CN111277702B - Multilink safety mobile phone companion system - Google Patents

Multilink safety mobile phone companion system Download PDF

Info

Publication number
CN111277702B
CN111277702B CN202010070811.4A CN202010070811A CN111277702B CN 111277702 B CN111277702 B CN 111277702B CN 202010070811 A CN202010070811 A CN 202010070811A CN 111277702 B CN111277702 B CN 111277702B
Authority
CN
China
Prior art keywords
data
link
transmitted
fingerprint
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010070811.4A
Other languages
Chinese (zh)
Other versions
CN111277702A (en
Inventor
张凯
郑应强
唐斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing LSSEC Technology Co Ltd
Original Assignee
Beijing LSSEC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing LSSEC Technology Co Ltd filed Critical Beijing LSSEC Technology Co Ltd
Priority to CN202010070811.4A priority Critical patent/CN111277702B/en
Publication of CN111277702A publication Critical patent/CN111277702A/en
Application granted granted Critical
Publication of CN111277702B publication Critical patent/CN111277702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/609Secret communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a multilink security mobile phone companion system. The system comprises: the transmission terminal is connected with the multilink mobile phone partner and used for acquiring data to be transmitted and transmitting the data to be transmitted to the multilink mobile phone partner; the multilink mobile phone partner is respectively connected with the transmission end and the safety processing end and is used for receiving data to be transmitted and sending the data to be transmitted to the safety processing end through a plurality of links; the security processing end is used for receiving the data to be transmitted through the plurality of links so as to process the data to be transmitted, the security processing end can send all the data to be transmitted received through the plurality of links to another transmission end, and certainly, if the other transmission end has data to be transmitted back, the data can also be transmitted to the security processing end through the plurality of links, so that the security data communication between the two transmission ends is realized. The technical scheme of the invention can improve the data transmission efficiency and the transmission safety by utilizing multilink transmission.

Description

Multilink safety mobile phone companion system
Technical Field
The invention relates to the technical field of transmission, in particular to a multilink security mobile phone companion system.
Background
At present, when data is transmitted, a link is generally adopted for point-to-point transmission, so that the transmission efficiency is low, the safety is low, and once the link is intercepted, all transmitted data can be illegally obtained and leaked, and the transmission safety is further influenced.
Disclosure of Invention
The embodiment of the invention provides a multilink security mobile phone companion system. The technical scheme is as follows:
the embodiment of the invention provides a multilink security mobile phone companion system, which comprises:
the transmission terminal is connected with the multilink mobile phone partner and used for acquiring data to be transmitted and transmitting the data to be transmitted to the multilink mobile phone partner;
the multilink mobile phone partner is respectively connected with the transmission end and the safety processing end and is used for receiving the data to be transmitted and sending the data to be transmitted to the safety processing end through a plurality of links;
and the safety processing end is used for receiving the data to be transmitted through a plurality of links so as to process the data to be transmitted.
In one embodiment, the multi-link handset companion is further to:
determining a number of links of the plurality of links;
carrying out crushing treatment on the data to be transmitted according to the link number to obtain multiple pieces of crushed data;
and transmitting the multiple pieces of broken data to the safety processing end through the multiple links, wherein at least one piece of broken data is transmitted on each link in the multiple links.
In one embodiment, the multi-link handset companion includes:
the system comprises a transmission interface and a plurality of link interfaces, wherein each link interface in the plurality of link interfaces corresponds to a link; the transmission interface is used for receiving the data to be transmitted sent by the transmission end;
the link interfaces are respectively used for:
and transmitting the broken data to the safety processing end through a corresponding link, wherein the transmission interface comprises a WiFi interface or a USB interface.
In one embodiment, the multi-link handset companion further comprises a first processing chip connected with the transmission interface and the link interface;
the first processing chip is further configured to:
acquiring a preset fingerprint of a user;
acquiring an encryption algorithm;
establishing a database corresponding to the fingerprint and the encryption algorithm according to the preset fingerprint and the encryption algorithm;
when encryption is carried out, a fingerprint input interface is displayed, and a current fingerprint input by a user is obtained through the fingerprint input interface;
judging whether the current fingerprint is matched with a preset fingerprint in the database;
if so, acquiring an encryption algorithm corresponding to the preset fingerprint and generating a random code;
encrypting the broken data transmitted by each link based on the corresponding encryption algorithm and the random code to obtain encrypted broken data;
the link interfaces are used for:
and transmitting the encrypted broken data to the safety processing end through a corresponding link.
In one embodiment, the first processing chip is specifically configured to implement the following steps:
a1, preprocessing the image of the preset fingerprint of the user, extracting the fingerprint feature point set (1) of the user, acquiring an encryption algorithm, encrypting the acquired preset fingerprint of the user according to a formula (2), and generating and establishing the corresponding database;
Tμ={mi=(xi,yi,θi,tri1,tri2,tri3).f(Ri)|1≤i≤n} (1)
Figure BDA0002377269750000031
wherein, TμIs the set of fingerprint feature points, x, of the useriFor the abscissa, y, of the predetermined fingerprint feature minutiae of the useriFor the longitudinal coordinate, theta, of a predetermined fingerprint feature minutia of the useriDirection field angle, m, of preset fingerprint feature minutiae for the useriA plurality of minutiae points, tr, of a preset fingerprint for the useri1,tri2,tri3Minutiae m of a preset fingerprint for the useriI is more than or equal to 1 and less than or equal to n is the number of minutiae of the preset fingerprint of the user, f (R)i) Minutiae m of a preset fingerprint for the useriA multivariate linear function of (a); fkThe preset fingerprint is encrypted through the encryption algorithm to generate data;
a2, according to formula (3), comparing sequence data generated by the encryption algorithm of the current fingerprint input by the user and acquired by the fingerprint input interface with the encrypted data of the user preset fingerprint in the database, and judging whether the current fingerprint of the user is matched with the user preset fingerprint in the database;
Figure BDA0002377269750000032
wherein D isHThe distance between the sequence data generated by the encryption algorithm and the current fingerprint input by the user and obtained by the fingerprint input interface after normalization and the encrypted data of the preset fingerprint of the user in the database is represented by 256, the length H represents the length between the sequence data generated by the encryption algorithm and the current fingerprint input by the user and obtained by the fingerprint input interface and the encrypted data of the preset fingerprint of the user in the database, and H represents the length between the sequence data generated by the encryption algorithm and obtained by the fingerprint input interface and obtained by the user and obtained by the encryption algorithm and the encrypted data ofS1Representing the fingerprint input interface to acquire sequence data generated by the encryption algorithm of the current fingerprint input by the user, HS2The encryption data of the user preset fingerprints in the database are represented, w represents that the fingerprint input interface acquires sequence data generated by the current fingerprints input by the user through the encryption algorithm and each digit numerical value in the encryption data sequence of the user preset fingerprints in the database;
if the distance D isHIf the current fingerprint is larger than the set threshold value, the current fingerprint is judged to be not matched with the preset fingerprint in the database, otherwise, the current fingerprint is judged to be matched with the preset fingerprint in the database.
In one embodiment, the first processing chip is further configured to:
adding a preset identifier of the multilink mobile phone companion to the encrypted broken data;
backing up the encrypted broken data added with the preset identifier;
each link interface is further configured to:
transmitting the encrypted broken data added with the preset identifier to the safety processing end through a corresponding link;
the first processing chip is further configured to:
after the data is transmitted to the safety processing end, judging whether a first broken data request sent by preset equipment is received or not;
if the first broken data request is received, monitoring whether the encrypted broken data added with the preset identifier and backed up in the multilink mobile phone partner is deleted;
when the deleted broken data is monitored to appear, acquiring a deleting mode of the deleted broken data;
when the deleting mode of the deleted broken data is an abnormal deleting mode, sending a second broken data request to the safety processing end, wherein the second broken data request comprises the preset identification, and the abnormal deleting mode is that data is removed through an abnormal deleting entry;
receiving the deleted broken data sent by the security processing terminal based on the second broken data request;
and sending the deleted crushing data to the preset equipment.
In one embodiment, the secure processing end comprises a second processing chip;
the second processing chip is used for recombining the broken data transmitted by each link from the link interface to obtain recombined data.
In one embodiment, the multi-link handset companion is further to:
determining a transmission quality of each of the plurality of links;
if the transmission quality of at least one link in the links does not meet a preset condition, removing the link of which the transmission quality does not meet the preset condition from the links;
after links of which the transmission quality does not meet preset conditions are removed, calculating the current bandwidth utilization rate of the rest links in the links;
and judging whether the calculated bandwidth utilization rate exceeds a bandwidth threshold, if so, sending a bandwidth alarm, and switching the data transmitted in the residual link into a protection link for transmission.
In one embodiment, the multi-link handset companion is specifically configured to implement the steps of:
step B1, decoding and preprocessing the data to be transmitted according to a pre-established data preprocessing model to obtain decoded data, and performing partial derivative evaluation transformation processing on the decoded data according to a formula (1) to obtain data mark matrixes of all sub-regions;
Figure BDA0002377269750000051
wherein, N is the number of the sub-regions split from the decoded data, i is the number of rows of the sub-regions in the data mark matrix of each sub-region, j is the number of columns of the sub-regions in the data mark matrix of each sub-region, a0Marking the first row value of the matrix for each subregion data, b0Marking the first column value of the matrix for each subarea data,
Figure BDA0002377269750000052
arranging the row values of the data mark matrix of each subarea according to equal difference,
Figure BDA0002377269750000053
arranging the columns of the data mark matrix of each subarea according to equal ratio,
Figure BDA0002377269750000054
marking serial numbers of the marked lines of the sub-area data marking matrix after partial derivative evaluation transformation,
Figure BDA0002377269750000055
marking serial numbers F (a) of the sub-region data marking matrix after the partial derivative evaluation transformation of the column valuesi,bj) Marking a matrix for each sub-region data acquired through partial derivative evaluation transformation processing;
b2, carrying out nonlinear cutting processing on the sub-region data mark matrix obtained in the step B1 according to a formula (2) to obtain each broken data subset with marks;
Figure BDA0002377269750000061
where k is the number of subsets in the set of fractured data having markers, l is the length of the subset data in the set of fractured data having markers, εkFor each subset specific element, gamma, in the set of fragmented data with labelslFor the number of subsets of length l of data in the set of fragmented data with labels, εkγl(ai+bj)2For a set of fragmented data with flags that is subjected to a number of subsets, subset data length merge operation, (ε)k-1)2l+1)2Means for subjecting said marked fragmented data set to a non-linear cutting process, P (epsilon)kl) Obtaining a plurality of subsets of the fragmented data each having a tag;
step B3, performing discrete probability distribution on the broken data subsets with the marks obtained in the step B2 and the plurality of links, judging the number of data transmitted by each link according to the result of formula (3), and executing the operation of transmitting the data to be transmitted to the safety processing end through the plurality of links;
Figure BDA0002377269750000062
wherein exp is an exponential function with a natural constant e as a base, q is the number of the broken data with marks transmitted by each link, M is the number of the multilinks,
Figure BDA0002377269750000063
discrete probability distribution over the plurality of links for fragmented data subsets of different data lengths each having a label, rlk-1)m-1For the various data length fragmented data subsets with flags arranged in a distributed manner with different data lengths, Ass (x)q) Transmitting the fraction of fragmented data for each of the multiple links when Ass (x)q) When not 0, it indicates that the mark exists in each linkThe operation of transmitting the data to be transmitted to the secure processing terminal through a plurality of links is executed.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
through a system consisting of a transmission end, a multilink mobile phone partner and a safety processing end, data to be transmitted can be transmitted to the multilink mobile phone partner, and then the data to be transmitted is sent to the safety processing end through a plurality of links by means of the multilink mobile phone partner, so that the safety processing end processes the data to be transmitted, such as various operations of data integration, sending, summarizing, screening and the like, and the data transmission efficiency is improved by utilizing multilink transmission.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a block diagram illustrating a multilink secure handset companion system in accordance with an exemplary embodiment.
Fig. 2 is a block diagram illustrating a multilink handset companion according to an example embodiment.
Fig. 3 is a block diagram illustrating another multilink secure handset companion system in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
In order to solve the above technical problem, an embodiment of the present invention provides a multilink security handset companion system, as shown in fig. 1, the system includes:
the transmission terminal 101 is connected with a multilink mobile phone partner and used for acquiring data to be transmitted and transmitting the data to be transmitted to the multilink mobile phone partner; the transmission end may be one or more terminals.
The multilink mobile phone partner 102 is respectively connected with the transmission end and the security processing end, and is used for receiving the data to be transmitted and sending the data to be transmitted to the security processing end through a plurality of links; the multilink mobile phone partner can be a portable device, also called multilink safe transmission device, and can realize safe transmission of data to be transmitted through multilinks.
The secure processing terminal 103 is configured to receive the data to be transmitted through a plurality of links, so as to process the data to be transmitted. The safety processing end can be a safety server or another multi-link mobile phone partner.
Through a system consisting of a transmission end, a multilink mobile phone partner and a safety processing end, data to be transmitted can be transmitted to the multilink mobile phone partner, and then the data to be transmitted is sent to the safety processing end through a plurality of links by means of the multilink mobile phone partner, so that the safety processing end processes the data to be transmitted, such as various operations of data integration, sending, summarizing, screening and the like, and the data transmission efficiency is improved by utilizing multilink transmission.
In addition, the security processing terminal 103 may send all the to-be-transmitted data received through the multiple links to another transmission terminal, and certainly, if there is data to be returned by another transmission terminal, the data may also be transmitted to the security processing terminal 103 through the multiple links, and then the security processing terminal 103 may transmit the data to the multilink handset partner 102 through the multiple links, so that the multilink handset partner 102 may recombine the data and send the data to the transmission terminal, so as to implement secure data communication between the two transmission terminals.
In one embodiment, the multi-link handset companion is further to:
determining a number of links of the plurality of links;
carrying out crushing treatment on the data to be transmitted according to the link number to obtain multiple pieces of crushed data;
and transmitting the multiple pieces of broken data to the safety processing end through the multiple links, wherein at least one piece of broken data is transmitted on each link in the multiple links.
When the multilink mobile phone partner transmits data, specific link data of a plurality of links can be confirmed, and then the data to be transmitted is broken according to the number of the links, so that a plurality of broken data are obtained, and the broken data are transmitted through the plurality of links.
In addition, the above embodiments may be accomplished by a first processing chip in a multi-link handset companion.
As shown in fig. 2 and 3, in one embodiment, the multi-link handset companion 102 includes:
a transmission interface 1022 and a plurality of link interfaces 1021, where each link interface in the plurality of link interfaces corresponds to a link; the transmission interface 1022 is configured to receive the data to be transmitted sent by the transmission end;
each link interface 1021 is configured to:
and transmitting the broken data to the safety processing end through a corresponding link, wherein the transmission interface comprises a WiFi interface or a USB interface.
The multilink mobile phone companion is essentially a transmission terminal and comprises a transmission interface and a plurality of link interfaces, so that after data to be transmitted is received through the transmission interface, the data to be transmitted can be subjected to fragmentation processing, and then the plurality of link interfaces can respectively send at least one piece of fragmentation data to a safety processing end.
As shown in fig. 3, in one embodiment, the multi-link handset companion further comprises a first processing chip 1023 connected to the transmission interface and the link interface; the first processing chip 1023 may be a processor such as a cpu (central processing unit).
The first processing chip 1023 is further configured to:
acquiring a preset fingerprint of a user;
acquiring an encryption algorithm;
establishing a database corresponding to the fingerprint and the encryption algorithm according to the preset fingerprint and the encryption algorithm;
when encryption is carried out, a fingerprint input interface is displayed, and a current fingerprint input by a user is obtained through the fingerprint input interface;
judging whether the current fingerprint is matched with a preset fingerprint in the database;
if so, acquiring an encryption algorithm corresponding to the preset fingerprint and generating a random code;
encrypting the broken data transmitted by each link based on the corresponding encryption algorithm and the random code to obtain encrypted broken data;
the link interfaces are used for:
and transmitting the encrypted broken data to the safety processing end through a corresponding link.
After the database is automatically established based on the preset fingerprint and the encryption algorithm, if the encryption is carried out, namely the user wants to encrypt, a fingerprint input interface is displayed, then, the current fingerprint input by the user is obtained, if the current fingerprint is matched with the preset fingerprint in the database, an encryption algorithm corresponding to a preset fingerprint is automatically acquired and a random code is generated, and based on the corresponding encrypted data and the random code, encrypting the broken data transmitted by each link to obtain encrypted broken data, then sending the encrypted broken data to the security processing end, the encryption can improve the security of data transmission, and because different fingerprints correspond to different encryption algorithms, therefore, the security of data transmission and the flexibility and convenience of encryption can be further improved by encrypting by using the fingerprint and the encryption algorithm corresponding to the fingerprint.
In one embodiment, the first processing chip is specifically configured to implement the following steps:
a1, preprocessing the image of the preset fingerprint of the user, extracting the fingerprint feature point set (1) of the user, acquiring an encryption algorithm, encrypting the acquired preset fingerprint of the user according to a formula (2), and generating and establishing the corresponding database;
Tμ={mi=(xi,yi,θi,tri1,tri2,tri3).f(Ri)|1≤i≤n} (1)
Figure BDA0002377269750000101
wherein, TμIs the set of fingerprint feature points, x, of the useriFor the abscissa, y, of the predetermined fingerprint feature minutiae of the useriFor the longitudinal coordinate, theta, of a predetermined fingerprint feature minutia of the useriDirection field angle, m, of preset fingerprint feature minutiae for the useriA plurality of minutiae points, tr, of a preset fingerprint for the useri1,tri2,tri3Minutiae m of a preset fingerprint for the useriI is more than or equal to 1 and less than or equal to n is the number of minutiae of the preset fingerprint of the user, f (R)i) Minutiae m of a preset fingerprint for the useriA multivariate linear function of (a); fkThe preset fingerprint is encrypted through the encryption algorithm to generate data;
a2, according to formula (3), comparing sequence data generated by the encryption algorithm of the current fingerprint input by the user and acquired by the fingerprint input interface with the encrypted data of the user preset fingerprint in the database, and judging whether the current fingerprint of the user is matched with the user preset fingerprint in the database;
Figure BDA0002377269750000111
wherein D isHThe distance between the sequence data generated by the encryption algorithm and the current fingerprint input by the user and obtained by the fingerprint input interface after normalization and the encrypted data of the preset fingerprint of the user in the database is represented by 256, the length H represents the length between the sequence data generated by the encryption algorithm and the current fingerprint input by the user and obtained by the fingerprint input interface and the encrypted data of the preset fingerprint of the user in the database, and H represents the length between the sequence data generated by the encryption algorithm and obtained by the fingerprint input interface and obtained by the user and obtained by the encryption algorithm and the encrypted data ofS1Representing the fingerprint input interface to acquire sequence data generated by the encryption algorithm of the current fingerprint input by the user, HS2The encryption data of the user preset fingerprints in the database are represented, w represents that the fingerprint input interface acquires sequence data generated by the current fingerprints input by the user through the encryption algorithm and each digit numerical value in the encryption data sequence of the user preset fingerprints in the database;
a3 if the distance DHIf the current fingerprint is larger than the set threshold value, the current fingerprint is judged to be not matched with the preset fingerprint in the database, otherwise, the current fingerprint is judged to be matched with the preset fingerprint in the database.
Has the advantages that: with the popularization of information technology and internet technology, information security becomes the focus of attention. However, in the conventional identity authentication, since a user password or a key is easy to be stolen, lost or copied, the requirements of modern information security cannot be met. The fingerprint feature encryption technology combines a biological identification technology with a cryptography theory, overcomes the limitation of the traditional identity authentication, and greatly improves the information security of users.
In one embodiment, the first processing chip is further configured to:
adding a preset identifier of the multilink mobile phone companion to the encrypted broken data; the preset identifier can be a unique identifier such as a mobile phone number, a factory serial number and the like.
Backing up the encrypted broken data added with the preset identifier;
each link interface is further configured to:
transmitting the encrypted broken data added with the preset identifier to the safety processing end through a corresponding link;
the first processing chip is further configured to:
after the data is transmitted to the safety processing end, judging whether a first broken data request sent by preset equipment is received or not; the preset device may be any other device.
If the first broken data request is received, monitoring whether the encrypted broken data added with the preset identifier and backed up in the multilink mobile phone partner is deleted;
when the deleted broken data is monitored to appear, acquiring a deleting mode of the deleted broken data;
when the deleting mode of the deleted broken data is an abnormal deleting mode, sending a second broken data request to the safety processing end, wherein the second broken data request comprises the preset identification, and the abnormal deleting mode is that data is removed through an abnormal deleting entry;
the abnormal deletion mode can be a third-party cleaning software entrance, and the encrypted broken data does not have the suffix name and the attribute of common data, and can be detected by the third-party cleaning software, scanned into junk data and deleted by mistake, so that the abnormal deletion mode is realized.
Receiving the deleted broken data sent by the security processing terminal based on the second broken data request;
and sending the deleted crushing data to the preset equipment.
Usually, the multilink handset partner also locally backs up the data to be transmitted for convenience, so that after the first processing chip sends the data to be transmitted to the security processing end, if a first data-breaking request sent by other equipment is received, monitoring whether the broken data locally stored by the multi-link mobile phone partner is deleted or not, if so, determining whether the deleted file of the deleted fragmented data is an abnormal deletion mode, if so, indicating that the deleted fragmented data has been abnormally deleted, i.e., the deleted fragmented data does not exist locally and cannot be recovered, a second fragmented data request may be sent to the secure processing side, the deleted broken data is obtained through the safety processing end, so that the preset device can be ensured to obtain correct broken data, and the situation that the preset device cannot obtain backup broken data due to the fact that the backup data of the multilink mobile phone partner is lost locally is avoided.
In one embodiment, the secure processing end comprises a second processing chip; the second processing chip may be a processor such as a cpu (central processing unit).
The second processing chip is used for recombining the broken data transmitted by each link from the link interface to obtain recombined data.
The second processing chip can recombine the broken data transmitted by each link to obtain complete data to be transmitted.
In one embodiment, the multi-link handset companion is further to:
determining a transmission quality of each of the plurality of links; the parameters of the transmission quality may be signal strength, data error rate, etc.
If the transmission quality of at least one link in the links does not meet a preset condition, removing the link of which the transmission quality does not meet the preset condition from the links;
after links of which the transmission quality does not meet preset conditions are removed, calculating the current bandwidth utilization rate of the rest links in the links; the rest links are links except for the links which do not meet the preset condition in the plurality of links.
And judging whether the calculated bandwidth utilization rate exceeds a bandwidth threshold, if so, sending a bandwidth alarm, and switching the data transmitted in the residual link into a protection link for transmission.
If the transmission quality of at least one link in the links does not meet the preset condition, such as low signal strength and high error rate, it is indicated that the transmission quality of the at least one link is low and is not beneficial to transmission, therefore, the link whose transmission quality does not meet the preset condition can be eliminated from the links, then the current bandwidth utilization rate of the remaining links is calculated, and further, if the current bandwidth utilization rate exceeds the bandwidth threshold, a bandwidth alarm is sent out, that is, the user is timely prompted that the bandwidth is insufficient and is currently overloaded for transmission, and meanwhile, the data transmitted in the links is switched to the protection link for transmission, that is, protection switching is performed, so as to further improve the stability of data transmission.
Taking MLPPP as an example, the protection switching is to switch the transmitted data from the current MLPPP to another MLPPP, or to transmit the data in another network channel that can replace the current MLPPP. For example, the protection switching command may be issued by software.
Of course, the protection link may also be a link that is newly established when calculating the current bandwidth utilization of the remaining links in the multiple links and is used for assisting transmission of data to be transmitted, such as a link that is created by using a mobile network, where the link that is used for assisting transmission of data to be transmitted corresponds to a standby link interface on a multi-link handset partner (that is, a transmission link of the standby link interface is the link that is used for assisting transmission of data to be transmitted).
In one embodiment, the multi-link handset companion is specifically configured to implement the steps of:
step B1, decoding and preprocessing the data to be transmitted according to a pre-established data preprocessing model to obtain decoded data, and performing partial derivative evaluation transformation processing on the decoded data according to a formula (1) to obtain data mark matrixes of all sub-regions;
Figure BDA0002377269750000141
wherein, N is the number of the sub-regions split from the decoded data, i is the number of rows of the sub-regions in the data mark matrix of each sub-region, j is the number of columns of the sub-regions in the data mark matrix of each sub-region, a0Marking the first row value of the matrix for each subregion data, b0Marking the first column value of the matrix for each subarea data,
Figure BDA0002377269750000142
arranging the row values of the data mark matrix of each subarea according to equal difference,
Figure BDA0002377269750000143
arranging the columns of the data mark matrix of each subarea according to equal ratio,
Figure BDA0002377269750000144
marking serial numbers of the marked lines of the sub-area data marking matrix after partial derivative evaluation transformation,
Figure BDA0002377269750000145
marking serial numbers F (a) of the sub-region data marking matrix after the partial derivative evaluation transformation of the column valuesi,bj) Marking a matrix for each sub-region data acquired through partial derivative evaluation transformation processing;
b2, carrying out nonlinear cutting processing on the sub-region data mark matrix obtained in the step A1 according to a formula (2) to obtain each broken data subset with marks;
Figure BDA0002377269750000151
where k is the number of subsets in the set of fractured data having markers, l is the length of the subset data in the set of fractured data having markers, εkFor each subset specific element, gamma, in the set of fragmented data with labelslFor the number of subsets of length l of data in the set of fragmented data with labels, εkγl(ai+bj)2For a set of fragmented data with flags that is subjected to a number of subsets, subset data length merge operation, (ε)k-1)2l+1)2Means for subjecting said marked fragmented data set to a non-linear cutting process, P (epsilon)kl) Obtaining a plurality of subsets of the fragmented data each having a tag;
step B3, performing discrete probability distribution on the broken data subsets with the marks obtained in the step A2 and the plurality of links, judging the number of data transmitted by each link according to the result of formula (3), and executing the operation of transmitting the data to be transmitted to the safety processing end through the plurality of links;
Figure BDA0002377269750000152
wherein exp is an exponential function with a natural constant e as a base, q is the number of the broken data with marks transmitted by each link, M is the number of the multilinks,
Figure BDA0002377269750000153
discrete probability distribution over the plurality of links for fragmented data subsets of different data lengths each having a label, rlk-1)m-1For the various data length fragmented data subsets with flags arranged in a distributed manner with different data lengths, Ass (x)q) Transmitting the fraction of fragmented data for each of the multiple links when Ass (x)q) And if not, indicating that the broken data subset with the marks exists in each link, and executing the operation of transmitting the data to be transmitted to the safety processing end through a plurality of links.
The beneficial effects of the above technical scheme are: according to the technical scheme, the data to be transmitted of the multilink security mobile phone partner is subjected to fragmentation marking processing, whether the data to be transmitted is lost or not can be rapidly judged through the continuity of the data marks when the fragmented data is transmitted to the security processing end, and the restoration operation of the data is automatically and rapidly completed.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (7)

1. A multi-link secure cell phone companion system, comprising:
the transmission terminal is connected with the multilink mobile phone partner and used for acquiring data to be transmitted and transmitting the data to be transmitted to the multilink mobile phone partner;
the multilink mobile phone partner is respectively connected with the transmission end and the safety processing end and is used for receiving the data to be transmitted and sending the data to be transmitted to the safety processing end through a plurality of links;
the security processing terminal is used for receiving the data to be transmitted through a plurality of links so as to process the data to be transmitted;
the multi-link handset companion is further to:
determining a transmission quality of each of the plurality of links;
if the transmission quality of at least one link in the links does not meet a preset condition, removing the link of which the transmission quality does not meet the preset condition from the links;
after links of which the transmission quality does not meet preset conditions are removed, calculating the current bandwidth utilization rate of the rest links in the links;
judging whether the calculated bandwidth utilization rate exceeds a bandwidth threshold value, if so, sending a bandwidth alarm, and switching the data transmitted in the remaining links to a protection link for transmission, wherein the protection link comprises a link which is newly established for assisting in transmitting the data to be transmitted when the current bandwidth utilization rate of the remaining links in the plurality of links is calculated;
the multi-link handset companion is specifically configured to implement the steps of:
step B1, decoding and preprocessing the data to be transmitted according to a pre-established data preprocessing model to obtain decoded data, and performing partial derivative evaluation transformation processing on the decoded data according to a formula (1) to obtain data mark matrixes of all sub-regions;
Figure FDA0002763689550000021
wherein, N is the number of the sub-regions split from the decoded data, i is the number of rows of the sub-regions in the data mark matrix of each sub-region, j is the number of columns of the sub-regions in the data mark matrix of each sub-region, a0Marking the first row value of the matrix for each subregion data, b0Marking the first column value of the matrix for each subarea data,
Figure FDA0002763689550000022
arranging the row values of the data mark matrix of each subarea according to equal difference,
Figure FDA0002763689550000023
arranging the columns of the data mark matrix of each subarea according to equal ratio,
Figure FDA0002763689550000024
marking serial numbers of the marked lines of the sub-area data marking matrix after partial derivative evaluation transformation,
Figure FDA0002763689550000025
marking serial numbers F (a) of the sub-region data marking matrix after the partial derivative evaluation transformation of the column valuesi,bj) Marking a matrix for each sub-region data acquired through partial derivative evaluation transformation processing;
b2, carrying out nonlinear cutting processing on the sub-region data mark matrix obtained in the step B1 according to a formula (2) to obtain each broken data subset with marks;
Figure FDA0002763689550000026
where k is the number of subsets in the set of fractured data having markers, l is the length of the subset data in the set of fractured data having markers, εkFor each subset specific element, gamma, in the set of fragmented data with labelslFor the number of subsets of length l of data in the set of fragmented data with labels, εkγl(ai+bj)2For a set of fragmented data with flags that is subjected to a number of subsets, subset data length merge operation, (ε)k-1)2l+1)2Means for subjecting said marked fragmented data set to a non-linear cutting process, P (epsilon)kl) Obtaining a plurality of subsets of the fragmented data each having a tag;
step B3, performing discrete probability distribution on the broken data subsets with the marks obtained in the step B2 and the plurality of links, judging the number of data transmitted by each link according to the result of formula (3), and executing the operation of transmitting the data to be transmitted to the safety processing end through the plurality of links;
Figure FDA0002763689550000031
wherein exp is an exponential function with a natural constant e as a base, q is the number of the broken data with marks transmitted by each link, M is the number of the multilinks,
Figure FDA0002763689550000032
discrete probability assignment over the plurality of links for fragmented data subsets each having a different data length of the tag,rlk-1)m-1For the various data length fragmented data subsets with flags arranged in a distributed manner with different data lengths, Ass (x)q) Transmitting the fraction of fragmented data for each of the multiple links when Ass (x)q) And if not, indicating that the broken data subset with the marks exists in each link, and executing the operation of transmitting the data to be transmitted to the safety processing end through a plurality of links.
2. The system of claim 1, wherein the multi-link handset companion is further configured to:
determining a number of links of the plurality of links;
carrying out crushing treatment on the data to be transmitted according to the link number to obtain multiple pieces of crushed data;
and transmitting the multiple pieces of broken data to the safety processing end through the multiple links, wherein at least one piece of broken data is transmitted on each link in the multiple links.
3. A multilink security handset companion system as claimed in claim 2, said multilink handset companion comprising:
the system comprises a transmission interface and a plurality of link interfaces, wherein each link interface in the plurality of link interfaces corresponds to a link; the transmission interface is used for receiving the data to be transmitted sent by the transmission end;
the link interfaces are respectively used for:
and transmitting the broken data to the safety processing end through a corresponding link, wherein the transmission interface comprises a WiFi interface or a USB interface.
4. The system of claim 3, further comprising a first processing chip coupled to the transmission interface and the link interface;
the first processing chip is further configured to:
acquiring a preset fingerprint of a user;
acquiring an encryption algorithm;
establishing a database corresponding to the fingerprint and the encryption algorithm according to the preset fingerprint and the encryption algorithm;
when encryption is carried out, a fingerprint input interface is displayed, and a current fingerprint input by a user is obtained through the fingerprint input interface;
judging whether the current fingerprint is matched with a preset fingerprint in the database;
if so, acquiring an encryption algorithm corresponding to the preset fingerprint and generating a random code;
encrypting the broken data transmitted by each link based on the corresponding encryption algorithm and the random code to obtain encrypted broken data;
the link interfaces are used for:
and transmitting the encrypted broken data to the safety processing end through a corresponding link.
5. The system of claim 4, wherein the first processing chip is further configured to:
a1, preprocessing the image of the preset fingerprint of the user, extracting the fingerprint feature point set (1) of the user, acquiring an encryption algorithm, encrypting the acquired preset fingerprint of the user according to a formula (2), and generating and establishing the corresponding database;
Tμ={mi=(xi,yi,θi,tri1,tri2,tri3).f(Ri)|1≤i≤n} (1)
Figure FDA0002763689550000041
wherein, TμIs the set of fingerprint feature points, x, of the useriFor the abscissa, y, of the predetermined fingerprint feature minutiae of the useriFor the userBy the ordinate, theta, of a predetermined fingerprint feature minutiaiDirection field angle, m, of preset fingerprint feature minutiae for the useriA plurality of minutiae points, tr, of a preset fingerprint for the useri1,tri2,tri3Minutiae m of a preset fingerprint for the useriI is more than or equal to 1 and less than or equal to n is the number of minutiae of the preset fingerprint of the user, f (R)i) Minutiae m of a preset fingerprint for the useriA multivariate linear function of (a); fkThe preset fingerprint is encrypted through the encryption algorithm to generate data;
a2, according to formula (3), comparing sequence data generated by the encryption algorithm of the current fingerprint input by the user and acquired by the fingerprint input interface with the encrypted data of the user preset fingerprint in the database, and judging whether the current fingerprint of the user is matched with the user preset fingerprint in the database;
Figure FDA0002763689550000051
wherein D isHThe distance between the sequence data generated by the encryption algorithm and the current fingerprint input by the user and obtained by the fingerprint input interface after normalization and the encrypted data of the preset fingerprint of the user in the database is represented by 256, the length H represents the length between the sequence data generated by the encryption algorithm and the current fingerprint input by the user and obtained by the fingerprint input interface and the encrypted data of the preset fingerprint of the user in the database, and H represents the length between the sequence data generated by the encryption algorithm and obtained by the fingerprint input interface and obtained by the user and obtained by the encryption algorithm and the encrypted data ofS1Representing the fingerprint input interface to acquire sequence data generated by the encryption algorithm of the current fingerprint input by the user, HS2The encryption data of the user preset fingerprints in the database are represented, w represents that the fingerprint input interface acquires sequence data generated by the current fingerprints input by the user through the encryption algorithm and each digit numerical value in the encryption data sequence of the user preset fingerprints in the database;
if the distance D isHIf the value is larger than the set threshold value, the judgment is madeAnd the current fingerprint is not matched with the preset fingerprint in the database, otherwise, the current fingerprint is judged to be matched with the preset fingerprint in the database.
6. The system of claim 4, wherein the first processing chip is further configured to:
adding a preset identifier of the multilink mobile phone companion to the encrypted broken data;
backing up the encrypted broken data added with the preset identifier;
each link interface is further configured to:
transmitting the encrypted broken data added with the preset identifier to the safety processing end through a corresponding link;
the first processing chip is further configured to:
after the data is transmitted to the safety processing end, judging whether a first broken data request sent by preset equipment is received or not;
if the first broken data request is received, monitoring whether the encrypted broken data added with the preset identifier and backed up in the multilink mobile phone partner is deleted;
when the deleted broken data is monitored to appear, acquiring a deleting mode of the deleted broken data;
when the deleting mode of the deleted broken data is an abnormal deleting mode, sending a second broken data request to the safety processing end, wherein the second broken data request comprises the preset identification, and the abnormal deleting mode is that data is removed through an abnormal deleting entry;
receiving the deleted broken data sent by the security processing terminal based on the second broken data request;
and sending the deleted crushing data to the preset equipment.
7. The system of claim 3, wherein the secure processing end comprises a second processing chip;
the second processing chip is used for recombining the broken data transmitted by each link from the link interface to obtain recombined data.
CN202010070811.4A 2020-01-21 2020-01-21 Multilink safety mobile phone companion system Active CN111277702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010070811.4A CN111277702B (en) 2020-01-21 2020-01-21 Multilink safety mobile phone companion system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010070811.4A CN111277702B (en) 2020-01-21 2020-01-21 Multilink safety mobile phone companion system

Publications (2)

Publication Number Publication Date
CN111277702A CN111277702A (en) 2020-06-12
CN111277702B true CN111277702B (en) 2021-02-09

Family

ID=70999093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010070811.4A Active CN111277702B (en) 2020-01-21 2020-01-21 Multilink safety mobile phone companion system

Country Status (1)

Country Link
CN (1) CN111277702B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777128A (en) * 2009-11-25 2010-07-14 中国科学院自动化研究所 Fingerprint minutiae matching method syncretized to global information and system thereof
CN105204962A (en) * 2015-09-25 2015-12-30 北京金山安全软件有限公司 Data backup method and device and server
KR101961714B1 (en) * 2017-09-28 2019-07-17 에스케이플래닛 주식회사 Service providing system and method for security based on multi-channel authentication with user equipment, and non-transitory computer readable medium having computer program recorded thereon

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101715209A (en) * 2009-11-11 2010-05-26 中兴通讯股份有限公司 Method and system for multilink transmission data
CN102098301B (en) * 2011-01-06 2015-07-29 复旦大学 The adaptive data transmission method of multilink and system
CN105511988B (en) * 2015-12-14 2018-09-21 北京金山安全软件有限公司 Encrypted data management method and device and electronic equipment
CN105703901B (en) * 2016-03-25 2019-05-03 Oppo广东移动通信有限公司 Encryption data input method and encryption data input unit
CN105897417A (en) * 2016-04-01 2016-08-24 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN106209883A (en) * 2016-07-21 2016-12-07 连山管控(北京)信息技术有限公司 Based on link selection and the multi-chain circuit transmission method and system of broken restructuring
CN108259081A (en) * 2018-01-12 2018-07-06 北京星网卫通科技开发有限公司 Link merges transmitting device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777128A (en) * 2009-11-25 2010-07-14 中国科学院自动化研究所 Fingerprint minutiae matching method syncretized to global information and system thereof
CN105204962A (en) * 2015-09-25 2015-12-30 北京金山安全软件有限公司 Data backup method and device and server
KR101961714B1 (en) * 2017-09-28 2019-07-17 에스케이플래닛 주식회사 Service providing system and method for security based on multi-channel authentication with user equipment, and non-transitory computer readable medium having computer program recorded thereon

Also Published As

Publication number Publication date
CN111277702A (en) 2020-06-12

Similar Documents

Publication Publication Date Title
CN111314218B (en) Multi-link secure transmission router system
TWI707244B (en) Block chain cross-chain authentication method, system, server and readable storage medium
DE60029390T2 (en) Method and apparatus for encryption / decryption and identification systems
CN111770057B (en) Identity verification system and identity verification method
CN111586671B (en) Embedded user identification card configuration method and device, communication equipment and storage medium
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN109190343B (en) Identity verification safety authentication system based on fingerprint identification
WO2019214034A1 (en) Fingerprint management method and system
CN114218322B (en) Data display method, device, equipment and medium based on ciphertext transmission
CN115118419B (en) Data transmission method of security chip, security chip device, equipment and medium
CN112529586B (en) Transaction information management method, device, equipment and storage medium
CN114640523A (en) Computer data security encryption algorithm and system
CN104469736A (en) Data processing method, server and terminal
CN111277702B (en) Multilink safety mobile phone companion system
CN114090994A (en) Face recognition authentication method and system based on block chain
CN109726578A (en) A kind of anti-fake solution of novel dynamic two-dimension code
CN111163104B (en) Network security protection system for enterprise
CN109698839B (en) Desensitization data comparison method and device based on asymmetric algorithm
CN111510288A (en) Key management method, electronic device and storage medium
CN114650285B (en) Method for multi-dimensional full-factor monitoring of real estate registration business
CN116614251A (en) Data security monitoring system
CN105872013A (en) Cloud computing system
CN104580262A (en) Safety method applicable to wireless internet of things
CN213122985U (en) PIS authentication system
CN112491840B (en) Information modification method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant