CN116702208B - Data processing method and system for improving information security - Google Patents

Data processing method and system for improving information security Download PDF

Info

Publication number
CN116702208B
CN116702208B CN202310734979.4A CN202310734979A CN116702208B CN 116702208 B CN116702208 B CN 116702208B CN 202310734979 A CN202310734979 A CN 202310734979A CN 116702208 B CN116702208 B CN 116702208B
Authority
CN
China
Prior art keywords
transmission
processing
information
target
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310734979.4A
Other languages
Chinese (zh)
Other versions
CN116702208A (en
Inventor
李楠
钱军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jialeiyuan New Information Technology Co ltd
Original Assignee
Guangzhou Jialeiyuan New Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jialeiyuan New Information Technology Co ltd filed Critical Guangzhou Jialeiyuan New Information Technology Co ltd
Priority to CN202310734979.4A priority Critical patent/CN116702208B/en
Publication of CN116702208A publication Critical patent/CN116702208A/en
Application granted granted Critical
Publication of CN116702208B publication Critical patent/CN116702208B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/211Schema design and management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides a data processing method and a system for improving information security, which relate to the technical field of data processing, and comprise the steps of constructing a reference database, embedding a trigger matching model, analyzing and matching pretreatment information and processing requirements to obtain a trigger target, further determining an initialization processing domain, adjusting, generating a standardized processing domain for data processing, obtaining a data processing result for self-adaptive conversion transmission and terminal decoding visual display, solving the technical problems that the data processing mode is not flexible enough, risk control and processing mechanisms are not perfect enough, data requirement compliance and high security processing cannot be realized in the prior art, self-building a basic system of data processing, matching and determining the compliance processing domain aiming at the target to be processed, performing processing domain adjustment and optimization to ensure the flexibility of processing, ensure the data processing effect and efficiency, and performing global processing wind control encryption configuration based on the data security level to maximize the security of data processing.

Description

Data processing method and system for improving information security
Technical Field
The application relates to the technical field of data processing, in particular to a data processing method and a data processing system for improving information security.
Background
With the development of the Internet information age, the geometric progression of Internet data is increased, the processing of the data is a current main problem, and the risk hidden danger is avoided to improve the safety of information processing. At present, the processing execution of network generated data is mainly performed by setting a predetermined data processing mechanism and logic. The data processing mode in the prior art has insufficient flexibility, and is not perfect for risk control and processing mechanism, so that the demand compliance and high-safety processing of data cannot be realized.
Disclosure of Invention
The application provides a data processing method and a system for improving information security, which are used for solving the technical problems that the flexibility of a data processing mode in the prior art is insufficient, the risk control and processing mechanism is not perfect enough, and the demand compliance and high-security processing of data cannot be realized.
In view of the above, the present application provides a data processing method and system for improving information security.
In a first aspect, the present application provides a data processing method for improving information security, the method comprising:
basic processing information of interaction multi-dimension is built, a reference database is built, and the reference database is embedded into a trigger matching model;
acquiring pretreatment information and determining a processing requirement, wherein the pretreatment information is marked with a safety coefficient;
inputting the processing requirements and the safety coefficient into the trigger matching model, matching the trigger requirements and the safety coefficient with the reference database, and calling a trigger target, wherein the trigger target is characterized by a data processing mode-transmission mode-countermeasure target-visualization mode;
based on the trigger target, determining an initialization processing domain and adjusting the initialization processing domain to generate a standardized processing domain, wherein the standardized processing domain comprises hardware equipment, a software system and a transmission medium;
inputting the preprocessing information and the processing requirement into the standardized processing domain to obtain a data processing result;
and carrying out adaptive conversion transmission and terminal decoding visual display on the data processing result, wherein the adaptive conversion has randomness.
In a second aspect, the present application provides a data processing system for improving information security, the system comprising:
the database construction module is used for constructing a reference database and embedding the reference database into a trigger matching model, wherein the database construction module is used for interacting multidimensional basic processing information;
the information acquisition module is used for acquiring preprocessing information and determining processing requirements, and the preprocessing information is marked with a safety coefficient;
the trigger target acquisition module is used for inputting the processing requirements and the safety coefficient into the trigger matching model, matching the trigger target by combining the reference database and calling the trigger target, wherein the trigger target is characterized by a data processing mode, a transmission mode, an countermeasure target and a visualization mode;
the processing domain acquisition module is used for determining an initialization processing domain and adjusting the initialization processing domain based on the trigger target to generate a standardized processing domain, wherein the standardized processing domain comprises hardware equipment, a software system and a transmission medium;
the result acquisition module is used for inputting the preprocessing information and the processing requirements into the standardized processing domain to acquire a data processing result;
and the result display module is used for carrying out adaptive conversion transmission and terminal decoding visual display on the data processing result, wherein the adaptive conversion has randomness.
One or more technical schemes provided by the application have at least the following technical effects or advantages:
according to the data processing method for improving information security, provided by the embodiment of the application, multidimensional basic processing information is interacted, a reference database is built and a trigger matching model is embedded, preprocessing information is acquired, processing requirements are determined, the safety coefficient is input into the trigger matching model through the preprocessing information identification, the processing requirements and the safety coefficient are matched and a trigger target is called, the data processing mode-transmission mode-countermeasure target-visualization mode is characterized in that the data processing mode-countermeasure target-visualization mode is adopted, an initialization processing domain is determined and adjusted based on the trigger target, a standardized processing domain is generated, the standardized processing domain comprises hardware equipment, a software system and a transmission medium, the preprocessing information and the processing requirements are input into the standardized processing domain, a data processing result is acquired, self-adaptive conversion transmission and terminal decoding visualization display of the data processing result are carried out, the self-adaptive conversion has randomness, the technical problems that the data processing mode flexibility is insufficient in the prior art, the data demand compliance and high-safety processing cannot be realized are solved, the self-building data processing target system is matched with the safety control and the safety processing mechanism is not perfect, the data processing efficiency is guaranteed, the data processing is optimally processed based on the safety control and the safety level is matched, and the data processing is optimally processed, and the data processing domain is optimally.
Drawings
FIG. 1 is a schematic flow chart of a data processing method for improving information security;
FIG. 2 is a schematic diagram of a standardized processing domain generation flow in a data processing method for improving information security;
FIG. 3 is a schematic diagram showing a flow of displaying a data processing result in a data processing method for improving information security;
FIG. 4 is a schematic diagram of a data processing system for improving information security.
Reference numerals illustrate: the system comprises a database construction module 11, an information acquisition module 12, a trigger target acquisition module 13, a processing domain acquisition module 14, a result acquisition module 15 and a result display module 16.
Detailed Description
The application provides a data processing method and a system for improving information security, which are used for constructing a reference database, embedding a trigger matching model, acquiring preprocessing information, determining processing requirements, inputting the trigger matching model for matching and calling a trigger target, determining an initialization processing domain and adjusting based on the trigger target to generate a standardized processing domain, processing preprocessing information based on the processing requirements, and acquiring data processing results for self-adaptive conversion transmission and terminal decoding visualization display.
Example 1
As shown in fig. 1, the present application provides a data processing method for improving information security, the method comprising:
step S100: basic processing information of interaction multi-dimension is built, a reference database is built, and the reference database is embedded into a trigger matching model;
further, the step S100 of the present application further includes:
step S110: determining a plurality of data processing modes, and building a mode sub-library, wherein the mode sub-library comprises an online mode, a batch mode, a distribution mode, an encryption mode and a multi-element mode;
step S120: determining a plurality of data processing modes and visualization modes, and constructing a Fang Fazi library;
step S130: dividing a data transmission channel, configuring a multi-stage transmission mode, and constructing a transmission sub-library;
step S140: carrying out data processing risk analysis and constructing an information pair database;
step S150: and integrating the pattern sub-library, the method sub-library, the transmission sub-library and the information pair sub-library to generate the reference database.
Specifically, with the development of the internet information age, the internet data presents a geometric progression, the data processing is a current main problem, in order to ensure the information processing effect and avoid risk hidden danger so as to improve the information processing safety, the application provides a data processing method for improving the information security, a basic system of the data processing is built, a target to be processed is matched and a concordance processing domain is determined, the processing domain is optimized so as to ensure the data processing effect and efficiency, and encryption configuration of global processing is performed based on the data security level so as to ensure the data processing safety.
Specifically, searching and determining multiple existing data processing modes, including an online mode, a batch mode, a distribution mode, an encryption mode and a diversified mode, wherein the online mode is used for cooperatively completing data processing for multiple computers or processors; the batch processing is to process a plurality of groups of data simultaneously; the distribution mode is based on data segmentation processing and merging of different processors; the encryption mode is data encryption processing; the diversified mode is performed simultaneously in at least two modes, for example, an online mode and an encryption mode are synchronously executed, and basic execution logic of a plurality of data processing modes and writing modes is integrated to generate the mode sub-library. Determining a plurality of data processing modes, such as data retrieval, processing, operation and the like, and respectively configuring applicability algorithm logic; determining multiple data visualization modes, such as tabular display, textual display, structural display and the like, and generating the method sub-library based on the multiple data processing modes and the visualization modes. And dividing the data transmission channels, such as channel transmission with different security levels, and generating the transmission sub-library as a multi-stage transmission mode. And counting a plurality of existing intrusion sources, a protection system executing information countermeasure and the like, and mapping the intrusion sources and the protection system to generate the information countermeasure library correspondingly. And integrating the pattern sub-library, the method sub-library, the transmission sub-library and the information pair sub-library to generate the reference database, wherein the reference database is a basic reference for data processing.
Further, the trigger matching model is built, and the reference database is embedded into the trigger matching model. And acquiring sample processing requirements, sample safety coefficients and sample trigger target sequences, carrying out mapping association of the sample data to determine training data and verification data, respectively inputting the training data and the verification data into the trigger matching model to carry out model training and verification, acquiring the trigger matching model after construction is completed, and ensuring the output accuracy of the model. The trigger matching model is used for extracting the basic processing architecture environment of the data to be processed.
Step S200: acquiring pretreatment information and determining a processing requirement, wherein the pretreatment information is marked with a safety coefficient;
further, the preprocessing information is identified with a security coefficient, and step S200 of the present application further includes:
step S210: configuring a plurality of safety indexes including disaster recovery capacity, authority range, invasiveness and compliance;
step S220: inputting the preprocessing information into a risk assessment model, and assessing the multiple safety indexes to generate a coefficient matrix, wherein the coefficient matrix is an selfing matrix;
step S230: and performing matrix item weighted calculation on the coefficient matrix to obtain the safety coefficient.
Specifically, the preprocessing information is source data to be processed, for example, search data, high confidentiality file processing, high-level information interaction and the like, and determines processing requirements, namely, specific processing procedures and modes, processing limitation conditions such as reached processing standards and the like, for example, the preprocessing information belongs to multi-source data, and distributed processing and result combination and the like need to be performed based on self-attributing processors.
Further, sample processing information is collected, the sample processing information is evaluated based on the plurality of safety indexes, the safety coefficients of the sample indexes are determined, the safety coefficients of the sample indexes are expressed with weight values, the weight distribution of the sample processing information is different, the plurality of safety indexes are respectively used as matrix rows and matrix columns, a sample coefficient matrix is built based on the safety coefficients of the sample indexes, each matrix item corresponds to the safety coefficient of one index or the interaction safety coefficient of two indexes, the safety coefficients of the sample indexes can be determined through expert group evaluation, the sample processing information is used as input information, the sample coefficient matrix is used as output information, mapping association between the input information and the output information is carried out, and further neural network training is carried out to generate the risk evaluation model. And inputting the preprocessing information into the risk assessment model, carrying out data matching and decision to determine a coefficient matrix, and outputting. And carrying out distributed weight recognition on the coefficient matrix, carrying out weighted summation on each matrix item, obtaining the safety coefficient, and marking the preprocessing information based on the safety coefficient, wherein the higher the safety coefficient is, the higher the wind control level of the subsequent data processing is, namely the higher the confidentiality level is.
Step S300: inputting the processing requirements and the safety coefficient into the trigger matching model, matching the trigger requirements and the safety coefficient with the reference database, and calling a trigger target, wherein the trigger target is characterized by a data processing mode-transmission mode-countermeasure target-visualization mode;
step S400: based on the trigger target, determining an initialization processing domain and adjusting the initialization processing domain to generate a standardized processing domain, wherein the standardized processing domain comprises hardware equipment, a software system and a transmission medium;
specifically, the processing requirements and the security coefficient are input into the trigger matching model, each execution target is matched by combining the reference database, the matching results of all the sub-libraries are connected in a link, and the trigger targets are used as the trigger targets and are used for providing a basic network environment and an architecture system for data processing. Specifically, based on the trigger target, identifying the data processing mode, determining a corresponding one or more processors and assigning processing restrictions, such as multiprocessor co-processing in a secure environment; determining an algorithm, a system, a software platform and the like for specifically performing data processing based on the processing mode; based on the transmission mode, determining a transmission channel, including short channel information interactive transmission during data processing and long channel transmission during processing result sending; based on the countermeasure target, indicating possible risks in the preprocessing data processing process, such as data leakage, data tampering and the like, and displaying 0 if the countermeasure target does not exist; based on the visualization mode, determining the display state of the terminal after the data processing is completed, such as images, tables, internal frames and the like, acquiring hardware equipment, a software system and a transmission medium required by complete processing execution of the preprocessing data, and dividing the hardware equipment, the software system and the transmission medium from a network large environment to serve as the initialization processing domain. The initialization processing domain is used for carrying out matching and analysis determination based on the reference database, processing of the preprocessing data can be completed but the preprocessing data is not targeted, further adjustment is carried out on the preprocessing data, and the standardized processing domain, namely the processing space which is highly matched with the execution of the preprocessing data and covers the whole period of processing, is determined.
Further, as shown in fig. 2, the step S400 of determining the initialization processing domain and adjusting the initialization processing domain to generate the standardized processing domain based on the trigger target further includes:
step S410: identifying the safety coefficient, and screening a target transmission standard, wherein a target transmission channel has expandability;
step S420: based on the initialization processing domain, adjusting the constituent calculation force space, and determining an adjustment calculation force space;
step S430: combining with the countermeasure target, carrying out risk mining on the initialization processing domain, and determining the attack and defense countermeasure points;
step S440: in the initialization processing domain, positioning, defending and processing transmission feedback are carried out on the attack and defense countermeasure points;
step S450: and adjusting the initialization processing domain based on the target transmission standard, the adjustment computing force space and the attack and defense countermeasure points.
Further, the transmission standard corresponds to a multi-level security factor, and step S410 of the present application further includes:
step S411: if the safety coefficient meets a first-level threshold, the transmission standard is common channel transmission;
step S412: if the safety coefficient meets a second-level threshold, the transmission standard is encryption channel transmission;
step S413: if the safety coefficient meets the three-level threshold, the transmission standard is information encryption conversion and encryption channel double protection transmission;
step S414: and if the safety coefficient meets a four-level threshold, the transmission standard is information encryption conversion, encryption channel and information anti-encryption triple protection transmission.
Further, the adjusting the space of the calculation force is performed, and step S420 of the present application further includes:
step S421: determining a computational force space in the initialization processing domain;
step S422: judging whether the calculation force space meets the processing demand calculation force or not, and if not, generating extension information, wherein the extension information comprises extension quantity and an extension instruction;
step S423: based on the expansion instruction, determining a neighbor calculation force space and determining neighbor similarity, wherein the neighbor calculation force space is an empty calculation force space meeting processing time limit;
step S424: based on the expansion quantity, checking the neighbor similarity to determine a target neighbor calculation force space;
step S425: and merging the calculation force space with the target neighbor calculation force space.
Specifically, the initialization processing domain is adjusted to obtain the standardized processing domain due to insufficient pertinence and easy influence on the processing effect, so that the adaptation degree of the standardized processing domain and the preprocessing information is improved, and the data processing effect is improved.
Specifically, the first-level threshold, the second-level threshold, the third-level threshold and the fourth-level threshold are set, namely, the self-defined critical safety coefficient for limiting the transmission standard is set, the first-level threshold, the second-level threshold, the third-level threshold and the fourth-level threshold are increased in equal safety coefficient intervals, threshold correction judgment is carried out on the safety coefficient, and if the safety coefficient meets the first-level threshold, the transmission standard is common channel transmission; if the safety coefficient meets a second-level threshold, the transmission standard is encryption channel transmission; if the safety coefficient meets the three-level threshold, the transmission standard is information encryption conversion and encryption channel double protection transmission; if the security coefficient meets the four-level threshold, the transmission standard is information encryption conversion, encryption channel, information anti-adding and anti-triple protection transmission, the transmission standard corresponding to the maximum threshold level met is used as the target transmission standard, and meanwhile, the corresponding target transmission channel has expandability, for example, if the transmission data volume is too large, the same-level transmission channel can be called for guaranteeing the transmission rate, and synchronous transmission of multi-channel data is executed for the same transmission purpose.
Further, based on the initialization processing domain, determination and optimization adjustment of the constituent calculation force space are performed. Specifically, determining a calculation force space in the initialization processing domain, judging whether the calculation force space meets the requirement calculation force for completing the preprocessing data under the limitation of the processing speed, if not, expanding the calculation force space to generate the expansion instruction, calculating the requirement calculation force space for completing the processing of the preprocessing data based on the limitation of the processing speed, taking the difference between the requirement calculation force space and the calculation force space as the expansion amount, and taking the expansion amount and the expansion instruction as the expansion information.
Further, with the receiving of the expansion instruction, the neighborhood computing force space is used as a center, the processing time limit of the preprocessing data is used as a limit, and the neighborhood computing force space which is empty in the processing time limit is screened to be used as the neighborhood computing force space. And further carrying out similarity comparison on the neighbor calculation force space and the calculation force space, and determining the neighbor similarity by taking the processed data type and the processed data type as comparison standards. And carrying out positive serialization arrangement on the neighbor similarity from large to small, limiting the expansion amount, determining a neighbor calculation force space corresponding to high similarity as the target neighbor calculation force space, merging the calculation force space with the target neighbor calculation force space as the adjustment calculation force space, and carrying out efficient processing on the preprocessing data.
Further, the countermeasures are taken as indexes, historical processing data are called, the countermeasures are extracted, frequency statistics is carried out, the recording frequency of the same countermeasures is determined, ratio calculation is carried out on the recording frequency of the same countermeasures and the total recording quantity, the countermeasures which are larger than a ratio threshold value are screened, namely non-accidental information, the ratio threshold value is a critical ratio for limiting recording accidental, corresponding countermeasures, such as a certain position of a channel in data transmission, are extracted and serve as the countermeasures, the initialization processing domain is subjected to positioning and anti-countermeasures processing, such as correlation adaptability protection system and the like aiming at positioning results, and network attacks received in the data processing transmission process are fed back in real time. And adjusting and optimizing the initialization processing domain to obtain the standardized processing domain so as to improve the degree of fit with the preprocessing information.
Step S500: inputting the preprocessing information and the processing requirement into the standardized processing domain to obtain a data processing result;
step S600: and carrying out adaptive conversion transmission and terminal decoding visual display on the data processing result, wherein the adaptive conversion has randomness.
Further, as shown in fig. 3, the step S600 of the present application further includes:
step S610: configuring a conversion information base, and constructing temporary connection between two information transmission parties and the conversion information base, wherein the conversion information base comprises a plurality of machine encryption languages;
step S620: carrying out security level identification on the transmission mode, determining a target transmission standard and generating transmission execution information;
step S630: identifying the target transmission standard along with the receiving of the transmission execution information, and generating a target encryption instruction, wherein at least one item exists in the target encryption instruction;
step S640: randomly determining a machine encryption language based on the conversion information base, converting the data processing result, and determining pre-transmission information;
step S650: and based on the target transmission channel, the terminal acquires and decodes the key of the received pre-transmission information, and the visual display of the data processing result is carried out.
Specifically, the preprocessing information and the processing requirements are input into the standardized processing domain, data processing is performed based on the configured processing architecture and logic, and the data processing result is generated. And further transmitting the data processing result.
Specifically, multiple machine encryption languages are integrated, the transmission end and the receiving end of the data processing result are determined as the conversion information base, and temporary connection between the transmission end and the receiving end and the conversion information base is respectively established. And carrying out security level identification on the transmission mode, determining a target transmission standard, and generating transmission execution information, namely, carrying out a start instruction of data processing result transmission. Along with the receiving of the transmission execution information, the target transmission standard is identified, an encryption target is determined, and the target encryption instruction is generated, for example, if the target transmission standard is a transmission standard meeting a four-level threshold, namely, the security level of data is highest, information encryption conversion transmission is needed on the basis of encryption channel transmission and information countermeasure and prevention, namely, the target encryption instruction is three.
Further, based on the conversion information base, a machine encryption language is randomly determined, the data processing result is converted, and the converted data processing result is used as the pre-transmission information. And transmitting the pre-transmission information in the target transmission channel, determining a key of the pre-transmission information in the conversion information base after the pre-transmission information is transmitted to a terminal, namely a data receiver, and decoding and displaying the information to ensure the safety of data to the greatest extent.
Example two
Based on the same inventive concept as the data processing method for improving information security in the foregoing embodiments, as shown in fig. 4, the present application provides a data processing system for improving information security, the system comprising:
the database building module 11 is used for building a reference database and embedding the reference database into a trigger matching model, wherein the database building module 11 is used for interacting multidimensional basic processing information;
the information acquisition module 12 is used for acquiring preprocessing information and determining processing requirements, wherein the preprocessing information is marked with a safety coefficient;
the trigger target acquisition module 13 is used for inputting the processing requirements and the safety coefficient into the trigger matching model, matching the trigger target with the reference database and calling the trigger target, wherein the trigger target is characterized by a data processing mode-transmission mode-countermeasure target-visualization mode;
the processing domain acquisition module 14 is configured to determine an initialization processing domain based on the trigger target and adjust the initialization processing domain to generate a standardized processing domain, where the standardized processing domain includes a hardware device, a software system and a transmission medium;
the result obtaining module 15 is configured to input the preprocessing information and the processing requirement into the standardized processing domain, and obtain a data processing result;
and the result display module 16 is used for performing adaptive conversion transmission and terminal decoding visual display on the data processing result, wherein the adaptive conversion has randomness.
Further, the database construction module further includes:
the mode sub-library construction module is used for determining a plurality of data processing modes and constructing a mode sub-library, and the mode sub-library comprises an online mode, a batch mode, a distribution mode, an encryption mode and a multi-element mode;
fang Fazi library construction module, which is used for determining various data processing modes and visualization modes and constructing Fang Fazi library;
the transmission sub-library construction module is used for dividing a data transmission channel, configuring a multi-level transmission mode and constructing a transmission sub-library;
the information pair database construction module is used for carrying out data processing risk analysis and constructing an information pair database;
and the reference database generation module is used for integrating the pattern sub-library, the method sub-library, the transmission sub-library and the information pair sub-library to generate the reference database.
Further, the information acquisition module further includes:
the index configuration module is used for configuring a plurality of safety indexes including disaster recovery capacity, authority range, invasiveness and compliance;
the index evaluation module is used for inputting the preprocessing information into a risk evaluation model, evaluating the plurality of safety indexes and generating a coefficient matrix, wherein the coefficient matrix is an selfing matrix;
the safety coefficient acquisition module is used for carrying out matrix item weighted calculation on the coefficient matrix to acquire the safety coefficient.
Further, the processing domain acquisition module further includes:
the target transmission standard screening module is used for identifying the safety coefficient and screening target transmission standards, wherein a target transmission channel has expandability;
the calculation force space adjusting module is used for adjusting the calculation force space based on the initialization processing domain and determining and adjusting the calculation force space;
the risk mining module is used for carrying out risk mining on the initialization processing domain by combining with the countermeasure target to determine the attack and defense countermeasure points;
the attack and defense countermeasure point adjusting module is used for positioning, adding and processing transmission feedback to the attack and defense countermeasure point in the initialization processing domain;
the adjustment module is used for adjusting the initialization processing domain based on the target transmission standard, the adjustment computing force space and the attack and defense countermeasure points.
Further, the target transmission standard screening module further includes:
the first-level threshold judging module is used for judging whether the safety coefficient meets a first-level threshold or not, and the transmission standard is common channel transmission;
the second-level threshold judging module is used for transmitting the encrypted channel according to the transmission standard if the safety coefficient meets the second-level threshold;
the third-level threshold judging module is used for carrying out double protection transmission on the information encryption conversion and the encryption channel if the safety coefficient meets the third-level threshold;
and the fourth-level threshold judging module is used for transmitting information encryption conversion, encryption channels and triple protection transmission of information countermeasure and protection if the safety coefficient meets the fourth-level threshold.
Further, the computing force space adjustment module further includes:
a computational force space determination module for determining a computational force space in the initialization processing domain;
the expansion information generation module is used for judging whether the calculation force space meets the processing requirement calculation force or not, and if not, generating expansion information, wherein the expansion information comprises expansion quantity and expansion instructions;
the near-neighbor calculation force space analysis module is used for determining a near-neighbor calculation force space and determining near-neighbor similarity based on the expansion instruction, wherein the near-neighbor calculation force space is an empty calculation force space meeting processing time limit;
the similarity correction module is used for correcting the neighbor similarity to determine a target neighbor calculation force space based on the expansion quantity;
and the space merging module is used for merging the calculation force space with the target neighbor calculation force space.
Further, the result display module further includes:
the information base configuration module is used for configuring a conversion information base and constructing temporary connection between two information transmission parties and the conversion information base, and the conversion information base comprises a plurality of machine encryption languages;
the transmission execution information generation module is used for carrying out security level identification on the transmission mode, determining a target transmission standard and generating transmission execution information;
the target encryption instruction generation module is used for identifying the target transmission standard along with the receiving of the transmission execution information to generate a target encryption instruction, and at least one target encryption instruction exists;
the result conversion module is used for randomly determining a machine encryption language based on the conversion information base, converting the data processing result and determining pre-transmission information;
and the information decoding display module is used for acquiring and decoding the key of the received pre-transmission information on the basis of the target transmission channel and visually displaying the data processing result.
The foregoing detailed description of a data processing method for improving information security will be clear to those skilled in the art, and the device disclosed in this embodiment is relatively simple to describe, and the relevant places refer to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A data processing method for improving information security, the method comprising:
basic processing information of interaction multi-dimension is built, a reference database is built, and the reference database is embedded into a trigger matching model;
acquiring pretreatment information and determining a processing requirement, wherein the pretreatment information is marked with a safety coefficient;
inputting the processing requirements and the safety coefficient into the trigger matching model, matching the trigger requirements and the safety coefficient with the reference database, and calling a trigger target, wherein the trigger target is characterized by a data processing mode-transmission mode-countermeasure target-visualization mode;
based on the trigger target, determining an initialization processing domain and adjusting the initialization processing domain to generate a standardized processing domain, wherein the standardized processing domain comprises hardware equipment, a software system and a transmission medium;
the method comprises the steps of determining an initialization processing domain based on the trigger target, adjusting the initialization processing domain, and generating a standardized processing domain, wherein the method comprises the following steps:
identifying the safety coefficient, screening a target transmission standard, wherein a target transmission channel has expandability;
based on the initialization processing domain, adjusting the constituent calculation force space, and determining an adjustment calculation force space;
combining with the countermeasure target, carrying out risk mining on the initialization processing domain, and determining the attack and defense countermeasure points;
in the initialization processing domain, positioning, defending and processing transmission feedback are carried out on the attack and defense countermeasure points;
based on the target transmission standard, the adjustment computing force space and the attack and defense countermeasure points, adjusting the initialization processing domain;
inputting the preprocessing information and the processing requirement into the standardized processing domain to obtain a data processing result;
and carrying out adaptive conversion transmission and terminal decoding visual display on the data processing result, wherein the adaptive conversion has randomness.
2. The method of claim 1, wherein building the reference database, the method comprising:
determining a plurality of data processing modes, and building a mode sub-library, wherein the mode sub-library comprises an online mode, a batch mode, a distribution mode, an encryption mode and a multi-element mode;
determining a plurality of data processing modes and visualization modes, and constructing a Fang Fazi library;
dividing a data transmission channel, configuring a multi-stage transmission mode, and constructing a transmission sub-library;
carrying out data processing risk analysis and constructing an information pair database;
and integrating the pattern sub-library, the method sub-library, the transmission sub-library and the information pair sub-library to generate the reference database.
3. The method of claim 1, wherein the preprocessing information identifies a security factor, the method comprising:
configuring a plurality of safety indexes including disaster recovery capacity, authority range, invasiveness and compliance;
inputting the preprocessing information into a risk assessment model, and assessing the multiple safety indexes to generate a coefficient matrix, wherein the coefficient matrix is an selfing matrix;
and performing matrix item weighted calculation on the coefficient matrix to obtain the safety coefficient.
4. The method of claim 1, wherein the transmission criteria corresponds to a multi-level security factor, the method comprising:
if the safety coefficient meets a first-level threshold, the transmission standard is common channel transmission;
if the safety coefficient meets a second-level threshold, the transmission standard is encryption channel transmission;
if the safety coefficient meets the three-level threshold, the transmission standard is information encryption conversion and encryption channel double protection transmission;
and if the safety coefficient meets a four-level threshold, the transmission standard is information encryption conversion, encryption channel and information anti-encryption triple protection transmission.
5. The method of claim 1, wherein the making of the adjustments that form the computational force space comprises:
determining a computational force space in the initialization processing domain;
judging whether the calculation force space meets the processing demand calculation force or not, and if not, generating extension information, wherein the extension information comprises extension quantity and an extension instruction;
based on the expansion instruction, determining a neighbor calculation force space and determining neighbor similarity, wherein the neighbor calculation force space is an empty calculation force space meeting processing time limit;
based on the expansion quantity, checking the neighbor similarity to determine a target neighbor calculation force space;
and merging the calculation force space with the target neighbor calculation force space.
6. The method of claim 1, wherein the adaptively converting the data processing result to a transmission and terminal decoding visual display, the method comprising:
configuring a conversion information base, and constructing temporary connection between two information transmission parties and the conversion information base, wherein the conversion information base comprises a plurality of machine encryption languages;
carrying out security level identification on the transmission mode, determining a target transmission standard and generating transmission execution information;
identifying the target transmission standard along with the receiving of the transmission execution information, and generating a target encryption instruction, wherein at least one item exists in the target encryption instruction;
randomly determining a machine encryption language based on the conversion information base, converting the data processing result, and determining pre-transmission information;
and based on the target transmission channel, the terminal acquires and decodes the key of the received pre-transmission information, and the visual display of the data processing result is carried out.
7. A data processing system for improving information security, the system comprising:
the database construction module is used for constructing a reference database and embedding the reference database into a trigger matching model, wherein the database construction module is used for interacting multidimensional basic processing information;
the information acquisition module is used for acquiring preprocessing information and determining processing requirements, and the preprocessing information is marked with a safety coefficient;
the trigger target acquisition module is used for inputting the processing requirements and the safety coefficient into the trigger matching model, matching the trigger target by combining the reference database and calling the trigger target, wherein the trigger target is characterized by a data processing mode, a transmission mode, an countermeasure target and a visualization mode;
the processing domain acquisition module is used for determining an initialization processing domain and adjusting the initialization processing domain based on the trigger target to generate a standardized processing domain, wherein the standardized processing domain comprises hardware equipment, a software system and a transmission medium;
wherein, the processing domain acquisition module further comprises:
the target transmission standard screening module is used for identifying the safety coefficient, screening the target transmission standard and enabling the target transmission channel to have expandability;
the calculation force space adjusting module is used for adjusting the calculation force space based on the initialization processing domain and determining and adjusting the calculation force space;
the risk mining module is used for carrying out risk mining on the initialization processing domain by combining with the countermeasure target to determine the attack and defense countermeasure points;
the attack and defense countermeasure point adjusting module is used for positioning, adding and processing transmission feedback to the attack and defense countermeasure point in the initialization processing domain;
the adjusting module is used for adjusting the initialization processing domain based on the target transmission standard, the adjusting calculation force space and the attack and defense countermeasure points;
the result acquisition module is used for inputting the preprocessing information and the processing requirements into the standardized processing domain to acquire a data processing result;
and the result display module is used for carrying out adaptive conversion transmission and terminal decoding visual display on the data processing result, wherein the adaptive conversion has randomness.
CN202310734979.4A 2023-06-20 2023-06-20 Data processing method and system for improving information security Active CN116702208B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310734979.4A CN116702208B (en) 2023-06-20 2023-06-20 Data processing method and system for improving information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310734979.4A CN116702208B (en) 2023-06-20 2023-06-20 Data processing method and system for improving information security

Publications (2)

Publication Number Publication Date
CN116702208A CN116702208A (en) 2023-09-05
CN116702208B true CN116702208B (en) 2023-11-03

Family

ID=87840843

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310734979.4A Active CN116702208B (en) 2023-06-20 2023-06-20 Data processing method and system for improving information security

Country Status (1)

Country Link
CN (1) CN116702208B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826691A (en) * 2022-04-02 2022-07-29 深圳市博博信息咨询有限公司 Network information safety intelligent analysis early warning management system based on multi-dimensional analysis

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509463B (en) * 2017-02-28 2022-03-29 华为技术有限公司 Question response method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826691A (en) * 2022-04-02 2022-07-29 深圳市博博信息咨询有限公司 Network information safety intelligent analysis early warning management system based on multi-dimensional analysis

Also Published As

Publication number Publication date
CN116702208A (en) 2023-09-05

Similar Documents

Publication Publication Date Title
Hayes et al. Generating steganographic images via adversarial training
CN111783875A (en) Abnormal user detection method, device, equipment and medium based on cluster analysis
KR20190070702A (en) System and method for automatically verifying security events based on text mining
CN113411342A (en) Big data-based information security risk identification method and artificial intelligence security system
CN113239065A (en) Big data based security interception rule updating method and artificial intelligence security system
CN115913643A (en) Network intrusion detection method, system and medium based on countermeasure self-encoder
CN111144546B (en) Scoring method, scoring device, electronic equipment and storage medium
CN116702208B (en) Data processing method and system for improving information security
CN110457916A (en) A kind of electronic contract encryption method, device and terminal device
CN114826681A (en) DGA domain name detection method, system, medium, equipment and terminal
CN116827656A (en) Network information safety protection system and method thereof
US20200285914A1 (en) Multi-level deep feature and multi-matcher fusion for improved image recognition
Jovic et al. Traditional machine learning methods for side-channel analysis
CN112597379B (en) Data identification method and device, storage medium and electronic device
CN113468540A (en) Security portrait processing method based on network security big data and network security system
KR20230076938A (en) Valuable alert screening methods for detecting malicious threat
CN113222480A (en) Training method and device for confrontation sample generation model
CN115085948A (en) Network security situation assessment method based on improved D-S evidence theory
CN111091283A (en) Power data fingerprint evaluation method based on Bayesian network
Cheng et al. DeepDIST: A Black-box Anti-collusion Framework for Secure Distribution of Deep Models
CN117220911B (en) Industrial control safety audit system based on protocol depth analysis
CN113630425B (en) Financial data safe transmission method for multiple power bodies
CN112766312B (en) User information acquisition method, electronic equipment and medium
CN115378702B (en) Attack detection system based on Linux system call
CN116611037B (en) Deep neural network black box watermarking method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant