CN116962077A - Data encryption and decryption method based on data capacity and data transmission system - Google Patents

Data encryption and decryption method based on data capacity and data transmission system Download PDF

Info

Publication number
CN116962077A
CN116962077A CN202311203852.6A CN202311203852A CN116962077A CN 116962077 A CN116962077 A CN 116962077A CN 202311203852 A CN202311203852 A CN 202311203852A CN 116962077 A CN116962077 A CN 116962077A
Authority
CN
China
Prior art keywords
data
capacity value
data capacity
database
field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311203852.6A
Other languages
Chinese (zh)
Other versions
CN116962077B (en
Inventor
陆蓓婷
蒋文创
王小芳
蔡成涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Value Chain Technology Shenzhen Co ltd
Harbin Engineering University Sanya Nanhai Innovation And Development Base
Harbin Engineering University
Original Assignee
Value Chain Technology Shenzhen Co ltd
Harbin Engineering University Sanya Nanhai Innovation And Development Base
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Value Chain Technology Shenzhen Co ltd, Harbin Engineering University Sanya Nanhai Innovation And Development Base, Harbin Engineering University filed Critical Value Chain Technology Shenzhen Co ltd
Priority to CN202311203852.6A priority Critical patent/CN116962077B/en
Publication of CN116962077A publication Critical patent/CN116962077A/en
Application granted granted Critical
Publication of CN116962077B publication Critical patent/CN116962077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention discloses a data encryption and decryption method based on data capacity and a data transmission system, wherein the method is suitable for an encryption terminal arranged at a front-end detection instrument, and comprises the following steps: after the ocean detection data acquired by the front-end detection instrument are acquired, acquiring a data capacity value of the ocean detection data; dividing the ocean detection data according to the data capacity value to obtain a plurality of detection data blocks; and generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypting each detection data block by utilizing the interference factor to obtain an encrypted data block. According to the invention, the ocean detection data is collected, the data is split according to the data capacity value, the interference factor is generated, and the encryption is carried out by utilizing the interference factor, so that the safety of the data is improved, the data is prevented from being stolen or tampered in the transmission process, the split data has small capacity and quick transmission, and the transmission efficiency of the data can be greatly improved.

Description

Data encryption and decryption method based on data capacity and data transmission system
Technical Field
The present invention relates to the field of data encryption, and in particular, to a data encryption and decryption method and a data transmission system based on data capacity.
Background
With the development of modern communication technology, computer technology and sensor technology, the exploration of the ocean also gradually progresses from offshore to offshore, and from discrete to comprehensive perception of a network information system. The marine biological diversity analysis and ecological disaster simulation are realized by collecting the related data of the ocean in real time and then utilizing the data detected in real time to perform different ecological analyses.
In order to improve data processing efficiency, a method commonly used at present is to arrange a plurality of detection instruments in a marine area, collect data in real time through detection instruments or equipment at the front end, transmit the data to a rear end server in a wired or wireless mode, convert the formats of data in different formats into data in a unified format through the rear end server, and then perform subsequent processing.
However, the current common mode has the following technical problems: the detection data collected by different instruments may relate to multiple analysis and detection directions, and the data accuracy may affect subsequent analysis and simulation, and once the front-end equipment is invaded in the communication process, the data may be stolen or tampered, which may further cause subsequent analysis errors.
Disclosure of Invention
The invention provides a data encryption and decryption method and a data transmission system based on data capacity, wherein the method can generate interference factors and split detection data according to the capacity of data after detection data acquired by a detection instrument are acquired, and the split data are encrypted and transmitted by using the interference factors, so that the safety of the data can be improved, the data can be prevented from being stolen or tampered in the transmission process, and the transmission efficiency of the data can be improved.
A first aspect of an embodiment of the present invention provides a data encryption method based on data capacity, where the method is applicable to an encryption terminal disposed in a front-end detection apparatus, and the method includes:
after the ocean detection data acquired by the front-end detection instrument are acquired, acquiring a data capacity value of the ocean detection data;
dividing the ocean detection data according to the data capacity value to obtain a plurality of detection data blocks;
and generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypting each detection data block by utilizing the interference factor to obtain an encrypted data block.
In a possible implementation manner of the first aspect, the generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data includes:
Searching a feature number corresponding to a front-end detection instrument based on the ocean detection data, wherein the feature number is an ID number preset by the front-end detection instrument before data acquisition;
extracting an index value of each field in a preset letter matrix one by one according to a plurality of fields contained in the feature number, wherein the index value is a position number of each field in the preset letter matrix;
and sequentially splicing the data capacity value and the index values to obtain an interference factor.
In a possible implementation manner of the first aspect, the generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data includes:
acquiring equipment parameter information of front-end detection equipment corresponding to the ocean detection data, wherein the equipment parameter information comprises: collecting time, collecting equipment model and collecting place;
respectively converting the acquisition time, the acquisition equipment model and the acquisition place into parameter fields of a preset system to obtain a time field, a model field and a place field;
respectively adding the data capacity value as a header field to the time field, the model field and the place field to respectively obtain a time processing field, a model processing field and a place processing field;
And splicing the time processing field, the model processing field and the place processing field to obtain an interference factor.
In a possible implementation manner of the first aspect, the generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data includes:
acquiring a communication protocol and a communication address of a front-end detection instrument corresponding to the ocean detection data;
combining the data capacity value with each field of the communication protocol and the communication address respectively to obtain a plurality of communication fields;
and splicing the communication fields to obtain an interference factor.
In a possible implementation manner of the first aspect, after the step of obtaining the data capacity value of the ocean detection data, the method further includes:
and respectively transmitting the data capacity value to a first database and a second database which are preset, enabling the first database and the second database to store the data capacity value, and enabling the data capacity value to be extracted by a background server when the data capacity value needs to be called for decryption, wherein the first database and the second database are databases provided with a data synchronization protocol.
In a possible implementation manner of the first aspect, after the step of encrypting each of the detection data blocks in turn by using the interference factor to obtain an encrypted data block, the method further includes:
And generating a data tag according to the data capacity value, and respectively transmitting the data tag mode to the first database and the second database so that the first database and the second database respectively divide corresponding data storage areas to store the data capacity value.
A second aspect of an embodiment of the present invention provides a data decryption method based on data capacity, where the method is applicable to a decryption terminal set in a background server, and the method includes:
respectively acquiring a data capacity value and a plurality of encrypted data blocks, wherein the data capacity value is the capacity of ocean detection data acquired by a front-end detection instrument, and the plurality of encrypted data blocks are data obtained by encrypting the separated ocean detection data according to interference factors generated by the data capacity value after the ocean detection data are separated according to the data capacity value;
and generating a decryption factor according to the data capacity value, and decrypting each encrypted data block by utilizing the decryption factor in turn to obtain decrypted data blocks.
A third aspect of an embodiment of the present invention provides a data encryption apparatus based on data capacity, the apparatus being adapted to be disposed at an encryption terminal of a front-end detection instrument, the apparatus comprising:
The method comprises the steps of acquiring a capacity value, wherein the capacity value is used for acquiring the data capacity value of ocean detection data acquired by the front-end detection instrument after acquiring the ocean detection data;
the data segmentation module is used for segmenting the ocean detection data according to the data capacity value to obtain a plurality of detection data blocks;
and the data encryption module is used for generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypting each detection data block in turn by utilizing the interference factor to obtain an encrypted data block.
In a possible implementation manner of the third aspect, the data encryption module is further configured to:
searching a feature number corresponding to a front-end detection instrument based on the ocean detection data, wherein the feature number is an ID number preset by the front-end detection instrument before data acquisition;
extracting an index value of each field in a preset letter matrix one by one according to a plurality of fields contained in the feature number, wherein the index value is a position number of each field in the preset letter matrix;
and sequentially splicing the data capacity value and the index values to obtain an interference factor.
In a possible implementation manner of the third aspect, the data encryption module is further configured to:
Acquiring equipment parameter information of front-end detection equipment corresponding to the ocean detection data, wherein the equipment parameter information comprises: collecting time, collecting equipment model and collecting place;
respectively converting the acquisition time, the acquisition equipment model and the acquisition place into parameter fields of a preset system to obtain a time field, a model field and a place field;
respectively adding the data capacity value as a header field to the time field, the model field and the place field to respectively obtain a time processing field, a model processing field and a place processing field;
and splicing the time processing field, the model processing field and the place processing field to obtain an interference factor.
In a possible implementation manner of the third aspect, the data encryption module is further configured to:
acquiring a communication protocol and a communication address of a front-end detection instrument corresponding to the ocean detection data;
combining the data capacity value with each field of the communication protocol and the communication address respectively to obtain a plurality of communication fields;
and splicing the communication fields to obtain an interference factor.
In a possible implementation manner of the third aspect, the apparatus further includes:
The capacity value sending module is used for respectively transmitting the data capacity value to a first database and a second database which are preset, enabling the first database and the second database to store the data capacity value, and enabling the data capacity value to be extracted by a background server when the data capacity value needs to be called for decryption, wherein the first database and the second database are databases provided with a data synchronization protocol.
In a possible implementation manner of the third aspect, the apparatus further includes:
and the label generating module is used for generating a data label according to the data capacity value, and respectively transmitting the data label mode to the first database and the second database so that the first database and the second database respectively divide corresponding data storage areas to store the data capacity value.
A fourth aspect of the embodiments of the present invention provides a data decrypting apparatus based on data capacity, the apparatus being adapted to a decrypting terminal provided at a background server, the apparatus comprising:
the system comprises an acquisition encryption data module, a data capacity value acquisition module and a data encryption module, wherein the acquisition encryption data module is used for respectively acquiring a data capacity value and a plurality of encryption data blocks, the data capacity value is the capacity of ocean detection data acquired by a front-end detection instrument, and the plurality of encryption data blocks are data obtained by encrypting the separated ocean detection data according to interference factors generated by the data capacity value after the ocean detection data are separated according to the data capacity value;
And the data decryption module is used for generating decryption factors according to the data capacity values, and decrypting each encrypted data block by utilizing the decryption factors in turn to obtain decrypted data blocks.
A fifth aspect of an embodiment of the present invention provides a data transmission system based on data capacity, the system comprising: the system comprises a background server, a first database, a second database and a plurality of front-end detection instruments;
wherein, the background server is provided with a decryption terminal suitable for the data capacity-based data decryption method, and each front-end detection instrument is provided with an encryption terminal suitable for the data capacity-based data encryption method;
the encryption terminal is respectively communicated with the first database, the second database and the decryption terminal, and the decryption terminal is respectively communicated with the first database and the second database.
Compared with the prior art, the data encryption and decryption method and the data transmission system based on the data capacity have the beneficial effects that: according to the invention, each marine detection instrument can acquire marine detection data, then the marine detection data is split according to the data capacity value of the marine detection data, the interference factor used for encryption is generated, the split data is encrypted by the interference factor, and the encrypted data is transmitted to the background server.
Drawings
Fig. 1 is a schematic flow chart of a data encryption method based on data capacity according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a predetermined letter matrix according to an embodiment of the present application;
FIG. 3 is a flow chart of a data decryption method based on data capacity according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data encryption device based on data capacity according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data decrypting apparatus based on data capacity according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a data transmission system based on data capacity according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In order to solve the above-mentioned problems, a data encryption method based on data capacity according to an embodiment of the present application will be described and illustrated in detail by the following specific examples.
Referring to fig. 1, a flow chart of a data encryption method based on data capacity according to an embodiment of the present invention is shown.
In an embodiment, the method is applicable to an encrypted terminal provided at a front-end detection instrument. The terminal may be an encryption device. The front-end detector may be an instrument for detecting marine data, such as a marine observation instrument, a chlorophyll handheld meter, a multiparameter water quality meter, a portable infrared oil meter, and the like.
Each front-end detection instrument can be in communication connection with the background server through the encryption terminal, the encryption terminal encrypts data collected by the instrument, and then the encrypted data are transmitted to the background server for corresponding storage, analysis, display, management and other operations by the background server.
The data encryption method based on data capacity may include, as an example:
s11, acquiring the data capacity value of the ocean detection data after acquiring the ocean detection data acquired by the front-end detection instrument.
In one embodiment, the front-end detection instrument may collect data in real time to obtain ocean detection data. The data collected by different instruments may be different, for example, the marine detection data collected by the chlorophyll handheld meter may be the content of chlorophyll in the ocean; the ocean detection data collected by the multi-parameter water quality tester can be the content of COD in water, the content of ammonia nitrogen, the content of total phosphorus, the content of total nitrogen and the like; the ocean detection data collected by the portable infrared oil meter can be the content of oil in water, the petroleum content, the content of animal and vegetable oil and the like.
After data are collected, each front-end detection instrument can be transmitted to the encryption terminal. After receiving the ocean detection data, the encryption terminal can detect the data capacity value of the ocean detection data. The data capacity value is specifically a numerical value of the data amount, for example, 30k, 512k, 1 megabit, 5G, and the like.
It should be noted that the ocean detection data collected by different instruments may be different, and the formats may also be different, and the encryption terminal may first perform format conversion to convert each data into a corresponding data sequence.
For example, the multiparameter water quality measuring instrument has built-in optical method to reflect light wave of 340nm, 420nm, 440nm, etc. to water and to receive corresponding reflected wave form. The detected substance is recorded according to the waveform.
After the waveform is received, the amplitude or rising edge of the waveform can be converted into a corresponding data sequence, such as "001100011 … 00101".
And determining the data capacity value of the data by recording the length of the data sequence.
In one embodiment, subsequent operations require encryption with the data capacity value. After encryption, the backend server needs to decrypt it. In order to facilitate the background server to obtain the data capacity value.
In one embodiment, two databases, a first database and a second database, respectively, may be provided. The first database and the second database can be both in communication connection with the encryption terminal, and the background server can be also in communication connection with the first database and the second database respectively.
As an example, after step S11, the method may further include the steps of:
s21, the data capacity value is transmitted to a first database and a second database which are preset respectively, the data capacity value is stored in the first database and the second database, and the data capacity value is required to be called for decryption and is extracted by a background server, wherein the first database and the second database are databases provided with a data synchronization protocol.
In an embodiment, the encryption terminal may transmit the data capacity value to the first database and the second database after acquiring the data capacity value, where the data capacity value may be stored in the first database and the second database.
When the background server needs to decrypt the data encrypted by the encryption terminal, the background server can extract the data capacity value from the first database or the second database and then decrypt according to the data capacity value.
The two data base storage data capacity values are set mainly to avoid the situation that a background server cannot extract the data capacity values and further cannot decrypt data because any one of the data bases does not respond or fails.
In addition, the data capacity value is stored in the database, and the communication burden of the encryption terminal can be reduced without the need of the encryption terminal to communicate with the background server for a plurality of times.
In addition, two databases may fail or power down, resulting in failure to store data capacity values, etc.
To avoid this, the first database and the second database may be provided with a data synchronization protocol.
The operation in the data synchronization protocol may specifically be as follows:
the first database and the second database can be in communication connection, and both databases can detect whether data is stored or received in real time. When data is stored or received, a data synchronization message can be generated according to the received data, then the data message is sent to another database, and after the data synchronization message is received, the other database can judge whether the data corresponding to the data synchronization message is received. If the data corresponding to the data synchronous message is received, feeding back an updated feedback message, and notifying the other database that the data is received; if the data corresponding to the data synchronization message is not received, an un-updated message can be fed back, and the other database is informed to send updated data to the un-updated message, so that the two databases can acquire the updated data at the same time.
For example, a first database a and a second database B. When the first database a receives a data C, a data synchronization message corresponding to the data C may be generated, and the data synchronization message may be sent to the second database B. The second database B may determine whether the data C is received according to the data sync message. If data C is received, the second database B may generate an update feedback message and send it to the first database A. If no data C is received, the second database B may generate an unepdated message and send it to the first database A. The first database a may send the data C to the second database B for the second database B to store after receiving the non-updated message.
Because the first database and the second database are provided with a data synchronization mechanism, when the information or data of any one database is changed, the information or data can be transmitted to the other database, and the other database can update the information or data of the other database so as to realize information synchronization.
After synchronization, since the two databases receive the data capacity value, the data is the data needed for decryption that the background server will need to do. In order to facilitate the call of the background server, the two databases can store the updated data into the corresponding caches, and when the background server calls, the corresponding data can be quickly extracted from the caches.
And S12, dividing the ocean detection data according to the data capacity value to obtain a plurality of detection data blocks.
In one embodiment, the marine survey data may be data collected by a front-end survey instrument over a period of time, for example, the marine survey data is a multiparameter water quality survey meter that measures water salinity of the ocean from 5 to 7 am. Correspondingly, the acquired marine survey data are two hours of water salinity data.
With reference to the above example, the two hours of data may be 50 megabytes or 500 megabytes of data.
If the large data is directly encrypted, the encrypted data is transmitted to the background server, and the encryption terminal and the background server both need larger communication bandwidth, have high requirements on communication and have high cost. And because of the large data volume, the time consumption of transmission is long, and the communication efficiency is low.
In order to shorten the data transmission time and reduce the communication bandwidth, the ocean detection data can be divided into a plurality of detection data blocks.
In an alternative embodiment, the rule of segmentation may be based on the size of the data capacity value.
For example, when the data capacity value of the collected marine detection data is 600k and the capacity interval is 300k, 600k/300 k=2 can be calculated, and the marine detection data collected in real time can be divided into 2 detection data blocks.
For another example, when the data capacity value of the collected ocean detection data is 63k and the capacity interval is 4k, 63k/4 k=15 ocean detection data can be calculated, and when the ocean detection data is 3k, the ocean detection data collected in real time can be divided into 16 detection data blocks, the first 15 detection data blocks are 4k, and the 16 th detection data block is 3k.
In yet another alternative embodiment, the rule of division may be divided according to the size of the communication bandwidth of the encrypted terminal and the background server transmitting the data block.
For example, when the data capacity value of the collected ocean detection data is 600k and the maximum capacity of the transmission data blocks of the encryption terminal and the background server is 50k, 600k/50 k=12 can be calculated, and the ocean detection data collected in real time can be divided into 12 detection data blocks.
For another example, when the data capacity value of the collected ocean detection data is 630k and the maximum capacity of the transmission data blocks of the encryption terminal and the background server is 50k, 630k/50 k=12 ocean detection data can be calculated, and when the ocean detection data remains 30k, the ocean detection data collected in real time can be divided into 13 detection data blocks, the first 12 detection data blocks are 50k, and the 13 th detection data block is 30k.
In actual operation, each detection data block can be encrypted according to the data capacity value, and the encrypted detection data blocks are sent to the background server.
S13, generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypting each detection data block by utilizing the interference factor to obtain an encrypted data block.
In an embodiment, the interference factor may be generated according to a specific rule by using the value of the data capacity value and the characteristic information corresponding to the ocean detection data. The interference factor may be used as an encryption key to encrypt each detected data block to form an encrypted data block.
In an embodiment, the characteristic information may be information of an instrument that collects the ocean detection data, for example, an instrument number, model number, etc.; may be information about the marine survey data, such as acquisition time, location, etc. Because the data is different in each time, and the instrument, the time and the place for each time of data acquisition are different, the data capacity value and the characteristic information corresponding to the ocean detection data are different, a specific interference factor can be generated by combining the data capacity value and the characteristic information, and then the interference factor is used for encryption, so that the safety of the data can be effectively improved, the falsification is avoided, and the safety of the data is ensured.
In one embodiment, the characteristic information corresponding to the ocean detection data is a characteristic number corresponding to the front-end detection instrument.
Wherein, as an example, the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data includes:
s31, searching for a characteristic number corresponding to the front-end detection instrument based on the ocean detection data, wherein the characteristic number is an ID number preset by the front-end detection instrument before data acquisition.
S32, extracting index values of each field in a preset letter matrix one by one according to a plurality of fields contained in the feature numbers, wherein the index values are position numbers of each field in the preset letter matrix.
S33, sequentially splicing the data capacity value and the index values to obtain an interference factor.
In an implementation manner, the feature number is an ID number preset by the front-end detection instrument before data is collected. For example, the front end detector is a second ocean observer with an ID number NBA; if the front-end detector is a fifth chlorophyll handheld detector, the ID number of the detector is DNF; the front end detector is a sixth multi-parameter water quality tester, and the ID number of the front end detector is FUC; the front end detector is a third portable infrared oil detector, and the ID number of the front end detector is LOL and the like.
The respective ID numbers may be preset by the user. The ID numbers can distinguish a plurality of different front-end detection instruments, so that the follow-up management is convenient.
After determining the ID numbers, each ID number has several fields, for example, a fifth hand-held chlorophyll meter, with ID numbers DNF, and three fields, respectively "D", "N", and "F".
Then, according to the three fields of "D", "N" and "F", the index value of each field can be extracted from the preset alphabetic matrix one by one, where the index value is the position number of each field in the preset alphabetic matrix.
Referring to fig. 2, a schematic diagram of a preset letter matrix according to an embodiment of the present invention is shown.
In one embodiment, the field "D" is in the fourth row and column of the alphabet matrix, the corresponding index value is 4, the field "N" is in the fourteenth row and column of the alphabet matrix, the corresponding index value is 14, and the field "F" is in the sixth row and column of the alphabet matrix, the corresponding index value is 6. Assuming a data capacity value of 500k, "500," "4," "14," and "6" may be spliced together to form "5004146" and "5004146" is used as an interference factor to encrypt the detected data block.
Alternatively, the data capacity value and the index value may be converted into corresponding values, and then a plurality of values may be spliced together to obtain the interference factor.
It should be noted that the splicing mode can be adjusted according to actual needs.
The invention searches the corresponding index through the equipment ID number, takes the index as the basis of the interference factor, combines the data capacity value, can generate a specific interference factor, and then encrypts the data by using the interference factor, thereby greatly improving the safety of the data and avoiding the data from being cracked and stolen.
In one embodiment, the characteristic information corresponding to the ocean detection data is device parameter information of the front-end detection device, where the device parameter information includes: acquisition time, acquisition equipment model and acquisition place.
Wherein the acquisition time is the start time of the instrument to acquire marine survey data, e.g., 08:12:00. The acquisition device model may be a device signal of a front-end detection device, e.g., the front-end detection device is a multi-parameter water quality meter, the model of which is HL-2000E, then the acquisition device model of the device is HL-2000E. The collection location refers to a coordinate point of the collected ocean detection data, and specifically may be longitude and latitude coordinates.
Wherein, as an example, the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data includes:
s41, acquiring equipment parameter information of front-end detection equipment corresponding to the ocean detection data, wherein the equipment parameter information comprises: acquisition time, acquisition equipment model and acquisition place.
S42, respectively converting the acquisition time, the acquisition equipment model and the acquisition place into parameter fields of a preset system to obtain a time field, a model field and a place field.
S43, taking the data capacity value as a header field and respectively adding the header field to the time field, the model field and the place field to respectively obtain a time processing field, a model processing field and a place processing field.
S44, splicing the time processing field, the model processing field and the place processing field to obtain an interference factor.
In a specific implementation, the device parameter information of each front-end detection device may be stored in a database in advance, and the encryption terminal may obtain the device parameter information of the front-end detection device from the database.
For the acquisition time and the acquisition place, the time of acquiring the data by the front-end detection equipment can be directly acquired to obtain the acquisition time, and then the place of acquiring the data is acquired from the real-time positioning information of the front-end detection equipment to obtain the coordinates of the acquisition place.
Then, the collection time, the collection equipment model and the collection place can be respectively converted into parameter fields of a preset system, so that a time field corresponding to the collection time, a model field corresponding to the collection equipment model and a place field corresponding to the collection place can be obtained.
For example, the acquisition time, acquisition device model, and acquisition location may be converted into binary parameter fields, respectively, and the corresponding time, model, and location fields may be "101101 … 101", "00111 … 1011", and "01110..1110", respectively.
Then, the value of the data capacity value may be used as the header fields of the time field, the model field and the place field, and this is used as the preamble of the fields. For example, the time field, model field, and place field may be "101101 … 101", "00111 … 1011", and "01110..1110", respectively, and the data capacity value is 512k. The "512" field may be added at the beginning of the three above fields, resulting in "512101101 … 101", "51200111 … 1011" and "512011110..1110".
And finally, sequentially splicing the time processing field, the model processing field and the place processing field to form an interference factor, and encrypting the detection data block by using the interference factor.
According to the invention, the acquisition time, the acquisition equipment model and the acquisition place of the instrument are acquired, the acquisition time, the acquisition equipment model and the acquisition place are converted into the corresponding system numerical values, and then the data capacity value is combined, so that a specific interference factor can be generated, and the interference factor is utilized to encrypt data, thereby greatly improving the safety of the data and avoiding the data from being cracked and stolen.
In one embodiment, the characteristic information corresponding to the ocean detection data is a communication protocol and a communication address of the front-end detection instrument.
Wherein, the communication protocol is the communication protocol between the front-end detecting instrument and the background server, and can include: network communication protocol, data interface protocol, hybrid framing transmission protocol, and system control reporting protocol.
The communication address is the address in the process of the front-end detection instrument communicating with the background server. For example, 0x1ADD, 0x00210, etc.
Wherein, as an example, the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data includes:
s51, acquiring a communication protocol and a communication address of the front-end detection instrument corresponding to the ocean detection data.
And S52, respectively combining the data capacity value with each field of the communication protocol and the communication address to obtain a plurality of communication fields.
And S53, splicing the communication fields to obtain interference factors.
In a specific implementation, a front-end detection instrument corresponding to the ocean detection data can be determined and acquired, and then a communication protocol and a communication address of the front-end detection instrument and a background server are obtained.
In an embodiment, the communication protocol is a network communication protocol, such as the TCP/IP protocol, the NETBEUI protocol, or the IPX/SPX protocol. The communication address is a communication address between the front-end detecting device and the background server, for example, 0x1ADD, 0x00210, and the like.
The numeric field of the data capacity value may be combined with a field of the communication protocol and the numeric field of the data capacity value and a field of the communication address.
For example, the communication protocol is TCP/IP protocol, and the field of the corresponding communication protocol is TCP-IP; the communication address is 0x1ADD, and the field of the corresponding communication address is 0x1ADD. For example, the data capacity value is 512k, and the corresponding field of the data capacity value is 512.
512 may be combined with TCP-IP to obtain 512-TCP-IP, and 512 may be combined with 0x1ADD to obtain 512-0x1ADD.
And (3) splicing the two fields to form '512-TCP-IP-512-0 x1 ADD', and sequentially using the two fields as interference factors to encrypt data.
Because the communication address and the data capacity value corresponding to the ocean detection data are unique, a specific interference factor can be generated by combining the data capacity value, the communication address and the communication protocol, and then the interference factor is utilized for data encryption, so that the safety of the data can be greatly improved, and the data can be prevented from being cracked and stolen.
According to the foregoing description, each data capacity value is a parameter obtained by data acquisition by a specific front-end detection instrument, and the parameter is unique and specific. To distinguish between different data capacity values, the background server is facilitated to extract the data capacity values, wherein the method may further comprise, as an example:
and S14, generating a data tag according to the data capacity value, and respectively transmitting the data tag mode to the first database and the second database so that the first database and the second database respectively divide corresponding data storage areas to store the data capacity value.
In one practical operation, the encryption terminal may generate a data tag based on the data capacity value. The specific generation mode may be to record the value of the data capacity value, and then compile the value of the data capacity value through a compiler to obtain the compiling result as the data tag.
And then the data is labeled to the background server, the first database and the second database. The two databases may divide a corresponding data storage area according to the data tag, store the data capacity value in the corresponding data storage area, and add the data tag to the data storage area.
When the background server needs to call the data capacity value, an extraction request can be generated according to the data tag, then the two databases can determine the data storage area according to the data tag corresponding to the extraction request, then the data capacity value is extracted from the data storage area and fed back to the background server for decryption of the background server.
In this embodiment, the embodiment of the present invention provides a data encryption method based on data capacity, which has the following beneficial effects: according to the invention, each marine detection instrument can acquire marine detection data, then the marine detection data is split according to the data capacity value of the marine detection data, the interference factor used for encryption is generated, the split data is encrypted by the interference factor, and the encrypted data is transmitted to the background server.
Referring to fig. 3, a flow chart of a data decryption method based on data capacity according to an embodiment of the present invention is shown.
In an embodiment, the method is applicable to a decryption terminal provided at a backend server. In particular, the decryption terminal may be communicatively coupled to the encryption terminal, the first database, and the second database, respectively.
The data capacity-based data decryption method may include, as an example:
s51, respectively acquiring a data capacity value and a plurality of encrypted data blocks, wherein the data capacity value is the capacity of ocean detection data acquired by a front-end detection instrument, and the plurality of encrypted data blocks are data obtained by encrypting the separated ocean detection data according to interference factors generated by the data capacity value after the ocean detection data are separated according to the data capacity value.
S52, generating a decryption factor according to the data capacity value, and decrypting each encrypted data block by utilizing the decryption factor in turn to obtain decrypted data blocks.
In a specific implementation, the decryption terminal may obtain a plurality of encrypted data blocks from the encryption terminal. Each encryption database is used for acquiring ocean detection data acquired by a front-end detection instrument and a data capacity value corresponding to the ocean detection data by an encryption terminal; dividing ocean detection data according to the data capacity value to obtain a plurality of detection data blocks; and finally, generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypting each detection data block in turn by utilizing the interference factor to obtain data. Specifically, the above-described encrypted data block may be generated according to the disclosure of the above-described embodiment.
In an embodiment, the data capacity value may be obtained by the decryption terminal from the first database or the second database. Specifically, the data capacity value can be extracted from the first database or the second database according to the data label corresponding to the data capacity value.
Next, a decryption factor may be generated according to the data capacity values in the manner of steps S31-S33, S41-S44 or S51-S53 of the above-described embodiments. And then the decryption factor is used for decrypting the encrypted database.
In one embodiment, since there are a plurality of encrypted data blocks, the plurality of encrypted data blocks may be decrypted and then the plurality of decrypted data may be combined, thereby restoring the ocean detection data.
Finally, the background server can perform corresponding predictive analysis according to the ocean detection data. For example, early warning analysis, marine ecology analysis, etc. may be performed.
In this embodiment, the embodiment of the present invention provides a data decryption method based on data capacity, which has the following beneficial effects: the invention can obtain the encrypted data block from the encryption terminal of the ocean detection instrument and the data capacity value from the database, generate the decryption factor according to the data capacity value and decrypt each encrypted data by utilizing the decryption factor, and combine the encrypted data after decryption to restore the ocean detection data, and transmit the encrypted data to the background server after encryption is finished.
The embodiment of the invention also provides a data encryption device based on the data capacity, and referring to fig. 4, a schematic structural diagram of the data encryption device based on the data capacity is shown.
The method is suitable for the encryption terminal arranged on the front-end detection instrument.
Wherein, as an example, the data capacity-based data encryption device may include:
the acquiring capacity value 401 is configured to acquire a data capacity value of the ocean detection data after acquiring the ocean detection data acquired by the front-end detection instrument;
a data dividing module 402, configured to divide the ocean detection data according to the data capacity value to obtain a plurality of detection data blocks;
and the data encryption module 403 is configured to generate an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypt each detection data block in turn by using the interference factor to obtain an encrypted data block.
Optionally, the data encryption module is further configured to:
searching a feature number corresponding to a front-end detection instrument based on the ocean detection data, wherein the feature number is an ID number preset by the front-end detection instrument before data acquisition;
Extracting an index value of each field in a preset letter matrix one by one according to a plurality of fields contained in the feature number, wherein the index value is a position number of each field in the preset letter matrix;
and sequentially splicing the data capacity value and the index values to obtain an interference factor.
Optionally, the data encryption module is further configured to:
acquiring equipment parameter information of front-end detection equipment corresponding to the ocean detection data, wherein the equipment parameter information comprises: collecting time, collecting equipment model and collecting place;
respectively converting the acquisition time, the acquisition equipment model and the acquisition place into parameter fields of a preset system to obtain a time field, a model field and a place field;
respectively adding the data capacity value as a header field to the time field, the model field and the place field to respectively obtain a time processing field, a model processing field and a place processing field;
and splicing the time processing field, the model processing field and the place processing field to obtain an interference factor.
Optionally, the data encryption module is further configured to:
acquiring a communication protocol and a communication address of a front-end detection instrument corresponding to the ocean detection data;
Combining the data capacity value with each field of the communication protocol and the communication address respectively to obtain a plurality of communication fields;
and splicing the communication fields to obtain an interference factor.
Optionally, the apparatus further comprises:
the capacity value sending module is used for respectively transmitting the data capacity value to a first database and a second database which are preset, enabling the first database and the second database to store the data capacity value, and enabling the data capacity value to be extracted by a background server when the data capacity value needs to be called for decryption, wherein the first database and the second database are databases provided with a data synchronization protocol.
Optionally, the apparatus further comprises:
and the label generating module is used for generating a data label according to the data capacity value, and respectively transmitting the data label mode to the first database and the second database so that the first database and the second database respectively divide corresponding data storage areas to store the data capacity value.
The embodiment of the invention also provides a data decrypting device based on the data capacity, and referring to fig. 5, a schematic structural diagram of the data decrypting device based on the data capacity is shown.
The device is suitable for a decryption terminal arranged at a background server.
Wherein, as an example, the data capacity-based data decryption apparatus may include:
the data acquisition and encryption module 501 is configured to acquire a data capacity value and a plurality of encrypted data blocks, where the data capacity value is related to the capacity of ocean detection data acquired by a front-end detection instrument, and the plurality of encrypted data blocks are data obtained by encrypting the segmented ocean detection data according to interference factors generated by the data capacity value after the ocean detection data is segmented according to the data capacity value;
and the data decryption module 502 is configured to generate a decryption factor according to the data capacity value, and decrypt each encrypted data block in turn by using the decryption factor to obtain a decrypted data block.
The embodiment of the invention also provides a data transmission system based on data capacity, and referring to fig. 6, a schematic structural diagram of the data transmission system based on data capacity according to an embodiment of the invention is shown.
Among others, the data capacity-based data transmission system may include, as an example: the system comprises a background server, a first database, a second database and a plurality of front-end detection instruments;
Wherein the background server is provided with a decryption terminal suitable for the data capacity-based data decryption method according to the above embodiment, and each front-end detection instrument is provided with an encryption terminal suitable for the data capacity-based data encryption method according to the above embodiment;
the encryption terminal is respectively communicated with the first database, the second database and the decryption terminal, and the decryption terminal is respectively communicated with the first database and the second database.
Specifically, the front-end detecting instrument may collect ocean data and then let the encryption terminal encrypt the data. And the encryption terminal can send the data capacity value of the data to the first database and the second database. The background server can acquire the data capacity value from the first database and the second database, and the decryption terminal generates a decryption factor according to the data capacity value to decrypt the encrypted data.
The system can encrypt and divide the data, and realize the effect of data safety transmission so as to improve the safety of the data and avoid the data from being stolen or tampered.
It is noted that the data transmission system based on data capacity may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by instructing related hardware by a computer program, where the computer program may be stored in a computer readable storage medium, and the computer program may implement the steps of each of the method embodiments described above when executed by a processor.
It will be clearly understood by those skilled in the art that, for convenience and brevity, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Further, an embodiment of the present application further provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the data capacity based data encryption method as described in the above embodiments or the data capacity based data decryption method as described in the above embodiments when executing the program.
Further, an embodiment of the present application also provides a computer-readable storage medium storing a computer-executable program for causing a computer to execute the data capacity-based data encryption method as described in the above embodiment or the data capacity-based data decryption method as described in the above embodiment.
It will be appreciated by those skilled in the art that embodiments of the present application may also be provided including a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), devices and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.

Claims (7)

1. A data encryption method based on data capacity, the method being suitable for an encryption terminal provided at a front-end detection instrument, the method comprising:
after the ocean detection data acquired by the front-end detection instrument are acquired, acquiring a data capacity value of the ocean detection data;
dividing the ocean detection data according to the data capacity value to obtain a plurality of detection data blocks;
Generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypting each detection data block by utilizing the interference factor to obtain an encrypted data block;
the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data comprises the following steps:
searching a feature number corresponding to a front-end detection instrument based on the ocean detection data, wherein the feature number is an ID number preset by the front-end detection instrument before data acquisition;
extracting an index value of each field in a preset letter matrix one by one according to a plurality of fields contained in the feature number, wherein the index value is a position number of each field in the preset letter matrix;
sequentially splicing the data capacity value and a plurality of index values to obtain interference factors;
the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data comprises the following steps:
acquiring equipment parameter information of front-end detection equipment corresponding to the ocean detection data, wherein the equipment parameter information comprises: collecting time, collecting equipment model and collecting place;
Respectively converting the acquisition time, the acquisition equipment model and the acquisition place into parameter fields of a preset system to obtain a time field, a model field and a place field;
respectively adding the data capacity value as a header field to the time field, the model field and the place field to respectively obtain a time processing field, a model processing field and a place processing field;
splicing the time processing field, the model processing field and the place processing field to obtain an interference factor;
the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data comprises the following steps:
acquiring a communication protocol and a communication address of a front-end detection instrument corresponding to the ocean detection data;
combining the data capacity value with each field of the communication protocol and the communication address respectively to obtain a plurality of communication fields;
and splicing the communication fields to obtain an interference factor.
2. The data capacity-based data encryption method according to claim 1, wherein after the step of acquiring the data capacity value of the marine survey data, the method further comprises:
And respectively transmitting the data capacity value to a first database and a second database which are preset, enabling the first database and the second database to store the data capacity value, and enabling the data capacity value to be extracted by a background server when the data capacity value needs to be called for decryption, wherein the first database and the second database are databases provided with a data synchronization protocol.
3. The data capacity-based data encryption method according to claim 2, wherein after the step of encrypting each of the detected data blocks in turn by using the interference factor to obtain an encrypted data block, the method further comprises:
and generating a data tag according to the data capacity value, and respectively transmitting the data tag mode to the first database and the second database so that the first database and the second database respectively divide corresponding data storage areas to store the data capacity value.
4. A data decryption method based on data capacity, the method being suitable for a decryption terminal provided at a background server, the method comprising:
respectively acquiring a data capacity value and a plurality of encrypted data blocks, wherein the data capacity value is the capacity of ocean detection data acquired by a front-end detection instrument, and the plurality of encrypted data blocks are data obtained by encrypting the separated ocean detection data according to interference factors generated by the data capacity value after the ocean detection data are separated according to the data capacity value;
And generating a decryption factor according to the data capacity value, and decrypting each encrypted data block by utilizing the decryption factor in turn to obtain decrypted data blocks.
5. A data encryption device based on data capacity, said device being adapted for an encryption terminal provided at a front-end detection instrument, said device comprising:
the method comprises the steps of acquiring a capacity value, wherein the capacity value is used for acquiring the data capacity value of ocean detection data acquired by the front-end detection instrument after acquiring the ocean detection data;
the data segmentation module is used for segmenting the ocean detection data according to the data capacity value to obtain a plurality of detection data blocks;
the data encryption module is used for generating an interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data, and encrypting each detection data block in sequence by utilizing the interference factor to obtain an encrypted data block;
the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data comprises the following steps:
searching a feature number corresponding to a front-end detection instrument based on the ocean detection data, wherein the feature number is an ID number preset by the front-end detection instrument before data acquisition;
Extracting an index value of each field in a preset letter matrix one by one according to a plurality of fields contained in the feature number, wherein the index value is a position number of each field in the preset letter matrix;
sequentially splicing the data capacity value and a plurality of index values to obtain interference factors;
the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data comprises the following steps:
acquiring equipment parameter information of front-end detection equipment corresponding to the ocean detection data, wherein the equipment parameter information comprises: collecting time, collecting equipment model and collecting place;
respectively converting the acquisition time, the acquisition equipment model and the acquisition place into parameter fields of a preset system to obtain a time field, a model field and a place field;
respectively adding the data capacity value as a header field to the time field, the model field and the place field to respectively obtain a time processing field, a model processing field and a place processing field;
splicing the time processing field, the model processing field and the place processing field to obtain an interference factor;
the generating the interference factor according to the data capacity value and the characteristic information corresponding to the ocean detection data comprises the following steps:
Acquiring a communication protocol and a communication address of a front-end detection instrument corresponding to the ocean detection data;
combining the data capacity value with each field of the communication protocol and the communication address respectively to obtain a plurality of communication fields;
and splicing the communication fields to obtain an interference factor.
6. A data decrypting apparatus based on a data capacity, the apparatus being adapted to a decrypting terminal provided at a background server, the apparatus comprising:
the system comprises an acquisition encryption data module, a data capacity value acquisition module and a data encryption module, wherein the acquisition encryption data module is used for respectively acquiring a data capacity value and a plurality of encryption data blocks, the data capacity value is the capacity of ocean detection data acquired by a front-end detection instrument, and the plurality of encryption data blocks are data obtained by encrypting the separated ocean detection data according to interference factors generated by the data capacity value after the ocean detection data are separated according to the data capacity value;
and the data decryption module is used for generating decryption factors according to the data capacity values, and decrypting each encrypted data block by utilizing the decryption factors in turn to obtain decrypted data blocks.
7. A data capacity-based data transmission system, the system comprising: the system comprises a background server, a first database, a second database and a plurality of front-end detection instruments;
Wherein the background server is provided with a decryption terminal suitable for the data capacity-based data decryption method as claimed in claim 4, and each of the front-end detection apparatuses is provided with an encryption terminal suitable for the data capacity-based data encryption method as claimed in any one of claims 1 to 3;
the encryption terminal is respectively communicated with the first database, the second database and the decryption terminal, and the decryption terminal is respectively communicated with the first database and the second database.
CN202311203852.6A 2023-09-19 2023-09-19 Data encryption and decryption method based on data capacity and data transmission system Active CN116962077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311203852.6A CN116962077B (en) 2023-09-19 2023-09-19 Data encryption and decryption method based on data capacity and data transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311203852.6A CN116962077B (en) 2023-09-19 2023-09-19 Data encryption and decryption method based on data capacity and data transmission system

Publications (2)

Publication Number Publication Date
CN116962077A true CN116962077A (en) 2023-10-27
CN116962077B CN116962077B (en) 2023-12-19

Family

ID=88442785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311203852.6A Active CN116962077B (en) 2023-09-19 2023-09-19 Data encryption and decryption method based on data capacity and data transmission system

Country Status (1)

Country Link
CN (1) CN116962077B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080008319A1 (en) * 2005-11-14 2008-01-10 Universal Data Protection Corporation Method and system for security of data transmissions
CN113573306A (en) * 2021-04-29 2021-10-29 中国南方电网有限责任公司 5G-fused heterogeneous networking gateway encryption method and system
CN114390317A (en) * 2022-01-18 2022-04-22 山东点盾云网络科技有限公司 Encryption method and system for streaming video
CN114567878A (en) * 2022-02-17 2022-05-31 广州贝鼎科技有限公司 Internet of things base station, data return processing system and data return processing method
CN115865461A (en) * 2022-11-25 2023-03-28 贵州电网有限责任公司 Method and system for distributing data in high-performance computing cluster

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080008319A1 (en) * 2005-11-14 2008-01-10 Universal Data Protection Corporation Method and system for security of data transmissions
CN113573306A (en) * 2021-04-29 2021-10-29 中国南方电网有限责任公司 5G-fused heterogeneous networking gateway encryption method and system
CN114390317A (en) * 2022-01-18 2022-04-22 山东点盾云网络科技有限公司 Encryption method and system for streaming video
CN114567878A (en) * 2022-02-17 2022-05-31 广州贝鼎科技有限公司 Internet of things base station, data return processing system and data return processing method
CN115865461A (en) * 2022-11-25 2023-03-28 贵州电网有限责任公司 Method and system for distributing data in high-performance computing cluster

Also Published As

Publication number Publication date
CN116962077B (en) 2023-12-19

Similar Documents

Publication Publication Date Title
CN107301197B (en) Service data tracking processing system and method
CN102158890B (en) Methods, equipment and systems for sending and receiving test data
CN103198010A (en) Software testing method, device and system
CN110765025A (en) Test method, test device, computer equipment and storage medium
CN110222008A (en) A kind of conversion method of data format, system, medium and electronic equipment
CN105934687A (en) Signal processing
CN111679301B (en) Testing method, device, equipment and storage medium of navigation positioning module
CN112579437B (en) Method for verifying conformity in program running process
CN111831856B (en) Metadata-based automatic holographic digital power grid data storage system and method
CN104991979A (en) Laboratory data processing method and processing system
CN116962077B (en) Data encryption and decryption method based on data capacity and data transmission system
Hammarberg et al. FGI-OSNMA: An Open Source Implementation of Galileo’s Open Service Navigation Message Authentication
CN111427796A (en) System testing method and device and electronic equipment
KR101808695B1 (en) Signature Extraction Module, Data Verification Module and integrity monitoring System for Sequence Data
CN116383533A (en) AB experiment shunting processing method, device, medium and equipment
CN110134583A (en) Software test and data processing method and device
CN115913427A (en) Beidou module testing method, device, equipment and storage medium
CN111611132B (en) Operation and maintenance analysis method, device, equipment and medium for service
US10902027B2 (en) Generation of category information for measurement value
CN116910695B (en) Marking method of equipment monitoring result and checking method of equipment monitoring data
CN117671817B (en) IRIG 106-based information display method, device, system and medium
CN110933167A (en) Block chain-based environment data storage system and tracing method
CN216647371U (en) Running state acquisition system of power terminal
WO2013094869A1 (en) System for searching recorded video to verify driving test and method for searching recorded video for same
CN117078213B (en) Building engineering management platform based on big data integration analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant