CN115942262A - Short message service system with data security mechanism and method thereof - Google Patents

Short message service system with data security mechanism and method thereof Download PDF

Info

Publication number
CN115942262A
CN115942262A CN202211516671.4A CN202211516671A CN115942262A CN 115942262 A CN115942262 A CN 115942262A CN 202211516671 A CN202211516671 A CN 202211516671A CN 115942262 A CN115942262 A CN 115942262A
Authority
CN
China
Prior art keywords
data
short message
information
abnormal
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211516671.4A
Other languages
Chinese (zh)
Inventor
康明华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Xunmei Network Technology Co ltd
Original Assignee
Xiamen Xunmei Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Xunmei Network Technology Co ltd filed Critical Xiamen Xunmei Network Technology Co ltd
Priority to CN202211516671.4A priority Critical patent/CN115942262A/en
Publication of CN115942262A publication Critical patent/CN115942262A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a short message service system with a data security mechanism and a method thereof, relates to the technical field of short message service, and aims to solve the problem of the security of short message data. The short message service system with the data security mechanism and the method thereof provided by the invention have the advantages that the single maximum aggregation data volume of each aggregation node is determined, the shared data transmission channel is utilized to receive the second data sent by the risk data receiving terminal, the safety of the data can be effectively improved after the risk data are screened out, the first abnormal data and the second abnormal data are marked as the final effective abnormal data, the clearness, the clarity and the accuracy of the finally obtained effective abnormal data are ensured, the basis is provided for judging and deciding the numerical value of the data, the self-judgment of the data is facilitated, the security of the data can be protected to the maximum degree by a plurality of encryption matrixes, the security mechanism of the whole data is also improved, and the service port of the short message is more excellent in use.

Description

Short message service system with data security mechanism and method thereof
Technical Field
The invention relates to the technical field of short message service, in particular to a short message service system with a data security mechanism and a method thereof.
Background
The short message service is the earliest short message service and is also a short message service with the highest popularity rate.
Chinese patent publication No. CN114599032a discloses a method and apparatus for transmitting short messages based on salt value encryption, the method comprising: the short message service end encrypts the short message to be sent by using the effective salt value, the effective salt value information comprises an effective salt value and a salt value identifier, the problem that the short message service end encrypts the short message to be sent by using the effective salt value is mainly solved, the salt value has an effective period and can be invalid once exceeding the effective period so as not to be used for encryption, the information encryption safety is improved, the difficulty of capturing and packaging sensitive information of a client in a link transmission process is improved, and due to the fact that a timing refreshing mechanism of the salt value exists, once the information is not decrypted timely, decryption becomes difficult, the safety of private data of the client is protected, and although the problem of data encryption exists in the practical operation, the following problems exist:
1. when short message data is received, the flow change during data transmission is not effectively evaluated, when the flow is too large, the flow explosion during transmission is easily caused, when the data is transmitted, the existing data is not analyzed by using the historical successful data, and meanwhile, the risk investigation is not timely carried out on abnormal data in the data, so that the completeness and the safety of the data are reduced.
2. After the abnormal data are received, the abnormal data are not compared, so that the redundancy of the abnormal data is increased, and meanwhile, the abnormal data are not judged in time, so that the accuracy of the data is reduced.
3. The abnormal data and the valid data are not distinguished, so that the abnormal data are simultaneously encrypted when being encrypted, and the storage capacity after encryption is overlarge.
Disclosure of Invention
The invention aims to provide a short message service system with a data security mechanism and a method thereof, which are used for determining the single maximum aggregation data volume of each aggregation node, receiving second data sent by a risk data receiving terminal by using a shared data transmission channel, effectively improving the data security after screening out the risk data, marking the first abnormal data and the second abnormal data as final effective abnormal data, and ensuring the clearness, the clarity and the accuracy of the finally obtained effective abnormal data, thereby providing a basis for judging and deciding the numerical value of the data, facilitating the self-judgment of the data, protecting the data security to the maximum extent by a plurality of encryption matrixes, simultaneously improving the security mechanism of the whole data, ensuring that a service port of a short message is more excellent to use, and solving the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
a short message service method with a data security mechanism comprises the following steps:
s1: short message data acquisition: acquiring short message data information through a gateway port, and independently storing the acquired short message data;
s2: data caching and extracting: caching the independently stored short message data information, and extracting risk data in the cached data;
s3: risk data reading calculation: reading the extracted risk data, and performing difference calculation on the abnormal data and the data in the normal range value;
s4: differential data reading: reading and analyzing the sequence data after difference calculation, and performing effective data integration on the analyzed data;
s5: and (3) effective data encryption: and encrypting the valid data, and preferentially starting the encrypted data.
Preferably, the short message data acquisition further includes:
an information data acquisition system for:
acquiring the flow change condition of a network layer of each data receiving terminal when transmitting data;
evaluating the importance of each network layer according to the flow change condition of the network layer of each data receiving terminal during data transmission;
counting the target network layer with the importance degree of each data receiving terminal being more than or equal to a preset threshold value;
and acquiring historical transmission success data of each data receiving terminal.
Preferably, the collecting the completed risk data reading further comprises:
an abnormal data analysis unit for:
according to the history transmission success data of each data receiving terminal acquired from the information data acquisition system;
analyzing the historical transmission success data to determine the integrity and the safety of the data, and evaluating a threat risk index and a vulnerability risk index of the data receiving terminal according to the integrity and the safety;
calculating the security index of each data receiving terminal by using a preset risk evaluation system according to the working strength of the target network layer of each data receiving terminal and the threat risk index and the vulnerability risk index of the data receiving terminal;
screening out a safety data receiving terminal and a risk data receiving terminal according to the safety index of each data receiving terminal;
receiving first data sent by the safety data receiving terminal;
acquiring configuration information and network information of the risk data receiving terminal;
establishing a shared data transmission channel of a risk data receiving terminal according to the network information;
acquiring a plurality of sink nodes in the shared data transmission channel, and determining the single maximum sink data volume of each sink node;
determining target second data with the largest data quantity in second data of the risk data receiving terminal;
calculating the target data transmission efficiency of the shared data transmission channel according to the target second data and the maximum data collection amount of each aggregation node in the shared data transmission channel;
and setting the data transmission efficiency of the shared data transmission channel as the target data transmission efficiency, and after the setting is finished, receiving second data sent by the risk data receiving terminal by using the shared data transmission channel.
Preferably, the calculating of the difference between the abnormal data and the data in the normal range value further includes:
a difference calculation module to:
after acquiring the risk data, converting the risk data into specific numerical values, and then performing difference calculation on the data of the risk data and the data numerical values in a normal range;
the judging module is used for acquiring the numerical sequence of the data difference calculation, periodically detecting the numerical sequence and judging whether the numerical sequence is a periodic sequence;
the analysis module is used for segmenting the numerical sequence according to periods to obtain a plurality of groups of same first subsequences after the numerical sequence is determined to be a periodic sequence, judging whether all numerical values in the first subsequences are larger than preset numerical values, if so, extracting first abnormal numerical values larger than the preset numerical values in the first subsequences, determining adjacent time intervals among the first abnormal numerical values, judging whether the time intervals are within a preset time interval range, if so, taking the first abnormal numerical values and the time intervals as first abnormal data, and otherwise, determining that the first abnormal numerical values are invalid;
and the data integration module is used for carrying out periodic marking on the first abnormal data to obtain first effective abnormal data, carrying out non-periodic marking on the second abnormal data to obtain second effective abnormal data, independently storing the first effective abnormal data and the second effective abnormal data as final effective abnormal data, and not sending the data to the next reading module.
Preferably, the analysis module further includes:
the analysis module is further configured to, after it is determined that the numerical sequence is a non-periodic sequence, perform clustering operation on the numerical sequence by using a one-dimensional clustering method to obtain a plurality of segmentation points, divide the numerical sequence by using the plurality of segmentation points to obtain a plurality of groups of different second subsequences, obtain a third subsequence having a value greater than a preset value from the second subsequence, determine an abnormal time interval of the third subsequence based on a position of the third subsequence in the numerical sequence, obtain a fourth subsequence having an abnormal time interval of an adjacent third subsequence in the preset time interval range, and use the fourth subsequence and the abnormal time interval as second abnormal data.
Preferably, the valid data reading and encryption further includes:
a valid data reading module to:
performing data-based troubleshooting based on the first effective abnormal data and the second effective abnormal data in the data integration module as final effective abnormal data, and taking other data after troubleshooting as effective data;
a data decoding encryption module for:
decoding the effective data, dividing the decoded data into sections to be encrypted with preset lengths by taking the decoded data as original data, and establishing an encryption sequence based on the sections to be encrypted;
according to the number of the segments to be encrypted, the encryption sequence is used as a first column of a matrix, and a first encryption matrix is established;
adjusting the first position of each section to be encrypted on the corresponding row of the first encryption matrix based on a preset interference factor, and performing first encryption on the section to be encrypted after the adjustment is finished;
acquiring a corresponding interference password in a preset password set based on the interference times, and throwing a random number by using encrypted dice;
marking a second location in each row of the first encryption matrix that is separated from the first location by a random number;
sequentially inputting the interference passwords to the second position for second encryption, and establishing a second encryption matrix;
determining that the current encryption degree is insufficient when a first number of blank locations in the second encryption matrix is greater than a second number of non-blank locations;
sequentially removing the outermost peripheral positions of the second matrix to generate a plurality of sub-encryption matrixes;
respectively calculating the encryption rank of each sub-encryption matrix, and generating a rank password based on all the encryption ranks;
inputting the rank password into the second encryption matrix for third encryption to obtain a third encryption matrix;
randomly generating a homotype matrix based on the specification of the third encryption matrix;
marking the remaining blank positions on the third encryption matrix, and overlapping the marked third encryption matrix and the homotype matrix to obtain the overlapping number generated by the marked positions;
inputting the superposition number to the residual blank position to obtain a full encryption matrix;
and extracting data corresponding to each position in the second full encryption matrix to obtain encrypted data.
Preferably, the caching the data includes:
the data calling module is used for acquiring the independently stored short message data information, extracting a key information fragment of the short message data information, and determining the information type of the short message data information based on the target semantics of the key information fragment;
the buffer space determining module is used for determining a target buffer space corresponding to the short message data information based on the information type, extracting capacity information of the target buffer space, and determining a first remaining available space capacity of the target buffer space based on the capacity information;
the cache space determining module is used for acquiring the data length of the short message data information, clustering the short message data information when the first remaining available space capacity is larger than the data length to obtain a sub-data type set corresponding to the short message data information, and setting a type identifier for each sub-data type;
the cache space dividing module is used for performing first block division on a target cache space based on the type identifier, adding block identifiers to the divided sub-target cache spaces, and performing second division on each sub-target cache space to obtain a first storage item and a second storage item corresponding to each sub-target cache space, wherein the block identifiers correspond to the type identifiers;
the data caching module is used for respectively extracting target content of the short message data information corresponding to each subdata type based on the type identifier and respectively caching the type identifier and the target content to a first storage item and a second storage item;
the data updating module is used for monitoring the reading operation of the short message data information in real time, determining the real-time reading amount of the short message data information based on the reading process when the reading operation of the short message data information is detected, and determining the data tail part of the residual short message data information in the target cache space based on the reading amount;
and the space updating module is used for moving the preset cursor direction to the tail part of the short message data information in the target cache space, determining the second remaining available space capacity of the target cache space based on the moving result, and indicating the second remaining available space capacity of the target cache space based on the preset cursor direction.
Preferably, in S1, acquiring the short message data information through the gateway port includes:
determining the total number of data packets acquired by the short message data information based on the gateway port, carrying out integrity check on the short message data information, and calculating an integrity index of the short message data information received by the gateway port based on a check result;
Figure 504231DEST_PATH_IMAGE001
wherein, the first and the second end of the pipe are connected with each other,
Figure 230879DEST_PATH_IMAGE002
the complete index represents that the gateway port receives the short message data information; />
Figure 191882DEST_PATH_IMAGE003
Indicating the number of data packets which fail the integrity check; />
Figure 823720DEST_PATH_IMAGE004
Representing the total number of the data packets;
mapping the short message data information corresponding to the data packet passing the integrity check to a storage space of a gateway port, and calculating a safety index of the gateway port for receiving the short message data information according to a mapping result;
Figure 895581DEST_PATH_IMAGE005
wherein the content of the first and second substances,
Figure 679998DEST_PATH_IMAGE006
the safety index represents the safety index of the gateway port for receiving the short message data information; />
Figure 546322DEST_PATH_IMAGE007
Representing a data mapping uniformity factor; />
Figure 698080DEST_PATH_IMAGE008
The data loss probability is represented when the short message data information is mapped; />
Figure 308053DEST_PATH_IMAGE009
Representing the current mapping length of the short message data information in the storage space; />
Figure 212555DEST_PATH_IMAGE010
Represents a minimum length of the storage space; />
Figure 249781DEST_PATH_IMAGE011
Represents a maximum length of the storage space; />
Figure 121791DEST_PATH_IMAGE012
Represents the base 2 logarithm;
evaluating the quality of the short message data information collected by the gateway port and acquiring an evaluation score based on the complete index of the short message data information received by the gateway port and the safety index of the short message data information received by the gateway port;
comparing the evaluation score with a set threshold value, and judging whether the short message data information acquired by the gateway port is qualified;
when the evaluation score is equal to or greater than the set score, judging that the short message data information acquired by the gateway port is qualified;
otherwise, judging that the short message data information acquired by the gateway port is unqualified, and performing alarm operation.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention provides a short message service system with a data security mechanism and a method thereof, which can evaluate the importance of each network layer according to the flow change condition, pay attention to the flow change in time, avoid the flow explosion caused by overlarge flow, analyze the collected short message data with the history data successfully transmitted, determine the integrity and the security of the short message data, evaluate the threat risk index and the leak risk index of the data according to the integrity and the security, calculate the security index of a data receiving terminal by using a preset risk evaluation system, screen out a security data receiving terminal and a risk data receiving terminal according to the security index, acquire a plurality of aggregation nodes in a shared data transmission channel according to the security data receiving terminal and the risk data receiving terminal, determine the single maximum aggregate data volume of each aggregation node, receive second data sent by the risk data receiving terminal by using the shared data transmission channel, and effectively improve the security of the data after screening the risk data.
2. The invention provides a short message service system with a data security mechanism and a method thereof, wherein a periodic sequence and a non-periodic sequence are analyzed in different modes, the emphasis and the efficiency of sequence analysis are ensured, the periodic sequence is divided into the same first subsequences to be subjected to numerical judgment and time interval processing, the time interval is also judged while the numerical value meets the abnormal requirement, the time which exceeds a preset time interval and indicates that the occurrence time between two first abnormal numerical values is long and cannot be used as effective abnormal data, the first abnormal numerical value and the time interval are used as the first abnormal data to reduce the redundancy of the abnormal data and ensure the accuracy of the obtained first abnormal data, the non-periodic sequence is firstly subjected to clustering operation by a one-dimensional clustering method to obtain a plurality of division points, so that the division of the division points is more accurate and objective, after the non-periodic sequence is divided, the numerical value and the abnormal time interval are also judged, the second abnormal data are finally obtained and are used as the second abnormal data to ensure the accuracy of the obtained second abnormal data, and finally the judgment of the abnormal data is clear and the effective data, thereby the final judgment and the decision-based on the effective data is conveniently realized.
3. The invention provides a short message service system with a data security mechanism and a method thereof, which are used for excluding abnormal data in all data so as to obtain effective data, wherein the effective data is decoded, the decoded data is used as original data and is divided into sections to be encrypted with preset lengths, an encryption sequence is used as a first column of a matrix according to the number of the sections to be encrypted, a first encryption matrix is established, interference passwords are sequentially input to a second position for second encryption, a second encryption matrix is established, a rank password is input to the second encryption matrix for third encryption, a third encryption matrix is obtained, the marked third encryption matrix is overlapped with a homotype matrix, and the overlapped number generated at the marked position is obtained; and inputting the superposition number to the residual blank position to obtain a full encryption matrix, extracting data corresponding to each position in a second full encryption matrix, and obtaining encrypted data.
4. The invention provides a short message service system with a data security mechanism and a method thereof, which analyze short message data information to realize accurate and effective confirmation of the information type of the short message data information, thereby facilitating the determination of a target cache space for caching the short message data information, secondly, clustering the short message data information, classifying different data types contained in the short message data information according to the clustering result, dividing the target cache space according to the classification result, facilitating the storage of different types of data in corresponding storage regions, and simultaneously, dividing each sub-target storage space again, thereby ensuring the cache effect and the cache accuracy of each type of data content and type identification, finally, caching the different types of data in the corresponding sub-target cache space, monitoring the reading operation of the short message data information in real time, determining the residual available space capacity of the target cache space in real time after the reading operation exists, and indicating by a preset direction, thereby ensuring the cache effect of the short message data information and improving the security coefficient of the short message data information.
5. The invention provides a short message service system with a data security mechanism and a method thereof, which effectively measure whether short message data information acquired by a gateway port is qualified or not by calculating the integrity index of the short message data information received by the gateway port and the security index of the short message data information received by the gateway port, thereby timely grasping the quality of the acquired short message data information.
Drawings
FIG. 1 is a schematic flow diagram of the overall process of the present invention;
fig. 2 is a schematic diagram of the overall system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problems that in the prior art, when short message data is received, the flow change during data transmission is not effectively evaluated, when the flow is too large, the flow during transmission is easy to explode, when the data is transmitted, the existing data is not analyzed by using historical successful data, and meanwhile, the abnormal data in the data is not timely risk-checked, so that the integrity and the safety of the data are reduced, please refer to fig. 1 and fig. 2, the embodiment provides the following technical scheme:
a short message service method with a data security mechanism comprises the following steps:
s1: short message data acquisition: acquiring short message data information through a gateway port, and independently storing the acquired short message data;
s2: data caching and extracting: caching the independently stored short message data information, and extracting risk data in the cached data;
s3: risk data reading calculation: reading the extracted risk data, and performing difference calculation on the abnormal data and the data in the normal range value;
s4: differential data reading: reading and analyzing the sequence data after the difference calculation is completed, and performing effective data integration on the analyzed data;
s5: and (3) effective data encryption: and encrypting the valid data, and preferentially starting the encrypted data.
The short message data acquisition further comprises: an information data acquisition system for: acquiring the flow change condition of a network layer of each data receiving terminal during data transmission; evaluating the importance of each network layer according to the flow change condition of the network layer of each data receiving terminal during data transmission; counting the target network layer with the importance degree of each data receiving terminal being more than or equal to a preset threshold value; and acquiring historical transmission success data of each data receiving terminal.
The collecting completed risk data reading further comprises: an abnormal data analysis unit for: according to the history transmission success data of each data receiving terminal acquired from the information data acquisition system; analyzing the historical transmission success data to determine the integrity and the safety of the data, and evaluating a threat risk index and a vulnerability risk index of the data receiving terminal according to the integrity and the safety; calculating the security index of each data receiving terminal by using a preset risk evaluation system according to the working strength of the target network layer of each data receiving terminal and the threat risk index and the vulnerability risk index of the data receiving terminal; screening out a safety data receiving terminal and a risk data receiving terminal according to the safety index of each data receiving terminal; receiving first data sent by the safety data receiving terminal; acquiring configuration information and network information of the risk data receiving terminal; establishing a shared data transmission channel of a risk data receiving terminal according to the network information; acquiring a plurality of sink nodes in the shared data transmission channel, and determining the single maximum sink data volume of each sink node; determining target second data with the maximum data volume in second data of the risk data receiving terminal; calculating the target data transmission efficiency of the shared data transmission channel according to the target second data and the maximum data collection amount of each aggregation node in the shared data transmission channel; and setting the data transmission efficiency of the shared data transmission channel as the target data transmission efficiency, and after the setting is finished, receiving second data sent by the risk data receiving terminal by using the shared data transmission channel.
Specifically, the method includes the steps of firstly collecting transmitted short message data information through a gateway port, obtaining flow change conditions of network layers of each data receiving terminal when data are transmitted while collecting the short message data, then evaluating the importance of each network layer according to the flow change conditions, paying attention to flow change in time, avoiding flow explosion caused by overlarge flow, analyzing the collected short message data and historical data which are successfully transmitted, determining the integrity and the safety of the collected short message data, then evaluating threat risk indexes and vulnerability indexes of the data according to the integrity and the safety, calculating the safety indexes of the data receiving terminals by using a preset risk evaluation system, screening out a safety data receiving terminal and a risk data receiving terminal according to the safety indexes, obtaining a plurality of aggregation nodes in a shared data transmission channel according to the safety data receiving terminal and the risk data receiving terminal, determining the single maximum aggregation data volume of each aggregation node, and receiving second data sent by the risk data receiving terminal by using the shared data transmission channel, wherein the safety of the data can be effectively improved after the risk data are selected.
In order to solve the problem that in the prior art, after receiving abnormal data, the abnormal data is not compared, so that redundancy of the abnormal data is increased, and meanwhile, the abnormal data is not judged in time, so that accuracy of the data is reduced, please refer to fig. 1 and 2, the embodiment provides the following technical solutions:
the calculation of the difference between the abnormal data and the data in the normal range value further comprises the following steps: a difference calculation module to: after acquiring the risk data, converting the risk data into specific numerical values, and then performing difference calculation on the data of the risk data and the data numerical values in a normal range; the judging module is used for acquiring the numerical sequence of the data difference calculation, periodically detecting the numerical sequence and judging whether the numerical sequence is a periodic sequence; the analysis module is used for segmenting the numerical sequence according to periods to obtain a plurality of groups of same first subsequences after the numerical sequence is determined to be a periodic sequence, judging whether all numerical values in the first subsequences are larger than preset numerical values, if so, extracting first abnormal numerical values larger than the preset numerical values in the first subsequences, determining adjacent time intervals among the first abnormal numerical values, judging whether the time intervals are within a preset time interval range, if so, taking the first abnormal numerical values and the time intervals as first abnormal data, and otherwise, determining that the first abnormal numerical values are invalid; the analysis module is further configured to, after the numerical sequence is determined to be a non-periodic sequence, perform clustering operation on the numerical sequence by using a one-dimensional clustering method to obtain a plurality of segmentation points, divide the numerical sequence by using the plurality of segmentation points to obtain a plurality of groups of different second subsequences, obtain a third subsequence having a value greater than a preset value from the second subsequence, determine an abnormal time interval of the third subsequence based on a position of the third subsequence in the numerical sequence, obtain a fourth subsequence having an abnormal time interval of an adjacent third subsequence in the preset time interval range, and use the fourth subsequence and the abnormal time interval as second abnormal data; and the data integration module is used for carrying out periodic marking on the first abnormal data to obtain first effective abnormal data, carrying out non-periodic marking on the second abnormal data to obtain second effective abnormal data, independently storing the first effective abnormal data and the second effective abnormal data as final effective abnormal data, and not sending the data to the next reading module.
The method comprises the steps of firstly, periodically judging a numerical sequence, analyzing the periodic sequence and a non-periodic sequence in different modes to ensure the emphasis and the efficiency of sequence analysis, dividing the periodic sequence into identical first subsequences, judging the time intervals while ensuring that the numerical values meet abnormal requirements, judging the time intervals, indicating that the time between two times of first abnormal numerical values is long when the time exceeds a preset time interval and cannot serve as effective abnormal data, taking the first abnormal numerical values and the time intervals as the first abnormal data to reduce the redundancy of the abnormal data and ensure the accuracy of the obtained first abnormal data, firstly, clustering the numerical sequence by a one-dimensional clustering method to obtain a plurality of dividing points so that the dividing of the dividing points is more accurate, after the non-periodic sequence is divided, similarly, judging the numerical values and the abnormal time intervals to finally obtain second abnormal data, ensuring the accuracy of the obtained second abnormal data, and finally, marking the first abnormal data and the second abnormal data as final effective data, and ensuring that the final effective data and the abnormal data are clearly judged, thereby providing clear decision for the final data and providing convenience for decision-making decisions on the basis of the abnormal data.
In order to solve the problem that the storage capacity after encryption is too large because the abnormal data and the valid data are not distinguished during encryption due to the fact that the abnormal data and the valid data are not distinguished in the prior art, please refer to fig. 1 and fig. 2, the following technical solutions are provided in this embodiment:
the valid data reading and encryption further comprises: a valid data reading module to: performing data-based troubleshooting based on the first effective abnormal data and the second effective abnormal data in the data integration module as final effective abnormal data, and taking other data after troubleshooting as effective data; a data decoding encryption module for: decoding the effective data, dividing the decoded data into sections to be encrypted with preset lengths by taking the decoded data as original data, and establishing an encryption sequence based on the sections to be encrypted; according to the number of the segments to be encrypted, establishing a first encryption matrix by taking the encryption sequence as a first column of a matrix; adjusting the first position of each section to be encrypted on the corresponding row of the first encryption matrix based on a preset interference factor, and performing first encryption on the section to be encrypted after the adjustment is finished; acquiring a corresponding interference password in a preset password set based on the interference times, and throwing a random number by using encrypted dice; marking a second location in each row of the first encryption matrix that is separated from the first location by a random number; sequentially inputting the interference passwords to the second position for second encryption, and establishing a second encryption matrix; determining that the current encryption degree is insufficient when a first number of blank locations in the second encryption matrix is greater than a second number of non-blank locations; sequentially removing the outermost peripheral positions of the second matrix to generate a plurality of sub-encryption matrixes; respectively calculating the encryption rank of each sub-encryption matrix, and generating a rank password based on all the encryption ranks; inputting the rank password into the second encryption matrix for third encryption to obtain a third encryption matrix; randomly generating a homotype matrix based on the specification of the third encryption matrix; marking the residual blank positions on the third encryption matrix, and overlapping the marked third encryption matrix and the homotype matrix to obtain the overlapping number generated by the marked positions; inputting the superposition number to the residual blank position to obtain a full encryption matrix; and extracting data corresponding to each position in the second full encryption matrix to obtain encrypted data.
Firstly, decoding the effective data, using the decoded data as original data and dividing the original data into sections to be encrypted with preset lengths, using an encryption sequence as a first column of a matrix according to the number of the sections to be encrypted, establishing a first encryption matrix, sequentially inputting interference passwords to a second position for second encryption, establishing a second encryption matrix, inputting rank passwords into the second encryption matrix for third encryption, acquiring a third encryption matrix, and overlapping the marked third encryption matrix with a homotype matrix to acquire an overlapping number generated by a marking position; and inputting the superposition number to the residual blank position to obtain a full encryption matrix, extracting data corresponding to each position in a second full encryption matrix, and obtaining encrypted data.
Specifically, caching data includes:
the data calling module is used for acquiring the independently stored short message data information, extracting a key information fragment of the short message data information and determining the information type of the short message data information based on the target semantics of the key information fragment;
the cache space determining module is used for determining a target cache space corresponding to the short message data information based on the information type, extracting capacity information of the target cache space, and determining a first remaining available space capacity of the target cache space based on the capacity information;
the cache space determining module is used for acquiring the data length of the short message data information, clustering the short message data information when the first remaining available space capacity is greater than the data length to obtain a sub data type set corresponding to the short message data information, and setting a type identifier for each sub data type;
the cache space dividing module is used for performing first block division on a target cache space based on the type identifier, adding block identifiers to the divided sub-target cache spaces, and performing second division on each sub-target cache space to obtain a first storage item and a second storage item corresponding to each sub-target cache space, wherein the block identifiers correspond to the type identifiers;
the data caching module is used for respectively extracting target content of the short message data information corresponding to each subdata type based on the type identifier and respectively caching the type identifier and the target content to a first storage item and a second storage item;
the data updating module is used for monitoring short message data information reading operation in real time, determining the real-time reading amount of the short message data information based on the reading process when the short message data information is detected to be read, and determining the data tail part of the residual short message data information in the target cache space based on the reading amount;
and the space updating module is used for moving the preset cursor direction to the tail part of the short message data information in the target cache space, determining the second remaining available space capacity of the target cache space based on the moving result, and indicating the second remaining available space capacity of the target cache space based on the preset cursor direction.
In this embodiment, the key information segment may be a certain data segment capable of characterizing the data content of the short message data information.
In this embodiment, the target semantics may be the subject content represented by the key information fragment, that is, the specific content expression representing the short message data information.
In this embodiment, the target buffer space may be a space suitable for buffering the short message data information of the current type.
In this embodiment, the first remaining available space capacity may be a storage space remaining before the short message data information is stored in the target cache space.
In this embodiment, the data length of the short message data information may be a data byte amount of the short message data information, and is used to represent a required storage space of the short message data information.
In this embodiment, the purpose of clustering the short message data information is to classify the same type of data, so as to classify each type of data of the short message data information.
In this embodiment, the sub data type sets may be data sets of different data types obtained by classifying the short message data information.
In this embodiment, the type identifier may be a type of tag label used to tag different types of data.
In this embodiment, the first block division may be to divide the target cache space into corresponding storage areas according to the types of data to be stored.
In this embodiment, the sub-target cache space may be different storage areas obtained by dividing the target cache space.
In this embodiment, the block id may be a tag for tagging storage types of different sub-target cache spaces, and corresponds to the type id.
In this embodiment, the second division may be to divide each sub-target cache space, which is respectively used for storing specific data content and data identifier.
In this embodiment, the first storage entry and the second storage entry may be storage areas obtained by dividing the sub-target cache space, and respectively store the type identifier and the target content.
In this embodiment, the target content may be a specific data value and a content expression of the short message data information corresponding to each sub data type.
In this embodiment, the real-time reading amount may be a data amount for reading the short message data information cached in the target cache space.
In this embodiment, the data tail may be the last byte of the remaining sms data message in the target buffer space.
In this embodiment, the preset cursor direction is set in advance, and is used to indicate the current position condition of the short message data information in the mso cache space.
In this embodiment, the second remaining available space capacity may be a remaining available storage capacity of the target cache space after the short message data information in the target cache space is partially read.
The working principle and the beneficial effects of the technical scheme are as follows: the method comprises the steps of analyzing short message data information to accurately and effectively confirm the information type of the short message data information, so that a target cache space for caching the short message data information is conveniently determined, clustering the short message data information, classifying different data types contained in the short message data information according to the clustering result, dividing the target cache space according to the classifying result, storing different types of data in corresponding storage regions conveniently, dividing each sub-target storage space again, guaranteeing the caching effect and the caching accuracy of each type of data content and type identification, caching different types of data in the corresponding sub-target cache spaces, monitoring the reading operation of the short message data information in real time, determining the residual available space capacity of the target cache space in real time after the reading operation exists, indicating through the preset cursor direction, guaranteeing the caching effect of the short message data information, and improving the safety coefficient of the short message data information.
Specifically, in S1, acquiring short message data information through a gateway port includes:
determining the total number of data packets acquired by the short message data information based on the gateway port, carrying out integrity check on the short message data information, and calculating an integrity index of the short message data information received by the gateway port based on a check result;
Figure 535455DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 294464DEST_PATH_IMAGE002
the complete index represents that the gateway port receives the short message data information; />
Figure 768170DEST_PATH_IMAGE003
Indicating the number of data packets which fail the integrity check; />
Figure 375081DEST_PATH_IMAGE004
Representing the total number of the data packets;
mapping the short message data information corresponding to the data packet passing the integrity check to a storage space of a gateway port, and calculating a safety index for receiving the short message data information by the gateway port according to a mapping result;
Figure 326856DEST_PATH_IMAGE005
wherein the content of the first and second substances,
Figure 205951DEST_PATH_IMAGE006
the safety index indicates that the gateway port receives the short message data information; />
Figure 788242DEST_PATH_IMAGE007
Representing a data mapping uniformity factor; />
Figure 244631DEST_PATH_IMAGE008
The non-loss probability of the data when the short message data information is mapped is represented; />
Figure 124731DEST_PATH_IMAGE009
Representing the current mapping length of the short message data information in the storage space; />
Figure 982966DEST_PATH_IMAGE010
Represents a minimum length of the storage space; />
Figure 673841DEST_PATH_IMAGE011
Represents the maximum length of the storage space; />
Figure 617526DEST_PATH_IMAGE012
Represents the base 2 logarithm;
evaluating the quality of the short message data information collected by the gateway port and obtaining an evaluation score based on the complete index of the short message data information received by the gateway port and the safety index of the short message data information received by the gateway port;
comparing the evaluation score with a set threshold value, and judging whether the short message data information acquired by the gateway port is qualified;
when the evaluation score is equal to or greater than the set score, judging that the short message data information acquired by the gateway port is qualified;
otherwise, judging that the short message data information acquired by the gateway port is unqualified, and performing alarm operation.
In this embodiment, storeThe maximum length and the minimum length of the space are set in advance and are the range of the storage data amount of the storage space, and when the current mapping length of the short message data information in the storage space is smaller than the minimum length or larger than the maximum length, the maximum length and the minimum length are set in advance, the short message data information is stored in the storage space in a short message format
Figure 537203DEST_PATH_IMAGE009
1 is taken.
In this embodiment, the set threshold may be set in advance, and is used to measure a standard for determining whether the short message data information collected by the gateway port is qualified.
In this embodiment, the alarm operation may be one or more of a light, a sound, and a vibration.
The working principle and the beneficial effects of the technical scheme are as follows: the integrity index of the short message data information received by the gateway port and the safety index of the short message data information received by the gateway port are calculated, so that whether the short message data information acquired by the gateway port is qualified or not is effectively measured, and the quality of the acquired short message data information is timely mastered.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A short message service method with data security mechanism is characterized in that: the method comprises the following steps:
s1: short message data acquisition: acquiring short message data information through a gateway port, and independently storing the acquired short message data;
s2: data caching and extracting: caching the independently stored short message data information, and extracting risk data in the cached data;
s3: risk data reading calculation: reading the extracted risk data, and performing difference calculation on the abnormal data and the data in the normal range value;
s4: differential data reading: reading and analyzing the sequence data after the difference calculation is completed, and performing effective data integration on the analyzed data;
s5: and (3) effective data encryption: and encrypting the valid data, and preferentially starting the encrypted data.
2. The SMS system of claim 1, wherein the SMS system comprises: the short message data acquisition further comprises:
an information data acquisition system for:
acquiring the flow change condition of a network layer of each data receiving terminal during data transmission;
evaluating the importance of each network layer according to the flow change condition of the network layer of each data receiving terminal during data transmission;
counting the target network layer with the importance degree of each data receiving terminal being more than or equal to a preset threshold value;
and acquiring historical transmission success data of each data receiving terminal.
3. A short message service system with data security mechanism as claimed in claim 2, characterized in that: collecting completed risk data reading, further comprising:
an abnormal data analysis unit for:
according to the history transmission success data of each data receiving terminal acquired from the information data acquisition system;
analyzing the historical transmission success data to determine the integrity and the safety of the historical transmission success data, and evaluating a threat risk index and a vulnerability risk index of the data receiving terminal according to the integrity and the safety;
calculating the security index of each data receiving terminal by using a preset risk evaluation system according to the working strength of the target network layer of each data receiving terminal and the threat risk index and the vulnerability risk index of the data receiving terminal;
screening out a safety data receiving terminal and a risk data receiving terminal according to the safety index of each data receiving terminal;
receiving first data sent by the safety data receiving terminal;
acquiring configuration information and network information of the risk data receiving terminal;
establishing a shared data transmission channel of a risk data receiving terminal according to the network information;
acquiring a plurality of sink nodes in the shared data transmission channel, and determining the single maximum sink data volume of each sink node;
determining target second data with the largest data quantity in second data of the risk data receiving terminal;
calculating the target data transmission efficiency of the shared data transmission channel according to the target second data and the maximum aggregate data amount of each aggregation node in the shared data transmission channel;
and setting the data transmission efficiency of the shared data transmission channel as the target data transmission efficiency, and after the setting is finished, receiving second data sent by the risk data receiving terminal by using the shared data transmission channel.
4. The SMS system of claim 1, wherein the SMS system comprises: the calculation of the difference between the abnormal data and the data in the normal range value further comprises the following steps:
a difference calculation module to:
after acquiring the risk data, converting the risk data into specific numerical values, and then performing difference calculation on the data of the risk data and the data numerical values in a normal range;
the judging module is used for acquiring the numerical sequence of the data difference calculation, periodically detecting the numerical sequence and judging whether the numerical sequence is a periodic sequence;
the analysis module is used for segmenting the numerical sequence according to periods to obtain a plurality of groups of same first subsequences after the numerical sequence is determined to be a periodic sequence, judging whether all numerical values in the first subsequences are larger than preset numerical values, if so, extracting first abnormal numerical values larger than the preset numerical values in the first subsequences, determining adjacent time intervals among the first abnormal numerical values, judging whether the time intervals are within a preset time interval range, if so, taking the first abnormal numerical values and the time intervals as first abnormal data, and otherwise, determining that the first abnormal numerical values are invalid;
and the data integration module is used for periodically marking the first abnormal data to obtain first effective abnormal data, carrying out non-periodic marking on the second abnormal data to obtain second effective abnormal data, independently storing the first effective abnormal data and the second effective abnormal data as final effective abnormal data, and not sending the data to the next reading module.
5. The SMS system with data security mechanism as claimed in claim 4, wherein: the analysis module further comprises:
the analysis module is further configured to, after the numerical sequence is determined to be a non-periodic sequence, perform clustering operation on the numerical sequence by using a one-dimensional clustering method to obtain a plurality of segmentation points, divide the numerical sequence by using the plurality of segmentation points to obtain a plurality of groups of different second subsequences, obtain a third subsequence having a value greater than a preset value from the second subsequence, determine an abnormal time interval of the third subsequence based on a position of the third subsequence in the numerical sequence, obtain a fourth subsequence having an abnormal time interval of an adjacent third subsequence in the preset time interval range, and use the fourth subsequence and the abnormal time interval as second abnormal data.
6. The SMS system of claim 4, wherein the SMS system further comprises: the valid data reading and encryption further comprises:
a valid data reading module to:
performing data-based troubleshooting based on the first effective abnormal data and the second effective abnormal data in the data integration module as final effective abnormal data, and taking other data after troubleshooting as effective data;
a data decoding encryption module for:
decoding the effective data, dividing the decoded data into sections to be encrypted with preset lengths by taking the decoded data as original data, and establishing an encryption sequence based on the sections to be encrypted;
according to the number of the segments to be encrypted, establishing a first encryption matrix by taking the encryption sequence as a first column of a matrix;
adjusting the first position of each section to be encrypted on the row corresponding to the first encryption matrix based on a preset interference factor, and performing first encryption on the section to be encrypted after the adjustment is finished;
acquiring a corresponding interference password in a preset password set based on the interference times, and throwing a random number by using encrypted dice;
marking a second location in each row of the first encryption matrix that is separated from the first location by a random number;
sequentially inputting the interference passwords to the second position for second encryption, and establishing a second encryption matrix;
when the first number of blank positions in the second encryption matrix is larger than the second number of non-blank positions, determining that the current encryption degree is insufficient;
sequentially removing the outermost peripheral positions of the second matrix to generate a plurality of sub-encryption matrixes;
respectively calculating the encryption rank of each sub-encryption matrix, and generating a rank password based on all the encryption ranks;
inputting the rank password into the second encryption matrix for third encryption to obtain a third encryption matrix;
randomly generating a homotype matrix based on the specification of the third encryption matrix;
marking the residual blank positions on the third encryption matrix, and overlapping the marked third encryption matrix and the homotype matrix to obtain the overlapping number generated by the marked positions;
inputting the superposition number to the residual blank position to obtain a full encryption matrix;
and extracting data corresponding to each position in the second full encryption matrix to obtain encrypted data.
7. The SMS system of claim 1, wherein caching data comprises:
the data calling module is used for acquiring the independently stored short message data information, extracting a key information fragment of the short message data information and determining the information type of the short message data information based on the target semantics of the key information fragment;
the buffer space determining module is used for determining a target buffer space corresponding to the short message data information based on the information type, extracting capacity information of the target buffer space, and determining a first remaining available space capacity of the target buffer space based on the capacity information;
the cache space determining module is used for acquiring the data length of the short message data information, clustering the short message data information when the first remaining available space capacity is larger than the data length to obtain a sub-data type set corresponding to the short message data information, and setting a type identifier for each sub-data type;
the cache space dividing module is used for performing first block division on a target cache space based on the type identifier, adding block identifiers to sub-target cache spaces after division, and performing second division on each sub-target cache space to obtain a first storage item and a second storage item corresponding to each sub-target cache space, wherein the block identifiers correspond to the type identifiers;
the data caching module is used for respectively extracting target content of the short message data information corresponding to each subdata type based on the type identifier and respectively caching the type identifier and the target content to a first storage item and a second storage item;
the data updating module is used for monitoring short message data information reading operation in real time, determining the real-time reading amount of the short message data information based on the reading process when the short message data information is detected to be read, and determining the data tail part of the residual short message data information in the target cache space based on the reading amount;
and the space updating module is used for moving the preset cursor direction to the tail part of the short message data information in the target cache space, determining the second remaining available space capacity of the target cache space based on the moving result, and indicating the second remaining available space capacity of the target cache space based on the preset cursor direction.
8. The short message service method with data security mechanism as claimed in claim 1, wherein in S1, collecting the short message data information through the gateway port includes:
determining the total number of data packets acquired by the short message data information based on the gateway port, carrying out integrity check on the short message data information, and calculating an integrity index of the short message data information received by the gateway port based on a check result;
Figure 596059DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 582470DEST_PATH_IMAGE002
indicating the gateway port receives the short message data messageA completeness index of information; />
Figure 623238DEST_PATH_IMAGE003
Indicating the number of data packets which do not pass the integrity check; />
Figure 720507DEST_PATH_IMAGE004
Representing the total number of the data packets;
mapping the short message data information corresponding to the data packet passing the integrity check to a storage space of a gateway port, and calculating a safety index for receiving the short message data information by the gateway port according to a mapping result;
Figure 913853DEST_PATH_IMAGE005
wherein the content of the first and second substances,
Figure 71165DEST_PATH_IMAGE006
the safety index represents the safety index of the gateway port for receiving the short message data information; />
Figure 661547DEST_PATH_IMAGE007
Representing a data mapping uniformity factor; />
Figure 421561DEST_PATH_IMAGE008
The data loss probability is represented when the short message data information is mapped; />
Figure 108894DEST_PATH_IMAGE009
Representing the current mapping length of the short message data information in the storage space; />
Figure 312474DEST_PATH_IMAGE010
Represents a minimum length of the storage space; />
Figure 452468DEST_PATH_IMAGE011
Presentation memoryThe maximum length of the storage space;
Figure 517638DEST_PATH_IMAGE012
represents the logarithm to base 2;
evaluating the quality of the short message data information collected by the gateway port and obtaining an evaluation score based on the complete index of the short message data information received by the gateway port and the safety index of the short message data information received by the gateway port;
comparing the evaluation score with a set threshold value, and judging whether the short message data information acquired by the gateway port is qualified;
when the evaluation score is equal to or greater than the set score, judging that the short message data information acquired by the gateway port is qualified;
otherwise, judging that the short message data information acquired by the gateway port is unqualified, and performing alarm operation.
CN202211516671.4A 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof Pending CN115942262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211516671.4A CN115942262A (en) 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211516671.4A CN115942262A (en) 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof

Publications (1)

Publication Number Publication Date
CN115942262A true CN115942262A (en) 2023-04-07

Family

ID=86551709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211516671.4A Pending CN115942262A (en) 2022-11-30 2022-11-30 Short message service system with data security mechanism and method thereof

Country Status (1)

Country Link
CN (1) CN115942262A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116189896A (en) * 2023-04-24 2023-05-30 北京快舒尔医疗技术有限公司 Cloud-based diabetes health data early warning method and system
CN116566677A (en) * 2023-05-15 2023-08-08 深圳市智联物联科技有限公司 Short message receiving and transmitting system of serial server
CN116996220A (en) * 2023-09-27 2023-11-03 无锡市锡容电力电器有限公司 Safe storage method and system for big data of power grid
CN117688620A (en) * 2024-01-29 2024-03-12 江苏悉宁科技有限公司 Certificate verification optimization method and system based on big data information security

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116189896A (en) * 2023-04-24 2023-05-30 北京快舒尔医疗技术有限公司 Cloud-based diabetes health data early warning method and system
CN116189896B (en) * 2023-04-24 2023-08-08 北京快舒尔医疗技术有限公司 Cloud-based diabetes health data early warning method and system
CN116566677A (en) * 2023-05-15 2023-08-08 深圳市智联物联科技有限公司 Short message receiving and transmitting system of serial server
CN116566677B (en) * 2023-05-15 2024-02-13 深圳市智联物联科技有限公司 Short message receiving and transmitting system of serial server
CN116996220A (en) * 2023-09-27 2023-11-03 无锡市锡容电力电器有限公司 Safe storage method and system for big data of power grid
CN116996220B (en) * 2023-09-27 2023-12-12 无锡市锡容电力电器有限公司 Safe storage method and system for big data of power grid
CN117688620A (en) * 2024-01-29 2024-03-12 江苏悉宁科技有限公司 Certificate verification optimization method and system based on big data information security
CN117688620B (en) * 2024-01-29 2024-04-23 江苏悉宁科技有限公司 Certificate verification optimization method and system based on big data information security

Similar Documents

Publication Publication Date Title
CN115942262A (en) Short message service system with data security mechanism and method thereof
CN112398779B (en) Network traffic data analysis method and system
CN112003870B (en) Network encryption traffic identification method and device based on deep learning
CN112235264B (en) Network traffic identification method and device based on deep migration learning
US7596810B2 (en) Apparatus and method of detecting network attack situation
Araújo et al. Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach
CN111866024A (en) Network encryption traffic identification method and device
WO2022078353A1 (en) Vehicle driving state determination method and apparatus, and computer device and storage medium
JP2006148686A (en) Communication monitoring system
US20050135266A1 (en) Method of detecting distributed denial of service based on grey theory
CN114143037A (en) Malicious encrypted channel detection method based on process behavior analysis
CN105407096A (en) Message data detection method based on stream management
CN114091602A (en) SSR flow identification system and method based on machine learning
Almarshdi et al. Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification.
CN116150191A (en) Data operation acceleration method and system for cloud data architecture
CN116611104A (en) Database security management system and method oriented to cross-institution medical service collaboration
CN112733188B (en) Sensitive file management method
Hong et al. Data Auditing for Intelligent Network Security Monitoring
CN114595761A (en) Network data intelligent distribution service system
CN113177203A (en) Method and device for identifying encrypted malicious message flow
CN112733170A (en) Active trust evaluation method based on evidence sequence extraction
CN113630425B (en) Financial data safe transmission method for multiple power bodies
CN117692257B (en) High-speed encryption method and device for service data of electric power Internet of things
CN117633636B (en) Cloud interconnected special detection data processing system and processing equipment thereof
CN116112289B (en) Malicious encryption traffic detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination