CN113204786A - Data protection method and system for going to center - Google Patents
Data protection method and system for going to center Download PDFInfo
- Publication number
- CN113204786A CN113204786A CN202110488345.6A CN202110488345A CN113204786A CN 113204786 A CN113204786 A CN 113204786A CN 202110488345 A CN202110488345 A CN 202110488345A CN 113204786 A CN113204786 A CN 113204786A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- intelligent
- information
- storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data protection method and a data protection system for going to a center. The method comprises the following steps: the method comprises the following steps that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each smart household appliance according to a data dispersion rule; when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and assembles and summarizes the data to form complete data for the user. The system comprises modules corresponding to the steps of the method.
Description
Technical Field
The invention provides a data protection method and a data protection system for going to a center, and belongs to the technical field of data processing.
Background
With the development of the family internet of things, manufacturers store more and more data (bank card accounts, identity card accounts, various passwords and the like) in terminal equipment for the convenience of use of users, most of various household equipment (such as smart televisions, smart air conditioners, smart refrigerators, smart washing machines, sweeping robots and the like) use android systems at present, the android systems belong to open source systems and are easy to break through by hackers, and the data stored in the android systems are easy to leak.
Disclosure of Invention
The invention provides a data protection method and a data protection system for going to a center, which are used for solving the problem that stored data is easy to leak:
a method of decentralized data protection, the method comprising:
the method comprises the following steps that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each smart household appliance according to a data dispersion rule;
when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and assembles and summarizes the data to form complete data for the user.
Further, a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each intelligent household appliance according to a data dispersion rule, including:
a user triggers the storage requirement of data on the smart television;
after the smart television receives a storage requirement triggered by a user, an interception system (android and the like) of the smart television drives a data writing function and takes over, and meanwhile device public and private keys Pubkey and private key are generated;
the data to be written in by the intelligent television are scattered into a plurality of data fragments according to a data scattering rule;
the intelligent television acquires fixed information of each intelligent device in a home through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the intelligent television respectively and independently encrypts the multiple data fragments by using keys corresponding to the intelligent equipment to obtain ciphertexts corresponding to the intelligent equipment;
and writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish the distributed encryption storage.
Further, the user-required storage data includes: the system comprises a user telephone number, a user name, bank card information and shopping information; the data required to be stored by the user is divided in the following dividing mode:
the first division mode: dividing according to the data stream of the data required to be stored by the user, and directly dividing according to the data stream without analyzing the data information in the data stream of the data required to be stored by the user; encrypting the data to obtain a ciphertext M, and dividing or extracting the ciphertext M equally; wherein, the extraction mode is to carry out fixed-point extraction according to a preset function polynomial; the obtained multiple ciphertexts are divided or extracted, and are dispersed according to a matrix, for example, to generate 3 fragments, data is formed into a matrix with 3 columns and n rows, and then the data is extracted according to the columns and is dispersed and stored.
The second division mode: carrying out data information segmentation according to a data dispersion rule, wherein the data dispersion rule comprises the following steps: a first data scattering rule and a second data scattering rule.
Further, the rule content of the first data dispersion rule and the second data dispersion rule comprises;
the data dispersion rule one: dividing the telephone number of the user into four groups of number data according to the telephone number sequence 2+3+3+3, and respectively marking the four groups of number data as A1, A2, A3 and A4; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; trisecting the bank card number according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2 and C3; taking the number of the remaining digits after trisection according to the number of the digits of the bank card number as a fourth group of data C4, and if the number of the remaining digits after trisection of the number of the digits of the bank card number is 0, defaulting the fourth group of data to 0000 and marking the fourth group of data as C4; dividing shopping information into four data groups according to shopping order generation time, shopping commodity information, mailing address information and order amount information, and sequentially marking each data group as D1, D2, D3 and D4;
combining data A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4 and D1, D2, D3 and D4 according to the principle of consistent numerical labels to form a first group of data A1+ B1+ C1+ D1, a second group of data A2+ B2+ C2+ D2, a third group of data A3+ B3+ C3+ D3 and a fourth group of data A4+ B4+ C4+ D4;
the second data dispersion rule: dividing the user telephone number into six groups of number data according to the telephone number sequence 2+2+1+3+2+1, and respectively marking the number data as A1, A2, A3, A4, A5 and A6; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; dividing the bank card number into five equal parts according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2, C3, C4 and C5; taking the number of the rest digits after five equal divisions according to the number of the bank card number digits as sixth array data C6, and if the number of the rest digits after five equal divisions according to the number of the bank card number digits is 0, defaulting the sixth array data to 0101 and marking the sixth array data as C6; dividing the shopping information into three data groups according to the shopping order generation time, the shopping commodity information and the order amount information, sequentially marking each data group as D1, D2 and D3, and then taking the province, city, district and county information in the mailing address information as a fourth information group and marking the information as D4; taking the street cell number information in the mailing address information as a fifth information group and marking as D5;
six data sets were formed as follows: the data processing method comprises the steps of firstly processing a first group of data A1+ B1+ C1+ D1, secondly processing a2+ B2+ C2+ D2, thirdly processing A3+ B3+ C3+ D3, fourthly processing a4+ B4+ C4+ D4, fifthly processing A5+ C5+ D5 and sixthly processing a6+ C6.
Further, the smart television disperses data to be written into a plurality of data fragments according to a data dispersion rule, including:
when a user stores data by using the smart television for the first time and the second time, data are divided by adopting a first data dispersion rule;
when a user uses the smart television to perform third data storage and perform subsequent data storage each time, judging whether time intervals between continuous three data storages including current trigger data storage of the user are smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule, wherein the first time interval threshold and the second time interval threshold are obtained through the following formula:
wherein, T1Representing a first time interval threshold value, wherein n represents the total shopping times of television shopping by a user by utilizing the intelligent television; t isiRepresenting a time interval between the ith TV purchase and the last TV purchase; t ismaxRepresents the maximum time interval between television purchases; t isminRepresents a minimum time interval between television purchases; cgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; k represents that in the TV shopping time interval, the TV shopping time intervals are arranged from small to large to form a time interval array, the number of the first k minimum time intervals in the time interval array is 3 or 5; t isminjRepresents the jth time interval of the first k minimum time intervals; when n < 3 or n < 5, k is n, and Tminj=Ti(ii) a Alpha represents a first time adjustment coefficient, and the value range of alpha is 1.81-1.97;
wherein, T2Represents a second time interval threshold; hwIndicating the number of days that the user has not made a TV purchase, HgIndicating the number of days that the user has made a TV purchase, CgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; m represents the TV shopping time intervals, the TV shopping time intervals are arranged from small to large to form a time interval array, and the number of m maximum time intervals in the time interval array is 3 or 5; t ismaxtRepresents the t-th time interval of the m maximum time intervals; when n < 3 or n < 5, m is n, and Tmaxj=Ti(ii) a Beta represents a second time adjustment coefficient, and the value range of beta is 1.65-1.77;
and when the time interval between the three consecutive data storages including the current trigger data storage is smaller than the first time interval threshold value at least once by the user, dividing the data of the current data storage according to the second data dispersion rule.
Further, when the user transfers the stored data, the smart television acquires the data stored in each smart household appliance, assembles and summarizes the data, forms complete data and provides the complete data for the user, and comprises:
a user triggers a data reading request on the smart television;
after receiving a reading request of data triggered by a user, the intelligent television calls a storage mark corresponding to the user request data, and an interception system of the intelligent television requests key confirmation to the user;
the user uses a remote controller of the smart television to confirm the key;
the intelligent television acquires a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the time, if the corresponding intelligent equipment is in a closed state, the intelligent television prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to data fragments storing the data is acquired through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data decryption private key by performing exclusive or operation on the first 16 bytes and the second 16 bytes of the S;
and reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
A de-centralized data protection system, the system comprising:
the storage module is used for triggering storage requirements on the smart television by a user to store data, and the smart television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and the calling module is used for acquiring the data stored in each intelligent household appliance by the intelligent television when the user calls the stored data, and assembling and summarizing the data to form complete data for the user.
Further, the storage module includes:
the triggering module is used for triggering the storage requirement of data on the intelligent television by a user;
the write-in module is used for driving a data write-in function and taking over by an interception system (android and the like) of the smart television after the smart television receives a storage requirement triggered by a user, and generating device public and private keys Pubkey and private key at the same time;
the dispersion module is used for dispersing data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
the acquisition module is used for acquiring the fixed information of each intelligent device in a family by the intelligent television through a family local area network;
the key acquisition module is used for the intelligent television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the intelligent devices to obtain a 32-byte signature value S, and obtain a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the encryption module is used for encrypting the multiple data fragments respectively and independently by using keys corresponding to the intelligent equipment by the intelligent television to obtain ciphertexts corresponding to the intelligent equipment;
and the distributed storage module is used for writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish distributed encryption storage.
Further, the dispersion module includes:
the first dispersing submodule is used for dividing data by adopting a first data dispersing rule when a user stores data by using the intelligent television for the first time and the second time;
the second dispersing submodule is used for judging whether time intervals of the user between continuous three data storages including the current trigger data storage are smaller than a second time interval threshold value or not when the user utilizes the intelligent television to perform the third data storage and perform the subsequent data storage each time, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold value and larger than the first time interval threshold value, performing data division on the current data storage according to the first data dispersing rule;
and the dispersion submodule III is used for dividing the data of the current data storage according to the data dispersion rule II when the time interval between the continuous three data storages including the current trigger data storage is smaller than the first time interval threshold value at least once.
Further, the retrieval module comprises:
the request triggering module is used for triggering a data reading request on the intelligent television by a user;
the confirmation module is used for calling a storage mark corresponding to user request data after the intelligent television receives a reading request of data triggered by a user, and an interception system of the intelligent television requests key confirmation to the user;
the information acquisition module is used for the intelligent television to acquire a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the information acquisition module prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to the data fragment stored with the data is acquired through a home local area network;
the decryption key acquisition module is used for the smart television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtain a data decryption private key by performing exclusive or operation on the first 16 bytes and the last 16 bytes of the S;
and the original text acquisition module is used for reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The invention has the beneficial effects that:
according to the data protection method and system for going to the center, the user information in the smart television is interconnected and communicated through the home local area internet, the data such as bank card information and shopping information of the user who performs television shopping are stored in each physical medium in a dispersed mode according to a certain rule during storage, and when the data protection system is used, the data are assembled and collected, so that even if the android system is unsafe, the data stored in each medium are incomplete data, and the data cannot be leaked even if the data are stolen. The safety and the reliability of data stored in the household equipment are effectively improved, and the user information is effectively prevented from being stolen and leaked.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
fig. 2 is a system block diagram of the system of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
The embodiment of the invention provides a data protection method for going to the center, which comprises the following steps of:
s1, triggering a storage requirement on the smart television by a user for data storage, and storing the data required to be stored by the user in each intelligent household appliance by the smart television in a dispersed manner according to a data dispersion rule;
and S2, when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and performs data splicing and summarizing to form complete data for the user.
The method includes that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each intelligent household appliance according to a data dispersion rule, and includes:
s101, triggering a data storage requirement on the smart television by a user;
s102, after the smart television receives a storage requirement triggered by a user, an interception system (android and the like) of the smart television drives a data writing function and takes over, and meanwhile device public and private keys Pubkey and private key are generated;
s103, dispersing the data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
s104, the intelligent television acquires fixed information of each intelligent device in a home through a home local area network;
s105, the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
s106, the intelligent television respectively and independently encrypts the multiple data fragments by using keys corresponding to the intelligent equipment to obtain ciphertexts corresponding to the intelligent equipment;
and S107, writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish the scattered encryption storage.
Meanwhile, when the user calls the stored data, the smart television acquires the data stored in each smart household appliance, assembles and summarizes the data, forms complete data and provides the complete data for the user, and the method comprises the following steps:
s201, a user triggers a data reading request on the smart television;
s202, after receiving a data reading request triggered by a user, the smart television calls a storage mark corresponding to the user request data, and an interception system of the smart television requests key confirmation from the user;
s203, the user uses a remote controller of the smart television to confirm the key pressing;
s204, the intelligent television acquires a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the intelligent television prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to data fragments stored with the data is acquired through a home local area network;
s205, the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data decryption private key by performing exclusive OR operation on the first 16 bytes and the second 16 bytes of the S;
s206, reading the intelligent ciphertext information corresponding to the data fragments storing the data, decrypting the ciphertext information through a decryption private key, and performing data splicing on the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The working principle of the technical scheme is as follows: firstly, a user triggers a storage requirement on an intelligent television to store data, and the intelligent television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule; and then, when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and the data is spliced and summarized to form complete data for the user. Each intelligent household appliance includes an intelligent television, an air conditioner, a refrigerator, a computer and an intelligent mobile terminal, for example, a smart phone, a notebook computer, a tablet computer and other devices.
Specifically, the data storage process: a user triggers the storage requirement of data D on the smart television; data write-in driving of an interception system (android and the like) of the smart television is taken over, and meanwhile device public and private keys Pubkey and private key are generated; dispersing data D to be written into M data fragments D1, D2 and D3 … … DM according to a certain specification; acquiring fixed information of intelligent equipment such as an air conditioner, a refrigerator and a mobile phone through a home local area network; hashing the fixed use SM3 algorithm of the equipment to obtain an abstract value H, signing the H by using an equipment private key to obtain a 32-byte signature value S, and carrying out XOR on the first 16 bytes and the second 16 bytes of the S to obtain a data encryption and decryption private key; d1, D2 and D3 … … DM are encrypted by keys calculated by respective equipment to obtain ciphertext; and writing the obtained ciphertext into each intelligent device to finish the scattered encryption storage.
And (3) a data reading process: a user triggers a reading request of data D on the smart television; intercepting a data reading request of a system and requesting key confirmation; the user uses the remote controller to confirm the key; acquiring fixed information of intelligent equipment such as an air conditioner, a refrigerator and a mobile phone through a home local area network, hashing the fixed information by using an SM3 algorithm through the intelligent television to obtain an abstract value H, signing the H by using private keys of the intelligent equipment to obtain a 32-byte signature value S, and performing exclusive-or operation on the first 16 bytes and the second 16 bytes of the S to obtain a data decryption private key; and reading the ciphertext information for decryption, and splicing the decrypted fragment information according to a preset rule to obtain the original text.
The effect of the above technical scheme is as follows: the user information in the smart television is interconnected and communicated through the home local area internet, data such as bank card information and shopping information of a user who performs television shopping are dispersedly stored in each physical medium according to a certain rule during storage, and are assembled and gathered during use, so that even if the android system is unsafe, the data stored in each medium are incomplete data, and the data cannot be leaked even if the data are stolen. The safety and the reliability of data stored in the household equipment are effectively improved, and the user information is effectively prevented from being stolen and leaked.
In an embodiment of the present invention, the data required to be stored by the user includes: the system comprises a user telephone number, a user name, bank card information and shopping information; the data required to be stored by the user is divided in the following dividing mode:
the first division mode: dividing according to the data stream of the data required to be stored by the user, and directly dividing according to the data stream without analyzing the data information in the data stream of the data required to be stored by the user; encrypting the data to obtain a ciphertext M, and dividing or extracting the ciphertext M equally; wherein, the extraction mode is to carry out fixed-point extraction according to a preset function polynomial; the obtained multiple ciphertexts are divided or extracted, and are dispersed according to a matrix, for example, to generate 3 fragments, data is formed into a matrix with 3 columns and n rows, and then the data is extracted according to the columns and is dispersed and stored.
The second division mode: carrying out data information segmentation according to a data dispersion rule, wherein the data dispersion rule comprises the following steps: a first data scattering rule and a second data scattering rule.
The rule content of the first data dispersion rule and the second data dispersion rule comprises;
the data dispersion rule one: dividing the telephone number of the user into four groups of number data according to the telephone number sequence 2+3+3+3, and respectively marking the four groups of number data as A1, A2, A3 and A4; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; trisecting the bank card number according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2 and C3; taking the number of the remaining digits after trisection according to the number of the digits of the bank card number as a fourth group of data C4, and if the number of the remaining digits after trisection of the number of the digits of the bank card number is 0, defaulting the fourth group of data to 0000 and marking the fourth group of data as C4; dividing shopping information into four data groups according to shopping order generation time, shopping commodity information, mailing address information and order amount information, and sequentially marking each data group as D1, D2, D3 and D4;
combining data A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4 and D1, D2, D3 and D4 according to the principle of consistent numerical labels to form a first group of data A1+ B1+ C1+ D1, a second group of data A2+ B2+ C2+ D2, a third group of data A3+ B3+ C3+ D3 and a fourth group of data A4+ B4+ C4+ D4;
the second data dispersion rule: dividing the user telephone number into six groups of number data according to the telephone number sequence 2+2+1+3+2+1, and respectively marking the number data as A1, A2, A3, A4, A5 and A6; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; dividing the bank card number into five equal parts according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2, C3, C4 and C5; taking the number of the rest digits after five equal divisions according to the number of the bank card number digits as sixth array data C6, and if the number of the rest digits after five equal divisions according to the number of the bank card number digits is 0, defaulting the sixth array data to 0101 and marking the sixth array data as C6; dividing the shopping information into three data groups according to the shopping order generation time, the shopping commodity information and the order amount information, sequentially marking each data group as D1, D2 and D3, and then taking the province, city, district and county information in the mailing address information as a fourth information group and marking the information as D4; taking the street cell number information in the mailing address information as a fifth information group and marking as D5;
six data sets were formed as follows: the data processing method comprises the steps of firstly processing a first group of data A1+ B1+ C1+ D1, secondly processing a2+ B2+ C2+ D2, thirdly processing A3+ B3+ C3+ D3, fourthly processing a4+ B4+ C4+ D4, fifthly processing A5+ C5+ D5 and sixthly processing a6+ C6.
The effect of the above technical scheme is as follows: the data are segmented and recombined in the mode, the data scattering degree and the abnormal degree can be effectively improved, the safety of data storage can be effectively improved, complete original data cannot be obtained even if the data are stolen after the data are stored, and due to the fact that various data partitioning rules are set and each data partitioning rule has complexity, difference and diversity, data recombination cannot be carried out even if data fragments are obtained under the condition that the partitioning rules are not known, meanwhile, due to the fact that the various data partitioning rules are set and the setting mode of the various data partitioning rules is combined, a party stealing information cannot obtain specific data partitioning rules at all, and the safety of data storage is further improved.
In an embodiment of the present invention, the method for dispersing data to be written into a plurality of data fragments according to a data dispersion rule includes:
when a user stores data by using the smart television for the first time and the second time, data are divided by adopting a first data dispersion rule;
when a user uses the smart television to perform third data storage and perform subsequent data storage each time, judging whether time intervals between continuous three data storages including current trigger data storage of the user are smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule, wherein the first time interval threshold and the second time interval threshold are obtained through the following formula:
wherein, T1Representing a first time interval threshold value, wherein n represents the total shopping times of television shopping by a user by utilizing the intelligent television; t isiRepresenting a time interval between the ith TV purchase and the last TV purchase; t ismaxIndicating electricityLooking at the maximum time interval between purchases; t isminRepresents a minimum time interval between television purchases; cgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; k represents that in the TV shopping time interval, the TV shopping time intervals are arranged from small to large to form a time interval array, the number of the first k minimum time intervals in the time interval array is 3 or 5; t isminjRepresents the jth time interval of the first k minimum time intervals; when n < 3 or n < 5, k is n, and Tminj=Ti(ii) a Alpha represents a first time adjustment coefficient, and the value range of alpha is 1.81-1.97;
wherein, T2Represents a second time interval threshold; hwIndicating the number of days that the user has not made a TV purchase, HgIndicating the number of days that the user has made a TV purchase, CgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; m represents the TV shopping time intervals, the TV shopping time intervals are arranged from small to large to form a time interval array, and the number of m maximum time intervals in the time interval array is 3 or 5; t ismaxtRepresents the t-th time interval of the m maximum time intervals; when n < 3 or n < 5, m is n, and Tmaxj=Ti(ii) a Beta represents a second time adjustment coefficient, and the value range of beta is 1.65-1.77;
and when the time interval between the three consecutive data storages including the current trigger data storage is smaller than the first time interval threshold value at least once by the user, dividing the data of the current data storage according to the second data dispersion rule.
In the process of storing the data fragments, the intelligent television sequentially stores the number of data sets acquired according to the current data dispersion rule into the intelligent household appliance according to the number and the type of the intelligent household appliances acquired currently, and if the number of the intelligent household appliances cannot meet the number of the current dispersed data sets, the redundant dispersed data sets are sequentially and circularly stored into the current intelligent appliance, namely, one intelligent appliance stores a plurality of nonadjacent data sets. Meanwhile, the current data storage and the intelligent equipment for data storage are marked.
The working principle of the technical scheme is as follows: the first time interval threshold and the second time interval threshold are obtained using data of historical television purchases of the user. And determining the selective use of the data partitioning rule according to the time interval between data storage of two television shopping.
The effect of the above technical scheme is as follows: the time interval threshold value obtained through the formula can better accord with the data generation and data use habits of the user, the matching degree of the time interval threshold value and the actual living habits of the user is higher, meanwhile, the data segmentation rule is adopted through the judgment of different time intervals, the variation intensity of data segmentation can be effectively improved, the complexity of each data combination in the data storage is improved, and the safety degree of the data storage is further improved. Meanwhile, according to the time interval threshold value obtained by the formula, the complexity of the data segmentation rule can be selected effectively according to the actual conditions of data generation and data storage (two different data segmentation rules correspond to the data segmentation with two different complexities), the matching between the data segmentation complexity and the actual data generation condition of the user can be improved effectively, and under the condition that the user frequently generates data and stores the data to generate a large amount of data, the diversity of the data storage is improved by intelligently selecting the data segmentation complexity, so that the safety performance of the data storage is improved to a great extent.
An embodiment of the present invention provides a data protection system going to a center, as shown in fig. 2, the system includes:
the storage module is used for triggering storage requirements on the smart television by a user to store data, and the smart television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and the calling module is used for acquiring the data stored in each intelligent household appliance by the intelligent television when the user calls the stored data, and assembling and summarizing the data to form complete data for the user.
Wherein the storage module comprises:
the triggering module is used for triggering the storage requirement of data on the intelligent television by a user;
the write-in module is used for driving a data write-in function and taking over by an interception system (android and the like) of the smart television after the smart television receives a storage requirement triggered by a user, and generating device public and private keys Pubkey and private key at the same time;
the dispersion module is used for dispersing data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
the acquisition module is used for acquiring the fixed information of each intelligent device in a family by the intelligent television through a family local area network;
the key acquisition module is used for the intelligent television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the intelligent devices to obtain a 32-byte signature value S, and obtain a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the encryption module is used for encrypting the multiple data fragments respectively and independently by using keys corresponding to the intelligent equipment by the intelligent television to obtain ciphertexts corresponding to the intelligent equipment;
and the distributed storage module is used for writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish distributed encryption storage.
Wherein the dispersion module comprises:
the first dispersing submodule is used for dividing data by adopting a first data dispersing rule when a user stores data by using the intelligent television for the first time and the second time;
the second dispersing submodule is used for judging whether time intervals of the user between continuous three data storages including the current trigger data storage are smaller than a second time interval threshold value or not when the user utilizes the intelligent television to perform the third data storage and perform the subsequent data storage each time, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold value and larger than the first time interval threshold value, performing data division on the current data storage according to the first data dispersing rule;
and the dispersion submodule III is used for dividing the data of the current data storage according to the data dispersion rule II when the time interval between the continuous three data storages including the current trigger data storage is smaller than the first time interval threshold value at least once.
The retrieval module comprises:
the request triggering module is used for triggering a data reading request on the intelligent television by a user;
the confirmation module is used for calling a storage mark corresponding to user request data after the intelligent television receives a reading request of data triggered by a user, and an interception system of the intelligent television requests key confirmation to the user;
the information acquisition module is used for the intelligent television to acquire a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the information acquisition module prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to the data fragment stored with the data is acquired through a home local area network;
the decryption key acquisition module is used for the smart television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtain a data decryption private key by performing exclusive or operation on the first 16 bytes and the last 16 bytes of the S;
and the original text acquisition module is used for reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The working principle of the technical scheme is as follows: firstly, a user triggers a storage requirement on an intelligent television through a storage module to store data, and the intelligent television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and then, when the user calls the stored data through the calling module, the intelligent television acquires the data stored in each intelligent household appliance, assembles and summarizes the data, and forms complete data to be provided for the user.
The operation process of the storage module comprises the following steps:
step one, a user triggers the storage requirement of data on the smart television through a triggering module;
step two, after the smart television receives a storage requirement triggered by a user, a write-in module is adopted to control an interception system (android and the like) of the smart television to drive a data write-in function and take over, and meanwhile, device public and private keys Pubkey and private key are generated;
thirdly, controlling the data to be written in by the smart television to be dispersed into a plurality of data fragments according to a data dispersion rule by using a dispersion module;
step four, an acquisition module is adopted to control the intelligent television to acquire fixed information of each intelligent device in a home through a home local area network;
step five, the intelligent television is controlled by a key acquisition module to hash the fixed information by using an SM3 algorithm to obtain a digest value H, the H is signed by using private keys of the intelligent devices to obtain a 32-byte signature value S, and the first 16 bytes and the last 16 bytes of the S are subjected to exclusive-or operation to obtain a data encryption private key;
step six, an encryption module is adopted to control the intelligent television to use keys corresponding to the intelligent devices to encrypt a plurality of data fragments respectively and independently to obtain ciphertext corresponding to the intelligent devices;
and seventhly, writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device through a dispersed storage module, and finishing the dispersed encryption storage.
Wherein, the operation process of the dispersion module comprises the following steps:
the method comprises the following steps that firstly, when a user uses the smart television for data storage for the first time and the second time, data are divided through a first dispersing submodule by adopting a first data dispersing rule;
secondly, when a user uses the smart television to perform third data storage and subsequently performs data storage each time, using a dispersion submodule II to judge whether time intervals between continuous three data storages including current trigger data storage of the user are all smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are all smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule;
and thirdly, when the time interval between the current trigger data storage and the continuous three data storage of the user is smaller than the first time interval threshold value at least once, determining that the current data storage carries out data division according to the data division rule II through the dispersion submodule III.
The operation process of the calling module comprises the following steps:
step 1, triggering a data reading request on an intelligent television by a user through a request triggering module;
step 2, adopting a confirmation module to control the intelligent television to call a storage mark corresponding to user request data after receiving a reading request of data triggered by a user, and requesting key confirmation from the user by an interception system of the intelligent television;
step 3, controlling the smart television to acquire a mark corresponding to user request data and smart equipment corresponding to the user request data and stored at the time through an information acquisition module, prompting a user to start the smart equipment if the corresponding smart equipment is in a closed state, and acquiring fixed information of each smart equipment corresponding to data fragments stored with data through a home local area network;
step 4, a decryption key acquisition module is adopted to control the smart television to hash the fixed information by using an SM3 algorithm to obtain a digest value H, the H is signed by using private keys of the smart devices to obtain a 32-byte signature value S, and the first 16 bytes and the second 16 bytes of the S are subjected to exclusive-or operation to obtain a data decryption private key;
and 5, reading the intelligent ciphertext information corresponding to the data fragments stored with the data through the original text acquisition module, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
The effect of the above technical scheme is as follows: the user information in the smart television is interconnected and communicated through the home local area internet, data such as bank card information and shopping information of a user who performs television shopping are dispersedly stored in each physical medium according to a certain rule during storage, and are assembled and gathered during use, so that even if the android system is unsafe, the data stored in each medium are incomplete data, and the data cannot be leaked even if the data are stolen. The safety and the reliability of data stored in the household equipment are effectively improved, and the user information is effectively prevented from being stolen and leaked.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (10)
1. A method of decentralized data protection, the method comprising:
the method comprises the following steps that a user triggers a storage requirement on the smart television to store data, and the smart television dispersedly stores data required to be stored by the user in each smart household appliance according to a data dispersion rule;
when the user calls the stored data, the intelligent television acquires the data stored in each intelligent household appliance, and assembles and summarizes the data to form complete data for the user.
2. The method of claim 1, wherein the user triggers a storage requirement on the smart tv for data storage, and the smart tv dispersedly stores the data required by the user in each smart home device according to a data dispersion rule, including:
a user triggers the storage requirement of data on the smart television;
after the intelligent television receives a storage requirement triggered by a user, an interception system of the intelligent television drives a data writing function and takes over, and meanwhile, device public and private keys Pubkey and private key are generated;
the data to be written in by the intelligent television are scattered into a plurality of data fragments according to a data scattering rule;
the intelligent television acquires fixed information of each intelligent device in a home through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the intelligent television respectively and independently encrypts the multiple data fragments by using keys corresponding to the intelligent equipment to obtain ciphertexts corresponding to the intelligent equipment;
and writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish the distributed encryption storage.
3. The method of claim 1 or 2, wherein the user-desired stored data comprises: the system comprises a user telephone number, a user name, bank card information and shopping information; the data required to be stored by the user is divided in the following dividing mode:
the first division mode: dividing according to the data stream of the data required to be stored by the user, and directly dividing according to the data stream without analyzing the data information in the data stream of the data required to be stored by the user; encrypting the data to obtain a ciphertext M, and dividing or extracting the ciphertext M equally;
the second division mode: carrying out data information segmentation according to a data dispersion rule, wherein the data dispersion rule comprises the following steps: a first data scattering rule and a second data scattering rule.
4. The method of claim 3, wherein the rule contents of the first data scattering rule and the second data scattering rule comprise;
the data dispersion rule one: dividing the telephone number of the user into four groups of number data according to the telephone number sequence 2+3+3+3, and respectively marking the four groups of number data as A1, A2, A3 and A4; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; trisecting the bank card number according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2 and C3; taking the number of the remaining digits after trisection according to the number of the digits of the bank card number as a fourth group of data C4, and if the number of the remaining digits after trisection of the number of the digits of the bank card number is 0, defaulting the fourth group of data to 0000 and marking the fourth group of data as C4; dividing shopping information into four data groups according to shopping order generation time, shopping commodity information, mailing address information and order amount information, and sequentially marking each data group as D1, D2, D3 and D4;
combining data A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4 and D1, D2, D3 and D4 according to the principle of consistent numerical labels to form a first group of data A1+ B1+ C1+ D1, a second group of data A2+ B2+ C2+ D2, a third group of data A3+ B3+ C3+ D3 and a fourth group of data A4+ B4+ C4+ D4;
the second data dispersion rule: dividing the user telephone number into six groups of number data according to the telephone number sequence 2+2+1+3+2+1, and respectively marking the number data as A1, A2, A3, A4, A5 and A6; dividing a user name according to a surname and first name mode, acquiring pinyin data and Chinese character data corresponding to the form and the first name, marking the pinyin data of the surname as B1, the Chinese character data of the surname as B2, the pinyin data of the first name as B3 and the Chinese character data of the first name as B4; dividing the bank card number into five equal parts according to the number of the bank card number digits to obtain three groups of digit number groups which are marked as C1, C2, C3, C4 and C5; taking the number of the rest digits after five equal divisions according to the number of the bank card number digits as sixth array data C6, and if the number of the rest digits after five equal divisions according to the number of the bank card number digits is 0, defaulting the sixth array data to 0101 and marking the sixth array data as C6; dividing the shopping information into three data groups according to the shopping order generation time, the shopping commodity information and the order amount information, sequentially marking each data group as D1, D2 and D3, and then taking the province, city, district and county information in the mailing address information as a fourth information group and marking the information as D4; taking the street cell number information in the mailing address information as a fifth information group and marking as D5;
six data sets were formed as follows: the data processing method comprises the steps of firstly processing a first group of data A1+ B1+ C1+ D1, secondly processing a2+ B2+ C2+ D2, thirdly processing A3+ B3+ C3+ D3, fourthly processing a4+ B4+ C4+ D4, fifthly processing A5+ C5+ D5 and sixthly processing a6+ C6.
5. The method according to claim 2, wherein the smart tv disperses the data to be written into a plurality of data fragments according to a data dispersion rule, including:
when a user stores data by using the smart television for the first time and the second time, data are divided by adopting a first data dispersion rule;
when a user uses the smart television to perform third data storage and perform subsequent data storage each time, judging whether time intervals between continuous three data storages including current trigger data storage of the user are smaller than a second time interval threshold, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold and larger than a first time interval threshold, performing data division on the current data storage according to a first data dispersion rule, wherein the first time interval threshold and the second time interval threshold are obtained through the following formula:
wherein, T1Representing a first time interval threshold value, wherein n represents the total shopping times of television shopping by a user by utilizing the intelligent television; t isiRepresenting a time interval between the ith TV purchase and the last TV purchase; t ismaxRepresents the maximum time interval between television purchases; t isminRepresents a minimum time interval between television purchases; cgRepresenting the number of times that the user performs TV shopping and triggers data storage; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; k represents that in the TV shopping time interval, the TV shopping time intervals are arranged from small to large to form a time interval array, the number of the first k minimum time intervals in the time interval array is 3 or 5; t isminjRepresents the jth time interval of the first k minimum time intervals; when n < 3 or n < 5, k is n, and Tminj=Ti(ii) a Alpha represents a first time adjustment coefficient, and the value range of alpha is 1.81-1.97;
wherein, T2Represents a second time interval threshold; hwIndicating the number of days that the user has not made a TV purchase, HgIndicating the number of days that the user has made a TV purchase, CgIndicating that the user is making a television purchase andthe number of times of triggering data storage is carried out; cwThe number of times that the user performs TV shopping but does not trigger storage of related data is shown, and particularly, when the user triggers storage every TV shopping, the order C is setw1.3; m represents the TV shopping time intervals, the TV shopping time intervals are arranged from small to large to form a time interval array, and the number of m maximum time intervals in the time interval array is 3 or 5; t ismaxtRepresents the t-th time interval of the m maximum time intervals; when n < 3 or n < 5, m is n, and Tmaxj=Ti(ii) a Beta represents a second time adjustment coefficient, and the value range of beta is 1.65-1.77;
and when the time interval between the three consecutive data storages including the current trigger data storage is smaller than the first time interval threshold value at least once by the user, dividing the data of the current data storage according to the second data dispersion rule.
6. The method of claim 1, wherein when the user invokes the stored data, the smart television acquires the data stored in each smart home appliance, performs data splicing and summarization to form complete data, and provides the complete data to the user, and the method comprises the following steps:
a user triggers a data reading request on the smart television;
after receiving a reading request of data triggered by a user, the intelligent television calls a storage mark corresponding to the user request data, and an interception system of the intelligent television requests key confirmation to the user;
the user uses a remote controller of the smart television to confirm the key;
the intelligent television acquires a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the time, if the corresponding intelligent equipment is in a closed state, the intelligent television prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to data fragments storing the data is acquired through a home local area network;
the smart television hashes the fixed information by using an SM3 algorithm to obtain an abstract value H, signs the H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtains a data decryption private key by performing exclusive or operation on the first 16 bytes and the second 16 bytes of the S;
and reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
7. A decentralized data protection system, characterized in that said system comprises:
the storage module is used for triggering storage requirements on the smart television by a user to store data, and the smart television dispersedly stores the data required to be stored by the user in each intelligent household appliance according to a data dispersion rule;
and the calling module is used for acquiring the data stored in each intelligent household appliance by the intelligent television when the user calls the stored data, and assembling and summarizing the data to form complete data for the user.
8. The system of claim 7, wherein the storage module comprises:
the triggering module is used for triggering the storage requirement of data on the intelligent television by a user;
the write-in module is used for driving a data write-in function and taking over the data write-in function by an interception system of the intelligent television after the intelligent television receives a storage requirement triggered by a user, and generating device public and private keys Pubkey and private key at the same time;
the dispersion module is used for dispersing data to be written into the smart television into a plurality of data fragments according to a data dispersion rule;
the acquisition module is used for acquiring the fixed information of each intelligent device in a family by the intelligent television through a family local area network;
the key acquisition module is used for the intelligent television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the intelligent devices to obtain a 32-byte signature value S, and obtain a data encryption private key by carrying out XOR operation on the first 16 bytes and the second 16 bytes of the S;
the encryption module is used for encrypting the multiple data fragments respectively and independently by using keys corresponding to the intelligent equipment by the intelligent television to obtain ciphertexts corresponding to the intelligent equipment;
and the distributed storage module is used for writing the ciphertext corresponding to each intelligent device into each corresponding intelligent device to finish distributed encryption storage.
9. The system of claim 8, wherein the dispersion module comprises:
the first dispersing submodule is used for dividing data by adopting a first data dispersing rule when a user stores data by using the intelligent television for the first time and the second time;
the second dispersing submodule is used for judging whether time intervals of the user between continuous three data storages including the current trigger data storage are smaller than a second time interval threshold value or not when the user utilizes the intelligent television to perform the third data storage and perform the subsequent data storage each time, and when the time intervals between the continuous three data storages are smaller than the second time interval threshold value and larger than the first time interval threshold value, performing data division on the current data storage according to the first data dispersing rule;
and the dispersion submodule III is used for dividing the data of the current data storage according to the data dispersion rule II when the time interval between the continuous three data storages including the current trigger data storage is smaller than the first time interval threshold value at least once.
10. The method of claim 1, wherein the retrieving module comprises:
the request triggering module is used for triggering a data reading request on the intelligent television by a user;
the confirmation module is used for calling a storage mark corresponding to user request data after the intelligent television receives a reading request of data triggered by a user, and an interception system of the intelligent television requests key confirmation to the user;
the information acquisition module is used for the intelligent television to acquire a mark corresponding to user request data and intelligent equipment corresponding to the user request data and stored at the moment, if the corresponding intelligent equipment is in a closed state, the information acquisition module prompts a user to start the intelligent equipment, and fixed information of each intelligent equipment corresponding to the data fragment stored with the data is acquired through a home local area network;
the decryption key acquisition module is used for the smart television to hash the fixed information by using an SM3 algorithm to obtain an abstract value H, sign H by using private keys of the smart devices to obtain a 32-byte signature value S, and obtain a data decryption private key by performing exclusive or operation on the first 16 bytes and the last 16 bytes of the S;
and the original text acquisition module is used for reading the intelligent ciphertext information corresponding to the data fragments stored with the data, decrypting the ciphertext information through a decryption private key, and splicing the decrypted fragment information according to a data dispersion rule to obtain the original text data of the data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110488345.6A CN113204786B (en) | 2021-05-06 | 2021-05-06 | Data protection method and system for going to center |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110488345.6A CN113204786B (en) | 2021-05-06 | 2021-05-06 | Data protection method and system for going to center |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113204786A true CN113204786A (en) | 2021-08-03 |
CN113204786B CN113204786B (en) | 2021-12-14 |
Family
ID=77028498
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110488345.6A Active CN113204786B (en) | 2021-05-06 | 2021-05-06 | Data protection method and system for going to center |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113204786B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113959476A (en) * | 2021-12-22 | 2022-01-21 | 北京为准智能科技有限公司 | Intelligent instrument and meter verification system and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009157774A (en) * | 2007-12-27 | 2009-07-16 | Ntt Data Corp | Apparatus and program for supporting audio documentation |
CN102143232A (en) * | 2011-04-02 | 2011-08-03 | 南京邮电大学 | Peer-to-peer network based digital copyright protection method |
JP2013131105A (en) * | 2011-12-22 | 2013-07-04 | Japan Research Institute Ltd | Information transfer system and information transfer method |
CN105373735A (en) * | 2014-08-15 | 2016-03-02 | 王基旆 | Computer system with account password dispersed storage anti-logging function |
CN110244573A (en) * | 2019-06-27 | 2019-09-17 | 深圳市星际无限科技有限公司 | Storage system and intelligent appliance based on intelligent appliance |
CN110990846A (en) * | 2019-11-15 | 2020-04-10 | 北京连山时代科技有限公司 | Information storage method, device and computer readable storage medium |
CN111917720A (en) * | 2020-06-28 | 2020-11-10 | 中科物缘科技(杭州)有限公司 | File fragmentization encryption storage method, file fragmentization encryption acquisition method and file fragmentization encryption storage system based on block chain |
-
2021
- 2021-05-06 CN CN202110488345.6A patent/CN113204786B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009157774A (en) * | 2007-12-27 | 2009-07-16 | Ntt Data Corp | Apparatus and program for supporting audio documentation |
CN102143232A (en) * | 2011-04-02 | 2011-08-03 | 南京邮电大学 | Peer-to-peer network based digital copyright protection method |
JP2013131105A (en) * | 2011-12-22 | 2013-07-04 | Japan Research Institute Ltd | Information transfer system and information transfer method |
CN105373735A (en) * | 2014-08-15 | 2016-03-02 | 王基旆 | Computer system with account password dispersed storage anti-logging function |
CN110244573A (en) * | 2019-06-27 | 2019-09-17 | 深圳市星际无限科技有限公司 | Storage system and intelligent appliance based on intelligent appliance |
CN110990846A (en) * | 2019-11-15 | 2020-04-10 | 北京连山时代科技有限公司 | Information storage method, device and computer readable storage medium |
CN111917720A (en) * | 2020-06-28 | 2020-11-10 | 中科物缘科技(杭州)有限公司 | File fragmentization encryption storage method, file fragmentization encryption acquisition method and file fragmentization encryption storage system based on block chain |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113959476A (en) * | 2021-12-22 | 2022-01-21 | 北京为准智能科技有限公司 | Intelligent instrument and meter verification system and method |
CN113959476B (en) * | 2021-12-22 | 2022-02-25 | 北京为准智能科技有限公司 | Intelligent instrument and meter verification system and method |
Also Published As
Publication number | Publication date |
---|---|
CN113204786B (en) | 2021-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11658814B2 (en) | System and method for encryption and decryption based on quantum key distribution | |
US20220027515A1 (en) | Decentralized Token Table Generation | |
CN101196855B (en) | Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method | |
CN112751855B (en) | Cross-browser user data security management system based on encryption technology | |
CN107257350B (en) | Offline authentication or payment method of wearable equipment | |
CN101149768B (en) | Special processor software encryption and decryption method | |
CN104992119B (en) | A kind of safe transmission method and system of sensitive information Anti-theft | |
CN102138300A (en) | Message authentication code pre-computation with applications to secure memory | |
CN1985466A (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |
CN105117635A (en) | Local data security protection system and method | |
CN1936870A (en) | Hard-disc fan-area data enciphering and deciphering method and system | |
CN104732159A (en) | File processing method and file processing device | |
CN104484628B (en) | It is a kind of that there is the multi-application smart card of encrypting and decrypting | |
CN113204786B (en) | Data protection method and system for going to center | |
CN101887713A (en) | Encryption method and device for font library | |
CN115694799A (en) | Communication data encryption method based on quantum key | |
CN101945246A (en) | Method, device and equipment for authenticating passwords | |
CN114760052A (en) | Bank Internet of things platform key generation method and device, electronic equipment and medium | |
CN102938762A (en) | File safety management system based on mobile terminal | |
CN112311536B (en) | Key hierarchical management method and system | |
WO2020077626A1 (en) | Method and device for recognizing finger vein information | |
CN102480353A (en) | Method of password authentication and secret key protection | |
CN104252604B (en) | Database based building block system type dynamic encryption method | |
CN2824442Y (en) | Finger print identifier for electronic signing mane | |
CN115766244A (en) | Internet of vehicles information encryption method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |