CN114338217B - Data encryption transmission method - Google Patents
Data encryption transmission method Download PDFInfo
- Publication number
- CN114338217B CN114338217B CN202210001877.7A CN202210001877A CN114338217B CN 114338217 B CN114338217 B CN 114338217B CN 202210001877 A CN202210001877 A CN 202210001877A CN 114338217 B CN114338217 B CN 114338217B
- Authority
- CN
- China
- Prior art keywords
- data
- sequence
- sub
- numbers
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000005336 cracking Methods 0.000 abstract description 3
- 238000013500 data storage Methods 0.000 description 5
- 238000003491 array Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
本发明公开了一种数据加密传输方法,涉及数据加密技术领域,解决了现有技术采用固定密钥对数据进行加密解密,导致数据加密和传输安全性不高的技术问题;本发明通过设定的单位量将明文数据划分成若干子数据,对若干子数据进行编号,按照自然顺序对编号以及对应的子数据进行重新排序,获取编号序列和数据序列,通过不同的密钥对编号序列和数据序列分别加密,达到数据加密的目的,双重加密提高了数据的安全性;本发明在对编号以及对应的子数据进行重新排序之前,获取对应编号的位置特征标签,且参考节点随机选择,同时根据编号序列能够很快确定参考节点;本发明提高了数据破解的难度,进一步保证了数据的安全性。
The invention discloses a data encryption and transmission method, which relates to the technical field of data encryption and solves the technical problem that the existing technology uses a fixed key to encrypt and decrypt data, resulting in low data encryption and transmission security; the invention sets Divide the plaintext data into several sub-data by unit amount, number the several sub-data, reorder the numbers and corresponding sub-data according to the natural order, obtain the number sequence and data sequence, and pair the number sequence and data through different keys The sequences are respectively encrypted to achieve the purpose of data encryption, and double encryption improves the security of data; before reordering the numbers and corresponding sub-data, the present invention obtains the location feature tags of the corresponding numbers, and the reference nodes are randomly selected, and at the same time, according to The numbering sequence can quickly determine the reference node; the invention improves the difficulty of data cracking and further ensures the security of the data.
Description
技术领域Technical field
本发明属于数据加密技术领域,具体是一种数据加密传输方法。The invention belongs to the field of data encryption technology, specifically a data encryption transmission method.
背景技术Background technique
随着数据种类和数量的日益增多,数据存储加密技术也得到了越来越多的应用,成为保护数据安全性的有效方法。数据存储加密技术通常是指将数据写入设备之前,采用特定技术为数据加密,从而确保存储设备上数据的安全性。With the increasing type and quantity of data, data storage encryption technology has been increasingly used and has become an effective method to protect data security. Data storage encryption technology usually refers to using specific technology to encrypt data before writing it to the device to ensure the security of the data on the storage device.
现有技术中通常采用加密解密单元对数据进行加密,加密解密单元采用固定密钥对数据进行加密、对已存储的数据采用固定密钥进行解密,加密解密单元通常采用的密钥固定且单一,存在被暴力破解的可能性,将整条数据按不加处理直接加密,也会增加数据泄露的可能性;因此,亟需一种数据加密传输方法。In the prior art, an encryption and decryption unit is usually used to encrypt data. The encryption and decryption unit uses a fixed key to encrypt the data and a fixed key to decrypt the stored data. The encryption and decryption unit usually uses a fixed and single key. There is the possibility of being cracked by brute force, and directly encrypting the entire data without processing will also increase the possibility of data leakage; therefore, a data encryption transmission method is urgently needed.
发明内容Contents of the invention
本发明旨在至少解决现有技术中存在的技术问题之一;为此,本发明提出了一种数据加密传输方法,用于解决现有技术采用固定密钥对数据进行加密解密,导致数据加密和传输安全性不高的技术问题,本发明在进行数据加密之前,按照划分规则对数据进行划分和编号,再对数据和处理后的编号进行分别加密,进而通过安全传输通道将加密后的数据传输至目标终端。The present invention aims to solve at least one of the technical problems existing in the prior art; to this end, the present invention proposes a data encryption transmission method to solve the problem that the prior art uses a fixed key to encrypt and decrypt data, resulting in data encryption. and low transmission security. Before encrypting the data, the present invention divides and numbers the data according to the dividing rules, and then encrypts the data and the processed numbers respectively, and then transmits the encrypted data through a secure transmission channel. transmitted to the target terminal.
为实现上述目的,根据本发明的第一方面的实施例提出一种数据加密传输方法,包括:In order to achieve the above object, a data encryption transmission method is proposed according to an embodiment of the first aspect of the present invention, including:
接收到明文数据后,将明文数据划分成若干子数据;从编号池中随机选取数字对若干子数据进行编号,若干子数据与对应编号相互关联;After receiving the plaintext data, divide the plaintext data into several sub-data; randomly select numbers from the number pool to number the several sub-data, and the several sub-data are related to the corresponding numbers;
获取编号的位置特征标签,将编号和位置特征标签进行关联;其中,位置特征标签表示编号和参考节点之间的位置关系;Obtain the location feature label of the number, and associate the number with the location feature label; where the location feature label represents the positional relationship between the number and the reference node;
按照编号的自然顺序将编号和对应的子数据进行重新排列,根据排列之后若干编号以及对应的位置特征标签生成编号序列,同时将排列之后的子数据串联并标记为数据序列;Rearrange the numbers and corresponding sub-data according to the natural order of the numbers, generate a number sequence based on several numbers after the arrangement and the corresponding position feature labels, and at the same time concatenate the arranged sub-data and label it as a data sequence;
将数据序列和编号序列采用不同的密钥进行加密,并通过安全传输通道将加密后的数据和密钥标签传输到目标终端;其中,安全传输通道通过区块链节点建立。The data sequence and number sequence are encrypted using different keys, and the encrypted data and key tags are transmitted to the target terminal through a secure transmission channel; where the secure transmission channel is established through the blockchain node.
优选的,对所述明文数据进行划分,包括:Preferably, dividing the plaintext data includes:
根据设定的单位量对明文数据进行划分;其中,单位量包括单位数据量或者单位字符数;Divide the plaintext data according to the set unit amount; where the unit amount includes the unit data amount or the unit number of characters;
不满足一个单位数据量或者单位字符数的划作一个子数据。Those that do not satisfy a unit data volume or unit number of characters are classified as sub-data.
优选的,所述编号池基于子数据的数量建立,包括:Preferably, the number pool is established based on the number of sub-data, including:
获取子数据的数量,并标记为N;其中,N为不小于2的整数;Get the number of sub-data and mark it as N; where N is an integer not less than 2;
任意选择N个自然数,并根据N个自然数建立编号池。Randomly select N natural numbers and establish a numbering pool based on the N natural numbers.
优选的,获取所述编号的位置特征标签,包括:Preferably, obtaining the numbered location feature label includes:
在编号重新排序之前,任意选择一个编号作为参考节点;Before the numbers are reordered, any number is selected as a reference node;
获取编号和参考节点之间的位置关系,并转换成位置特征标签;其中,位置特征标签为整数。Obtain the positional relationship between the number and the reference node, and convert it into a positional feature label; where the positional feature label is an integer.
优选的,所述编号序列包括若干个编号数组,每个编号数组中均包括一个编号以及对应的位置特征标签,且所述编号序列中的编号数组按照自然顺序排列。Preferably, the numbering sequence includes several numbering arrays, each numbering array includes a number and a corresponding position feature label, and the numbering arrays in the numbering sequence are arranged in a natural order.
优选的,所述自然顺序包括从大到小或者从小到大。Preferably, the natural order includes from large to small or from small to large.
优选的,对所述数据序列和所述编号序列进行加密,包括:Preferably, encrypting the data sequence and the numbering sequence includes:
根据数据类型或者随机从密钥池中选择两个不同的密钥,并通过两个不同的密钥对数据序列和编号序列分别进行加密。Two different keys are selected from the key pool according to the data type or randomly, and the data sequence and number sequence are encrypted respectively with two different keys.
优选的,所述数据类型包括文字、图片和视频,且密钥池中每种数据类型对应的密钥不低于两种。Preferably, the data types include text, pictures and videos, and there are no less than two keys corresponding to each data type in the key pool.
优选的,所述安全传输通道通过区块链节点建立,且在安全传输通道建立之前,通过区块链节点对数据发送方和数据请求方进行校验。Preferably, the secure transmission channel is established through a blockchain node, and before the secure transmission channel is established, the data sender and the data requester are verified through the blockchain node.
与现有技术相比,本发明的有益效果是:Compared with the prior art, the beneficial effects of the present invention are:
1、本发明通过设定的单位量将明文数据划分成若干子数据,对若干子数据进行编号,按照自然顺序对编号以及对应的子数据进行重新排序,获取编号序列和数据序列,通过不同的密钥对编号序列和数据序列分别加密,达到数据加密的目的,双重加密提高了数据的安全性。1. The present invention divides the plaintext data into several sub-data by setting the unit amount, numbers the several sub-data, reorders the numbers and corresponding sub-data according to the natural order, obtains the number sequence and data sequence, and obtains the number sequence and data sequence through different The key encrypts the number sequence and the data sequence separately to achieve the purpose of data encryption. Double encryption improves the security of the data.
2、本发明在对编号以及对应的子数据进行重新排序之前,获取对应编号的位置特征标签,且参考节点随机选择,同时根据编号序列能够很快确定参考节点;本发明提高了数据破解的难度,进一步保证了数据的安全性。2. Before reordering the numbers and corresponding sub-data, the present invention obtains the location feature tags corresponding to the numbers, and randomly selects the reference nodes. At the same time, the reference nodes can be quickly determined based on the number sequence; the present invention improves the difficulty of data cracking. , further ensuring data security.
附图说明Description of the drawings
图1为本发明的工作步骤示意图。Figure 1 is a schematic diagram of the working steps of the present invention.
具体实施方式Detailed ways
下面将结合实施例对本发明的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。The technical solution of the present invention will be clearly and completely described below with reference to the embodiments. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of the present invention.
随着数据种类和数量的日益增多,为了避免公司数据、客户数据等敏感数据因为泄露而造成损失,数据存储加密技术得到了较为普遍的应用,成为保护数据安全性的有效方法;数据存储加密技术通常是指,在将数据写入存储设备之前采用特定技术为数据加密,从而确保存放在存储设备上的数据的安全性,相应的,在读取已存储数据时则采用相应技术为数据解密With the increasing type and quantity of data, in order to avoid losses caused by leakage of sensitive data such as company data and customer data, data storage encryption technology has been widely used and has become an effective method to protect data security; data storage encryption technology It usually refers to using specific technology to encrypt data before writing it to the storage device to ensure the security of the data stored on the storage device. Correspondingly, when reading the stored data, corresponding technology is used to decrypt the data.
数据存储加密技术按照实现手段可以分为主机软件加密、加密存储安全交换机、嵌入式专门加密设备以及基于存储设备本身的加密机制等方法,各种方法的逻辑架构中通常都包括加密解密单元以及密钥管理中心;其中,加密解密单元通常是指对待存储的数据利用固定密钥进行加密、对读取的已存储数据采用固定密钥进行解密的功能单元;密钥管理中心通常是指负责存储密钥、以及对密钥进行更换等管理操作的功能单元。According to the implementation method, data storage encryption technology can be divided into methods such as host software encryption, encrypted storage security switches, embedded special encryption devices, and encryption mechanisms based on the storage device itself. The logical architecture of various methods usually includes encryption and decryption units and encryption. Key management center; among them, the encryption and decryption unit usually refers to the functional unit that uses a fixed key to encrypt the data to be stored and decrypts the read stored data using a fixed key; the key management center usually refers to the functional unit responsible for storing the key. keys, and functional units that perform management operations such as key replacement.
现有技术中通常采用加密解密单元对数据进行加密,加密解密单元采用固定密钥对数据进行加密、对已存储的数据采用固定密钥进行解密,加密解密单元通常采用的密钥固定且单一,存在被暴力破解的可能性,将整条数据按不加处理直接加密,也会增加数据泄露的可能性;本发明在进行数据加密之前,按照划分规则对数据进行划分和编号,再对数据和处理后的编号进行分别加密,进而通过安全传输通道将加密后的数据传输至目标终端。In the prior art, an encryption and decryption unit is usually used to encrypt data. The encryption and decryption unit uses a fixed key to encrypt the data and a fixed key to decrypt the stored data. The encryption and decryption unit usually uses a fixed and single key. There is the possibility of being cracked by brute force, and directly encrypting the entire data without processing will also increase the possibility of data leakage; before encrypting the data, the present invention divides and numbers the data according to the dividing rules, and then sums up the data. The processed numbers are encrypted separately, and then the encrypted data is transmitted to the target terminal through a secure transmission channel.
请参阅图1,本申请提供了一种数据加密传输方法,包括:Please refer to Figure 1. This application provides a data encryption transmission method, including:
接收到明文数据后,将明文数据划分成若干子数据;从编号池中随机选取数字对若干子数据进行编号,若干子数据与对应编号相互关联;After receiving the plaintext data, divide the plaintext data into several sub-data; randomly select numbers from the number pool to number the several sub-data, and the several sub-data are related to the corresponding numbers;
获取编号的位置特征标签,将编号和位置特征标签进行关联;按照编号的自然顺序将编号和对应的子数据进行重新排列,根据排列之后若干编号以及对应的位置特征标签生成编号序列,同时将排列之后的子数据串联标记为数据序列;Obtain the location feature label of the number, associate the number with the location feature label; rearrange the number and the corresponding sub-data according to the natural order of the number, generate a number sequence based on the number and the corresponding location feature label after the arrangement, and at the same time, arrange the The subsequent sub-data concatenation is marked as a data sequence;
将数据序列和编号序列采用不同的密钥进行加密,并通过安全传输通道将加密后的数据和密钥标签传输到目标终端。The data sequence and number sequence are encrypted using different keys, and the encrypted data and key tags are transmitted to the target terminal through a secure transmission channel.
本申请提出了一种新的数据加密方法,通过该数据加密方法将数据加密之后,再通过安全传输通道将加密数据发送至目标终端;本申请中的目标终端可代表数据接收方,具体包括智能手机、电脑和服务器。This application proposes a new data encryption method. After data is encrypted through this data encryption method, the encrypted data is then sent to the target terminal through a secure transmission channel; the target terminal in this application can represent the data recipient, specifically including intelligent Mobile phones, computers and servers.
本申请中对明文数据进行划分,包括:In this application, plaintext data is divided, including:
根据设定的单位数据量或者单位字符数对明文数据进行划分;Divide the plaintext data according to the set unit data amount or unit character number;
不满足一个单位数据量或者单位字符数的划作一个子数据。Those that do not satisfy a unit data volume or unit number of characters are classified as sub-data.
在一个实施例中,通过设定的单位数据量对明文数据进行划分;举例来说:明文数据为1.15Mb,当设定的单位数据量为0.5Mb时,则该明文数据被划分为三个子数据,当设定的单位数据量为0.1Mb时,则该明文数据被划分为十二个子数据;可以理解的是,对明文数据进行划分时,一般是从一端到另一端。In one embodiment, the plaintext data is divided by a set unit data amount; for example: the plaintext data is 1.15Mb, and when the set unit data amount is 0.5Mb, the plaintext data is divided into three sub-sections. Data, when the set unit data amount is 0.1Mb, the plaintext data is divided into twelve sub-data; it can be understood that when the plaintext data is divided, it is usually from one end to the other end.
在另外一个实施例中,通过设定的单位字符数对明文数据进行划分;举例来说:明文数据为含有110个字符的字符串,当设定的单位字符数为20时,则该明文数据被划分为六个子数据,当设定的单位字符数为30时,则该明文数据被划分为四个子数据。In another embodiment, the plaintext data is divided by the set number of unit characters; for example: the plaintext data is a string containing 110 characters. When the set number of unit characters is 20, then the plaintext data It is divided into six sub-data. When the set number of unit characters is 30, the plaintext data is divided into four sub-data.
在另外一些优选的实施例中,设定的单位量还包括单位帧数,用于对视频等数据进行划分。In some other preferred embodiments, the set unit amount also includes the number of unit frames, which is used to divide video and other data.
本申请中,编号池基于子数据的数量建立,包括:In this application, the number pool is established based on the number of sub-data, including:
获取子数据的数量,并标记为N;Get the number of sub-data and mark it as N;
任意选择N个自然数,并根据N个自然数建立编号池。Randomly select N natural numbers and establish a numbering pool based on the N natural numbers.
本申请中N为不小于2的整数,同时也表示子数据的数量不少于两个,根据选择的自然数构建编号池,既可以从编号池中一个一个选取数据,又可以一次性选择编号池中所有的自然数。In this application, N is an integer not less than 2, and it also means that the number of sub-data is not less than two. A numbering pool is constructed based on the selected natural numbers. Data can be selected one by one from the numbering pool, or the numbering pool can be selected at once. All natural numbers in .
值得注意的是,本申请是任意选择N个自然数,这个N个自然数不需要连续,但要求是N个不同的自然数;举例说明:假设有5个子数据,则可以选择的自然数如1、2、3、4、5,如2、3、4、5、6,如5、6、7、8、3;但不可以是1、1、2、3、4。It is worth noting that this application arbitrarily selects N natural numbers. These N natural numbers do not need to be consecutive, but they are required to be N different natural numbers. For example: assuming there are 5 sub-data, the natural numbers that can be selected are such as 1, 2, 3, 4, 5, such as 2, 3, 4, 5, 6, such as 5, 6, 7, 8, 3; but it cannot be 1, 1, 2, 3, 4.
本申请中,获取编号的位置特征标签,包括:In this application, the numbered location feature labels are obtained, including:
在编号重新排序之前,任意选择一个编号作为参考节点;Before the numbers are reordered, any number is selected as a reference node;
获取编号和参考节点之间的位置关系,并转换成位置特征标签。Obtain the positional relationship between the number and the reference node and convert it into a positional feature label.
本申请中的位置特征标签为整数,包括正整数、0和负整数。The location feature labels in this application are integers, including positive integers, 0 and negative integers.
举例说明:假设在重新排序之前,划分成的5个子数据的编号分别为3、2、5、6、1;For example: Assume that before reordering, the numbers of the five sub-data divided into are 3, 2, 5, 6, and 1 respectively;
说明例一:将第一个子数据对应的编号3作为参考节点,第一个编号3和参考节点之间的位置相差为0,则其对应的位置特征标签为0;第二编号2和参考节点之间的位置相差为1,则其对应的位置特征标签为1,依次类推,则第三个编号5、第四个编号6、第五个编号1的位置特征标签分别为2、3和4。Explanation Example 1: Use the number 3 corresponding to the first sub-data as the reference node. The position difference between the first number 3 and the reference node is 0, then its corresponding position feature label is 0; the second number 2 and the reference node If the position difference between nodes is 1, then its corresponding position feature label is 1, and so on, then the position feature labels of the third number 5, the fourth number 6, and the fifth number 1 are 2, 3 and 1 respectively. 4.
说明例二:将最后一个子数据对应的编号1作为参考节点,第一个编号3和参考节点之间的位置相差为4,则其对应的位置特征标签为-4;第二编号2和参考节点之间的位置相差为3,则其对应的位置特征标签为-3,依次类推,则第三个编号5、第四个编号6、第五个编号1的位置特征标签分别为-2、-1和0。Explanation Example 2: Use the number 1 corresponding to the last sub-data as the reference node. The position difference between the first number 3 and the reference node is 4, then its corresponding position feature label is -4; the second number 2 and the reference node If the position difference between nodes is 3, then its corresponding position feature label is -3, and so on, then the position feature labels of the third number 5, the fourth number 6, and the fifth number 1 are -2, -1 and 0.
说明例三:将中间子数据对应的编号5作为参考节点,第一个编号3和参考节点之间的位置相差为2,则其对应的位置特征标签为-2;第二编号2和参考节点之间的位置相差为1,则其对应的位置特征标签为-1,依次类推,则第三个编号5、第四个编号6、第五个编号1的位置特征标签分别为0、1和2。Explanation Example 3: Use the number 5 corresponding to the intermediate sub-data as the reference node. The position difference between the first number 3 and the reference node is 2, then its corresponding position feature label is -2; the second number 2 and the reference node If the position difference between them is 1, then the corresponding position feature label is -1, and so on, then the position feature labels of the third number 5, the fourth number 6, and the fifth number 1 are 0, 1 and 1 respectively. 2.
本申请中编号序列包括若干个编号数组,每个编号数组中均包括一个编号以及对应的位置特征标签,且所述编号序列中的编号数组按照自然顺序排列;根据上述说明例一、说明例二和说明例三分别获取对应的编号序列。The numbering sequence in this application includes several numbering arrays, each numbering array includes a number and a corresponding position feature label, and the numbering arrays in the numbering sequence are arranged in a natural order; according to the above explanation example one and explanation example two and Example 3 to obtain the corresponding number sequence respectively.
针对说明例一,其对应的编号序列为[(1,0),(2,1),(3,2),(5,3),(6,4)];针对说明例二,其对应的编号序列为[(1,-4),(2,-3),(3,-2),(5,-1),(6,0)];针对说明例三,其对应的编号序列为[(1,-2),(2,-1),(3,0),(5,1),(6,2)]。For the first explanation example, the corresponding number sequence is [(1,0), (2,1), (3,2), (5,3), (6,4)]; for the second explanation example, the corresponding The numbering sequence is [(1,-4),(2,-3),(3,-2),(5,-1),(6,0)]; for example three, the corresponding numbering sequence is [(1,-2),(2,-1),(3,0),(5,1),(6,2)].
值得注意的是,本申请中的自然顺序包括从小到大或者从大到小;以说明例一、说明例二和说明例三为例,按照从小到大重新排列获取的编号序列在上面已经提到,按照从小到大的顺序从新排列获取编号序列如下:针对说明例一,其对应的编号序列为[(6,0),(5,1),(3,2),(2,3),(1,4)];针对说明例二,其对应的编号序列为[(6,-4),(5,-3),(3,-2),(2,-1),(1,0)];针对说明例三,其对应的编号序列为[(6,-2),(5,-1),(3,0),(2,1),(1,2)]。It is worth noting that the natural order in this application includes from small to large or from large to small; taking Explanation Example 1, Example 2 and Example 3 as examples, the numbering sequence obtained by rearranging it from small to large has been mentioned above. To, rearrange and obtain the number sequence in order from small to large as follows: For example 1, the corresponding number sequence is [(6,0),(5,1),(3,2),(2,3) ,(1,4)]; for the second example, the corresponding number sequence is [(6,-4),(5,-3),(3,-2),(2,-1),(1 ,0)]; for the third example, the corresponding number sequence is [(6,-2), (5,-1), (3,0), (2,1), (1,2)].
可以理解的是,知道编号序列获取步骤的用户可以根据任意未加密的编号序列获取对应子数据的原有序列,对子数据解密即可获取正确顺序的明文数据。It can be understood that users who know the steps to obtain the number sequence can obtain the original sequence of the corresponding sub-data based on any unencrypted number sequence, and decrypt the sub-data to obtain the correct sequence of plain text data.
本申请中,对数据序列和编号序列进行加密,包括:In this application, the data sequence and numbering sequence are encrypted, including:
根据数据类型或者随机从密钥池中选择两个不同的密钥,并通过两个不同的密钥对数据序列和编号序列分别进行加密。Two different keys are selected from the key pool according to the data type or randomly, and the data sequence and number sequence are encrypted respectively with two different keys.
本申请中是采用两个不同的密钥对编号序列和数据序列进行加密,如果编号序列和数据序列均为文字数据,则文字类型的数据至少需要两个不同的密钥,因此密钥池中每种数据类型对应的密钥不低于两种,且数据类型包括文字、图片、视频等。In this application, two different keys are used to encrypt the number sequence and the data sequence. If the number sequence and the data sequence are both text data, text type data requires at least two different keys, so the key pool There are no less than two keys corresponding to each data type, and the data types include text, pictures, videos, etc.
值得注意的是,本申请的数据序列是编号按照自然顺序重新排列之后获取的乱序的子数据生成的,即对数据序列进行解密,并将其中的子数据进行串联获取的数据并不等于明文数据,实际上数据序列中的子数据因为编号重新排列已经被打乱了,这样才能达到双重加密目的。It is worth noting that the data sequence in this application is generated from the out-of-order sub-data obtained after the numbers are rearranged in natural order. That is, the data sequence is decrypted and the sub-data is concatenated. The data obtained is not equal to the plain text. Data, in fact, the sub-data in the data sequence has been disrupted due to number rearrangement, so as to achieve the purpose of double encryption.
本申请中的安全传输通道通过区块链节点建立,且在安全传输通道建立之前,通过区块链节点对数据发送方和数据请求方进行校验;本申请中的校验指的是数据接收双方的合理性和合规性,通过核验之后才会基于区块链节点建立二者之间的数据传输通道。The secure transmission channel in this application is established through a blockchain node, and before the secure transmission channel is established, the data sender and the data requester are verified through the blockchain node; the verification in this application refers to the data reception After the rationality and compliance of both parties are verified, a data transmission channel between the two will be established based on the blockchain node.
本申请的核心要点之一:本发明通过设定的单位量将明文数据划分成若干子数据,对若干子数据进行编号,按照自然顺序对编号以及对应的子数据进行重新排序,获取编号序列和数据序列,通过不同的密钥对编号序列和数据序列分别加密,达到数据加密的目的,双重加密提高了数据的安全性。One of the core points of this application: this invention divides the plaintext data into several sub-data by setting the unit amount, numbers the several sub-data, reorders the numbers and corresponding sub-data according to the natural order, and obtains the number sequence and The data sequence is encrypted separately through different keys to achieve the purpose of data encryption. Double encryption improves the security of the data.
本申请的核心要点之二:本发明在对编号以及对应的子数据进行重新排序之前,获取对应编号的位置特征标签,且参考节点随机选择,同时根据编号序列能够很快确定参考节点;本发明提高了数据破解的难度,进一步保证了数据的安全性。The second core point of this application: before reordering the numbers and corresponding sub-data, the present invention obtains the location feature tags corresponding to the numbers, and randomly selects the reference nodes. At the same time, the reference nodes can be quickly determined according to the number sequence; the present invention It increases the difficulty of data cracking and further ensures the security of data.
上述公式中的部分数据均是去除量纲取其数值计算,公式是由采集的大量数据经过软件模拟得到最接近真实情况的一个公式;公式中的预设参数和预设阈值由本领域的技术人员根据实际情况设定或者通过大量数据模拟获得。Some of the data in the above formula are calculated by removing the dimensions and taking their numerical values. The formula is a formula closest to the real situation obtained through software simulation of a large amount of collected data; the preset parameters and preset thresholds in the formula are determined by those skilled in the art. It is set according to the actual situation or obtained through a large amount of data simulation.
本发明的工作原理:Working principle of the invention:
接收到明文数据后,将明文数据划分成若干子数据;从编号池中随机选取数字对若干子数据进行编号,若干子数据与对应编号相互关联;获取编号的位置特征标签,将编号和位置特征标签进行关联。After receiving the plaintext data, divide the plaintext data into several sub-data; randomly select numbers from the number pool to number several sub-data, and several sub-data are associated with the corresponding numbers; obtain the location feature label of the number, and combine the number and location features. tags to associate.
按照编号的自然顺序将编号和对应的子数据进行重新排列,根据排列之后若干编号以及对应的位置特征标签生成编号序列,同时将排列之后的子数据串联并标记为数据序列。The numbers and corresponding sub-data are rearranged according to the natural order of the numbers, and a number sequence is generated based on the number and corresponding position feature labels after the arrangement. At the same time, the arranged sub-data are concatenated and marked as a data sequence.
将数据序列和编号序列采用不同的密钥进行加密,并通过安全传输通道将加密后的数据和密钥标签传输到目标终端。The data sequence and number sequence are encrypted using different keys, and the encrypted data and key tags are transmitted to the target terminal through a secure transmission channel.
以上实施例仅用以说明本发明的技术方法而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方法进行修改或等同替换,而不脱离本发明技术方法的精神和范围。The above embodiments are only used to illustrate the technical methods of the present invention and are not limiting. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical methods of the present invention can be modified or equivalently substituted. without departing from the spirit and scope of the technical method of the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210001877.7A CN114338217B (en) | 2022-01-04 | 2022-01-04 | Data encryption transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210001877.7A CN114338217B (en) | 2022-01-04 | 2022-01-04 | Data encryption transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114338217A CN114338217A (en) | 2022-04-12 |
CN114338217B true CN114338217B (en) | 2023-10-10 |
Family
ID=81022334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210001877.7A Active CN114338217B (en) | 2022-01-04 | 2022-01-04 | Data encryption transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114338217B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115017530B (en) * | 2022-08-08 | 2022-12-16 | 创云融达信息技术(天津)股份有限公司 | Data security storage device and method |
CN115801315A (en) * | 2022-10-10 | 2023-03-14 | 中国电信股份有限公司 | Data transmission method and device, electronic device, storage medium |
CN117424752B (en) * | 2023-12-07 | 2024-03-15 | 佛山市顺德弘金电器科技有限公司 | Communication encryption and decryption method and device |
CN119232500A (en) * | 2024-12-02 | 2024-12-31 | 四川英创力电子科技股份有限公司 | Automatic processing method of engineering data based on data storage server |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102611550A (en) * | 2012-02-26 | 2012-07-25 | 光束(北京)国际工程技术研究院有限公司 | Method for encrypting data and method for transmitting encrypted data |
CN102624527A (en) * | 2012-02-26 | 2012-08-01 | 光束(北京)国际工程技术研究院有限公司 | Method and device for encrypting data and transmission method and transmission device of encrypted data |
CN103345609A (en) * | 2013-06-06 | 2013-10-09 | 深圳市大成天下信息技术有限公司 | Method and device for text encryption and decryption |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN112333698A (en) * | 2020-11-18 | 2021-02-05 | 深圳大师科技有限公司 | Encryption authentication method and device for mobile game terminal |
CN113746629A (en) * | 2021-11-04 | 2021-12-03 | 山东凤和凰城市科技有限公司 | Secret communication method based on polymer simulation |
-
2022
- 2022-01-04 CN CN202210001877.7A patent/CN114338217B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102611550A (en) * | 2012-02-26 | 2012-07-25 | 光束(北京)国际工程技术研究院有限公司 | Method for encrypting data and method for transmitting encrypted data |
CN102624527A (en) * | 2012-02-26 | 2012-08-01 | 光束(北京)国际工程技术研究院有限公司 | Method and device for encrypting data and transmission method and transmission device of encrypted data |
CN103345609A (en) * | 2013-06-06 | 2013-10-09 | 深圳市大成天下信息技术有限公司 | Method and device for text encryption and decryption |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN112333698A (en) * | 2020-11-18 | 2021-02-05 | 深圳大师科技有限公司 | Encryption authentication method and device for mobile game terminal |
CN113746629A (en) * | 2021-11-04 | 2021-12-03 | 山东凤和凰城市科技有限公司 | Secret communication method based on polymer simulation |
Also Published As
Publication number | Publication date |
---|---|
CN114338217A (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114338217B (en) | Data encryption transmission method | |
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
CN108377183B (en) | XDR data information encryption method, device, equipment and medium | |
CN104468090B (en) | Character cipher coding method based on image pixel coordinates | |
US20120134491A1 (en) | Cloud Storage Data Encryption Method, Apparatus and System | |
US8345876B1 (en) | Encryption/decryption system and method | |
Xu et al. | Applications of cryptography in database: a review | |
CN110337649A (en) | The dynamic symmetry that do not discover for search pattern can search for the method and system encrypted | |
WO2012071722A1 (en) | Storage method, device and system for cloud storage data based on one-time pad (otp) | |
EP2779522B1 (en) | Configurable key-based data shuffling and encryption | |
CN105959098A (en) | Format-reserved encryption algorithm based on multi-segmented Feistel network | |
CN105320613B (en) | System and method for dynamic data storage | |
WO2015056236A1 (en) | A method of generating key arrays of random numbers and encryption | |
CN102611549A (en) | Data encryption device and memory card | |
CN101335616B (en) | Symmetric ciphering method having infinite cipher key space | |
CN110943837B (en) | User password encryption method based on improved MD5 encryption algorithm | |
CN106357608A (en) | Method for encrypting and decrypting private data for personal healthcare data | |
CN110798455A (en) | An encrypted communication transmission system to prevent information leakage | |
JP2009122731A (en) | System for safely transmitting and/or managing file | |
CN113300840B (en) | Data random encryption communication method combining Hamming codes | |
Vershinin et al. | Associative steganography of text messages | |
CN111368316B (en) | File encryption and decryption method and device | |
CN113541942A (en) | Digital content encryption and decryption method based on ARX white-box block cipher | |
US11664976B2 (en) | Method and devices for creating redundancy and encryption using Mojette Transform | |
CN113742759B (en) | Data encryption method and device for financial accounting system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240912 Address after: 1144, 11th Floor, Building 29, Taihu Beili, Tongzhou District, Beijing 101149 Patentee after: Beijing Carly Education Consulting Co.,Ltd. Country or region after: China Address before: 473004 No. 80 Changjiang Road, Wancheng District, Nanyang City, Henan Province Patentee before: NANYANG INSTITUTE OF TECHNOLOGY Country or region before: China |
|
TR01 | Transfer of patent right |