CN107612942A - A kind of SMS platform user data transmission safe encryption method - Google Patents
A kind of SMS platform user data transmission safe encryption method Download PDFInfo
- Publication number
- CN107612942A CN107612942A CN201711045883.8A CN201711045883A CN107612942A CN 107612942 A CN107612942 A CN 107612942A CN 201711045883 A CN201711045883 A CN 201711045883A CN 107612942 A CN107612942 A CN 107612942A
- Authority
- CN
- China
- Prior art keywords
- data
- encrypted
- encryption
- transmission
- sms platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of SMS platform user data transmission safe encryption method, including receive data waiting for transmission:SMS platform collects the be-encrypted data sent needed for user;Computer is to data encryption:According to the power side of the finite field, the dimension of the scrambled matrix is determined, according to the power side of the finite field, calculates the encryption length;The multiple data slots for meeting the encryption length are sequentially obtained from the be-encrypted data of the S1 according to the encryption length, each data slot taken out is encrypted respectively by the scrambled matrix;Multiple encrypted segments are obtained, are then stored in cloud main frame;Implementation transmission is carried out to encrypted data using the default network transmission protocol;Judge whether data send:Be be put into next step, it is no just carry out implementation processing resend;Processing is decrypted to local in the data buffer storage received, the data after decryption are then saved in local automatically.
Description
Technical field
Data processing field of the present invention, more particularly to a kind of SMS platform user data transmission safe encryption method.
Background technology
With the development of globalization, increasing enterprise all carries out in all parts of the world business, for convenience to data
It is managed and analyzes, is generally all that server is provided with location, namely may be in all parts of the world all in an enterprise
Substantial amounts of server is provided with, but in order to realize the same management to data, it is necessary to which these servers are aggregated into data statistics
Center, such as:The enterprise of China may be needed data summarization to the data statistics center set at home.But existing
During transnational server transmission data, abroad after collection of server to data, a nginx (high performance HTTP is relied primarily on
And Reverse Proxy) daily record, the rotation of nginx daily records every ten minutes once, produces log (daily record) file, so
SCP (Session Control Protocol are used afterwards;Session control protocol) technology integrally sends nginx log files
Into domestic server.And in actual applications, foreign countries arrive domestic network potentially unstable, for very big nginx log texts
Part, it may interrupt, interrupt at any time in file processes are transmitted, may be by whole nginx log file retransmissions, this side
Face not only waste of resource, and data report at least to postpone 10 minutes, poor real, can not meet that big data collects will
Ask.
And can be before data be uploaded to high in the clouds stored, by data encryption, so as to preventing data in transmitting way
It is stolen.However, data are after encryption, it will usually cause data expansion, cause to store required space increasing.
The content of the invention
A kind of SMS platform user data transmission safe encryption method, this method include:
S1:Data waiting for transmission are received, SMS platform collects the be-encrypted data sent needed for user;
S2:Computer is to data encryption;
S3:Encrypted data is transmitted using the default network transmission protocol;
S4:Judge whether data send, be to be put into S5, it is no to be put into S6;
S5:Processing is decrypted to local in the data buffer storage received;
S6:Carry out implementation processing to resend, reuse the default network transmission protocol and encrypted data are transmitted;
S7:Terminate transmission;
Wherein, S2 computers include following steps to data encrypted packet:
S21:The substrate of be-encrypted data based on S1, determine the power side of finite field;
S22:The power side of finite field obtained by foundation S21, determine the dimension of scrambled matrix;
S23:According to the power side of finite field obtained by S21, encryption length is calculated;
S24:The multiple data for meeting the encryption length are sequentially obtained from S1 be-encrypted data according to the encryption length
Fragment, then each data slot taken out is encrypted respectively by the scrambled matrix, obtain multiple encrypted segments;
S25:Multiple encrypted segments obtained by S24 are stored in cloud main frame.
Further, the SMS platform user data transmission method also includes:
Data reception module, the be-encrypted data sent needed for user is collected for receiving SMS platform;
Real-time sending module, implementation transmission is carried out for encrypted data;
Judge module is sent, for judging whether the gathered data is sent successfully;
Data cache module, for the data buffer storage received to be decrypted into processing to local, then automatically by after decryption
Data are saved in local.
Further, in S24, using the encryption length as the length of each data slot, reconfigure S1's
Be-encrypted data, so as to obtaining recombination data, the recombination data is encrypted by the scrambled matrix, obtains encrypted array;
Then the encrypted array is reconfigured, obtains the encrypted segments.
Further, the substrate of S1 be-encrypted data and the power side of the finite field meet the first restrictive condition, and first
Restrictive condition includes:3k2≤d, wherein, k represents the power side of the finite field, and d represents the substrate of S1 be-encrypted data.
Further, the substrate of S1 be-encrypted data and the power side of the finite field meet the second restrictive condition, and this
Two restrictive conditions include:S=k/log3d, wherein, S represents the encryption length, and k represents the power side of the finite field, and d represents S1's
The substrate of be-encrypted data.
Further, S3 includes:
The encrypted segments in cloud main frame are successively read according to data write sequence;
The encrypted segments in cloud main frame are sent by network using the default network transmission protocol.
A kind of the advantages of SMS platform user data transmission safe encryption method provided by the invention, is:The present invention is adding
Close aspect improves one encryption length of calculating, and S1 be-encrypted data is divided into multiple data slices according to this encryption length
Section so that the expansion after the encryption of these data slots is in tolerance, and solving data, caused data are swollen after encryption
Swollen problem, correspondingly, can be direct whenever receiving gathered data because data can be sent in real time in terms of transmission
Sent, therefore, data do not have to retransmit after the file for a specific format is locally stored.Compared to prior art
In, the real-time of data transfer is high.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is a kind of general flow chart of SMS platform user data transmission safe encryption method embodiment of the present invention;
Fig. 2 is a kind of flow chart of SMS platform ciphering user data embodiment of the method for the present invention.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear and detailed
Description, it is clear that described embodiment is only the part of the embodiment of the present invention, rather than whole embodiments.Based on this
Embodiment in invention, all other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example is applied, belongs to the scope of protection of the invention.Referring to Fig. 1, the invention discloses a kind of SMS platform user data transmission peace
Full encryption method, this method include:
S1:Data waiting for transmission are received, SMS platform collects the be-encrypted data sent needed for user;
S2:Computer is to data encryption;
S3:Encrypted data is transmitted using the default network transmission protocol;
S4:Judge whether data send, be to be put into S5, it is no to be put into S6;
S5:Processing is decrypted to local in the data buffer storage received;
S6:Carry out implementation processing to resend, reuse the default network transmission protocol and encrypted data are transmitted;
S7:Terminate transmission;
Wherein, S2 computers include following steps to data encrypted packet:
S21:The substrate of be-encrypted data based on S1, determine the power side of finite field;
S22:The power side of finite field obtained by foundation S21, determine the dimension of scrambled matrix;The dimension of scrambled matrix is calculated in S22,
For example, scrambled matrix A is n × n matrix, and all coefficient ai of scrambled matrix A are different and not equal to 0.Here,
Scrambled matrix A dimension n is calculated according to the substrate of S1 be-encrypted data, can avoid the data after encryption excessively swollen whereby
It is swollen;
S23:According to the power side of finite field obtained by S21, encryption length is calculated;Through the power side of finite field obtained by S21 in S23
To calculate encryption length, sequentially obtained according to the encryption length from S1 be-encrypted data and meet the more of the encryption length
Individual data slot, herein in order to solve the problems, such as S1 be-encrypted data caused data expansion after encryption, recalculate one
Individual encryption length;
S24:The multiple data for meeting the encryption length are sequentially obtained from S1 be-encrypted data according to the encryption length
Fragment, then each data slot taken out is encrypted respectively by the scrambled matrix, obtain multiple encrypted segments;
In S24, S1 be-encrypted data is divided into multiple data by S1 be-encrypted data to encrypt length of the length as division
Fragment, will not excessively it be expanded after encryption so as to further control data fragment;
Specifically, in S24, using the encryption length as the length of each data slot, the to be encrypted of S1 is reconfigured
Data, so as to obtaining recombination data, the recombination data is encrypted by scrambled matrix this described, obtains an encrypted array;So
After reconfigure the encrypted array, obtain the encrypted segments;
S25:Multiple encrypted segments obtained by S24 are stored in cloud main frame;In S25, calculate node device is by scrambled matrix point
The other data slot to being taken out is encrypted, and obtains multiple encrypted segments.That is, calculate node device can calculate
One appropriate length(Encrypt length)S1 be-encrypted data is cut into multiple data slots.Afterwards, by encryption
Matrix is encrypted program to each data slot and obtains multiple ciphertext fragments.
Afterwards, calculate and pass through network, each ciphertext fragment is stored into multiple data into cloud server system respectively stores up
Center is deposited, or can also be stored in same data storage center simultaneously, here, the data storage center can belong to not
In same storage node device, that is, calculate and store different ciphertext fragments to different pieces of information storage center, at this through network
In embodiment, if obtaining n ciphertext fragment by S1 be-encrypted data, then n ciphertext fragment can store to n data respectively
Storage center, in addition, in other embodiments, more than one ciphertext fragment can be also stored to same data storage center,
Ciphertext fragment 1 is stored to data storage center A, ciphertext fragment 3 with ciphertext fragment 2 and stored with ciphertext fragment 4 into data storage
Heart B etc., in other embodiments, all ciphertext fragments can not also be stored in the situation at same data storage center
Get off to disperse to store ciphertext fragment.
S3 includes:
The encrypted segments in cloud main frame are successively read according to data write sequence;
The encrypted segments in cloud main frame are sent by network using the default network transmission protocol.
The SMS platform user data transmission method also includes:
Data reception module, the be-encrypted data sent needed for user is collected for receiving SMS platform;
Real-time sending module, implementation transmission is carried out for encrypted data;
Judge module is sent, for judging whether the gathered data is sent successfully;
Data cache module, for the data buffer storage received to be decrypted into processing to local, then automatically by after decryption
Data are saved in local.
The substrate of S1 be-encrypted data meets the first restrictive condition, the first restrictive condition bag with the power side of the finite field
Include:3k2≤d, wherein, k represents the power side of the finite field, and d represents the substrate of S1 be-encrypted data;S1 number to be encrypted
According to the power side of substrate and the finite field meet the second restrictive condition, second restrictive condition includes:S=k/log3 d, wherein, S
The encryption length is represented, k represents the power side of the finite field, and d represents the substrate of S1 be-encrypted data.
As an example it is assumed that S1 be-encrypted data b substrate be 2, and S1 be-encrypted data be b=(0,0,1,0,
1,1,1,0,1), illustrate as example.According to d=2, under first restrictive condition 3k2 >=d, the power of finite field is determined
Power k is 3, also, encrypts length Si.Here, exemplified by i.e. Si=S=k/log3d, S=3 are calculated.Then, according to encryption length
It is b '=(001,011,101) that S1 be-encrypted data b is reconfigured acquisition restructuring array by degree S=3, meets limitation bar
Part.
It is described using the default network transmission protocol to encrypted data carry out implement transmission include:
It is successively read according to data write sequence and is cached to the local gathered data;
The gathered data read is sent by network using the default network transmission protocol.
When calculate node device encrypts S1 be-encrypted data and disperses storage to different data storage centers, also
The index which data storage center is each ciphertext fragment be stored in can be write to index shelves.Accordingly, legitimate user is worked as
During data to be read, these are dispersed in the ciphertext fragment at different pieces of information storage center, can pass through index shelves and be obtained by calculating, be borrowed
To decode and be reduced to S1 be-encrypted data.Accordingly, if during user S1 to be used be-encrypted data, then from each number
The encrypted segments after S1 be-encrypted data all encryptions are taken out according to storage center to be decrypted, and by the fragment after decrypting Lai
Obtain S1 be-encrypted data.
In summary, in the above-described embodiments, the dimension of scrambled matrix is calculated, the data expansion after being encrypted so as to control
Degree, and calculate the length of the data slot divided by S1 be-encrypted data(That is, length is encrypted)So that data slot exists
The expansion of the encrypted segments obtained afterwards is encrypted via scrambled matrix in tolerance, solves data institute after encryption
Caused by data expansion problem.Also, it can also further make S1 be-encrypted data is scattered to be stored in multiple data storage centers,
Accordingly, as long as hacker can not obtain the ciphertext for being dispersed in each data center, S1 be-encrypted data, this hair can not just be interpreted
It is bright that one encryption length of calculating is improved in terms of encryption, S1 be-encrypted data is divided into more numbers according to this encryption length
According to fragment so that the expansion after the encryption of these data slots solves data caused number after encryption in tolerance
, correspondingly, can be with whenever receiving gathered data because data can be sent in real time in terms of transmission according to expansion issues
Directly sent, therefore, data do not have to retransmit after the file for a specific format is locally stored.Compared to existing
In technology, the real-time of data transfer is high.
Detailed Jie has been carried out to a kind of SMS platform user data transmission safe encryption method provided by the present invention above
Continue, for those of ordinary skill in the art, according to the thought of the embodiment of the present invention, in specific embodiments and applications
There will be changes, in summary, this specification content should not be construed as limiting the invention.
Claims (6)
1. a kind of SMS platform user data transmission safe encryption method, it is characterised in that this method includes:
S1:Data waiting for transmission are received, SMS platform collects the be-encrypted data sent needed for user;
S2:Computer is to data encryption;
S3:Encrypted data is transmitted using the default network transmission protocol;
S4:Judge whether data send, be to be put into S5, it is no to be put into S6;
S5:Processing is decrypted to local in the data buffer storage received;
S6:Carry out implementation processing to resend, reuse the default network transmission protocol and encrypted data are transmitted;
S7:Terminate transmission;
Wherein, S2 computers include following steps to data encrypted packet:
S21:The substrate of be-encrypted data based on S1, determine the power side of finite field;
S22:The power side of finite field obtained by foundation S21, determine the dimension of scrambled matrix;
S23:According to the power side of finite field obtained by S21, encryption length is calculated;
S24:The multiple data for meeting the encryption length are sequentially obtained from S1 be-encrypted data according to the encryption length
Fragment, then each data slot taken out is encrypted respectively by the scrambled matrix, obtain multiple encrypted segments;
S25:Multiple encrypted segments obtained by S24 are stored in cloud main frame.
2. SMS platform user data transmission safe encryption method according to claim 1, it is characterised in that the short message
Platform user data transmission method also includes:
Data reception module, the be-encrypted data sent needed for user is collected for receiving SMS platform;
Real-time sending module, implementation transmission is carried out for encrypted data;
Judge module is sent, for judging whether the gathered data is sent successfully;
Data cache module, for the data buffer storage received to be decrypted into processing to local, then automatically by after decryption
Data are saved in local.
3. SMS platform user data transmission safe encryption method according to claim 1, it is characterised in that in S24, with
Length of the encryption length as each data slot, reconfigures S1 be-encrypted data, number is recombinated so as to obtaining
According to, the recombination data is encrypted by scrambled matrix this described, obtain an encrypted array;Then the encryption battle array is reconfigured
Row, obtain the encrypted segments.
4. the SMS platform user data transmission safe encryption method according to right wants 1, it is characterised in that S1's is to be encrypted
The substrate of data meets the first restrictive condition with the power side of the finite field, and the first restrictive condition includes:3k2≤d, wherein, k
The power side of the finite field is represented, d represents the substrate of S1 be-encrypted data.
5. SMS platform user data transmission safe encryption method according to claim 1, it is characterised in that S1's is to be added
The substrate of ciphertext data meets the second restrictive condition with the power side of the finite field, and second restrictive condition includes:S=k/log3 d, its
In, S represents the encryption length, and k represents the power side of the finite field, and d represents the substrate of S1 be-encrypted data.
6. SMS platform user data transmission safe encryption method according to claim 1, it is characterised in that S3 includes:
The encrypted segments in cloud main frame are successively read according to data write sequence;
The encrypted segments in cloud main frame are sent by network using the default network transmission protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711045883.8A CN107612942A (en) | 2017-10-31 | 2017-10-31 | A kind of SMS platform user data transmission safe encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711045883.8A CN107612942A (en) | 2017-10-31 | 2017-10-31 | A kind of SMS platform user data transmission safe encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107612942A true CN107612942A (en) | 2018-01-19 |
Family
ID=61084122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711045883.8A Pending CN107612942A (en) | 2017-10-31 | 2017-10-31 | A kind of SMS platform user data transmission safe encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107612942A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117332453A (en) * | 2023-11-30 | 2024-01-02 | 山东街景智能制造科技股份有限公司 | Safety management system for product database |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248650A (en) * | 2012-02-09 | 2013-08-14 | 中兴通讯股份有限公司 | Document download method and system |
US20140122896A1 (en) * | 2012-10-31 | 2014-05-01 | Inventec Corporation | Data encryption method |
CN103916477A (en) * | 2014-04-09 | 2014-07-09 | 曙光云计算技术有限公司 | Data storage method and device and data downloading method and device for cloud environment |
CN104092743A (en) * | 2014-06-27 | 2014-10-08 | 清华大学 | User data protecting method and system in cloud environment |
CN105871520A (en) * | 2015-12-31 | 2016-08-17 | 乐视网信息技术(北京)股份有限公司 | Data transmission method and device |
-
2017
- 2017-10-31 CN CN201711045883.8A patent/CN107612942A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248650A (en) * | 2012-02-09 | 2013-08-14 | 中兴通讯股份有限公司 | Document download method and system |
US20140122896A1 (en) * | 2012-10-31 | 2014-05-01 | Inventec Corporation | Data encryption method |
CN103795525A (en) * | 2012-10-31 | 2014-05-14 | 英业达科技有限公司 | Data encryption method |
CN103916477A (en) * | 2014-04-09 | 2014-07-09 | 曙光云计算技术有限公司 | Data storage method and device and data downloading method and device for cloud environment |
CN104092743A (en) * | 2014-06-27 | 2014-10-08 | 清华大学 | User data protecting method and system in cloud environment |
CN105871520A (en) * | 2015-12-31 | 2016-08-17 | 乐视网信息技术(北京)股份有限公司 | Data transmission method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117332453A (en) * | 2023-11-30 | 2024-01-02 | 山东街景智能制造科技股份有限公司 | Safety management system for product database |
CN117332453B (en) * | 2023-11-30 | 2024-02-23 | 山东街景智能制造科技股份有限公司 | Safety management system for product database |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9172682B2 (en) | Local authentication in proxy SSL tunnels using a client-side proxy agent | |
CN101964791B (en) | Communication authenticating system and method of client and WEB application | |
CN101964080B (en) | Method and system for storing a file as slices on storage elements | |
CN1949765B (en) | Method and system for obtaining SSH host computer public key of device being managed | |
CN111628976B (en) | Message processing method, device, equipment and medium | |
US10764261B2 (en) | System and method for enabling a scalable public-key infrastructure on a smart grid network | |
CN103428221A (en) | Safety logging method, system and device of mobile application | |
CN103327034A (en) | Safe login method, system and device | |
Bali et al. | Lightweight authentication for MQTT to improve the security of IoT communication | |
CN113221146B (en) | Method and device for data transmission among block chain nodes | |
WO2014125375A2 (en) | Secure mobile payments | |
CN106453391A (en) | Long repeating data encryption and transmission method and system | |
CN113114589A (en) | Cross-network data secure transmission system and method | |
CN105049448A (en) | Single sign-on device and method | |
CN107659400A (en) | A kind of quantum secret communication method and device based on mark identification | |
CN111181920A (en) | Encryption and decryption method and device | |
CN106031097A (en) | Service processing method and device | |
CN106909826A (en) | Password is for action and system | |
CN107612942A (en) | A kind of SMS platform user data transmission safe encryption method | |
CN112714070B (en) | Communication method, device, system and storage medium | |
CN109962888A (en) | A kind of anti-tamper business access method, client and server | |
CN114679265B (en) | Flow acquisition method, device, electronic equipment and storage medium | |
CN102882897A (en) | Cookie protecting method and device | |
CN113992669A (en) | Distributed data distribution method for trusted messages in industry | |
CN113242216A (en) | Credible network camera based on domestic commercial cryptographic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180817 Address after: 230000 Anhui Hefei Shushan new industrial park Huguang road 1201 electricity supplier park 3 phase Applicant after: ANHUI ETUO COMMUNICATION TECHNOLOGY GROUP CO., LTD. Address before: 100084 B801-037, block B, research and research complex, Tsinghua University, Qinghua garden, Haidian District, Beijing Applicant before: Beijing one extension communication technology Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180119 |
|
WD01 | Invention patent application deemed withdrawn after publication |