CN113204786A - Data protection method and system for going to center - Google Patents

Data protection method and system for going to center Download PDF

Info

Publication number
CN113204786A
CN113204786A CN202110488345.6A CN202110488345A CN113204786A CN 113204786 A CN113204786 A CN 113204786A CN 202110488345 A CN202110488345 A CN 202110488345A CN 113204786 A CN113204786 A CN 113204786A
Authority
CN
China
Prior art keywords
data
user
intelligent
information
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110488345.6A
Other languages
Chinese (zh)
Other versions
CN113204786B (en
Inventor
张凯
郑应强
陆焱锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing LSSEC Technology Co Ltd
Original Assignee
Beijing LSSEC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing LSSEC Technology Co Ltd filed Critical Beijing LSSEC Technology Co Ltd
Priority to CN202110488345.6A priority Critical patent/CN113204786B/en
Publication of CN113204786A publication Critical patent/CN113204786A/en
Application granted granted Critical
Publication of CN113204786B publication Critical patent/CN113204786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data protection method and a data protection system for going to a center. The method comprises the following steps: the method comprises the following steps that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each smart household appliance according to a data dispersion rule; when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and assembles and summarizes the data to form complete data for the user. The system comprises modules corresponding to the steps of the method.

Description

Data protection method and system for going to center
Technical Field
The invention provides a data protection method and a data protection system for going to a center, and belongs to the technical field of data processing.
Background
With the development of the family internet of things, manufacturers store more and more data (bank card accounts, identity card accounts, various passwords and the like) in terminal equipment for the convenience of use of users, most of various household equipment (such as smart televisions, smart air conditioners, smart refrigerators, smart washing machines, sweeping robots and the like) use android systems at present, the android systems belong to open source systems and are easy to break through by hackers, and the data stored in the android systems are easy to leak.
Disclosure of Invention
The invention provides a data protection method and a data protection system for going to a center, which are used for solving the problem that stored data is easy to leak:
a method of decentralized data protection, the method comprising:
the method comprises the following steps that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each smart household appliance according to a data dispersion rule;
when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and assembles and summarizes the data to form complete data for the user.
Further, a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each intelligent household appliance according to a data dispersion rule, including:
a user triggers the storage requirement of data on the smart television;
after the smart television receives a storage requirement triggered by a user, an interception system (android and the like) of the smart television drives a data writing function and takes over, and meanwhile device public and private keys Pubkey and private key are generated;
the data to be written in by the intelligent television are scattered into a plurality of data fragments according to a data scattering rule;
the intelligent television acquires fixed information of each intelligent device in a home through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the intelligent television respectively and independently encrypts the multiple data fragments by using keys corresponding to the intelligent equipment to obtain ciphertexts corresponding to the intelligent equipment;
and writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish the distributed encryption storage.
Further, the user-required storage data includes: the system comprises a user telephone number, a user name, bank card information and shopping information; the data required to be stored by the user is divided in the following dividing mode:
the first division mode: dividing according to the data stream of the data required to be stored by the user, and directly dividing according to the data stream without analyzing the data information in the data stream of the data required to be stored by the user; encrypting the data to obtain a ciphertext M, and dividing or extracting the ciphertext M equally; wherein, the extraction mode is to carry out fixed-point extraction according to a preset function polynomial; the obtained multiple ciphertexts are divided or extracted, and are dispersed according to a matrix, for example, to generate 3 fragments, data is formed into a matrix with 3 columns and n rows, and then the data is extracted according to the columns and is dispersed and stored.
The second division mode: carrying out data information segmentation according to a data dispersion rule, wherein the data dispersion rule comprises the following steps: a first data scattering rule and a second data scattering rule.
Further, the rule content of the first data dispersion rule and the second data dispersion rule comprises;
the data dispersion rule one: dividing the telephone number of the user into four groups of number data according to the telephone number sequence 2+3+3+3, and respectively marking the four groups of number data as A1, A2, A3 and A4; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; trisecting the bank card number according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2 and C3; taking the number of the remaining digits after trisection according to the number of the digits of the bank card number as a fourth group of data C4, and if the number of the remaining digits after trisection of the number of the digits of the bank card number is 0, defaulting the fourth group of data to 0000 and marking the fourth group of data as C4; dividing shopping information into four data groups according to shopping order generation time, shopping commodity information, mailing address information and order amount information, and sequentially marking each data group as D1, D2, D3 and D4;
combining data A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4 and D1, D2, D3 and D4 according to the principle of consistent numerical labels to form a first group of data A1+ B1+ C1+ D1, a second group of data A2+ B2+ C2+ D2, a third group of data A3+ B3+ C3+ D3 and a fourth group of data A4+ B4+ C4+ D4;
the second data dispersion rule: dividing the user telephone number into six groups of number data according to the telephone number sequence 2+2+1+3+2+1, and respectively marking the number data as A1, A2, A3, A4, A5 and A6; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; dividing the bank card number into five equal parts according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2, C3, C4 and C5; taking the number of the rest digits after five equal divisions according to the number of the bank card number digits as sixth array data C6, and if the number of the rest digits after five equal divisions according to the number of the bank card number digits is 0, defaulting the sixth array data to 0101 and marking the sixth array data as C6; dividing the shopping information into three data groups according to the shopping order generation time, the shopping commodity information and the order amount information, sequentially marking each data group as D1, D2 and D3, and then taking the province, city, district and county information in the mailing address information as a fourth information group and marking the information as D4; taking the street cell number information in the mailing address information as a fifth information group and marking as D5;
six data sets were formed as follows: the data processing method comprises the steps of firstly processing a first group of data A1+ B1+ C1+ D1, secondly processing a2+ B2+ C2+ D2, thirdly processing A3+ B3+ C3+ D3, fourthly processing a4+ B4+ C4+ D4, fifthly processing A5+ C5+ D5 and sixthly processing a6+ C6.
Further, the smart television disperses data to be written into a plurality of data fragments according to a data dispersion rule, including:
when a user stores data by using the smart television for the first time and the second time, data are divided by adopting a first data dispersion rule;
when a user uses the smart television to perform third data storage and perform subsequent data storage each time, judging whether time intervals between continuous three data storages including current trigger data storage of the user are smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule, wherein the first time interval threshold and the second time interval threshold are obtained through the following formula:
Figure BDA0003051391860000031
wherein, T1Representing a first time interval threshold value, wherein n represents the total shopping times of television shopping by a user by utilizing the intelligent television; t isiRepresenting a time interval between the ith TV purchase and the last TV purchase; t ismaxRepresents the maximum time interval between television purchases; t isminRepresents a minimum time interval between television purchases; cgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; k represents that in the TV shopping time interval, the TV shopping time intervals are arranged from small to large to form a time interval array, the number of the first k minimum time intervals in the time interval array is 3 or 5; t isminjRepresents the jth time interval of the first k minimum time intervals; when n < 3 or n < 5, k is n, and Tminj=Ti(ii) a Alpha represents a first time adjustment coefficient, and the value range of alpha is 1.81-1.97;
Figure BDA0003051391860000032
wherein, T2Represents a second time interval threshold; hwIndicating the number of days that the user has not made a TV purchase, HgIndicating the number of days that the user has made a TV purchase, CgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; m represents the TV shopping time intervals, the TV shopping time intervals are arranged from small to large to form a time interval array, and the number of m maximum time intervals in the time interval array is 3 or 5; t ismaxtRepresents the t-th time interval of the m maximum time intervals; when n < 3 or n < 5, m is n, and Tmaxj=Ti(ii) a Beta represents a second time adjustment coefficient, and the value range of beta is 1.65-1.77;
and when the time interval between the three consecutive data storages including the current trigger data storage is smaller than the first time interval threshold value at least once by the user, dividing the data of the current data storage according to the second data dispersion rule.
Further, when the user transfers the stored data, the smart television acquires the data stored in each smart household appliance, assembles and summarizes the data, forms complete data and provides the complete data for the user, and comprises:
a user triggers a data reading request on the smart television;
after receiving a reading request of data triggered by a user, the intelligent television calls a storage mark corresponding to the user request data, and an interception system of the intelligent television requests key confirmation to the user;
the user uses a remote controller of the smart television to confirm the key;
the intelligent television acquires a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the time, if the corresponding intelligent equipment is in a closed state, the intelligent television prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to data fragments storing the data is acquired through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data decryption private key by performing exclusive or operation on the first 16 bytes and the second 16 bytes of the S;
and reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
A de-centralized data protection system, the system comprising:
the storage module is used for triggering storage requirements on the smart television by a user to store data, and the smart television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and the calling module is used for acquiring the data stored in each intelligent household appliance by the intelligent television when the user calls the stored data, and assembling and summarizing the data to form complete data for the user.
Further, the storage module includes:
the triggering module is used for triggering the storage requirement of data on the intelligent television by a user;
the write-in module is used for driving a data write-in function and taking over by an interception system (android and the like) of the smart television after the smart television receives a storage requirement triggered by a user, and generating device public and private keys Pubkey and private key at the same time;
the dispersion module is used for dispersing data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
the acquisition module is used for acquiring the fixed information of each intelligent device in a family by the intelligent television through a family local area network;
the key acquisition module is used for the intelligent television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the intelligent devices to obtain a 32-byte signature value S, and obtain a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the encryption module is used for encrypting the multiple data fragments respectively and independently by using keys corresponding to the intelligent equipment by the intelligent television to obtain ciphertexts corresponding to the intelligent equipment;
and the distributed storage module is used for writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish distributed encryption storage.
Further, the dispersion module includes:
the first dispersing submodule is used for dividing data by adopting a first data dispersing rule when a user stores data by using the intelligent television for the first time and the second time;
the second dispersing submodule is used for judging whether time intervals of the user between continuous three data storages including the current trigger data storage are smaller than a second time interval threshold value or not when the user utilizes the intelligent television to perform the third data storage and perform the subsequent data storage each time, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold value and larger than the first time interval threshold value, performing data division on the current data storage according to the first data dispersing rule;
and the dispersion submodule III is used for dividing the data of the current data storage according to the data dispersion rule II when the time interval between the continuous three data storages including the current trigger data storage is smaller than the first time interval threshold value at least once.
Further, the retrieval module comprises:
the request triggering module is used for triggering a data reading request on the intelligent television by a user;
the confirmation module is used for calling a storage mark corresponding to user request data after the intelligent television receives a reading request of data triggered by a user, and an interception system of the intelligent television requests key confirmation to the user;
the information acquisition module is used for the intelligent television to acquire a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the information acquisition module prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to the data fragment stored with the data is acquired through a home local area network;
the decryption key acquisition module is used for the smart television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtain a data decryption private key by performing exclusive or operation on the first 16 bytes and the last 16 bytes of the S;
and the original text acquisition module is used for reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The invention has the beneficial effects that:
according to the data protection method and system for going to the center, the user information in the smart television is interconnected and communicated through the home local area internet, the data such as bank card information and shopping information of the user who performs television shopping are stored in each physical medium in a dispersed mode according to a certain rule during storage, and when the data protection system is used, the data are assembled and collected, so that even if the android system is unsafe, the data stored in each medium are incomplete data, and the data cannot be leaked even if the data are stolen. The safety and the reliability of data stored in the household equipment are effectively improved, and the user information is effectively prevented from being stolen and leaked.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
fig. 2 is a system block diagram of the system of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
The embodiment of the invention provides a data protection method for going to the center, which comprises the following steps of:
s1, triggering a storage requirement on the smart television by a user for data storage, and storing the data required to be stored by the user in each intelligent household appliance by the smart television in a dispersed manner according to a data dispersion rule;
and S2, when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and performs data splicing and summarizing to form complete data for the user.
The method includes that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each intelligent household appliance according to a data dispersion rule, and includes:
s101, triggering a data storage requirement on the smart television by a user;
s102, after the smart television receives a storage requirement triggered by a user, an interception system (android and the like) of the smart television drives a data writing function and takes over, and meanwhile device public and private keys Pubkey and private key are generated;
s103, dispersing the data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
s104, the intelligent television acquires fixed information of each intelligent device in a home through a home local area network;
s105, the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
s106, the intelligent television respectively and independently encrypts the multiple data fragments by using keys corresponding to the intelligent equipment to obtain ciphertexts corresponding to the intelligent equipment;
and S107, writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish the scattered encryption storage.
Meanwhile, when the user calls the stored data, the smart television acquires the data stored in each smart household appliance, assembles and summarizes the data, forms complete data and provides the complete data for the user, and the method comprises the following steps:
s201, a user triggers a data reading request on the smart television;
s202, after receiving a data reading request triggered by a user, the smart television calls a storage mark corresponding to the user request data, and an interception system of the smart television requests key confirmation from the user;
s203, the user uses a remote controller of the smart television to confirm the key pressing;
s204, the intelligent television acquires a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the intelligent television prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to data fragments stored with the data is acquired through a home local area network;
s205, the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data decryption private key by performing exclusive OR operation on the first 16 bytes and the second 16 bytes of the S;
s206, reading the intelligent ciphertext information corresponding to the data fragments storing the data, decrypting the ciphertext information through a decryption private key, and performing data splicing on the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The working principle of the technical scheme is as follows: firstly, a user triggers a storage requirement on an intelligent television to store data, and the intelligent television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule; and then, when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and the data is spliced and summarized to form complete data for the user. Each intelligent household appliance includes an intelligent television, an air conditioner, a refrigerator, a computer and an intelligent mobile terminal, for example, a smart phone, a notebook computer, a tablet computer and other devices.
Specifically, the data storage process: a user triggers the storage requirement of data D on the smart television; data write-in driving of an interception system (android and the like) of the smart television is taken over, and meanwhile device public and private keys Pubkey and private key are generated; dispersing data D to be written into M data fragments D1, D2 and D3 … … DM according to a certain specification; acquiring fixed information of intelligent equipment such as an air conditioner, a refrigerator and a mobile phone through a home local area network; hashing the fixed use SM3 algorithm of the equipment to obtain an abstract value H, signing the H by using an equipment private key to obtain a 32-byte signature value S, and carrying out XOR on the first 16 bytes and the second 16 bytes of the S to obtain a data encryption and decryption private key; d1, D2 and D3 … … DM are encrypted by keys calculated by respective equipment to obtain ciphertext; and writing the obtained ciphertext into each intelligent device to finish the scattered encryption storage.
And (3) a data reading process: a user triggers a reading request of data D on the smart television; intercepting a data reading request of a system and requesting key confirmation; the user uses the remote controller to confirm the key; acquiring fixed information of intelligent equipment such as an air conditioner, a refrigerator and a mobile phone through a home local area network, hashing the fixed information by using an SM3 algorithm through the intelligent television to obtain an abstract value H, signing the H by using private keys of the intelligent equipment to obtain a 32-byte signature value S, and performing exclusive-or operation on the first 16 bytes and the second 16 bytes of the S to obtain a data decryption private key; and reading the ciphertext information for decryption, and splicing the decrypted fragment information according to a preset rule to obtain the original text.
The effect of the above technical scheme is as follows: the user information in the smart television is interconnected and communicated through the home local area internet, data such as bank card information and shopping information of a user who performs television shopping are dispersedly stored in each physical medium according to a certain rule during storage, and are assembled and gathered during use, so that even if the android system is unsafe, the data stored in each medium are incomplete data, and the data cannot be leaked even if the data are stolen. The safety and the reliability of data stored in the household equipment are effectively improved, and the user information is effectively prevented from being stolen and leaked.
In an embodiment of the present invention, the data required to be stored by the user includes: the system comprises a user telephone number, a user name, bank card information and shopping information; the data required to be stored by the user is divided in the following dividing mode:
the first division mode: dividing according to the data stream of the data required to be stored by the user, and directly dividing according to the data stream without analyzing the data information in the data stream of the data required to be stored by the user; encrypting the data to obtain a ciphertext M, and dividing or extracting the ciphertext M equally; wherein, the extraction mode is to carry out fixed-point extraction according to a preset function polynomial; the obtained multiple ciphertexts are divided or extracted, and are dispersed according to a matrix, for example, to generate 3 fragments, data is formed into a matrix with 3 columns and n rows, and then the data is extracted according to the columns and is dispersed and stored.
The second division mode: carrying out data information segmentation according to a data dispersion rule, wherein the data dispersion rule comprises the following steps: a first data scattering rule and a second data scattering rule.
The rule content of the first data dispersion rule and the second data dispersion rule comprises;
the data dispersion rule one: dividing the telephone number of the user into four groups of number data according to the telephone number sequence 2+3+3+3, and respectively marking the four groups of number data as A1, A2, A3 and A4; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; trisecting the bank card number according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2 and C3; taking the number of the remaining digits after trisection according to the number of the digits of the bank card number as a fourth group of data C4, and if the number of the remaining digits after trisection of the number of the digits of the bank card number is 0, defaulting the fourth group of data to 0000 and marking the fourth group of data as C4; dividing shopping information into four data groups according to shopping order generation time, shopping commodity information, mailing address information and order amount information, and sequentially marking each data group as D1, D2, D3 and D4;
combining data A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4 and D1, D2, D3 and D4 according to the principle of consistent numerical labels to form a first group of data A1+ B1+ C1+ D1, a second group of data A2+ B2+ C2+ D2, a third group of data A3+ B3+ C3+ D3 and a fourth group of data A4+ B4+ C4+ D4;
the second data dispersion rule: dividing the user telephone number into six groups of number data according to the telephone number sequence 2+2+1+3+2+1, and respectively marking the number data as A1, A2, A3, A4, A5 and A6; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; dividing the bank card number into five equal parts according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2, C3, C4 and C5; taking the number of the rest digits after five equal divisions according to the number of the bank card number digits as sixth array data C6, and if the number of the rest digits after five equal divisions according to the number of the bank card number digits is 0, defaulting the sixth array data to 0101 and marking the sixth array data as C6; dividing the shopping information into three data groups according to the shopping order generation time, the shopping commodity information and the order amount information, sequentially marking each data group as D1, D2 and D3, and then taking the province, city, district and county information in the mailing address information as a fourth information group and marking the information as D4; taking the street cell number information in the mailing address information as a fifth information group and marking as D5;
six data sets were formed as follows: the data processing method comprises the steps of firstly processing a first group of data A1+ B1+ C1+ D1, secondly processing a2+ B2+ C2+ D2, thirdly processing A3+ B3+ C3+ D3, fourthly processing a4+ B4+ C4+ D4, fifthly processing A5+ C5+ D5 and sixthly processing a6+ C6.
The effect of the above technical scheme is as follows: the data are segmented and recombined in the mode, the data scattering degree and the abnormal degree can be effectively improved, the safety of data storage can be effectively improved, complete original data cannot be obtained even if the data are stolen after the data are stored, and due to the fact that various data partitioning rules are set and each data partitioning rule has complexity, difference and diversity, data recombination cannot be carried out even if data fragments are obtained under the condition that the partitioning rules are not known, meanwhile, due to the fact that the various data partitioning rules are set and the setting mode of the various data partitioning rules is combined, a party stealing information cannot obtain specific data partitioning rules at all, and the safety of data storage is further improved.
In an embodiment of the present invention, the method for dispersing data to be written into a plurality of data fragments according to a data dispersion rule includes:
when a user stores data by using the smart television for the first time and the second time, data are divided by adopting a first data dispersion rule;
when a user uses the smart television to perform third data storage and perform subsequent data storage each time, judging whether time intervals between continuous three data storages including current trigger data storage of the user are smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule, wherein the first time interval threshold and the second time interval threshold are obtained through the following formula:
Figure BDA0003051391860000101
wherein, T1Representing a first time interval threshold value, wherein n represents the total shopping times of television shopping by a user by utilizing the intelligent television; t isiRepresenting a time interval between the ith TV purchase and the last TV purchase; t ismaxIndicating electricityLooking at the maximum time interval between purchases; t isminRepresents a minimum time interval between television purchases; cgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; k represents that in the TV shopping time interval, the TV shopping time intervals are arranged from small to large to form a time interval array, the number of the first k minimum time intervals in the time interval array is 3 or 5; t isminjRepresents the jth time interval of the first k minimum time intervals; when n < 3 or n < 5, k is n, and Tminj=Ti(ii) a Alpha represents a first time adjustment coefficient, and the value range of alpha is 1.81-1.97;
Figure BDA0003051391860000102
wherein, T2Represents a second time interval threshold; hwIndicating the number of days that the user has not made a TV purchase, HgIndicating the number of days that the user has made a TV purchase, CgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; m represents the TV shopping time intervals, the TV shopping time intervals are arranged from small to large to form a time interval array, and the number of m maximum time intervals in the time interval array is 3 or 5; t ismaxtRepresents the t-th time interval of the m maximum time intervals; when n < 3 or n < 5, m is n, and Tmaxj=Ti(ii) a Beta represents a second time adjustment coefficient, and the value range of beta is 1.65-1.77;
and when the time interval between the three consecutive data storages including the current trigger data storage is smaller than the first time interval threshold value at least once by the user, dividing the data of the current data storage according to the second data dispersion rule.
In the process of storing the data fragments, the intelligent television sequentially stores the number of data sets acquired according to the current data dispersion rule into the intelligent household appliance according to the number and the type of the intelligent household appliances acquired currently, and if the number of the intelligent household appliances cannot meet the number of the current dispersed data sets, the redundant dispersed data sets are sequentially and circularly stored into the current intelligent appliance, namely, one intelligent appliance stores a plurality of nonadjacent data sets. Meanwhile, the current data storage and the intelligent equipment for data storage are marked.
The working principle of the technical scheme is as follows: the first time interval threshold and the second time interval threshold are obtained using data of historical television purchases of the user. And determining the selective use of the data partitioning rule according to the time interval between data storage of two television shopping.
The effect of the above technical scheme is as follows: the time interval threshold value obtained through the formula can better accord with the data generation and data use habits of the user, the matching degree of the time interval threshold value and the actual living habits of the user is higher, meanwhile, the data segmentation rule is adopted through the judgment of different time intervals, the variation intensity of data segmentation can be effectively improved, the complexity of each data combination in the data storage is improved, and the safety degree of the data storage is further improved. Meanwhile, according to the time interval threshold value obtained by the formula, the complexity of the data segmentation rule can be selected effectively according to the actual conditions of data generation and data storage (two different data segmentation rules correspond to the data segmentation with two different complexities), the matching between the data segmentation complexity and the actual data generation condition of the user can be improved effectively, and under the condition that the user frequently generates data and stores the data to generate a large amount of data, the diversity of the data storage is improved by intelligently selecting the data segmentation complexity, so that the safety performance of the data storage is improved to a great extent.
An embodiment of the present invention provides a data protection system going to a center, as shown in fig. 2, the system includes:
the storage module is used for triggering storage requirements on the smart television by a user to store data, and the smart television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and the calling module is used for acquiring the data stored in each intelligent household appliance by the intelligent television when the user calls the stored data, and assembling and summarizing the data to form complete data for the user.
Wherein the storage module comprises:
the triggering module is used for triggering the storage requirement of data on the intelligent television by a user;
the write-in module is used for driving a data write-in function and taking over by an interception system (android and the like) of the smart television after the smart television receives a storage requirement triggered by a user, and generating device public and private keys Pubkey and private key at the same time;
the dispersion module is used for dispersing data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
the acquisition module is used for acquiring the fixed information of each intelligent device in a family by the intelligent television through a family local area network;
the key acquisition module is used for the intelligent television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the intelligent devices to obtain a 32-byte signature value S, and obtain a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the encryption module is used for encrypting the multiple data fragments respectively and independently by using keys corresponding to the intelligent equipment by the intelligent television to obtain ciphertexts corresponding to the intelligent equipment;
and the distributed storage module is used for writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish distributed encryption storage.
Wherein the dispersion module comprises:
the first dispersing submodule is used for dividing data by adopting a first data dispersing rule when a user stores data by using the intelligent television for the first time and the second time;
the second dispersing submodule is used for judging whether time intervals of the user between continuous three data storages including the current trigger data storage are smaller than a second time interval threshold value or not when the user utilizes the intelligent television to perform the third data storage and perform the subsequent data storage each time, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold value and larger than the first time interval threshold value, performing data division on the current data storage according to the first data dispersing rule;
and the dispersion submodule III is used for dividing the data of the current data storage according to the data dispersion rule II when the time interval between the continuous three data storages including the current trigger data storage is smaller than the first time interval threshold value at least once.
The retrieval module comprises:
the request triggering module is used for triggering a data reading request on the intelligent television by a user;
the confirmation module is used for calling a storage mark corresponding to user request data after the intelligent television receives a reading request of data triggered by a user, and an interception system of the intelligent television requests key confirmation to the user;
the information acquisition module is used for the intelligent television to acquire a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the information acquisition module prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to the data fragment stored with the data is acquired through a home local area network;
the decryption key acquisition module is used for the smart television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtain a data decryption private key by performing exclusive or operation on the first 16 bytes and the last 16 bytes of the S;
and the original text acquisition module is used for reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The working principle of the technical scheme is as follows: firstly, a user triggers a storage requirement on an intelligent television through a storage module to store data, and the intelligent television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and then, when the user calls the stored data through the calling module, the intelligent television acquires the data stored in each intelligent household appliance, assembles and summarizes the data, and forms complete data to be provided for the user.
The operation process of the storage module comprises the following steps:
step one, a user triggers the storage requirement of data on the smart television through a triggering module;
step two, after the smart television receives a storage requirement triggered by a user, a write-in module is adopted to control an interception system (android and the like) of the smart television to drive a data write-in function and take over, and meanwhile, device public and private keys Pubkey and private key are generated;
thirdly, controlling the data to be written in by the smart television to be dispersed into a plurality of data fragments according to a data dispersion rule by using a dispersion module;
step four, an acquisition module is adopted to control the intelligent television to acquire fixed information of each intelligent device in a home through a home local area network;
step five, the intelligent television is controlled by a key acquisition module to hash the fixed information by using an SM3 algorithm to obtain a digest value H, the H is signed by using private keys of the intelligent devices to obtain a 32-byte signature value S, and the first 16 bytes and the last 16 bytes of the S are subjected to exclusive-or operation to obtain a data encryption private key;
step six, an encryption module is adopted to control the intelligent television to use keys corresponding to the intelligent devices to encrypt a plurality of data fragments respectively and independently to obtain ciphertext corresponding to the intelligent devices;
and seventhly, writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device through a dispersed storage module, and finishing the dispersed encryption storage.
Wherein, the operation process of the dispersion module comprises the following steps:
the method comprises the following steps that firstly, when a user uses the smart television for data storage for the first time and the second time, data are divided through a first dispersing submodule by adopting a first data dispersing rule;
secondly, when a user uses the smart television to perform third data storage and subsequently performs data storage each time, using a dispersion submodule II to judge whether time intervals between continuous three data storages including current trigger data storage of the user are all smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are all smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule;
and thirdly, when the time interval between the current trigger data storage and the continuous three data storage of the user is smaller than the first time interval threshold value at least once, determining that the current data storage carries out data division according to the data division rule II through the dispersion submodule III.
The operation process of the calling module comprises the following steps:
step 1, triggering a data reading request on an intelligent television by a user through a request triggering module;
step 2, adopting a confirmation module to control the intelligent television to call a storage mark corresponding to user request data after receiving a reading request of data triggered by a user, and requesting key confirmation from the user by an interception system of the intelligent television;
step 3, controlling the smart television to acquire a mark corresponding to user request data and smart equipment corresponding to the user request data and stored at the time through an information acquisition module, prompting a user to start the smart equipment if the corresponding smart equipment is in a closed state, and acquiring fixed information of each smart equipment corresponding to data fragments stored with data through a home local area network;
step 4, a decryption key acquisition module is adopted to control the smart television to hash the fixed information by using an SM3 algorithm to obtain a digest value H, the H is signed by using private keys of the smart devices to obtain a 32-byte signature value S, and the first 16 bytes and the second 16 bytes of the S are subjected to exclusive-or operation to obtain a data decryption private key;
and 5, reading the intelligent ciphertext information corresponding to the data fragments stored with the data through the original text acquisition module, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The effect of the above technical scheme is as follows: the user information in the smart television is interconnected and communicated through the home local area internet, data such as bank card information and shopping information of a user who performs television shopping are dispersedly stored in each physical medium according to a certain rule during storage, and are assembled and gathered during use, so that even if the android system is unsafe, the data stored in each medium are incomplete data, and the data cannot be leaked even if the data are stolen. The safety and the reliability of data stored in the household equipment are effectively improved, and the user information is effectively prevented from being stolen and leaked.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method of decentralized data protection, the method comprising:
the method comprises the following steps that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each smart household appliance according to a data dispersion rule;
when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and assembles and summarizes the data to form complete data for the user.
2. The method of claim 1, wherein the user triggers a storage requirement on the smart tv for data storage, and the smart tv dispersedly stores the data required by the user in each smart home device according to a data dispersion rule, including:
a user triggers the storage requirement of data on the smart television;
after the intelligent television receives a storage requirement triggered by a user, an interception system of the intelligent television drives a data writing function and takes over, and meanwhile, device public and private keys Pubkey and private key are generated;
the data to be written in by the intelligent television are scattered into a plurality of data fragments according to a data scattering rule;
the intelligent television acquires fixed information of each intelligent device in a home through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the intelligent television respectively and independently encrypts the multiple data fragments by using keys corresponding to the intelligent equipment to obtain ciphertexts corresponding to the intelligent equipment;
and writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish the distributed encryption storage.
3. The method of claim 1 or 2, wherein the user-desired stored data comprises: the system comprises a user telephone number, a user name, bank card information and shopping information; the data required to be stored by the user is divided in the following dividing mode:
the first division mode: dividing according to the data stream of the data required to be stored by the user, and directly dividing according to the data stream without analyzing the data information in the data stream of the data required to be stored by the user; encrypting the data to obtain a ciphertext M, and dividing or extracting the ciphertext M equally;
the second division mode: carrying out data information segmentation according to a data dispersion rule, wherein the data dispersion rule comprises the following steps: a first data scattering rule and a second data scattering rule.
4. The method of claim 3, wherein the rule contents of the first data scattering rule and the second data scattering rule comprise;
the data dispersion rule one: dividing the telephone number of the user into four groups of number data according to the telephone number sequence 2+3+3+3, and respectively marking the four groups of number data as A1, A2, A3 and A4; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; trisecting the bank card number according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2 and C3; taking the number of the remaining digits after trisection according to the number of the digits of the bank card number as a fourth group of data C4, and if the number of the remaining digits after trisection of the number of the digits of the bank card number is 0, defaulting the fourth group of data to 0000 and marking the fourth group of data as C4; dividing shopping information into four data groups according to shopping order generation time, shopping commodity information, mailing address information and order amount information, and sequentially marking each data group as D1, D2, D3 and D4;
combining data A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4 and D1, D2, D3 and D4 according to the principle of consistent numerical labels to form a first group of data A1+ B1+ C1+ D1, a second group of data A2+ B2+ C2+ D2, a third group of data A3+ B3+ C3+ D3 and a fourth group of data A4+ B4+ C4+ D4;
the second data dispersion rule: dividing the user telephone number into six groups of number data according to the telephone number sequence 2+2+1+3+2+1, and respectively marking the number data as A1, A2, A3, A4, A5 and A6; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; dividing the bank card number into five equal parts according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2, C3, C4 and C5; taking the number of the rest digits after five equal divisions according to the number of the bank card number digits as sixth array data C6, and if the number of the rest digits after five equal divisions according to the number of the bank card number digits is 0, defaulting the sixth array data to 0101 and marking the sixth array data as C6; dividing the shopping information into three data groups according to the shopping order generation time, the shopping commodity information and the order amount information, sequentially marking each data group as D1, D2 and D3, and then taking the province, city, district and county information in the mailing address information as a fourth information group and marking the information as D4; taking the street cell number information in the mailing address information as a fifth information group and marking as D5;
six data sets were formed as follows: the data processing method comprises the steps of firstly processing a first group of data A1+ B1+ C1+ D1, secondly processing a2+ B2+ C2+ D2, thirdly processing A3+ B3+ C3+ D3, fourthly processing a4+ B4+ C4+ D4, fifthly processing A5+ C5+ D5 and sixthly processing a6+ C6.
5. The method according to claim 2, wherein the smart tv disperses the data to be written into a plurality of data fragments according to a data dispersion rule, including:
when a user stores data by using the smart television for the first time and the second time, data are divided by adopting a first data dispersion rule;
when a user uses the smart television to perform third data storage and perform subsequent data storage each time, judging whether time intervals between continuous three data storages including current trigger data storage of the user are smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule, wherein the first time interval threshold and the second time interval threshold are obtained through the following formula:
Figure FDA0003051391850000031
wherein, T1Representing a first time interval threshold value, wherein n represents the total shopping times of television shopping by a user by utilizing the intelligent television; t isiRepresenting a time interval between the ith TV purchase and the last TV purchase; t ismaxRepresents the maximum time interval between television purchases; t isminRepresents a minimum time interval between television purchases; cgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; k represents that in the TV shopping time interval, the TV shopping time intervals are arranged from small to large to form a time interval array, the number of the first k minimum time intervals in the time interval array is 3 or 5; t isminjRepresents the jth time interval of the first k minimum time intervals; when n < 3 or n < 5, k is n, and Tminj=Ti(ii) a Alpha represents a first time adjustment coefficient, and the value range of alpha is 1.81-1.97;
Figure FDA0003051391850000032
wherein, T2Represents a second time interval threshold; hwIndicating the number of days that the user has not made a TV purchase, HgIndicating the number of days that the user has made a TV purchase, CgIndicating that the user is making a television purchase andthe number of times of triggering data storage is carried out; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; m represents the TV shopping time intervals, the TV shopping time intervals are arranged from small to large to form a time interval array, and the number of m maximum time intervals in the time interval array is 3 or 5; t ismaxtRepresents the t-th time interval of the m maximum time intervals; when n < 3 or n < 5, m is n, and Tmaxj=Ti(ii) a Beta represents a second time adjustment coefficient, and the value range of beta is 1.65-1.77;
and when the time interval between the three consecutive data storages including the current trigger data storage is smaller than the first time interval threshold value at least once by the user, dividing the data of the current data storage according to the second data dispersion rule.
6. The method of claim 1, wherein when the user invokes the stored data, the smart television acquires the data stored in each smart home appliance, performs data splicing and summarization to form complete data, and provides the complete data to the user, and the method comprises the following steps:
a user triggers a data reading request on the smart television;
after receiving a reading request of data triggered by a user, the intelligent television calls a storage mark corresponding to the user request data, and an interception system of the intelligent television requests key confirmation to the user;
the user uses a remote controller of the smart television to confirm the key;
the intelligent television acquires a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the time, if the corresponding intelligent equipment is in a closed state, the intelligent television prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to data fragments storing the data is acquired through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data decryption private key by performing exclusive or operation on the first 16 bytes and the second 16 bytes of the S;
and reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
7. A decentralized data protection system, characterized in that said system comprises:
the storage module is used for triggering storage requirements on the smart television by a user to store data, and the smart television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and the calling module is used for acquiring the data stored in each intelligent household appliance by the intelligent television when the user calls the stored data, and assembling and summarizing the data to form complete data for the user.
8. The system of claim 7, wherein the storage module comprises:
the triggering module is used for triggering the storage requirement of data on the intelligent television by a user;
the write-in module is used for driving a data write-in function and taking over the data write-in function by an interception system of the intelligent television after the intelligent television receives a storage requirement triggered by a user, and generating device public and private keys Pubkey and private key at the same time;
the dispersion module is used for dispersing data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
the acquisition module is used for acquiring the fixed information of each intelligent device in a family by the intelligent television through a family local area network;
the key acquisition module is used for the intelligent television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the intelligent devices to obtain a 32-byte signature value S, and obtain a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the encryption module is used for encrypting the multiple data fragments respectively and independently by using keys corresponding to the intelligent equipment by the intelligent television to obtain ciphertexts corresponding to the intelligent equipment;
and the distributed storage module is used for writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish distributed encryption storage.
9. The system of claim 8, wherein the dispersion module comprises:
the first dispersing submodule is used for dividing data by adopting a first data dispersing rule when a user stores data by using the intelligent television for the first time and the second time;
the second dispersing submodule is used for judging whether time intervals of the user between continuous three data storages including the current trigger data storage are smaller than a second time interval threshold value or not when the user utilizes the intelligent television to perform the third data storage and perform the subsequent data storage each time, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold value and larger than the first time interval threshold value, performing data division on the current data storage according to the first data dispersing rule;
and the dispersion submodule III is used for dividing the data of the current data storage according to the data dispersion rule II when the time interval between the continuous three data storages including the current trigger data storage is smaller than the first time interval threshold value at least once.
10. The method of claim 1, wherein the retrieving module comprises:
the request triggering module is used for triggering a data reading request on the intelligent television by a user;
the confirmation module is used for calling a storage mark corresponding to user request data after the intelligent television receives a reading request of data triggered by a user, and an interception system of the intelligent television requests key confirmation to the user;
the information acquisition module is used for the intelligent television to acquire a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the information acquisition module prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to the data fragment stored with the data is acquired through a home local area network;
the decryption key acquisition module is used for the smart television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtain a data decryption private key by performing exclusive or operation on the first 16 bytes and the last 16 bytes of the S;
and the original text acquisition module is used for reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
CN202110488345.6A 2021-05-06 2021-05-06 Data protection method and system for going to center Active CN113204786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110488345.6A CN113204786B (en) 2021-05-06 2021-05-06 Data protection method and system for going to center

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110488345.6A CN113204786B (en) 2021-05-06 2021-05-06 Data protection method and system for going to center

Publications (2)

Publication Number Publication Date
CN113204786A true CN113204786A (en) 2021-08-03
CN113204786B CN113204786B (en) 2021-12-14

Family

ID=77028498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110488345.6A Active CN113204786B (en) 2021-05-06 2021-05-06 Data protection method and system for going to center

Country Status (1)

Country Link
CN (1) CN113204786B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113959476A (en) * 2021-12-22 2022-01-21 北京为准智能科技有限公司 Intelligent instrument and meter verification system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009157774A (en) * 2007-12-27 2009-07-16 Ntt Data Corp Apparatus and program for supporting audio documentation
CN102143232A (en) * 2011-04-02 2011-08-03 南京邮电大学 Peer-to-peer network based digital copyright protection method
JP2013131105A (en) * 2011-12-22 2013-07-04 Japan Research Institute Ltd Information transfer system and information transfer method
CN105373735A (en) * 2014-08-15 2016-03-02 王基旆 Computer system with account password dispersed storage anti-logging function
CN110244573A (en) * 2019-06-27 2019-09-17 深圳市星际无限科技有限公司 Storage system and intelligent appliance based on intelligent appliance
CN110990846A (en) * 2019-11-15 2020-04-10 北京连山时代科技有限公司 Information storage method, device and computer readable storage medium
CN111917720A (en) * 2020-06-28 2020-11-10 中科物缘科技(杭州)有限公司 File fragmentization encryption storage method, file fragmentization encryption acquisition method and file fragmentization encryption storage system based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009157774A (en) * 2007-12-27 2009-07-16 Ntt Data Corp Apparatus and program for supporting audio documentation
CN102143232A (en) * 2011-04-02 2011-08-03 南京邮电大学 Peer-to-peer network based digital copyright protection method
JP2013131105A (en) * 2011-12-22 2013-07-04 Japan Research Institute Ltd Information transfer system and information transfer method
CN105373735A (en) * 2014-08-15 2016-03-02 王基旆 Computer system with account password dispersed storage anti-logging function
CN110244573A (en) * 2019-06-27 2019-09-17 深圳市星际无限科技有限公司 Storage system and intelligent appliance based on intelligent appliance
CN110990846A (en) * 2019-11-15 2020-04-10 北京连山时代科技有限公司 Information storage method, device and computer readable storage medium
CN111917720A (en) * 2020-06-28 2020-11-10 中科物缘科技(杭州)有限公司 File fragmentization encryption storage method, file fragmentization encryption acquisition method and file fragmentization encryption storage system based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113959476A (en) * 2021-12-22 2022-01-21 北京为准智能科技有限公司 Intelligent instrument and meter verification system and method
CN113959476B (en) * 2021-12-22 2022-02-25 北京为准智能科技有限公司 Intelligent instrument and meter verification system and method

Also Published As

Publication number Publication date
CN113204786B (en) 2021-12-14

Similar Documents

Publication Publication Date Title
US11658814B2 (en) System and method for encryption and decryption based on quantum key distribution
US20220027515A1 (en) Decentralized Token Table Generation
CN101196855B (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN112751855B (en) Cross-browser user data security management system based on encryption technology
CN107257350B (en) Offline authentication or payment method of wearable equipment
CN101149768B (en) Special processor software encryption and decryption method
CN104992119B (en) A kind of safe transmission method and system of sensitive information Anti-theft
CN102138300A (en) Message authentication code pre-computation with applications to secure memory
CN1985466A (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
CN105117635A (en) Local data security protection system and method
CN1936870A (en) Hard-disc fan-area data enciphering and deciphering method and system
CN104732159A (en) File processing method and file processing device
CN104484628B (en) It is a kind of that there is the multi-application smart card of encrypting and decrypting
CN113204786B (en) Data protection method and system for going to center
CN101887713A (en) Encryption method and device for font library
CN115694799A (en) Communication data encryption method based on quantum key
CN101945246A (en) Method, device and equipment for authenticating passwords
CN114760052A (en) Bank Internet of things platform key generation method and device, electronic equipment and medium
CN102938762A (en) File safety management system based on mobile terminal
CN112311536B (en) Key hierarchical management method and system
WO2020077626A1 (en) Method and device for recognizing finger vein information
CN102480353A (en) Method of password authentication and secret key protection
CN104252604B (en) Database based building block system type dynamic encryption method
CN2824442Y (en) Finger print identifier for electronic signing mane
CN115766244A (en) Internet of vehicles information encryption method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant