CN116506201A - Network communication safety protection system based on big data - Google Patents
Network communication safety protection system based on big data Download PDFInfo
- Publication number
- CN116506201A CN116506201A CN202310531337.4A CN202310531337A CN116506201A CN 116506201 A CN116506201 A CN 116506201A CN 202310531337 A CN202310531337 A CN 202310531337A CN 116506201 A CN116506201 A CN 116506201A
- Authority
- CN
- China
- Prior art keywords
- data
- capacity
- unit
- segments
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000006854 communication Effects 0.000 title claims abstract description 42
- 238000004891 communication Methods 0.000 title claims abstract description 39
- 230000011218 segmentation Effects 0.000 claims abstract description 10
- 238000011084 recovery Methods 0.000 claims description 5
- 238000012163 sequencing technique Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 description 10
- 238000000034 method Methods 0.000 description 8
- 230000006399 behavior Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a network communication safety protection system based on big data, which relates to the technical field of communication safety protection, and comprises an information acquisition unit, a data segmentation unit, a data encryption unit, an information storage unit, a data restoration unit and an information output unit.
Description
Technical Field
The invention relates to the technical field of communication safety protection, in particular to a network communication safety protection system based on big data.
Background
The network communication security is an important guarantee of the efficient operation of the information system, and especially in some internal networks with higher protection level requirements, the construction of a network communication white list is an important means for ensuring the network security.
The method according to the patent application CN202211076111.1 is shown to comprise: when the network topology changes, clearing a blank list, and intercepting unknown network communication behaviors through a Netfilter framework of a Linux kernel; notifying the system user of the intercepted unknown network communication behavior in real time, and waiting for receiving feedback information of the system user; when the feedback information is passing, extracting five-tuple information of the passing unknown network communication behavior, and configuring a network communication white list strategy according to the five-tuple information; and carrying out network security protection according to the network communication white list policy. By adopting the method, the network communication security protection strategy meeting the minimum authority principle aiming at the host can be quickly constructed under the condition of not making any assumption on the network topology.
Network communication safety is an important guarantee of efficient operation of an information system, and in the process of communication of the existing partial information, on one hand, due to large capacity of the existing partial information, the difference of transmission rates exists in the same transmission route, further information delay arrival can be caused, and on the other hand, due to the difference of the transmission rates, information is stolen when the communication information is transmitted, and therefore the safety of the whole information transmission can be influenced.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a network communication safety protection system based on big data, which solves the problems that the capacity is large, the transmission speed is low, and the information with large capacity is stolen in the transmission process.
In order to achieve the above purpose, the invention is realized by the following technical scheme: a big data based network communication security protection system comprising:
the information acquisition unit is used for acquiring the capacity of communication data in the network communication process, recording the capacity as RLi, and transmitting the acquired capacity RLi to the data segmentation unit;
the data segmentation unit is used for carrying out uniform segmentation on the obtained capacity size RLi in five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and A=1, … and 5, calculating the sum of the capacities of the first four capacity data segments, calculating the capacity size of the fifth capacity data segment as 5RLi, integrating the five capacity data segments to generate data to be encrypted, and transmitting the data to the data encryption unit;
the data encryption unit is used for encrypting the acquired data to be encrypted, and encrypting the first four data segments and the fifth data segment in the data to be encrypted respectively;
identifying the capacity values of the four data segments, acquiring corresponding identification points, judging according to the identification points to obtain different judgment results, combining the four data segments in different orders according to the different judgment results, generating corresponding combined information to obtain encrypted data, and generating corresponding decryption information to be transmitted to an information storage unit;
encrypting the fifth data, identifying the capacity value of the fifth data segment, obtaining a corresponding identification result, encrypting the identification result to obtain encrypted data, generating corresponding decryption information, transmitting the decryption information to an information storage unit, integrating the encrypted data and transmitting the encrypted data to a data restoration unit;
an information storage unit for transmitting the decryption information to the data restoring unit;
and the data recovery unit is used for recovering the encrypted data to obtain communication data and transmitting the communication data to the information output unit.
As a further aspect of the invention: the specific division mode of the data division unit for the capacity size RLi is as follows:
s1: evenly dividing the capacity size RLi into five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and representing A as different data segments, wherein A=1, … and 5;
s2: and rounding the first four capacity data segments in the calculated five capacity data segments to obtain ARLi, a=1, …, 4, and then calculating the sum of the capacities of the first four capacity data segments, and substituting the sum into the formula: 5RLi = RLi-4 x ari, calculating to obtain the capacity of the fifth capacity data segment as 5RLi, and integrating the fifth capacity data segment to generate data to be encrypted, and transmitting the data to the data encryption unit.
As a further aspect of the invention: the specific encryption mode of the data encryption unit for the first four data segments is as follows:
p1: identifying the capacity size values of four data segments, when the capacity size values are identified as prime numbers, marking the four data segments as prime number segments, simultaneously obtaining the time value of an identification point by a system, judging whether the identification point is odd or even, and generating two groups of data packets according to the odd and even according to different sequences, wherein the specific generation mode is as follows:
p11: if the identification points are odd numbers, the system generates a mark with the identification points being 0, and two groups of data packets are generated in a mode of adjacent sequence combination;
p12: if the identification points are even numbers, the system generates a mark number of which the identification points are expressed as 1, and two groups of data packets are generated in a head-tail combination mode;
p2: when the identified capacity size value of the data segment is not prime, judging whether the capacity size value can carry out integer division on 5, and if the capacity size value can not carry out integer division on 5, carrying out no processing on the system;
if the capacity size value can divide 5 completely, dividing 5 equal parts to generate five groups of data streams, calculating the capacity size value of a single part, and then carrying out label processing on 5 parts of data streams formed after dividing;
p3: then, 5 is taken as the number of polygon nodes, the number of digits of the single capacity size value is taken as the side length of the polygon, and meanwhile, the node values of the polygon are calculated and sequenced in the following specific calculation and sequencing modes:
p31: acquiring the numerical value of a second value in the continuous 5 times of T time, marking the numerical value as SZj, wherein j=1, … and 5, and assigning SZj as B while sequencing from large to small;
p32: b is used as a node value of the polygon, filling is carried out according to a clockwise sequence, and the rest three groups of data segments are analyzed in the same way;
p4: and generating corresponding decryption information by the encryption mode of the first four data segments, and transmitting the decryption information to the information storage unit.
As a further aspect of the invention: the encryption mode for the five data segments is as follows:
w1: the capacity size value of the fifth data segment is identified in the following specific identification mode:
w11: when the capacity size value is identified as odd, the system does not perform any processing and transmits a fifth data segment;
w12: when the capacity value is identified as even, equally dividing the capacity value to generate two groups of data streams, carrying out label processing on the equally divided two groups of data streams, marking the two groups of data streams as 1 and 2, and reversely integrating the two groups of data streams to generate new data streams;
w2: and generating corresponding decryption information by using the encryption modes of the fifth data segment under different conditions, and transmitting the encryption information to the information storage unit.
Advantageous effects
The invention provides a network communication safety protection system based on big data. Compared with the prior art, the method has the following beneficial effects:
the invention divides the large-capacity data into small-capacity data and integrates and transmits the small-capacity data, thereby reducing the capacity in the whole information transmission process, improving the speed of the information in the transmission process, further carrying out encryption processing in different modes on the divided information data, ensuring the safety of the information in the transmission process, reducing the risk of stealing the information in the transmission process and improving the safety of the whole network communication data.
Drawings
FIG. 1 is a block diagram of a system of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the present application provides a network communication security protection system based on big data, including:
the information acquisition unit is used for acquiring the capacity of communication data in the network communication process, recording the capacity as RLi, wherein i represents different kinds of communication data, and then transmitting the acquired capacity RLi to the data segmentation unit;
the data dividing unit is used for dividing the acquired capacity size RLi, and the specific dividing mode is as follows:
s1: evenly dividing the capacity size RLi into five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and representing A as different data segments, wherein A=1, … and 5;
s2: and rounding the first four capacity data segments in the calculated five capacity data segments to obtain ARLi, a=1, …, 4, and then calculating the sum of the capacities of the first four capacity data segments, and substituting the sum into the formula: 5RLi = RLi-4 x ari, calculating to obtain the capacity of the fifth capacity data segment as 5RLi, and integrating the fifth capacity data segment to generate data to be encrypted, and transmitting the data to the data encryption unit.
And (3) carrying out analysis by combining with an actual application scene: firstly, acquiring a section of communication data, acquiring a corresponding capacity size of rli=17m, transmitting the capacity size to a data segmentation unit for segmentation, firstly, equally dividing rli=17 into five equal parts, wherein the capacity size of each equal part is arli=3.4, then, rounding each equal part after the equal division to obtain the capacity size of each equal part of the first four groups as arli=3, and A=1, … and 4, then, calculating the capacity size of a fifth capacity data segment, calculating the sum of the capacities of the first four identical data segments to obtain rli=12, and then, subtracting the sum of the first four capacity segments from the total capacity size to obtain the capacity size of 5, wherein the capacity size of the fifth capacity data segment is 5.
The data encryption unit is used for encrypting the acquired data to be encrypted, and the specific encryption mode is as follows:
the encryption mode for the first four data segments is as follows:
p1: identifying the capacity size values of the four data segments in a manner of judging whether the capacity size values are prime numbers or not, and when the capacity size values are identified as prime numbers, marking the four data segments as prime number segments, and simultaneously obtaining the time values of the identification points by the system, wherein the time values of the identification points are defined as follows: any time point for identifying four data segments is recorded, the second value of the point is recorded, the identification point is judged to be odd or even, two groups of data packets are generated according to different orders of the odd and even, and the specific generation mode is as follows:
p11: if the identification points are odd numbers, the system generates a mark with the identification points being 0, and two groups of data packets are generated in a mode of adjacent sequence combination;
p12: if the identification points are even numbers, the system generates a mark number of which the identification points are expressed as 1, and two groups of data packets are generated in a head-tail combination mode;
and (3) carrying out analysis by combining with an actual application scene: when the system carries out prime number identification on four data segments, the time value corresponding to the identification point is recorded, the time value of the identification point is 21, then the system judges that 21 is odd, meanwhile, a mark of 0 is generated for the identification point, and two groups of data packets are generated according to 1, 2, 3 and 4 of four groups of data segments, and when the time value of the identification point is 54, the system judges that 54 is even, meanwhile, a mark of 1 is generated for the identification point, and two groups of data packets are generated according to a combination mode of 1, 4, 2 and 3 of four groups of data segments 1, 2, 3.
P2: when the identified capacity size value of the data segment is not prime, analyzing any data segment, judging whether the capacity size value can divide 5, and if the capacity size value can not divide 5, the system does not perform any processing;
if the capacity size value can divide 5 completely, dividing 5 equal parts to generate five groups of data streams, calculating the capacity size value of a single part, and then carrying out marking processing on 5 parts of data streams formed after dividing, wherein the marking processing mode is that 1, 2, 3, 4 and 5 are marked in sequence;
p3: then constructing a polygon with 5 as the number of polygon nodes and a number of digits of a single capacity size value as the side length of the polygon, wherein the number of digits of the capacity size value represents: if the single-part capacity size is 36, the number is 2, the side length of the polygon is 2, the pentagon with the side length of 2 is constructed, and meanwhile, the node values of the polygon are calculated and sequenced in the following specific calculation and sequencing modes:
p31: the magnitude of the second value obtained for 5 consecutive times T is denoted SZj and j=1, …, 5, where T is denoted for 5 seconds and the magnitude of the second value is denoted as the sum of the values of the second values within 5 seconds, the first time the second value within 5 seconds is: 2. 3, 4, 5, 6, so that the sum of the values of seconds in 5 seconds is 2+3+4+5+6=20, and so on, calculating the sum of the values of seconds for the remaining four times, and ordering SZj from big to small while assigning B, where B is represented as the magnitude of the rank and 1 is represented as SZj the largest value, and b=1, …, 5;
p32: b is used as a node value of the polygon, filling is carried out according to a clockwise sequence, and the rest three groups of data segments are analyzed in the same way;
p4: generating corresponding decryption information by using the encryption mode of the first four data segments, and transmitting the decryption information to an information storage unit;
the encryption mode of the fifth data segment is as follows:
w1: the capacity size value of the fifth data segment is identified in the following specific identification mode:
w11: when the capacity size value is identified as odd, the system does not perform any processing and transmits a fifth data segment;
w12: when the capacity magnitude value is identified as even, equally dividing the capacity magnitude value to generate two groups of data streams, carrying out label processing on the equally divided two groups of data streams, marking as 1 and 2, and reversely integrating the two groups of data streams to generate a new data stream, wherein the reversely integrated expression is as follows: processing the data stream with the number of 1 and the number of 2 by the same method, reversing the data stream with the number of 1 from head to tail, reversing the data stream with the number of 2 from head to tail, and integrating to form new data stream information;
w2: generating corresponding decryption information by using encryption modes under different conditions of the fifth data segment, and transmitting the encryption information to an information storage unit;
the data encryption unit encrypts data to be encrypted to obtain encrypted data, and transmits the encrypted data to the data recovery unit;
and the information storage unit is used for storing the acquired encrypted information and transmitting the encrypted information to the data recovery unit.
And the data recovery unit is used for acquiring the transmitted decryption information, decrypting the acquired encrypted data according to the decryption information, recovering the decrypted data to generate communication data, and transmitting the communication data to the information output unit.
And all that is not described in detail in this specification is well known to those skilled in the art.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.
Claims (5)
1. A big data based network communication security protection system, comprising:
the information acquisition unit is used for acquiring the capacity of communication data in the network communication process, recording the capacity as RLi, and transmitting the acquired capacity RLi to the data segmentation unit;
the data segmentation unit is used for carrying out uniform segmentation on the obtained capacity size RLi in five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and A=1, … and 5, calculating the sum of the capacities of the first four capacity data segments, calculating the capacity size of the fifth capacity data segment as 5RLi, integrating the five capacity data segments to generate data to be encrypted, and transmitting the data to the data encryption unit;
the data encryption unit is used for encrypting the acquired data to be encrypted, and encrypting the first four data segments and the fifth data segment in the data to be encrypted respectively;
identifying the capacity values of the four data segments, acquiring corresponding identification points, judging according to the identification points to obtain different judgment results, combining the four data segments in different orders according to the different judgment results, generating corresponding combined information to obtain encrypted data, and generating corresponding decryption information to be transmitted to an information storage unit;
encrypting the fifth data, identifying the capacity value of the fifth data segment, obtaining a corresponding identification result, encrypting the identification result to obtain encrypted data, generating corresponding decryption information, transmitting the decryption information to an information storage unit, integrating the encrypted data and transmitting the encrypted data to a data restoration unit;
an information storage unit for transmitting the decryption information to the data restoring unit;
and the data recovery unit is used for recovering the encrypted data to obtain communication data and transmitting the communication data to the information output unit.
2. The network communication security protection system based on big data according to claim 1, wherein the specific splitting manner of the data splitting unit on the capacity size RLi is as follows:
s1: evenly dividing the capacity size RLi into five equal parts, generating five corresponding capacity data segments, marking the capacity as ARLi, and representing A as different data segments, wherein A=1, … and 5;
s2: and rounding the first four capacity data segments in the calculated five capacity data segments to obtain ARLi, a=1, …, 4, and then calculating the sum of the capacities of the first four capacity data segments, and substituting the sum into the formula: 5RLi = RLi-4 x ari, calculating to obtain the capacity of the fifth capacity data segment as 5RLi, and integrating the fifth capacity data segment to generate data to be encrypted, and transmitting the data to the data encryption unit.
3. The network communication security protection system based on big data according to claim 1, wherein the specific encryption manner of the data encryption unit on the first four data segments is:
p1: identifying the capacity size values of four data segments, when the capacity size values are identified as prime numbers, marking the four data segments as prime number segments, simultaneously obtaining the time value of an identification point by a system, judging whether the identification point is odd or even, and generating two groups of data packets according to the odd and even according to different sequences, wherein the specific generation mode is as follows:
p11: if the identification points are odd numbers, the system generates a mark with the identification points being 0, and two groups of data packets are generated in a mode of adjacent sequence combination;
p12: if the identification points are even numbers, the system generates a mark number of which the identification points are expressed as 1, and two groups of data packets are generated in a head-tail combination mode;
p2: when the identified data segment capacity size value is not prime, judging whether the capacity size value can divide 5, if the capacity size value can not divide 5, the system does not perform any processing, and generating
If the capacity size value can divide 5 completely, dividing 5 equal parts to generate five groups of data streams, calculating the capacity size value of a single part, and then carrying out label processing on 5 parts of data streams formed after dividing;
p3: then, 5 is taken as the number of polygon nodes, the number of digits of the single capacity size value is taken as the side length of the polygon, and meanwhile, the node values of the polygon are calculated and sequenced in the following specific calculation and sequencing modes:
p31: acquiring the numerical value of a second value in the continuous 5 times of T time, marking the numerical value as SZj, wherein j=1, … and 5, and assigning SZj as B while sequencing from large to small;
p32: b is used as a node value of the polygon, filling is carried out according to a clockwise sequence, and the rest three groups of data segments are analyzed in the same way;
p4: and generating corresponding decryption information by the encryption mode of the first four data segments, and transmitting the decryption information to the information storage unit.
4. The network communication security protection system based on big data according to claim 1, wherein the encryption mode for five data segments is:
w1: the capacity size value of the fifth data segment is identified in the following specific identification mode:
w11: when the capacity size value is identified as odd, the system does not perform any processing and transmits a fifth data segment;
w12: when the capacity value is identified as even, equally dividing the capacity value to generate two groups of data streams, carrying out label processing on the equally divided two groups of data streams, marking the two groups of data streams as 1 and 2, and reversely integrating the two groups of data streams to generate new data streams;
w2: and generating corresponding decryption information by using the encryption modes of the fifth data segment under different conditions, and transmitting the encryption information to the information storage unit.
5. The network communication security protection system based on big data according to claim 1, wherein the information output unit is configured to output the communication data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310531337.4A CN116506201B (en) | 2023-05-12 | 2023-05-12 | Network communication safety protection system based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310531337.4A CN116506201B (en) | 2023-05-12 | 2023-05-12 | Network communication safety protection system based on big data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116506201A true CN116506201A (en) | 2023-07-28 |
CN116506201B CN116506201B (en) | 2024-03-01 |
Family
ID=87320038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310531337.4A Active CN116506201B (en) | 2023-05-12 | 2023-05-12 | Network communication safety protection system based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116506201B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116800547A (en) * | 2023-08-25 | 2023-09-22 | 汉兴同衡科技集团有限公司 | Big data-based information processing method, device, equipment and storage medium |
CN117094022A (en) * | 2023-10-20 | 2023-11-21 | 山东友恺通信科技有限公司 | Encryption system based on computer software development |
CN117395088A (en) * | 2023-12-13 | 2024-01-12 | 北京华电电子商务科技有限公司 | Multi-stage cooperative network safety protection system based on electronic commerce platform |
CN117499872A (en) * | 2023-10-25 | 2024-02-02 | 北京金信瑞通科技股份有限公司 | Method and system for realizing short message sending platform |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102447698A (en) * | 2011-11-29 | 2012-05-09 | 数字金融服务(杭州)有限公司 | Encrypting and transmitting method for network communication information |
US20170142077A1 (en) * | 2014-07-29 | 2017-05-18 | Huawei Technologies Co., Ltd. | Data encryption and transmission method and apparatus |
CN113286297A (en) * | 2021-07-22 | 2021-08-20 | 深圳市同富信息技术有限公司 | Wireless data encryption transmission method and device, computer equipment and storage medium |
CN113761554A (en) * | 2021-07-05 | 2021-12-07 | 安徽听见科技有限公司 | Data encryption method, data decryption method, and related devices, equipment and media |
CN114124416A (en) * | 2020-08-24 | 2022-03-01 | 中国航天系统工程有限公司 | System and method for quickly exchanging data between networks |
CN114915458A (en) * | 2022-04-27 | 2022-08-16 | 安徽超清科技股份有限公司 | Comprehensive monitoring protector for urban rail transit |
CN115766242A (en) * | 2022-11-21 | 2023-03-07 | 华能山东发电有限公司烟台发电厂 | Environment-friendly management system based on safety isolation communication |
-
2023
- 2023-05-12 CN CN202310531337.4A patent/CN116506201B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102447698A (en) * | 2011-11-29 | 2012-05-09 | 数字金融服务(杭州)有限公司 | Encrypting and transmitting method for network communication information |
US20170142077A1 (en) * | 2014-07-29 | 2017-05-18 | Huawei Technologies Co., Ltd. | Data encryption and transmission method and apparatus |
CN114124416A (en) * | 2020-08-24 | 2022-03-01 | 中国航天系统工程有限公司 | System and method for quickly exchanging data between networks |
CN113761554A (en) * | 2021-07-05 | 2021-12-07 | 安徽听见科技有限公司 | Data encryption method, data decryption method, and related devices, equipment and media |
CN113286297A (en) * | 2021-07-22 | 2021-08-20 | 深圳市同富信息技术有限公司 | Wireless data encryption transmission method and device, computer equipment and storage medium |
CN114915458A (en) * | 2022-04-27 | 2022-08-16 | 安徽超清科技股份有限公司 | Comprehensive monitoring protector for urban rail transit |
CN115766242A (en) * | 2022-11-21 | 2023-03-07 | 华能山东发电有限公司烟台发电厂 | Environment-friendly management system based on safety isolation communication |
Non-Patent Citations (1)
Title |
---|
张小红;涂平生;: "存储分割编码技术在移动云安全中的应用", 计算机应用, vol. 36, no. 04, pages 931 - 936 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116800547A (en) * | 2023-08-25 | 2023-09-22 | 汉兴同衡科技集团有限公司 | Big data-based information processing method, device, equipment and storage medium |
CN116800547B (en) * | 2023-08-25 | 2023-11-21 | 汉兴同衡科技集团有限公司 | Big data-based information processing method, device, equipment and storage medium |
CN117094022A (en) * | 2023-10-20 | 2023-11-21 | 山东友恺通信科技有限公司 | Encryption system based on computer software development |
CN117094022B (en) * | 2023-10-20 | 2024-01-09 | 山东友恺通信科技有限公司 | Encryption system based on computer software development |
CN117499872A (en) * | 2023-10-25 | 2024-02-02 | 北京金信瑞通科技股份有限公司 | Method and system for realizing short message sending platform |
CN117499872B (en) * | 2023-10-25 | 2024-04-30 | 北京金信瑞通科技股份有限公司 | Method and system for realizing short message sending platform |
CN117395088A (en) * | 2023-12-13 | 2024-01-12 | 北京华电电子商务科技有限公司 | Multi-stage cooperative network safety protection system based on electronic commerce platform |
CN117395088B (en) * | 2023-12-13 | 2024-02-23 | 北京华电电子商务科技有限公司 | Multi-stage cooperative network safety protection system based on electronic commerce platform |
Also Published As
Publication number | Publication date |
---|---|
CN116506201B (en) | 2024-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116506201B (en) | Network communication safety protection system based on big data | |
CN107370546A (en) | Eavesdrop detection method, data transmission method for uplink, apparatus and system | |
CN106209739A (en) | Cloud storage method and system | |
CN110224808B (en) | Bank data sharing method and device based on block chain, computer equipment and storage medium | |
CN106817358B (en) | Encryption and decryption method and device for user resources | |
CN112395643A (en) | Data privacy protection method and system of neural network | |
CN111062045A (en) | Information encryption and decryption method and device, electronic equipment and storage medium | |
CN116527382B (en) | Cloud computing-based data security transmission system | |
CN112784300A (en) | Multi-stage log encryption processing system and method | |
Yang et al. | An effective and scalable VM migration strategy to mitigate cross-VM side-channel attacks in cloud | |
CN112818369A (en) | Combined modeling method and device | |
CN100435509C (en) | Encipher treating method and encipher treating device | |
EP3213457A1 (en) | Key splitting | |
CN112380404B (en) | Data filtering method, device and system | |
CN113992393B (en) | Method, apparatus, system, and medium for model update for vertical federal learning | |
CN109784918A (en) | Information measure of supervision, device, equipment and storage medium based on block chain | |
CN113159918B (en) | Bank client group mining method based on federal group penetration | |
CN109446827A (en) | Data encryption/decryption method and system | |
CN107124261A (en) | Method and apparatus based on homomorphic encryption algorithm defence program code security | |
CN114547684A (en) | Method and device for protecting multi-party joint training tree model of private data | |
CN110874479B (en) | Method, system, data terminal and processing terminal for safely processing decision tree model | |
CN112311536A (en) | Key hierarchical management method and system | |
CN117409173B (en) | Topography map data editing system based on three-dimensional modeling of transformer substation | |
CN112749780A (en) | Data processing method, device and equipment | |
CN112948080B (en) | Data processing method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20240117 Address after: Chinatelecom tower, No. 19, Chaoyangmen North Street, Dongcheng District, Beijing 100010 Applicant after: Tianyi Safety Technology Co.,Ltd. Address before: Room 401, 4th Floor, No. 97 Yongtai Tongtai Road, Yongping Street, Baiyun District, Guangzhou City, Guangdong Province, 510000 Applicant before: Guangzhou WeChat Communication Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |