparatus, and terminal
US20200125716A1 (en) * 2018-06-07 2020-04-23 Colorado State University Research Foundation Hardware security for photonic communication architectures
CN108959941A (en) * 2018-06-21 2018-12-07 Oppo(重庆)智能科技有限公司 Data ciphering method, device and electronic device
CN109617910A (en) * 2019-01-08 2019-04-12 平安科技(深圳)有限公司 Loophole methods of risk assessment, device and storage medium, server
CN110222525A (en) * 2019-05-14 2019-09-10 新华三大数据技术有限公司 Database manipulation auditing method, device, electronic equipment and storage medium
CN112019541A (en) * 2020-08-27 2020-12-01 平安国际智慧城市科技股份有限公司 Data transmission method and device, computer equipment and storage medium
CN112039902A (en) * 2020-09-02 2020-12-04 全球能源互联网研究院有限公司 Data encryption method and device
CN112231735A (en) * 2020-11-02 2021-01-15 北京蜂窝科技有限公司 Data transmission method and system
CN115706977A (en) * 2021-08-03 2023-02-17 华为技术有限公司 Data transmission method and related equipment
CN113726768A (en) * 2021-08-26 2021-11-30 北京天融信网络安全技术有限公司 Data transmission method and device, electronic equipment and readable storage medium
CN114157457A (en) * 2021-11-17 2022-03-08 南方电网数字电网研究院有限公司 Authority application and monitoring method for network data information security
CN114599036A (en) * 2022-05-09 2022-06-07 北京乐开科技有限责任公司 Multi-user-participated NAS file security operation method and system
CN115168888A (en) * 2022-09-07 2022-10-11 杭州海康威视数字技术股份有限公司 Service self-adaptive data management method, device and equipment
CN115758422A (en) * 2022-11-29 2023-03-07 广东职业技术学院 File encryption method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李超零;陈越;谭鹏许;杨刚;李文俊;: "基于分解与加密的云数据库隐私保护机制研究", 信息工程大学学报, no. 03 *
肖晨;马世龙;吕卫峰;王丽丰;: "流媒体***多数据流安全的动态选择控制模型", 北京航空航天大学学报, no. 11 *

Also Published As

Publication number Publication date
CN116389138B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
CN108255653B (en) Product testing method and terminal thereof
US8788699B2 (en) Information processing apparatus and document data producing method
CN108845816A (en) Application program update method, system, computer equipment and storage medium
CN110473104B (en) Transaction processing method and related equipment
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN108933695B (en) Method and apparatus for processing information
CN113079139B (en) Block chain-based consensus group master node determination method, device and system
CN112560939B (en) Model verification method and device and computer equipment
CN110602215A (en) Resource processing method based on alliance block chain and alliance block chain system
CN116389138B (en) Information security protection method and device based on data transmission
CN109672721A (en) Pushing method for media files, device, server-side and computer readable storage medium
CN112541841A (en) Method and device for simulating past and future data and terminal equipment
CN107508745A (en) The association input method and device and computing device of prompting message
CN109525550B (en) Data message processing method, device and system
US11950173B2 (en) Method of determining shared service index based on shared service of communication credential
US20160078469A1 (en) Application Purchasing Method, And Terminal
CN109976800A (en) Message informing method, device, equipment and storage medium based on Gitlab
CN112182107B (en) List data acquisition method, device, computer equipment and storage medium
CN116205697A (en) Resource recommendation method and resource recommendation device for virtual public cloud
CN114331446A (en) Method, device, equipment and medium for realizing out-of-chain service of block chain
CN107330535A (en) A kind of device, method and system for realizing Catering Management
CN111522843A (en) Control method, system, equipment and storage medium of data platform
CN115174691B (en) Big data loading method, device, equipment and medium based on page request
CN112073202B (en) Information generation method and device, electronic equipment and computer readable medium
CN109828908A (en) Interface testing parameter encryption method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant