CN115333735B - Safe data transmission method - Google Patents

Safe data transmission method Download PDF

Info

Publication number
CN115333735B
CN115333735B CN202211237320.XA CN202211237320A CN115333735B CN 115333735 B CN115333735 B CN 115333735B CN 202211237320 A CN202211237320 A CN 202211237320A CN 115333735 B CN115333735 B CN 115333735B
Authority
CN
China
Prior art keywords
encryption
value
decimal
window
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211237320.XA
Other languages
Chinese (zh)
Other versions
CN115333735A (en
Inventor
刘彦伸
郭银锋
虞雁群
吴艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yu'an Information Technology Co ltd
Original Assignee
Zhejiang Yu'an Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yu'an Information Technology Co ltd filed Critical Zhejiang Yu'an Information Technology Co ltd
Priority to CN202211237320.XA priority Critical patent/CN115333735B/en
Publication of CN115333735A publication Critical patent/CN115333735A/en
Application granted granted Critical
Publication of CN115333735B publication Critical patent/CN115333735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Abstract

The invention relates to the technical field of mobile communication, in particular to a safe data transmission method, which converts data to be transmitted into a binary coding sequence, and converts the binary coding sequence into a decimal coding sequence to obtain a decimal characteristic matrix; acquiring a target encryption window of the decimal feature matrix based on the integral centrifugation degree of the decimal feature matrix and a first centrifugation degree under encryption windows of different sizes, acquiring a clustering threshold value according to a feature value of the target encryption window, dividing all the target encryption windows into a plurality of clustering results based on the clustering threshold value and the feature value, acquiring an encryption matrix of each clustering result according to a numerical value in the target encryption window, and acquiring a decimal encryption sequence corresponding to the decimal feature matrix according to the encryption matrix; and converting the decimal encryption sequence into binary encryption codes by using a modulo two division method for transmission. The invention utilizes the random characteristic to carry out the self-adaptive acquisition of the encryption window, thereby improving the safety of data transmission.

Description

Safe data transmission method
Technical Field
The invention relates to the technical field of mobile communication, in particular to a secure data transmission method.
Background
Data encryption is a long-history technology, and means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key. Especially today in the information age, most information transmission is based on internet, so the security in the transmission process is more important, and the importance of data encryption is more important.
The popular conventional data encryption technology is only for data encryption or segment encryption. However, in time, the encryption is performed in segments, the used keys are the same, the data attention degree of the encryption method is insufficient, in order to improve the encryption effect, only the data of the keys can be adjusted, the data quantity of the encrypted keys is insufficient, the encryption safety is not high, the data are easy to crack violently, the number of the encrypted keys is too large, the safety is sufficient, the encryption redundancy of the encrypted data is easy to cause, and the transmission resource is too large.
Disclosure of Invention
In order to solve the above technical problems, an object of the present invention is to provide a method for secure data transmission, which adopts the following technical solutions:
carrying out binary coding on data to be transmitted by utilizing a conventional binary compression coding technology to obtain a binary coding sequence;
converting each binary coding sequence into a decimal coding sequence to obtain a decimal feature matrix; calculating the integral centrifugation degree based on each numerical value of the decimal feature matrix, setting an encryption window, traversing on the decimal feature matrix by using the encryption window to calculate the first centrifugation degree of each encryption window, and adding the difference value between each first centrifugation degree and the integral centrifugation degree to obtain the centrifugation degree difference value of the decimal feature matrix under the encryption window;
acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes, and taking the encryption window corresponding to the minimum centrifugal degree difference value as a target encryption window;
calculating the characteristic value of the decimal characteristic matrix corresponding to each target encryption window based on each numerical value in the target encryption window, and combining the characteristic value and the total number of numerical values in the decimal characteristic matrix to obtain a clustering threshold value; calculating a characteristic value difference value corresponding to any two target encryption windows, and clustering all the target encryption windows based on the characteristic value difference and the clustering threshold value to obtain m clustering results, wherein m is a positive integer;
respectively obtaining an encryption matrix of a corresponding clustering result based on the numerical value of each target encryption window in each clustering result, and performing multiplication operation on the numerical value in the encryption matrix and the numerical value in each target encryption window in the corresponding clustering result to form a decimal encryption sequence; and converting the decimal encryption sequence into binary encryption codes by using modulo two division for transmission.
Further, the method for obtaining the overall centrifugation degree comprises the following steps:
and calculating a numerical variance according to each numerical value in the decimal feature matrix, and taking the numerical variance as the integral centrifugation degree.
Further, the method for acquiring the first centrifugation degree comprises the following steps:
and calculating a numerical variance according to each numerical value in the encryption window, and taking the numerical variance as the first centrifugation degree.
Further, the method for acquiring the characteristic value includes:
and calculating the value average value of all the values in the target encryption window, squaring the difference value between each value and the value average value, and taking the ratio of the square result to the number of the values in the target encryption window as the characteristic value of the corresponding target encryption window.
Further, the method for obtaining the clustering threshold includes:
accumulating the characteristic values of all the target encryption windows to obtain a characteristic value accumulated value, obtaining a ratio of the characteristic value accumulated value to the total number of the numerical values in the decimal characteristic matrix, and optimizing the value by utilizing an adjusting parameter to obtain the clustering threshold value.
Further, the method for acquiring the encryption matrix includes:
for clustering results
Figure 656811DEST_PATH_IMAGE001
Carrying out average value calculation on the ith number value of each target encryption window, and forming a clustering result by all average values
Figure 511634DEST_PATH_IMAGE001
The encryption matrix of (2).
The embodiment of the invention at least has the following beneficial effects: compared with the traditional encryption algorithm that the data is fixedly segmented based on the bit, the fixed segmentation mode does not consider the characteristics of the integral data and the characteristics of each segmented data when the integral data is segmented, the scheme continuously analyzes the randomness of the integral code and the randomness of codes in a region on the basis of carrying out characteristic amplification by using a matrix according to the binary coding and then carries out self-adaptation of an encryption window by using the randomness characteristic, and the encryption matrix is calculated for the encryption window of each clustering result to finish the encryption of the data, so that the number of keys is less, and the encryption algorithm is different and the security is higher due to different characteristics of different data in the encryption process.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions and advantages of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart illustrating steps of a method for securely transmitting data according to an embodiment of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description of a method for secure data transmission according to the present invention, its specific implementation, structure, features and effects will be given in conjunction with the accompanying drawings and preferred embodiments. In the following description, different "one embodiment" or "another embodiment" refers to not necessarily the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The following describes a specific scheme of the secure data transmission method provided by the present invention in detail with reference to the accompanying drawings.
The specific scenes aimed by the invention are as follows: in the data transmission process, data is often encrypted due to the privacy and the security of the data, and the existing encryption of the whole data or the segmented data by using the same algorithm easily causes insufficient encryption security or data redundancy, so that the whole binary data is subjected to decimal, then the encryption windows are self-adaptive and clustered, and the windows of the same category are encrypted to realize the secure transmission of the data.
Referring to fig. 1, a flowchart illustrating steps of a method for securely transmitting data according to an embodiment of the present invention is shown, where the method includes the following steps:
and S001, carrying out binary coding on data to be transmitted by utilizing a conventional binary compression coding technology to obtain a binary coding sequence.
Specifically, the encryption algorithm in this scheme is directed to binary data, so that the existing compression coding technology needs to be used to perform binary coding on data to be transmitted according to the type of the data to be transmitted, for example, text data may use the existing GZIP compression coding technology, which specifically includes: firstly, text data is encoded by using LZ77, and then the LZ77 is secondarily compressed by using Huffman coding, so that a binary coding sequence of data to be transmitted is obtained.
Step S002, converting the binary coding sequence into a decimal coding sequence to obtain a decimal characteristic matrix; calculating the integral centrifugation degree based on each numerical value of the decimal feature matrix, setting an encryption window, traversing on the decimal feature matrix by using the encryption window to calculate the first centrifugation degree of each encryption window, and adding the difference value between each first centrifugation degree and the integral centrifugation degree to obtain the centrifugation degree difference value of the decimal feature matrix under the encryption window; and acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes, and taking the encryption window corresponding to the minimum centrifugal degree difference value as a target encryption window.
Specifically, when the conventional encryption algorithm encrypts data, the data needs to be encrypted in segments because the data is too long, while the conventional encryption algorithm segments the data based on bits, and this fixed segmentation method does not consider the characteristics of the entire data and the characteristics of each segment after the segmentation when the entire data is segmented, and when the data is further encrypted, some parts of the code are originally larger than the overall random degree, so that the number of times of encryption is too many when the conventional encryption method is used for encryption, which causes more keys and waste of resources.
Based on the above reasons, the decimal coding sequence is generated from the binary coding sequence of the data to be transmitted, which specifically comprises: the conversion from binary code to decimal code requires determining the value interval of decimal system, which is generally
Figure 229055DEST_PATH_IMAGE002
In which
Figure 358685DEST_PATH_IMAGE003
The smaller the value is, the finer the binary coding is converted into the decimal coding, the more closely to the accurate characteristic of the binary system is the characteristic extraction and quantization of the binary coding on the decimal coding, but the processing workload is relatively large, and conversely, the preferred selection is summarized in the embodiment of the invention
Figure 2418DEST_PATH_IMAGE004
The calculated amount is reduced as much as possible on the basis of not losing the binary coding characteristics too much, the actual implementation process can be selected by the operator according to the actual requirements of the implementer, and the value range of each decimal code is
Figure 700247DEST_PATH_IMAGE005
Is binary from 8 bitAnd (5) obtaining the code. And then, generating a decimal characteristic matrix for the decimal coding sequence by utilizing the conventional matrix generation technology.
In order to realize the self-adaptation of the size of the encryption window, the integral randomness of the decimal feature matrix needs to be calculated by utilizing the centrifugation degree, the self-adaptation of the size of the encryption window is carried out by utilizing the random analysis of data in the encryption window by taking the integral randomness as a standard, and the method for acquiring the self-adaptation encryption window comprises the following steps:
(1) Calculating the overall degree of centrifugation of the decimal feature matrix
Figure 701701DEST_PATH_IMAGE006
The calculation formula is as follows:
Figure 838284DEST_PATH_IMAGE007
wherein the content of the first and second substances,
Figure 440650DEST_PATH_IMAGE008
for the decimal feature matrix
Figure 168434DEST_PATH_IMAGE009
The number of the individual values is,
Figure 594868DEST_PATH_IMAGE010
and is and
Figure 269562DEST_PATH_IMAGE011
the total number of all values in the decimal feature matrix.
It should be noted that the logic of the calculation formula is: and calculating the average value of all the numerical values in the decimal feature matrix, and then accumulating the difference value between each numerical value and the average value. The purpose of calculating the average value of all the numerical values is to judge the integral dispersion degree of the decimal feature matrix, then the difference value between each numerical value and the average value is accumulated to show the centrifugation degree of the numerical value, the average value is taken as the center, the single difference value is taken as the centrifugation degree of the single numerical value, and then the centrifugation degree is accumulated to be used as the centrifugation degree of the single numerical valueDegree of centrifugation of the whole
Figure 809259DEST_PATH_IMAGE006
The larger the overall centrifugation degree is, the larger the difference between the data in the decimal feature matrix is, and the more discrete the difference is.
(2) Is initially set up to
Figure 911208DEST_PATH_IMAGE012
A size of the encryption window, traversing on the decimal feature matrix using the encryption window to compute each
Figure 887254DEST_PATH_IMAGE012
Encrypting the first centrifugation degrees of the windows, and further obtaining the first centrifugation degrees and the integral centrifugation degrees according to the difference value between each first centrifugation degree and the integral centrifugation degree
Figure 100060DEST_PATH_IMAGE012
And (4) the centrifugal degree difference of the decimal feature matrix under the encryption window.
In particular, in the following
Figure 87739DEST_PATH_IMAGE013
An encryption window, for example, having a first degree of eccentricity
Figure 95009DEST_PATH_IMAGE014
The calculation method is as follows:
Figure 558352DEST_PATH_IMAGE015
wherein the content of the first and second substances,
Figure 574849DEST_PATH_IMAGE016
is a first
Figure 980816DEST_PATH_IMAGE013
In an encryption window
Figure 424567DEST_PATH_IMAGE017
The number of the individual values is,
Figure 109626DEST_PATH_IMAGE018
Figure 929815DEST_PATH_IMAGE014
is as follows
Figure 740688DEST_PATH_IMAGE013
An
Figure 886499DEST_PATH_IMAGE012
And encrypting the window.
J decimal feature matrixes corresponding to the first centrifugal degree can be obtained according to the calculation mode of the first centrifugal degree
Figure 996537DEST_PATH_IMAGE012
Encrypting a first degree of decentralization of the window, then according to J
Figure 354837DEST_PATH_IMAGE012
The first centrifugal degree of the encryption window is different from the integral centrifugal degree of the decimal feature matrix, and the calculation judgment mode is calculation
Figure 109298DEST_PATH_IMAGE012
Centrifugal degree difference value of decimal feature matrix under encryption window
Figure 160430DEST_PATH_IMAGE019
Figure 820082DEST_PATH_IMAGE020
Figure 5510DEST_PATH_IMAGE019
If it is negative, the description is given in
Figure 4690DEST_PATH_IMAGE012
When the encryption windows are divided, the difference general trend of the data in each encryption window is less than that of the data in the whole encryption windowDiscrete, i.e., the data within the encryption window is not sufficiently random;
Figure 961145DEST_PATH_IMAGE019
is positive, the other way round, and
Figure 842513DEST_PATH_IMAGE019
if the data is positive, the larger the numerical value is, the greater the difference of the data as a whole is, and the higher the randomness of the data in the encryption window is.
(3) And (3) acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes by using the methods from the step (1) to the step (2), and taking the encryption window with the size corresponding to the minimum centrifugal degree difference value as a target encryption window.
It should be noted that the reason for selecting the minimum centrifugation degree difference is that the first centrifugation degree of each encryption window is closest to the overall centrifugation degree, when encryption is performed on a window of this size, the calculation amount is minimum, and the number of encryption keys can finally effectively reduce the influence of the key length on the overall data amount.
S003, calculating a characteristic value of the decimal characteristic matrix corresponding to each target encryption window based on each numerical value in the target encryption window, and acquiring a clustering threshold value by combining the characteristic value and the total number of numerical values in the decimal characteristic matrix; and calculating the difference value of the characteristic values corresponding to any two target encryption windows, and clustering all the target encryption windows based on the difference of the characteristic values and the clustering threshold value to obtain m clustering results.
Specifically, feature extraction is performed on each target encryption window, and taking a jth target encryption window as an example, the calculation of the feature value of the jth target encryption window is commonly:
Figure 808195DEST_PATH_IMAGE021
wherein the content of the first and second substances,
Figure 724199DEST_PATH_IMAGE022
is as follows
Figure 851555DEST_PATH_IMAGE013
In the target encryption window
Figure 423482DEST_PATH_IMAGE017
The number of the individual values is,
Figure 724013DEST_PATH_IMAGE023
is a first
Figure 963364DEST_PATH_IMAGE013
The average of all values in the individual target encryption windows,
Figure 996042DEST_PATH_IMAGE024
representing the total number of all values in the target encryption window.
It should be noted that the logic and purpose of the formula for calculating the feature value are: the variance of the whole numerical values in each target encryption window is used as the characteristic value of the target encryption window, because the first centrifugal degree is used for carrying out self-adaptive acquisition of the encryption windows, the average values of elements in each encryption window are basically equal, clustering of the target encryption windows is further carried out through the variance, the target encryption windows are clustered into the same class with similar variances, the differences of all the numerical values in the same class are close, and the same encryption key is used for encryption.
Obtaining the characteristic value of each target encryption window by using a calculation formula of the characteristic values, and obtaining a clustering threshold value K based on the characteristic values and the total number of numerical values in the decimal characteristic matrix, wherein the calculation formula of the clustering threshold value K is as follows:
Figure 320844DEST_PATH_IMAGE025
wherein the content of the first and second substances,
Figure 628329DEST_PATH_IMAGE026
is shown as
Figure 253345DEST_PATH_IMAGE013
Characteristics of a target encryption windowThe characteristic value of the light-emitting diode is shown,
Figure 722504DEST_PATH_IMAGE027
representing the total number of values in the decimal feature matrix,
Figure 82072DEST_PATH_IMAGE028
in order to adjust the parameters of the device,
Figure 193248DEST_PATH_IMAGE029
logic of the calculation formula of the clustering threshold K: carrying out overall summation on the characteristic values of each target encryption window, calculating the characteristic of each decimal data through the overall characteristic values to carry out average characteristic distribution, and then carrying out threshold value size adjustment according to an adjustment parameter, wherein the range of the adjustment parameter is 1 to
Figure 938350DEST_PATH_IMAGE024
I.e. the threshold size is chosen to be a variable range, when
Figure 47251DEST_PATH_IMAGE030
When the difference in cluster size is the difference between each class, when
Figure 877804DEST_PATH_IMAGE031
The difference in cluster size is explained as the difference between each class, that is, the characteristic difference between each target encryption window.
Preferably, in the embodiments of the present invention
Figure 261512DEST_PATH_IMAGE032
Using clustering thresholds
Figure 329962DEST_PATH_IMAGE033
Clustering all target encryption windows in a clustering mode that the absolute value of the difference value of the characteristic values between every two target encryption windows is smaller than a clustering threshold value, determining that the two target encryption windows belong to the same class of encryption windows, and further dividing all the target encryption windows intoFor m clustering results, m is a positive integer.
Step S004, respectively obtaining an encryption matrix corresponding to the clustering result based on the numerical value of each target encryption window in each clustering result, and performing multiplication operation on the numerical value in the encryption matrix and the numerical value in each target encryption window in the corresponding clustering result to form a decimal encryption sequence corresponding to the decimal feature matrix; and converting the decimal encryption sequence into binary encryption codes by using modulo two division for transmission.
Specifically, the encryption matrix corresponding to each clustering result is obtained, and the specific method is as follows: by clustering results
Figure 140923DEST_PATH_IMAGE034
Taking the ith encryption value of the corresponding encryption matrix as an example, the calculation formula of the ith encryption value is as follows:
Figure 458772DEST_PATH_IMAGE035
wherein, the first and the second end of the pipe are connected with each other,
Figure 380592DEST_PATH_IMAGE036
as a result of clustering
Figure 303549DEST_PATH_IMAGE034
To middle
Figure 550990DEST_PATH_IMAGE037
The ith value of the target encryption window;
Figure 559398DEST_PATH_IMAGE038
as a result of clustering
Figure 347225DEST_PATH_IMAGE034
Corresponding to the ith encryption value in the encryption matrix,
Figure 859109DEST_PATH_IMAGE039
as a result of clustering
Figure 277452DEST_PATH_IMAGE034
The number of target encryption windows in (b).
Obtaining clustering result based on calculation formula of encrypted value
Figure 304314DEST_PATH_IMAGE034
And obtaining the encryption matrix of each clustering result in the same way. And finally, performing multiplication operation on the numerical value in each encryption matrix and the numerical value at the corresponding position in each target encryption window in the corresponding clustering result respectively, forming a decimal encryption sequence corresponding to the decimal characteristic matrix by the calculation result, converting the decimal encryption sequence into a binary encryption code by a modulo two division method, and transmitting the binary encryption code.
It should be noted that since the encryption matrix and the target encryption window are the same size, performing the multiplication does not change the encrypted data structure.
In summary, the embodiment of the present invention provides a method for safely transmitting data, in which data to be transmitted is converted into a binary coding sequence, and the binary coding sequence is converted into a decimal coding sequence, so as to obtain a decimal feature matrix; acquiring target encryption windows of the decimal feature matrix based on the integral centrifugation degree of the decimal feature matrix and first centrifugation degrees under encryption windows of different sizes, acquiring a clustering threshold value according to a feature value of the target encryption windows, dividing all the target encryption windows into a plurality of clustering results based on the clustering threshold value and the feature value, acquiring an encryption matrix of each clustering result according to a numerical value in the target encryption windows, and acquiring a decimal encryption sequence corresponding to the decimal feature matrix according to the encryption matrix; and converting the decimal encryption sequence into binary encryption codes by using a modulo two division method for transmission. The invention utilizes the random characteristic to carry out the self-adaptive acquisition of the encryption window, thereby improving the safety of data transmission.
It should be noted that: the sequence of the above embodiments of the present invention is only for description, and does not represent the advantages or disadvantages of the embodiments. And that specific embodiments have been described above. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit of the present invention are intended to be included therein.

Claims (5)

1. A method for secure transmission of data, the method comprising the steps of:
carrying out binary coding on data to be transmitted by utilizing a conventional binary compression coding technology to obtain a binary coding sequence;
converting the binary coding sequence into a decimal coding sequence to obtain a decimal feature matrix; calculating the integral centrifugation degree based on each numerical value of the decimal feature matrix, setting an encryption window, traversing on the decimal feature matrix by using the encryption window to calculate the first centrifugation degree of each encryption window, and adding the difference value between each first centrifugation degree and the integral centrifugation degree to obtain the centrifugation degree difference value of the decimal feature matrix under the encryption window;
acquiring the centrifugal degree difference values corresponding to the encryption windows with different sizes, and taking the encryption window corresponding to the minimum centrifugal degree difference value as a target encryption window;
calculating the characteristic value of the decimal characteristic matrix corresponding to each target encryption window based on each numerical value in the target encryption window, and combining the characteristic value and the total number of numerical values in the decimal characteristic matrix to obtain a clustering threshold value; calculating a characteristic value difference value corresponding to any two target encryption windows, and clustering all the target encryption windows based on the characteristic value difference and the clustering threshold value to obtain m clustering results, wherein m is a positive integer;
respectively obtaining an encryption matrix of a corresponding clustering result based on the numerical value of each target encryption window in each clustering result, and performing multiplication operation on the numerical value in the encryption matrix and the numerical value in each target encryption window in the corresponding clustering result to form a decimal encryption sequence; converting the decimal encryption sequence into binary encryption code by a modulo two division method for transmission;
the method for acquiring the clustering threshold comprises the following steps:
accumulating the characteristic values of all the target encryption windows to obtain a characteristic value accumulated value, obtaining a ratio of the characteristic value accumulated value to the total number of the numerical values in the decimal characteristic matrix, and optimizing the value by utilizing an adjusting parameter to obtain the clustering threshold value.
2. The method for securely transmitting data according to claim 1, wherein the method for acquiring the overall centrifugation degree comprises:
and calculating a numerical variance according to each numerical value in the decimal feature matrix, and taking the numerical variance as the integral centrifugation degree.
3. A method for securely transferring data as claimed in claim 1, wherein the method for obtaining the first centrifugal degree comprises:
and calculating a numerical variance according to each numerical value in the encryption window, and taking the numerical variance as the first centrifugation degree.
4. The method for securely transmitting data according to claim 1, wherein the method for obtaining the characteristic value comprises:
and calculating the value average value of all the values in the target encryption window, squaring the difference value between each value and the value average value, and taking the ratio of the square result to the number of the values in the target encryption window as the characteristic value of the corresponding target encryption window.
5. The method for securely transmitting data according to claim 1, wherein the method for obtaining the encryption matrix comprises:
for clustering results
Figure DEST_PATH_IMAGE002
Carrying out average value calculation on the ith number value of each target encryption window, and forming a clustering result by all average values
Figure 893124DEST_PATH_IMAGE002
The encryption matrix of (2).
CN202211237320.XA 2022-10-11 2022-10-11 Safe data transmission method Active CN115333735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211237320.XA CN115333735B (en) 2022-10-11 2022-10-11 Safe data transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211237320.XA CN115333735B (en) 2022-10-11 2022-10-11 Safe data transmission method

Publications (2)

Publication Number Publication Date
CN115333735A CN115333735A (en) 2022-11-11
CN115333735B true CN115333735B (en) 2023-03-14

Family

ID=83914661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211237320.XA Active CN115333735B (en) 2022-10-11 2022-10-11 Safe data transmission method

Country Status (1)

Country Link
CN (1) CN115333735B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115577380B (en) * 2022-12-01 2023-04-07 武汉惠强新能源材料科技有限公司 Material data management method and system based on MES system
CN115567329B (en) * 2022-12-06 2023-02-28 互丰科技(北京)有限公司 Data security encryption method for network information
CN115883841B (en) * 2023-03-03 2023-05-26 济南霍兹信息科技有限公司 Huffman coding-based computer information storage system
CN116405293B (en) * 2023-04-07 2023-09-01 光谷技术有限公司 Data encryption storage method of safe operation and maintenance system
CN116226893B (en) * 2023-05-09 2023-08-01 北京明苑风华文化传媒有限公司 Client marketing information management system based on Internet of things
CN116566748B (en) * 2023-07-11 2023-09-12 南通原力云信息技术有限公司 Small program data transmission encryption method
CN116861271B (en) * 2023-09-05 2023-12-08 智联信通科技股份有限公司 Data analysis processing method based on big data
CN117221018B (en) * 2023-11-09 2024-01-30 北京睿航至臻科技有限公司 Data security transmission method and system based on data coding

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130062108A (en) * 2011-12-02 2013-06-12 삼성전자주식회사 Method and apparatus for encoding and decoding binary image using an adaptive template
CN105450232A (en) * 2014-08-28 2016-03-30 华为技术有限公司 Encoding method, decoding method, encoding device and decoding device
CN105592761A (en) * 2013-09-30 2016-05-18 雀巢产品技术援助有限公司 Code support and capsule for preparing a beverage by centrifugation, system and method for preparing a beverage by centrifugation
CN107590842A (en) * 2017-09-05 2018-01-16 山东师范大学 Intersect the image encryption method and device of dynamic chaos password based on pixel and DNA
CN107921522A (en) * 2015-06-15 2018-04-17 米沃奇电动工具公司 Hydraulic crimping machine instrument
CN110826554A (en) * 2018-08-10 2020-02-21 西安电子科技大学 Infrared target detection method
CN112035695A (en) * 2020-08-04 2020-12-04 东南大学 Spatial data encryption method suitable for mobile terminal
CN113396326A (en) * 2018-12-19 2021-09-14 核酸有限责任公司 Apparatus and method for molecular diagnostics
CN113474840A (en) * 2018-12-21 2021-10-01 百欧恩泰美国公司 Methods and systems for predicting HLA class II specific epitopes and characterizing CD4+ T cells

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3623294A1 (en) * 1985-07-10 1987-02-05 Fuji Electric Co Ltd SYSTEM FOR BINARY CODING AN IMAGE
US4862510A (en) * 1987-03-24 1989-08-29 Emhart Industries, Inc. Lead sense system for component insertion machine
CN101124589A (en) * 2004-08-09 2008-02-13 图形安全系统公司 System and method for authenticating objects using multiple-level encoding and decoding
CN102592239A (en) * 2005-04-19 2012-07-18 微软公司 Network commercial transactions
FR2954491B1 (en) * 2009-12-23 2012-04-27 Thales Sa OPTICAL ENCODER.
CN102651828A (en) * 2011-02-23 2012-08-29 上海博路信息技术有限公司 Mobile terminal-based dynamic traffic information system
CN103402185B (en) * 2013-07-30 2016-02-10 东北石油大学 A kind of private information transfer method
CN103927469B (en) * 2014-04-23 2015-09-09 无锡北斗星通信息科技有限公司 Based on the dynamic password formation method of iris information
US10491578B1 (en) * 2018-03-30 2019-11-26 Sap Se Mitigation of offline ciphertext-only attacks
US10931538B2 (en) * 2018-09-13 2021-02-23 Cable Television Laboratories, Inc. Machine learning algorithms for quality of service assurance in network traffic

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130062108A (en) * 2011-12-02 2013-06-12 삼성전자주식회사 Method and apparatus for encoding and decoding binary image using an adaptive template
CN105592761A (en) * 2013-09-30 2016-05-18 雀巢产品技术援助有限公司 Code support and capsule for preparing a beverage by centrifugation, system and method for preparing a beverage by centrifugation
CN113303670A (en) * 2013-09-30 2021-08-27 雀巢产品有限公司 System and method for preparing a beverage by centrifugation
CN105450232A (en) * 2014-08-28 2016-03-30 华为技术有限公司 Encoding method, decoding method, encoding device and decoding device
CN107921522A (en) * 2015-06-15 2018-04-17 米沃奇电动工具公司 Hydraulic crimping machine instrument
CN107590842A (en) * 2017-09-05 2018-01-16 山东师范大学 Intersect the image encryption method and device of dynamic chaos password based on pixel and DNA
CN110826554A (en) * 2018-08-10 2020-02-21 西安电子科技大学 Infrared target detection method
CN113396326A (en) * 2018-12-19 2021-09-14 核酸有限责任公司 Apparatus and method for molecular diagnostics
CN113474840A (en) * 2018-12-21 2021-10-01 百欧恩泰美国公司 Methods and systems for predicting HLA class II specific epitopes and characterizing CD4+ T cells
CN112035695A (en) * 2020-08-04 2020-12-04 东南大学 Spatial data encryption method suitable for mobile terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
What and where: A context-based recommendation system for object insertion;Song-Hai Zhang等;《Computational Visual Media》;20200315(第01期);全文 *
基于融合模糊聚类算法的云信息存储加密仿真;岳少博等;《计算机仿真》;20200315(第03期);全文 *

Also Published As

Publication number Publication date
CN115333735A (en) 2022-11-11

Similar Documents

Publication Publication Date Title
CN115333735B (en) Safe data transmission method
CN111401552B (en) Federal learning method and system based on batch size adjustment and gradient compression rate adjustment
CN107359987B (en) Multidimensional negotiation method for continuous variable quantum key distribution under finite dimension effect
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
US20220263694A1 (en) Apparatus for multi-level encoding
CN107528687A (en) Dynamic key based on physical layer channel cross correlation quantifies machinery of consultation
CN115296862B (en) Network data safety transmission method based on data coding
CN115834023A (en) Data encryption method based on big data
CN106789968A (en) Secure coding method based on polarization code under a kind of reduction tapping channel
CN107437976B (en) Data processing method and equipment
CN108650083B (en) Slice negotiation method used in discrete modulation continuous variable quantum key distribution
CN106899524A (en) Safety access method based on channel estimating and user QoS
CN103746701A (en) Rapid encoding option selecting method applied to Rice lossless data compression
Wang et al. Spiking Semantic Communication for Feature Transmission with HARQ
CN115834062A (en) Enterprise data transmission encryption method for data hosting service
CN112187452B (en) Transmission method for continuous variable quantum key distribution
Jha et al. Fundamental limits of over-the-air optimization: Are analog schemes optimal?
Sumszyk et al. Information embedding with reversible stegotext
CN110601837A (en) Secret communication method and system based on quantum information compression under noise condition
CN111246460A (en) Low-complexity and low-time-delay secure transmission method
CN116405293B (en) Data encryption storage method of safe operation and maintenance system
Yang et al. Design and analysis of lossy source coding of Gaussian sources with finite-length polar codes
CN116996628B (en) Network data transmission protection method
CN117240409B (en) Data processing method for smart phone and smart wearable device
RU2801163C1 (en) Device for multilevel coding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Secure Data Transmission Method

Granted publication date: 20230314

Pledgee: Zhejiang Hangzhou Yuhang Rural Commercial Bank Co.,Ltd. Science and Technology City Branch

Pledgor: Zhejiang Yu'an Information Technology Co.,Ltd.

Registration number: Y2024980010210