CN115333735A - Safe data transmission method - Google Patents

Safe data transmission method Download PDF

Info

Publication number
CN115333735A
CN115333735A CN202211237320.XA CN202211237320A CN115333735A CN 115333735 A CN115333735 A CN 115333735A CN 202211237320 A CN202211237320 A CN 202211237320A CN 115333735 A CN115333735 A CN 115333735A
Authority
CN
China
Prior art keywords
encryption
value
decimal
window
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211237320.XA
Other languages
Chinese (zh)
Other versions
CN115333735B (en
Inventor
刘彦伸
郭银锋
虞雁群
吴艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yu'an Information Technology Co ltd
Original Assignee
Zhejiang Yu'an Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yu'an Information Technology Co ltd filed Critical Zhejiang Yu'an Information Technology Co ltd
Priority to CN202211237320.XA priority Critical patent/CN115333735B/en
Publication of CN115333735A publication Critical patent/CN115333735A/en
Application granted granted Critical
Publication of CN115333735B publication Critical patent/CN115333735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Abstract

The invention relates to the technical field of mobile communication, in particular to a safe data transmission method, which converts data to be transmitted into a binary coding sequence, converts the binary coding sequence into a decimal coding sequence and obtains a decimal characteristic matrix; acquiring a target encryption window of the decimal feature matrix based on the integral centrifugation degree of the decimal feature matrix and a first centrifugation degree under encryption windows of different sizes, acquiring a clustering threshold value according to a feature value of the target encryption window, dividing all the target encryption windows into a plurality of clustering results based on the clustering threshold value and the feature value, acquiring an encryption matrix of each clustering result according to a numerical value in the target encryption window, and acquiring a decimal encryption sequence corresponding to the decimal feature matrix according to the encryption matrix; and converting the decimal encryption sequence into binary encryption codes by using a modulo two division method for transmission. The invention utilizes the random characteristic to carry out the self-adaptive acquisition of the encryption window, thereby improving the safety of data transmission.

Description

Safe data transmission method
Technical Field
The invention relates to the technical field of mobile communication, in particular to a secure data transmission method.
Background
Data encryption is a long-history technology, and means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key. Especially today in the information age, most information transmission is based on internet, so the security in the transmission process is more important, and the importance of data encryption is more important.
The popular conventional data encryption technology is only for data encryption or segment encryption. However, in time, the encryption is performed in segments, the used keys are the same, the data attention degree of the encryption method is insufficient, in order to improve the encryption effect, only the data of the keys can be adjusted, the data quantity of the encrypted keys is insufficient, the encryption safety is not high, the data are easy to crack violently, the number of the encrypted keys is too large, the safety is sufficient, the encryption redundancy of the encrypted data is easy to cause, and the transmission resource is too large.
Disclosure of Invention
In order to solve the above technical problems, an object of the present invention is to provide a method for secure data transmission, which adopts the following technical solutions:
carrying out binary coding on data to be transmitted by utilizing a conventional binary compression coding technology to obtain a binary coding sequence;
converting each binary coding sequence into a decimal coding sequence to obtain a decimal feature matrix; calculating the integral centrifugation degree based on each numerical value of the decimal feature matrix, setting an encryption window, traversing on the decimal feature matrix by using the encryption window to calculate the first centrifugation degree of each encryption window, and adding the difference value between each first centrifugation degree and the integral centrifugation degree to obtain the centrifugation degree difference value of the decimal feature matrix under the encryption window;
acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes, and taking the encryption window corresponding to the minimum centrifugal degree difference value as a target encryption window;
calculating the characteristic value of the decimal characteristic matrix corresponding to each target encryption window based on each numerical value in the target encryption window, and combining the characteristic value and the total number of numerical values in the decimal characteristic matrix to obtain a clustering threshold value; calculating a characteristic value difference value corresponding to any two target encryption windows, and clustering all the target encryption windows based on the characteristic value difference and the clustering threshold value to obtain m clustering results, wherein m is a positive integer;
respectively obtaining an encryption matrix of a corresponding clustering result based on the numerical value of each target encryption window in each clustering result, and performing multiplication operation on the numerical value in the encryption matrix and the numerical value in each target encryption window in the corresponding clustering result to form a decimal encryption sequence; and converting the decimal encryption sequence into binary encryption codes by using a modulo two division method for transmission.
Further, the method for obtaining the overall centrifugation degree comprises the following steps:
and calculating a numerical variance according to each numerical value in the decimal feature matrix, and taking the numerical variance as the integral centrifugation degree.
Further, the method for acquiring the first centrifugation degree includes:
and calculating a numerical variance according to each numerical value in the encryption window, and taking the numerical variance as the first centrifugation degree.
Further, the method for acquiring the characteristic value includes:
calculating the value average of all the values in the target encryption window, squaring the difference value between each value and the value average, and taking the ratio of the square result to the number of the values in the target encryption window as the characteristic value of the corresponding target encryption window.
Further, the method for obtaining the clustering threshold includes:
accumulating the characteristic values of all the target encryption windows to obtain a characteristic value accumulated value, obtaining a ratio of the characteristic value accumulated value to the total number of the numerical values in the decimal characteristic matrix, and optimizing the value by utilizing an adjusting parameter to obtain the clustering threshold value.
Further, the method for obtaining the encryption matrix includes:
for clustering results
Figure 656811DEST_PATH_IMAGE001
Carrying out average value calculation on the ith number value of each target encryption window, and forming a clustering result by all average values
Figure 511634DEST_PATH_IMAGE001
The encryption matrix of (2).
The embodiment of the invention at least has the following beneficial effects: compared with the traditional encryption algorithm which is based on bit fixing segmentation when data is segmented, the fixed segmentation mode does not consider the characteristics of the whole data and the characteristics of each segment after segmentation when the whole data is segmented, the scheme calculates the encryption matrix of each clustering result to complete the encryption of the data by continuously analyzing the randomness of the whole code and the randomness of codes in a region and then utilizing the randomness characteristics to carry out self-adaptation of an encryption window on the basis of carrying out characteristic amplification by utilizing the matrix according to the binary coding, so that the number of keys is less, the encryption algorithm is different due to different characteristics of different data in the encryption process, and the security is higher.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions and advantages of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart illustrating steps of a method for securely transmitting data according to an embodiment of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description of a method for secure data transmission according to the present invention, its specific implementation, structure, features and effects will be given in conjunction with the accompanying drawings and preferred embodiments. In the following description, the different references to "one embodiment" or "another embodiment" do not necessarily refer to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The following describes a specific scheme of the secure data transmission method provided by the present invention in detail with reference to the accompanying drawings.
The specific scenes aimed by the invention are as follows: in the data transmission process, data is often encrypted due to the privacy and the security of the data, and the existing encryption of the whole data or the segmented data by using the same algorithm easily causes insufficient encryption security or data redundancy, so that the whole binary data is subjected to decimal, then the encryption windows are self-adaptive and clustered, and the windows of the same category are encrypted to realize the secure transmission of the data.
Referring to fig. 1, a flowchart of steps of a method for securely transmitting data according to an embodiment of the present invention is shown, where the method includes the following steps:
and S001, carrying out binary coding on data to be transmitted by utilizing a conventional binary compression coding technology to obtain a binary coding sequence.
Specifically, the encryption algorithm in this scheme is directed to binary data, so that the existing compression coding technology needs to be used to perform binary coding on data to be transmitted according to the type of the data to be transmitted, for example, text data may use the existing GZIP compression coding technology, which specifically includes: firstly, text data is encoded by using LZ77, and then the LZ77 is secondarily compressed by using Huffman coding, so that a binary coding sequence of data to be transmitted is obtained.
Step S002, converting the binary coding sequence into a decimal coding sequence to obtain a decimal characteristic matrix; calculating the integral centrifugation degree based on each numerical value of the decimal feature matrix, setting an encryption window, traversing on the decimal feature matrix by using the encryption window to calculate the first centrifugation degree of each encryption window, and adding the difference value between each first centrifugation degree and the integral centrifugation degree to obtain the centrifugation degree difference value of the decimal feature matrix under the encryption window; and acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes, and taking the encryption window corresponding to the minimum centrifugal degree difference value as a target encryption window.
Specifically, when encrypting data, a conventional encryption algorithm needs to encrypt the data in segments because the data is too long, whereas the conventional encryption algorithm performs fixed segmentation on the data based on bits, when segmenting the entire data, the fixed segmentation method does not consider the characteristics of the entire data and the characteristics of each segment after segmentation, and further when encrypting, some parts of the code are originally very large compared with the overall random degree, so that the conventional encryption method is used for encrypting too many times, resulting in more keys and easily causing waste of resources.
Based on the above reasons, the decimal coding sequence is generated from the binary coding sequence of the data to be transmitted, which specifically comprises: the conversion from binary code to decimal code requires determining the value interval of decimal system, which is generally
Figure 229055DEST_PATH_IMAGE002
In which
Figure 358685DEST_PATH_IMAGE003
The smaller the value is, the finer the binary coding is converted into the decimal coding, the more accurate characteristics close to the binary are extracted and quantized by the characteristics of the binary coding on the decimal coding, but the processing workload is larger relatively, and vice versa, the preferred selection is summarized in the embodiment of the invention
Figure 2418DEST_PATH_IMAGE004
The calculated amount is reduced as much as possible on the basis of not losing the binary coding characteristics too much, the actual implementation process can be selected by the operator according to the actual requirements of the implementer, and the value range of each decimal code is
Figure 700247DEST_PATH_IMAGE005
Obtained by 8-bit binary coding. And then, generating a decimal characteristic matrix for the decimal coding sequence by utilizing the conventional matrix generation technology.
In order to realize the self-adaptation of the size of the encryption window, the integral randomness of the decimal feature matrix needs to be calculated by utilizing the centrifugation degree, the self-adaptation of the size of the encryption window is carried out by utilizing the random analysis of data in the encryption window by taking the integral randomness as a standard, and the method for acquiring the self-adaptation encryption window comprises the following steps:
(1) Calculating the integral centrifugal degree of the decimal feature matrix
Figure 701701DEST_PATH_IMAGE006
The calculation formula is as follows:
Figure 838284DEST_PATH_IMAGE007
wherein the content of the first and second substances,
Figure 440650DEST_PATH_IMAGE008
for the decimal feature matrix
Figure 168434DEST_PATH_IMAGE009
The number of the individual values is,
Figure 594868DEST_PATH_IMAGE010
and is and
Figure 269562DEST_PATH_IMAGE011
the total number of all values in the decimal feature matrix.
It is noted thatThe logic of the calculation formula is: and calculating the average value of all the numerical values in the decimal feature matrix, and then accumulating the difference value between each numerical value and the average value. The purpose of calculating the average value of all the numerical values is to judge the integral dispersion degree of the decimal feature matrix, then the difference value of each numerical value and the average value is accumulated to show the centrifugation degree of the numerical value, the average value is used as the heart, the single difference value is used as the centrifugation degree of the single numerical value, and then the centrifugation degree is accumulated as the integral
Figure 809259DEST_PATH_IMAGE006
The larger the overall centrifugation degree is, the larger the difference between the data in the decimal feature matrix is, and the more discrete the difference is.
(2) Is initially set up to
Figure 911208DEST_PATH_IMAGE012
A size of the encryption window, traversing on the decimal feature matrix using the encryption window to compute each
Figure 887254DEST_PATH_IMAGE012
Encrypting the first centrifugation degrees of the windows, and further obtaining the difference value between each first centrifugation degree and the whole centrifugation degree
Figure 100060DEST_PATH_IMAGE012
And encrypting the centrifugal degree difference of the decimal feature matrix under the window.
In particular, in the following
Figure 87739DEST_PATH_IMAGE013
An encryption window, for example, of a first degree of decentralization
Figure 95009DEST_PATH_IMAGE014
The calculation method is as follows:
Figure 558352DEST_PATH_IMAGE015
wherein, the first and the second end of the pipe are connected with each other,
Figure 574849DEST_PATH_IMAGE016
is as follows
Figure 980816DEST_PATH_IMAGE013
In an encryption window
Figure 424567DEST_PATH_IMAGE017
The number of the individual values is,
Figure 109626DEST_PATH_IMAGE018
Figure 929815DEST_PATH_IMAGE014
is a first
Figure 740688DEST_PATH_IMAGE013
An
Figure 886499DEST_PATH_IMAGE012
And encrypting the window.
J decimal feature matrixes corresponding to the first centrifugal degree can be obtained according to the calculation mode of the first centrifugal degree
Figure 996537DEST_PATH_IMAGE012
Encrypting a first degree of decentralization of the window, then according to J
Figure 354837DEST_PATH_IMAGE012
The first centrifugal degree of the encryption window is different from the integral centrifugal degree of the decimal feature matrix, and the calculation judgment mode is calculation
Figure 109298DEST_PATH_IMAGE012
Centrifugal degree difference value of decimal feature matrix under encryption window
Figure 160430DEST_PATH_IMAGE019
Figure 820082DEST_PATH_IMAGE020
Figure 5510DEST_PATH_IMAGE019
If it is negative, the description is given in
Figure 4690DEST_PATH_IMAGE012
When the encryption windows are divided, the difference general trend of the data in each encryption window is not dispersed enough compared with the whole encryption window, namely the data in the encryption windows are not random enough;
Figure 961145DEST_PATH_IMAGE019
is positive, the other way round, and
Figure 842513DEST_PATH_IMAGE019
if the value is positive, the larger the value is, the larger the difference of the data is compared with the whole data, and the higher the randomness of the data in the encryption window is.
(3) And (3) acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes by using the methods from the step (1) to the step (2), and taking the encryption window with the size corresponding to the minimum centrifugal degree difference value as a target encryption window.
It should be noted that the reason for selecting the minimum centrifugation degree difference is that the first centrifugation degree of each encryption window is closest to the overall centrifugation degree, when encryption is performed on a window of this size, the calculation amount is minimum, and the number of encryption keys can effectively reduce the influence of the key length on the overall data amount.
S003, calculating a characteristic value of the decimal characteristic matrix corresponding to each target encryption window based on each numerical value in the target encryption window, and acquiring a clustering threshold value by combining the characteristic value and the total number of numerical values in the decimal characteristic matrix; and calculating a characteristic value difference value corresponding to any two target encryption windows, and clustering all the target encryption windows based on the characteristic value difference and the clustering threshold value to obtain m clustering results.
Specifically, feature extraction is performed on each target encryption window, and taking the jth target encryption window as an example, the calculation of the feature value of the jth target encryption window is commonly:
Figure 808195DEST_PATH_IMAGE021
wherein the content of the first and second substances,
Figure 724199DEST_PATH_IMAGE022
is as follows
Figure 851555DEST_PATH_IMAGE013
In the target encryption window
Figure 423482DEST_PATH_IMAGE017
The number of the individual values is,
Figure 724013DEST_PATH_IMAGE023
is as follows
Figure 963364DEST_PATH_IMAGE013
The average of all values in the individual target encryption windows,
Figure 996042DEST_PATH_IMAGE024
representing the total number of all values in the target encryption window.
It should be noted that the logic and purpose of the formula for calculating the feature value are: the variance of the whole numerical value in each target encryption window is used as the characteristic value of the target encryption window, because the first centrifugal degree is used for carrying out self-adaptive acquisition on the encryption windows, the average values of elements in each encryption window are basically equal, and then clustering of the target encryption windows is carried out through the variance, the target encryption windows are clustered into the same class, wherein the variances of all the numerical values in the same class are close to each other, and the same encryption key is used for encryption.
Obtaining the characteristic value of each target encryption window by using a calculation formula of the characteristic values, and obtaining a clustering threshold value K based on the characteristic values and the total number of numerical values in the decimal characteristic matrix, wherein the calculation formula of the clustering threshold value K is as follows:
Figure 320844DEST_PATH_IMAGE025
wherein the content of the first and second substances,
Figure 628329DEST_PATH_IMAGE026
is shown as
Figure 253345DEST_PATH_IMAGE013
The value of the characteristic of the individual target encryption windows,
Figure 722504DEST_PATH_IMAGE027
representing the total number of values in the decimal feature matrix,
Figure 82072DEST_PATH_IMAGE028
in order to adjust the parameters of the device,
Figure 193248DEST_PATH_IMAGE029
logic of the calculation formula of the clustering threshold K: carrying out overall summation on the characteristic values of each target encryption window, calculating the characteristic of each decimal data through the overall characteristic values to carry out average characteristic distribution, and then carrying out threshold value size adjustment according to an adjustment parameter, wherein the range of the adjustment parameter is 1 to
Figure 938350DEST_PATH_IMAGE024
I.e. the threshold size is chosen to be a variable range, when
Figure 47251DEST_PATH_IMAGE030
When the difference in cluster size is the difference between each class, when
Figure 877804DEST_PATH_IMAGE031
The difference in cluster size is explained as the difference between each class, that is, the characteristic difference between each target encryption window.
Preferably, in the embodiments of the present invention
Figure 261512DEST_PATH_IMAGE032
Using clustering thresholds
Figure 329962DEST_PATH_IMAGE033
And clustering all the target encryption windows in a clustering mode that the absolute value of the difference value of the characteristic values between every two target encryption windows is smaller than a clustering threshold value, and then considering that the two target encryption windows belong to the same class of encryption windows, and dividing all the target encryption windows into m clustering results, wherein m is a positive integer.
Step S004, respectively obtaining an encryption matrix corresponding to the clustering result based on the numerical value of each target encryption window in each clustering result, and performing multiplication operation on the numerical value in the encryption matrix and the numerical value in each target encryption window in the corresponding clustering result to form a decimal encryption sequence corresponding to the decimal feature matrix; and converting the decimal encryption sequence into binary encryption codes by using modulo two division for transmission.
Specifically, the encryption matrix corresponding to each clustering result is obtained, and the specific method is as follows: by clustering results
Figure 140923DEST_PATH_IMAGE034
Taking the ith encryption value of the corresponding encryption matrix as an example, the calculation formula of the ith encryption value is as follows:
Figure 458772DEST_PATH_IMAGE035
wherein the content of the first and second substances,
Figure 380592DEST_PATH_IMAGE036
as a result of clustering
Figure 303549DEST_PATH_IMAGE034
To middle
Figure 550990DEST_PATH_IMAGE037
The ith value of the target encryption window;
Figure 559398DEST_PATH_IMAGE038
as a result of clustering
Figure 347225DEST_PATH_IMAGE034
Corresponding to the ith encryption value in the encryption matrix,
Figure 859109DEST_PATH_IMAGE039
as a result of clustering
Figure 277452DEST_PATH_IMAGE034
The number of target encryption windows in (1).
Obtaining clustering result based on calculation formula of encrypted value
Figure 304314DEST_PATH_IMAGE034
And obtaining the encryption matrix of each clustering result in the same way. And finally, performing multiplication operation on the numerical value in each encryption matrix and the numerical value at the corresponding position in each target encryption window in the corresponding clustering result respectively, forming a decimal encryption sequence corresponding to the decimal characteristic matrix by the calculation result, converting the decimal encryption sequence into a binary encryption code by a modulo two division method, and transmitting the binary encryption code.
It should be noted that since the encryption matrix and the target encryption window are the same size, performing the multiplication does not change the encrypted data structure.
In summary, the embodiment of the present invention provides a method for safely transmitting data, in which data to be transmitted is converted into a binary coding sequence, and the binary coding sequence is converted into a decimal coding sequence, so as to obtain a decimal feature matrix; acquiring target encryption windows of the decimal feature matrix based on the integral centrifugation degree of the decimal feature matrix and first centrifugation degrees under encryption windows of different sizes, acquiring a clustering threshold value according to a feature value of the target encryption windows, dividing all the target encryption windows into a plurality of clustering results based on the clustering threshold value and the feature value, acquiring an encryption matrix of each clustering result according to a numerical value in the target encryption windows, and acquiring a decimal encryption sequence corresponding to the decimal feature matrix according to the encryption matrix; and converting the decimal encryption sequence into binary encryption codes by using a modulo two division method for transmission. The invention utilizes the random characteristic to carry out the self-adaptive acquisition of the encryption window, thereby improving the safety of data transmission.
It should be noted that: the sequence of the above embodiments of the present invention is only for description, and does not represent the advantages or disadvantages of the embodiments. And specific embodiments thereof have been described above. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit of the present invention are intended to be included therein.

Claims (6)

1. A method for secure transmission of data, the method comprising the steps of:
carrying out binary coding on data to be transmitted by utilizing a conventional binary compression coding technology to obtain a binary coding sequence;
converting the binary coding sequence into a decimal coding sequence to obtain a decimal feature matrix; calculating the integral centrifugation degree based on each numerical value of the decimal feature matrix, setting an encryption window, traversing on the decimal feature matrix by using the encryption window to calculate the first centrifugation degree of each encryption window, and adding the difference value between each first centrifugation degree and the integral centrifugation degree to obtain the centrifugation degree difference value of the decimal feature matrix under the encryption window;
acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes, and taking the encryption window corresponding to the minimum centrifugal degree difference value as a target encryption window;
calculating the characteristic value of the decimal characteristic matrix corresponding to each target encryption window based on each numerical value in the target encryption window, and obtaining a clustering threshold value by combining the characteristic value and the total number of numerical values in the decimal characteristic matrix; calculating a characteristic value difference value corresponding to any two target encryption windows, and clustering all the target encryption windows based on the characteristic value difference and the clustering threshold value to obtain m clustering results, wherein m is a positive integer;
respectively obtaining an encryption matrix of a corresponding clustering result based on the numerical value of each target encryption window in each clustering result, and performing multiplication operation on the numerical value in the encryption matrix and the numerical value in each target encryption window in the corresponding clustering result to form a decimal encryption sequence; and converting the decimal encryption sequence into binary encryption codes by using a modulo two division method for transmission.
2. The method for securely transmitting data according to claim 1, wherein the method for acquiring the overall centrifugation degree comprises:
and calculating a numerical variance according to each numerical value in the decimal feature matrix, and taking the numerical variance as the integral centrifugation degree.
3. The method for securely transmitting data according to claim 1, wherein the method for acquiring the first centrifugal degree comprises:
and calculating a numerical variance according to each numerical value in the encryption window, and taking the numerical variance as the first centrifugation degree.
4. The method for securely transmitting data according to claim 1, wherein the method for obtaining the characteristic value comprises:
calculating the value average of all the values in the target encryption window, squaring the difference value between each value and the value average, and taking the ratio of the square result to the number of the values in the target encryption window as the characteristic value of the corresponding target encryption window.
5. The method for securely transmitting data according to claim 1, wherein the method for obtaining the clustering threshold comprises:
accumulating the characteristic values of all the target encryption windows to obtain a characteristic value accumulated value, obtaining a ratio of the characteristic value accumulated value to the total number of the numerical values in the decimal characteristic matrix, and optimizing the value by utilizing an adjusting parameter to obtain the clustering threshold value.
6. The method for securely transmitting data according to claim 1, wherein the method for obtaining the encryption matrix comprises:
for clustering results
Figure 101551DEST_PATH_IMAGE001
Carrying out average value calculation on the ith number value of each target encryption window, and forming a clustering result by all average values
Figure 733521DEST_PATH_IMAGE001
The encryption matrix of (2).
CN202211237320.XA 2022-10-11 2022-10-11 Safe data transmission method Active CN115333735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211237320.XA CN115333735B (en) 2022-10-11 2022-10-11 Safe data transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211237320.XA CN115333735B (en) 2022-10-11 2022-10-11 Safe data transmission method

Publications (2)

Publication Number Publication Date
CN115333735A true CN115333735A (en) 2022-11-11
CN115333735B CN115333735B (en) 2023-03-14

Family

ID=83914661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211237320.XA Active CN115333735B (en) 2022-10-11 2022-10-11 Safe data transmission method

Country Status (1)

Country Link
CN (1) CN115333735B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115567329A (en) * 2022-12-06 2023-01-03 互丰科技(北京)有限公司 Data security encryption method for network information
CN115577380A (en) * 2022-12-01 2023-01-06 武汉惠强新能源材料科技有限公司 Material data management method and system based on MES system
CN115883841A (en) * 2023-03-03 2023-03-31 济南霍兹信息科技有限公司 Computer information storage system based on Huffman coding
CN116226893A (en) * 2023-05-09 2023-06-06 北京明苑风华文化传媒有限公司 Client marketing information management system based on Internet of things
CN116405293A (en) * 2023-04-07 2023-07-07 光谷技术有限公司 Data encryption storage method of safe operation and maintenance system
CN116566748A (en) * 2023-07-11 2023-08-08 南通原力云信息技术有限公司 Small program data transmission encryption method
CN116861271A (en) * 2023-09-05 2023-10-10 智联信通科技股份有限公司 Data analysis processing method based on big data
CN117221018A (en) * 2023-11-09 2023-12-12 北京睿航至臻科技有限公司 Data security transmission method and system based on data coding
CN117792640A (en) * 2024-02-22 2024-03-29 中国科学技术大学 Method and system for dynamically adjusting quantum key grouping size and quantum key window size
CN117792640B (en) * 2024-02-22 2024-04-30 中国科学技术大学 Method and system for dynamically adjusting quantum key grouping size and quantum key window size

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4862510A (en) * 1987-03-24 1989-08-29 Emhart Industries, Inc. Lead sense system for component insertion machine
US4885784A (en) * 1985-07-10 1989-12-05 Fuji Electric Company Ltd. System for binary encoding a picture
CN101124589A (en) * 2004-08-09 2008-02-13 图形安全系统公司 System and method for authenticating objects using multiple-level encoding and decoding
FR2954491A1 (en) * 2009-12-23 2011-06-24 Thales Sa OPTICAL ENCODER.
CN102592239A (en) * 2005-04-19 2012-07-18 微软公司 Network commercial transactions
CN102651828A (en) * 2011-02-23 2012-08-29 上海博路信息技术有限公司 Mobile terminal-based dynamic traffic information system
KR20130062108A (en) * 2011-12-02 2013-06-12 삼성전자주식회사 Method and apparatus for encoding and decoding binary image using an adaptive template
CN103402185A (en) * 2013-07-30 2013-11-20 东北石油大学 Private information transfer method
CN103927469A (en) * 2014-04-23 2014-07-16 无锡北斗星通信息科技有限公司 Dynamic password generation method based on iris information
CN105450232A (en) * 2014-08-28 2016-03-30 华为技术有限公司 Encoding method, decoding method, encoding device and decoding device
CN105592761A (en) * 2013-09-30 2016-05-18 雀巢产品技术援助有限公司 Code support and capsule for preparing a beverage by centrifugation, system and method for preparing a beverage by centrifugation
CN107590842A (en) * 2017-09-05 2018-01-16 山东师范大学 Intersect the image encryption method and device of dynamic chaos password based on pixel and DNA
CN107921522A (en) * 2015-06-15 2018-04-17 米沃奇电动工具公司 Hydraulic crimping machine instrument
CN110324146A (en) * 2018-03-30 2019-10-11 Sap欧洲公司 Alleviation to offline attack with known plaintext
CN110826554A (en) * 2018-08-10 2020-02-21 西安电子科技大学 Infrared target detection method
US20200092176A1 (en) * 2018-09-13 2020-03-19 Cable Television Laboratories, Inc. Machine learning algorithms for quality of service assurance in network traffic
CN112035695A (en) * 2020-08-04 2020-12-04 东南大学 Spatial data encryption method suitable for mobile terminal
CN113396326A (en) * 2018-12-19 2021-09-14 核酸有限责任公司 Apparatus and method for molecular diagnostics
CN113474840A (en) * 2018-12-21 2021-10-01 百欧恩泰美国公司 Methods and systems for predicting HLA class II specific epitopes and characterizing CD4+ T cells

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4885784A (en) * 1985-07-10 1989-12-05 Fuji Electric Company Ltd. System for binary encoding a picture
US4862510A (en) * 1987-03-24 1989-08-29 Emhart Industries, Inc. Lead sense system for component insertion machine
CN101124589A (en) * 2004-08-09 2008-02-13 图形安全系统公司 System and method for authenticating objects using multiple-level encoding and decoding
CN102592239A (en) * 2005-04-19 2012-07-18 微软公司 Network commercial transactions
FR2954491A1 (en) * 2009-12-23 2011-06-24 Thales Sa OPTICAL ENCODER.
CN102651828A (en) * 2011-02-23 2012-08-29 上海博路信息技术有限公司 Mobile terminal-based dynamic traffic information system
KR20130062108A (en) * 2011-12-02 2013-06-12 삼성전자주식회사 Method and apparatus for encoding and decoding binary image using an adaptive template
CN103402185A (en) * 2013-07-30 2013-11-20 东北石油大学 Private information transfer method
CN105592761A (en) * 2013-09-30 2016-05-18 雀巢产品技术援助有限公司 Code support and capsule for preparing a beverage by centrifugation, system and method for preparing a beverage by centrifugation
CN113303670A (en) * 2013-09-30 2021-08-27 雀巢产品有限公司 System and method for preparing a beverage by centrifugation
CN103927469A (en) * 2014-04-23 2014-07-16 无锡北斗星通信息科技有限公司 Dynamic password generation method based on iris information
CN105450232A (en) * 2014-08-28 2016-03-30 华为技术有限公司 Encoding method, decoding method, encoding device and decoding device
CN107921522A (en) * 2015-06-15 2018-04-17 米沃奇电动工具公司 Hydraulic crimping machine instrument
CN107590842A (en) * 2017-09-05 2018-01-16 山东师范大学 Intersect the image encryption method and device of dynamic chaos password based on pixel and DNA
CN110324146A (en) * 2018-03-30 2019-10-11 Sap欧洲公司 Alleviation to offline attack with known plaintext
CN110826554A (en) * 2018-08-10 2020-02-21 西安电子科技大学 Infrared target detection method
US20200092176A1 (en) * 2018-09-13 2020-03-19 Cable Television Laboratories, Inc. Machine learning algorithms for quality of service assurance in network traffic
CN113396326A (en) * 2018-12-19 2021-09-14 核酸有限责任公司 Apparatus and method for molecular diagnostics
CN113474840A (en) * 2018-12-21 2021-10-01 百欧恩泰美国公司 Methods and systems for predicting HLA class II specific epitopes and characterizing CD4+ T cells
CN112035695A (en) * 2020-08-04 2020-12-04 东南大学 Spatial data encryption method suitable for mobile terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SONG-HAI ZHANG等: "What and where: A context-based recommendation system for object insertion", 《COMPUTATIONAL VISUAL MEDIA》 *
岳少博等: "基于融合模糊聚类算法的云信息存储加密仿真", 《计算机仿真》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115577380A (en) * 2022-12-01 2023-01-06 武汉惠强新能源材料科技有限公司 Material data management method and system based on MES system
CN115567329B (en) * 2022-12-06 2023-02-28 互丰科技(北京)有限公司 Data security encryption method for network information
CN115567329A (en) * 2022-12-06 2023-01-03 互丰科技(北京)有限公司 Data security encryption method for network information
CN115883841A (en) * 2023-03-03 2023-03-31 济南霍兹信息科技有限公司 Computer information storage system based on Huffman coding
CN115883841B (en) * 2023-03-03 2023-05-26 济南霍兹信息科技有限公司 Huffman coding-based computer information storage system
CN116405293B (en) * 2023-04-07 2023-09-01 光谷技术有限公司 Data encryption storage method of safe operation and maintenance system
CN116405293A (en) * 2023-04-07 2023-07-07 光谷技术有限公司 Data encryption storage method of safe operation and maintenance system
CN116226893A (en) * 2023-05-09 2023-06-06 北京明苑风华文化传媒有限公司 Client marketing information management system based on Internet of things
CN116226893B (en) * 2023-05-09 2023-08-01 北京明苑风华文化传媒有限公司 Client marketing information management system based on Internet of things
CN116566748A (en) * 2023-07-11 2023-08-08 南通原力云信息技术有限公司 Small program data transmission encryption method
CN116566748B (en) * 2023-07-11 2023-09-12 南通原力云信息技术有限公司 Small program data transmission encryption method
CN116861271A (en) * 2023-09-05 2023-10-10 智联信通科技股份有限公司 Data analysis processing method based on big data
CN116861271B (en) * 2023-09-05 2023-12-08 智联信通科技股份有限公司 Data analysis processing method based on big data
CN117221018A (en) * 2023-11-09 2023-12-12 北京睿航至臻科技有限公司 Data security transmission method and system based on data coding
CN117221018B (en) * 2023-11-09 2024-01-30 北京睿航至臻科技有限公司 Data security transmission method and system based on data coding
CN117792640A (en) * 2024-02-22 2024-03-29 中国科学技术大学 Method and system for dynamically adjusting quantum key grouping size and quantum key window size
CN117792640B (en) * 2024-02-22 2024-04-30 中国科学技术大学 Method and system for dynamically adjusting quantum key grouping size and quantum key window size

Also Published As

Publication number Publication date
CN115333735B (en) 2023-03-14

Similar Documents

Publication Publication Date Title
CN115333735B (en) Safe data transmission method
CN107359987B (en) Multidimensional negotiation method for continuous variable quantum key distribution under finite dimension effect
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
US20220263694A1 (en) Apparatus for multi-level encoding
CN115296862B (en) Network data safety transmission method based on data coding
CN107528687A (en) Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation
CN115085923A (en) Data processing-based applet data encryption method
CN111199740A (en) Unloading method for accelerating automatic voice recognition task based on edge calculation
CN107437976B (en) Data processing method and equipment
CN115834023A (en) Data encryption method based on big data
CN106899524A (en) Safety access method based on channel estimating and user QoS
CN103746701A (en) Rapid encoding option selecting method applied to Rice lossless data compression
Wang et al. Spiking Semantic Communication for Feature Transmission with HARQ
CN112187452B (en) Transmission method for continuous variable quantum key distribution
CN114722932A (en) Commercial cipher algorithm identification method, system, medium, equipment and terminal
Sumszyk et al. Information embedding with reversible stegotext
CN112507366A (en) Method and system for efficient data aggregation of multidimensional data in smart power grid
CN116405293B (en) Data encryption storage method of safe operation and maintenance system
Yang et al. Design and analysis of lossy source coding of Gaussian sources with finite-length polar codes
CN117155408B (en) Efficient transmission method for production data
CN116996628B (en) Network data transmission protection method
CN117354059B (en) Data sharing method based on cloud edge end cooperation
CN115314715A (en) Reversible information hiding method based on differential coding and block compression
CN115292739B (en) Data management method of metal mold design system
CN108449163A (en) A kind of polarization code method for analyzing performance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Secure Data Transmission Method

Granted publication date: 20230314

Pledgee: Zhejiang Hangzhou Yuhang Rural Commercial Bank Co.,Ltd. Science and Technology City Branch

Pledgor: Zhejiang Yu'an Information Technology Co.,Ltd.

Registration number: Y2024980010210

PE01 Entry into force of the registration of the contract for pledge of patent right