CN111800387A - Intelligent encryption transmission system for computer information data - Google Patents

Intelligent encryption transmission system for computer information data Download PDF

Info

Publication number
CN111800387A
CN111800387A CN202010516440.8A CN202010516440A CN111800387A CN 111800387 A CN111800387 A CN 111800387A CN 202010516440 A CN202010516440 A CN 202010516440A CN 111800387 A CN111800387 A CN 111800387A
Authority
CN
China
Prior art keywords
value
information
unit
encryption
handshake
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010516440.8A
Other languages
Chinese (zh)
Inventor
刘春燕
许乃伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010516440.8A priority Critical patent/CN111800387A/en
Publication of CN111800387A publication Critical patent/CN111800387A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an intelligent encryption transmission system for computer information and data, which comprises a target input unit, a key library, a door management unit, a gating unit, a data acquisition unit, a local storage unit, a data encryption unit, an encryption rule library, a data transmission unit, a display unit, a check and test unit, a transmission recording module and target equipment, wherein the target input unit is used for inputting a target data; the method comprises the steps that the identity of a user is verified through a target entry unit and a gate management unit, the login information is entered through the target entry unit in a specific verification mode, the login information is processed through a handshake rule in the target entry unit to obtain a handshake value corresponding to the login information, then the login information is processed through the same rule arranged in the gate management unit, if the handshake values processed by the target entry unit and the handshake rule processed by the gate management unit are the same, the identity of the target entry unit is correct, and the handshake rule in the method is only set in the target entry unit verified by the user.

Description

Intelligent encryption transmission system for computer information data
Technical Field
The invention belongs to the field of information transmission, relates to an information encryption transmission technology, and particularly relates to an intelligent encryption transmission system for computer information data.
Background
The patent with publication number CN109194650A discloses an encryption transmission method based on a file remote encryption transmission system, which includes a client for registering, logging in, sending and receiving files in batch; the file server is used for file transmission service, user management service, heartbeat detection function, log function, malicious attack prevention, key management and management interface service; after the user registers, the user can send files to each other through the external network as long as the user knows the account number of the other party, the files can be automatically encrypted and decrypted when being sent and received, the user does not need to carry out any encryption and decryption operation, batch sending and batch receiving are supported, the operation is simple, meanwhile, the data transmitted by the user can be protected, and the problem of using an android system to carry out remote file safe transmission is well solved.
However, most of current file encryption is performed on the internal data of the file, the encryption principle is diversified, but the format of the file is rarely converted, namely the file is the most basic file style, and the encryption is rarely performed in combination with login information of a user during authentication when the file is encrypted; to achieve this technical idea, a solution is now provided.
Disclosure of Invention
The invention aims to provide an intelligent encryption transmission system for computer information data.
The purpose of the invention can be realized by the following technical scheme:
an intelligent encryption transmission system for computer information data comprises a target entry unit, a key library, a door management unit, a gating unit, a data acquisition unit, a local storage unit, a data encryption unit, an encryption rule library, a data transmission unit, a display unit, a verification unit, a transmission recording module and target equipment;
the target entry unit is used for entering entry information, the entry information comprises identity information and a corresponding key thereof, and standard identity information and a corresponding standard key thereof are stored in the key library; the target entry unit is used for transmitting login information to the door management unit;
the identity-authenticated target entry unit is internally provided with a closing and holding rule consistent with the door management unit, the target entry unit performs closing and holding operation with the door management unit after sending login information to the door management unit, and the closing and holding operation specifically comprises the following steps:
the method comprises the following steps: calling a handshake rule in a target entry unit to obtain login information entered by a user;
step two: acquiring identity information and a corresponding key thereof in login information; combining the identity information and the secret key together, wherein the specific combination mode is as follows:
s1: acquiring a current timestamp, intercepting the current timestamp according to year, month and day, and correspondingly marking the current timestamp as X1-X8 once; for example, the specific case may be 04/01/2020, and the values of X1-X8 are eight corresponding numbers 20200401 in sequence;
s2: obtaining a timestamp segment Xi, i ═ 1.. 8;
s3: and (3) solving a standard value B by using a formula, wherein the specific calculation formula is as follows:
Figure BDA0002530296150000021
s4: acquiring a B-bit number of a standard value, and marking the B-bit number as a target value;
s5: when the target value is odd, the identity information is put in front of the secret key, and the punctuation marks are removed and then are fused to form an identity character group; otherwise, before the identity information is put in the secret key, the punctuation mark is removed and then the identity information and the secret key are fused to form an identity character group;
s6: completing the combination of the identity information and the secret key to obtain an identity character group;
step three: acquiring an identity character group and acquiring a corresponding target value at the same time;
step four: acquiring the number G of all characters of the identity character group, and adding the number of the characters to a target value to obtain a sum value;
step five: marking the ones digit value of the sum as a hit value M;
step six: selecting a combined holding value, wherein the specific selection mode is as follows:
when M is less than or equal to G, selecting the Mth character of the identity character group, and marking the Mth character as a handshake value;
when M is greater than G, obtaining the remainder of G/M, and when the remainder is zero, namely, integer division, taking the last character of the identity character group; if the integer division cannot be carried out, marking the remainder as Ys, taking the Ys-th character of the identity character set, and marking the Ys-th character as a handshake value;
step seven: intercepting a holding value by a target recording unit;
step eight: the gate management unit is internally provided with the same holding rule and is used for carrying out the same processing on the login information transmitted by the target input unit to obtain a corresponding holding value, and the holding value is marked as a marked holding value;
step nine: comparing the marked holding value with the holding value, if the marked holding value is consistent with the holding value, generating a verification signal, otherwise, generating an equipment error signal;
the gate management unit can carry out login information verification after generating a pass signal, the verification mode is that the login information is compared with the standard identity information in the key bank and the corresponding standard key, if the comparison is consistent, an permission signal is generated, otherwise, an identity error signal is generated;
the gate management unit is used for transmitting the permit signal and the handshake value to the gating unit when the permit signal is generated, and the gating unit receives the permit signal and the handshake value thereof transmitted by the target input unit;
the target input unit is also used for inputting information to be transmitted by a user, the information to be transmitted is specific information content which the user wants to transmit, the target input unit is used for transmitting the information to be transmitted to the gating unit, the gating unit transmits the information to be transmitted and the joint handshake value to the data acquisition unit only when receiving the information to be transmitted within a preset time T1 after receiving the enable signal, and the data acquisition unit receives the information to be transmitted and the joint handshake value which are transmitted by the gating unit and transmits the information to be transmitted and the joint handshake value to the data encryption unit;
the data encryption unit receives the information to be transmitted and the combined holding value transmitted by the data acquisition unit, and encrypts the information to be transmitted and the combined holding value by combining the encryption rule base to obtain initial encryption information;
the data encryption unit is used for carrying out second encryption processing on the handshake value and the initial encryption information after encryption is finished to obtain the confirmed encryption information;
the data encryption unit is used for transmitting the confirmed encryption information and the handshake value to the data transmission unit, the data transmission unit is used for transmitting the confirmed encryption information to the check unit, the check unit is used for detecting whether the head of the confirmed encryption information is the handshake value, and when the head of the confirmed encryption information is the handshake value, the confirmed encryption information is marked as encrypted information; otherwise, generating a residual signal; the data transmission unit is used for transmitting the encrypted information to the target device when the additional signal is not generated, meanwhile, the data transmission unit fuses the target device and the timestamp for transmitting the encrypted information to form a transmission record, and the data transmission unit is used for transmitting the transmission record to the transmission record module.
Further, the data acquisition unit is used for transmitting the information to be transmitted to the local storage unit for backup.
Further, the specific way of the encryption processing is as follows:
SS 01: acquiring information to be transmitted and a combined handshake value;
SS 02: firstly, quantizing the handshake value to obtain a handshake value Hw;
SS 03: acquiring corresponding information to be transmitted, acquiring an extension of the information to be transmitted, and converting the extension of the information to be transmitted, wherein the specific conversion processing steps are as follows:
SS 031: acquiring an extension, summarizing the extension into an extension formed by a plurality of extension participles, and marking the extension participles as Kj, wherein j is 1.. m; wherein Kj is expressed as the j-th expansion participle on the expansion name;
SS 032: let j equal 1;
SS 033: acquiring a corresponding expanded participle K1;
SS 034: acquiring the sequence of the English letters in 26 English letters, and marking the sequence as Qs;
SS 035: acquiring a total holding quantity value Hw;
SS 036: performing the conversion of the step SS037 on the expanded participle K1 according to the size between the value Hw of the handshake value and the value Qs;
SS 037: when Hw > Qs, converting the size of the numerical value Mb according to a calculation formula at the moment, wherein the calculation formula is Mb ═ Hw + (Hw-Qs);
when Hw < Qs, the magnitude of the value Mb is converted according to a calculation formula, wherein Mb is Hw- (Qs-Hw)
When Hw is Qs, the value Mb is set to 0;
SS 038: obtaining the value of the converted numerical value Mb, and correspondingly obtaining the Mth letter on the 26-bit letter; correspondingly marking the letter as a replacement letter;
SS 039: replacing the original extension participles K1 with replacement letters;
SS 040: j +1, after which steps SS033-SS040 are repeated; until all the expansion participles Kj are processed;
SS 041: obtaining all the replacement letters of the extended analysis;
SS 04: obtaining a changed replacement letter, and replacing the original extension name with the replacement letter;
SS 05: completing the type encryption of the data to be encrypted, and marking the data to be encrypted as initial data;
SS 06: and replacing the expanded word segmentation of the original step with the initial data to obtain a suffix name formed by new initial data, and marking the data to be transmitted corresponding to the suffix name as initial encryption information.
Further, the specific steps of performing quantization processing on the handshake value are as follows:
SS 021: firstly, when the combined handshake value is a numerical value, the combined handshake value is directly marked as a combined handshake value without any processing;
SS 022: when the combined holding value is a letter, acquiring the sequence of the letter in 26 letters according to the number of the letter, wherein the sequence refers to the ranking number of the letter in 26 letters, and correspondingly marking the ranking number as the combined holding value;
SS 023: when the combined holding value is not the letter or the number, the combined holding value is correspondingly designated as Xy at the moment, and the Xy is a user set value;
SS 024: and obtaining a total holding value after the quantification processing of the total holding value, and calibrating the total holding value as Hw.
Further, the second encryption processing specifically comprises the following steps:
the method comprises the following steps: inserting characters corresponding to the combined handshake value into the first bit of the primary encryption information; the exact encryption information is obtained.
Further, the data transmission unit transmits the additional signal to the display unit when generating the additional signal, and the display unit receives the additional signal transmitted by the data transmission unit and automatically displays that the current information is not encrypted and the word eye is required to be reprocessed.
The invention has the beneficial effects that:
the identity of the user is verified by combining the target entry unit with the gate management unit, the login information is entered by the specific verification mode through the target entry unit, the login information is processed by using a handshake rule in the target entry unit to obtain a handshake value corresponding to the login information, then the login information is processed by using the same rule built in the gate management unit, if the handshake values processed by the target entry unit and the login information are the same, the identity of the target entry unit is correct, and the handshake rule in the application is only set in the target entry unit verified by the user; then, when the two combined handshake values are consistent, a channel between the target input unit and the data acquisition unit is opened through the gating unit;
after the channel of the gating unit is opened, the target input unit is used for transmitting the information to be transmitted to the data acquisition unit, and the data acquisition unit is used for transmitting the information to be encrypted to the data encryption unit and encrypting the information by means of the encryption rule in the encryption rule base; after encryption, the verification unit verifies whether the encryption is performed or not, if not, reprocessing is prompted, and only the information subjected to encryption processing is transmitted to the target equipment; the invention is simple, effective and easy to use.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, an intelligent encryption transmission system for computer information and data includes a target entry unit, a key bank, a door management unit, a gating unit, a data acquisition unit, a local storage unit, a data encryption unit, an encryption rule bank, a data transmission unit, a display unit, an audit unit, a transmission recording module and a target device;
the target entry unit is used for entering entry information, the entry information comprises identity information and a corresponding key thereof, and standard identity information and a corresponding standard key thereof are stored in the key library; the target entry unit is used for transmitting login information to the door management unit;
the identity-authenticated target entry unit is internally provided with a closing and holding rule consistent with the door management unit, the target entry unit performs closing and holding operation with the door management unit after sending login information to the door management unit, and the closing and holding operation specifically comprises the following steps:
the method comprises the following steps: calling a handshake rule in a target entry unit to obtain login information entered by a user;
step two: acquiring identity information and a corresponding key thereof in login information; combining the identity information and the secret key together, wherein the specific combination mode is as follows:
s1: acquiring a current timestamp, intercepting the current timestamp according to year, month and day, and correspondingly marking the current timestamp as X1-X8 once; for example, the specific case may be 04/01/2020, and the values of X1-X8 are eight corresponding numbers 20200401 in sequence;
s2: obtaining a timestamp segment Xi, i ═ 1.. 8;
s3: and (3) solving a standard value B by using a formula, wherein the specific calculation formula is as follows:
Figure BDA0002530296150000071
s4: acquiring a B-bit number of a standard value, and marking the B-bit number as a target value;
s5: when the target value is odd, the identity information is put in front of the secret key, and the punctuation marks are removed and then are fused to form an identity character group; otherwise, before the identity information is put in the secret key, the punctuation mark is removed and then the identity information and the secret key are fused to form an identity character group;
s6: completing the combination of the identity information and the secret key to obtain an identity character group;
step three: acquiring an identity character group and acquiring a corresponding target value at the same time;
step four: acquiring the number G of all characters of the identity character group, and adding the number of the characters to a target value to obtain a sum value;
step five: marking the ones digit value of the sum as a hit value M;
step six: selecting a combined holding value, wherein the specific selection mode is as follows:
when M is less than or equal to G, selecting the Mth character of the identity character group, and marking the Mth character as a handshake value;
when M is greater than G, obtaining the remainder of G/M, and when the remainder is zero, namely, integer division, taking the last character of the identity character group; if the integer division cannot be carried out, marking the remainder as Ys, taking the Ys-th character of the identity character set, and marking the Ys-th character as a handshake value;
step seven: intercepting a holding value by a target recording unit;
step eight: the gate management unit is internally provided with the same holding rule and is used for carrying out the same processing on the login information transmitted by the target input unit to obtain a corresponding holding value, and the holding value is marked as a marked holding value;
step nine: comparing the marked holding value with the holding value, if the marked holding value is consistent with the holding value, generating a verification signal, otherwise, generating an equipment error signal;
the gate management unit can carry out login information verification after generating a pass signal, the verification mode is that the login information is compared with the standard identity information in the key bank and the corresponding standard key, if the comparison is consistent, an permission signal is generated, otherwise, an identity error signal is generated;
the gate management unit is used for transmitting the permit signal and the handshake value to the gating unit when the permit signal is generated, and the gating unit receives the permit signal and the handshake value thereof transmitted by the target input unit;
the target input unit is also used for inputting information to be transmitted by a user, the information to be transmitted is specific information content which the user wants to transmit, the target input unit is used for transmitting the information to be transmitted to the gating unit, the gating unit transmits the information to be transmitted and the joint handshake value to the data acquisition unit only when receiving the information to be transmitted within a preset time T1 after receiving the enable signal, and the data acquisition unit receives the information to be transmitted and the joint handshake value which are transmitted by the gating unit and transmits the information to be transmitted and the joint handshake value to the data encryption unit; the data acquisition unit is used for transmitting the information to be transmitted to the local storage unit for backup;
the data encryption unit receives the information to be transmitted and the combined handshake value transmitted by the data acquisition unit, and encrypts the information to be transmitted and the combined handshake value by combining the encryption rule base, wherein the specific encryption mode is as follows:
SS 01: acquiring information to be transmitted and a combined handshake value;
SS 02: firstly, quantizing the handshake value, wherein the specific quantizing step is as follows:
SS 021: firstly, when the combined handshake value is a numerical value, the combined handshake value is directly marked as a combined handshake value without any processing;
SS 022: when the combined holding value is a letter, acquiring the sequence of the letter in 26 letters according to the number of the letter, wherein the sequence refers to the ranking number of the letter in 26 letters, and correspondingly marking the ranking number as the combined holding value;
SS 023: when the combined holding value is not the letter or the number, the combined holding value is correspondingly designated as Xy at the moment, and the Xy is a user set value;
SS 024: obtaining a total holding value after the quantification processing of the total holding value, and calibrating the total holding value as Hw;
SS 03: acquiring corresponding information to be transmitted, acquiring an extension of the information to be transmitted, and converting the extension of the information to be transmitted, wherein the specific conversion processing steps are as follows:
SS 031: acquiring an extension, summarizing the extension into an extension formed by a plurality of extension participles, and marking the extension participles as Kj, wherein j is 1.. m; wherein Kj is expressed as the j-th expansion participle on the expansion name;
SS 032: let j equal 1;
SS 033: acquiring a corresponding expanded participle K1;
SS 034: acquiring the sequence of the English letters in 26 English letters, and marking the sequence as Qs;
SS 035: acquiring a total holding quantity value Hw;
SS 036: performing the conversion of the step SS037 on the expanded participle K1 according to the size between the value Hw of the handshake value and the value Qs;
SS 037: when Hw > Qs, converting the size of the numerical value Mb according to a calculation formula at the moment, wherein the calculation formula is Mb ═ Hw + (Hw-Qs);
when Hw < Qs, the magnitude of the value Mb is converted according to a calculation formula, wherein Mb is Hw- (Qs-Hw)
When Hw is Qs, the value Mb is set to 0;
SS 038: obtaining the value of the converted numerical value Mb, and correspondingly obtaining the Mth letter on the 26-bit letter; correspondingly marking the letter as a replacement letter;
SS 039: replacing the original extension participles K1 with replacement letters;
SS 040: j +1, after which steps SS033-SS040 are repeated; until all the expansion participles Kj are processed;
SS 041: obtaining all the replacement letters of the extended analysis;
SS 04: obtaining a changed replacement letter, and replacing the original extension name with the replacement letter;
SS 05: completing the type encryption of the data to be encrypted, and marking the data to be encrypted as initial data;
SS 06: replacing the expanded word segmentation of the original step with the initial data to obtain a suffix name formed by new initial data, and marking the data to be transmitted corresponding to the suffix name as initial encryption information;
the data encryption unit is used for performing second encryption processing on the handshake value and the primary encryption information after encryption is completed, and the second encryption processing specifically comprises the following steps:
the method comprises the following steps: inserting characters corresponding to the combined handshake value into the first bit of the primary encryption information; obtaining the encrypted information;
the data encryption unit is used for transmitting the confirmed encryption information and the handshake value to the data transmission unit, the data transmission unit is used for transmitting the confirmed encryption information to the check unit, the check unit is used for detecting whether the head of the confirmed encryption information is the handshake value, and when the head of the confirmed encryption information is the handshake value, the confirmed encryption information is marked as encrypted information; otherwise, generating a residual signal; the data transmission unit is used for transmitting the encrypted information and the handshake value to the target device when the additional signal is not generated, meanwhile, the data transmission unit fuses the target device and the timestamp for transmitting the encrypted information to form a transmission record, and the data transmission unit is used for transmitting the transmission record to the transmission record module;
the data transmission unit transmits the additional signal to the display unit when generating the additional signal, and the display unit receives the additional signal transmitted by the data transmission unit and automatically displays that the current information is not encrypted and the word eye is required to be reprocessed.
The process of decrypting the encrypted information by the target device is opposite to the solution rule, and a person skilled in the art can know the decryption rule on the basis of the disclosed encryption rule, so detailed description is not needed herein;
the local storage unit processes the memory every month or once, and the processing mode can be that all data are emptied, or the oldest data are deleted according to the time sequence, and the deleted data occupy half of the storage capacity.
When the intelligent encryption transmission system for computer information data works, firstly, the identity of a user is verified by combining a target entry unit and a gate management unit, login information is entered by a specific verification mode through the target entry unit, login information is processed by using a handshake rule in the target entry unit to obtain a handshake value corresponding to the login information, then the login information is processed by using the same rule built in the gate management unit, and if the handshake values processed by the target entry unit and the login information are the same, the identity of the target entry unit is correct, because the handshake rule in the application is only set in the target entry unit verified by the user; then, when the two combined handshake values are consistent, a channel between the target input unit and the data acquisition unit is opened through the gating unit;
after the channel of the gating unit is opened, the target input unit is used for transmitting the information to be transmitted to the data acquisition unit, and the data acquisition unit is used for transmitting the information to be encrypted to the data encryption unit and encrypting the information by means of the encryption rule in the encryption rule base; after encryption, the verification unit verifies whether the encryption is performed or not, if not, reprocessing is prompted, and only the information subjected to encryption processing is transmitted to the target equipment; the invention is simple, effective and easy to use.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (6)

1. An intelligent encryption transmission system for computer information data is characterized by comprising a target entry unit, a key library, a door management unit, a gating unit, a data acquisition unit, a local storage unit, a data encryption unit, an encryption rule library, a data transmission unit, a display unit, an examination unit, a transmission recording module and target equipment;
the target entry unit is used for entering entry information, the entry information comprises identity information and a corresponding key thereof, and standard identity information and a corresponding standard key thereof are stored in the key library; the target entry unit is used for transmitting login information to the door management unit;
the identity-authenticated target entry unit is internally provided with a closing and holding rule consistent with the door management unit, the target entry unit performs closing and holding operation with the door management unit after sending login information to the door management unit, and the closing and holding operation specifically comprises the following steps:
the method comprises the following steps: calling a handshake rule in a target entry unit to obtain login information entered by a user;
step two: acquiring identity information and a corresponding key thereof in login information; combining the identity information and the secret key together, wherein the specific combination mode is as follows:
s1: acquiring a current timestamp, intercepting the current timestamp according to year, month and day, and correspondingly marking the current timestamp as X1-X8 once;
s2: obtaining a timestamp segment Xi, i ═ 1.. 8;
s3: and (3) solving a standard value B by using a formula, wherein the specific calculation formula is as follows:
Figure FDA0002530296140000011
s4: acquiring a B-bit number of a standard value, and marking the B-bit number as a target value;
s5: when the target value is odd, the identity information is put in front of the secret key, and the punctuation marks are removed and then are fused to form an identity character group; otherwise, before the identity information is put in the secret key, the punctuation mark is removed and then the identity information and the secret key are fused to form an identity character group;
s6: completing the combination of the identity information and the secret key to obtain an identity character group;
step three: acquiring an identity character group and acquiring a corresponding target value at the same time;
step four: acquiring the number G of all characters of the identity character group, and adding the number of the characters to a target value to obtain a sum value;
step five: marking the ones digit value of the sum as a hit value M;
step six: selecting a combined holding value, wherein the specific selection mode is as follows:
when M is less than or equal to G, selecting the Mth character of the identity character group, and marking the Mth character as a handshake value;
when M is greater than G, obtaining the remainder of G/M, and when the remainder is zero, namely, integer division, taking the last character of the identity character group; if the integer division cannot be carried out, marking the remainder as Ys, taking the Ys-th character of the identity character set, and marking the Ys-th character as a handshake value;
step seven: intercepting a holding value by a target recording unit;
step eight: the gate management unit is internally provided with the same holding rule and is used for carrying out the same processing on the login information transmitted by the target input unit to obtain a corresponding holding value, and the holding value is marked as a marked holding value;
step nine: comparing the marked holding value with the holding value, if the marked holding value is consistent with the holding value, generating a verification signal, otherwise, generating an equipment error signal;
the gate management unit can carry out login information verification after generating a pass signal, the verification mode is that the login information is compared with the standard identity information in the key bank and the corresponding standard key, if the comparison is consistent, an permission signal is generated, otherwise, an identity error signal is generated;
the gate management unit is used for transmitting the permit signal and the handshake value to the gating unit when the permit signal is generated, and the gating unit receives the permit signal and the handshake value thereof transmitted by the target input unit;
the target input unit is also used for inputting information to be transmitted by a user, the information to be transmitted is specific information content which the user wants to transmit, the target input unit is used for transmitting the information to be transmitted to the gating unit, the gating unit transmits the information to be transmitted and the joint handshake value to the data acquisition unit only when receiving the information to be transmitted within a preset time T1 after receiving the enable signal, and the data acquisition unit receives the information to be transmitted and the joint handshake value which are transmitted by the gating unit and transmits the information to be transmitted and the joint handshake value to the data encryption unit;
the data encryption unit receives the information to be transmitted and the combined holding value transmitted by the data acquisition unit, and encrypts the information to be transmitted and the combined holding value by combining the encryption rule base to obtain initial encryption information;
the data encryption unit is used for carrying out second encryption processing on the handshake value and the initial encryption information after encryption is finished to obtain the confirmed encryption information;
the data encryption unit is used for transmitting the confirmed encryption information and the handshake value to the data transmission unit, the data transmission unit is used for transmitting the confirmed encryption information to the check unit, the check unit is used for detecting whether the head of the confirmed encryption information is the handshake value, and when the head of the confirmed encryption information is the handshake value, the confirmed encryption information is marked as encrypted information; otherwise, generating a residual signal; the data transmission unit is used for transmitting the encrypted information to the target device when the additional signal is not generated, meanwhile, the data transmission unit fuses the target device and the timestamp for transmitting the encrypted information to form a transmission record, and the data transmission unit is used for transmitting the transmission record to the transmission record module.
2. The system of claim 1, wherein the data acquisition unit is configured to transmit the information to be transmitted to the local storage unit for backup.
3. The intelligent encryption transmission system for computer information materials according to claim 1, wherein the encryption process is carried out in a specific manner:
SS 01: acquiring information to be transmitted and a combined handshake value;
SS 02: firstly, quantizing the handshake value to obtain a handshake value Hw;
SS 03: acquiring corresponding information to be transmitted, acquiring an extension of the information to be transmitted, and converting the extension of the information to be transmitted, wherein the specific conversion processing steps are as follows:
SS 031: acquiring an extension, summarizing the extension into an extension formed by a plurality of extension participles, and marking the extension participles as Kj, wherein j is 1.. m; wherein Kj is expressed as the j-th expansion participle on the expansion name;
SS 032: let j equal 1;
SS 033: acquiring a corresponding expanded participle K1;
SS 034: acquiring the sequence of the English letters in 26 English letters, and marking the sequence as Qs;
SS 035: acquiring a total holding quantity value Hw;
SS 036: performing the conversion of the step SS037 on the expanded participle K1 according to the size between the value Hw of the handshake value and the value Qs;
SS 037: when Hw > Qs, converting the size of the numerical value Mb according to a calculation formula at the moment, wherein the calculation formula is Mb ═ Hw + (Hw-Qs);
when Hw < Qs, the magnitude of the value Mb is converted according to a calculation formula, wherein Mb is Hw- (Qs-Hw)
When Hw is Qs, the value Mb is set to 0;
SS 038: obtaining the value of the converted numerical value Mb, and correspondingly obtaining the Mth letter on the 26-bit letter; correspondingly marking the letter as a replacement letter;
SS 039: replacing the original extension participles K1 with replacement letters;
SS 040: j +1, after which steps SS033-SS040 are repeated; until all the expansion participles Kj are processed;
SS 041: obtaining all the replacement letters of the extended analysis;
SS 04: obtaining a changed replacement letter, and replacing the original extension name with the replacement letter;
SS 05: completing the type encryption of the data to be encrypted, and marking the data to be encrypted as initial data;
SS 06: and replacing the expanded word segmentation of the original step with the initial data to obtain a suffix name formed by new initial data, and marking the data to be transmitted corresponding to the suffix name as initial encryption information.
4. The intelligent encryption transmission system for computer information data according to claim 1, wherein the specific steps of performing quantization processing on the handshake value are as follows:
SS 021: firstly, when the combined handshake value is a numerical value, the combined handshake value is directly marked as a combined handshake value without any processing;
SS 022: when the combined holding value is a letter, acquiring the sequence of the letter in 26 letters according to the number of the letter, wherein the sequence refers to the ranking number of the letter in 26 letters, and correspondingly marking the ranking number as the combined holding value;
SS 023: when the combined holding value is not the letter or the number, the combined holding value is correspondingly designated as Xy at the moment, and the Xy is a user set value;
SS 024: and obtaining a total holding value after the quantification processing of the total holding value, and calibrating the total holding value as Hw.
5. The intelligent encryption transmission system for computer information materials according to claim 1, wherein the second encryption processing comprises the following specific steps:
the method comprises the following steps: inserting characters corresponding to the combined handshake value into the first bit of the primary encryption information; the exact encryption information is obtained.
6. The system as claimed in claim 1, wherein the data transmission unit transmits the generated additional signal to the display unit, and the display unit receives the additional signal transmitted from the data transmission unit and automatically displays that the current information is not encrypted and the word is required to be reprocessed.
CN202010516440.8A 2020-06-09 2020-06-09 Intelligent encryption transmission system for computer information data Withdrawn CN111800387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010516440.8A CN111800387A (en) 2020-06-09 2020-06-09 Intelligent encryption transmission system for computer information data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010516440.8A CN111800387A (en) 2020-06-09 2020-06-09 Intelligent encryption transmission system for computer information data

Publications (1)

Publication Number Publication Date
CN111800387A true CN111800387A (en) 2020-10-20

Family

ID=72804067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010516440.8A Withdrawn CN111800387A (en) 2020-06-09 2020-06-09 Intelligent encryption transmission system for computer information data

Country Status (1)

Country Link
CN (1) CN111800387A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751855A (en) * 2020-12-30 2021-05-04 合肥大多数信息科技有限公司 Cross-browser user data security management system based on encryption technology
CN113780798A (en) * 2021-09-07 2021-12-10 杭州天宽科技有限公司 Key index display system based on cloud computing
CN114221783A (en) * 2021-11-11 2022-03-22 杭州天宽科技有限公司 Data selective encryption and decryption system
CN117978364A (en) * 2024-02-22 2024-05-03 广州鼎盛商业保理有限公司 Block chain-based warranty information processing system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751855A (en) * 2020-12-30 2021-05-04 合肥大多数信息科技有限公司 Cross-browser user data security management system based on encryption technology
CN112751855B (en) * 2020-12-30 2022-09-06 合肥大多数信息科技有限公司 Cross-browser user data security management system based on encryption technology
CN113780798A (en) * 2021-09-07 2021-12-10 杭州天宽科技有限公司 Key index display system based on cloud computing
CN113780798B (en) * 2021-09-07 2024-05-28 杭州天宽科技有限公司 Key index display system based on cloud computing
CN114221783A (en) * 2021-11-11 2022-03-22 杭州天宽科技有限公司 Data selective encryption and decryption system
CN114221783B (en) * 2021-11-11 2023-06-02 杭州天宽科技有限公司 Data selective encryption and decryption system
CN117978364A (en) * 2024-02-22 2024-05-03 广州鼎盛商业保理有限公司 Block chain-based warranty information processing system

Similar Documents

Publication Publication Date Title
CN111800387A (en) Intelligent encryption transmission system for computer information data
EP3701668B1 (en) Methods for recording and sharing a digital identity of a user using distributed ledgers
US8365262B2 (en) Method for automatically generating and filling in login information and system for the same
US8332655B2 (en) Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects
CN101442407A (en) Method and system for identification authentication using biology characteristics
JP3917679B2 (en) High bandwidth cryptographic system with low bandwidth cryptographic module
CN104239820A (en) Secure storage device
CN107871081A (en) A kind of computer information safe system
US11695740B2 (en) Anonymization method and apparatus, device, and storage medium
JPWO2004084483A1 (en) Information management system
CN116090024B (en) Reliable data storage device, system and method
CN105553980A (en) Safety fingerprint identification system and method based on cloud computing
WO2021172668A1 (en) First copyright holder authentication system using blockchain, and method therefor
EP4141721A1 (en) System and method for secure collection and display of sensitive data
CN116032464A (en) Property data encryption system based on quantum communication
CN107733936A (en) A kind of encryption method of mobile data
CN113489710A (en) File sharing method, device, equipment and storage medium
CN114584374A (en) Block chain-based big data privacy sharing security protection system and method
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN111415155A (en) Encryption method, device, equipment and storage medium for chain-dropping transaction data
CN113037743B (en) Encryption method and system for cloud server file
CN107330340A (en) File encrypting method, equipment, file decryption method, equipment and storage medium
CN111708996B (en) Enterprise internal management consultation information sharing system based on Internet
Schnell Privacy Preserving Record Linkage in the Context of a National Statistical Institute
CN114386077A (en) Electronic bidding document multilayer encryption and decryption system for electronic bidding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201020

WW01 Invention patent application withdrawn after publication