CN114462066A - Data encryption method and system for identity recognition - Google Patents

Data encryption method and system for identity recognition Download PDF

Info

Publication number
CN114462066A
CN114462066A CN202210140079.2A CN202210140079A CN114462066A CN 114462066 A CN114462066 A CN 114462066A CN 202210140079 A CN202210140079 A CN 202210140079A CN 114462066 A CN114462066 A CN 114462066A
Authority
CN
China
Prior art keywords
encryption
identity information
node
historical
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202210140079.2A
Other languages
Chinese (zh)
Inventor
石磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Red Beam Photoelectric Technology Development Co ltd
Original Assignee
Suzhou Red Beam Photoelectric Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Red Beam Photoelectric Technology Development Co ltd filed Critical Suzhou Red Beam Photoelectric Technology Development Co ltd
Priority to CN202210140079.2A priority Critical patent/CN114462066A/en
Publication of CN114462066A publication Critical patent/CN114462066A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention provides a data encryption method and system for identity recognition, wherein the encryption behavior analysis configuration corresponding to an encryption node is configured by acquiring the identity information to be encrypted of an identity information encryption unit to be encrypted, according to the identity information to be encrypted and the identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted, and then the encryption behavior category information corresponding to the identity information encryption unit to be encrypted in the encryption behavior of the encryption node is determined according to the identity information historical encryption behavior set of the encryption node, so that the re-encryption strategy configuration of the identity information encryption unit to be encrypted is added for re-encryption configuration. Therefore, the identity information encryption unit to be encrypted is subjected to encryption configuration again according to the identity information to be encrypted and by combining the prior encryption configuration data of each encryption node, so that the safety of the identity identification information can be improved.

Description

Data encryption method and system for identity recognition
Technical Field
The invention relates to the technical field of data encryption, in particular to a data encryption method and system for identity recognition.
Background
How to encrypt the configuration once more to treat the identity information encryption unit of encrypting, improve the security of the identification information, it is the technical matter that awaits the solution urgently.
Disclosure of Invention
In view of this, an embodiment of the present invention provides a data encryption method for identity recognition, which is applied to a server, and the method includes:
acquiring to-be-encrypted identity information of an identity information encryption unit to be encrypted;
configuring encryption behavior analysis configuration corresponding to the encryption node according to the identity information to be encrypted and an identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted, wherein the identity information historical encryption behavior set of the encryption node of the tail end encryption node comprises the encryption behavior of the encryption node of the tail end encryption node and corresponding encryption behavior category information;
determining encryption behavior category information in the encryption behavior of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted according to the identity information historical encryption behavior set of the encryption node of the tail end encryption node;
according to the encryption behavior of the encryption node of the tail end encryption node corresponding to the encryption behavior category information in the identity information encryption unit to be encrypted, adding re-encryption strategy configuration of the identity information encryption unit to be encrypted in the encryption behavior category information in the identity information encryption unit to be encrypted so as to perform re-encryption configuration on the identity information encryption unit to be encrypted.
The step of configuring the encryption behavior analysis configuration corresponding to the encryption node according to the identity information to be encrypted and the identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted comprises the following steps:
analyzing historical encryption behaviors of the identity information to be encrypted to obtain a first historical encryption information relation graph;
historical encryption behavior analysis is carried out on the identity information historical encryption behavior set of the encryption node of the tail end encryption node, and a second historical encryption information relation graph of the encryption node of the tail end encryption node is obtained;
and configuring the first historical encryption information relation graph and a second historical encryption information relation graph of the encryption node of the tail end encryption node into an encryption configuration analysis module to obtain encryption behavior analysis configuration corresponding to the encryption node.
Wherein, according to the identity information to be encrypted and the identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted, the encryption behavior analysis configuration corresponding to the encryption node is configured, and the method further comprises the following steps:
and inputting the first historical encryption information relation graph into the encryption configuration analysis module to obtain the encryption behavior analysis configuration.
Wherein, according to the identity information to be encrypted and the identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted, the encryption behavior analysis configuration corresponding to the encryption node is configured, and the method further comprises the following steps:
acquiring candidate to-be-encrypted identity information of a candidate identity information area corresponding to terminal encryption behavior analysis and target encryption nodes corresponding to the candidate identity information area;
adding an identity information historical encryption behavior set of each target encryption node according to the encryption behavior category information of each target encryption node in the candidate identity information area and the encryption behavior of each target encryption node;
adding an encryption behavior analysis configuration set to a second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of each target encryption node; and the second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of the last encryption node is positioned in the last column of the encryption behavior analysis configuration set.
Wherein, the step of analyzing the historical encryption behavior of the identity information to be encrypted to obtain a first historical encryption information relation graph comprises:
generating a historical encryption information vector according to each encryption node corresponding to the identity information to be encrypted;
and performing historical encryption behavior analysis on the identity information to be encrypted according to the historical encryption information vector to obtain the first historical encryption information relation graph.
According to another aspect of the embodiments of the present invention, there is provided an identity-based data encryption system, applied to a server, the system including:
the acquiring module is used for acquiring the identity information to be encrypted of the identity information encryption unit to be encrypted;
the configuration module is used for configuring encryption behavior analysis configuration corresponding to the encryption node according to the identity information to be encrypted and an identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted, wherein the identity information historical encryption behavior set of the encryption node of the tail end encryption node comprises the encryption behavior of the encryption node of the tail end encryption node and corresponding encryption behavior category information;
the determining module is used for determining encryption behavior category information in the encryption unit corresponding to the identity information to be encrypted in the encryption behaviors of the encryption nodes of the tail end encryption node according to the identity information historical encryption behavior set of the encryption nodes of the tail end encryption node;
and the processing module is used for adding re-encryption strategy configuration of the identity information encryption unit to be encrypted in the encryption behavior category information in the identity information encryption unit to be encrypted according to the encryption behavior category information in the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted so as to perform re-encryption configuration on the identity information encryption unit to be encrypted.
To sum up, in the data encryption method and system for identity recognition provided in the embodiments of the present invention, the identity information to be encrypted of the identity information encryption unit to be encrypted is obtained, the encryption behavior analysis configuration corresponding to the encryption node is configured according to the identity information to be encrypted and the historical encryption behavior set of the identity information of the encryption node of the end encryption node corresponding to the identity information to be encrypted encryption unit, then the encryption behavior category information corresponding to the identity information to be encrypted in the encryption behavior of the encryption node of the end encryption node is determined according to the historical encryption behavior set of the identity information of the end encryption node, and the encryption behavior category information corresponding to the identity information to be encrypted in the encryption behavior of the encryption node is determined according to the historical encryption behavior set of the identity information of the encryption node, so that the encryption behavior corresponding to the identity information to be encrypted in the encryption behavior of the encryption node of the end encryption node is encrypted according to the encryption behavior category information to be encrypted And adding re-encryption strategy configuration of the identity information encryption unit to be encrypted in the encryption behavior of the encryption node corresponding to the encryption behavior category information in the identity information encryption unit to be encrypted. Therefore, the identity information encryption unit to be encrypted is subjected to re-encryption configuration according to the identity information to be encrypted and in combination with the previous re-encryption configuration data of each encryption node, and the safety of the identity identification information can be improved.
In order to make the aforementioned objects, features and advantages of the embodiments of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 illustrates a component diagram of a server provided by an embodiment of the invention;
FIG. 2 is a flow chart illustrating a data encryption method for identification according to an embodiment of the present invention;
fig. 3 shows a functional block diagram of a data encryption system for identification provided by an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by the scholars in the technical field, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows an exemplary component schematic of a server 10. The server 10 may include one or more processors 104, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The server 10 may also include any storage media 106 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, storage medium 106 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage medium may use any technology to store information. Further, any storage medium may provide volatile or non-volatile retention of information. Further, any storage medium may represent a fixed or removable component of server 10. In one case, when the processor 104 executes corresponding instructions stored in any storage medium or combination of storage media, the server 10 may perform any of the operations of the corresponding instructions. The server 10 further comprises one or more drive units 108 for interacting with any storage medium, such as a hard disk drive unit, an optical disk drive unit, etc.
The server 10 also includes input/output 110 (I/O) for receiving various inputs (via input unit 112) and for providing various outputs (via output unit 114)). One particular output mechanism may include a presentation device 116 and a corresponding Graphical User Interface (GUI) 118. The server 10 may also include one or more network interfaces 120 for exchanging data with other devices via one or more communication units 122. One or more communication buses 124 couple the above-described components together.
The communication unit 122 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the internet), a point-to-point connection, etc., or any combination thereof. The communication unit 122 may include any combination of hardwired links, wireless links, routers, gateway functions, etc., governed by any protocol or combination of protocols.
Fig. 2 is a flowchart illustrating a data encryption method for identification according to an embodiment of the present invention, which can be performed by the server 10 shown in fig. 1, and is described as follows.
Step 2001, obtain the identity information to be encrypted of the identity information encryption unit to be encrypted.
Step 2002, configuring an encryption behavior analysis configuration corresponding to the encryption node according to the identity information to be encrypted and an identity information historical encryption behavior set of the encryption node of the end encryption node corresponding to the identity information encryption unit to be encrypted, wherein the identity information historical encryption behavior set of the encryption node of the end encryption node comprises the encryption behavior of the encryption node of the end encryption node and corresponding encryption behavior category information.
Step 2003, determining the encryption behavior category information in the encryption unit corresponding to the identity information to be encrypted in the encryption behaviors of the encryption nodes of the tail end encryption node according to the identity information historical encryption behavior set of the encryption nodes of the tail end encryption node.
Step 2004, according to the encryption behavior category information in the encryption node of the end encryption node corresponding to the identity information encryption unit to be encrypted, adding the re-encryption strategy configuration of the identity information encryption unit to be encrypted to the encryption behavior category information in the identity information encryption unit to be encrypted, so as to perform re-encryption configuration on the identity information encryption unit to be encrypted.
According to the above steps, in this embodiment, by obtaining the to-be-encrypted identity information of the to-be-encrypted identity information encryption unit, configuring the encryption behavior analysis configuration corresponding to the encryption node according to the to-be-encrypted identity information and the identity information historical encryption behavior set of the encryption node of the end encryption node corresponding to the to-be-encrypted identity information encryption unit, then determining the encryption behavior category information corresponding to the to-be-encrypted identity information encryption unit in the encryption behavior of the end encryption node according to the identity information historical encryption behavior set of the encryption node of the end encryption node, and determining the encryption behavior category information corresponding to the to-be-encrypted identity information encryption unit in the encryption behavior of the encryption node according to the identity information historical encryption behavior set of the encryption node, the encryption behavior category information corresponding to the to-be-encrypted identity information encryption unit in the encryption behavior of the encryption node of the end encryption node is determined according to the encryption behavior category information in the to-be-encrypted identity information encryption unit, and adding re-encryption strategy configuration of the identity information encryption unit to be encrypted in the encryption behavior of the encryption node corresponding to the encryption behavior category information in the identity information encryption unit to be encrypted. Therefore, the identity information encryption unit to be encrypted is subjected to re-encryption configuration according to the identity information to be encrypted and in combination with the previous re-encryption configuration data of each encryption node, and the safety of the identity identification information can be improved. In step 2002, in this embodiment, historical encryption behavior analysis may be performed on the identity information to be encrypted to obtain a first historical encryption information relationship diagram, then historical encryption behavior analysis may be performed on the identity information historical encryption behavior set of the encryption node of the end encryption node to obtain a second historical encryption information relationship diagram of the encryption node of the end encryption node, and then the first historical encryption information relationship diagram and the second historical encryption information relationship diagram of the encryption node of the end encryption node are configured in an encryption configuration analysis module to obtain an encryption behavior analysis configuration corresponding to the encryption node.
In step 2002, in this embodiment, the encryption behavior analysis module may input the first historical encryption information relationship diagram into the encryption configuration analysis module to obtain the encryption behavior analysis configuration, and output the second historical encryption information relationship diagram obtained by performing historical encryption behavior analysis on the historical encryption behavior set of the identity information of each encryption node obtained by the encryption configuration analysis module.
In step 2002, in this embodiment, candidate to-be-encrypted identity information of a candidate identity information area corresponding to the end encryption behavior analysis and each target encryption node corresponding to the candidate identity information area may be obtained, then, an identity information historical encryption behavior set of each target encryption node is added according to encryption behavior category information of each target encryption node in the candidate identity information area and an encryption behavior of each target encryption node, and an encryption behavior analysis configuration set is added to a second historical encryption information relationship graph corresponding to the identity information historical encryption behavior set of each target encryption node. And the second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of the last encryption node is positioned in the last column of the encryption behavior analysis configuration set.
In step 2002, in this embodiment, a historical encryption information vector may be generated according to each encryption node corresponding to the identity information to be encrypted. And then, performing historical encryption behavior analysis on the identity information to be encrypted according to the historical encryption information vector to obtain the first historical encryption information relation graph.
Fig. 3 is a functional block diagram of an identification data encryption system according to an embodiment of the present invention, where the functions implemented by the identification data encryption system may correspond to the steps executed by the foregoing method. The data encryption system for identification may be understood as the server 10, or a processor of the server 10, or may be understood as a component that is independent of the server 10 or the processor and implements the functions of the present invention under the control of the server 10, as shown in fig. 3, and the functions of each functional module of the data encryption system for identification are described in detail below.
An obtaining module 2001, configured to obtain the identity information to be encrypted of the identity information encryption unit to be encrypted.
A configuration module 2002, configured to configure an encryption behavior analysis configuration corresponding to the encryption node according to the identity information to be encrypted and an identity information historical encryption behavior set of the encryption node of the end encryption node corresponding to the identity information encryption unit to be encrypted, where the identity information historical encryption behavior set of the encryption node of the end encryption node includes an encryption behavior of the encryption node of the end encryption node and corresponding encryption behavior category information.
A determining module 2003, configured to determine, according to the historical encryption behavior set of the identity information of the encryption node of the end encryption node, encryption behavior category information in the encryption behavior of the encryption node of the end encryption node, which corresponds to the identity information encryption unit to be encrypted.
The processing module 2004 is configured to add re-encryption policy configuration of the identity information encryption unit to be encrypted to the encryption behavior category information in the identity information encryption unit to be encrypted according to the encryption behavior of the encryption node of the end encryption node corresponding to the encryption behavior category information in the identity information encryption unit to be encrypted, so as to perform re-encryption configuration on the identity information encryption unit to be encrypted.
The configuration module 2001 configures an encryption behavior analysis configuration corresponding to an encryption node by:
and analyzing historical encryption behaviors of the identity information to be encrypted to obtain a first historical encryption information relation graph.
And analyzing historical encryption behaviors of the identity information historical encryption behavior set of the encryption node of the tail end encryption node to obtain a second historical encryption information relation graph of the encryption node of the tail end encryption node.
And configuring the first historical encryption information relation graph and a second historical encryption information relation graph of the encryption node of the tail end encryption node into an encryption configuration analysis module to obtain encryption behavior analysis configuration corresponding to the encryption node.
Wherein the configuration module 2001 is further configured to:
and inputting the first historical encryption information relation graph into the encryption configuration analysis module to obtain the encryption behavior analysis configuration.
Wherein the configuration module 2001 is further configured to:
acquiring candidate to-be-encrypted identity information of a candidate identity information area corresponding to the terminal encryption behavior analysis and each target encryption node corresponding to the candidate identity information area.
And adding an identity information historical encryption behavior set of each target encryption node according to the encryption behavior category information of each target encryption node in the candidate identity information area and the encryption behavior of each target encryption node.
And adding an encryption behavior analysis configuration set to a second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of each target encryption node. And the second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of the last encryption node is positioned in the last column of the encryption behavior analysis configuration set.
The configuration module 2001 performs historical encryption behavior analysis on the identity information to be encrypted in the following manner to obtain a first historical encryption information relation diagram:
and generating a historical encryption information vector according to each encryption node corresponding to the identity information to be encrypted.
And performing historical encryption behavior analysis on the identity information to be encrypted according to the historical encryption information vector to obtain the first historical encryption information relation graph.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may be candidates for corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
Alternatively, all or part of the implementation may be in software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, social platform server, or data center to another website site, computer, social platform server, or data center by wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more of an integrated social platform server, data center, and the like. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any drawing credit or debit acknowledgement in the claims should not be construed as limiting the claim concerned.

Claims (10)

1. A data encryption method for identity recognition is applied to a server, and the method comprises the following steps:
acquiring identity information to be encrypted corresponding to an identity information encryption unit to be encrypted in an identity identification partition;
configuring encryption behavior analysis configuration corresponding to the encryption node according to the identity information to be encrypted and an identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted, wherein the identity information historical encryption behavior set of the encryption node of the tail end encryption node comprises the encryption behavior of the encryption node of the tail end encryption node and corresponding encryption behavior category information;
determining encryption behavior category information in the encryption behavior of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted according to the identity information historical encryption behavior set of the encryption node of the tail end encryption node;
according to the encryption behavior of the encryption node of the tail end encryption node corresponding to the encryption behavior category information in the identity information encryption unit to be encrypted, adding re-encryption strategy configuration of the identity information encryption unit to be encrypted in the encryption behavior category information in the identity information encryption unit to be encrypted so as to perform re-encryption configuration on the identity information encryption unit to be encrypted.
2. The method according to claim 1, wherein the step of configuring an encryption behavior analysis configuration corresponding to an encryption node according to the identity information to be encrypted and an identity information historical encryption behavior set of the encryption node of the end encryption node corresponding to the identity information encryption unit to be encrypted comprises:
analyzing historical encryption behaviors of the identity information to be encrypted to obtain a first historical encryption information relation graph;
historical encryption behavior analysis is carried out on the identity information historical encryption behavior set of the encryption node of the tail end encryption node, and a second historical encryption information relation graph of the encryption node of the tail end encryption node is obtained;
and configuring the first historical encryption information relation graph and a second historical encryption information relation graph of the encryption node of the tail end encryption node into a preset defect analysis unit encryption configuration analysis module to obtain encryption behavior analysis configuration corresponding to the encryption node.
3. The method according to claim 2, wherein the configuring, according to the identity information to be encrypted and the historical encryption behavior set of the identity information of the encryption node of the end encryption node corresponding to the identity information encryption unit to be encrypted, the encryption behavior analysis configuration corresponding to the encryption node, further comprises:
and inputting the first historical encryption information relation graph into the encryption configuration analysis module to obtain the encryption behavior analysis configuration.
4. The method according to claim 3, wherein the configuring, according to the identity information to be encrypted and the historical encryption behavior set of the identity information of the encryption node of the end encryption node corresponding to the identity information encryption unit to be encrypted, the encryption behavior analysis configuration corresponding to the encryption node, further comprises:
acquiring candidate to-be-encrypted identity information of a candidate identity information area corresponding to terminal encryption behavior analysis and target encryption nodes corresponding to the candidate identity information area;
adding an identity information historical encryption behavior set of each target encryption node according to the encryption behavior category information of each target encryption node in the candidate identity information area and the encryption behavior of each target encryption node;
adding an encryption behavior analysis configuration set to a second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of each target encryption node; and the second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of the last encryption node is positioned in the last column of the encryption behavior analysis configuration set.
5. The method according to claim 4, wherein the performing historical encryption behavior analysis on the identity information to be encrypted to obtain a first historical encryption information relationship diagram includes:
generating a historical encryption information vector according to each encryption node corresponding to the identity information to be encrypted;
and performing historical encryption behavior analysis on the identity information to be encrypted according to the historical encryption information vector to obtain the first historical encryption information relation graph.
6. An identity-identifying data encryption system, which is applied to a server, the system comprising:
the acquiring module is used for acquiring the identity information to be encrypted of the identity information encryption unit to be encrypted;
the configuration module is used for configuring encryption behavior analysis configuration corresponding to the encryption node according to the identity information to be encrypted and an identity information historical encryption behavior set of the encryption node of the tail end encryption node corresponding to the identity information encryption unit to be encrypted, wherein the identity information historical encryption behavior set of the encryption node of the tail end encryption node comprises the encryption behavior of the encryption node of the tail end encryption node and corresponding encryption behavior category information;
the determining module is used for determining encryption behavior category information in the encryption unit corresponding to the identity information to be encrypted in the encryption behaviors of the encryption nodes of the tail end encryption node according to the identity information historical encryption behavior set of the encryption nodes of the tail end encryption node;
and the processing module is used for adding re-encryption strategy configuration of the identity information encryption unit to be encrypted in the encryption behavior category information in the identity information encryption unit to be encrypted according to the encryption behavior category information in the encryption node of the tail-end encryption node, which corresponds to the identity information encryption unit to be encrypted, so as to perform re-encryption configuration on the identity information encryption unit to be encrypted.
7. The system of claim 6, wherein the configuration module is specifically configured to:
analyzing historical encryption behaviors of the identity information to be encrypted to obtain a first historical encryption information relation graph;
historical encryption behavior analysis is carried out on the identity information historical encryption behavior set of the encryption node of the tail end encryption node, and a second historical encryption information relation graph of the encryption node of the tail end encryption node is obtained;
and configuring the first historical encryption information relation graph and a second historical encryption information relation graph of the encryption node of the tail end encryption node into an encryption configuration analysis module to obtain encryption behavior analysis configuration corresponding to the encryption node.
8. The system of claim 7, wherein the configuration module is further configured to:
and inputting the first historical encryption information relation graph into the encryption configuration analysis module to obtain the encryption behavior analysis configuration.
9. The system of claim 8, wherein the configuration module is further configured to:
acquiring candidate to-be-encrypted identity information of a candidate identity information area corresponding to terminal encryption behavior analysis and target encryption nodes corresponding to the candidate identity information area;
adding an identity information historical encryption behavior set of each target encryption node according to the encryption behavior category information of each target encryption node in the candidate identity information area and the encryption behavior of each target encryption node;
adding an encryption behavior analysis configuration set to a second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of each target encryption node; and the second historical encryption information relation graph corresponding to the identity information historical encryption behavior set of the last encryption node is positioned in the last column of the encryption behavior analysis configuration set.
10. The system of claim 9, wherein the configuration module is specifically configured to:
performing historical encryption behavior analysis on the identity information to be encrypted to obtain a first historical encryption information relation diagram:
generating a historical encryption information vector according to each encryption node corresponding to the identity information to be encrypted;
and performing historical encryption behavior analysis on the identity information to be encrypted according to the historical encryption information vector to obtain the first historical encryption information relation graph.
CN202210140079.2A 2022-02-16 2022-02-16 Data encryption method and system for identity recognition Withdrawn CN114462066A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210140079.2A CN114462066A (en) 2022-02-16 2022-02-16 Data encryption method and system for identity recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210140079.2A CN114462066A (en) 2022-02-16 2022-02-16 Data encryption method and system for identity recognition

Publications (1)

Publication Number Publication Date
CN114462066A true CN114462066A (en) 2022-05-10

Family

ID=81414146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210140079.2A Withdrawn CN114462066A (en) 2022-02-16 2022-02-16 Data encryption method and system for identity recognition

Country Status (1)

Country Link
CN (1) CN114462066A (en)

Similar Documents

Publication Publication Date Title
CN113779409A (en) Intention mining method and system based on big data
CN114462066A (en) Data encryption method and system for identity recognition
CN111355717A (en) Encryption method and system for scientific and technological achievement transfer protocol
CN111339160A (en) Scientific and technological achievement data mining method and system
CN111767561B (en) Enterprise financial road information processing method and system
CN113641095B (en) Active safety machine leaning control method and system based on laser radar
CN113179289B (en) Conference video information uploading method and system based on cloud computing service
CN113177567B (en) Image data processing method and system based on cloud computing service
CN111767437B (en) Enterprise science and technology project management method and system
CN113282924A (en) Method and system for detecting malicious behaviors of software
CN113155135B (en) Deep learning-based route planning method and system
CN113282823A (en) Hot topic tracking method and system based on artificial intelligence
CN112256329A (en) Material manufacturing process information management method and system
CN113810355A (en) Server resource management method and system
CN113297440A (en) Session data mining method and system based on online session
CN114416978A (en) Defect identification method and system based on chip detection
CN113282292A (en) Compiling method and system for software development
CN113901509A (en) Member information encryption method and system
CN113761029A (en) Interactive encryption processing method and system based on cloud edge cooperation
CN111967029A (en) Intellectual property data management method and system
CN113282480A (en) Software development testing method and system
CN114006710A (en) Intelligent medical data access method and system
CN112650641A (en) Scientific and technological achievement transformation and intellectual property trade management service monitoring method and system
CN113901364A (en) Webpage graph rendering method and system based on cloud computing service
CN111105172A (en) Spraying process flow treatment method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220510

WW01 Invention patent application withdrawn after publication