CN115296935B - Information security data processing method and system - Google Patents

Information security data processing method and system Download PDF

Info

Publication number
CN115296935B
CN115296935B CN202211219467.6A CN202211219467A CN115296935B CN 115296935 B CN115296935 B CN 115296935B CN 202211219467 A CN202211219467 A CN 202211219467A CN 115296935 B CN115296935 B CN 115296935B
Authority
CN
China
Prior art keywords
encryption
channel
group
remainder
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211219467.6A
Other languages
Chinese (zh)
Other versions
CN115296935A (en
Inventor
邢长宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Warner Network Technology Co ltd
Original Assignee
Warner Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Warner Network Technology Co ltd filed Critical Warner Network Technology Co ltd
Priority to CN202211219467.6A priority Critical patent/CN115296935B/en
Publication of CN115296935A publication Critical patent/CN115296935A/en
Application granted granted Critical
Publication of CN115296935B publication Critical patent/CN115296935B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Abstract

The invention provides an information security data processing method and a system, which relate to the technical field of data processing, wherein the processing method comprises the following steps: classifying the data; collecting a plurality of real-time parameters; setting a plurality of encryption and decryption methods based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result; setting a plurality of transmission channels based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding transmission channel based on a calculation result; the invention improves the security of data processing by setting a plurality of groups of encryption and decryption methods and transmission channels and having randomness in the selection of the encryption and decryption methods and the transmission channels, so as to solve the problems of single protection mode and insufficient data security of the data processing in the prior information security field.

Description

Information security data processing method and system
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a system for processing information security data.
Background
The network information security is a comprehensive discipline relating to various disciplines such as computer discipline, network technology, communication technology, cryptographic technology, information security technology, application mathematics, number theory, information theory and the like. The method mainly means that hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally runs, and network service is not interrupted. And data processing is a basic link of system engineering and automatic control. Data processing is throughout various fields of social production and social life. The development of data processing technology and the breadth and depth of its applications have greatly influenced the progress of human society development. Data is a form of expression for a fact, concept, or instruction that may be processed by manual or automated means. Data becomes information after being interpreted and given a certain meaning. The data processing is the collection, storage, retrieval, processing, transformation and transmission of data.
In the prior art, in the field of data processing of information security, the security processing mode of the existing data is single, and the security protection measures for important data are not enough, and usually, a preset protection method is adopted to perform security protection, and is easy to crack, and the protection method is single no matter in encryption and decryption processing or transmission processing of data, for example: by adopting the preset encryption and decryption method, once the encryption and decryption method is cracked, data can be leaked, meanwhile, the preset transmission channel is adopted for transmission, and once the transmission channel is obtained, the data is also easily leaked, so that the existing problems are solved by lacking an information security data processing method and system.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an information security data processing method and system, which improve the security of data processing by setting a plurality of groups of encryption and decryption methods and transmission channels and having randomness in the selection of the encryption and decryption methods and the transmission channels, so as to solve the problems of single protection mode and insufficient data security of data processing in the prior information security field.
In order to realize the purpose, the invention is realized by the following technical scheme: the information security data processing method comprises the following steps:
classifying the data;
collecting a plurality of real-time parameters;
setting a plurality of encryption and decryption methods based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result;
and then setting a plurality of transmission channels based on the classified data, calculating based on a plurality of real-time parameters, and selecting the corresponding transmission channel based on the calculation result.
Further, classifying the data includes: firstly, respectively setting a first safety factor k1, a second safety factor k2 and a third safety factor k3 for password data, account data and basic information data;
and then acquiring daily use frequency of the password data and the account data, wherein the daily use frequency acquisition method comprises the following steps: acquiring the use times of the password data or the account data in one month, and dividing by 30 to obtain the corresponding daily use frequency;
multiplying the daily use frequency of the password data by k1 to obtain a first importance coefficient kz1, multiplying the daily use frequency of the account data by k2 to obtain a second importance coefficient kz2,
acquiring a memory of basic information data, and calculating the memory of the basic information data and k3 through a basic information importance formula to obtain a third importance coefficient kz3, wherein the basic information importance formula is configured as follows:
Figure 100002_DEST_PATH_IMAGE001
(ii) a Where, ncj is the memory of the basic information data, and N1 is the memory conversion ratio.
Further, acquiring a number of real-time parameters includes: acquiring real-time at the moment, wherein the real-time comprises time, minutes and seconds;
and acquiring the environment temperature of the real-time point, wherein the environment temperature adopts a degree centigrade as a unit and comprises a decimal place.
Further, setting a plurality of encryption and decryption methods based on the classified data comprises: firstly, obtaining integer bits of a first importance coefficient kz1, setting the integer bits as first importance quantity, and calculating the first importance quantity through a first encryption formula to obtain first encryption quantity; the first encryption formula is configured to:
Figure 694711DEST_PATH_IMAGE002
(ii) a Wherein Sj1 is a first encryption quantity, sz1 is a first importance quantity, and a1 is a first weight coefficient; setting a first encryption method of a first encryption quantity group, wherein the first encryption methods of the first encryption quantity group are respectively and correspondingly provided with a first decryption method; respectively marking the first encryption methods of the first encryption quantity group as M1j1 to M1jo, wherein M1j is a mark of the first encryption method, and o is a first encryption quantity;
acquiring integer bits of a second importance coefficient kz2, setting the integer bits as a second importance quantity, and calculating the second importance quantity through a second encryption formula to obtain a second encryption quantity; the second encryption formula is configured to:
Figure 100002_DEST_PATH_IMAGE003
(ii) a Wherein Sj2 is a second encryption number, sz2 is a second importance number, and a2 is a second weight coefficient; then setting a second adderThe second encryption methods of the second encryption quantity group are respectively and correspondingly provided with second decryption methods; respectively marking the second encryption methods of the second encryption quantity group as M2j1 to M2jp, wherein M2j is the mark of the second encryption method, and p is the second encryption quantity;
acquiring integral digits of a third importance coefficient kz3, setting the integral digits as a third importance quantity, and calculating the third importance quantity through a third encryption formula to obtain a third encryption quantity; the third encryption formula is configured to:
Figure 777068DEST_PATH_IMAGE004
(ii) a Wherein, sj3 is a third encryption quantity, sz3 is a third importance quantity, and a3 is a third weight coefficient; setting a third encryption method of a third encryption quantity group, wherein the third encryption methods of the third encryption quantity group are respectively and correspondingly provided with a third decryption method; respectively marking the third encryption methods of the third encryption quantity group as M3j1 to M3jq, wherein M3j is the mark of the third encryption method, and q is the third encryption quantity; wherein a1 is larger than a2, and a2 is larger than a3.
Further, the calculation is performed based on a plurality of real-time parameters, and the selection of the corresponding encryption and decryption method based on the calculation result comprises the following steps: firstly, obtaining an encryption selection value through an encryption selection formula; the encryption selection formula is configured as:
Figure 100002_DEST_PATH_IMAGE005
(ii) a Wherein, pjmx is an encryption selection value, th, tm and Ts are respectively time, minute and second of real-time, wz is an integer number of the ambient temperature, wx is a decimal number of the ambient temperature, alpha is an encryption supplement coefficient, and the value of alpha is a positive integer;
when the password data is encrypted and selected, dividing the encrypted and selected value by the first encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the o-th group of first encryption method for encryption; when the remainder is not zero, a first encryption method which selects the group number same as the remainder from the 1 st group to the o th group is used for encryption;
when the account data is encrypted and selected, dividing the encrypted selection value by the second encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the pth group of second encryption methods for encryption; when the remainder is not zero, a second encryption method which selects the group number same as the remainder from the 1 st group to the p th group is used for encryption;
when the basic information data is encrypted and selected, dividing the encrypted selected value by the third encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting a q-th group of third encryption methods for encryption; and when the remainder is not zero, encrypting by a third encryption method which selects the group number same as the remainder from the 1 st group to the q th group.
Further, setting a plurality of transmission channels based on the classified data includes: calculating the first importance quantity through a first channel formula to obtain a first channel value; the first channel formula is configured to:
Figure 234725DEST_PATH_IMAGE006
(ii) a Wherein Td1 is a first channel value, b1 is a first channel conversion ratio, integer bits of the first channel value are set as a first channel number, and transmission channels of the first channel number are then set; respectively marking the transmission channels with the first channel number as C1s 1-C1 sl, wherein C1s is the mark of the transmission channels with the first channel number, and l is the first channel number;
calculating the second importance quantity through a second channel formula to obtain a second channel value; the second channel formula is configured to:
Figure 100002_DEST_PATH_IMAGE007
(ii) a Wherein Td2 is a second channel value, b2 is a second channel conversion ratio, integer bits of the second channel value are set as a second channel number, and transmission channels of the second channel number are then set; respectively marking the transmission channels with the second channel quantity as C2s 1-C2 sm, wherein C2s is the mark of the transmission channels with the second channel quantity, and m is the second channel quantity;
calculating the third importance quantity through a third channel formula to obtain a third channel value; the third channel equation is configured to:
Figure 238585DEST_PATH_IMAGE008
(ii) a Wherein, td3 is a third channel value, b3 is a third channel conversion ratio, integer bits of the third channel value are set as the number of the third channels, and then transmission channels of the number of the third channels are set; respectively marking the transmission channels with the third channel number as C3s 1-C3 sn, wherein C3s is the mark of the transmission channels with the third channel number, and n is the third channel number; wherein b1 is less than b2 and b2 is less than b3.
Further, performing calculation based on the plurality of real-time parameters, and selecting the corresponding transmission channel based on the calculation result includes: firstly, channel selection values are obtained through a channel selection formula; the channel selection formula is configured as:
Figure 100002_DEST_PATH_IMAGE009
(ii) a Wherein Ptdx is a channel selection value, beta is an encryption supplement coefficient, and the value of beta is a positive integer;
when the transmission channel selection is carried out on the password data, dividing the channel selection value by the number of the first channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the first group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the l group for transmission;
when the transmission channel selection is carried out on the account data, dividing the channel selection value by the number of the second channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the mth group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the m th group for transmission;
when the transmission channel selection is carried out on the basic information data, dividing the channel selection value by the number of the third channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the nth group of transmission channels for transmission; when the remainder is not zero, the transmission channels with the same number of groups as the remainder are selected from the 1 st group to the nth group for transmission.
The information security data processing system comprises a data classification module, a real-time parameter acquisition module, a data encryption and decryption configuration module and a data transmission configuration module;
the data classification module is used for classifying data; the real-time parameter acquisition module is used for acquiring a plurality of real-time parameters;
the data encryption and decryption configuration module is used for setting a plurality of encryption and decryption methods based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result;
the data transmission configuration module is used for setting a plurality of transmission channels, calculating based on a plurality of real-time parameters and selecting the corresponding transmission channel based on the calculation result.
Further, the data classification module is configured with a data classification policy, the data classification policy comprising: firstly, respectively setting a first safety factor k1, a second safety factor k2 and a third safety factor k3 for password data, account data and basic information data;
and then acquiring daily use frequency of the password data and the account data, wherein the method for acquiring the daily use frequency comprises the following steps: acquiring the use times of the password data or the account data in one month, and dividing by 30 to obtain the corresponding daily use frequency;
multiplying the daily use frequency of the password data by k1 to obtain a first importance coefficient kz1, multiplying the daily use frequency of the account data by k2 to obtain a second importance coefficient kz2,
acquiring a memory of basic information data, and calculating the memory of the basic information data and k3 through a basic information importance formula to obtain a third importance coefficient kz3, wherein the basic information importance formula is configured as follows:
Figure 804171DEST_PATH_IMAGE010
(ii) a Where, ncj is the memory of the basic information data, and N1 is the memory conversion ratio.
The invention has the beneficial effects that: the invention firstly classifies the data; then collecting a plurality of real-time parameters; setting a plurality of encryption and decryption methods based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result; setting a plurality of transmission channels based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding transmission channel based on a calculation result; according to the method, different groups of encryption and decryption methods and transmission channels are set aiming at data with different importance, and real-time factors are integrated during selection, so that the selected encryption and decryption methods and transmission channels have randomness, and the safety of data protection processing is improved.
Advantages of additional aspects of the invention will be set forth in part in the description of the embodiments which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a flow chart of a processing method of the present invention;
FIG. 2 is a schematic block diagram of the processing system of the present invention.
Detailed Description
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention.
The embodiments and features of the embodiments of the present invention may be combined with each other without conflict.
Example one
Referring to fig. 2, the present invention provides an information security data processing system, which improves security of data processing by setting multiple sets of encryption/decryption methods and transmission channels and by providing randomness in selection of the encryption/decryption methods and the transmission channels, so as to solve the problems of single protection mode and insufficient data security of data processing in the existing information security field.
Specifically, the processing system comprises a data classification module, a real-time parameter acquisition module, a data encryption and decryption configuration module and a data transmission configuration module.
The data classification module is used for classifying the data; the data classification module is configured with a data classification strategy, and the data classification strategy comprises the following steps: firstly, respectively setting a first safety factor k1, a second safety factor k2 and a third safety factor k3 for password data, account data and basic information data; k1 is larger than k2, k2 is larger than k3, and the password data, the account data and the basic information data can be replaced by any data according to the requirements in the actual application process.
And then acquiring daily use frequency of the password data and the account data, wherein the method for acquiring the daily use frequency comprises the following steps: acquiring the use times of the password data or the account data in one month, and dividing by 30 to obtain the corresponding daily use frequency; the higher the use frequency, the higher the possibility that data is stolen, and because the times of transmission, storage, encryption and decryption are more, the security risk is higher;
multiplying the daily use frequency of the password data by k1 to obtain a first importance coefficient kz1, multiplying the daily use frequency of the account data by k2 to obtain a second importance coefficient kz2,
acquiring a memory of basic information data, and calculating the memory of the basic information data and k3 through a basic information importance formula to obtain a third importance coefficient kz3, wherein the basic information importance formula is configured as follows:
Figure 100002_DEST_PATH_IMAGE011
(ii) a Wherein Ncj is the memory of basic information data, N1 is the memory conversion ratio, the unit of the memory is GB, and the value of N1 is between 0 and 10.
The real-time parameter acquisition module is used for acquiring a plurality of real-time parameters; the real-time parameter acquisition module comprises a time acquisition unit and an ambient temperature acquisition unit; the real-time parameter acquisition module is configured with a real-time parameter acquisition strategy, and the real-time parameter acquisition strategy comprises the following steps: when a real-time parameter acquisition instruction is received, a time acquisition unit and an ambient temperature acquisition unit are started; acquiring real-time at the moment through a time acquisition unit, wherein the real-time comprises time, minutes and seconds; the ambient temperature of the real-time point is obtained through an ambient temperature obtaining unit, wherein the ambient temperature adopts a degree centigrade as a unit and comprises a decimal place. The real-time parameter acquisition module can be replaced by any acquired data, such as humidity in an acquisition environment, and the real-time parameter acquisition module is used for providing random data, so that a random numerical value is provided for subsequent encryption and decryption, data transmission and data storage, and the intensity of data protection is increased.
In the data encryption and decryption configuration module, different encryption and decryption methods are set according to different data, and randomness is provided for selection of the encryption and decryption methods, so that the cracking difficulty in data acquisition is further increased, and the safety of data processing is improved.
The data encryption and decryption configuration module is used for setting a plurality of encryption and decryption methods based on the classified data, the data encryption configuration module is configured with an encryption scheme configuration strategy, and the encryption scheme configuration strategy comprises the following steps: firstly, obtaining integer bits of a first importance coefficient kz1, setting the integer bits as first importance quantity, and calculating the first importance quantity through a first encryption formula to obtain first encryption quantity; the first encryption formula is configured to:
Figure 209875DEST_PATH_IMAGE012
(ii) a Wherein Sj1 is a first encryption quantity, sz1 is a first importance quantity, and a1 is a first weight coefficient; setting a first encryption method of a first encryption quantity group, wherein the first encryption methods of the first encryption quantity group are respectively and correspondingly provided with a first decryption method; respectively marking the first encryption methods of the first encryption quantity group as M1j1 to M1jo, wherein M1j is a mark of the first encryption method, and o is a first encryption quantity;
acquiring integer bits of a second importance coefficient kz2, setting the integer bits as a second importance quantity, and calculating the second importance quantity through a second encryption formula to obtain a second encryption quantity; the second encryption formula is configured to:
Figure 100002_DEST_PATH_IMAGE013
(ii) a Wherein Sj2 is a second encryption quantity, sz2 is a second importance quantity, and a2 is a second weight coefficient; setting a second encryption method of a second encryption quantity group, wherein the second encryption methods of the second encryption quantity group are respectively and correspondingly provided with second decryption methods; respectively marking the second encryption methods of the second encryption quantity group as M2j1 to M2jp, wherein M2j is the mark of the second encryption method, and p is the second encryption quantity;
obtaining integer bits of a third importance coefficient kz3, setting the integer bits as a third importance number, and calculating the third importance number through a third encryption formula to obtain a third encryption number; the third encryption formula is configured to:
Figure 104013DEST_PATH_IMAGE014
(ii) a Wherein, sj3 is a third encryption quantity, sz3 is a third importance quantity, and a3 is a third weight coefficient; setting a third encryption method of a third encryption quantity group, wherein the third encryption methods of the third encryption quantity group are respectively and correspondingly provided with a third decryption method; respectively marking the third encryption methods of the third encryption quantity group as M3j1 to M3jq, wherein M3j is the mark of the third encryption method, and q is the third encryption quantity; wherein a1 is larger than a2, a2 is larger than a3, and the values of a1, a2 and a3 are positive integers.
The data encryption configuration module carries out calculation based on a plurality of real-time parameters and selects a corresponding encryption and decryption method based on a calculation result; the data encryption configuration module is also configured with an encryption selection strategy, and the encryption selection strategy comprises the following steps: firstly, solving an encryption selection value through an encryption selection formula; the encryption selection formula is configured as:
Figure 100002_DEST_PATH_IMAGE015
(ii) a Wherein, pjmx is an encryption selection value, th, tm and Ts are respectively time, minute and second of real-time, wz is an integer number of the ambient temperature, wx is a decimal number of the ambient temperature, alpha is an encryption supplement coefficient, and the value of alpha is a positive integer;
when the password data is encrypted and selected, dividing the encrypted and selected value by the first encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the o-th group of first encryption methods for encryption; when the remainder is not zero, a first encryption method which selects the group number same as the remainder from the 1 st group to the o th group is used for encryption;
when the account data is encrypted and selected, dividing the encrypted selection value by the second encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the pth group of second encryption methods for encryption; when the remainder is not zero, a second encryption method which selects the group number same as the remainder from the 1 st group to the p th group is used for encryption;
when the basic information data is encrypted and selected, dividing the encrypted selection value by the third encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting a q-th group of third encryption methods for encryption; and when the remainder is not zero, a third encryption method for selecting the same group number as the remainder from the 1 st group to the q th group is used for encryption.
In the data transmission configuration module, different numbers of transmission channels are set according to different data, and the selection of the transmission channels is random, so that the cracking difficulty of the data transmission channels is further increased, and the safety of data transmission is improved.
The data transmission configuration module is used for setting a plurality of transmission channels based on the classified data, the data transmission configuration module is configured with a transmission channel configuration strategy, and the transmission channel configuration strategy comprises the following steps: calculating the first importance quantity through a first channel formula to obtain a first channel value; the first channel formula is configured to:
Figure 857818DEST_PATH_IMAGE016
(ii) a Wherein Td1 is a first channel value, b1 is a first channel conversion ratio, integer bits of the first channel value are set as a first channel number, and transmission channels of the first channel number are then set; respectively marking the transmission channels with the first channel number as C1s 1-C1 sl, wherein C1s is the mark of the transmission channels with the first channel number, and l is the first channel number;
calculating the second importance quantity through a second channel formula to obtain a second channel value; second channel formulaThe method comprises the following steps:
Figure DEST_PATH_IMAGE017
(ii) a Wherein Td2 is a second channel value, b2 is a second channel conversion ratio, integer bits of the second channel value are set as a second channel number, and transmission channels of the second channel number are then set; respectively marking the transmission channels with the second channel quantity as C2s 1-C2 sm, wherein C2s is the mark of the transmission channels with the second channel quantity, and m is the second channel quantity;
calculating the third importance quantity through a third channel formula to obtain a third channel value; the third channel equation is configured as:
Figure 964445DEST_PATH_IMAGE018
(ii) a Wherein, td3 is a third channel value, b3 is a third channel conversion ratio, integer bits of the third channel value are set as the number of the third channels, and then transmission channels of the number of the third channels are set; respectively marking the transmission channels with the third channel number as C3s 1-C3 sn, wherein C3s is the mark of the transmission channels with the third channel number, and n is the third channel number; wherein b1 is less than b2, b2 is less than b3, and the values of b1, b2 and b3 are positive integers.
The data transmission configuration module is used for calculating based on a plurality of real-time parameters and selecting a corresponding transmission channel based on a calculation result, and is also provided with a transmission channel selection strategy, wherein the transmission channel selection strategy comprises the following steps: firstly, obtaining a channel selection value through a channel selection formula; the channel selection formula is configured as follows:
Figure DEST_PATH_IMAGE019
(ii) a Wherein Ptdx is a channel selection value, beta is an encryption supplement coefficient, and the value of beta is a positive integer; the values of α and β are to further increase randomness, and may be temporarily set or adjusted.
When the transmission channel selection is carried out on the password data, dividing the channel selection value by the number of the first channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the first group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the l group for transmission;
when the account data is subjected to transmission channel selection, dividing the channel selection value by the number of the second channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the mth group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the m th group for transmission;
when the transmission channel selection is carried out on the basic information data, dividing the channel selection value by the number of the third channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the nth group of transmission channels for transmission; when the remainder is not zero, the transmission channel with the same group number as the remainder is selected from the 1 st group to the nth group for transmission.
The second embodiment is that, on the basis of the first embodiment, a configuration method for data storage security in a data processing process is added, and the specific scheme is as follows: the processing system also comprises a data storage configuration module, wherein the data storage configuration module sets different storage spaces according to different data, and has randomness in the selection of the storage spaces, so that the cracking difficulty of data storage positions is further increased, and the safety of data storage is improved.
The data storage configuration module is used for setting a plurality of storage spaces based on the classified data, and is configured with a data storage configuration strategy, and the data storage configuration strategy comprises the following steps: calculating the first importance quantity through a first storage formula to obtain a first storage quantity; the first stored formula is configured to:
Figure 490236DEST_PATH_IMAGE020
(ii) a CS1 is a first storage quantity, c1 is a first storage coefficient, and a first storage space of the first storage quantity is set; respectively marking first storage spaces with a first storage quantity as K1c 1-K1 cu, wherein K1c is a mark of the first storage space, and u is the first storage quantity;
calculating the second important quantity through a second storage formula to obtain a second storage quantity; the second stored formula is configured to:
Figure DEST_PATH_IMAGE021
(ii) a CS2 is a second storage quantity, c2 is a second storage coefficient, and a second storage space of the second storage quantity is set; marking second storage spaces with a second storage quantity as K2c 1-K2 cv respectively, wherein K2c is a mark of the second storage spaces, and v is the second storage quantity;
calculating the third importance quantity through a third storage formula to obtain a third storage quantity; the third stored formula is configured to:
Figure 44624DEST_PATH_IMAGE022
(ii) a Wherein CS3 is a third storage quantity, c3 is a third storage coefficient, and a third storage space of the third storage quantity is then set; and respectively marking the third storage spaces of the third storage quantity as K3c1 to K3cw, wherein K3c is the mark of the third storage space, and w is the third storage quantity. Wherein c1 is larger than c2, c2 is larger than c3, and the values of c1, c2 and c3 are all positive integers.
The data storage configuration module carries out calculation based on a plurality of real-time parameters and selects a corresponding storage space based on a calculation result, and is also configured with a data storage selection strategy, wherein the data storage selection strategy comprises the following steps: firstly, solving a storage selection value through a storage selection formula; the storage selection formula is configured as follows:
Figure DEST_PATH_IMAGE023
(ii) a Wherein, pccx is a storage selection value, lambda is a storage supplement coefficient, and the value of lambda is a positive integer; the value of λ is to further increase randomness, and may be temporarily set or adjusted.
When the storage space of the password data is selected, dividing the storage selection value by the number of the first channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the first storage space of the u group for storage; when the remainder is not zero, selecting a first storage space with the same number of groups as the remainder from the 1 st group to the u th group for storage; when the selection of the subsequent first storage space is repeated, the first storage space which is not stored is backwards and forwards delayed to the first storage space;
when the account number data is subjected to storage space selection, dividing the storage selection value by the number of the second channels to obtain a quotient and a remainder, and when the remainder is zero, selecting a v-th group of second storage space for storage; when the remainder is not zero, selecting a second storage space with the same number of groups as the remainder from the 1 st group to the v th group for storage; when the selection of the subsequent second storage space is repeated, the storage space is backwards and forwards extended to the second storage space which is not stored;
when the storage space of the basic information data is selected, dividing the storage selection value by the number of the third channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the w-th group of third storage space to store; and when the remainder is not zero, selecting a third storage space with the number of groups same as that of the remainder from the 1 st group to the w th group for storage, and when the selection of the subsequent third storage space is repeated, carrying out backward forward to the third storage space which is not stored. Because the storage space, the encryption and decryption methods and the transmission channel have different properties, after the storage space is selected for storage, the following data can not be stored in the storage space, so that the two encryption and decryption methods and the transmission channel can be selected repeatedly by adopting a sequential mode, namely different data can select the same encryption and decryption method and transmission channel.
EXAMPLE III
Referring to fig. 1, a third embodiment provides an information security data processing method based on the first and second embodiments, where the processing method includes the following steps:
step A, classifying data; the step A also comprises the following steps:
step A1, firstly, respectively setting a first safety factor k1, a second safety factor k2 and a third safety factor k3 for password data, account data and basic information data;
step A2, daily use frequency of the password data and the account data is obtained, wherein the daily use frequency obtaining method comprises the following steps: acquiring the use times of the password data or the account data in one month, and dividing by 30 to obtain the corresponding daily use frequency;
step A3, multiplying daily use frequency of the password data by k1 to obtain a first importance coefficient kz1, multiplying daily use frequency of the account data by k2 to obtain a second importance coefficient kz2,
step A4, obtaining a memory of the basic information data, and calculating the memory of the basic information data and k3 through a basic information importance formula to obtain a third importance coefficient kz3, wherein the basic information importance formula is configured as follows:
Figure 288655DEST_PATH_IMAGE024
(ii) a Where, ncj is the memory of the basic information data, and N1 is the memory conversion ratio.
B, collecting a plurality of real-time parameters; the step B also comprises the following steps:
step B1, acquiring the real-time at the moment, wherein the real-time comprises time, minutes and seconds;
and step B2, acquiring the environment temperature of the real-time point, wherein the environment temperature adopts the temperature in centigrade as a unit and comprises a decimal place.
Step C, setting a plurality of encryption and decryption methods based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result; step C also comprises the following steps:
step C11, firstly, obtaining integer bits of the first importance coefficient kz1, setting the integer bits as first importance quantities, and calculating the first importance quantities through a first encryption formula to obtain first encryption quantities; the first encryption formula is configured to:
Figure DEST_PATH_IMAGE025
(ii) a Wherein Sj1 is a first encryption quantity, sz1 is a first importance quantity, and a1 is a first weight coefficient; setting a first encryption method of a first encryption quantity group, wherein the first encryption methods of the first encryption quantity group are respectively and correspondingly provided with a first decryption method; respectively marking the first encryption methods of the first encryption quantity group as M1j1 to M1jo, wherein M1j is a mark of the first encryption method, and o is a first encryption quantity;
step C12, obtaining integral digits of the second importance coefficient kz2 and setting the integral digits as the secondCalculating the second importance quantity through a second encryption formula to obtain a second encryption quantity; the second encryption formula is configured to:
Figure 464552DEST_PATH_IMAGE026
(ii) a Wherein Sj2 is a second encryption number, sz2 is a second importance number, and a2 is a second weight coefficient; setting a second encryption method of a second encryption quantity group, wherein the second encryption methods of the second encryption quantity group are respectively and correspondingly provided with a second decryption method; respectively marking the second encryption methods of the second encryption quantity group as M2j1 to M2jp, wherein M2j is the mark of the second encryption method, and p is the second encryption quantity;
step C13, obtaining integer bits of a third importance coefficient kz3, setting the integer bits as a third importance quantity, and calculating the third importance quantity through a third encryption formula to obtain a third encryption quantity; the third encryption formula is configured to:
Figure DEST_PATH_IMAGE027
(ii) a Wherein, sj3 is a third encryption quantity, sz3 is a third importance quantity, and a3 is a third weight coefficient; setting a third encryption method of a third encryption quantity group, wherein the third encryption methods of the third encryption quantity group are respectively and correspondingly provided with a third decryption method; respectively marking the third encryption methods of the third encryption quantity group as M3j1 to M3jq, wherein M3j is the mark of the third encryption method, and q is the third encryption quantity; wherein a1 is larger than a2, and a2 is larger than a3.
Step C21, firstly, obtaining an encryption selection value through an encryption selection formula; the encryption selection formula is configured as:
Figure 107499DEST_PATH_IMAGE028
(ii) a Wherein, pjmx is an encryption selection value, th, tm and Ts are respectively time, minute and second of real-time, wz is an integer number of the ambient temperature, wx is a decimal number of the ambient temperature, alpha is an encryption supplement coefficient, and the value of alpha is a positive integer;
step C22, when the password data is encrypted and selected, dividing the encrypted and selected value by the first encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the o-th group of first encryption methods for encryption; when the remainder is not zero, a first encryption method which selects the group number same as the remainder from the 1 st group to the o th group is used for encryption;
step C23, when the account data is encrypted and selected, dividing the encrypted selection value by the second encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the pth group of second encryption methods for encryption; when the remainder is not zero, a second encryption method which selects the group number same as the remainder from the 1 st group to the p th group is used for encryption;
step C24, when the basic information data is encrypted and selected, dividing the encrypted selection value by the third encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting a q-th group of third encryption methods for encryption; and when the remainder is not zero, a third encryption method for selecting the same group number as the remainder from the 1 st group to the q th group is used for encryption.
Step D, setting a plurality of transmission channels based on the classified data, calculating based on a plurality of real-time parameters, and selecting the corresponding transmission channel based on the calculation result; step D also comprises the following steps:
step D11, calculating the first importance quantity through a first channel formula to obtain a first channel value; the first channel formula is configured to:
Figure DEST_PATH_IMAGE029
(ii) a Wherein, td1 is a first channel value, b1 is a first channel conversion ratio, integer bits of the first channel value are set as a first channel number, and then transmission channels of the first channel number are set; respectively marking the transmission channels with the first channel number as C1s 1-C1 sl, wherein C1s is the mark of the transmission channels with the first channel number, and l is the first channel number;
d12, calculating the second importance quantity through a second channel formula to obtain a second channel value; the second channel formula is configured to:
Figure 812281DEST_PATH_IMAGE030
(ii) a Where Td2 is the second channel value, and b2 is the second channelA conversion ratio, namely setting integer bits of the second channel value as the number of second channels and setting transmission channels of the number of the second channels; respectively marking the transmission channels with the second channel number as C2s1 to C2sm, wherein C2s is the mark of the transmission channels with the second channel number, and m is the second channel number;
step D13, calculating the third importance quantity through a third channel formula to obtain a third channel value; the third channel equation is configured as:
Figure DEST_PATH_IMAGE031
(ii) a Wherein, td3 is a third channel value, b3 is a third channel conversion ratio, integer bits of the third channel value are set as the number of the third channels, and then transmission channels of the number of the third channels are set; respectively marking the transmission channels with the third channel number as C3s 1-C3 sn, wherein C3s is the mark of the transmission channels with the third channel number, and n is the third channel number; wherein b1 is less than b2 and b2 is less than b3.
Step D21, firstly, obtaining a channel selection value through a channel selection formula; the channel selection formula is configured as follows:
Figure 543608DEST_PATH_IMAGE032
(ii) a Wherein Ptdx is a channel selection value, beta is an encryption supplement coefficient, and the value of beta is a positive integer;
step D22, when the transmission channel selection is carried out on the password data, dividing the channel selection value by the number of the first channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the first group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channel with the same group number as the remainder from the 1 st group to the l group for transmission;
step D23, when the transmission channel selection is carried out on the account data, dividing the channel selection value by the number of the second channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the mth group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the m th group for transmission;
step D24, when the transmission channel selection is carried out on the basic information data, dividing the channel selection value by the number of the third channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the nth group of transmission channels for transmission; when the remainder is not zero, the transmission channels with the same number of groups as the remainder are selected from the 1 st group to the nth group for transmission.
Step E, setting a plurality of storage spaces based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding storage space based on a calculation result; step E further comprises the steps of:
e11, calculating the first importance quantity through a first storage formula to obtain a first storage quantity; the first stored formula is configured to:
Figure DEST_PATH_IMAGE033
(ii) a CS1 is a first storage quantity, c1 is a first storage coefficient, and a first storage space of the first storage quantity is set; respectively marking first storage spaces of the first storage quantity as K1c 1-K1 cu, wherein K1c is a mark of the first storage space, and u is the first storage quantity;
e12, calculating the second importance quantity through a second storage formula to obtain a second storage quantity; the second stored formula is configured to:
Figure 989108DEST_PATH_IMAGE034
(ii) a CS2 is a second storage quantity, c2 is a second storage coefficient, and a second storage space of the second storage quantity is set; marking second storage spaces of a second storage quantity as K2c1 to K2cv respectively, wherein K2c is a mark of the second storage spaces, and v is the second storage quantity;
step E13, calculating the third importance quantity through a third storage formula to obtain a third storage quantity; the third stored formula is configured to:
Figure DEST_PATH_IMAGE035
(ii) a Wherein CS3 is a third storage quantity, c3 is a third storage coefficient, and a third storage space of the third storage quantity is set; respectively marking third storage spaces with third storage quantity as K3c1 to K3cw, wherein K3c is of the third storage spacesAnd w is the third storage amount.
Step E21, firstly, a storage selection value is obtained through a storage selection formula; the storage selection formula is configured as follows:
Figure 958332DEST_PATH_IMAGE036
(ii) a Wherein, pccx is a storage selection value, lambda is a storage supplement coefficient, and the value of lambda is a positive integer;
step E22, when the storage space of the password data is selected, dividing the storage selection value by the number of the first channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the first storage space of the u group for storage; when the remainder is not zero, selecting a first storage space with the same number of groups as the remainder from the 1 st group to the u th group for storage; when the selection of the subsequent first storage space is repeated, the first storage space which is not stored is backwards and forwards delayed to the first storage space;
step E23, when the storage space of the account data is selected, dividing the storage selection value by the number of the second channel to obtain a quotient and a remainder, and when the remainder is zero, selecting the second storage space of the v-th group for storage; when the remainder is not zero, selecting a second storage space with the same number of groups as the remainder from the 1 st group to the v th group for storage; when the selection of the subsequent second storage space is repeated, the subsequent second storage space is backwards and forwards extended to the second storage space which is not stored;
step E24, when the storage space of the basic information data is selected, dividing the storage selection value by the number of the third channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the w-th group of third storage space for storage; and when the remainder is not zero, selecting a third storage space with the same number of groups as the remainder from the 1 st group to the w th group for storage, and when the selection of the subsequent third storage space is repeated, carrying out backward forward delay to the third storage space which is not stored.
The above formulas are all calculated by taking the numerical value of the dimension, the formula is a formula of the latest real situation obtained by collecting a large amount of data and performing software simulation, the preset parameters in the formula are set by the technicians in the field according to the actual situation, if the weight coefficient and the scale coefficient exist, the set size is a specific numerical value obtained by quantizing each parameter, the subsequent comparison is convenient, and as for the size of the weight coefficient and the scale coefficient, the proportional relation between the parameter and the quantized numerical value is not influenced.
In the embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to the related descriptions of other embodiments.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied in the media. The storage medium may be implemented by any type of volatile or nonvolatile storage device or combination thereof, such as a Static Random Access Memory (SRAM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), an Erasable Programmable Read-Only Memory (EPROM), a Programmable Read-Only Memory (PROM), an on-Read Memory (ROM), a magnetic Memory, a flash Memory, a magnetic disk, or an optical disk. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
Although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those skilled in the art that the following descriptions are only illustrative and not restrictive, and that the scope of the present invention is not limited to the above embodiments: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (6)

1. The information security data processing method is characterized by comprising the following steps:
classifying the data;
collecting a plurality of real-time parameters;
setting a plurality of encryption and decryption methods based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result;
setting a plurality of transmission channels based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding transmission channel based on a calculation result;
the method comprises the following steps of calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result: firstly, solving an encryption selection value through an encryption selection formula; the encryption selection formula is configured as:
Figure DEST_PATH_IMAGE001
(ii) a Wherein, pjmx is an encryption selection value, th, tm and Ts are respectively time, minute and second of real-time, wz is an integer number of the ambient temperature, wx is a decimal number of the ambient temperature, alpha is an encryption supplement coefficient, and the value of alpha is a positive integer;
when the password data is encrypted and selected, dividing the encrypted and selected value by the first encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the o-th group of first encryption methods for encryption; when the remainder is not zero, a first encryption method which selects the group number same as the remainder from the 1 st group to the o th group is used for encryption;
when the account data is encrypted and selected, dividing the encrypted selection value by the second encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the pth group of second encryption methods for encryption; when the remainder is not zero, a second encryption method which selects the group number same as the remainder from the 1 st group to the p th group is used for encryption;
when the basic information data is encrypted and selected, dividing the encrypted selection value by the third encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting a q-th group of third encryption methods for encryption; when the remainder is not zero, a third encryption method which selects the group number same as the remainder from the 1 st group to the q th group is used for encryption;
setting a plurality of transmission channels based on the classified data includes: calculating the first importance quantity through a first channel formula to obtain a first channel value; the first channel formula is configured to:
Figure 2865DEST_PATH_IMAGE002
(ii) a Wherein Td1 is a first channel value, b1 is a first channel conversion ratio, integer bits of the first channel value are set as a first channel number, and transmission channels of the first channel number are then set; respectively marking the transmission channels with the first channel quantity as C1s 1-C1 sl, wherein C1s is the mark of the transmission channels with the first channel quantity, and l is the first channel quantity;
calculating the second importance quantity through a second channel formula to obtain a second channel value; the second channel formula is configured to:
Figure DEST_PATH_IMAGE003
(ii) a Wherein Td2 is a second channel value, b2 is a second channel conversion ratio, integer bits of the second channel value are set as a second channel number, and then transmission channels of the second channel number are set; respectively marking the transmission channels with the second channel number as C2s1 to C2sm, wherein C2s is the mark of the transmission channels with the second channel number, and m is the second channel number;
calculating the third importance quantity through a third channel formula to obtain a third channel value; the third channel equation is configured to:
Figure 464546DEST_PATH_IMAGE004
(ii) a Wherein, td3 is a third channel value, b3 is a third channel conversion ratio, integer bits of the third channel value are set as the number of the third channels, and then transmission channels of the number of the third channels are set; respectively marking the transmission channels with the number of the third channels as C3s1 to C3sn, wherein C3s is the mark of the transmission channels with the number of the third channels, and n is the number of the third channels; wherein b1 is less than b2, and b2 is less than b3;
calculating based on the plurality of real-time parameters, and selecting the corresponding transmission channel based on the calculation result comprises: firstly, obtaining a channel selection value through a channel selection formula; the channel selection formula is configured as:
Figure DEST_PATH_IMAGE005
(ii) a Wherein Ptdx is a channel selection value, beta is an encryption supplement coefficient, and the value of beta is a positive integer;
when the transmission channel selection is carried out on the password data, dividing the channel selection value by the number of the first channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the l group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channel with the same group number as the remainder from the 1 st group to the l group for transmission;
when the transmission channel selection is carried out on the account data, dividing the channel selection value by the number of the second channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the mth group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the m th group for transmission;
when the transmission channel selection is carried out on the basic information data, dividing the channel selection value by the number of the third channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the nth group of transmission channels for transmission; when the remainder is not zero, the transmission channels with the same number of groups as the remainder are selected from the 1 st group to the nth group for transmission.
2. The information security data processing method of claim 1, wherein classifying the data comprises: firstly, respectively setting a first safety factor k1, a second safety factor k2 and a third safety factor k3 for password data, account data and basic information data;
and then acquiring daily use frequency of the password data and the account data, wherein the method for acquiring the daily use frequency comprises the following steps: acquiring the use times of the password data or the account data in one month, and dividing by 30 to obtain the corresponding daily use frequency;
multiplying the daily use frequency of the password data by k1 to obtain a first importance coefficient kz1, multiplying the daily use frequency of the account data by k2 to obtain a second importance coefficient kz2,
acquiring a memory of basic information data, and calculating the memory of the basic information data and k3 through a basic information importance formula to obtain a third importance coefficient kz3, wherein the basic information importance formula is configured as follows:
Figure 916387DEST_PATH_IMAGE006
(ii) a Where, ncj is the memory of the basic information data, and N1 is the memory conversion ratio.
3. The information and security data processing method of claim 1, wherein collecting the plurality of real-time parameters comprises: acquiring real-time at the moment, wherein the real-time comprises time, minutes and seconds;
and acquiring the environment temperature of the real-time point, wherein the environment temperature adopts a degree centigrade as a unit and comprises a decimal place.
4. The information security data processing method of claim 2, wherein setting a plurality of encryption and decryption methods based on the classified data comprises: firstly, obtaining integer bits of a first importance coefficient kz1, setting the integer bits as first importance quantity, and calculating the first importance quantity through a first encryption formula to obtain first encryption quantity; what is needed isThe first encryption formula is configured to:
Figure DEST_PATH_IMAGE007
(ii) a Wherein Sj1 is a first encryption quantity, sz1 is a first importance quantity, and a1 is a first weight coefficient; setting a first encryption method of a first encryption quantity group, wherein the first encryption methods of the first encryption quantity group are respectively and correspondingly provided with a first decryption method; respectively marking the first encryption methods of the first encryption quantity group as M1j1 to M1jo, wherein M1j is a mark of the first encryption method, and o is a first encryption quantity;
acquiring integral digits of a second importance coefficient kz2, setting the integral digits as a second importance number, and calculating the second importance number through a second encryption formula to obtain a second encryption number; the second encryption formula is configured to:
Figure 186962DEST_PATH_IMAGE008
(ii) a Wherein Sj2 is a second encryption number, sz2 is a second importance number, and a2 is a second weight coefficient; setting a second encryption method of a second encryption quantity group, wherein the second encryption methods of the second encryption quantity group are respectively and correspondingly provided with a second decryption method; respectively marking the second encryption methods of the second encryption quantity group as M2j1 to M2jp, wherein M2j is the mark of the second encryption method, and p is the second encryption quantity;
acquiring integral digits of a third importance coefficient kz3, setting the integral digits as a third importance quantity, and calculating the third importance quantity through a third encryption formula to obtain a third encryption quantity; the third encryption formula is configured to:
Figure DEST_PATH_IMAGE009
(ii) a Wherein, sj3 is a third encryption quantity, sz3 is a third importance quantity, and a3 is a third weight coefficient; setting a third encryption method of a third encryption quantity group, wherein the third encryption methods of the third encryption quantity group are respectively and correspondingly provided with a third decryption method; respectively marking the third encryption methods of the third encryption quantity group as M3j1 to M3jq, wherein M3j is the mark of the third encryption method, and q is the third encryption methodThe number of the particles; wherein a1 is larger than a2, and a2 is larger than a3.
5. The information security data processing system is characterized by comprising a data classification module, a real-time parameter acquisition module, a data encryption and decryption configuration module and a data transmission configuration module;
the data classification module is used for classifying data; the real-time parameter acquisition module is used for acquiring a plurality of real-time parameters;
the data encryption and decryption configuration module is used for setting a plurality of encryption and decryption methods based on the classified data, calculating based on a plurality of real-time parameters, and selecting a corresponding encryption and decryption method based on a calculation result;
the data transmission configuration module is used for setting a plurality of transmission channels, calculating based on a plurality of real-time parameters and selecting a corresponding transmission channel based on a calculation result;
the data encryption configuration module is also configured with an encryption selection strategy, and the encryption selection strategy comprises the following steps: firstly, obtaining an encryption selection value through an encryption selection formula; the encryption selection formula is configured as:
Figure 608192DEST_PATH_IMAGE010
(ii) a Wherein Pjmx is an encryption selection value, th, tm and Ts are time, minute and second of real-time respectively, wz is an integer number of ambient temperature, wx is a decimal number of ambient temperature, alpha is an encryption supplement coefficient, and the value of alpha is a positive integer;
when the password data is encrypted and selected, dividing the encrypted and selected value by the first encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the o-th group of first encryption method for encryption; when the remainder is not zero, a first encryption method which selects the group number same as the remainder from the 1 st group to the o th group is used for encryption;
when the account data is encrypted and selected, dividing the encrypted selection value by the second encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting the pth group of second encryption methods for encryption; when the remainder is not zero, selecting a second encryption method with the same group number as the remainder from the 1 st group to the p th group for encryption;
when the basic information data is encrypted and selected, dividing the encrypted selected value by the third encryption number to obtain a quotient and a remainder, and when the remainder is zero, selecting a q-th group of third encryption methods for encryption; when the remainder is not zero, a third encryption method which selects the group number same as the remainder from the 1 st group to the q th group is used for encryption;
the data transmission configuration module is configured with a transmission channel configuration strategy, and the transmission channel configuration strategy comprises the following steps: calculating the first importance quantity through a first channel formula to obtain a first channel value; the first channel formula is configured to:
Figure DEST_PATH_IMAGE011
(ii) a Wherein Td1 is a first channel value, b1 is a first channel conversion ratio, integer bits of the first channel value are set as a first channel number, and transmission channels of the first channel number are then set; respectively marking the transmission channels with the first channel number as C1s 1-C1 sl, wherein C1s is the mark of the transmission channels with the first channel number, and l is the first channel number;
calculating the second importance quantity through a second channel formula to obtain a second channel value; the second pass formula is configured to:
Figure 712545DEST_PATH_IMAGE012
(ii) a Wherein Td2 is a second channel value, b2 is a second channel conversion ratio, integer bits of the second channel value are set as a second channel number, and transmission channels of the second channel number are then set; respectively marking the transmission channels with the second channel number as C2s1 to C2sm, wherein C2s is the mark of the transmission channels with the second channel number, and m is the second channel number;
calculating the third importance quantity through a third channel formula to obtain a third channel value; the third channel equation is configured as:
Figure DEST_PATH_IMAGE013
(ii) a Wherein Td3 is a third channel value, b3 is a third channel conversion ratio, and the third channel value is obtainedThe integer number of the first channel is set as the number of the third channels, and then the transmission channels of the number of the third channels are set; respectively marking the transmission channels with the number of the third channels as C3s1 to C3sn, wherein C3s is the mark of the transmission channels with the number of the third channels, and n is the number of the third channels; wherein b1 is less than b2, and b2 is less than b3;
the data transmission configuration module is also configured with a transmission channel selection strategy, and the transmission channel selection strategy comprises the following steps: firstly, obtaining a channel selection value through a channel selection formula; the channel selection formula is configured as follows:
Figure 651682DEST_PATH_IMAGE014
(ii) a Wherein Ptdx is a channel selection value, beta is an encryption supplement coefficient, and the value of beta is a positive integer;
when the transmission channel selection is carried out on the password data, dividing the channel selection value by the number of the first channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the l group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the l group for transmission;
when the transmission channel selection is carried out on the account data, dividing the channel selection value by the number of the second channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the mth group of transmission channels for transmission; when the remainder is not zero, selecting the transmission channels with the same group number as the remainder from the 1 st group to the m th group for transmission;
when the transmission channel selection is carried out on the basic information data, dividing the channel selection value by the number of the third channels to obtain a quotient and a remainder, and when the remainder is zero, selecting the nth group of transmission channels for transmission; when the remainder is not zero, the transmission channel with the same group number as the remainder is selected from the 1 st group to the nth group for transmission.
6. The information security data processing system of claim 5, wherein the data classification module is configured with a data classification policy comprising: firstly, respectively setting a first safety factor k1, a second safety factor k2 and a third safety factor k3 for password data, account data and basic information data;
and then acquiring daily use frequency of the password data and the account data, wherein the method for acquiring the daily use frequency comprises the following steps: acquiring the number of times of using the password data or the account data in one month, and dividing by 30 to obtain the corresponding daily use frequency;
multiplying the daily use frequency of the password data by k1 to obtain a first importance coefficient kz1, multiplying the daily use frequency of the account data by k2 to obtain a second importance coefficient kz2,
acquiring a memory of basic information data, and calculating the memory of the basic information data and k3 through a basic information importance formula to obtain a third importance coefficient kz3, wherein the basic information importance formula is configured as follows:
Figure DEST_PATH_IMAGE015
(ii) a Where, ncj is the memory of the basic information data, and N1 is the memory conversion ratio.
CN202211219467.6A 2022-10-08 2022-10-08 Information security data processing method and system Active CN115296935B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211219467.6A CN115296935B (en) 2022-10-08 2022-10-08 Information security data processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211219467.6A CN115296935B (en) 2022-10-08 2022-10-08 Information security data processing method and system

Publications (2)

Publication Number Publication Date
CN115296935A CN115296935A (en) 2022-11-04
CN115296935B true CN115296935B (en) 2022-12-20

Family

ID=83834616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211219467.6A Active CN115296935B (en) 2022-10-08 2022-10-08 Information security data processing method and system

Country Status (1)

Country Link
CN (1) CN115296935B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254327A (en) * 2016-07-28 2016-12-21 努比亚技术有限公司 Information processor and method
CN110942538A (en) * 2019-12-04 2020-03-31 国网上海市电力公司 Remote authorized real-time Bluetooth electronic key with encryption algorithm
CN113206875A (en) * 2021-04-27 2021-08-03 深圳市晨北科技有限公司 Data transmission method, device and storage medium
CN114268457A (en) * 2021-11-23 2022-04-01 贵州电网有限责任公司 Multi-protocol multi-service public network security access method
CN115118490A (en) * 2022-06-24 2022-09-27 沈阳琰讯科技有限公司 Data confidentiality transmission method and system based on Internet of things

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10037689B2 (en) * 2015-03-24 2018-07-31 Donald Warren Taylor Apparatus and system to manage monitored vehicular flow rate
US11557927B2 (en) * 2017-05-16 2023-01-17 Ahmad L. D. Glover Systems, devices, and/or methods for managing electrical energy

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254327A (en) * 2016-07-28 2016-12-21 努比亚技术有限公司 Information processor and method
CN110942538A (en) * 2019-12-04 2020-03-31 国网上海市电力公司 Remote authorized real-time Bluetooth electronic key with encryption algorithm
CN113206875A (en) * 2021-04-27 2021-08-03 深圳市晨北科技有限公司 Data transmission method, device and storage medium
CN114268457A (en) * 2021-11-23 2022-04-01 贵州电网有限责任公司 Multi-protocol multi-service public network security access method
CN115118490A (en) * 2022-06-24 2022-09-27 沈阳琰讯科技有限公司 Data confidentiality transmission method and system based on Internet of things

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于FMO和NAL的视频加密方案;陈勤等;《计算机应用与软件》(第10期);全文 *

Also Published As

Publication number Publication date
CN115296935A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
Chen et al. Can machine learning help predict the outcome of asylum adjudications?
Yeung et al. Infinite horizon dynamic games: a new approach via information updating
CN110737859B (en) UP master matching method and device
CN111767707A (en) Method, device, equipment and storage medium for detecting Rayleigh case
CN107689008A (en) A kind of user insures the method and device of behavior prediction
CN109804360B (en) Secure intelligent networking architecture, processing and execution
CN115357941B (en) Privacy removing method and system based on generating artificial intelligence
Lopes et al. Phylogenomic discordance in the eared seals is best explained by incomplete lineage sorting following explosive radiation in the southern hemisphere
CN106327196A (en) Payment threshold acquisition method and device
CN107784117A (en) The declaration form of settlement of insurance claim case determines method and apparatus
CN106372977B (en) A kind of processing method and equipment of virtual account
Gabrielli et al. Invasion percolation and critical transient in the Barabási model of human dynamics
CN115296935B (en) Information security data processing method and system
CN112100219A (en) Report generation method, device, equipment and medium based on database query processing
Larson et al. Spatial patterns of overstory trees in late-successional conifer forests
Carbognani et al. Different temperature perception in high‐elevation plants: new insight into phenological development and implications for climate change in the alpine tundra
CN112328882B (en) Information recommendation method, device, terminal equipment and storage medium
CN110968547B (en) Information screening method and system
CN111950624A (en) Client risk assessment model construction method and device, storage medium and terminal equipment
CN111507397A (en) Abnormal data analysis method and device
Waage Nonstationarity water planning methods
CN115689370B (en) Forest asset management performance evaluation index system construction method based on analytic hierarchy process
CN116051296B (en) Customer evaluation analysis method and system based on standardized insurance data
CN117390684B (en) Data encryption processing method and system based on slice level association
CN116614679B (en) Optimization processing method and system for short video advertisement delivery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant