CN111611616B - Data encryption method based on E-commerce live broadcast platform and big data server - Google Patents

Data encryption method based on E-commerce live broadcast platform and big data server Download PDF

Info

Publication number
CN111611616B
CN111611616B CN202010389368.7A CN202010389368A CN111611616B CN 111611616 B CN111611616 B CN 111611616B CN 202010389368 A CN202010389368 A CN 202010389368A CN 111611616 B CN111611616 B CN 111611616B
Authority
CN
China
Prior art keywords
target
data
live broadcast
broadcast platform
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010389368.7A
Other languages
Chinese (zh)
Other versions
CN111611616A (en
Inventor
蔡萍萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Weiguo Network Technology Co.,Ltd.
Original Assignee
Hubei Weiguo Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Weiguo Network Technology Co ltd filed Critical Hubei Weiguo Network Technology Co ltd
Priority to CN202011276305.7A priority Critical patent/CN112380560A/en
Priority to CN202011276316.5A priority patent/CN112380561A/en
Priority to CN202010389368.7A priority patent/CN111611616B/en
Publication of CN111611616A publication Critical patent/CN111611616A/en
Application granted granted Critical
Publication of CN111611616B publication Critical patent/CN111611616B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application relates to a data encryption method based on an E-commerce live broadcast platform and a big data server. When the method and the device are applied, firstly, when the login information is detected, the communication record of the target user terminal in a set time period and first biological characteristic information collected by the target user terminal are obtained, secondly, the safety factor of each second target E-commerce live broadcast platform is determined according to the communication record, then, the data encryption grade of the target user terminal is determined, further, the privacy data of the target user terminal are encrypted according to the first biological characteristic information and the data encryption grade, and the encryption mode of the encrypted data is updated based on the data encryption grade and the second biological characteristic information collected intermittently. Therefore, the encryption mode of the private data of the user can be switched and updated in real time, the reliability of data encryption is improved, and the private data of the user is prevented from being cracked by a hacker.

Description

Data encryption method based on E-commerce live broadcast platform and big data server
Technical Field
The application relates to the technical field of E-commerce live broadcast, in particular to a data encryption method based on an E-commerce live broadcast platform and a big data server.
Background
The rapid development of internet finance provides great convenience for production and life of modern society. Taking shopping as an example, the traditional offline shopping mode is easily influenced and restricted by many factors. Under the influence of some sudden public health events, the operation of off-line brick and mortar stores becomes more severe. Therefore, online live e-commerce delivery becomes the mainstream shopping mode nowadays, and users can participate in interaction, delivery and shopping through the portable terminal connected with the live e-commerce platform. However, when the e-commerce live broadcast platform communicates with a plurality of portable terminals, how to protect the security of the private data of the user is important. Most of the existing methods for protecting the private data of the user encrypt the private data of the user in a hash value mode, but the reliability of the method is poor, and the method is easy to crack by hackers, so that the private data of the user is leaked.
Disclosure of Invention
The application provides a data encryption method based on an E-commerce live broadcast platform and a big data server, so as to solve the technical problems in the prior art.
The scheme is specifically described below.
A data encryption method based on an E-commerce live broadcast platform is provided and is applied to a big data server, and the method comprises the following steps:
when login information of a target user terminal on a first target E-commerce live broadcast platform is detected, communication records of the target user terminal in a set time period are obtained, and first biological characteristic information is collected through the target user terminal;
determining a user identity of each second target E-commerce live broadcast platform in the communication record, which corresponds to each other user terminal except the target user terminal in the set time period, and determining a safety factor of each second target E-commerce live broadcast platform in the communication record according to the user identity;
determining the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the safety factor of each second target E-commerce live broadcast platform; the data encryption level is used for representing a dimension weight for encrypting the private data between the target user terminal and the first target E-commerce live broadcast platform;
according to the first biological characteristic information and the data encryption grade, carrying out data encryption on the private data uploaded to the first target E-commerce live broadcast platform by the target user terminal to obtain encrypted data;
when the target user terminal keeps a login state on the first target E-commerce live broadcast platform, acquiring second biological characteristic information through the target user terminal according to a set time interval; updating the encryption mode of the encrypted data based on the second biometric information and the data encryption level.
Optionally, determining the user identity of each other user terminal except the target user terminal corresponding to each second target e-commerce live broadcast platform in the communication record within the set time period includes:
acquiring an interaction protocol of each other user terminal corresponding to each second target E-commerce live broadcast platform from the communication record; the interactive protocol is a data transmission protocol corresponding to a communication link established between each other user terminal and a corresponding second target E-commerce live broadcast platform when each other user terminal logs in the corresponding second target E-commerce live broadcast platform;
analyzing each interactive protocol to obtain a target field corresponding to each interactive protocol; the target field is used for representing the communication identification of other user terminals corresponding to each interactive protocol;
and determining terminal equipment information corresponding to each communication identifier from a preset database, and obtaining the user identity identifier of each other user terminal according to the registration information in the terminal equipment information.
Optionally, the method further comprises:
acquiring a modification instruction for modifying the set time interval;
and modifying the set time interval based on the modification instruction.
Optionally, updating the encryption mode of the encrypted data based on the second biometric information and the data encryption level includes:
determining a cosine distance between the second biometric information and the first biometric information;
and when the cosine distance is smaller than a set distance, performing cyclic redundancy encryption on the encrypted data by adopting the character coding string of the second biological characteristic information on the basis of the current encryption mode of the encrypted data.
Optionally, the method further comprises:
when the cosine distance is greater than or equal to the set distance, determining the encryption logic information of the current encryption mode of the encrypted data;
reconstructing the encrypted logic information to obtain target encrypted logic information;
and decrypting the encrypted data based on the encryption logic information to obtain private data, and encrypting the decrypted private data based on the target encryption logic information.
Optionally, determining, based on the security factor of each second target e-commerce live broadcast platform, a data encryption level of the target user terminal relative to the first target e-commerce live broadcast platform includes:
acquiring platform registration information of each second target E-commerce live broadcast platform, and determining a mapping coefficient of a safety factor corresponding to each second target E-commerce live broadcast platform in the platform registration information;
determining information heterogeneous parameters corresponding to each second target E-commerce live broadcast platform according to the mapping coefficients, and searching data heterogeneous weights matched with each information heterogeneous parameter from target registration information corresponding to the first target E-commerce live broadcast platform;
under the condition that the first target E-commerce live broadcast platform is determined to have a first weight classification according to the platform registration information, determining corresponding identifications between the data heterogeneous weights of the first target E-commerce live broadcast platform under a second weight classification and the data heterogeneous weights of the first target E-commerce live broadcast platform under the first weight classification according to the data heterogeneous weights and the weight priority of the first target E-commerce live broadcast platform under the first weight classification;
transferring the data heterogeneous weight of which the corresponding identifier between the data heterogeneous weight of the first target E-commerce live broadcast platform under the second weight classification and the data heterogeneous weight under the first weight classification is a set identifier to the first weight classification; wherein the confidence of the first weight classification is greater than the confidence of the second weight classification;
and calculating the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the data heterogeneous weight under the first weight classification.
Optionally, determining a safety factor of each second target e-commerce live broadcast platform in the communication record according to the user identity includes:
generating a platform tag data packet corresponding to each second target E-commerce live broadcast platform and extracting identity identification data packets of all user identity identifications corresponding to each second target E-commerce live broadcast platform; the platform tag data packet and the identity data packet respectively contain a plurality of data streams with different communication activeness;
determining a first timing vector of any data stream of each second target E-commerce live broadcast platform in the platform tag data packet, and determining the data stream with the minimum communication activity in the identity identification data packet as a target data stream;
projecting the first time sequence vector to the target data stream according to the proportion between the first quantity of the second target E-commerce live broadcast platform and the second quantity of the user identity, and obtaining a second time sequence vector corresponding to the first time sequence vector in the target data stream;
determining a first safety weight conversion list between all user identification marks corresponding to each second target E-commerce live broadcast platform and each second target E-commerce live broadcast platform according to a difference value sequence of a first vector value in the first time sequence vector and a second vector value in the second time sequence vector;
determining safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the target data stream by taking the second time sequence vector as a reference vector, extracting list generation logic of the first safety weight conversion list, and determining a second safety weight conversion list corresponding to the first safety weight conversion list according to the list generation logic; based on the safety weight conversion list, projecting the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform to the data stream where the first time sequence vector is located, so as to obtain the associated weight corresponding to the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the data stream where the first time sequence vector is located;
and for each second target E-commerce live broadcast platform, determining normalized data of the safety identification data of each user identity corresponding to the second target E-commerce live broadcast platform through the second safety weight conversion list, and weighting all normalized data corresponding to the second target E-commerce live broadcast platform based on the associated weight corresponding to each normalized data to obtain the safety coefficient of the second target E-commerce live broadcast platform.
Optionally, according to the first biometric information and the data encryption level, performing data encryption on the private data uploaded to the first target e-commerce live broadcast platform by the target user terminal to obtain encrypted data, where the data encryption includes:
determining an encryption thread parameter for encrypting the private data according to the first biological characteristic information and the data encryption grade, and searching a memory resource occupancy rate corresponding to the encryption thread parameter in a preset thread resource mapping table;
judging whether the percentage of the residual memory resources reaches the occupancy rate of the memory resources;
when the percentage of the remaining memory resources is judged to reach the memory resource occupancy rate, starting a preset encryption thread according to the encryption thread parameter to encrypt the private data to obtain the encrypted data;
when the percentage of the remaining memory resources does not reach the memory resource occupancy rate, determining a first operation priority corresponding to the encryption thread parameters and second operation priorities corresponding to other threads, pausing the other threads corresponding to the second priorities smaller than the first operation priority to enable the percentage of the remaining memory resources to reach the memory resource occupancy rate, and starting a preset encryption thread according to the encryption thread parameters to encrypt the private data to obtain the encrypted data.
Provided is a big data server, including: the system comprises a processor, a memory and a network interface, wherein the memory and the network interface are connected with the processor; the network interface is connected with a nonvolatile memory in the big data server; when the processor is operated, the computer program is called from the nonvolatile memory through the network interface, and the computer program is operated through the memory so as to execute the method.
A readable storage medium applied to a computer is provided, and the readable storage medium is burned with a computer program, and the computer program realizes the method when running in the memory of a big data server.
When the data encryption method based on the E-commerce live broadcast platform and the big data server are applied, firstly, when login information is detected, communication records of a target user terminal in a set time period and first biological characteristic information collected by the target user terminal are obtained, secondly, the safety factor of each second target E-commerce live broadcast platform is determined according to the communication records, then, the data encryption grade of the target user terminal is determined, further, privacy data of the target user terminal are encrypted according to the first biological characteristic information and the data encryption grade, and the encryption mode of the encrypted data is updated based on the data encryption grade and the second biological characteristic information collected intermittently. Therefore, the encryption mode of the private data of the user can be switched and updated in real time, the reliability of data encryption is improved, and the private data of the user is prevented from being cracked by a hacker.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic architecture diagram of a data encryption system based on a live tv platform according to an exemplary embodiment of the present application.
Fig. 2 is a flowchart illustrating a data encryption method based on a live tv platform according to an exemplary embodiment of the present application.
Fig. 3 is a block diagram illustrating an embodiment of a data encryption apparatus based on a live tv platform according to an exemplary embodiment of the present application.
Fig. 4 is a hardware structure diagram of a big data server where a data encryption device based on an e-commerce live broadcast platform is located according to the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application.
The invention discloses a data encryption method based on an E-commerce live broadcast platform and a big data server, aiming at overcoming the defect that the existing method for encrypting the private data of a user by a Hash value taking mode cannot be overcome, and the real-time switching of the encryption mode of the private data of the user can be realized by analyzing the communication records of terminal equipment of the user on different E-commerce live broadcast platforms and the biological characteristic information acquired by the terminal equipment, so that the reliability of data encryption is improved, and the private data of the user is prevented from being cracked by a hacker.
Referring to fig. 1, a schematic view of a communication architecture of a data encryption system 100 based on an e-commerce live broadcast platform according to the present disclosure is shown, where the data encryption system 100 may include a big data server 200, an e-commerce live broadcast platform 300, and a plurality of user terminals 400. Wherein, the E-commerce live broadcast platform 300 and a plurality of user terminals 400 are both in communication with the big data server 200, and the E-commerce live broadcast platform 300 can interact with the user terminals 400. Further, the user terminal 400 may be a mobile phone, a tablet, a notebook, a laptop, etc., and is not limited thereto. The user terminal 400 may also log on to a different live e-commerce platform.
On the basis, please refer to fig. 2 again, which shows a schematic flow diagram of a data encryption method based on the e-commerce live broadcast platform disclosed by the present invention, and the data encryption method may be applied to the big data server 200 in fig. 1, and may specifically include the contents described in the following steps.
S210, when login information of a target user terminal on a first target E-commerce live broadcast platform is detected, communication records of the target user terminal in a set time period are obtained, and first biological characteristic information is collected through the target user terminal.
In the present invention, the set time period may be a time period between a time when the registration information is detected as the end time and a time before the end time as the start time. For example, the termination time is 20: 00, starting time 18: 00, the set period may be 18: 00-20: 00. further, the set time period can be adjusted according to the security level of the target user terminal, and the security level of the target user terminal can be obtained by analyzing the user behavior data corresponding to the target user terminal.
In the invention, the communication record can be an interaction record of the target user terminal and each second target live e-commerce platform in a set period. The communication record may include a login time and a logout time of the target user terminal on each second target live telecast platform. In addition, the communication record may further include a user identity of each user terminal accessed by each second target live tv platform within a set time period.
In this invention, the first biometric information may be face feature information, voiceprint feature information, fingerprint feature information, and/or iris feature information, and is not limited herein.
S220, determining the user identity of each other user terminal except the target user terminal corresponding to each second target E-commerce live broadcast platform in the communication record in the set time period, and determining the safety factor of each second target E-commerce live broadcast platform in the communication record according to the user identity.
In the method, the safety factor is used for representing the probability that each second target E-commerce live broadcast platform has data loss risk in a set time period. The safety factor may be a value between 0 and 1, or may be other values, and is not limited herein.
S230, determining the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the safety factor of each second target E-commerce live broadcast platform; the data encryption level is used for representing a dimension weight for encrypting the private data between the target user terminal and the first target E-commerce live broadcast platform.
In the invention, the larger the data encryption level is, the larger the dimension weight is, the more complicated the encryption protocol corresponding to the private data is, and the updating frequency of the encryption protocol is fast.
And S240, according to the first biological characteristic information and the data encryption grade, carrying out data encryption on the private data uploaded to the first target E-commerce live broadcast platform by the target user terminal to obtain encrypted data.
In the invention, the private data can be encrypted for the first time based on the first biological characteristic information and the data encryption level, and the first biological characteristic information is acquired by the target user terminal when the user logs in the first target E-commerce live broadcast platform through the target user terminal, so that the reliability and the anti-risk performance of data encryption can be ensured.
S250, when the target user terminal keeps a login state on the first target E-commerce live broadcast platform, acquiring second biological characteristic information through the target user terminal according to a set time interval; updating the encryption mode of the encrypted data based on the second biometric information and the data encryption level.
In the invention, the encryption reliability of the encrypted data can be further ensured by intermittently updating the encryption mode of the encrypted data, and the encryption mode of the encrypted data is prevented from being cracked by hackers.
By executing the steps S210-S250, firstly, when the login information is detected, the communication record of the target user terminal in a set time period and the first biological characteristic information collected by the target user terminal are obtained, secondly, the safety factor of each second target E-commerce live broadcast platform is determined according to the communication record, then, the data encryption level of the target user terminal is determined, further, the privacy data of the target user terminal is encrypted according to the first biological characteristic information and the data encryption level, and the encryption mode of the encrypted data is updated based on the data encryption level and the intermittently collected second biological characteristic information. Therefore, the encryption mode of the private data of the user can be switched and updated in real time, the reliability of data encryption is improved, and the private data of the user is prevented from being cracked by a hacker.
The inventor finds that when the steps are applied to an actual live E-commerce scene, a user terminal can log in a live E-commerce platform in an anonymous login mode. In this case, it may be difficult to accurately determine the user identity of the user terminal.
In order to improve the above problem, in S220, the user identity of each other user terminal except the target user terminal corresponding to each second target live tv platform in the communication record in the set time period is determined, which may specifically include the content described in the following steps.
S2211, collecting the interaction protocol of each other user terminal corresponding to each second target E-commerce live broadcast platform from the communication record; and the interactive protocol is a data transmission protocol corresponding to a communication link established between each other user terminal and a second target E-commerce live broadcast platform when each other user terminal logs in the second target E-commerce live broadcast platform corresponding to the other user terminal.
S2212, analyzing each interactive protocol to obtain a target field corresponding to each interactive protocol; and the target field is used for representing the communication identification of other user terminals corresponding to each interactive protocol.
And S2213, determining the terminal equipment information corresponding to each communication identifier from the preset database, and obtaining the user identity identifier of each other user terminal according to the registration information in the terminal equipment information.
It can be understood that, when the contents described in S2211 to S2213 are executed, the communication identifier of the other user terminal can be determined from the interaction protocol level, and since the communication identifier exists uniquely in the interaction protocol, the terminal device information is determined through the communication identifier, and further the user identity identifier of the other user terminal is determined based on the registration information in the terminal device information, so that the uniqueness of the user identity identifier can be ensured. Even if the user terminal logs in the E-commerce live broadcast platform in an anonymous login mode, the user identity can still be determined quickly and accurately.
In specific implementation, the inventor finds that, when calculating the safety factor of each second target live e-commerce platform, the relevance between the user identities is often easily ignored, so that the confidence of the safety factor is reduced.
To improve the above problem, in S220, a safety factor of each second target live tv platform in the communication record is determined according to the user identity, and further the following steps may be included.
S2221, generating a platform tag data packet corresponding to each second target E-commerce live broadcast platform and extracting identity identification data packets of all user identity identifications corresponding to each second target E-commerce live broadcast platform; the platform tag data packet and the identity data packet respectively contain a plurality of data streams with different communication activeness.
S2222, determine a first timing vector of each second target e-commerce live broadcast platform in any data stream of the platform tag data packet, and determine a data stream having a minimum communication activity in the identity data packet as a target data stream.
S2223, projecting the first timing vector into the target data stream according to a ratio between the first number of the second target e-commerce live broadcast platforms and the second number of the user id, and obtaining a second timing vector corresponding to the first timing vector in the target data stream.
S2224, determine, according to a difference sequence between a first vector value in the first timing vector and a second vector value in the second timing vector, a first security weight conversion list between all the user ids corresponding to each of the second target provider live broadcast platforms and each of the second target provider live broadcast platforms.
S2225, determining, in the target data stream, security identifier data of each user identifier corresponding to each second target provider live broadcast platform using the second timing vector as a reference vector, extracting list generation logic of the first security weight conversion list, and determining, according to the list generation logic, a second security weight conversion list corresponding to the first security weight conversion list; and projecting the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform to the data stream where the first time sequence vector is located based on the safety weight conversion list, so as to obtain the associated weight corresponding to the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the data stream where the first time sequence vector is located.
S2226, aiming at each second target E-commerce live broadcast platform, determining the normalized data of the security identification data of each user identity corresponding to the second target E-commerce live broadcast platform through the second security weight conversion list, and weighting all the normalized data corresponding to the second target E-commerce live broadcast platform based on the associated weight corresponding to each normalized data to obtain the security coefficient of the second target E-commerce live broadcast platform.
In specific implementation, by implementing the scheme described in the above steps, the relevance between the user identities can be taken into account, so that the confidence of the safety factor can be improved.
In practical application, in order to ensure the reliability of the data encryption level, the heterogeneity between the second target e-commerce live broadcast platforms corresponding to different safety factors needs to be considered. For this purpose, as described in S230, determining a data encryption level of the target user terminal with respect to the first target e-commerce live broadcast platform based on the safety factor of each second target e-commerce live broadcast platform may specifically include the following steps.
S231, platform registration information of each second target E-commerce live broadcast platform is obtained, and a mapping coefficient of a safety factor corresponding to each second target E-commerce live broadcast platform in the platform registration information is determined.
And S232, determining information heterogeneous parameters corresponding to each second target E-commerce live broadcast platform according to the mapping coefficients, and searching data heterogeneous weights matched with the information heterogeneous parameters from target registration information corresponding to the first target E-commerce live broadcast platform.
And S233, under the condition that the first target live telecast platform is determined to have the first weight classification according to the platform registration information, determining corresponding identifications between the data heterogeneous weights of the first target live telecast platform under the second weight classification and the data heterogeneous weights of the first target live telecast platform under the first weight classification according to the data heterogeneous weights and the weight priority of the first target live telecast platform under the first weight classification.
S234, transferring the data heterogeneous weight of which the corresponding identifier between the data heterogeneous weight of the first target E-commerce live broadcast platform under the second weight classification and the data heterogeneous weight under the first weight classification is a set identifier to the first weight classification; wherein the confidence of the first weight classification is greater than the confidence of the second weight classification.
S235, calculating the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the data heterogeneous weight under the first weight classification.
It can be understood that through S231-S235, the heterogeneity between the second target e-commerce live broadcast platforms corresponding to different safety factors can be taken into account, so as to ensure the reliability of the data encryption level.
When the scheme is applied, the inventor finds that more memory resources are required for encrypting the private data, and the efficiency of data encryption may be affected when the data volume of the private data is too large. In order to solve the above problem, in S240, according to the first biometric information and the data encryption level, data encryption is performed on the private data uploaded to the first target live tv platform by the target user terminal to obtain encrypted data, which may specifically include the following sub-steps.
S241, determining an encryption thread parameter for encrypting the private data according to the first biological characteristic information and the data encryption grade, and searching a memory resource occupancy rate corresponding to the encryption thread parameter in a preset thread resource mapping table.
And S242, judging whether the percentage of the residual memory resources reaches the memory resource occupancy rate.
And S243, when the percentage of the remaining memory resources reaches the memory resource occupancy rate, starting a preset encryption thread according to the encryption thread parameter to encrypt the private data to obtain the encrypted data.
And S244, when it is determined that the percentage of the remaining memory resources does not reach the memory resource occupancy rate, determining a first operation priority corresponding to the encryption thread parameter and second operation priorities corresponding to other threads, suspending other threads corresponding to a second priority smaller than the first operation priority so that the percentage of the remaining memory resources reaches the memory resource occupancy rate, and starting a preset encryption thread according to the encryption thread parameter to perform data encryption on the private data to obtain the encrypted data.
It is understood that based on the description of S241-S244 above, the running priority between different threads can be determined, so that different threads are suspended according to the running priority, so as to ensure that the efficiency of data encryption is improved in the case that the data amount of the private data is too large.
Further, on the basis of the above, the method may further include the steps of: and acquiring a modification instruction for modifying the set time interval, and modifying the set time interval based on the modification instruction. It can be understood that, through the content described in the above steps, the set time interval can be flexibly adjusted, so as to improve the flexibility of updating the encryption mode of the encrypted data. This ensures that the encrypted data is not hacked by a hacker.
In a specific implementation, in order to ensure a secure update of the encryption mode of the encrypted data, the updating of the encryption mode of the encrypted data based on the second biometric information and the data encryption level described in S250 may specifically include the following sub-steps.
And S251, determining the cosine distance between the second biological characteristic information and the first biological characteristic information.
And S252, when the cosine distance is smaller than the set distance, performing cyclic redundancy encryption on the encrypted data by using the character code string of the second biological characteristic information on the basis of the current encryption mode of the encrypted data.
When S251-S252 are executed, the specific manner of updating the encryption manner of the encrypted data can be determined by the cosine distance between the biometric information at different time intervals, so that the differences of the biometric information at different time intervals can be taken into account, thereby ensuring the safe updating of the encryption manner of the encrypted data.
On the basis of the above S251-S252, the method may further include the steps of:
s253, when the cosine distance is larger than or equal to the set distance, determining the encryption logic information of the current encryption mode of the encrypted data;
and S254, reconstructing the encrypted logic information to obtain target encrypted logic information.
S255, the encrypted data are decrypted based on the encryption logic information to obtain private data, and the decrypted private data are encrypted based on the target encryption logic information.
It can be understood that, through the contents described in the above S253 to S255, when there is a large difference between the biometric information corresponding to two adjacent set time intervals, the encryption logic information corresponding to the current encryption mode may be reconstructed to obtain new target encryption logic information, so as to encrypt the private data based on the target encryption logic information. This may further ensure the reliability of the encryption of the private data.
In an alternative embodiment, in order to ensure the distinction degree between the target encryption logic information and the encryption logic information and avoid a hacker from cracking the encryption mode corresponding to the target encryption logic information based on the encryption logic information, the reconstructing the encryption logic information to obtain the target encryption logic information described in S254 may specifically include the following sub-steps.
S2541, extracts the logical direction data and the information fields of the encrypted logical information.
S2542, when the reconstruction type corresponding to the encrypted logic information is determined to exist based on the logic direction data, determining the matching degree between each information field of the encrypted logic information under the non-reconstruction type and each information field of the encrypted logic information under the reconstruction type according to the information field of the encrypted logic information under the reconstruction type and the field distribution sequence thereof.
S2543, importing the information field of the encrypted logical information in the non-reconstruction category, which is matched with the information field in the reconstruction category, into the reconstruction category.
S2544, under the condition that the non-reconstruction type corresponding to the encrypted logic information contains a plurality of information fields, determining the matching degree of the encrypted logic information among the information fields under the non-reconstruction type according to the information fields and the field distribution sequence of the encrypted logic information under the reconstruction type, and integrating the information fields under the current non-reconstruction type according to the matching degree among the information fields.
S2545, according to the information field of the encryption logic information under the reconstruction type and the field distribution sequence thereof, distributing field priority to the integrated information field, and leading the integrated information field into the reconstruction type in sequence according to the field priority.
And S2546, connecting the information fields under the reconstruction category according to a preset directed connection line to obtain target encryption logic information.
When the contents described in the above-mentioned S2541 to S2546 are applied, the information fields in the reconstruction type and the non-reconstruction type can be adjusted, so that the information fields in the adjusted reconstruction type are reconstructed to obtain the target encryption logic information. Therefore, the discrimination between the target encryption logic information and the encryption logic information can be ensured, and a hacker can be prevented from cracking the encryption mode corresponding to the target encryption logic information based on the encryption logic information.
On the basis of the above, please refer to fig. 3 in combination, a functional block diagram of a data encryption device 210 based on a live tv platform is also provided, and the description about the data encryption device 210 is as follows.
A1. A data encryption device based on an E-commerce live broadcast platform is applied to a big data server, and the device comprises:
the record acquisition module 211 is configured to, when login information of a target user terminal on a first target e-commerce live broadcast platform is detected, acquire a communication record of the target user terminal within a set time period, and acquire first biological characteristic information through the target user terminal; the communication record is an interaction record of the target user terminal and each second target E-commerce live broadcast platform in the set time period, and the first biological characteristic information is face characteristic information, voiceprint characteristic information, fingerprint characteristic information and/or iris characteristic information;
a coefficient determining module 212, configured to determine a user identity of each second target e-commerce live broadcast platform in the communication record in the set time period, except for the target user terminal, and determine a safety factor of each second target e-commerce live broadcast platform in the communication record according to the user identity;
a level determining module 213, configured to determine, based on the safety factor of each second target e-commerce live broadcast platform, a data encryption level of the target user terminal relative to the first target e-commerce live broadcast platform; the data encryption level is used for representing a dimension weight for encrypting the private data between the target user terminal and the first target E-commerce live broadcast platform;
the data encryption module 214 is configured to encrypt the private data uploaded to the first target e-commerce live broadcast platform by the target user terminal according to the first biological characteristic information and the data encryption level to obtain encrypted data;
the encryption updating module 215 is configured to acquire, by the target user terminal, second biometric information at a set time interval when the target user terminal maintains a login state on the first target live tv platform; updating the encryption mode of the encrypted data based on the second biometric information and the data encryption level.
A2. According to the apparatus of a1, the coefficient determination module 212 is configured to:
acquiring an interaction protocol of each other user terminal corresponding to each second target E-commerce live broadcast platform from the communication record; the interactive protocol is a data transmission protocol corresponding to a communication link established between each other user terminal and a corresponding second target E-commerce live broadcast platform when each other user terminal logs in the corresponding second target E-commerce live broadcast platform;
analyzing each interactive protocol to obtain a target field corresponding to each interactive protocol; the target field is used for representing the communication identification of other user terminals corresponding to each interactive protocol;
and determining terminal equipment information corresponding to each communication identifier from a preset database, and obtaining the user identity identifier of each other user terminal according to the registration information in the terminal equipment information.
A3. The apparatus of A1 or A2, the apparatus further comprising a duration modification module 216 to:
acquiring a modification instruction for modifying the set time interval;
and modifying the set time interval based on the modification instruction.
A4. The apparatus of a3, the encryption update module 215 to:
determining a cosine distance between the second biometric information and the first biometric information;
and when the cosine distance is smaller than a set distance, performing cyclic redundancy encryption on the encrypted data by adopting the character coding string of the second biological characteristic information on the basis of the current encryption mode of the encrypted data.
A5. The apparatus of a4, the encryption update module 215 to:
when the cosine distance is greater than or equal to the set distance, determining the encryption logic information of the current encryption mode of the encrypted data;
reconstructing the encrypted logic information to obtain target encrypted logic information;
and decrypting the encrypted data based on the encryption logic information to obtain private data, and encrypting the decrypted private data based on the target encryption logic information.
A6. According to the apparatus of a1, the rank determination module 213 is configured to:
acquiring platform registration information of each second target E-commerce live broadcast platform, and determining a mapping coefficient of a safety factor corresponding to each second target E-commerce live broadcast platform in the platform registration information;
determining information heterogeneous parameters corresponding to each second target E-commerce live broadcast platform according to the mapping coefficients, and searching data heterogeneous weights matched with each information heterogeneous parameter from target registration information corresponding to the first target E-commerce live broadcast platform;
under the condition that the first target E-commerce live broadcast platform is determined to have a first weight classification according to the platform registration information, determining corresponding identifications between the data heterogeneous weights of the first target E-commerce live broadcast platform under a second weight classification and the data heterogeneous weights of the first target E-commerce live broadcast platform under the first weight classification according to the data heterogeneous weights and the weight priority of the first target E-commerce live broadcast platform under the first weight classification;
transferring the data heterogeneous weight of which the corresponding identifier between the data heterogeneous weight of the first target E-commerce live broadcast platform under the second weight classification and the data heterogeneous weight under the first weight classification is a set identifier to the first weight classification; wherein the confidence of the first weight classification is greater than the confidence of the second weight classification;
and calculating the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the data heterogeneous weight under the first weight classification.
A7. According to the apparatus of a1, the coefficient determination module 212 is configured to:
generating a platform tag data packet corresponding to each second target E-commerce live broadcast platform and extracting identity identification data packets of all user identity identifications corresponding to each second target E-commerce live broadcast platform; the platform tag data packet and the identity data packet respectively contain a plurality of data streams with different communication activeness;
determining a first timing vector of any data stream of each second target E-commerce live broadcast platform in the platform tag data packet, and determining the data stream with the minimum communication activity in the identity identification data packet as a target data stream;
projecting the first time sequence vector to the target data stream according to the proportion between the first quantity of the second target E-commerce live broadcast platform and the second quantity of the user identity, and obtaining a second time sequence vector corresponding to the first time sequence vector in the target data stream;
determining a first safety weight conversion list between all user identification marks corresponding to each second target E-commerce live broadcast platform and each second target E-commerce live broadcast platform according to a difference value sequence of a first vector value in the first time sequence vector and a second vector value in the second time sequence vector;
determining safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the target data stream by taking the second time sequence vector as a reference vector, extracting list generation logic of the first safety weight conversion list, and determining a second safety weight conversion list corresponding to the first safety weight conversion list according to the list generation logic; based on the safety weight conversion list, projecting the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform to the data stream where the first time sequence vector is located, so as to obtain the associated weight corresponding to the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the data stream where the first time sequence vector is located;
and for each second target E-commerce live broadcast platform, determining normalized data of the safety identification data of each user identity corresponding to the second target E-commerce live broadcast platform through the second safety weight conversion list, and weighting all normalized data corresponding to the second target E-commerce live broadcast platform based on the associated weight corresponding to each normalized data to obtain the safety coefficient of the second target E-commerce live broadcast platform.
A8. The apparatus of a1, the data encryption module 214 to:
determining an encryption thread parameter for encrypting the private data according to the first biological characteristic information and the data encryption grade, and searching a memory resource occupancy rate corresponding to the encryption thread parameter in a preset thread resource mapping table;
judging whether the percentage of the residual memory resources reaches the occupancy rate of the memory resources;
when the percentage of the remaining memory resources is judged to reach the memory resource occupancy rate, starting a preset encryption thread according to the encryption thread parameter to encrypt the private data to obtain the encrypted data;
when the percentage of the remaining memory resources does not reach the memory resource occupancy rate, determining a first operation priority corresponding to the encryption thread parameters and second operation priorities corresponding to other threads, pausing the other threads corresponding to the second priorities smaller than the first operation priority to enable the percentage of the remaining memory resources to reach the memory resource occupancy rate, and starting a preset encryption thread according to the encryption thread parameters to encrypt the private data to obtain the encrypted data.
A9. The apparatus of a5, the encryption update module 215 to:
extracting logic pointing data and information fields of the encrypted logic information;
when the reconstruction type corresponding to the encrypted logic information is determined to exist based on the logic direction data, determining the matching degree between each information field of the encrypted logic information under the non-reconstruction type and each information field of the encrypted logic information under the reconstruction type according to the information field of the encrypted logic information under the reconstruction type and the field distribution sequence thereof;
importing an information field of the encrypted logic information under the non-reconstruction category, which is matched with an information field under the reconstruction category, into the reconstruction category;
under the condition that a plurality of information fields are contained in a non-reconstruction category corresponding to the encrypted logic information, determining the matching degree of the encrypted logic information among the information fields in the non-reconstruction category according to the information fields and the field distribution sequence of the encrypted logic information in the reconstruction category, and integrating the information fields in the current non-reconstruction category according to the matching degree of the information fields;
distributing field priority to the integrated information fields according to the information fields of the encrypted logic information under the reconstruction category and the field distribution sequence thereof, and sequentially importing the integrated information fields into the reconstruction category according to the field priority;
and connecting the information fields under the reconstruction category according to a preset directed connection line to obtain target encryption logic information.
For the description of the functional modules, reference is made to the description of the method, and no further description is made here.
On the basis, the invention also provides a data encryption system based on the E-commerce live broadcast platform, and the interactivity of the system is described as follows.
B1. A data encryption system based on an E-commerce live broadcast platform comprises a big data server, a plurality of user terminals and a plurality of E-commerce live broadcast platforms, wherein the user terminals are communicated with the big data server;
a target user terminal of the plurality of user terminals, configured to:
when a first target E-commerce live broadcast platform in a plurality of E-commerce live broadcast platforms logs in, uploading login information to the first target E-commerce live broadcast platform;
the big data server is used for:
when the login information of the target user terminal on the first target E-commerce live broadcast platform is detected, acquiring a communication record of the target user terminal in a set time period, and acquiring first biological characteristic information through the target user terminal; the communication record is an interaction record of the target user terminal and each second target E-commerce live broadcast platform in the set time period, and the first biological characteristic information is face characteristic information, voiceprint characteristic information, fingerprint characteristic information and/or iris characteristic information;
determining a user identity of each second target E-commerce live broadcast platform in the communication record, which corresponds to each other user terminal except the target user terminal in the set time period, and determining a safety factor of each second target E-commerce live broadcast platform in the communication record according to the user identity;
determining the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the safety factor of each second target E-commerce live broadcast platform; the data encryption level is used for representing a dimension weight for encrypting the private data between the target user terminal and the first target E-commerce live broadcast platform;
according to the first biological characteristic information and the data encryption grade, carrying out data encryption on the private data uploaded to the first target E-commerce live broadcast platform by the target user terminal to obtain encrypted data;
when the target user terminal keeps a login state on the first target E-commerce live broadcast platform, acquiring second biological characteristic information through the target user terminal according to a set time interval; updating the encryption mode of the encrypted data based on the second biometric information and the data encryption level.
B2. The system of B1, the big data server, to:
acquiring an interaction protocol of each other user terminal corresponding to each second target E-commerce live broadcast platform from the communication record; the interactive protocol is a data transmission protocol corresponding to a communication link established between each other user terminal and a corresponding second target E-commerce live broadcast platform when each other user terminal logs in the corresponding second target E-commerce live broadcast platform;
analyzing each interactive protocol to obtain a target field corresponding to each interactive protocol; the target field is used for representing the communication identification of other user terminals corresponding to each interactive protocol;
and determining terminal equipment information corresponding to each communication identifier from a preset database, and obtaining the user identity identifier of each other user terminal according to the registration information in the terminal equipment information.
B3. The system of B1 or B2, the big data server to:
acquiring a modification instruction for modifying the set time interval;
and modifying the set time interval based on the modification instruction.
B4. The system of B3, the big data server, to:
determining a cosine distance between the second biometric information and the first biometric information;
and when the cosine distance is smaller than a set distance, performing cyclic redundancy encryption on the encrypted data by adopting the character coding string of the second biological characteristic information on the basis of the current encryption mode of the encrypted data.
B5. The system of B4, the big data server, to:
when the cosine distance is greater than or equal to the set distance, determining the encryption logic information of the current encryption mode of the encrypted data;
reconstructing the encrypted logic information to obtain target encrypted logic information;
and decrypting the encrypted data based on the encryption logic information to obtain private data, and encrypting the decrypted private data based on the target encryption logic information.
B6. The system of B1, the big data server, to:
acquiring platform registration information of each second target E-commerce live broadcast platform, and determining a mapping coefficient of a safety factor corresponding to each second target E-commerce live broadcast platform in the platform registration information;
determining information heterogeneous parameters corresponding to each second target E-commerce live broadcast platform according to the mapping coefficients, and searching data heterogeneous weights matched with each information heterogeneous parameter from target registration information corresponding to the first target E-commerce live broadcast platform;
under the condition that the first target E-commerce live broadcast platform is determined to have a first weight classification according to the platform registration information, determining corresponding identifications between the data heterogeneous weights of the first target E-commerce live broadcast platform under a second weight classification and the data heterogeneous weights of the first target E-commerce live broadcast platform under the first weight classification according to the data heterogeneous weights and the weight priority of the first target E-commerce live broadcast platform under the first weight classification;
transferring the data heterogeneous weight of which the corresponding identifier between the data heterogeneous weight of the first target E-commerce live broadcast platform under the second weight classification and the data heterogeneous weight under the first weight classification is a set identifier to the first weight classification; wherein the confidence of the first weight classification is greater than the confidence of the second weight classification;
and calculating the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the data heterogeneous weight under the first weight classification.
B7. The system of B1, the big data server, to:
generating a platform tag data packet corresponding to each second target E-commerce live broadcast platform and extracting identity identification data packets of all user identity identifications corresponding to each second target E-commerce live broadcast platform; the platform tag data packet and the identity data packet respectively contain a plurality of data streams with different communication activeness;
determining a first timing vector of any data stream of each second target E-commerce live broadcast platform in the platform tag data packet, and determining the data stream with the minimum communication activity in the identity identification data packet as a target data stream;
projecting the first time sequence vector to the target data stream according to the proportion between the first quantity of the second target E-commerce live broadcast platform and the second quantity of the user identity, and obtaining a second time sequence vector corresponding to the first time sequence vector in the target data stream;
determining a first safety weight conversion list between all user identification marks corresponding to each second target E-commerce live broadcast platform and each second target E-commerce live broadcast platform according to a difference value sequence of a first vector value in the first time sequence vector and a second vector value in the second time sequence vector;
determining safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the target data stream by taking the second time sequence vector as a reference vector, extracting list generation logic of the first safety weight conversion list, and determining a second safety weight conversion list corresponding to the first safety weight conversion list according to the list generation logic; based on the safety weight conversion list, projecting the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform to the data stream where the first time sequence vector is located, so as to obtain the associated weight corresponding to the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the data stream where the first time sequence vector is located;
and for each second target E-commerce live broadcast platform, determining normalized data of the safety identification data of each user identity corresponding to the second target E-commerce live broadcast platform through the second safety weight conversion list, and weighting all normalized data corresponding to the second target E-commerce live broadcast platform based on the associated weight corresponding to each normalized data to obtain the safety coefficient of the second target E-commerce live broadcast platform.
B8. The system of B1, the big data server, to:
determining an encryption thread parameter for encrypting the private data according to the first biological characteristic information and the data encryption grade, and searching a memory resource occupancy rate corresponding to the encryption thread parameter in a preset thread resource mapping table;
judging whether the percentage of the residual memory resources reaches the occupancy rate of the memory resources;
when the percentage of the remaining memory resources is judged to reach the memory resource occupancy rate, starting a preset encryption thread according to the encryption thread parameter to encrypt the private data to obtain the encrypted data;
when the percentage of the remaining memory resources does not reach the memory resource occupancy rate, determining a first operation priority corresponding to the encryption thread parameters and second operation priorities corresponding to other threads, pausing the other threads corresponding to the second priorities smaller than the first operation priority to enable the percentage of the remaining memory resources to reach the memory resource occupancy rate, and starting a preset encryption thread according to the encryption thread parameters to encrypt the private data to obtain the encrypted data.
B9. The system of B5, the big data server, to:
extracting logic pointing data and information fields of the encrypted logic information;
when the reconstruction type corresponding to the encrypted logic information is determined to exist based on the logic direction data, determining the matching degree between each information field of the encrypted logic information under the non-reconstruction type and each information field of the encrypted logic information under the reconstruction type according to the information field of the encrypted logic information under the reconstruction type and the field distribution sequence thereof;
importing an information field of the encrypted logic information under the non-reconstruction category, which is matched with an information field under the reconstruction category, into the reconstruction category;
under the condition that a plurality of information fields are contained in a non-reconstruction category corresponding to the encrypted logic information, determining the matching degree of the encrypted logic information among the information fields in the non-reconstruction category according to the information fields and the field distribution sequence of the encrypted logic information in the reconstruction category, and integrating the information fields in the current non-reconstruction category according to the matching degree of the information fields;
distributing field priority to the integrated information fields according to the information fields of the encrypted logic information under the reconstruction category and the field distribution sequence thereof, and sequentially importing the integrated information fields into the reconstruction category according to the field priority;
and connecting the information fields under the reconstruction category according to a preset directed connection line to obtain target encryption logic information.
For the description of the above system, reference is made to the description of the method shown in fig. 2, and no further description is made here.
On the basis of the above, please refer to fig. 4 in combination, which provides a big data server 200, including: a processor 221, and a memory 222 and a network interface 223 connected to the processor 221, the network interface 223 being connected to the nonvolatile storage 224 in the big data server 200.
Further, the processor 221 retrieves a computer program from the non-volatile memory 224 through the network interface 223 when running, and runs the computer program through the memory 222 to execute the above method.
On the basis of the above, a readable storage medium applied to a computer is also provided, and the readable storage medium is burned with a computer program, and the computer program realizes the above method when running in the memory 222 of the big data server 200.
To sum up, according to the scheme provided by the embodiment, firstly, when the login information is detected, the communication record of the target user terminal in the set time period and the first biological characteristic information acquired by the target user terminal are acquired, secondly, the safety factor of each second target live telecast platform is determined according to the communication record, then, the data encryption level of the target user terminal is determined, further, the privacy data of the target user terminal is encrypted according to the first biological characteristic information and the data encryption level, and the encryption mode of the encrypted data is updated based on the data encryption level and the second biological characteristic information intermittently acquired. Therefore, the encryption mode of the private data of the user can be switched and updated in real time, the reliability of data encryption is improved, and the private data of the user is prevented from being cracked by a hacker.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (9)

1. A data encryption method based on an E-commerce live broadcast platform is applied to a big data server, and the method comprises the following steps:
when login information of a target user terminal on a first target E-commerce live broadcast platform is detected, communication records of the target user terminal in a set time period are obtained, and first biological characteristic information is collected through the target user terminal;
determining a user identity of each second target E-commerce live broadcast platform in the communication record, which corresponds to each other user terminal except the target user terminal in the set time period, and determining a safety factor of each second target E-commerce live broadcast platform in the communication record according to the user identity;
determining the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the safety factor of each second target E-commerce live broadcast platform; the data encryption level is used for representing a dimension weight for encrypting the private data between the target user terminal and the first target E-commerce live broadcast platform;
according to the first biological characteristic information and the data encryption grade, carrying out data encryption on the private data uploaded to the first target E-commerce live broadcast platform by the target user terminal to obtain encrypted data;
when the target user terminal keeps a login state on the first target E-commerce live broadcast platform, acquiring second biological characteristic information through the target user terminal according to a set time interval; updating the encryption mode of the encrypted data based on the second biological characteristic information and the data encryption level;
updating the encryption mode of the encrypted data based on the second biometric information and the data encryption level comprises:
determining a cosine distance between the second biometric information and the first biometric information;
and when the cosine distance is smaller than a set distance, performing cyclic redundancy encryption on the encrypted data by adopting the character coding string of the second biological characteristic information on the basis of the current encryption mode of the encrypted data.
2. The method of claim 1, wherein determining the user identity of each of the other user terminals except the target user terminal corresponding to each of the second target e-commerce live broadcast platforms in the communication record within the set period of time comprises:
acquiring an interaction protocol of each other user terminal corresponding to each second target E-commerce live broadcast platform from the communication record; the interactive protocol is a data transmission protocol corresponding to a communication link established between each other user terminal and a corresponding second target E-commerce live broadcast platform when each other user terminal logs in the corresponding second target E-commerce live broadcast platform;
analyzing each interactive protocol to obtain a target field corresponding to each interactive protocol; the target field is used for representing the communication identification of other user terminals corresponding to each interactive protocol;
and determining terminal equipment information corresponding to each communication identifier from a preset database, and obtaining the user identity identifier of each other user terminal according to the registration information in the terminal equipment information.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
acquiring a modification instruction for modifying the set time interval;
and modifying the set time interval based on the modification instruction.
4. The method of claim 1, further comprising:
when the cosine distance is greater than or equal to the set distance, determining the encryption logic information of the current encryption mode of the encrypted data;
reconstructing the encrypted logic information to obtain target encrypted logic information;
and decrypting the encrypted data based on the encryption logic information to obtain private data, and encrypting the decrypted private data based on the target encryption logic information.
5. The method of claim 1, wherein determining the data encryption level of the target user terminal relative to the first target live e-commerce platform based on the security factor of each second target live e-commerce platform comprises:
acquiring platform registration information of each second target E-commerce live broadcast platform, and determining a mapping coefficient of a safety factor corresponding to each second target E-commerce live broadcast platform in the platform registration information;
determining information heterogeneous parameters corresponding to each second target E-commerce live broadcast platform according to the mapping coefficients, and searching data heterogeneous weights matched with each information heterogeneous parameter from target registration information corresponding to the first target E-commerce live broadcast platform;
under the condition that the first target E-commerce live broadcast platform is determined to have a first weight classification according to the platform registration information, determining corresponding identifications between the data heterogeneous weights of the first target E-commerce live broadcast platform under a second weight classification and the data heterogeneous weights of the first target E-commerce live broadcast platform under the first weight classification according to the data heterogeneous weights and the weight priority of the first target E-commerce live broadcast platform under the first weight classification;
transferring the data heterogeneous weight of which the corresponding identifier between the data heterogeneous weight of the first target E-commerce live broadcast platform under the second weight classification and the data heterogeneous weight under the first weight classification is a set identifier to the first weight classification; wherein the confidence of the first weight classification is greater than the confidence of the second weight classification;
and calculating the data encryption level of the target user terminal relative to the first target E-commerce live broadcast platform based on the data heterogeneous weight under the first weight classification.
6. The method of claim 1, wherein determining a security factor for each second target e-commerce live platform in the communication record based on the user identity comprises:
generating a platform tag data packet corresponding to each second target E-commerce live broadcast platform and extracting identity identification data packets of all user identity identifications corresponding to each second target E-commerce live broadcast platform; the platform tag data packet and the identity data packet respectively contain a plurality of data streams with different communication activeness;
determining a first timing vector of any data stream of each second target E-commerce live broadcast platform in the platform tag data packet, and determining the data stream with the minimum communication activity in the identity identification data packet as a target data stream;
projecting the first time sequence vector to the target data stream according to the proportion between the first quantity of the second target E-commerce live broadcast platform and the second quantity of the user identity, and obtaining a second time sequence vector corresponding to the first time sequence vector in the target data stream;
determining a first safety weight conversion list between all user identification marks corresponding to each second target E-commerce live broadcast platform and each second target E-commerce live broadcast platform according to a difference value sequence of a first vector value in the first time sequence vector and a second vector value in the second time sequence vector;
determining safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the target data stream by taking the second time sequence vector as a reference vector, extracting list generation logic of the first safety weight conversion list, and determining a second safety weight conversion list corresponding to the first safety weight conversion list according to the list generation logic; based on the safety weight conversion list, projecting the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform to the data stream where the first time sequence vector is located, so as to obtain the associated weight corresponding to the safety identification data of each user identity corresponding to each second target E-commerce live broadcast platform in the data stream where the first time sequence vector is located;
and for each second target E-commerce live broadcast platform, determining normalized data of the safety identification data of each user identity corresponding to the second target E-commerce live broadcast platform through the second safety weight conversion list, and weighting all normalized data corresponding to the second target E-commerce live broadcast platform based on the associated weight corresponding to each normalized data to obtain the safety coefficient of the second target E-commerce live broadcast platform.
7. The method of claim 1, wherein data encryption of the private data uploaded by the target user terminal to the first target live telecast platform according to the first biometric information and the data encryption level to obtain encrypted data comprises:
determining an encryption thread parameter for encrypting the private data according to the first biological characteristic information and the data encryption grade, and searching a memory resource occupancy rate corresponding to the encryption thread parameter in a preset thread resource mapping table;
judging whether the percentage of the residual memory resources reaches the occupancy rate of the memory resources;
when the percentage of the remaining memory resources is judged to reach the memory resource occupancy rate, starting a preset encryption thread according to the encryption thread parameter to encrypt the private data to obtain the encrypted data;
when the percentage of the remaining memory resources does not reach the memory resource occupancy rate, determining a first operation priority corresponding to the encryption thread parameters and second operation priorities corresponding to other threads, pausing the other threads corresponding to the second priorities smaller than the first operation priority to enable the percentage of the remaining memory resources to reach the memory resource occupancy rate, and starting a preset encryption thread according to the encryption thread parameters to encrypt the private data to obtain the encrypted data.
8. A big data server, comprising:
a processor, and
a memory and a network interface connected with the processor;
the network interface is connected with a nonvolatile memory in the big data server;
the processor, when running, retrieves a computer program from the non-volatile memory via the network interface and runs the computer program via the memory to perform the method of any of claims 1-7.
9. A readable storage medium applied to a computer, wherein the readable storage medium is burned with a computer program, and the computer program realizes the method of any one of the above claims 1 to 7 when running in the memory of a big data server.
CN202010389368.7A 2020-05-10 2020-05-10 Data encryption method based on E-commerce live broadcast platform and big data server Active CN111611616B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202011276305.7A CN112380560A (en) 2020-05-10 2020-05-10 Data encryption method applied to E-commerce live broadcast platform and big data server
CN202011276316.5A CN112380561A (en) 2020-05-10 2020-05-10 Data encryption method and data encryption system based on E-commerce live broadcast platform
CN202010389368.7A CN111611616B (en) 2020-05-10 2020-05-10 Data encryption method based on E-commerce live broadcast platform and big data server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010389368.7A CN111611616B (en) 2020-05-10 2020-05-10 Data encryption method based on E-commerce live broadcast platform and big data server

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202011276316.5A Division CN112380561A (en) 2020-05-10 2020-05-10 Data encryption method and data encryption system based on E-commerce live broadcast platform
CN202011276305.7A Division CN112380560A (en) 2020-05-10 2020-05-10 Data encryption method applied to E-commerce live broadcast platform and big data server

Publications (2)

Publication Number Publication Date
CN111611616A CN111611616A (en) 2020-09-01
CN111611616B true CN111611616B (en) 2021-04-13

Family

ID=72200119

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202010389368.7A Active CN111611616B (en) 2020-05-10 2020-05-10 Data encryption method based on E-commerce live broadcast platform and big data server
CN202011276316.5A Withdrawn CN112380561A (en) 2020-05-10 2020-05-10 Data encryption method and data encryption system based on E-commerce live broadcast platform
CN202011276305.7A Withdrawn CN112380560A (en) 2020-05-10 2020-05-10 Data encryption method applied to E-commerce live broadcast platform and big data server

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN202011276316.5A Withdrawn CN112380561A (en) 2020-05-10 2020-05-10 Data encryption method and data encryption system based on E-commerce live broadcast platform
CN202011276305.7A Withdrawn CN112380560A (en) 2020-05-10 2020-05-10 Data encryption method applied to E-commerce live broadcast platform and big data server

Country Status (1)

Country Link
CN (3) CN111611616B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016032462A1 (en) * 2014-08-27 2016-03-03 Verance Corporation Tracing piracy of live broadcasts
CN105975844A (en) * 2016-06-30 2016-09-28 北京奇虎科技有限公司 Login method and device
CN107872436A (en) * 2016-09-27 2018-04-03 阿里巴巴集团控股有限公司 A kind of account recognition methods, apparatus and system
CN110309636A (en) * 2019-07-04 2019-10-08 阿里巴巴集团控股有限公司 A kind of identity authentication method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016032462A1 (en) * 2014-08-27 2016-03-03 Verance Corporation Tracing piracy of live broadcasts
CN105975844A (en) * 2016-06-30 2016-09-28 北京奇虎科技有限公司 Login method and device
CN107872436A (en) * 2016-09-27 2018-04-03 阿里巴巴集团控股有限公司 A kind of account recognition methods, apparatus and system
CN110309636A (en) * 2019-07-04 2019-10-08 阿里巴巴集团控股有限公司 A kind of identity authentication method and system

Also Published As

Publication number Publication date
CN111611616A (en) 2020-09-01
CN112380561A (en) 2021-02-19
CN112380560A (en) 2021-02-19

Similar Documents

Publication Publication Date Title
CN108551443B (en) Application login method and device, terminal equipment and storage medium
CN105871838B (en) A kind of log-in control method and customer center platform of third party's account
US20170289134A1 (en) Methods and apparatus for assessing authentication risk and implementing single sign on (sso) using a distributed consensus database
JP4738791B2 (en) Service providing system, service providing apparatus, service providing method, service providing program, and recording medium
US10719591B1 (en) Authentication of audio-based input signals
CN108989848B (en) Video resource file acquisition method and management system
CN106162062B (en) Obtain the method and system of monitor video
CN105262717A (en) Network service security management method and device
CN103491056A (en) Control method and device for permission of application
CN108718341B (en) Method for sharing and searching data
CN112182519A (en) Computer storage system security access method and access system
CN1930850A (en) An apparatus, computer-readable memory and method for authenticating and authorizing a service request sent from a service client to a service provider
CN108092970A (en) A kind of wireless network maintaining method and its equipment, storage medium, terminal
CN114157434A (en) Login verification method and device, electronic equipment and storage medium
CN115842680A (en) Network identity authentication management method and system
CN106209905A (en) A kind of network safety managing method and device
JP2008015733A (en) Log management computer
CN114884680A (en) Multi-server sustainable trust evaluation method based on context authentication
CN111611616B (en) Data encryption method based on E-commerce live broadcast platform and big data server
CN108809631B (en) Quantum key service management system and method
CN112615828A (en) Intellectual property operating system based on cloud computing network and intelligent authorization method
CN112217910B (en) Video service access method, device, network equipment and storage medium
CN108289096A (en) The method and device of direct broadcasting room concern is paid close attention to, verified to a kind of direct broadcasting room
CN111224955A (en) Service response method and system
CN116170199A (en) Equipment access verification system based on gateway of Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 507, building C5, biological city, 666 Gaoxin Avenue, Donghu Development Zone, Wuhan, Hubei Province

Applicant after: Cai Pingping

Address before: No. 1800 road 214122 Jiangsu Lihu Binhu District City of Wuxi Province

Applicant before: Cai Pingping

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210326

Address after: 434000 4th floor, news building, Taiyue North Road, Shashi District, Jingzhou City, Hubei Province

Applicant after: Hubei Weiguo Network Technology Co.,Ltd.

Address before: 430079 room 507, building C5, biological city, 666 Gaoxin Avenue, Donghu Development Zone, Wuhan City, Hubei Province

Applicant before: Cai Pingping

GR01 Patent grant
GR01 Patent grant