CN114221792A - Internet data transmission encryption system - Google Patents

Internet data transmission encryption system Download PDF

Info

Publication number
CN114221792A
CN114221792A CN202111394399.2A CN202111394399A CN114221792A CN 114221792 A CN114221792 A CN 114221792A CN 202111394399 A CN202111394399 A CN 202111394399A CN 114221792 A CN114221792 A CN 114221792A
Authority
CN
China
Prior art keywords
group
field
standard
fields
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111394399.2A
Other languages
Chinese (zh)
Other versions
CN114221792B (en
Inventor
徐赟
常译文
李传智
鲍新宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tiankuan Technology Co ltd
Original Assignee
Hangzhou Tiankuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tiankuan Technology Co ltd filed Critical Hangzhou Tiankuan Technology Co ltd
Priority to CN202111394399.2A priority Critical patent/CN114221792B/en
Publication of CN114221792A publication Critical patent/CN114221792A/en
Application granted granted Critical
Publication of CN114221792B publication Critical patent/CN114221792B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/10Secret communication by using two signals transmitted simultaneously or successively
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an internet data transmission encryption system, which comprises a sending end, a receiving end and a data transmission system, wherein the sending end is used for obtaining data to be sent, and performing secret code extraction on the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields; then, according to the number value, the compliance field is added to the standard group field; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit. The data can be subjected to surface encryption processing, and the encrypted data conforms to conventional understanding logic, so that when the data is stolen, the meaning cannot be clear, and the data acquired by the data cannot be known to be encrypted; the invention is simple, effective and easy to use.

Description

Internet data transmission encryption system
Technical Field
The invention belongs to the field of data encryption, relates to an encryption transmission technology, and particularly relates to an internet data transmission encryption system.
Background
The patent with publication number CN111490980A discloses an industrial internet data transmission encryption method, which specifically comprises the following steps: s1, performing data identification on all data to be transmitted from the industrial Internet data transmission center by the data identification module, acquiring key importance transmission data by the key data acquisition module, and acquiring the rest other transmission data by other data acquisition modules; s2, according to the step S1, the acquired key transmission data are integrated through a data integration module, and the invention relates to the technical field of data security. The industrial internet data transmission encryption method can divide data to be transmitted by an industrial internet data transmission center, and encryption methods of different grades and modes are used for key important data and other common data, and the two encryption modes are combined, so that the transmitted data has high safety and timeliness, and the problems of data analysis and slow transmission speed are avoided.
However, the encryption technology is too simple, a reasonable plaintext password cannot be formed for a file, and a person who steals data cannot clearly know whether the data is encrypted.
Disclosure of Invention
The invention aims to provide an internet data transmission encryption system.
The purpose of the invention can be realized by the following technical scheme:
an internet data transmission encryption system comprises a sending end, a data transfer unit and a receiving end;
the sending terminal is used for acquiring data to be sent and extracting ciphers of the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields;
adding the compliance field to the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
Further, the sending end comprises a data acquisition unit, a secret code extraction unit, a plaintext compiling unit and a data integration unit;
the data acquisition unit is used for acquiring data to be transmitted, the data to be transmitted is text data, the data acquisition unit is used for transmitting the data to be transmitted to the secret code extraction unit, and the secret code extraction unit is used for receiving the data to be transmitted by the data acquisition unit and extracting the secret codes of the data to be transmitted to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields;
the cipher extraction unit is used for transmitting the standard group field, the standard split group field and the number values corresponding to the standard split group field to the data integration unit and the plaintext compiling unit;
the plaintext compiling unit receives the standard group field, the standard burst group field and the number value corresponding to the standard burst group field transmitted by the password extracting unit, and is used for carrying out plaintext compiling operation on the standard group field and the standard burst group field to obtain all the standard group fields and the compliance fields, the standard burst group fields and the burst adding fields corresponding to the standard group fields;
the plaintext compiling unit is used for transmitting all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields to the data integration unit;
the data integration unit is used for adding the compliance field into the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
Further, the password extraction step is specifically as follows:
the method comprises the following steps: acquiring corresponding data to be sent;
step two: directly acquiring the number of characters of a file name of data to be sent, and marking a numerical value corresponding to the acquired number of characters as a dark fraction value;
step three: then acquiring the file size of corresponding data to be sent, taking an integer value of the file size, and marking the obtained value as a storage value;
step four: and then calculating the dark special value by using a formula, wherein the specific calculation formula is as follows:
a dark-specific value of Qgw { dark point value/occupancy value } + 1;
qgw {. }, which is the number of digits in parentheses;
step five: and then obtaining a dark special value, and intercepting the data to be sent according to the specific numerical value of the dark special value to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard split group fields.
Further, the intercepting process in the fifth step specifically comprises the following steps:
s1: firstly, acquiring data to be transmitted, and counting characters from a first character to a corresponding dark special value in sequence to obtain a first group of selected candidate group fields;
s2: acquiring a candidate group field, judging the candidate group field, and marking the candidate group field as a standard group field if the end of the candidate group field or the last character is a punctuation mark;
otherwise, marking the corresponding candidate group field as a standard split group field;
s3: and obtaining a plurality of standard group fields and standard split group fields, and sequencing the standard group fields and the standard split group fields according to the sequence of the corresponding data to be sent to obtain a plurality of standard group fields and standard split group fields and corresponding number values of the standard group fields and the standard split group fields.
Further, the plaintext compiling operation is specifically performed in the following manner:
SS 1: acquiring all standard group fields;
SS 2: selecting the standard group field with the most front number value according to the number value;
SS 3: then marking the corresponding standard group field as a target field;
SS 4: matching on the Internet according to the content of the target field to obtain a compliance field; the specific matching mode is as follows:
searching the content same as the target field, marking the content as the same field, acquiring all online contents with the same field, and directly acquiring target section information corresponding to the same field in the online contents, wherein the target section information is the next section of online contents, and the next section of online contents are separated by taking punctuation marks as boundaries;
obtaining a plurality of pieces of target segment information, removing the target segment information which is the same as the next segment of the target field in the data to be sent, randomly selecting one piece of target segment information from the rest target segment information, marking the target segment information as a compliance field, replacing the last punctuation mark of the compliance field with a specified identifier which is preset by a manager and is different from all other symbols;
SS 5: marking the number value corresponding to the target field on the compliance field;
SS 6: then selecting the standard group field with the number value ranking as the next one, and repeating the steps SS3-SS6 to obtain compliance fields corresponding to all the standard group fields;
SS 7: acquiring all standard fracture group fields;
SS 8: selecting the most front field according to the number value of the field of the punctuation mark, marking the field as the selected field, and obtaining the front section group of the selected field, wherein the front section group is selected from the last character until the punctuation mark is met, and the selection is stopped to obtain the front section group;
SS 9: acquiring subsequent content of a front section group of data to be transmitted, selecting the subsequent content from a first character until a punctuation mark is encountered, and acquiring a rear section group;
SS 10: acquiring a front section group and a rear section group, and searching all contents in the Internet to acquire composite information;
SS 11: and sequentially selecting the next selected field according to the number value of the split group field, and repeating the steps SS9-SS11 to obtain the split added fields corresponding to all the selected fields and the number values thereof.
Further, the selection of the composite information in step SS10 is as follows:
searching a sentence in the Internet, wherein the sentence simultaneously comprises the contents of a front section group and a rear section group, and at least more than two character intervals are ensured to exist between the front section group and the rear section group; marking the content between the retrieved front section group and the retrieved back section group as a split adding field;
if the split added field can not be searched, searching is only carried out according to the content of the front section group to obtain the split added field required by the symbol; and adding the corresponding number value to the split added field, and replacing the last punctuation mark of the split added field with a designated identifier, wherein the designated identifier is preset by a manager and is different from all other symbols.
Further, the receiving end comprises a decoding unit;
the decoding unit at the receiving end is used for decoding the encrypted data, and the encryption mode of the encrypted data by the decoding unit is decryption according to the reverse rule of encryption.
Further, the decoding unit exists only on a specified device that the administrator acknowledges;
the reverse rule is that firstly, a dark special value is calculated, then a first sentence in first data to be sent is locked according to the dark special value, and then the content which is selected till the appointed identifier is removed; and then selecting the content corresponding to the dark special value, deleting the content in sequence, restoring the encrypted data to obtain decryption information, and presenting the decryption information to a user.
The invention has the beneficial effects that:
the method comprises the steps that data to be sent are obtained through a sending end, and secret code extraction is carried out on the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields; then, according to the number value, the compliance field is added to the standard group field; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
The data can be subjected to surface encryption processing, and the encrypted data conforms to conventional understanding logic, so that when the data is stolen, the meaning cannot be clear, and the data acquired by the data cannot be known to be encrypted; the invention is simple, effective and easy to use.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, an internet data transmission encryption system includes a sending end, a data transfer unit, and a receiving end;
the sending end comprises a data acquisition unit, a secret code extraction unit, a plaintext compiling unit and a data integration unit;
the receiving end comprises a decoding unit;
the data acquisition unit is used for acquiring data to be transmitted, the data to be transmitted is text data, the data acquisition unit is used for transmitting the data to be transmitted to the secret code extraction unit, the secret code extraction unit receives the data to be transmitted by the data acquisition unit and extracts the secret code, and the secret code extraction step specifically comprises the following steps:
the method comprises the following steps: acquiring corresponding data to be sent;
step two: directly acquiring the number of characters of a file name of data to be sent, and marking a numerical value corresponding to the acquired number of characters as a dark fraction value;
step three: then acquiring the file size of corresponding data to be sent, taking an integer value of the file size, and marking the obtained value as a storage value;
step four: and then calculating the dark special value by using a formula, wherein the specific calculation formula is as follows:
a dark-specific value of Qgw { dark point value/occupancy value } + 1;
qgw {. }, which is the number of digits in parentheses;
step five: then obtaining a dark special value, and intercepting the data to be sent according to the specific value of the dark special value, wherein the intercepting comprises the following specific steps:
s1: firstly, acquiring data to be transmitted, and counting characters from a first character to a corresponding dark special value in sequence to obtain a first group of selected candidate group fields; the characters selected here include punctuation marks and all other symbols;
s2: acquiring a candidate group field, judging the candidate group field, and marking the candidate group field as a standard group field if the end of the candidate group field or the last character is a punctuation mark;
otherwise, marking the corresponding candidate group field as a standard split group field;
s3: obtaining a plurality of standard group fields and standard crack group fields, and sequencing the standard group fields and the standard crack group fields according to the sequence of the corresponding data to be sent to obtain a plurality of standard group fields and standard crack group fields and number values corresponding to the standard group fields and the standard crack group fields;
the cipher extraction unit is used for transmitting the standard group field, the standard split group field and the number values corresponding to the standard split group field to the data integration unit and the plaintext compiling unit;
the plaintext compiling unit receives the standard group field, the standard burst group field and the number value corresponding to the standard group field and the standard burst group field transmitted by the cipher extracting unit, and is used for carrying out plaintext compiling operation on the standard group field and the standard burst group field, wherein the plaintext compiling operation is specifically as follows:
SS 1: acquiring all standard group fields;
SS 2: selecting the standard group field with the most front number value according to the number value;
SS 3: then marking the corresponding standard group field as a target field;
SS 4: matching on the Internet according to the content of the target field to obtain a compliance field; the specific matching mode is as follows:
searching the content same as the target field, marking the content as the same field, and acquiring all online contents with the same field, wherein the online contents can be articles or other Internet contents, and directly acquiring target section information corresponding to the same field in the online contents, wherein the target section information is the next section of the online contents, and the next section of the online contents is separated by using punctuation marks as boundaries;
obtaining a plurality of pieces of target segment information, removing the target segment information which is the same as the next segment of the target field in the data to be sent, randomly selecting one piece of target segment information from the rest target segment information, marking the target segment information as a compliance field, replacing the last punctuation mark of the compliance field with a specified identifier which is preset by a manager and is different from all other symbols;
SS 5: marking the number value corresponding to the target field on the compliance field;
SS 6: then selecting the standard group field with the number value ranking as the next one, and repeating the steps SS3-SS6 to obtain compliance fields corresponding to all the standard group fields;
SS 7: acquiring all standard fracture group fields;
SS 8: selecting the most front field according to the number value of the field of the punctuation mark, marking the field as the selected field, and obtaining the front section group of the selected field, wherein the front section group is selected from the last character until the punctuation mark is met, and the selection is stopped to obtain the front section group;
SS 9: acquiring subsequent content of a front section group of data to be transmitted, selecting the subsequent content from a first character until a punctuation mark is encountered, and acquiring a rear section group;
SS 10: acquiring a front section group and a rear section group, and searching all contents in the Internet to acquire composite information; the composite information selection mode is as follows:
searching a sentence in the Internet, wherein the sentence simultaneously comprises the contents of a front section group and a rear section group, and at least more than two character intervals are ensured to exist between the front section group and the rear section group; marking the content between the retrieved front section group and the retrieved back section group as a split adding field;
if the split added field can not be searched, searching is only carried out according to the content of the front section group to obtain the split added field required by the symbol; adding the corresponding number value to the split added field, and replacing the last punctuation mark of the split added field with a designated identifier, wherein the designated identifier is preset by a manager and is different from all other symbols;
SS 11: sequentially selecting the next selected field according to the number value of the split group field, and repeating the steps SS9-SS11 to obtain split added fields corresponding to all the selected fields and the number values thereof;
the plaintext compiling unit is used for transmitting all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields to the data integration unit;
the data integration unit is used for adding the compliance field into the standard group field according to the number value; after the fragmentation field is added to the standard fragmentation group field, the encrypted data is obtained through fusion, and the encrypted data is transmitted to a receiving end through a data transfer unit;
the decoding unit at the receiving end is used for decoding the encrypted data, and the decoding unit only exists on the specified equipment acknowledged by the administrator; the decoding unit encrypts the encrypted data in a mode of firstly calculating a dark special value according to an encrypted reverse rule, then locking a first sentence in first data to be sent according to the dark special value, and then removing the content which is selected until a specified identifier; and then selecting the content corresponding to the dark special value, deleting the content in sequence, restoring the encrypted data to obtain decryption information, and presenting the decryption information to a user.
In the steps SS10 and SS4, if the content required by the symbol cannot be retrieved for one section, performing word segmentation processing on the corresponding front section group and the target field, and retrieving the last word as the target word to obtain the content meeting the requirement;
the foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (8)

1. An internet data transmission encryption system is characterized by comprising a sending end, a data transfer unit and a receiving end;
the sending terminal is used for acquiring data to be sent and extracting ciphers of the data to be sent to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields; then, carrying out plaintext compiling operation on the standard group field and the standard split group field to obtain all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields;
adding the compliance field to the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
2. The internet data transmission encryption system of claim 1, wherein the sending end comprises a data acquisition unit, a secret code extraction unit, a plaintext compilation unit and a data integration unit;
the data acquisition unit is used for acquiring data to be transmitted, the data to be transmitted is text data, the data acquisition unit is used for transmitting the data to be transmitted to the secret code extraction unit, and the secret code extraction unit is used for receiving the data to be transmitted by the data acquisition unit and extracting the secret codes of the data to be transmitted to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard group fields and the standard split group fields;
the cipher extraction unit is used for transmitting the standard group field, the standard split group field and the number values corresponding to the standard split group field to the data integration unit and the plaintext compiling unit;
the plaintext compiling unit receives the standard group field, the standard burst group field and the number value corresponding to the standard burst group field transmitted by the password extracting unit, and is used for carrying out plaintext compiling operation on the standard group field and the standard burst group field to obtain all the standard group fields and the compliance fields, the standard burst group fields and the burst adding fields corresponding to the standard group fields;
the plaintext compiling unit is used for transmitting all the standard group fields and the corresponding compliance fields, the standard split group fields and the corresponding split addition fields to the data integration unit;
the data integration unit is used for adding the compliance field into the standard group field according to the number value; and after the split adding field is added to the mark split group field, fusing to obtain encrypted data, and transmitting the encrypted data to a receiving end through a data transfer unit.
3. The internet data transmission encryption system of claim 2, wherein the password extraction step is specifically as follows:
the method comprises the following steps: acquiring corresponding data to be sent;
step two: directly acquiring the number of characters of a file name of data to be sent, and marking a numerical value corresponding to the acquired number of characters as a dark fraction value;
step three: then acquiring the file size of corresponding data to be sent, taking an integer value of the file size, and marking the obtained value as a storage value;
step four: and then calculating the dark special value by using a formula, wherein the specific calculation formula is as follows:
a dark-specific value of Qgw { dark point value/occupancy value } + 1;
qgw {. }, which is the number of digits in parentheses;
step five: and then obtaining a dark special value, and intercepting the data to be sent according to the specific numerical value of the dark special value to obtain a plurality of standard group fields, standard split group fields and number values corresponding to the standard split group fields.
4. The internet data transmission encryption system of claim 3, wherein the intercepting process in the fifth step comprises the following specific steps:
s1: firstly, acquiring data to be transmitted, and counting characters from a first character to a corresponding dark special value in sequence to obtain a first group of selected candidate group fields;
s2: acquiring a candidate group field, judging the candidate group field, and marking the candidate group field as a standard group field if the end of the candidate group field or the last character is a punctuation mark;
otherwise, marking the corresponding candidate group field as a standard split group field;
s3: and obtaining a plurality of standard group fields and standard split group fields, and sequencing the standard group fields and the standard split group fields according to the sequence of the corresponding data to be sent to obtain a plurality of standard group fields and standard split group fields and corresponding number values of the standard group fields and the standard split group fields.
5. The internet data transmission encryption system of claim 2, wherein the plaintext compilation operation is performed in a manner that:
SS 1: acquiring all standard group fields;
SS 2: selecting the standard group field with the most front number value according to the number value;
SS 3: then marking the corresponding standard group field as a target field;
SS 4: matching on the Internet according to the content of the target field to obtain a compliance field; the specific matching mode is as follows:
searching the content same as the target field, marking the content as the same field, acquiring all online contents with the same field, and directly acquiring target section information corresponding to the same field in the online contents, wherein the target section information is the next section of online contents, and the next section of online contents are separated by taking punctuation marks as boundaries;
obtaining a plurality of pieces of target segment information, removing the target segment information which is the same as the next segment of the target field in the data to be sent, randomly selecting one piece of target segment information from the rest target segment information, marking the target segment information as a compliance field, replacing the last punctuation mark of the compliance field with a specified identifier which is preset by a manager and is different from all other symbols;
SS 5: marking the number value corresponding to the target field on the compliance field;
SS 6: then selecting the standard group field with the number value ranking as the next one, and repeating the steps SS3-SS6 to obtain compliance fields corresponding to all the standard group fields;
SS 7: acquiring all standard fracture group fields;
SS 8: selecting the most front field according to the number value of the field of the punctuation mark, marking the field as the selected field, and obtaining the front section group of the selected field, wherein the front section group is selected from the last character until the punctuation mark is met, and the selection is stopped to obtain the front section group;
SS 9: acquiring subsequent content of a front section group of data to be transmitted, selecting the subsequent content from a first character until a punctuation mark is encountered, and acquiring a rear section group;
SS 10: acquiring a front section group and a rear section group, and searching all contents in the Internet to acquire composite information;
SS 11: and sequentially selecting the next selected field according to the number value of the split group field, and repeating the steps SS9-SS11 to obtain the split added fields corresponding to all the selected fields and the number values thereof.
6. The encryption system for internet data transmission according to claim 5, wherein the composite information is selected in the step SS10 as follows:
searching a sentence in the Internet, wherein the sentence simultaneously comprises the contents of a front section group and a rear section group, and at least more than two character intervals are ensured to exist between the front section group and the rear section group; marking the content between the retrieved front section group and the retrieved back section group as a split adding field;
if the split added field can not be searched, searching is only carried out according to the content of the front section group to obtain the split added field required by the symbol; and adding the corresponding number value to the split added field, and replacing the last punctuation mark of the split added field with a designated identifier, wherein the designated identifier is preset by a manager and is different from all other symbols.
7. The system of claim 1, wherein the receiving end comprises a decoding unit;
the decoding unit at the receiving end is used for decoding the encrypted data, and the encryption mode of the encrypted data by the decoding unit is decryption according to the reverse rule of encryption.
8. An internet data transmission encryption system according to claim 7, characterized in that the decoding unit exists only on a designated device which is recognized by an administrator;
the reverse rule is that firstly, a dark special value is calculated, then a first sentence in first data to be sent is locked according to the dark special value, and then the content which is selected till the appointed identifier is removed; and then selecting the content corresponding to the dark special value, deleting the content in sequence, restoring the encrypted data to obtain decryption information, and presenting the decryption information to a user.
CN202111394399.2A 2021-11-23 2021-11-23 Internet data transmission encryption system Active CN114221792B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111394399.2A CN114221792B (en) 2021-11-23 2021-11-23 Internet data transmission encryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111394399.2A CN114221792B (en) 2021-11-23 2021-11-23 Internet data transmission encryption system

Publications (2)

Publication Number Publication Date
CN114221792A true CN114221792A (en) 2022-03-22
CN114221792B CN114221792B (en) 2023-06-16

Family

ID=80697919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111394399.2A Active CN114221792B (en) 2021-11-23 2021-11-23 Internet data transmission encryption system

Country Status (1)

Country Link
CN (1) CN114221792B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114827226A (en) * 2022-06-30 2022-07-29 深圳市智联物联科技有限公司 Remote management method for industrial control equipment
CN114861204A (en) * 2022-05-06 2022-08-05 广州双知网络科技有限公司 Big data information safe storage encryption system

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120134492A1 (en) * 2010-11-29 2012-05-31 Hui Liu Data Encryption and Decryption Method and Apparatus
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN103684761A (en) * 2013-12-25 2014-03-26 广西宝恒电子科技有限公司 Coding and decoding method
CN104915610A (en) * 2015-06-15 2015-09-16 广州市久邦数码科技有限公司 Privacy picture implementation method and privacy picture implementation system
CN105591737A (en) * 2016-01-27 2016-05-18 浪潮(北京)电子信息产业有限公司 Data encryption, decryption and transmission methods and systems
CN106301763A (en) * 2016-08-31 2017-01-04 国家超级计算深圳中心(深圳云计算中心) A kind of data encryption based on double salt figure and decryption method and system
US20180307763A1 (en) * 2017-04-24 2018-10-25 Salesforce.Com, Inc. Filtering encrypted data using indexes
CN109005151A (en) * 2018-06-13 2018-12-14 四川斐讯信息技术有限公司 A kind of encryption of information, decryption processing method and processing terminal
CN109104278A (en) * 2018-09-14 2018-12-28 深圳市琦志航智能科技有限公司 A kind of encrypting and decrypting method
CN109861819A (en) * 2019-03-19 2019-06-07 天津中德应用技术大学 Based on the data ciphering method and decryption method for obscuring encryption block algorithm
CN110266682A (en) * 2019-06-18 2019-09-20 杭州情咖网络技术有限公司 Data ciphering method, device, mobile terminal and decryption method
CN110933063A (en) * 2019-11-25 2020-03-27 中国联合网络通信集团有限公司 Data encryption method, data decryption method and equipment
CN111131282A (en) * 2019-12-27 2020-05-08 武汉极意网络科技有限公司 Request encryption method and device, electronic equipment and storage medium
CN111404692A (en) * 2020-03-05 2020-07-10 湖南城市学院 Block chain identity information confirmation system and confirmation method based on big data
US20200244436A1 (en) * 2019-07-31 2020-07-30 Alibaba Group Holding Limited Ciphertext preprocessing and acquisition
CN111490980A (en) * 2020-03-30 2020-08-04 贵阳块数据城市建设有限公司 Industrial internet data transmission encryption method
WO2020155758A1 (en) * 2019-01-28 2020-08-06 平安科技(深圳)有限公司 Data encryption transmission control method and device, computer apparatus, and storage medium
CN111510281A (en) * 2020-06-29 2020-08-07 腾讯科技(深圳)有限公司 Homomorphic encryption method and device
CN113014580A (en) * 2021-02-24 2021-06-22 天津中新智冠信息技术有限公司 File transmission method and device, electronic equipment and storage medium
CN113129395A (en) * 2021-05-08 2021-07-16 深圳市数存科技有限公司 Data compression encryption system
CN113364760A (en) * 2021-06-01 2021-09-07 平安科技(深圳)有限公司 Data encryption processing method and device, computer equipment and storage medium
CN113541945A (en) * 2021-07-21 2021-10-22 安徽博格韦尔电气股份有限公司 Electronic information encryption transmission system

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120134492A1 (en) * 2010-11-29 2012-05-31 Hui Liu Data Encryption and Decryption Method and Apparatus
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN103684761A (en) * 2013-12-25 2014-03-26 广西宝恒电子科技有限公司 Coding and decoding method
CN104915610A (en) * 2015-06-15 2015-09-16 广州市久邦数码科技有限公司 Privacy picture implementation method and privacy picture implementation system
CN105591737A (en) * 2016-01-27 2016-05-18 浪潮(北京)电子信息产业有限公司 Data encryption, decryption and transmission methods and systems
CN106301763A (en) * 2016-08-31 2017-01-04 国家超级计算深圳中心(深圳云计算中心) A kind of data encryption based on double salt figure and decryption method and system
US20180307763A1 (en) * 2017-04-24 2018-10-25 Salesforce.Com, Inc. Filtering encrypted data using indexes
CN109005151A (en) * 2018-06-13 2018-12-14 四川斐讯信息技术有限公司 A kind of encryption of information, decryption processing method and processing terminal
CN109104278A (en) * 2018-09-14 2018-12-28 深圳市琦志航智能科技有限公司 A kind of encrypting and decrypting method
WO2020155758A1 (en) * 2019-01-28 2020-08-06 平安科技(深圳)有限公司 Data encryption transmission control method and device, computer apparatus, and storage medium
CN109861819A (en) * 2019-03-19 2019-06-07 天津中德应用技术大学 Based on the data ciphering method and decryption method for obscuring encryption block algorithm
CN110266682A (en) * 2019-06-18 2019-09-20 杭州情咖网络技术有限公司 Data ciphering method, device, mobile terminal and decryption method
US20200244436A1 (en) * 2019-07-31 2020-07-30 Alibaba Group Holding Limited Ciphertext preprocessing and acquisition
CN110933063A (en) * 2019-11-25 2020-03-27 中国联合网络通信集团有限公司 Data encryption method, data decryption method and equipment
CN111131282A (en) * 2019-12-27 2020-05-08 武汉极意网络科技有限公司 Request encryption method and device, electronic equipment and storage medium
CN111404692A (en) * 2020-03-05 2020-07-10 湖南城市学院 Block chain identity information confirmation system and confirmation method based on big data
CN111490980A (en) * 2020-03-30 2020-08-04 贵阳块数据城市建设有限公司 Industrial internet data transmission encryption method
CN111510281A (en) * 2020-06-29 2020-08-07 腾讯科技(深圳)有限公司 Homomorphic encryption method and device
CN113014580A (en) * 2021-02-24 2021-06-22 天津中新智冠信息技术有限公司 File transmission method and device, electronic equipment and storage medium
CN113129395A (en) * 2021-05-08 2021-07-16 深圳市数存科技有限公司 Data compression encryption system
CN113364760A (en) * 2021-06-01 2021-09-07 平安科技(深圳)有限公司 Data encryption processing method and device, computer equipment and storage medium
CN113541945A (en) * 2021-07-21 2021-10-22 安徽博格韦尔电气股份有限公司 Electronic information encryption transmission system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114861204A (en) * 2022-05-06 2022-08-05 广州双知网络科技有限公司 Big data information safe storage encryption system
CN114861204B (en) * 2022-05-06 2023-09-22 北京瀚博网络科技有限公司 Big data information safe storage encryption system
CN114827226A (en) * 2022-06-30 2022-07-29 深圳市智联物联科技有限公司 Remote management method for industrial control equipment

Also Published As

Publication number Publication date
CN114221792B (en) 2023-06-16

Similar Documents

Publication Publication Date Title
CN114221792A (en) Internet data transmission encryption system
CN111756522B (en) Data processing method and system
EP2624498B1 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
CN115688167B (en) Method, device and system for inquiring trace and storage medium
CN107885705B (en) Efficient and extensible safe document similarity calculation method and device
CN114500035B (en) Data encryption system based on service data sharing cloud platform
CN111666575B (en) Text carrier-free information hiding method based on word element coding
CN115695051A (en) Data center transmission management system based on remote network platform architecture
CN108932434B (en) Data encryption method and device based on machine learning technology
CN111027081A (en) Text carrierless information hiding method based on feature mapping
CN109816401A (en) A kind of product traceability and anti-counterfeiting system and method based on two dimensional code
CN113541945A (en) Electronic information encryption transmission system
CN117499553A (en) Data transmission management system for inspection work
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
CN114422230B (en) Information transmission system based on data encryption
CN105827404A (en) Identity authentication method, identity authentication device, and server
CN114221783B (en) Data selective encryption and decryption system
CN109547441A (en) A kind of method of latitude and longitude coordinates encryption
CN113315629B (en) Cloud storage and verification system for business passwords
Adithya et al. Deoxyribonucleic Acid (DNA) computing using Two-by-six complementary and color code cipher
CN1665182B (en) Coding and decoding method for quick response code
CN115987564B (en) Encryption method in data interaction process
CN112000970A (en) Text carrierless steganography method and system based on part association graph
JP6305946B2 (en) Secret pattern matching apparatus, method and program
CN117036127B (en) Educational resource sharing method based on educational big data platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant