CN106230807A - Government data interactive management method - Google Patents

Government data interactive management method Download PDF

Info

Publication number
CN106230807A
CN106230807A CN201610604222.3A CN201610604222A CN106230807A CN 106230807 A CN106230807 A CN 106230807A CN 201610604222 A CN201610604222 A CN 201610604222A CN 106230807 A CN106230807 A CN 106230807A
Authority
CN
China
Prior art keywords
steganography
government data
data
government
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610604222.3A
Other languages
Chinese (zh)
Inventor
高亚进
毛峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Ylz Information Technology Co Ltd
Original Assignee
Anhui Ylz Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Ylz Information Technology Co Ltd filed Critical Anhui Ylz Information Technology Co Ltd
Priority to CN201610604222.3A priority Critical patent/CN106230807A/en
Publication of CN106230807A publication Critical patent/CN106230807A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of government data interactive management method, government data is encrypted after operating with steganography and is uploaded to intelligent interaction platform by user terminal, Internet user passes sequentially through login module, honey wall obtains steganography pictorial information, obtains government data by anti-steganography and decryption oprerations the most again.The government data interacted is encrypted and steganography protection by the present invention, thus improves the safety that government data is mutual.

Description

Government data interactive management method
Technical field
The present invention relates to the management domain of government data, specifically a kind of government data interactive management method.
Background technology
Government affairs information is an important class of information, is to reflect government affairs work and the feelings of correlate thereof in state affairs The general name of report, situation, data, data, chart, written material and audio-video materials etc..Government data should meet three bars simultaneously Part, one is the information grasped by government bodies, refers to government bodies legal generations, gathers and integrate;Two is with economical, social Managing the information relevant with public service, three is the content reflected by specific support.
In government affairs information management system, government data is the most important, needs to carry out a certain degree of secrecy processing, if Do not carry out if the government data of secrecy processing is transmitted on cloud service platform and processes, it is likely that government affairs number can be caused According to leakage so that cannot effectively ensure the safety of government data.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of government data interactive management method, to the government affairs interacted Data are encrypted to be protected with steganography, thus improves the safety that government data is mutual.
The technical scheme is that
Government data interactive management method, has specifically included following steps:
(1), first government data is transferred to the encryption and decryption mould in its data base, on user terminal by manager on the subscriber terminal Tuber is encrypted according to the secret key pair government data randomly generated, and corresponding key information is saved in the data of user terminal In storehouse;
(2) government data after, encrypting in user terminal data storehouse becomes corresponding picture to believe by steganography/anti-steganography module steganography Breath, and be transferred in the cloud storage on intelligent interaction platform store;
(3), Internet user's end by after login module authenticating identity, log in intelligent interaction platform by honey wall, hand over from intelligence Obtaining steganography pictorial information in cloud storage on platform mutually and be stored in its data base, last Internet user's end reapplies hidden Write/the anti-steganography of anti-steganography module obtains the government data after encryption, the government data of encryption relies on encryption/decryption module Key deciphering obtains the government data of storage.
Described login module is connected with evidence obtaining module, when Internet user carries out abnormal operation in login module, Abnormal login behavior is collected evidence by evidence obtaining module.
Described abnormal login behavior includes three logon errors, use brute force crack utility to carry out logging in and deletion is stepped on The operation of record behavior.
Advantages of the present invention:
(1), the present invention realize government data encryption steganography function on intelligent interaction platform by steganography/anti-steganography module, Simultaneously facilitate the Internet user being provided with steganography/anti-steganography module to be decrypted according to the pictorial information selected;
(2), the present invention passes through encryption/decryption module and encrypts the important information of user, and random calculated key is saved in use In the data base of family terminal, it is simple to be provided with the Internet user of encryption/decryption module and extract after the government data of encryption according to key It is decrypted operation;
(3), the Internet user of the present invention need to log in honey wall and conduct interviews, by honey wall, the data of the Internet transmission are carried out Monitoring and analysis, improve the safety of government data interactive environment further;
(4), the present invention be provided with evidence obtaining module, when have abnormal or illegal log in behavior time, i.e. these behaviors are carried out evidence obtaining note Record.
Accompanying drawing explanation
Fig. 1 is the theory diagram of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Government data interactive management method, has specifically included following steps:
(1), first manager on user terminal 01, government data is transferred in its data base 11, adding on user terminal 01 Deciphering module 12 is encrypted according to the secret key pair government data randomly generated, and corresponding key information is saved in user eventually In the data base 11 of end;
(2) government data after, encrypting in user terminal 01 data base 2 becomes correspondence by steganography/anti-steganography module 13 steganography Pictorial information, and be transferred in the cloud storage on intelligent interaction platform 03 store;
(3), Internet user's end 02 by after login module 04 authenticating identity, log in intelligent interaction platform 03 by honey wall 05, Obtaining steganography pictorial information in cloud storage from intelligent interaction platform 03 and be stored in its data base 11, last the Internet is used Family end 02 reapplies the anti-steganography of steganography/anti-steganography module 13 and obtains the government data after encrypting, the government data of encryption The key deciphering relying on encryption/decryption module 12 obtains the government data of storage.
Login module 04 is connected with evidence obtaining module 06, when Internet user carries out abnormal operation in login module 04, Abnormal login behavior is collected evidence by evidence obtaining module 06;Concrete abnormal login behavior includes three logon errors, employings cruelly Power cracking programs carries out logging in and deleting the operation of login behavior.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, permissible Understand and these embodiments can be carried out multiple change without departing from the principles and spirit of the present invention, revise, replace And modification, the scope of the present invention be defined by the appended.

Claims (3)

1. government data interactive management method, it is characterised in that: specifically include following steps:
(1), first government data is transferred to the encryption and decryption mould in its data base, on user terminal by manager on the subscriber terminal Tuber is encrypted according to the secret key pair government data randomly generated, and corresponding key information is saved in the data of user terminal In storehouse;
(2) government data after, encrypting in user terminal data storehouse becomes corresponding picture to believe by steganography/anti-steganography module steganography Breath, and be transferred in the cloud storage on intelligent interaction platform store;
(3), Internet user's end by after login module authenticating identity, log in intelligent interaction platform by honey wall, hand over from intelligence Obtaining steganography pictorial information in cloud storage on platform mutually and be stored in its data base, last Internet user's end reapplies hidden Write/the anti-steganography of anti-steganography module obtains the government data after encryption, the government data of encryption relies on encryption/decryption module Key deciphering obtains the government data of storage.
Government data interactive management method the most according to claim 1, it is characterised in that: described login module and evidence obtaining Module connects, and when Internet user carries out abnormal operation in login module, abnormal login behavior is taken by evidence obtaining module Card.
Government data interactive management method the most according to claim 2, it is characterised in that: described abnormal login behavior bag Include three logon errors, use brute force crack utility to carry out logging in and deleting the operation of login behavior.
CN201610604222.3A 2016-07-28 2016-07-28 Government data interactive management method Pending CN106230807A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610604222.3A CN106230807A (en) 2016-07-28 2016-07-28 Government data interactive management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610604222.3A CN106230807A (en) 2016-07-28 2016-07-28 Government data interactive management method

Publications (1)

Publication Number Publication Date
CN106230807A true CN106230807A (en) 2016-12-14

Family

ID=57534555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610604222.3A Pending CN106230807A (en) 2016-07-28 2016-07-28 Government data interactive management method

Country Status (1)

Country Link
CN (1) CN106230807A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101710401A (en) * 2009-10-29 2010-05-19 李林 City-level digitalized application primary platform
CN102542519A (en) * 2011-12-29 2012-07-04 遵义市亿易通科技网络有限责任公司 Cloud system for government affairs
CN103761600A (en) * 2013-12-30 2014-04-30 武汉烽火信息集成技术有限公司 Platform and method for e-government affair comprehensive application
CN104102483A (en) * 2013-04-02 2014-10-15 国际商业机器公司 Method and system for securely using public services for private or enterprise purposes
CN104486320A (en) * 2014-12-10 2015-04-01 国家电网公司 Intranet sensitive information disclosure evidence collection system and method based on honeynet technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101710401A (en) * 2009-10-29 2010-05-19 李林 City-level digitalized application primary platform
CN102542519A (en) * 2011-12-29 2012-07-04 遵义市亿易通科技网络有限责任公司 Cloud system for government affairs
CN104102483A (en) * 2013-04-02 2014-10-15 国际商业机器公司 Method and system for securely using public services for private or enterprise purposes
CN103761600A (en) * 2013-12-30 2014-04-30 武汉烽火信息集成技术有限公司 Platform and method for e-government affair comprehensive application
CN104486320A (en) * 2014-12-10 2015-04-01 国家电网公司 Intranet sensitive information disclosure evidence collection system and method based on honeynet technology

Similar Documents

Publication Publication Date Title
CN102945355B (en) Fast Data Encipherment strategy based on sector map is deferred to
KR102149996B1 (en) System and method for establishing links between identifiers without exposing specific identification information
US9767299B2 (en) Secure cloud data sharing
CN102687133B (en) Containerless data for trustworthy computing and data services
CN102855452B (en) Fast Data Encipherment strategy based on encryption chunk is deferred to
ES2601495T3 (en) Method and system for key distribution in a wireless communication network
CN106506159A (en) Encryption method and equipment for key safety
WO2007092658B1 (en) Method of transferring digital rights
KR100982515B1 (en) Apparatus and method for constraining the count of access to digital contents using a hash chain
CN109271802A (en) A kind of user information management method, system, equipment and computer storage medium
CN103268456A (en) Method and device for file safety control
CN102457561B (en) Data access method and equipment adopting same
CN105335642A (en) Processing method and processing system of pictures
Sarkar et al. Enhancing data storage security in cloud computing through steganography
CN102170424A (en) Mobile medium safety protection system based on three-level security architecture
Prakash et al. Cloud and edge computing-based computer forensics: Challenges and open problems
CN106203130B (en) A kind of transparent encipher-decipher method based on Intelligent Dynamic driving layer
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
CN102567657A (en) Digital work ownership authentication system and digital work ownership authentication method
CN103973698A (en) User access right revoking method in cloud storage environment
Rana et al. Taxonomy of digital forensics: Investigation tools and challenges
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN103379133A (en) Safe and reliable cloud storage system
CN103177224A (en) Data protection method and device used for terminal external storage card
US8886958B2 (en) Systems and methods for digital evidence preservation, privacy, and recovery

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161214

RJ01 Rejection of invention patent application after publication