CN110933161B - Information anti-theft management method, device, server and readable storage medium - Google Patents

Information anti-theft management method, device, server and readable storage medium Download PDF

Info

Publication number
CN110933161B
CN110933161B CN201911180017.9A CN201911180017A CN110933161B CN 110933161 B CN110933161 B CN 110933161B CN 201911180017 A CN201911180017 A CN 201911180017A CN 110933161 B CN110933161 B CN 110933161B
Authority
CN
China
Prior art keywords
sequence
theft
storage
sample
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911180017.9A
Other languages
Chinese (zh)
Other versions
CN110933161A (en
Inventor
王向远
王平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Swordfish Information Technology Co ltd
Beijing Tuopu Fenglian Information Technology Co ltd
Hefei Topnet System Engineering Co ltd
Henan Tupu Computer Network Engineering Co ltd
Original Assignee
Beijing Tuopu Fenglian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tuopu Fenglian Information Technology Co ltd filed Critical Beijing Tuopu Fenglian Information Technology Co ltd
Priority to CN201911180017.9A priority Critical patent/CN110933161B/en
Publication of CN110933161A publication Critical patent/CN110933161A/en
Application granted granted Critical
Publication of CN110933161B publication Critical patent/CN110933161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
  • Traffic Control Systems (AREA)

Abstract

The embodiment of the application provides an information theft-proof management method, an information theft-proof management device, a server and a readable storage medium, and in consideration of the fact that geographic positions are special and are usually related to time sequences, sequence synthesis is carried out after position sequences to be processed are screened out according to different theft-proof scenes, so that the theft difficulty can be improved as much as possible under different theft-proof scenes, and the time sequences of the position sequences are scrambled by respectively carrying out scrambling processing under different position sequences, so that the problem of abnormal theft prevention caused by an external theft strategy in the current theft-proof environment is further solved.

Description

Information anti-theft management method, device, server and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information anti-theft management method and apparatus, a server, and a readable storage medium.
Background
The user terminal is usually installed with a plurality of application programs capable of acquiring the related geographical location information, and the application programs generally upload the acquired geographical location information to the server in real time in the using process, and the server stores a large amount of geographical location information of different users. The geographical location information is likely to relate to the personal privacy of the user, so the security problem of the geographical location information is very important, and how to prevent the geographical location information from being stolen is a technical problem to be urgently solved.
Disclosure of Invention
In order to overcome at least the above-mentioned deficiencies in the prior art, an object of the present invention is to provide an information theft-prevention management method, an information theft-prevention management device, a server, and a readable storage medium, which consider that a geographic location is specific and is usually related to a time sequence, so that the present application can screen out a to-be-processed location sequence according to different theft-prevention scenarios and then perform sequence synthesis, thereby ensuring that the theft-prevention difficulty can be improved as much as possible in different theft-prevention scenarios, and further solve the problem of theft-prevention abnormality caused by an external theft strategy in the current theft-prevention environment by performing scrambling processing respectively under different location sequences and scrambling the time sequences of the location sequences.
In a first aspect, the present application provides an information anti-theft management method, applied to a server, the method including:
determining time sequence data of the geographical position information under the state of storing the geographical position information, wherein the time sequence data comprise time sequence sections, and the time sequence sections have corresponding positions;
sequentially acquiring the time of the position corresponding to the time sequence section in the time sequence data, and continuously and circularly acquiring a plurality of geographical position sequences stored according to the time of the position; the geographic position sequence comprises a longitude and latitude position sequence, an orientation change position sequence and a geographic coordinate position sequence;
If an anti-theft management instruction is received, determining a current anti-theft scene, and screening a position sequence to be processed from the plurality of geographical position sequences based on the current anti-theft scene;
performing sequence synthesis on the position sequence to be processed to generate a synthesized position sequence;
after the synthetic position sequence is generated, recording a storage position compensation table aiming at different storage positions and different position sequences;
acquiring a current storage position, and acquiring a position sequence-storage anti-aliasing value of the synthetic position sequence required by the current storage position from the storage position compensation table according to the current storage position;
acquiring a public storage sequence and an encrypted storage sequence of the synthetic position sequence in the current anti-theft scene through a public storage area and an encrypted storage area;
according to the position sequence-storage anti-theft scrambling value required by the public storage sequence under the current storage position, acquiring the position sequence of each storage unit in the encrypted storage sequence, according to the position sequence-storage anti-theft scrambling value and the position sequence of the corresponding storage unit in the encrypted storage sequence, acquiring the anti-theft scrambling value of each storage unit in the public storage sequence, then according to the anti-theft scrambling value, carrying out anti-theft scrambling processing on the public storage sequence, and fusing the public storage sequence after anti-theft scrambling processing with the encrypted storage sequence.
In a possible design of the first aspect, the time sequence includes a first time sequence and a second time sequence, the second time sequence corresponds to times of locations of the geographic coordinate location sequence, the first time sequence corresponds to times of locations of the latitude and longitude location sequence and the orientation change location sequence, and the times of locations include times of locations corresponding to the latitude and longitude location sequence, the orientation change location sequence, and the geographic coordinate location sequence, respectively;
the step of sequentially acquiring the time of the position corresponding to the time sequence in the time sequence data includes:
if the time sequence in the time sequence data is a first time sequence section, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table;
generating a relation distribution diagram of the geographic coordinate position sequence, wherein the relation distribution diagram comprises storage unit distribution data of each storage unit in the geographic coordinate position sequence, and in the relation distribution diagram, an abscissa is a storage unit and an ordinate is the storage unit number of the storage unit;
screening out storage unit distribution data of a preset area from the relation distribution map;
calculating a straight line through linear regression based on the storage unit distribution data of the preset area;
Determining a scrambling orientation formed by the straight line and the abscissa of the relation distribution diagram;
calculating a sine value of the scrambling orientation;
multiplying the sine value by a preset constant to obtain a time sequence ratio;
according to the time of the position and the time sequence ratio, calculating the time of the position of the longitude and latitude position sequence and the time of the position change position sequence;
and if the time sequence in the time sequence data is a second time sequence segment, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table. Therefore, the method can be suitable for different requirements of the geographic position information, and the time of the position is preprocessed, so that the stealing difficulty is improved.
In a possible design of the first aspect, the step of screening out a to-be-processed position sequence from the plurality of geographical position sequences based on the current theft-protection scenario includes:
acquiring sample position sequences containing different anti-theft strategies and not containing the anti-theft strategies according to the current anti-theft scene to obtain a sample position sequence set;
screening out a sample position sequence corresponding to the anti-theft strategy corresponding to the current anti-theft scene from the sample position sequence set to serve as an anti-theft strategy sample sequence set;
Screening sample position sequences meeting the requirements of a preset sample from the anti-theft strategy sample sequence set to obtain a screened anti-theft strategy sample sequence set;
marking the anti-theft strategy positions in each sample position sequence in the screened anti-theft strategy sample sequence set, and scrambling the sample position sequences marked with the anti-theft strategies according to a scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to serve as a detection positive sample sequence set;
taking the sample position sequences not containing the anti-theft strategy in the sample position sequence set and containing other anti-theft strategies as a detection negative sample sequence set;
combining the set of test positive sample sequences and the set of test negative sample sequences into the set of test sample sequences;
taking the detection positive sample sequence set as a filtering positive sample sequence set;
scrambling the sample position sequence which does not contain the anti-theft strategy in the sample position sequence set and the sample position sequence which contains the set sequence sample according to the scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to obtain a filtered negative sample sequence set, and combining the filtered positive sample sequence set and the filtered negative sample sequence set into a filtered sample sequence set;
And identifying a first position sequence in the position sequence to be processed according to the detection sample sequence set, and filtering the first position sequence according to the filtering sample sequence set to obtain the position sequence to be processed. Therefore, the plurality of geographical position sequences can be filtered, the position sequences to be processed can be accurately obtained under the condition of complex geographical position change, and the accuracy of subsequent anti-theft management is improved.
In a possible design of the first aspect, the step of fusing the public storage sequence after the anti-theft scrambling process and the encrypted storage sequence includes:
acquiring a storage position of a target storage sequence in the public storage sequence after anti-theft scrambling processing, and determining a corresponding position to be fused of the target storage sequence in the encrypted storage sequence according to the storage position of the target storage sequence;
scrambling the position to be fused in the encrypted storage sequence to obtain the scrambled position to be fused;
and according to the position to be fused after scrambling, fusing the public storage sequence after anti-theft scrambling and the position to be fused after scrambling in the encrypted storage sequence. Therefore, only the storage position of the obtained target storage sequence is required to be processed in the fusion process, and independent fusion processing is not required, so that the calculation amount required by data processing is reduced, and the anti-theft processing precision is favorably improved.
In a possible design of the first aspect, the step of determining, according to the storage location of the target storage sequence, a corresponding location to be fused in the encrypted storage sequence of the target storage sequence includes:
acquiring a basic storage location according to the storage location of the target storage sequence, performing polling confirmation operation on the basic storage location to form a polling basic storage location, and continuing to perform analysis processing on the polling basic storage location to acquire a reference location in the polling basic storage location, specifically including:
copying the polling basic storage position to form a polling calculation storage position, analyzing and processing the polling calculation storage position to obtain a polling calculation storage position histogram matched with the polling calculation storage position, calculating and forming a polling scrambling threshold according to the polling calculation storage position histogram, scrambling the polling calculation storage position according to the polling scrambling threshold to form a polling detection storage position, detecting and obtaining the highest scrambling position in the polling detection storage position, and forming the reference position according to the highest scrambling position;
calculating a scrambling direction of the polling basic storage position according to the reference position, and adjusting the polling basic storage position according to the scrambling direction to form a polling scrambling adjustment position;
Scrambling the polling scrambling adjustment position according to an adjustment scrambling threshold value to determine a corresponding position to be fused of the target storage sequence in the encrypted storage sequence. Therefore, on one hand, the basic data volume is reduced, the data processing efficiency is improved, on the other hand, the storage position of the target storage sequence is in a standard state, the fusion accuracy is improved, and the anti-theft effect is improved.
In a second aspect, the present application further provides an information anti-theft management device, applied to a server, the device including:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining time sequence data of the geographic position information under the state of storing the geographic position information, the time sequence data comprises time sequence sections, and the time sequence sections have corresponding position time;
the acquisition module is used for sequentially acquiring the time of the position corresponding to the time sequence section in the time sequence data and continuously and circularly acquiring a plurality of geographical position sequences stored according to the time of the position; the geographic position sequence comprises a longitude and latitude position sequence, an orientation change position sequence and a geographic coordinate position sequence;
the screening module is used for determining a current anti-theft scene if an anti-theft management instruction is received, and screening a position sequence to be processed from the plurality of geographical position sequences based on the current anti-theft scene;
The synthesis module is used for carrying out sequence synthesis on the position sequence to be processed to generate a synthesis position sequence;
the recording module is used for recording a storage position compensation table aiming at different storage positions and different position sequences after the synthetic position sequence is generated;
the acquisition module is used for acquiring a current storage position and acquiring a position sequence-storage anti-stealing scrambling value of the synthesized position sequence in the current storage position from the storage position compensation table according to the current storage position;
the acquisition module is further used for acquiring a public storage sequence and an encrypted storage sequence of the synthetic position sequence in the current anti-theft scene through a public storage area and an encrypted storage area;
and the scrambling and fusing module is used for storing an anti-theft scrambling value according to the position sequence required by the public storage sequence in the current storage position, acquiring the position sequence of each storage unit in the encrypted storage sequence, storing the anti-theft scrambling value according to the position sequence and the position sequence of the corresponding storage unit in the encrypted storage sequence, acquiring the anti-theft scrambling value of each storage unit in the public storage sequence, performing anti-theft scrambling processing on the public storage sequence according to the anti-theft scrambling value, and fusing the public storage sequence subjected to the anti-theft scrambling processing with the encrypted storage sequence.
In a third aspect, an embodiment of the present application provides a server, which includes a processor, a memory, and a network interface. The memory and the network interface processor can be connected through a bus system. The network interface is configured to receive a message, the memory is configured to store a program, an instruction, or a code, and the processor is configured to execute the program, the instruction, or the code in the memory to perform the operations of the first aspect or any possible design manner of the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where instructions are stored, and when the instructions are detected on a computer, the instructions cause the computer to perform the method in the first aspect or any possible design manner of the first aspect.
Based on any one of the aspects, the geographical position is considered to be special and is usually related to the time sequence, so that the position sequences to be processed are screened out according to different anti-theft scenes and then sequence synthesis is carried out, the stealing difficulty can be improved as much as possible under different anti-theft scenes, the time sequences of the position sequences are scrambled by respectively carrying out scrambling processing under different position sequences, and the problem of abnormal anti-theft caused by an external stealing strategy in the current anti-theft environment is further solved.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
FIG. 1 is a flow chart of an information theft-prevention management method provided by an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating various sub-steps included in step S120 in one possible implementation shown in FIG. 1;
FIG. 3 is a schematic flow chart illustrating various sub-steps included in step S130 in one possible implementation shown in FIG. 1;
FIG. 4 is a flow chart illustrating various sub-steps included in step S180 in one possible implementation shown in FIG. 1;
fig. 5 is a functional block diagram of an information anti-theft management device according to an embodiment of the present application;
fig. 6 is a block diagram schematically illustrating a structure of a server for performing the above-mentioned information theft-prevention management method according to an embodiment of the present application.
Detailed Description
The present application will now be described in detail with reference to the drawings, and the specific operations in the method embodiments may also be applied to the apparatus embodiments or the system embodiments. In the description of the present application, "at least one" includes one or more unless otherwise specified. "plurality" means two or more. For example, at least one of A, B and C, comprising: a alone, B alone, a and B in combination, a and C in combination, B and C in combination, and A, B and C in combination. In this application, "/" indicates an OR meaning, for example, A/B may indicate A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone.
Fig. 1 is a schematic flow chart of an information theft-prevention management method according to an embodiment of the present application, and the information theft-prevention management method is described in detail below.
Step S110, determining time series data of the geographical location information in a state of storing the geographical location information, where the time series data includes a time series segment, and the time series segment has a time of a corresponding location.
And step S120, sequentially acquiring the time of the position corresponding to the time sequence section in the time sequence data, and continuously and circularly acquiring a plurality of geographical position sequences stored according to the time of the position. The geographic position sequence comprises a longitude and latitude position sequence, an azimuth change position sequence and a geographic coordinate position sequence.
Step S130, if an anti-theft management instruction is received, determining a current anti-theft scene, and screening out a position sequence to be processed from the plurality of geographical position sequences based on the current anti-theft scene.
And step S140, performing sequence synthesis on the position sequence to be processed to generate a synthesized position sequence.
Step S150, after generating the synthesized position sequence, recording a storage position compensation table for different storage positions and different position sequences.
Step S160, obtaining the current storage position, and obtaining the position sequence-storage anti-stealing scrambling value of the synthesized position sequence in the current storage position from the storage position compensation table according to the current storage position.
Step S170, obtaining the public storage sequence and the encrypted storage sequence of the synthetic position sequence under the current anti-theft scene through the public storage area and the encrypted storage area.
Step S180, according to the position sequence-storage anti-theft scrambling value required by the public storage sequence under the current storage position, obtaining the position sequence of each storage unit in the encrypted storage sequence, according to the position sequence-storage anti-theft scrambling value and the position sequence of the corresponding storage unit in the encrypted storage sequence, obtaining the anti-theft scrambling value of each storage unit in the public storage sequence, then according to the anti-theft scrambling value, carrying out anti-theft scrambling processing on the public storage sequence, and fusing the public storage sequence after anti-theft scrambling processing and the encrypted storage sequence.
The information anti-theft management method provided by the embodiment of the application considers that the geographic position is special and is usually related to the time sequence, so that the position sequences to be processed are screened out according to different anti-theft scenes and then sequence synthesis is carried out, the anti-theft difficulty can be ensured to be improved as much as possible under different anti-theft scenes, the time sequences of the position sequences are scrambled by respectively carrying out scrambling processing under different position sequences, and the problem of abnormal anti-theft caused by an external theft strategy in the current anti-theft environment is further solved.
In some possible designs, the time sequence may include a first time sequence and a second time sequence, the second time sequence corresponds to times of locations of the sequence of geographic coordinate locations, the first time sequence corresponds to times of locations of the sequence of latitude and longitude locations and the sequence of orientation change locations, and the times of locations include times of locations corresponding to the sequence of latitude and longitude locations, the sequence of orientation change locations, and the sequence of geographic coordinate locations, respectively. On this basis, referring to step S120, please refer to fig. 2, which can be specifically implemented by the following sub-steps:
And a substep S121, obtaining the time of the position of the geographic coordinate position sequence from a preset time sequence table if the time sequence in the time sequence data is the first time sequence period.
And a substep S122, generating a relationship distribution map of the geographic coordinate position sequence, where the relationship distribution map includes storage unit distribution data of each storage unit in the geographic coordinate position sequence, and in the relationship distribution map, an abscissa is a storage unit and an ordinate is the storage unit number of the storage unit.
And a substep S123 of screening out the storage unit distribution data of the preset area from the relationship distribution map.
And a substep S124 of calculating a straight line by linear regression based on the storage unit distribution data of the preset region.
In substep S125, a scrambling orientation formed by the straight line and the abscissa of the relationship profile is determined.
In a substep S126, the sine value of the scrambling orientation is calculated.
And a substep S127, multiplying the sine value by a preset constant to obtain a time sequence ratio.
And a substep S128, calculating the time of the position of the longitude and latitude position sequence and the time of the position change position sequence according to the time of the position and the time sequence ratio.
And a substep S129, if the time sequence in the time sequence data is the second time sequence segment, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table.
Based on the steps, the method can be suitable for different requirements of geographic position information, and the time of the position is preprocessed, so that the stealing difficulty is improved.
In some possible designs, referring to fig. 3 in conjunction with step S130, the following steps may be specifically implemented:
and a substep S131, obtaining sample position sequences containing different theft-proof strategies and not containing the theft-proof strategies according to the current theft-proof scene to obtain a sample position sequence set.
And a substep S132, selecting a sample position sequence corresponding to the anti-theft strategy corresponding to the current anti-theft scene from the sample position sequence set as an anti-theft strategy sample sequence set.
And a substep S133 of screening a sample position sequence meeting the requirement of a preset sample from the anti-theft strategy sample sequence set to obtain a screened anti-theft strategy sample sequence set.
And a substep S134, marking the anti-theft strategy position in each sample position sequence in the screened anti-theft strategy sample sequence set, and scrambling the sample position sequence marked with the anti-theft strategy according to the scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to obtain a detection positive sample sequence set.
A substep S135, using the sample position sequences not containing the anti-theft strategy and the sample position sequences containing other anti-theft strategies in the sample position sequence set as a detection negative sample sequence set.
Substep S136, combining the set of detection positive sample sequences and the set of detection negative sample sequences into the set of detection sample sequences.
And a substep S137, using the set of detection positive sample sequences as a set of filtering positive sample sequences.
And a substep S138, scrambling the sample position sequence which does not contain the anti-theft strategy in the sample position sequence set and the sample position sequence which contains the set sequence sample according to the scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to obtain a filtered negative sample sequence set, and combining the filtered positive sample sequence set and the filtered negative sample sequence set into a filtered sample sequence set.
And a substep S139 of identifying a first position sequence in the to-be-processed position sequence according to the detection sample sequence set, and filtering the first position sequence according to the filtered sample sequence set to obtain the to-be-processed position sequence.
Based on the steps, the plurality of geographical position sequences can be filtered, the position sequences to be processed can be accurately obtained under the condition of complex geographical position change, and the accuracy of subsequent anti-theft management is improved.
In some possible designs, please refer to fig. 4 in conjunction with step S180, which may be specifically implemented by the following sub-steps:
and a substep S181, obtaining a storage position of a target storage sequence in the public storage sequence after the anti-theft scrambling process, and determining a corresponding position to be fused of the target storage sequence in the encrypted storage sequence according to the storage position of the target storage sequence.
And a substep S182 of scrambling the position to be fused in the encrypted storage sequence to obtain the scrambled position to be fused.
And a substep S183 of fusing the public storage sequence subjected to the anti-theft scrambling process and the position to be fused after the scrambling process in the encrypted storage sequence according to the position to be fused after the scrambling process.
Based on the steps, only the storage position of the obtained target storage sequence is required to be processed in the fusion process, and independent fusion processing is not required, so that the calculation amount required by data processing is reduced, and the anti-theft processing precision is favorably improved.
In some possible designs, for sub-step S181, specifically, a base storage location may be obtained according to a storage location of the target storage sequence, a polling confirmation operation may be performed on the base storage location to form a polling base storage location, analysis processing may be continued on the polling base storage location to obtain a reference location in the polling base storage location, specifically, the polling base storage location may be copied to form a polling computation storage location, analysis processing may be performed on the polling computation storage location to obtain a polling computation storage location histogram matching the polling computation storage location, a polling scrambling threshold may be computed according to the polling computation storage location histogram, the polling computation storage location may be scrambled according to the polling scrambling threshold to form a polling detection storage location, and a highest-ranked polling location in the polling detection storage location may be detected and obtained, and forming the reference position according to the highest position of the scrambling degree. On the basis, the scrambling orientation of the polling basic storage position is calculated according to the reference position, and the polling basic storage position is adjusted according to the scrambling orientation to form a polling scrambling adjustment position. And then, scrambling the polling scrambling adjustment position according to an adjustment scrambling threshold value to determine a position to be fused of the target storage sequence corresponding to the encrypted storage sequence.
Therefore, on one hand, the basic data volume is reduced, the data processing efficiency is improved, on the other hand, the storage position of the target storage sequence is in a standard state, the fusion accuracy is improved, and the anti-theft effect is further improved.
Fig. 5 is a schematic diagram of functional modules of an information anti-theft management device 200 according to an embodiment of the present application, and the information anti-theft management device 200 may be divided into the functional modules according to the above method embodiments. For example, the functional blocks may be divided for the respective functions, or two or more functions may be integrated into one processing block. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, the division of the modules in the present application is schematic, and is only a logical function division, and there may be another division manner in actual implementation. For example, in the case of dividing each function module according to each function, the information theft-prevention management device 200 shown in fig. 5 is only a schematic diagram of one device. The information anti-theft management device 200 may include an acquisition determining module 210, an acquisition module 220, a filtering module 230, a synthesizing module 240, a recording module 250, an obtaining module 260, and a scrambling and merging module 270, and the functions of the functional modules of the information anti-theft management device 200 are described in detail below.
The determining module 210 is configured to determine time series data of the geographic location information in a state where the geographic location information is stored, where the time series data includes a time series segment, and the time series segment has a time when the corresponding location is located.
The obtaining module 220 is configured to obtain the time of the position corresponding to the time sequence segment in the time sequence data in sequence, and continuously and cyclically obtain a plurality of geographical position sequences stored according to the time of the position. The geographic position sequence comprises a longitude and latitude position sequence, an azimuth change position sequence and a geographic coordinate position sequence.
A screening module 230, configured to determine a current theft-proof scenario if a theft-proof management instruction is received, and screen a to-be-processed location sequence from the multiple geographical location sequences based on the current theft-proof scenario.
And a synthesizing module 240, configured to perform sequence synthesis on the to-be-processed position sequence to generate a synthesized position sequence.
A recording module 250, configured to record a storage location compensation table for different storage locations and different location sequences after generating the synthesized location sequence.
An obtaining module 260, configured to obtain a current storage location, and according to the current storage location, obtain, from the storage location compensation table, a location sequence-storage anti-skimming value, required by the synthesized location sequence in the current storage location.
The obtaining module 220 is further configured to obtain a public storage sequence and an encrypted storage sequence of the synthetic position sequence in the current anti-theft scene through the public storage area and the encrypted storage area.
A scrambling and fusing module 270, configured to store an anti-theft scrambling value according to the position sequence required by the public storage sequence in the current storage location, obtain a position sequence of each storage unit in the encrypted storage sequence, obtain an anti-theft scrambling value of each storage unit in the public storage sequence according to the position sequence, the anti-theft scrambling value, and the position sequence of the corresponding storage unit in the encrypted storage sequence, perform anti-theft scrambling processing on the public storage sequence according to the anti-theft scrambling value, and fuse the public storage sequence after anti-theft scrambling processing with the encrypted storage sequence.
In some possible designs, the time sequences include a first time sequence and a second time sequence, the second time sequence corresponds to times at which the positions of the sequence of geographic coordinate positions are located, the first time sequence corresponds to times at which the positions of the sequence of latitude and longitude positions and the sequence of orientation change positions are located, and the times at which the positions are located include times at which the positions of the sequence of latitude and longitude positions, the sequence of orientation change positions, and the sequence of geographic coordinate positions respectively correspond;
The obtaining module 220 obtains the time of the position corresponding to the time sequence in the time sequence data in sequence by:
if the time sequence in the time sequence data is a first time sequence section, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table;
generating a relation distribution diagram of the geographic coordinate position sequence, wherein the relation distribution diagram comprises storage unit distribution data of each storage unit in the geographic coordinate position sequence, and in the relation distribution diagram, an abscissa is a storage unit and an ordinate is the storage unit number of the storage unit;
screening out storage unit distribution data of a preset area from the relation distribution map;
calculating a straight line through linear regression based on the storage unit distribution data of the preset area;
determining a scrambling orientation formed by the straight line and the abscissa of the relation distribution diagram;
calculating a sine value of the scrambling orientation;
multiplying the sine value by a preset constant to obtain a time sequence ratio;
calculating the time of the position of the longitude and latitude position sequence and the time of the position change position sequence according to the time of the position and the time sequence ratio;
And if the time sequence in the time sequence data is a second time sequence segment, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table.
In some possible designs, the filtering module 230 filters the sequence of positions to be processed from the plurality of sequences of geographical positions by:
acquiring sample position sequences containing different anti-theft strategies and not containing the anti-theft strategies according to the current anti-theft scene to obtain a sample position sequence set;
screening out a sample position sequence corresponding to the anti-theft strategy corresponding to the current anti-theft scene from the sample position sequence set to serve as an anti-theft strategy sample sequence set;
screening sample position sequences meeting the requirements of preset samples from the anti-theft strategy sample sequence set to obtain a screened anti-theft strategy sample sequence set;
marking the anti-theft strategy position in each sample position sequence in the screened anti-theft strategy sample sequence set, and scrambling the sample position sequence marked with the anti-theft strategy according to a scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to serve as a detection positive sample sequence set;
taking the sample position sequences not containing the anti-theft strategy and the sample position sequences containing other anti-theft strategies in the sample position sequence set as a detection negative sample sequence set;
Combining the set of test positive sample sequences and the set of test negative sample sequences into the set of test sample sequences;
taking the detection positive sample sequence set as a filtering positive sample sequence set;
scrambling the sample position sequence which does not contain the anti-theft strategy in the sample position sequence set and the sample position sequence which contains the set sequence sample according to the scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to obtain a filtered negative sample sequence set, and combining the filtered positive sample sequence set and the filtered negative sample sequence set into a filtered sample sequence set;
and identifying a first position sequence in the position sequence to be processed according to the detection sample sequence set, and filtering the first position sequence according to the filtering sample sequence set to obtain the position sequence to be processed.
Fig. 6 is a schematic structural diagram of a server 100 for performing the above-mentioned information theft-prevention management method according to an embodiment of the present application, and as shown in fig. 6, the server 100 may include a network interface 110, a machine-readable storage medium 120, a processor 130, and a bus 140. The number of the processors 130 may be one or more, and one processor 130 is taken as an example in fig. 6; the network interface 110, the machine-readable storage medium 120, and the processor 130 may be connected by a bus 140 or otherwise, as exemplified by the connection by the bus 140 in fig. 6.
The machine-readable storage medium 120 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the information theft-prevention management method in the embodiment of the present application (for example, the obtaining determination module 210, the obtaining module 220, the filtering module 230, the synthesizing module 240, the recording module 250, the obtaining module 260, and the scrambling and fusing module 270 in the information theft-prevention management apparatus 200 shown in fig. 5). The processor 130 executes various functional applications and data processing of the terminal device by detecting software programs, instructions and modules stored in the machine-readable storage medium 120, so as to implement the above-mentioned information anti-theft management method, which is not described herein again.
The machine-readable storage medium 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the machine-readable storage medium 120 may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DR RAM). It should be noted that the memories of the systems and methods described herein are intended to comprise, without being limited to, these and any other suitable memories at any other time. In some examples, the machine-readable storage medium 120 may further include memory located remotely from the processor 130, which may be connected to the terminal device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor 130 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 130. The processor 130 may be a general-purpose processor, a Digital signal processor (Digital signal processor dsp), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
The server 100 may interact with other devices via the communication interface 110. Communication interface 110 may be a circuit, bus, transceiver, or any other device that may be used to exchange information. Processor 130 may send and receive information using communication interface 110.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications can be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.

Claims (8)

1. An information anti-theft management method is applied to a server, and the method comprises the following steps:
determining time sequence data of the geographical position information under the state of storing the geographical position information, wherein the time sequence data comprise time sequence sections, and the time sequence sections have corresponding positions;
sequentially acquiring the time of the position corresponding to the time sequence section in the time sequence data, and continuously and circularly acquiring a plurality of geographical position sequences stored according to the time of the position; the geographic position sequence comprises a longitude and latitude position sequence, an orientation change position sequence and a geographic coordinate position sequence;
If an anti-theft management instruction is received, determining a current anti-theft scene, and screening a position sequence to be processed from the plurality of geographical position sequences based on the current anti-theft scene;
performing sequence synthesis on the position sequence to be processed to generate a synthesized position sequence;
after the synthetic position sequence is generated, recording a storage position compensation table aiming at different storage positions and different position sequences;
acquiring a current storage position, and acquiring a position sequence-storage anti-aliasing value of the synthetic position sequence required by the current storage position from the storage position compensation table according to the current storage position;
acquiring a public storage sequence and an encrypted storage sequence of the synthetic position sequence in the current anti-theft scene through a public storage area and an encrypted storage area;
according to the position sequence-storage anti-theft scrambling value required by the public storage sequence under the current storage position, acquiring the position sequence of each storage unit in the encrypted storage sequence, according to the position sequence-storage anti-theft scrambling value and the position sequence of the corresponding storage unit in the encrypted storage sequence, acquiring the anti-theft scrambling value of each storage unit in the public storage sequence, then according to the anti-theft scrambling value, carrying out anti-theft scrambling processing on the public storage sequence, and fusing the public storage sequence after anti-theft scrambling processing with the encrypted storage sequence;
Wherein the step of screening out a sequence of positions to be processed from the plurality of sequences of geographical positions based on the current theft-proof scenario comprises:
obtaining sample position sequences containing different anti-theft strategies and not containing anti-theft strategies according to the current anti-theft scene to obtain a sample position sequence set;
screening out a sample position sequence corresponding to the anti-theft strategy corresponding to the current anti-theft scene from the sample position sequence set to serve as an anti-theft strategy sample sequence set;
screening sample position sequences meeting the requirements of preset samples from the anti-theft strategy sample sequence set to obtain a screened anti-theft strategy sample sequence set;
marking the anti-theft strategy position in each sample position sequence in the screened anti-theft strategy sample sequence set, and scrambling the sample position sequence marked with the anti-theft strategy according to a scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to be used as a detection positive sample sequence set;
taking the sample position sequences not containing the anti-theft strategy and the sample position sequences containing other anti-theft strategies in the sample position sequence set as a detection negative sample sequence set;
combining the set of test positive sample sequences and the set of test negative sample sequences into a set of test sample sequences;
Taking the detection positive sample sequence set as a filtering positive sample sequence set;
scrambling the sample position sequence which does not contain the anti-theft strategy in the sample position sequence set and the sample position sequence which contains the set sequence sample according to the scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to obtain a filtering negative sample sequence set, and combining the filtering positive sample sequence set and the filtering negative sample sequence set into a filtering sample sequence set;
and identifying a first position sequence in the position sequence to be processed according to the detection sample sequence set, and filtering the first position sequence according to the filtering sample sequence set to obtain the position sequence to be processed.
2. The information theft-proof management method according to claim 1, wherein the time sequence comprises a first time sequence and a second time sequence, the second time sequence corresponds to the time of the position of the geographic coordinate position sequence, the first time sequence corresponds to the time of the position of the longitude and latitude position sequence and the position change position sequence, and the time of the position comprises the time of the position corresponding to the longitude and latitude position sequence, the position change position sequence and the geographic coordinate position sequence respectively;
The step of sequentially acquiring the time of the position corresponding to the time sequence in the time sequence data includes:
if the time sequence in the time sequence data is a first time sequence section, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table;
generating a relation distribution diagram of the geographic coordinate position sequence, wherein the relation distribution diagram comprises storage unit distribution data of each storage unit in the geographic coordinate position sequence, and in the relation distribution diagram, an abscissa is a storage unit and an ordinate is the storage unit number of the storage unit;
screening out storage unit distribution data of a preset area from the relation distribution map;
calculating a straight line through linear regression based on the storage unit distribution data of the preset area;
determining a scrambling orientation formed by the straight line and an abscissa of the relationship distribution map;
calculating a sine value of the scrambling orientation;
multiplying the sine value by a preset constant to obtain a time sequence ratio;
calculating the time of the position of the longitude and latitude position sequence and the time of the position change position sequence according to the time of the position and the time sequence ratio;
And if the time sequence in the time sequence data is a second time sequence segment, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table.
3. The information theft-prevention management method according to claim 1 or 2, wherein the step of fusing the public storage sequence and the encrypted storage sequence after the theft-prevention process includes:
acquiring a storage position of a target storage sequence in the public storage sequence after anti-theft scrambling processing, and determining a corresponding position to be fused of the target storage sequence in the encrypted storage sequence according to the storage position of the target storage sequence;
scrambling the position to be fused in the encrypted storage sequence to obtain the scrambled position to be fused;
and according to the position to be fused after scrambling, fusing the public storage sequence after anti-theft scrambling and the position to be fused after scrambling in the encrypted storage sequence.
4. The information theft-proof management method according to claim 3, wherein the step of determining the corresponding position to be fused in the encrypted storage sequence of the target storage sequence according to the storage position of the target storage sequence comprises:
Acquiring a basic storage location according to the storage location of the target storage sequence, performing polling confirmation operation on the basic storage location to form a polling basic storage location, and continuing to perform analysis processing on the polling basic storage location to acquire a reference location in the polling basic storage location, specifically including:
copying the polling basic storage position to form a polling calculation storage position, analyzing and processing the polling calculation storage position to obtain a polling calculation storage position histogram matched with the polling calculation storage position, calculating and forming a polling scrambling threshold according to the polling calculation storage position histogram, scrambling the polling calculation storage position according to the polling scrambling threshold to form a polling detection storage position, detecting and obtaining the highest scrambling position in the polling detection storage position, and forming the reference position according to the highest scrambling position;
calculating a scrambling direction of the polling basic storage position according to the reference position, and adjusting the polling basic storage position according to the scrambling direction to form a polling scrambling adjustment position;
and scrambling the polling scrambling adjustment position according to an adjustment scrambling threshold value to determine a position to be fused of the target storage sequence corresponding to the encryption storage sequence.
5. An information anti-theft management device, applied to a server, the device comprising:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining time sequence data of the geographic position information under the state of storing the geographic position information, the time sequence data comprises time sequence sections, and the time sequence sections have corresponding position time;
the acquisition module is used for sequentially acquiring the time of the position corresponding to the time sequence section in the time sequence data and continuously and circularly acquiring a plurality of geographical position sequences stored according to the time of the position; the geographic position sequence comprises a longitude and latitude position sequence, an orientation change position sequence and a geographic coordinate position sequence;
the screening module is used for determining a current anti-theft scene if an anti-theft management instruction is received, and screening a position sequence to be processed from the plurality of geographical position sequences based on the current anti-theft scene;
the synthesis module is used for carrying out sequence synthesis on the position sequence to be processed to generate a synthesis position sequence;
the recording module is used for recording a storage position compensation table aiming at different storage positions and different position sequences after the synthetic position sequence is generated;
The acquisition module is used for acquiring a current storage position and acquiring a position sequence-storage anti-theft scrambling value of the synthesized position sequence required by the current storage position from the storage position compensation table according to the current storage position;
the acquisition module is further used for acquiring a public storage sequence and an encrypted storage sequence of the synthetic position sequence in the current anti-theft scene through a public storage area and an encrypted storage area;
the scrambling and fusing module is used for acquiring a position sequence of each storage unit in the encrypted storage sequence according to a position sequence-storage anti-theft scrambling value required by the public storage sequence under the current storage position, acquiring an anti-theft scrambling value of each storage unit in the public storage sequence according to the position sequence-storage anti-theft scrambling value and a position sequence of a corresponding storage unit in the encrypted storage sequence, performing anti-theft scrambling processing on the public storage sequence according to the anti-theft scrambling value, and fusing the public storage sequence subjected to anti-theft scrambling processing with the encrypted storage sequence;
wherein the screening module screens out the position sequences to be processed from the plurality of geographical position sequences by:
Acquiring sample position sequences containing different anti-theft strategies and not containing the anti-theft strategies according to the current anti-theft scene to obtain a sample position sequence set;
screening out a sample position sequence corresponding to the anti-theft strategy corresponding to the current anti-theft scene from the sample position sequence set to serve as an anti-theft strategy sample sequence set;
screening sample position sequences meeting the requirements of a preset sample from the anti-theft strategy sample sequence set to obtain a screened anti-theft strategy sample sequence set;
marking the anti-theft strategy position in each sample position sequence in the screened anti-theft strategy sample sequence set, and scrambling the sample position sequence marked with the anti-theft strategy according to a scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to be used as a detection positive sample sequence set;
taking the sample position sequences not containing the anti-theft strategy and the sample position sequences containing other anti-theft strategies in the sample position sequence set as a detection negative sample sequence set;
combining the set of test positive sample sequences and the set of test negative sample sequences into a set of test sample sequences;
taking the detection positive sample sequence set as a filtering positive sample sequence set;
Scrambling the sample position sequence which does not contain the anti-theft strategy in the sample position sequence set and the sample position sequence which contains the set sequence sample according to the scrambling value indicated by the anti-theft strategy corresponding to the current anti-theft scene to obtain a filtered negative sample sequence set, and combining the filtered positive sample sequence set and the filtered negative sample sequence set into a filtered sample sequence set;
and identifying a first position sequence in the position sequence to be processed according to the detection sample sequence set, and filtering the first position sequence according to the filtering sample sequence set to obtain the position sequence to be processed.
6. The information theft-prevention management device according to claim 5, wherein the time sequence includes a first time sequence and a second time sequence, the second time sequence corresponds to the time of the position of the geographic coordinate position sequence, the first time sequence corresponds to the time of the position of the longitude and latitude position sequence and the position change position sequence, and the time of the position includes the time of the position corresponding to the longitude and latitude position sequence, the position change position sequence and the geographic coordinate position sequence respectively;
the acquisition module acquires the time of the position corresponding to the time sequence in the time sequence data in sequence in the following way:
If the time sequence in the time sequence data is a first time sequence section, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table;
generating a relation distribution diagram of the geographic coordinate position sequence, wherein the relation distribution diagram comprises storage unit distribution data of each storage unit in the geographic coordinate position sequence, and in the relation distribution diagram, an abscissa is a storage unit and an ordinate is the storage unit number of the storage unit;
screening out storage unit distribution data of a preset area from the relation distribution map;
calculating a straight line through linear regression based on the storage unit distribution data of the preset area;
determining a scrambling orientation formed by the straight line and an abscissa of the relationship distribution map;
calculating a sine value of the scrambling orientation;
multiplying the sine value by a preset constant to obtain a time sequence ratio;
calculating the time of the position of the longitude and latitude position sequence and the time of the position change position sequence according to the time of the position and the time sequence ratio;
and if the time sequence in the time sequence data is a second time sequence segment, acquiring the time of the position of the geographic coordinate position sequence from a preset time sequence table.
7. A server, comprising a machine-readable storage medium having stored thereon machine-executable instructions and a processor, wherein the processor, when executing the machine-executable instructions, implements the information theft management method of any one of claims 1-4.
8. A readable storage medium having stored therein machine executable instructions which when executed perform the method of information theft management of any one of claims 1-4.
CN201911180017.9A 2019-11-27 2019-11-27 Information anti-theft management method, device, server and readable storage medium Active CN110933161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911180017.9A CN110933161B (en) 2019-11-27 2019-11-27 Information anti-theft management method, device, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911180017.9A CN110933161B (en) 2019-11-27 2019-11-27 Information anti-theft management method, device, server and readable storage medium

Publications (2)

Publication Number Publication Date
CN110933161A CN110933161A (en) 2020-03-27
CN110933161B true CN110933161B (en) 2022-06-28

Family

ID=69852115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911180017.9A Active CN110933161B (en) 2019-11-27 2019-11-27 Information anti-theft management method, device, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN110933161B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117034329B (en) * 2023-10-10 2023-12-26 武汉能钠智能装备技术股份有限公司四川省成都市分公司 Data encryption method and system based on cloud computing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7249730B1 (en) * 2004-09-23 2007-07-31 United States Of America As Represented By The Secretary Of The Army System and method for in-flight trajectory path synthesis using the time sampled output of onboard sensors
CN104103031A (en) * 2014-08-03 2014-10-15 兰州交通大学 Normalization-based vector spatial data blind watermark method
CN107872356A (en) * 2016-09-26 2018-04-03 中兴通讯股份有限公司 The method and apparatus that business function chain detects path

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9467500B2 (en) * 2012-08-09 2016-10-11 Rockwell Automation Technologies, Inc. Remote industrial monitoring using a cloud infrastructure
JP6242930B2 (en) * 2016-03-17 2017-12-06 株式会社東芝 Sensor data management device, sensor data management method and program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7249730B1 (en) * 2004-09-23 2007-07-31 United States Of America As Represented By The Secretary Of The Army System and method for in-flight trajectory path synthesis using the time sampled output of onboard sensors
CN104103031A (en) * 2014-08-03 2014-10-15 兰州交通大学 Normalization-based vector spatial data blind watermark method
CN107872356A (en) * 2016-09-26 2018-04-03 中兴通讯股份有限公司 The method and apparatus that business function chain detects path

Also Published As

Publication number Publication date
CN110933161A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
CN110035105B (en) Screen recording evidence obtaining method and system based on block chain and electronic equipment
CN109086734B (en) Method and device for positioning pupil image in human eye image
CN113672937B (en) Block chain link point
US20190190911A1 (en) Methods, apparatus, and systems for identity authentication
CN110874674B (en) Abnormality detection method, device and equipment
CN111612834B (en) Method, device and equipment for generating target image
US10289695B2 (en) Computerized system and method for performing a location-based search
CN107426693B (en) Positioning method and device
CN111506889B (en) User verification method and device based on similar user group
CN112102288B (en) Water body identification and water body change detection method, device, equipment and medium
CN104333694B (en) A method of prevent shops from visiting fraud of taking pictures
CN110909306B (en) Business abnormality detection method and device, electronic equipment and storage equipment
EP3157249A1 (en) Certification device and method using image sensor
TWI696086B (en) Entity information verification method and device
CN111784730B (en) Object tracking method and device, electronic equipment and storage medium
CN110933161B (en) Information anti-theft management method, device, server and readable storage medium
CN110677810B (en) Method and apparatus for generating geo-fences
EP3945696B1 (en) Blockchain data processing method, apparatus, and device
CN108075916B (en) Method and system for evaluating service quality of A-GNSS server
CN111181957B (en) Internet of things equipment security verification method and system and central control equipment
CN107247280B (en) Positioning authentication and processing method and device
CN110839201B (en) Pipeline data processing method, transmitting device, receiving device and storage medium
US20220398318A1 (en) Apparatuses, methods, and computer programs for detecting an impostor system
CN108270834B (en) Data transmission method and device
AU2021104769A4 (en) An improvisation system for computer network security based on an iot and block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220608

Address after: Residential building 2011, block C, Huating Jiayuan, dijunfeng, Jianxiang 3, Huayan Beili, North Fourth Ring Middle Road, Chaoyang District, Beijing

Applicant after: Beijing Tuopu Fenglian Information Technology Co.,Ltd.

Address before: 074203 No. 90, beijiazhuang village, lingyunce Township, Yi County, Baoding City, Hebei Province

Applicant before: Wang Xiangyuan

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220726

Address after: Residential building 2011, block C, Huating Jiayuan, dijunfeng, Jianxiang 3, Huayan Beili, North Fourth Ring Middle Road, Chaoyang District, Beijing

Patentee after: Beijing Tuopu Fenglian Information Technology Co.,Ltd.

Patentee after: Henan Tupu computer network engineering Co.,Ltd.

Patentee after: HEFEI TOPNET SYSTEM ENGINEERING CO.,LTD.

Patentee after: Beijing swordfish Information Technology Co.,Ltd.

Address before: Residential building 2011, block C, Huating Jiayuan, dijunfeng, Jianxiang 3, Huayan Beili, North Fourth Ring Middle Road, Chaoyang District, Beijing

Patentee before: Beijing Tuopu Fenglian Information Technology Co.,Ltd.

TR01 Transfer of patent right