CN116015766B - Data safety transmission system for computer - Google Patents
Data safety transmission system for computer Download PDFInfo
- Publication number
- CN116015766B CN116015766B CN202211585276.1A CN202211585276A CN116015766B CN 116015766 B CN116015766 B CN 116015766B CN 202211585276 A CN202211585276 A CN 202211585276A CN 116015766 B CN116015766 B CN 116015766B
- Authority
- CN
- China
- Prior art keywords
- data
- computer
- value
- password
- transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention belongs to the field of data transmission, relates to a data processing technology, and is used for solving the problem that the encryption and decryption efficiency of a data security transmission system of an existing computer is low when the data transmission encryption is carried out, in particular to the data security transmission system of the computer, which comprises a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module, and the data encryption module is used for carrying out encryption processing on data transmitted by the computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object, and combining data memory values according to the arrangement mode of the transmission data to obtain a secret key; the invention can encrypt the data transmitted by the computer, and simultaneously generates the corresponding secret key according to the reorganization logic, and the data security in packet grabbing is improved in a data reorganization mode.
Description
Technical Field
The invention belongs to the field of data transmission, relates to a data processing technology, and in particular relates to a data security transmission system of a computer.
Background
The computer data information system mainly refers to a man-machine system which is composed of a computer, a data storage device, a network and corresponding software and is used for collecting, processing, storing, transmitting and retrieving information data and the like according to certain application targets, methods and rules;
the data security transmission system of the existing computer needs to generate very complex secret keys when data transmission encryption is carried out, so that a large amount of time is needed to be consumed when data decryption is carried out, encryption and decryption efficiency is low, meanwhile, the data security transmission system of the existing computer cannot monitor external influence factors of data transmission, so that the data transmission environment cannot be ensured, and the data transmission security is low;
aiming at the technical problems, the application provides a solution.
Disclosure of Invention
The invention aims to provide a data security transmission system of a computer, which is used for solving the problem that the encryption and decryption efficiency of the data security transmission system of the existing computer is low when the data transmission encryption is carried out.
The technical problems to be solved by the invention are as follows: how to provide a data security transmission system capable of carrying out efficient encryption and decryption transmission on data.
The aim of the invention can be achieved by the following technical scheme:
the data security transmission system of the computer comprises a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module;
the data encryption module is used for encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number in a number set and marking the number as a group value n, carrying out character sequencing on the encryption object, forming a first group of transmission data by characters corresponding to character numbers 1,1+n,1+2n, … and 1+xn, forming a second group of transmission data by characters corresponding to characters 2,2+n,2+2n, … and 2+xn, and so on until the encryption object is decomposed into n groups of transmission data, acquiring a data memory value of each group of transmission data, combining the data memory values according to the arrangement mode of the transmission data to obtain a secret key, generating a data packet by the n groups of transmission data according to the random arrangement sequence, carrying out time stamping on the generation time of the data packet, and sending the secret key and the data packet to a server for data encryption transmission;
the data decryption module is used for decrypting the data to obtain original data when the data is called, the original data is sent to the server, and the server sends the original data to the access verification module after receiving the original data;
the access verification module is used for verifying and analyzing the validity of the data access;
the auxiliary monitoring module is used for carrying out auxiliary monitoring analysis on the data transmission process of the computer and comprises an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing external influence data of computer data transmission; the user monitoring unit is used for monitoring and analyzing the password habit of the user.
As a preferred embodiment of the present invention, the specific process of the data decryption module for decrypting data during data retrieval includes: the method comprises the steps of sequentially arranging n groups of transmission data in a data packet according to data memory values in a secret key to obtain new data, wherein the sequential arrangement process comprises the following steps: and (3) arranging the transmission data of which the memory value corresponds to the first data memory value in the key to the first bit, arranging the transmission data of which the memory value corresponds to the second data memory value in the key to the second bit, and so on until the transmission data of which the memory value corresponds to the nth data memory value in the key to the last bit, and arranging the characters in the new sequence data according to (1, 1), (2, 1), …, (n, 1), (2, 2), …, (n, 1), (n, 2), …, (1, x), (2, x), …, (n, x) to perform sorting and restoring to obtain original data, wherein (1, 1) represents the first character of the first transmission data and (n, x) represents the xth character of the nth transmission data.
As a preferred embodiment of the invention, the specific process of verifying and analyzing the validity of the data call by the access verification module comprises the following steps: marking the system time of receiving the original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, and comparing the calling duration with the calling range: if the calling duration is within the calling range, judging that the data calling legitimacy meets the requirement, and sending the original data to a server by the access verification module; if the calling duration is outside the calling range, judging that the data calling legitimacy does not meet the requirement, deleting the original data by the access verification module and sending an illegal calling signal to the server.
As a preferred embodiment of the present invention, the specific process of monitoring and analyzing the external influence data of the computer data transmission by the external monitoring unit includes: acquiring temperature data WD, humidity data SD and magnetic field data CC of a computer, and obtaining an external coefficient WB of the computer by carrying out numerical calculation on the temperature data WD, the humidity data SD and the magnetic field data CC of the computer; the external threshold value WBmax is acquired through the storage module, and the external coefficient WB of the computer is compared with the external threshold value WBmax: if the external coefficient WB is smaller than the external threshold WBmax, judging that the external environment of the computer meets the requirement; if the external coefficient WB is larger than or equal to an external threshold WBmax, the external environment of the computer is judged to not meet the requirement, the external monitoring unit sends an external abnormal signal to the server, and the server sends the external abnormal signal to the mobile phone terminal of the manager after receiving the external abnormal signal.
As a preferred embodiment of the present invention, the process of acquiring the temperature data WD includes: the temperature values of all sides of the computer host are obtained, summation and average value obtaining are carried out, and the obtaining process of the temperature data WD and the humidity data SD comprises the following steps: acquiring a humidity value and a humidity range of air in a computer host, marking an average value of a maximum value and a minimum value of the humidity range as a humidity average value, marking an absolute value of a difference value between the air humidity value and the humidity average value as humidity data SD, and acquiring magnetic field data CC, wherein the acquiring process comprises: and acquiring the magnetic field radiation quantity and the coupling degree of the environment where the computer host is located, and marking the product of the magnetic field radiation quantity and the coupling degree as magnetic field data CC.
As a preferred embodiment of the present invention, the specific process of the user monitoring unit for monitoring and analyzing the password habit of the user includes: the login password of the user is obtained and marked as a comparison character, the historical login password of the user is obtained and marked as a historical character set, and the comparison character and the historical character set are subjected to comparison analysis: randomly selecting a history character group as a marking character, if each character in the comparison characters has a character corresponding to the character in the marking characters, judging that the marking characters are unqualified in comparison with the comparison characters, and the user password needs to be adjusted, wherein the user monitoring unit sends a password adjustment signal to the server; otherwise, judging that the marked character is qualified by contrast with the contrast character, re-selecting the history character as the marked character for comparison until all the history characters are completely compared with the contrast character and the contrast is qualified, obtaining the time of the last time of user modification of the password, marking the time difference value between the current system time and the last time of user modification of the password as a password continuous value, obtaining a password continuous threshold value through a storage module, and comparing the password continuous value with the password continuous threshold value: if the password persistence value is smaller than the password persistence threshold value, judging that the password habit of the user meets the requirement; if the password duration value is greater than or equal to the password duration threshold, judging that the password habit of the user does not meet the requirement, and sending a password adjustment signal to the server by the user monitoring unit.
The working method of the data security transmission system of the computer comprises the following steps:
step one: encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, and sending the key and a data packet to a server for data encryption transmission;
step two: and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data;
step three: and verifying and analyzing the validity of the data call: marking the system time of the received original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, comparing the calling duration with the calling range, and judging the validity of the data calling through a comparison result;
step four: and carrying out auxiliary monitoring analysis on the data transmission process of the computer, obtaining an external coefficient and a password continuous value, and respectively judging whether the external environment and the password habit of the user meet the requirements or not according to the numerical values of the external coefficient and the password continuous value.
The invention has the following beneficial effects:
1. the data encryption module can encrypt the data transmitted by the computer, the data packet is generated in a data reorganization mode, the corresponding secret key is generated according to reorganization logic, the data encryption process is simplified, the data security in the process of grabbing the packet is improved in a data reorganization mode, the validity of data retrieval is verified in a time stamp adding mode, the safety of data transmission is further guaranteed, and the data decryption module is combined for data decryption and reorganization;
2. the external influence data of the computer data transmission can be monitored and analyzed through the external monitoring unit, the external coefficient is obtained through calculation of various environmental parameters of the computer hardware, the external environment of the computer is monitored through the numerical value of the external coefficient, early warning is timely carried out when the external environment of the computer does not meet the requirement, and the influence degree of the external factors on the computer data transmission is reduced to the minimum;
3. the user monitoring unit can monitor and analyze the password habit of the user, and monitor the password safety through the password setting habit and the password modification habit of the user, so that the user is timely reminded of password adjustment, and the password cracking difficulty of the user is further improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a system block diagram of a first embodiment of the present invention;
fig. 2 is a flowchart of a method according to a second embodiment of the invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
As shown in FIG. 1, the data security transmission system of the computer comprises a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module.
The data encryption module is used for encrypting data transmitted by the computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, wherein n is a positive integer which can be divided by the number of characters of the encryption object, carrying out character sequencing on the encryption object, forming a first group of transmission data by characters corresponding to character numbers 1,1+n,1+2n, … and 1+xn, forming a second group of transmission data by characters corresponding to characters 2,2+n,2+2n, … and 2+xn, and so on until the encryption object is decomposed into n groups of transmission data, obtaining a data memory value of each group of transmission data, combining the data memory values according to the arrangement mode of the transmission data to obtain a key, generating a data packet by the n groups of transmission data according to a random arrangement sequence, adding a timestamp to the generation time of the data packet, and transmitting the key and the data packet to a server for data encryption transmission; the data transmitted by the computer is encrypted, a data packet is generated in a data reorganization mode, a corresponding secret key is generated according to reorganization logic, the data encryption process is simplified, the data security in the process of grabbing the packet is improved in the data reorganization mode, the validity of data calling is verified in a time stamping mode, the safety of data transmission is further guaranteed, and data decryption and reorganization are carried out in combination with a data decryption module.
The data decryption module is used for decrypting the data when the data is called: the method comprises the steps of sequentially arranging n groups of transmission data in a data packet according to data memory values in a secret key to obtain new data, wherein the sequential arrangement process comprises the following steps: arranging transmission data of which the memory value corresponds to a first data memory value in the secret key to a first bit, arranging transmission data of which the memory value corresponds to a second data memory value in the secret key to a second bit, and so on until transmission data of which the memory value corresponds to an nth data memory value in the secret key to a last bit, arranging characters in new sequence data according to (1, 1), (2, 1), …, (n, 1), (2, 2), …, (n, 1), (n, 2), …, (1, x), (2, x), …, (n, x) to perform sorting reduction to obtain original data, wherein (1, 1) represents a first character of the first transmission data and (n, x) represents an xth character of the nth transmission data; the data decryption module sends the original data to the server, and the server sends the original data to the access verification module after receiving the original data.
The access verification module is used for verifying and analyzing the validity of the data call: marking the system time of receiving the original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, and comparing the calling duration with the calling range: if the calling duration is within the calling range, judging that the data calling legitimacy meets the requirement, and sending the original data to a server by the access verification module; if the calling duration is outside the calling range, judging that the data calling legitimacy does not meet the requirement, deleting the original data by the access verification module and sending an illegal calling signal to the server.
The auxiliary monitoring module is used for carrying out auxiliary monitoring analysis on the data transmission process of the computer and comprises an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing external influence data of computer data transmission: acquiring temperature data WD, humidity data SD and magnetic field data CC of a computer, wherein the acquiring process of the temperature data WD includes: the temperature values of all sides of the computer host are obtained, summation and average value obtaining are carried out, and the obtaining process of the temperature data WD and the humidity data SD comprises the following steps: acquiring a humidity value and a humidity range of air in a computer host, marking an average value of a maximum value and a minimum value of the humidity range as a humidity average value, marking an absolute value of a difference value between the air humidity value and the humidity average value as humidity data SD, and acquiring magnetic field data CC, wherein the acquiring process comprises: acquiring the magnetic field radiation quantity and the coupling degree of an environment where a host computer is located, marking the product of the magnetic field radiation quantity and the coupling degree as magnetic field data CC, and obtaining an external coefficient WB of the computer through a formula WB=α1WD+α2SD+α3xCC, wherein α1, α2 and α3 are proportionality coefficients, and α3 is larger than α2 and larger than α1; the external threshold value WBmax is acquired through the storage module, and the external coefficient WB of the computer is compared with the external threshold value WBmax: if the external coefficient WB is smaller than the external threshold WBmax, judging that the external environment of the computer meets the requirement; if the external coefficient WB is larger than or equal to an external threshold WBmax, judging that the external environment of the computer does not meet the requirement, sending an external abnormal signal to a server by an external monitoring unit, and sending the external abnormal signal to a mobile phone terminal of a manager after the server receives the external abnormal signal; the method comprises the steps of monitoring and analyzing external influence data of computer data transmission, calculating various environmental parameters of computer hardware to obtain external coefficients, monitoring the external environment of the computer according to the numerical value of the external coefficients, and early warning in time when the external environment of the computer does not meet the requirements, so that the influence degree of the external factors on the computer data transmission is reduced to the minimum.
The user monitoring unit is used for monitoring and analyzing the password habit of the user: the login password of the user is obtained and marked as a comparison character, the historical login password of the user is obtained and marked as a historical character set, and the comparison character and the historical character set are subjected to comparison analysis: randomly selecting a history character group as a marking character, if each character in the comparison characters has a character corresponding to the character in the marking characters, judging that the marking characters are unqualified in comparison with the comparison characters, and the user password needs to be adjusted, wherein the user monitoring unit sends a password adjustment signal to the server; otherwise, judging that the marked character is qualified by contrast with the contrast character, re-selecting the history character as the marked character for comparison until all the history characters are completely compared with the contrast character and the contrast is qualified, obtaining the time of the last time of user modification of the password, marking the time difference value between the current system time and the last time of user modification of the password as a password continuous value, obtaining a password continuous threshold value through a storage module, and comparing the password continuous value with the password continuous threshold value: if the password persistence value is smaller than the password persistence threshold value, judging that the password habit of the user meets the requirement; if the password duration value is greater than or equal to the password duration threshold value, judging that the password habit of the user does not meet the requirement, and sending a password adjustment signal to a server by the user monitoring unit; the password habit of the user is monitored and analyzed, and the password safety is monitored through the password setting habit and the password modifying habit of the user, so that the user is timely reminded of password adjustment, and the password cracking difficulty of the user is further improved.
Example two
As shown in fig. 2, the data security transmission method of the computer includes the following steps:
step one: encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, sending the key and a data packet to a server for data encryption transmission, simplifying a data encryption process, and improving data security in packet grabbing in a data reorganization mode;
step two: and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data;
step three: and verifying and analyzing the validity of the data call: marking the system time of receiving the original data as a calling time, obtaining a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling time length, obtaining a calling range through a storage module, comparing the calling time length with the calling range, judging the data calling validity through a comparison result, and timely carrying out early warning when the external environment of the computer does not meet the requirement, so that the influence degree of external factors on the data transmission of the computer is reduced to the minimum;
step four: and carrying out auxiliary monitoring analysis on the data transmission process of the computer, obtaining an external coefficient and a password continuous value, judging whether the external environment and the password habit of the user meet the requirements or not respectively according to the numerical values of the external coefficient and the password continuous value, and carrying out password adjustment reminding on the user when the password habit of the user does not meet the requirements, so that the password cracking difficulty of the user is improved.
And the data security transmission system of the computer is used for encrypting data transmitted by the computer when in operation: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, and sending the key and a data packet to a server for data encryption transmission; and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data; and verifying and analyzing the validity of the data call: the system time of receiving the original data is marked as the calling time, the time stamp in the original data is obtained, the time difference value between the calling time and the time stamp is marked as the calling time length, and the data calling validity is fed back through the calling time length.
The foregoing is merely illustrative of the structures of this invention and various modifications, additions and substitutions for those skilled in the art can be made to the described embodiments without departing from the scope of the invention or from the scope of the invention as defined in the accompanying claims.
The formulas are all formulas obtained by collecting a large amount of data for software simulation and selecting a formula close to a true value, and coefficients in the formulas are set by a person skilled in the art according to actual conditions; such as: formula wb=α1×wd+α2×sd+α3×cc; collecting a plurality of groups of sample data by a person skilled in the art and setting corresponding external coefficients for each group of sample data; substituting the set external coefficient and the acquired sample data into a formula, forming a ternary one-time equation set by any three formulas, screening the calculated coefficient, and taking an average value to obtain values of alpha 1, alpha 2 and alpha 3 which are 2.35, 3.68 and 5.79 respectively;
the size of the coefficient is a specific numerical value obtained by quantizing each parameter, so that the subsequent comparison is convenient, and the size of the coefficient depends on the number of sample data and the corresponding external coefficient is preliminarily set for each group of sample data by a person skilled in the art; as long as the proportional relation between the parameter and the quantized value is not affected, for example, the external coefficient is directly proportional to the value of the magnetic field data.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (6)
1. The data security transmission system of the computer is characterized by comprising a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module;
the data encryption module is used for encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number in a number set and marking the number as a group value n, carrying out character sequencing on the encryption object, forming a first group of transmission data by characters corresponding to character numbers 1,1+n,1+2n, … and 1+xn, forming a second group of transmission data by characters corresponding to characters 2,2+n,2+2n, … and 2+xn, and so on until the encryption object is decomposed into n groups of transmission data, acquiring a data memory value of each group of transmission data, combining the data memory values according to the arrangement mode of the transmission data to obtain a secret key, generating a data packet by the n groups of transmission data according to the random arrangement sequence, carrying out time stamping on the generation time of the data packet, and sending the secret key and the data packet to a server for data encryption transmission;
the data decryption module is used for decrypting the data to obtain original data when the data is called, the original data is sent to the server, and the server sends the original data to the access verification module after receiving the original data;
the access verification module is used for verifying and analyzing the validity of the data access;
the auxiliary monitoring module is used for carrying out auxiliary monitoring analysis on the data transmission process of the computer and comprises an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing external influence data of computer data transmission; the user monitoring unit is used for monitoring and analyzing the password habit of the user;
the specific process of the external monitoring unit for monitoring and analyzing the external influence data of the computer data transmission comprises the following steps: acquiring temperature data WD, humidity data SD and magnetic field data CC of a computer, and obtaining an external coefficient WB of the computer by carrying out numerical calculation on the temperature data WD, the humidity data SD and the magnetic field data CC of the computer; the external threshold value WBmax is acquired through the storage module, and the external coefficient WB of the computer is compared with the external threshold value WBmax: if the external coefficient WB is smaller than the external threshold WBmax, judging that the external environment of the computer meets the requirement; if the external coefficient WB is larger than or equal to an external threshold WBmax, the external environment of the computer is judged to not meet the requirement, the external monitoring unit sends an external abnormal signal to the server, and the server sends the external abnormal signal to the mobile phone terminal of the manager after receiving the external abnormal signal.
2. The system for securely transmitting data of a computer according to claim 1, wherein the data decryption module decrypts the data when the data is retrieved, comprising: the method comprises the steps of sequentially arranging n groups of transmission data in a data packet according to data memory values in a secret key to obtain new data, wherein the sequential arrangement process comprises the following steps: and (3) arranging the transmission data of which the memory value corresponds to the first data memory value in the key to the first bit, arranging the transmission data of which the memory value corresponds to the second data memory value in the key to the second bit, and so on until the transmission data of which the memory value corresponds to the nth data memory value in the key to the last bit, and arranging the characters in the new sequence data according to (1, 1), (2, 1), …, (n, 1), (2, 2), …, (n, 1), (n, 2), …, (1, x), (2, x), …, (n, x) to perform sorting and restoring to obtain original data, wherein (1, 1) represents the first character of the first transmission data and (n, x) represents the xth character of the nth transmission data.
3. The system for securely transmitting data of a computer according to claim 1, wherein the specific process of verifying and analyzing the validity of the data call by the access verification module comprises: marking the system time of receiving the original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, and comparing the calling duration with the calling range: if the calling duration is within the calling range, judging that the data calling legitimacy meets the requirement, and sending the original data to a server by the access verification module; if the calling duration is outside the calling range, judging that the data calling legitimacy does not meet the requirement, deleting the original data by the access verification module and sending an illegal calling signal to the server.
4. The data security transmission system of a computer according to claim 1, wherein the process of acquiring the temperature data WD comprises: the temperature values of all sides of the computer host are obtained, summation and average value obtaining are carried out, and the obtaining process of the temperature data WD and the humidity data SD comprises the following steps: acquiring a humidity value and a humidity range of air in a computer host, marking an average value of a maximum value and a minimum value of the humidity range as a humidity average value, marking an absolute value of a difference value between the air humidity value and the humidity average value as humidity data SD, and acquiring magnetic field data CC, wherein the acquiring process comprises: and acquiring the magnetic field radiation quantity and the coupling degree of the environment where the computer host is located, and marking the product of the magnetic field radiation quantity and the coupling degree as magnetic field data CC.
5. The system for securely transmitting data of a computer according to claim 1, wherein the specific process of monitoring and analyzing the cryptographic habit of the user by the user monitoring unit comprises: the login password of the user is obtained and marked as a comparison character, the historical login password of the user is obtained and marked as a historical character set, and the comparison character and the historical character set are subjected to comparison analysis: randomly selecting a history character group as a marking character, if each character in the comparison characters has a character corresponding to the character in the marking characters, judging that the marking characters are unqualified in comparison with the comparison characters, and the user password needs to be adjusted, wherein the user monitoring unit sends a password adjustment signal to the server; otherwise, judging that the marked character is qualified by contrast with the contrast character, re-selecting the history character as the marked character for comparison until all the history characters are completely compared with the contrast character and the contrast is qualified, obtaining the time of the last time of user modification of the password, marking the time difference value between the current system time and the last time of user modification of the password as a password continuous value, obtaining a password continuous threshold value through a storage module, and comparing the password continuous value with the password continuous threshold value: if the password persistence value is smaller than the password persistence threshold value, judging that the password habit of the user meets the requirement; if the password duration value is greater than or equal to the password duration threshold, judging that the password habit of the user does not meet the requirement, and sending a password adjustment signal to the server by the user monitoring unit.
6. A data security transmission system of a computer according to any one of claims 1-5, characterized in that the method of operating the data security transmission system of the computer comprises the steps of:
step one: encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, and sending the key and a data packet to a server for data encryption transmission;
step two: and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data;
step three: and verifying and analyzing the validity of the data call: marking the system time of the received original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, comparing the calling duration with the calling range, and judging the validity of the data calling through a comparison result;
step four: and carrying out auxiliary monitoring analysis on the data transmission process of the computer, obtaining an external coefficient and a password continuous value, and respectively judging whether the external environment and the password habit of the user meet the requirements or not according to the numerical values of the external coefficient and the password continuous value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211585276.1A CN116015766B (en) | 2022-12-09 | 2022-12-09 | Data safety transmission system for computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211585276.1A CN116015766B (en) | 2022-12-09 | 2022-12-09 | Data safety transmission system for computer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116015766A CN116015766A (en) | 2023-04-25 |
CN116015766B true CN116015766B (en) | 2023-06-27 |
Family
ID=86020060
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211585276.1A Active CN116015766B (en) | 2022-12-09 | 2022-12-09 | Data safety transmission system for computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116015766B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116760935B (en) * | 2023-08-21 | 2023-10-17 | 湖南马栏山视频先进技术研究院有限公司 | Data fence system based on image data transmission |
CN117395277B (en) * | 2023-10-13 | 2024-04-12 | 广州锡杨电子股份有限公司 | Industrial computer and data monitoring system |
CN118300865A (en) * | 2024-01-22 | 2024-07-05 | 北京天空卫士网络安全技术有限公司 | Data transmission safety monitoring system based on internet |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650148A (en) * | 2019-09-30 | 2020-01-03 | 广西科技大学 | Information security transmission system based on random encryption |
CN113254978A (en) * | 2021-06-24 | 2021-08-13 | 国能大渡河大数据服务有限公司 | Data security management system based on machine learning |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110008745B (en) * | 2019-03-29 | 2024-01-16 | 深圳供电局有限公司 | Encryption method, computer equipment and computer storage medium |
CN112751855B (en) * | 2020-12-30 | 2022-09-06 | 合肥大多数信息科技有限公司 | Cross-browser user data security management system based on encryption technology |
CN113918977A (en) * | 2021-10-27 | 2022-01-11 | 宜兴感知金服物联网技术有限公司 | User information transmission device based on Internet of things and big data analysis |
-
2022
- 2022-12-09 CN CN202211585276.1A patent/CN116015766B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650148A (en) * | 2019-09-30 | 2020-01-03 | 广西科技大学 | Information security transmission system based on random encryption |
CN113254978A (en) * | 2021-06-24 | 2021-08-13 | 国能大渡河大数据服务有限公司 | Data security management system based on machine learning |
Also Published As
Publication number | Publication date |
---|---|
CN116015766A (en) | 2023-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116015766B (en) | Data safety transmission system for computer | |
CN112751855B (en) | Cross-browser user data security management system based on encryption technology | |
Buriachok et al. | Invasion detection model using two-stage criterion of detection of network anomalies | |
CN117692257B (en) | High-speed encryption method and device for service data of electric power Internet of things | |
CN113918977A (en) | User information transmission device based on Internet of things and big data analysis | |
CN116881948A (en) | Data encryption management system and method based on general database | |
CN117725619B (en) | Data sharing method, device, computer equipment, chip and readable storage medium | |
CN113746629B (en) | Secret communication method based on polymer simulation | |
CN118349979A (en) | User information safety processing control system applied to intelligent medical treatment | |
CN111934437B (en) | Active power distribution network big data transmission method based on behavior mark and lightweight encryption | |
CN117439799A (en) | Anti-tampering method for http request data | |
CN112288317A (en) | Industrial big data analysis platform and method based on multi-source heterogeneous data governance | |
CN113259122B (en) | Full-scene network security intelligent decision handling method based on artificial intelligence | |
CN115378680A (en) | Electronic chip information encryption system and method based on big data | |
CN113114474B (en) | Quantum time-frequency password generation and identification method based on chip atomic clock | |
CN115567191A (en) | Production line network safety protection method based on equipment fingerprint and state secret algorithm | |
CN114615065A (en) | Computer network security defense method and system based on big data | |
CN113438079A (en) | Hybrid encryption method for low-voltage Internet of things sensing terminal and intelligent electric meter | |
CN117955751B (en) | Electronic equipment abnormal data detection method and system based on Internet of things | |
CN117201205B (en) | Mobile terminal data encryption management system and method based on big data | |
CN117527445B (en) | Data sharing system based on re-encryption and distributed digital identity | |
CN118394285B (en) | Data block storage method and system combined with security level analysis | |
CN117240610B (en) | PLC module operation data transmission method and system based on data encryption | |
CN112491904B (en) | Big data privacy protection sharing method and system | |
CN118551416B (en) | Protection method and system for preventing file tampering based on self-adaptive security mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |