CN117240627B - Network data information secure transmission method and system - Google Patents

Network data information secure transmission method and system Download PDF

Info

Publication number
CN117240627B
CN117240627B CN202311515185.5A CN202311515185A CN117240627B CN 117240627 B CN117240627 B CN 117240627B CN 202311515185 A CN202311515185 A CN 202311515185A CN 117240627 B CN117240627 B CN 117240627B
Authority
CN
China
Prior art keywords
data
key
network
encryption
network data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311515185.5A
Other languages
Chinese (zh)
Other versions
CN117240627A (en
Inventor
李洪明
乐磊
赵浩峰
许升
程永生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jifang Industrial Control Co ltd
Original Assignee
Shenzhen Jifang Industrial Control Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jifang Industrial Control Co ltd filed Critical Shenzhen Jifang Industrial Control Co ltd
Priority to CN202311515185.5A priority Critical patent/CN117240627B/en
Publication of CN117240627A publication Critical patent/CN117240627A/en
Application granted granted Critical
Publication of CN117240627B publication Critical patent/CN117240627B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention provides a network data information secure transmission method and system, belonging to the technical field of digital information transmission. The method comprises the following steps: acquiring network data to be transmitted; extracting keywords from the network data to obtain keyword data corresponding to the network data; carrying out data classification on the keyword data according to the data classification model to obtain a data type corresponding to the network data; obtaining the number of keys corresponding to the data type according to the data type; determining a transmission speed corresponding to a network, wherein the transmission speed is used for representing the efficiency of network transmission under the current network; determining an encryption key corresponding to the network data according to the transmission speed and the number of the keys; encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data; packaging the data type and the encrypted data to obtain a packaging result; and executing transmission operation on the encapsulation result to realize information transmission of the network data.

Description

Network data information secure transmission method and system
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a network data information safety transmission method and system.
Background
Along with the development of the Internet, information transmission is often carried out in the prior art in a network communication mode, and the convenience and the flexibility of information transmission are improved through the network mode. But there are some security and privacy protection issues with information transmission over a network.
Such as data that may be subject to hacking, eavesdropping, or tampering during network transmission. Unencrypted packets are susceptible to being illegally obtained or tampered with, resulting in information leakage and data corruption. Accordingly, the related art encrypts data using an encryption technique, thereby protecting confidentiality of the data. The existing encryption algorithm such as asymmetric encryption algorithm is that a data sender encrypts through a public key and a data receiver decrypts through a private key, so that confidentiality of data is effectively guaranteed.
However, the security of the method depends on the protection of the private key, and if the private key is leaked and cracked, the encrypted data can be exposed to risks, so that the security of network data information transmission is reduced.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a network data information secure transmission method and system, which aim to solve the problems that the security of data in related encryption technology depends on protection of a private key, and when the private key is leaked or cracked, the encrypted data is exposed in risks, so that the security of network data information transmission is reduced.
In a first aspect, an embodiment of the present invention provides a method for securely transmitting network data information, including:
acquiring network data to be transmitted;
extracting keywords from the network data to obtain keyword data corresponding to the network data;
carrying out data classification on the keyword data according to a data classification model to obtain a data type corresponding to the network data;
obtaining the number of keys corresponding to the data type according to the data type;
determining a transmission speed corresponding to a network, wherein the transmission speed is used for representing the efficiency of network transmission under the current network;
determining an encryption key corresponding to the network data according to the transmission speed and the key quantity;
encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data;
packaging the data type and the encrypted data to obtain a packaging result;
and executing transmission operation on the encapsulation result to realize information transmission of the network data.
In a second aspect, an embodiment of the present invention further provides a network data information secure transmission system, which is characterized in that the system includes:
the data acquisition module is used for acquiring network data to be transmitted;
The keyword extraction module is used for extracting keywords from the network data to obtain keyword data corresponding to the network data;
the data classification module is used for carrying out data classification on the keyword data according to a data classification model to obtain a data type corresponding to the network data;
the key acquisition module is used for acquiring the number of keys corresponding to the data type according to the data type;
the speed determining module is used for determining a transmission speed corresponding to the network, wherein the transmission speed is used for representing the efficiency of network transmission under the current network;
the key determining module is used for determining an encryption key corresponding to the network data according to the transmission speed and the key quantity;
the encryption processing module is used for encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data;
the data packaging module is used for packaging the data type and the encrypted data to obtain a packaging result;
and the data transmission module is used for executing transmission operation on the encapsulation result so as to realize information transmission of the network data.
The embodiment of the invention provides a network data information secure transmission method and a system, wherein the method comprises the following steps: acquiring network data to be transmitted; extracting keywords from the network data to obtain keyword data corresponding to the network data; carrying out data classification on the keyword data according to the data classification model to obtain a data type corresponding to the network data; obtaining the number of keys corresponding to the data type according to the data type; determining a transmission speed corresponding to a network, wherein the transmission speed is used for representing the efficiency of network transmission under the current network; determining an encryption key corresponding to the network data according to the transmission speed and the number of the keys; encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data; packaging the data type and the encrypted data to obtain a packaging result; and executing transmission operation on the encapsulation result to realize information transmission of the network data. The method solves the problems that the security of data in the related encryption technology depends on the protection of the private key, and when the private key is leaked or cracked, the encrypted data is exposed in risk, so that the security of network data information transmission is reduced. The method increases the complexity and the security of the secret key, thereby improving the security of network data information transmission.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a method for securely transmitting network data information according to an embodiment of the present invention;
fig. 2 is a flow chart of a substep S103 of the network data information security transmission method in fig. 1;
fig. 3 is a schematic diagram of a scenario for implementing the network data information security transmission method provided in the present embodiment;
fig. 4 is a schematic block diagram of a network data information secure transmission system according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The embodiment of the invention provides a network data information secure transmission method and system. The network data information secure transmission method can be applied to terminal equipment, and the terminal equipment can be electronic equipment such as tablet computers, notebook computers, desktop computers, personal digital assistants, wearable equipment and the like. The terminal device may be a server or a server cluster.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flow chart of a method for securely transmitting network data information according to an embodiment of the present invention.
As shown in fig. 1, the network data information security transmission method includes steps S101 to S107.
Step S101, obtaining network data to be transmitted.
For example, in the embodiment of the present application, the data format for acquiring the network data that needs to be transmitted through the network is not limited, and those skilled in the art may set the data format according to actual requirements, for example, the network data may be text data, audio data, image data or video data.
Step S102, extracting keywords from the network data to obtain keyword data corresponding to the network data.
When the network data is text data, keyword extraction is performed on the network data by using a regular matching method, so as to obtain keyword data corresponding to the network data.
When the network data is image data, the image data is classified into a plurality of image types, so that the image data belongs to the plurality of image types, and keyword extraction is performed on the plurality of image types by using a regular matching method, so that keyword data corresponding to the network data is obtained.
When the network data is video data, firstly acquiring a key frame image corresponding to the video data, classifying the image types of the key frame image, so as to obtain a plurality of image types of the key frame image, and extracting keywords of the plurality of image types by using a regular matching method, so as to obtain the keyword data corresponding to the network data.
Optionally, the network data may be extracted by using a neural network model, and the method for extracting the keywords from the network data in the present application is not particularly limited, and the user may select according to the actual requirement.
And step S103, carrying out data classification on the keyword data according to a data classification model to obtain the data type corresponding to the network data.
The data classification model is an exemplary decision number model, and after the keyword data corresponding to the network data is obtained, the keyword data is classified by using the decision number model, so as to obtain the data type corresponding to the network data.
Optionally, the data classification model may also be a support vector machine model or a naive bayes model, etc., where the specific structure of the data classification model is not limited and may be selected according to actual requirements.
In some embodiments, the data classification model includes a data characterization layer, a data fusion layer, and a data classification layer, and the data classification is performed on the keyword data according to the data classification model to obtain a data type corresponding to the network data, specifically referring to fig. 2, step S103 includes: substep S1031 to substep S1032.
And step S1031, carrying out vector expression on the keyword data according to the data characterization layer to obtain a first vector corresponding to the keyword data.
For example, if the data representation layer is in a word2vec structure, the keyword data is expressed in a vector by using the word2vec, so as to obtain a first vector corresponding to the keyword data. Or, using one-hot to perform vector expression on the keyword data to obtain a first vector corresponding to the keyword data. In addition, the vector expression can be performed on the keyword data by using a transformation model, so that a first vector corresponding to the keyword data can be obtained.
And S1032, carrying out data fusion on the first vector according to the data fusion layer to obtain a second vector.
In an exemplary embodiment, the keyword data includes a plurality of keywords, each keyword corresponds to a first vector, and the first vectors corresponding to the keyword data are vector weighted by the data fusion layer, so as to realize data fusion and obtain a second vector.
And step S1033, carrying out data classification on the second vector according to the data classification layer to obtain the data type corresponding to the network data.
Illustratively, the second vector is data-classified using a Softmax function in the data classification layer, thereby obtaining a data type corresponding to the network data.
Step S104, obtaining the number of keys corresponding to the data type according to the data type.
Illustratively, the encryption key set is established with the data type and the encryption key corresponding to the data type, i.e., the encryption keys corresponding to the different data types are different. Thereby obtaining the number of keys corresponding to the data type in the corresponding encryption key set according to the data type.
Step S105, determining a transmission speed corresponding to the network, where the transmission speed is used to characterize the efficiency of network transmission under the current network.
The method includes the steps of obtaining a transmission speed corresponding to a current network when data is transmitted, wherein the transmission speed is used for representing efficiency of network transmission under the current network. Therefore, when the network data is encrypted later, the encryption efficiency is ensured not to influence the data transmission of the network data later.
And step S106, determining an encryption key corresponding to the network data according to the transmission speed and the key quantity.
Illustratively, whether the number of keys under the data type meets the encryption efficiency requirement is judged according to the transmission speed, and when the number of keys does not meet the encryption efficiency requirement, a new key is generated to meet the encryption efficiency. And when the number of the keys meets the requirement of encryption efficiency, sequentially distributing the encryption keys corresponding to the data types in the key set to the network data.
In some embodiments, the determining the encryption key corresponding to the network data according to the transmission speed and the key number includes: determining a key condition corresponding to the data type according to the transmission speed and the key quantity; when the key condition is a first condition, updating an encryption key set corresponding to the data type, wherein the first condition is used for representing that the number of keys corresponding to the data type is in a missing condition; and obtaining the encryption key corresponding to the network data according to the encryption key set.
Illustratively, the key conditions include a first condition for characterizing that the number of keys of the encryption key corresponding to the data type is in a missing condition, that is, that the number of keys of the encryption key corresponding to the data type is difficult to satisfy the corresponding encryption efficiency at the current transmission speed, and a second condition. The second condition is used for representing that the number of the encryption keys corresponding to the data types is in a normal condition, that is, the number of the encryption keys corresponding to the data types can meet the corresponding encryption efficiency at the current transmission speed.
The method includes the steps that the number of target keys required in current network transmission is determined according to the transmission speed, the number of the target keys is compared with the number of the keys, and when the number of the target keys is larger than the number of the keys, the condition of the keys corresponding to the data type is determined to be a first condition; and when the number of the target keys is smaller than or equal to the number of the keys, determining the key condition corresponding to the data type as a second condition.
Illustratively, when the key condition is the first condition, a new key under the data type is generated and an encryption key set corresponding to the new data type is generated, so that the encryption keys corresponding to the encryption key set are sequentially allocated to the network data.
In some embodiments, before the determining the key status corresponding to the data type according to the transmission speed and the key number, the method further includes: acquiring key information corresponding to the encryption key set, wherein the key information comprises the use frequency corresponding to the encryption key set; and according to the key information, clearing the key with the use frequency larger than the preset frequency from the encryption key set.
Illustratively, when encryption is performed using a key in the encryption key set, the frequency of use of the key is accumulated, and the accumulated result is stored. Thereby obtaining the use frequency corresponding to the key from the key information of the encryption key set. When the use frequency is larger than the preset frequency, the key corresponding to the use frequency is cleared from the key set so as to dynamically update the key in the encrypted key set, and the security and complexity of the key are improved.
In some embodiments, the updating the encryption key set corresponding to the data type includes: obtaining a corresponding key protocol when a key is generated; determining the corresponding initial position and preset step length when the key is generated; generating a new added key corresponding to the data type by using the key protocol according to the initial position and the preset step length; and updating the newly added key to an encryption key set corresponding to the data type.
Illustratively, a key protocol according to which the key is generated is obtained, a key generation position stored after the key is generated last time is taken as an initial position, and a preset step length corresponding to the key generation is set. And the initial position is obtained from the key protocol according to the initial position, a new key corresponding to the data type is generated by combining with a preset step length, and the new key is updated to the encryption key set corresponding to the data type, so that the encryption of network data can not influence the efficiency of data transmission at the transmission speed.
In some embodiments, the generating, according to the initial position and the preset step size, a new key corresponding to the data type by using the key protocol includes: acquiring an initial key, and acquiring a corresponding intermediate key from the key protocol according to the initial position and the preset step length; generating a new added key corresponding to the data type according to the initial key and the intermediate key; wherein the newly added key can be obtained according to the following formula:
new_my = mid_my+init_my*(1+jo_count),
The new_my is a new key, mid_my is an intermediate key, init_my is an initial key, jo_count is a parity variable, the parity variable is used for adjusting a mode of acquiring the new key, and the parity variable is related to transmission time corresponding to the network data.
The initial key may be a fixed key, or may be a key obtained by dynamic updating, such as updating a last generated key to the initial key.
For example, when the current initial key is a, after the key generating operation, a key B is obtained, and then the target B updates the initial key, so that the initial key is updated to B.
The initial position is a position in the key protocol corresponding to the last time the key is generated, and a corresponding intermediate key is obtained from the key protocol according to the initial position and a preset step size. And generating a new added key corresponding to the data type according to the initial key and the intermediate key by the formula new_my=mid_my+init_my (1+jo_count).
Wherein, the parity variable is used for adjusting the mode of obtaining the newly added key, when the transmission time corresponding to the network data can be divided by 2, jo_count is 0; when the transmission time corresponding to the network data is not divisible by 2, jo_count is 1. The parity variable can introduce certain change when generating a new key, so that the security and complexity in the key generation process are improved, and the confidentiality of the generated key is ensured.
In some embodiments, the obtaining the encryption key corresponding to the network data according to the encryption key set includes: acquiring transmission time corresponding to the network data; calculating the remainder of the number of the target keys corresponding to the encryption key set according to the transmission time to obtain a first remainder result; ordering all encryption keys corresponding to the encryption key set to obtain a first ordering result; and determining an encryption key corresponding to the network data according to the first ordering result and the first remainder result.
For example, the transmission time corresponding to the network data is acquired, and the transmission time may be expressed as the time corresponding to the network data to be transmitted is acquired. And carrying out remainder on the number of the target keys corresponding to the encryption key set by the transmission time to obtain a first remainder result, wherein the first remainder result is an integer between 0 and one less than the number of the target keys, and further sequencing all keys corresponding to the encryption key set according to the generation time to obtain a first sequencing result, so that the encryption keys corresponding to the network data are obtained by utilizing the first remainder result according to the first sequencing result.
For example, if the number of target keys is 3, and if the transmission time is 2, the obtained remainder result is 2, the keys in the encryption key set are ordered into an encryption key 1, an encryption key 2 and an encryption key 3, and if the key result obtainable according to the remainder result being 2 is the encryption key 3, the key result corresponding to the remainder result x is the ordered (x+1) th encryption key, so as to determine the encryption key corresponding to the network data.
And step S107, encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data.
Illustratively, the network data is encrypted using an encryption key, thereby obtaining encrypted data corresponding to the network data.
And S108, packaging the data type and the encrypted data to obtain a packaging result.
Illustratively, the data types corresponding to the encrypted data and the network data are encapsulated, and an encapsulation result is obtained.
For example, the encapsulation result may be described as { "data": encrypted data, "style": data type }.
Optionally, the packaging result may further include information such as transmission time, which is not specifically limited in the present application and may be selected according to actual needs.
And step 109, performing a transmission operation on the encapsulation result to realize information transmission of the network data.
The encapsulation result is transmitted to a receiving end of network information transmission, so as to realize information transmission of network data.
In some embodiments, after the transmitting the encapsulation result, the method further includes: analyzing the encapsulation result to obtain the data type and the encrypted data; obtaining a decryption key set corresponding to the data type; obtaining a decryption key corresponding to the encrypted data according to the decryption key set; and decrypting the encrypted data according to the decryption key to obtain the network data corresponding to the encrypted data.
Illustratively, when the receiving end receives the encrypted data, the receiving end can decrypt the encrypted data correctly, so as to achieve the effect of safe transmission of the network data.
Illustratively, the encapsulation result is parsed to obtain the corresponding data type and encrypted data in the encapsulation result; further obtaining a decryption key corresponding to the encrypted data from the decryption key set according to the data type; and then decrypting the encrypted data according to the decryption key to obtain network data corresponding to the encrypted data.
In some embodiments, the obtaining, according to the decryption key set, a decryption key corresponding to the encrypted data includes: acquiring transmission time corresponding to the encrypted data from the packaging result; calculating the remainder of the number of the target keys corresponding to the decryption key set according to the transmission time, and obtaining a second remainder result; ordering all decryption keys corresponding to the decryption key set to obtain a second ordering result; and determining a decryption key corresponding to the encrypted data according to the second sorting result and the second remainder result.
For example, the transmission time corresponding to the network data is acquired, and the transmission time may be expressed as the time corresponding to the network data to be transmitted is acquired. And carrying out redundancy on the number of the target keys corresponding to the decryption key set by the transmission time to obtain a second remainder result, wherein the decryption key set and the encryption key set are in one-to-one correspondence, the second remainder result is an integer between 0 and one less than the number of the target keys, all keys corresponding to the decryption key set are ordered according to the generation time, a second ordering result is obtained, and therefore the decryption keys corresponding to the network data are obtained according to the second ordering result by utilizing the second remainder result.
For example, if the number of target keys is 3, and the transmission time is 2, the keys in the decryption key set are ranked as decryption key 1, decryption key 2, and decryption key 3 respectively, and if the key result available according to the remainder result of 2 is decryption key 3, the key result corresponding to the remainder result x is the (x+1) th decryption key after ranking, so as to determine the decryption key corresponding to the network data.
Referring to fig. 3, fig. 3 is a schematic diagram of a scenario for implementing the method for securely transmitting network data information according to the present embodiment, as shown in fig. 3, including obtaining network data to be transmitted; extracting keywords from the network data to obtain keyword data corresponding to the network data; carrying out data classification by utilizing a data classification model according to the keyword data so as to obtain a data type corresponding to the network data; obtaining the number of keys corresponding to the data types; and determining the transmission speed corresponding to the network; determining a key condition corresponding to the data type according to the transmission speed and the number of keys; when the key condition is the first condition, obtaining a key protocol corresponding to the key generation; determining the corresponding initial position and preset step length when the key is generated; generating a new added key corresponding to the data type by using a key protocol according to the initial position and a preset step length; and updating the newly added key to the encryption key set corresponding to the data type. Acquiring transmission time corresponding to network data; performing remainder calculation on the number of target keys corresponding to the encryption key set according to the transmission time to obtain a first remainder result; ordering all encryption keys corresponding to the encryption key set to obtain a first ordering result; and determining an encryption key corresponding to the network data according to the first ordering result and the first remainder result. Encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data; packaging the data type and the encrypted data to obtain a packaging result; and further, the packaging result is transmitted to realize the information transmission of the network data. The method solves the problems that the security of data in the related encryption technology depends on the protection of the private key, and when the private key is leaked or cracked, the encrypted data is exposed in risk, so that the security of network data information transmission is reduced. The method increases the complexity and the security of the secret key, thereby improving the security of network data information transmission.
Referring to fig. 4, fig. 4 is a schematic block diagram of a network data information security transmission system according to an embodiment of the present invention. As shown in fig. 4, the network data information secure transmission system 200 includes a data acquisition module 201, a keyword extraction module 202, a data classification module 203, a key acquisition module 204, a speed determination module 205, a key determination module 206, an encryption processing module 207, a data encapsulation module 208, and a data transmission module 209, where the data acquisition module 201 is configured to acquire network data to be transmitted; a keyword extraction module 202, configured to perform keyword extraction on the network data to obtain keyword data corresponding to the network data; the data classification module 203 is configured to perform data classification on the keyword data according to a data classification model, so as to obtain a data type corresponding to the network data; a key obtaining module 204, configured to obtain, according to the data type, a number of keys corresponding to the data type; a speed determining module 205, configured to determine a transmission speed corresponding to a network, where the transmission speed is used to characterize efficiency of network transmission under a current network; a key determining module 206, configured to determine an encryption key corresponding to the network data according to the transmission speed and the number of keys; an encryption processing module 207, configured to encrypt the network data according to the encryption key, to obtain encrypted data corresponding to the network data; a data encapsulation module 208, configured to encapsulate the data type and the encrypted data to obtain an encapsulation result; and the data transmission module 209 is configured to perform a transmission operation on the encapsulation result, so as to implement information transmission of the network data.
In some embodiments, the data classification model includes a data characterization layer, a data fusion layer, and a data classification layer, and the data classification module 203 performs, in the process of classifying the keyword data according to the data classification model to obtain the data type corresponding to the network data:
carrying out vector expression on the keyword data according to the data characterization layer to obtain a first vector corresponding to the keyword data;
carrying out data fusion on the first vector according to the data fusion layer to obtain a second vector;
and carrying out data classification on the second vector according to the data classification layer to obtain the data type corresponding to the network data.
In some embodiments, the key determining module 206 performs, in the determining the encryption key corresponding to the network data according to the transmission speed and the number of keys:
determining a key condition corresponding to the data type according to the transmission speed and the key quantity;
when the key condition is a first condition, updating an encryption key set corresponding to the data type, wherein the first condition is used for representing that the number of keys corresponding to the data type is in a missing condition;
And obtaining the encryption key corresponding to the network data according to the encryption key set.
In some embodiments, the key determination module 206 further performs, in a process before determining the key status corresponding to the data type according to the transmission speed and the number of keys:
acquiring key information corresponding to the encryption key set, wherein the key information comprises the use frequency corresponding to the encryption key set;
and according to the key information, clearing the key with the use frequency larger than the preset frequency from the encryption key set.
In some embodiments, the key determining module 206 performs, in the process of updating the encryption key set corresponding to the data type:
obtaining a corresponding key protocol when a key is generated;
determining the corresponding initial position and preset step length when the key is generated;
generating a new added key corresponding to the data type by using the key protocol according to the initial position and the preset step length;
and updating the newly added key to an encryption key set corresponding to the data type.
In some embodiments, the key determining module 206 performs, in the process of generating the new key corresponding to the data type according to the initial position and the preset step size by using the key protocol:
Acquiring an initial key, and acquiring a corresponding intermediate key from the key protocol according to the initial position and the preset step length;
generating a new added key corresponding to the data type according to the initial key and the intermediate key;
wherein the newly added key can be obtained according to the following formula:
new_my = mid_my+init_my*(1+jo_count),
the new_my is a new key, mid_my is an intermediate key, init_my is an initial key, jo_count is a parity variable, the parity variable is used for adjusting a mode of acquiring the new key, and the parity variable is related to transmission time corresponding to the network data.
In some embodiments, the key determining module 206 performs, in the process of obtaining the encryption key corresponding to the network data according to the encryption key set:
acquiring transmission time corresponding to the network data;
calculating the remainder of the number of the target keys corresponding to the encryption key set according to the transmission time to obtain a first remainder result;
ordering all encryption keys corresponding to the encryption key set to obtain a first ordering result;
and determining an encryption key corresponding to the network data according to the first ordering result and the first remainder result.
In some embodiments, the data transmission module 209 further performs, in the process after the performing the transmission operation on the encapsulation result:
analyzing the encapsulation result to obtain the data type and the encrypted data;
obtaining a decryption key set corresponding to the data type;
obtaining a decryption key corresponding to the encrypted data according to the decryption key set;
and decrypting the encrypted data according to the decryption key to obtain the network data corresponding to the encrypted data.
In some embodiments, the data transmission module 209 performs, in the process of obtaining the decryption key corresponding to the encrypted data according to the decryption key set:
acquiring transmission time corresponding to the encrypted data from the packaging result;
calculating the remainder of the number of the target keys corresponding to the decryption key set according to the transmission time, and obtaining a second remainder result;
ordering all decryption keys corresponding to the decryption key set to obtain a second ordering result;
and determining a decryption key corresponding to the encrypted data according to the second sorting result and the second remainder result.
It should be noted that, for convenience and brevity of description, specific working processes of the above-described network data information secure transmission system may refer to corresponding processes in the foregoing embodiments of the network data information secure transmission method, which are not described herein again.
The embodiment of the invention also provides a storage medium for computer readable storage, wherein the storage medium stores one or more programs, and the one or more programs can be executed by one or more processors, so as to realize the steps of any network data information secure transmission method provided by the embodiment specification of the invention.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware embodiment, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments. While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (8)

1. A method for securely transmitting network data information, the method comprising:
acquiring network data to be transmitted;
extracting keywords from the network data to obtain keyword data corresponding to the network data;
carrying out data classification on the keyword data according to a data classification model to obtain a data type corresponding to the network data;
obtaining the number of keys corresponding to the data type according to the data type;
determining a transmission speed corresponding to a network, wherein the transmission speed is used for representing the efficiency of network transmission under the current network;
determining an encryption key corresponding to the network data according to the transmission speed and the key quantity;
encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data;
packaging the data type and the encrypted data to obtain a packaging result;
performing transmission operation on the encapsulation result to realize information transmission of the network data;
the determining the encryption key corresponding to the network data according to the transmission speed and the key quantity comprises the following steps:
determining a key condition corresponding to the data type according to the transmission speed and the key quantity;
When the key condition is a first condition, updating an encryption key set corresponding to the data type, and generating a new key to meet encryption efficiency, wherein the first condition is used for representing that the number of keys corresponding to the data type is in a missing condition, and the number of keys of the encryption key corresponding to the data type is difficult to meet the encryption efficiency corresponding to the transmission speed;
obtaining an encryption key corresponding to the network data according to the encryption key set, and sequentially distributing the encryption keys corresponding to the encryption key set to the network data;
after determining the key status corresponding to the data type according to the transmission speed and the key quantity, the method further comprises:
when the key condition is a second condition, sequentially distributing the encryption keys corresponding to the data types in the encryption key set to network data, wherein the second condition is used for representing that the key number of the encryption keys corresponding to the data types is in a normal condition, and the key number of the encryption keys corresponding to the data types meets the encryption efficiency corresponding to the transmission speed;
before determining the key status corresponding to the data type according to the transmission speed and the key quantity, the method further includes:
Acquiring key information corresponding to the encryption key set, wherein the key information comprises the use frequency corresponding to the encryption key set;
and according to the key information, clearing the key with the use frequency larger than the preset frequency from the encryption key set.
2. The method according to claim 1, wherein the data classification model includes a data characterization layer, a data fusion layer, and a data classification layer, and the data classifying the keyword data according to the data classification model to obtain the data type corresponding to the network data includes:
carrying out vector expression on the keyword data according to the data characterization layer to obtain a first vector corresponding to the keyword data;
carrying out data fusion on the first vector according to the data fusion layer to obtain a second vector;
and carrying out data classification on the second vector according to the data classification layer to obtain the data type corresponding to the network data.
3. The method of claim 1, wherein the updating the encryption key set corresponding to the data type comprises:
obtaining a corresponding key protocol when a key is generated;
determining the corresponding initial position and preset step length when the key is generated;
Generating a new added key corresponding to the data type by using the key protocol according to the initial position and the preset step length;
and updating the newly added key to an encryption key set corresponding to the data type.
4. A method according to claim 3, wherein said generating a new key corresponding to said data type using said key agreement according to said initial position and said preset step size comprises:
acquiring an initial key, and acquiring a corresponding intermediate key from the key protocol according to the initial position and the preset step length;
generating a new added key corresponding to the data type according to the initial key and the intermediate key;
wherein the new key is obtained according to the following formula:
new_my = mid_my+init_my*(1+jo_count),
the new_my is a new key, mid_my is an intermediate key, init_my is an initial key, jo_count is a parity variable, the parity variable is used for adjusting a mode of acquiring the new key, and the parity variable is related to transmission time corresponding to the network data.
5. The method according to claim 1, wherein the obtaining the encryption key corresponding to the network data according to the encryption key set includes:
Acquiring transmission time corresponding to the network data;
calculating the remainder of the number of the target keys corresponding to the encryption key set according to the transmission time to obtain a first remainder result;
ordering all encryption keys corresponding to the encryption key set to obtain a first ordering result;
and determining an encryption key corresponding to the network data according to the first ordering result and the first remainder result.
6. The method of claim 1, wherein after the transmitting the encapsulation result, the method further comprises:
analyzing the encapsulation result to obtain the data type and the encrypted data;
obtaining a decryption key set corresponding to the data type;
obtaining a decryption key corresponding to the encrypted data according to the decryption key set;
and decrypting the encrypted data according to the decryption key to obtain the network data corresponding to the encrypted data.
7. The method according to claim 6, wherein the obtaining the decryption key corresponding to the encrypted data from the decryption key set includes:
acquiring transmission time corresponding to the encrypted data from the packaging result;
Calculating the remainder of the number of the target keys corresponding to the decryption key set according to the transmission time, and obtaining a second remainder result;
ordering all decryption keys corresponding to the decryption key set to obtain a second ordering result;
and determining a decryption key corresponding to the encrypted data according to the second sorting result and the second remainder result.
8. A network data information secure transmission system, comprising:
the data acquisition module is used for acquiring network data to be transmitted;
the keyword extraction module is used for extracting keywords from the network data to obtain keyword data corresponding to the network data;
the data classification module is used for carrying out data classification on the keyword data according to a data classification model to obtain a data type corresponding to the network data;
the key acquisition module is used for acquiring the number of keys corresponding to the data type according to the data type;
the speed determining module is used for determining a transmission speed corresponding to the network, wherein the transmission speed is used for representing the efficiency of network transmission under the current network;
the key determining module is configured to determine an encryption key corresponding to the network data according to the transmission speed and the number of keys, and includes:
Determining a key condition corresponding to the data type according to the transmission speed and the key quantity;
when the key condition is a first condition, updating an encryption key set corresponding to the data type, and generating a new key to meet encryption efficiency, wherein the first condition is used for representing that the number of keys corresponding to the data type is in a missing condition, and the number of keys of the encryption key corresponding to the data type is difficult to meet the encryption efficiency corresponding to the transmission speed;
obtaining an encryption key corresponding to the network data according to the encryption key set, and sequentially distributing the encryption keys corresponding to the encryption key set to the network data;
after determining the key status corresponding to the data type according to the transmission speed and the key quantity, the method further comprises the following steps:
when the key condition is a second condition, sequentially distributing the encryption keys corresponding to the data types in the encryption key set to network data, wherein the second condition is used for representing that the key number of the encryption keys corresponding to the data types is in a normal condition, and the key number of the encryption keys corresponding to the data types meets the encryption efficiency corresponding to the transmission speed;
Before determining the key status corresponding to the data type according to the transmission speed and the key quantity, the method further comprises:
acquiring key information corresponding to the encryption key set, wherein the key information comprises the use frequency corresponding to the encryption key set;
according to the key information, removing the key with the use frequency larger than the preset frequency from the encryption key set;
the encryption processing module is used for encrypting the network data according to the encryption key to obtain encrypted data corresponding to the network data;
the data packaging module is used for packaging the data type and the encrypted data to obtain a packaging result;
and the data transmission module is used for executing transmission operation on the encapsulation result so as to realize information transmission of the network data.
CN202311515185.5A 2023-11-15 2023-11-15 Network data information secure transmission method and system Active CN117240627B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311515185.5A CN117240627B (en) 2023-11-15 2023-11-15 Network data information secure transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311515185.5A CN117240627B (en) 2023-11-15 2023-11-15 Network data information secure transmission method and system

Publications (2)

Publication Number Publication Date
CN117240627A CN117240627A (en) 2023-12-15
CN117240627B true CN117240627B (en) 2024-03-26

Family

ID=89091605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311515185.5A Active CN117240627B (en) 2023-11-15 2023-11-15 Network data information secure transmission method and system

Country Status (1)

Country Link
CN (1) CN117240627B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115333839A (en) * 2022-08-15 2022-11-11 中国电信股份有限公司 Data security transmission method, system, device and storage medium
CN115865540A (en) * 2023-03-03 2023-03-28 北京和升达信息安全技术有限公司 Information secure transmission method and device
CN116015756A (en) * 2022-12-08 2023-04-25 河南中裕广恒科技股份有限公司 Network multimedia secure transmission method and system
CN116032470A (en) * 2022-12-30 2023-04-28 蚂蚁区块链科技(上海)有限公司 Data transmission system, method and device based on careless transmission protocol
CN116846650A (en) * 2023-07-10 2023-10-03 安徽安联云服务有限公司 Data transmission method for improving network security operation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115333839A (en) * 2022-08-15 2022-11-11 中国电信股份有限公司 Data security transmission method, system, device and storage medium
CN116015756A (en) * 2022-12-08 2023-04-25 河南中裕广恒科技股份有限公司 Network multimedia secure transmission method and system
CN116032470A (en) * 2022-12-30 2023-04-28 蚂蚁区块链科技(上海)有限公司 Data transmission system, method and device based on careless transmission protocol
CN115865540A (en) * 2023-03-03 2023-03-28 北京和升达信息安全技术有限公司 Information secure transmission method and device
CN116846650A (en) * 2023-07-10 2023-10-03 安徽安联云服务有限公司 Data transmission method for improving network security operation

Also Published As

Publication number Publication date
CN117240627A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
US10728018B2 (en) Secure probabilistic analytics using homomorphic encryption
US11196541B2 (en) Secure machine learning analytics using homomorphic encryption
US20180212753A1 (en) End-To-End Secure Operations Using a Query Vector
CN110324143A (en) Data transmission method, electronic equipment and storage medium
US20170039487A1 (en) Support vector machine learning system and support vector machine learning method
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
CN107113286A (en) The roaming content erasing operation of striding equipment
EP1395058A1 (en) Apparatus and method for hierarchical encryption
CN109241423B (en) Information recommendation method and device, electronic equipment and storage medium
US20110154015A1 (en) Method For Segmenting A Data File, Storing The File In A Separate Location, And Recreating The File
CN108549824A (en) A kind of data desensitization method and device
WO2019120038A1 (en) Encrypted storage of data
US20150286843A1 (en) Method and system for modular digital watermarking of electronic files
CN109255248A (en) A kind of text searching method based on enciphering and deciphering algorithm
CN110414269B (en) Processing method, related device, storage medium and system of application installation package
CN117240627B (en) Network data information secure transmission method and system
US11133926B2 (en) Attribute-based key management system
Song et al. Vtim: Video title identification using open metadata
CN111030930B (en) Decentralized network data fragment transmission method, device, equipment and medium
CN113378211B (en) Method and apparatus for protecting data
US8929555B2 (en) Data encryption systems and methods
CN108985109A (en) A kind of date storage method and device
CN115118520A (en) Data processing method and device and server
CN113726768A (en) Data transmission method and device, electronic equipment and readable storage medium
CN112214771A (en) Information analysis method and device based on big data and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant