CN116506201A - Network communication safety protection system based on big data - Google Patents

Network communication safety protection system based on big data Download PDF

Info

Publication number
CN116506201A
CN116506201A CN202310531337.4A CN202310531337A CN116506201A CN 116506201 A CN116506201 A CN 116506201A CN 202310531337 A CN202310531337 A CN 202310531337A CN 116506201 A CN116506201 A CN 116506201A
Authority
CN
China
Prior art keywords
data
capacity
unit
segments
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310531337.4A
Other languages
Chinese (zh)
Other versions
CN116506201B (en
Inventor
刘德平
张胡雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Safety Technology Co Ltd
Original Assignee
Guangzhou Wechat Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wechat Communication Technology Co ltd filed Critical Guangzhou Wechat Communication Technology Co ltd
Priority to CN202310531337.4A priority Critical patent/CN116506201B/en
Publication of CN116506201A publication Critical patent/CN116506201A/en
Application granted granted Critical
Publication of CN116506201B publication Critical patent/CN116506201B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a network communication safety protection system based on big data, which relates to the technical field of communication safety protection, and comprises an information acquisition unit, a data segmentation unit, a data encryption unit, an information storage unit, a data restoration unit and an information output unit.

Description

Network communication safety protection system based on big data
Technical Field
The invention relates to the technical field of communication safety protection, in particular to a network communication safety protection system based on big data.
Background
The network communication security is an important guarantee of the efficient operation of the information system, and especially in some internal networks with higher protection level requirements, the construction of a network communication white list is an important means for ensuring the network security.
The method according to the patent application CN202211076111.1 is shown to comprise: when the network topology changes, clearing a blank list, and intercepting unknown network communication behaviors through a Netfilter framework of a Linux kernel; notifying the system user of the intercepted unknown network communication behavior in real time, and waiting for receiving feedback information of the system user; when the feedback information is passing, extracting five-tuple information of the passing unknown network communication behavior, and configuring a network communication white list strategy according to the five-tuple information; and carrying out network security protection according to the network communication white list policy. By adopting the method, the network communication security protection strategy meeting the minimum authority principle aiming at the host can be quickly constructed under the condition of not making any assumption on the network topology.
Network communication safety is an important guarantee of efficient operation of an information system, and in the process of communication of the existing partial information, on one hand, due to large capacity of the existing partial information, the difference of transmission rates exists in the same transmission route, further information delay arrival can be caused, and on the other hand, due to the difference of the transmission rates, information is stolen when the communication information is transmitted, and therefore the safety of the whole information transmission can be influenced.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a network communication safety protection system based on big data, which solves the problems that the capacity is large, the transmission speed is low, and the information with large capacity is stolen in the transmission process.
In order to achieve the above purpose, the invention is realized by the following technical scheme: a big data based network communication security protection system comprising:
the information acquisition unit is used for acquiring the capacity of communication data in the network communication process, recording the capacity as RLi, and transmitting the acquired capacity RLi to the data segmentation unit;
the data segmentation unit is used for carrying out uniform segmentation on the obtained capacity size RLi in five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and A=1, … and 5, calculating the sum of the capacities of the first four capacity data segments, calculating the capacity size of the fifth capacity data segment as 5RLi, integrating the five capacity data segments to generate data to be encrypted, and transmitting the data to the data encryption unit;
the data encryption unit is used for encrypting the acquired data to be encrypted, and encrypting the first four data segments and the fifth data segment in the data to be encrypted respectively;
identifying the capacity values of the four data segments, acquiring corresponding identification points, judging according to the identification points to obtain different judgment results, combining the four data segments in different orders according to the different judgment results, generating corresponding combined information to obtain encrypted data, and generating corresponding decryption information to be transmitted to an information storage unit;
encrypting the fifth data, identifying the capacity value of the fifth data segment, obtaining a corresponding identification result, encrypting the identification result to obtain encrypted data, generating corresponding decryption information, transmitting the decryption information to an information storage unit, integrating the encrypted data and transmitting the encrypted data to a data restoration unit;
an information storage unit for transmitting the decryption information to the data restoring unit;
and the data recovery unit is used for recovering the encrypted data to obtain communication data and transmitting the communication data to the information output unit.
As a further aspect of the invention: the specific division mode of the data division unit for the capacity size RLi is as follows:
s1: evenly dividing the capacity size RLi into five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and representing A as different data segments, wherein A=1, … and 5;
s2: and rounding the first four capacity data segments in the calculated five capacity data segments to obtain ARLi, a=1, …, 4, and then calculating the sum of the capacities of the first four capacity data segments, and substituting the sum into the formula: 5RLi = RLi-4 x ari, calculating to obtain the capacity of the fifth capacity data segment as 5RLi, and integrating the fifth capacity data segment to generate data to be encrypted, and transmitting the data to the data encryption unit.
As a further aspect of the invention: the specific encryption mode of the data encryption unit for the first four data segments is as follows:
p1: identifying the capacity size values of four data segments, when the capacity size values are identified as prime numbers, marking the four data segments as prime number segments, simultaneously obtaining the time value of an identification point by a system, judging whether the identification point is odd or even, and generating two groups of data packets according to the odd and even according to different sequences, wherein the specific generation mode is as follows:
p11: if the identification points are odd numbers, the system generates a mark with the identification points being 0, and two groups of data packets are generated in a mode of adjacent sequence combination;
p12: if the identification points are even numbers, the system generates a mark number of which the identification points are expressed as 1, and two groups of data packets are generated in a head-tail combination mode;
p2: when the identified capacity size value of the data segment is not prime, judging whether the capacity size value can carry out integer division on 5, and if the capacity size value can not carry out integer division on 5, carrying out no processing on the system;
if the capacity size value can divide 5 completely, dividing 5 equal parts to generate five groups of data streams, calculating the capacity size value of a single part, and then carrying out label processing on 5 parts of data streams formed after dividing;
p3: then, 5 is taken as the number of polygon nodes, the number of digits of the single capacity size value is taken as the side length of the polygon, and meanwhile, the node values of the polygon are calculated and sequenced in the following specific calculation and sequencing modes:
p31: acquiring the numerical value of a second value in the continuous 5 times of T time, marking the numerical value as SZj, wherein j=1, … and 5, and assigning SZj as B while sequencing from large to small;
p32: b is used as a node value of the polygon, filling is carried out according to a clockwise sequence, and the rest three groups of data segments are analyzed in the same way;
p4: and generating corresponding decryption information by the encryption mode of the first four data segments, and transmitting the decryption information to the information storage unit.
As a further aspect of the invention: the encryption mode for the five data segments is as follows:
w1: the capacity size value of the fifth data segment is identified in the following specific identification mode:
w11: when the capacity size value is identified as odd, the system does not perform any processing and transmits a fifth data segment;
w12: when the capacity value is identified as even, equally dividing the capacity value to generate two groups of data streams, carrying out label processing on the equally divided two groups of data streams, marking the two groups of data streams as 1 and 2, and reversely integrating the two groups of data streams to generate new data streams;
w2: and generating corresponding decryption information by using the encryption modes of the fifth data segment under different conditions, and transmitting the encryption information to the information storage unit.
Advantageous effects
The invention provides a network communication safety protection system based on big data. Compared with the prior art, the method has the following beneficial effects:
the invention divides the large-capacity data into small-capacity data and integrates and transmits the small-capacity data, thereby reducing the capacity in the whole information transmission process, improving the speed of the information in the transmission process, further carrying out encryption processing in different modes on the divided information data, ensuring the safety of the information in the transmission process, reducing the risk of stealing the information in the transmission process and improving the safety of the whole network communication data.
Drawings
FIG. 1 is a block diagram of a system of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the present application provides a network communication security protection system based on big data, including:
the information acquisition unit is used for acquiring the capacity of communication data in the network communication process, recording the capacity as RLi, wherein i represents different kinds of communication data, and then transmitting the acquired capacity RLi to the data segmentation unit;
the data dividing unit is used for dividing the acquired capacity size RLi, and the specific dividing mode is as follows:
s1: evenly dividing the capacity size RLi into five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and representing A as different data segments, wherein A=1, … and 5;
s2: and rounding the first four capacity data segments in the calculated five capacity data segments to obtain ARLi, a=1, …, 4, and then calculating the sum of the capacities of the first four capacity data segments, and substituting the sum into the formula: 5RLi = RLi-4 x ari, calculating to obtain the capacity of the fifth capacity data segment as 5RLi, and integrating the fifth capacity data segment to generate data to be encrypted, and transmitting the data to the data encryption unit.
And (3) carrying out analysis by combining with an actual application scene: firstly, acquiring a section of communication data, acquiring a corresponding capacity size of rli=17m, transmitting the capacity size to a data segmentation unit for segmentation, firstly, equally dividing rli=17 into five equal parts, wherein the capacity size of each equal part is arli=3.4, then, rounding each equal part after the equal division to obtain the capacity size of each equal part of the first four groups as arli=3, and A=1, … and 4, then, calculating the capacity size of a fifth capacity data segment, calculating the sum of the capacities of the first four identical data segments to obtain rli=12, and then, subtracting the sum of the first four capacity segments from the total capacity size to obtain the capacity size of 5, wherein the capacity size of the fifth capacity data segment is 5.
The data encryption unit is used for encrypting the acquired data to be encrypted, and the specific encryption mode is as follows:
the encryption mode for the first four data segments is as follows:
p1: identifying the capacity size values of the four data segments in a manner of judging whether the capacity size values are prime numbers or not, and when the capacity size values are identified as prime numbers, marking the four data segments as prime number segments, and simultaneously obtaining the time values of the identification points by the system, wherein the time values of the identification points are defined as follows: any time point for identifying four data segments is recorded, the second value of the point is recorded, the identification point is judged to be odd or even, two groups of data packets are generated according to different orders of the odd and even, and the specific generation mode is as follows:
p11: if the identification points are odd numbers, the system generates a mark with the identification points being 0, and two groups of data packets are generated in a mode of adjacent sequence combination;
p12: if the identification points are even numbers, the system generates a mark number of which the identification points are expressed as 1, and two groups of data packets are generated in a head-tail combination mode;
and (3) carrying out analysis by combining with an actual application scene: when the system carries out prime number identification on four data segments, the time value corresponding to the identification point is recorded, the time value of the identification point is 21, then the system judges that 21 is odd, meanwhile, a mark of 0 is generated for the identification point, and two groups of data packets are generated according to 1, 2, 3 and 4 of four groups of data segments, and when the time value of the identification point is 54, the system judges that 54 is even, meanwhile, a mark of 1 is generated for the identification point, and two groups of data packets are generated according to a combination mode of 1, 4, 2 and 3 of four groups of data segments 1, 2, 3.
P2: when the identified capacity size value of the data segment is not prime, analyzing any data segment, judging whether the capacity size value can divide 5, and if the capacity size value can not divide 5, the system does not perform any processing;
if the capacity size value can divide 5 completely, dividing 5 equal parts to generate five groups of data streams, calculating the capacity size value of a single part, and then carrying out marking processing on 5 parts of data streams formed after dividing, wherein the marking processing mode is that 1, 2, 3, 4 and 5 are marked in sequence;
p3: then constructing a polygon with 5 as the number of polygon nodes and a number of digits of a single capacity size value as the side length of the polygon, wherein the number of digits of the capacity size value represents: if the single-part capacity size is 36, the number is 2, the side length of the polygon is 2, the pentagon with the side length of 2 is constructed, and meanwhile, the node values of the polygon are calculated and sequenced in the following specific calculation and sequencing modes:
p31: the magnitude of the second value obtained for 5 consecutive times T is denoted SZj and j=1, …, 5, where T is denoted for 5 seconds and the magnitude of the second value is denoted as the sum of the values of the second values within 5 seconds, the first time the second value within 5 seconds is: 2. 3, 4, 5, 6, so that the sum of the values of seconds in 5 seconds is 2+3+4+5+6=20, and so on, calculating the sum of the values of seconds for the remaining four times, and ordering SZj from big to small while assigning B, where B is represented as the magnitude of the rank and 1 is represented as SZj the largest value, and b=1, …, 5;
p32: b is used as a node value of the polygon, filling is carried out according to a clockwise sequence, and the rest three groups of data segments are analyzed in the same way;
p4: generating corresponding decryption information by using the encryption mode of the first four data segments, and transmitting the decryption information to an information storage unit;
the encryption mode of the fifth data segment is as follows:
w1: the capacity size value of the fifth data segment is identified in the following specific identification mode:
w11: when the capacity size value is identified as odd, the system does not perform any processing and transmits a fifth data segment;
w12: when the capacity magnitude value is identified as even, equally dividing the capacity magnitude value to generate two groups of data streams, carrying out label processing on the equally divided two groups of data streams, marking as 1 and 2, and reversely integrating the two groups of data streams to generate a new data stream, wherein the reversely integrated expression is as follows: processing the data stream with the number of 1 and the number of 2 by the same method, reversing the data stream with the number of 1 from head to tail, reversing the data stream with the number of 2 from head to tail, and integrating to form new data stream information;
w2: generating corresponding decryption information by using encryption modes under different conditions of the fifth data segment, and transmitting the encryption information to an information storage unit;
the data encryption unit encrypts data to be encrypted to obtain encrypted data, and transmits the encrypted data to the data recovery unit;
and the information storage unit is used for storing the acquired encrypted information and transmitting the encrypted information to the data recovery unit.
And the data recovery unit is used for acquiring the transmitted decryption information, decrypting the acquired encrypted data according to the decryption information, recovering the decrypted data to generate communication data, and transmitting the communication data to the information output unit.
And all that is not described in detail in this specification is well known to those skilled in the art.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.

Claims (5)

1. A big data based network communication security protection system, comprising:
the information acquisition unit is used for acquiring the capacity of communication data in the network communication process, recording the capacity as RLi, and transmitting the acquired capacity RLi to the data segmentation unit;
the data segmentation unit is used for carrying out uniform segmentation on the obtained capacity size RLi in five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and A=1, … and 5, calculating the sum of the capacities of the first four capacity data segments, calculating the capacity size of the fifth capacity data segment as 5RLi, integrating the five capacity data segments to generate data to be encrypted, and transmitting the data to the data encryption unit;
the data encryption unit is used for encrypting the acquired data to be encrypted, and encrypting the first four data segments and the fifth data segment in the data to be encrypted respectively;
identifying the capacity values of the four data segments, acquiring corresponding identification points, judging according to the identification points to obtain different judgment results, combining the four data segments in different orders according to the different judgment results, generating corresponding combined information to obtain encrypted data, and generating corresponding decryption information to be transmitted to an information storage unit;
encrypting the fifth data, identifying the capacity value of the fifth data segment, obtaining a corresponding identification result, encrypting the identification result to obtain encrypted data, generating corresponding decryption information, transmitting the decryption information to an information storage unit, integrating the encrypted data and transmitting the encrypted data to a data restoration unit;
an information storage unit for transmitting the decryption information to the data restoring unit;
and the data recovery unit is used for recovering the encrypted data to obtain communication data and transmitting the communication data to the information output unit.
2. The network communication security protection system based on big data according to claim 1, wherein the specific splitting manner of the data splitting unit on the capacity size RLi is as follows:
s1: evenly dividing the capacity size RLi into five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and representing A as different data segments, wherein A=1, … and 5;
s2: and rounding the first four capacity data segments in the calculated five capacity data segments to obtain ARLi, a=1, …, 4, and then calculating the sum of the capacities of the first four capacity data segments, and substituting the sum into the formula: 5RLi = RLi-4 x ari, calculating to obtain the capacity of the fifth capacity data segment as 5RLi, and integrating the fifth capacity data segment to generate data to be encrypted, and transmitting the data to the data encryption unit.
3. The network communication security protection system based on big data according to claim 1, wherein the specific encryption manner of the data encryption unit on the first four data segments is:
p1: identifying the capacity size values of four data segments, when the capacity size values are identified as prime numbers, marking the four data segments as prime number segments, simultaneously obtaining the time value of an identification point by a system, judging whether the identification point is odd or even, and generating two groups of data packets according to the odd and even according to different sequences, wherein the specific generation mode is as follows:
p11: if the identification points are odd numbers, the system generates a mark with the identification points being 0, and two groups of data packets are generated in a mode of adjacent sequence combination;
p12: if the identification points are even numbers, the system generates a mark number of which the identification points are expressed as 1, and two groups of data packets are generated in a head-tail combination mode;
p2: when the identified data segment capacity size value is not prime, judging whether the capacity size value can divide 5, if the capacity size value can not divide 5, the system does not perform any processing, and generating
If the capacity size value can divide 5 completely, dividing 5 equal parts to generate five groups of data streams, calculating the capacity size value of a single part, and then carrying out label processing on 5 parts of data streams formed after dividing;
p3: then, 5 is taken as the number of polygon nodes, the number of digits of the single capacity size value is taken as the side length of the polygon, and meanwhile, the node values of the polygon are calculated and sequenced in the following specific calculation and sequencing modes:
p31: acquiring the numerical value of a second value in the continuous 5 times of T time, marking the numerical value as SZj, wherein j=1, … and 5, and assigning SZj as B while sequencing from large to small;
p32: b is used as a node value of the polygon, filling is carried out according to a clockwise sequence, and the rest three groups of data segments are analyzed in the same way;
p4: and generating corresponding decryption information by the encryption mode of the first four data segments, and transmitting the decryption information to the information storage unit.
4. The network communication security protection system based on big data according to claim 1, wherein the encryption mode for five data segments is:
w1: the capacity size value of the fifth data segment is identified in the following specific identification mode:
w11: when the capacity size value is identified as odd, the system does not perform any processing and transmits a fifth data segment;
w12: when the capacity value is identified as even, equally dividing the capacity value to generate two groups of data streams, carrying out label processing on the equally divided two groups of data streams, marking the two groups of data streams as 1 and 2, and reversely integrating the two groups of data streams to generate new data streams;
w2: and generating corresponding decryption information by using the encryption modes of the fifth data segment under different conditions, and transmitting the encryption information to the information storage unit.
5. The network communication security protection system based on big data according to claim 1, wherein the information output unit is configured to output the communication data.
CN202310531337.4A 2023-05-12 2023-05-12 Network communication safety protection system based on big data Active CN116506201B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310531337.4A CN116506201B (en) 2023-05-12 2023-05-12 Network communication safety protection system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310531337.4A CN116506201B (en) 2023-05-12 2023-05-12 Network communication safety protection system based on big data

Publications (2)

Publication Number Publication Date
CN116506201A true CN116506201A (en) 2023-07-28
CN116506201B CN116506201B (en) 2024-03-01

Family

ID=87320038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310531337.4A Active CN116506201B (en) 2023-05-12 2023-05-12 Network communication safety protection system based on big data

Country Status (1)

Country Link
CN (1) CN116506201B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116800547A (en) * 2023-08-25 2023-09-22 汉兴同衡科技集团有限公司 Big data-based information processing method, device, equipment and storage medium
CN117094022A (en) * 2023-10-20 2023-11-21 山东友恺通信科技有限公司 Encryption system based on computer software development
CN117395088A (en) * 2023-12-13 2024-01-12 北京华电电子商务科技有限公司 Multi-stage cooperative network safety protection system based on electronic commerce platform
CN117499872A (en) * 2023-10-25 2024-02-02 北京金信瑞通科技股份有限公司 Method and system for realizing short message sending platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447698A (en) * 2011-11-29 2012-05-09 数字金融服务(杭州)有限公司 Encrypting and transmitting method for network communication information
US20170142077A1 (en) * 2014-07-29 2017-05-18 Huawei Technologies Co., Ltd. Data encryption and transmission method and apparatus
CN113286297A (en) * 2021-07-22 2021-08-20 深圳市同富信息技术有限公司 Wireless data encryption transmission method and device, computer equipment and storage medium
CN113761554A (en) * 2021-07-05 2021-12-07 安徽听见科技有限公司 Data encryption method, data decryption method, and related devices, equipment and media
CN114124416A (en) * 2020-08-24 2022-03-01 中国航天系统工程有限公司 System and method for quickly exchanging data between networks
CN114915458A (en) * 2022-04-27 2022-08-16 安徽超清科技股份有限公司 Comprehensive monitoring protector for urban rail transit
CN115766242A (en) * 2022-11-21 2023-03-07 华能山东发电有限公司烟台发电厂 Environment-friendly management system based on safety isolation communication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102447698A (en) * 2011-11-29 2012-05-09 数字金融服务(杭州)有限公司 Encrypting and transmitting method for network communication information
US20170142077A1 (en) * 2014-07-29 2017-05-18 Huawei Technologies Co., Ltd. Data encryption and transmission method and apparatus
CN114124416A (en) * 2020-08-24 2022-03-01 中国航天系统工程有限公司 System and method for quickly exchanging data between networks
CN113761554A (en) * 2021-07-05 2021-12-07 安徽听见科技有限公司 Data encryption method, data decryption method, and related devices, equipment and media
CN113286297A (en) * 2021-07-22 2021-08-20 深圳市同富信息技术有限公司 Wireless data encryption transmission method and device, computer equipment and storage medium
CN114915458A (en) * 2022-04-27 2022-08-16 安徽超清科技股份有限公司 Comprehensive monitoring protector for urban rail transit
CN115766242A (en) * 2022-11-21 2023-03-07 华能山东发电有限公司烟台发电厂 Environment-friendly management system based on safety isolation communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张小红;涂平生;: "存储分割编码技术在移动云安全中的应用", 计算机应用, vol. 36, no. 04, pages 931 - 936 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116800547A (en) * 2023-08-25 2023-09-22 汉兴同衡科技集团有限公司 Big data-based information processing method, device, equipment and storage medium
CN116800547B (en) * 2023-08-25 2023-11-21 汉兴同衡科技集团有限公司 Big data-based information processing method, device, equipment and storage medium
CN117094022A (en) * 2023-10-20 2023-11-21 山东友恺通信科技有限公司 Encryption system based on computer software development
CN117094022B (en) * 2023-10-20 2024-01-09 山东友恺通信科技有限公司 Encryption system based on computer software development
CN117499872A (en) * 2023-10-25 2024-02-02 北京金信瑞通科技股份有限公司 Method and system for realizing short message sending platform
CN117499872B (en) * 2023-10-25 2024-04-30 北京金信瑞通科技股份有限公司 Method and system for realizing short message sending platform
CN117395088A (en) * 2023-12-13 2024-01-12 北京华电电子商务科技有限公司 Multi-stage cooperative network safety protection system based on electronic commerce platform
CN117395088B (en) * 2023-12-13 2024-02-23 北京华电电子商务科技有限公司 Multi-stage cooperative network safety protection system based on electronic commerce platform

Also Published As

Publication number Publication date
CN116506201B (en) 2024-03-01

Similar Documents

Publication Publication Date Title
CN116506201B (en) Network communication safety protection system based on big data
CN107370546A (en) Eavesdrop detection method, data transmission method for uplink, apparatus and system
CN106209739A (en) Cloud storage method and system
CN110224808B (en) Bank data sharing method and device based on block chain, computer equipment and storage medium
CN106817358B (en) Encryption and decryption method and device for user resources
CN112395643A (en) Data privacy protection method and system of neural network
CN111062045A (en) Information encryption and decryption method and device, electronic equipment and storage medium
CN116527382B (en) Cloud computing-based data security transmission system
CN112784300A (en) Multi-stage log encryption processing system and method
Yang et al. An effective and scalable VM migration strategy to mitigate cross-VM side-channel attacks in cloud
CN112818369A (en) Combined modeling method and device
CN100435509C (en) Encipher treating method and encipher treating device
EP3213457A1 (en) Key splitting
CN112380404B (en) Data filtering method, device and system
CN113992393B (en) Method, apparatus, system, and medium for model update for vertical federal learning
CN109784918A (en) Information measure of supervision, device, equipment and storage medium based on block chain
CN113159918B (en) Bank client group mining method based on federal group penetration
CN109446827A (en) Data encryption/decryption method and system
CN107124261A (en) Method and apparatus based on homomorphic encryption algorithm defence program code security
CN114547684A (en) Method and device for protecting multi-party joint training tree model of private data
CN110874479B (en) Method, system, data terminal and processing terminal for safely processing decision tree model
CN112311536A (en) Key hierarchical management method and system
CN117409173B (en) Topography map data editing system based on three-dimensional modeling of transformer substation
CN112749780A (en) Data processing method, device and equipment
CN112948080B (en) Data processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240117

Address after: Chinatelecom tower, No. 19, Chaoyangmen North Street, Dongcheng District, Beijing 100010

Applicant after: Tianyi Safety Technology Co.,Ltd.

Address before: Room 401, 4th Floor, No. 97 Yongtai Tongtai Road, Yongping Street, Baiyun District, Guangzhou City, Guangdong Province, 510000

Applicant before: Guangzhou WeChat Communication Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant