CN116015766B - Data safety transmission system for computer - Google Patents

Data safety transmission system for computer Download PDF

Info

Publication number
CN116015766B
CN116015766B CN202211585276.1A CN202211585276A CN116015766B CN 116015766 B CN116015766 B CN 116015766B CN 202211585276 A CN202211585276 A CN 202211585276A CN 116015766 B CN116015766 B CN 116015766B
Authority
CN
China
Prior art keywords
data
computer
value
password
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211585276.1A
Other languages
Chinese (zh)
Other versions
CN116015766A (en
Inventor
常逢佳
常逢锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaiyin Normal University
Original Assignee
Huaiyin Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaiyin Normal University filed Critical Huaiyin Normal University
Priority to CN202211585276.1A priority Critical patent/CN116015766B/en
Publication of CN116015766A publication Critical patent/CN116015766A/en
Application granted granted Critical
Publication of CN116015766B publication Critical patent/CN116015766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to the field of data transmission, relates to a data processing technology, and is used for solving the problem that the encryption and decryption efficiency of a data security transmission system of an existing computer is low when the data transmission encryption is carried out, in particular to the data security transmission system of the computer, which comprises a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module, and the data encryption module is used for carrying out encryption processing on data transmitted by the computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object, and combining data memory values according to the arrangement mode of the transmission data to obtain a secret key; the invention can encrypt the data transmitted by the computer, and simultaneously generates the corresponding secret key according to the reorganization logic, and the data security in packet grabbing is improved in a data reorganization mode.

Description

Data safety transmission system for computer
Technical Field
The invention belongs to the field of data transmission, relates to a data processing technology, and in particular relates to a data security transmission system of a computer.
Background
The computer data information system mainly refers to a man-machine system which is composed of a computer, a data storage device, a network and corresponding software and is used for collecting, processing, storing, transmitting and retrieving information data and the like according to certain application targets, methods and rules;
the data security transmission system of the existing computer needs to generate very complex secret keys when data transmission encryption is carried out, so that a large amount of time is needed to be consumed when data decryption is carried out, encryption and decryption efficiency is low, meanwhile, the data security transmission system of the existing computer cannot monitor external influence factors of data transmission, so that the data transmission environment cannot be ensured, and the data transmission security is low;
aiming at the technical problems, the application provides a solution.
Disclosure of Invention
The invention aims to provide a data security transmission system of a computer, which is used for solving the problem that the encryption and decryption efficiency of the data security transmission system of the existing computer is low when the data transmission encryption is carried out.
The technical problems to be solved by the invention are as follows: how to provide a data security transmission system capable of carrying out efficient encryption and decryption transmission on data.
The aim of the invention can be achieved by the following technical scheme:
the data security transmission system of the computer comprises a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module;
the data encryption module is used for encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number in a number set and marking the number as a group value n, carrying out character sequencing on the encryption object, forming a first group of transmission data by characters corresponding to character numbers 1,1+n,1+2n, … and 1+xn, forming a second group of transmission data by characters corresponding to characters 2,2+n,2+2n, … and 2+xn, and so on until the encryption object is decomposed into n groups of transmission data, acquiring a data memory value of each group of transmission data, combining the data memory values according to the arrangement mode of the transmission data to obtain a secret key, generating a data packet by the n groups of transmission data according to the random arrangement sequence, carrying out time stamping on the generation time of the data packet, and sending the secret key and the data packet to a server for data encryption transmission;
the data decryption module is used for decrypting the data to obtain original data when the data is called, the original data is sent to the server, and the server sends the original data to the access verification module after receiving the original data;
the access verification module is used for verifying and analyzing the validity of the data access;
the auxiliary monitoring module is used for carrying out auxiliary monitoring analysis on the data transmission process of the computer and comprises an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing external influence data of computer data transmission; the user monitoring unit is used for monitoring and analyzing the password habit of the user.
As a preferred embodiment of the present invention, the specific process of the data decryption module for decrypting data during data retrieval includes: the method comprises the steps of sequentially arranging n groups of transmission data in a data packet according to data memory values in a secret key to obtain new data, wherein the sequential arrangement process comprises the following steps: and (3) arranging the transmission data of which the memory value corresponds to the first data memory value in the key to the first bit, arranging the transmission data of which the memory value corresponds to the second data memory value in the key to the second bit, and so on until the transmission data of which the memory value corresponds to the nth data memory value in the key to the last bit, and arranging the characters in the new sequence data according to (1, 1), (2, 1), …, (n, 1), (2, 2), …, (n, 1), (n, 2), …, (1, x), (2, x), …, (n, x) to perform sorting and restoring to obtain original data, wherein (1, 1) represents the first character of the first transmission data and (n, x) represents the xth character of the nth transmission data.
As a preferred embodiment of the invention, the specific process of verifying and analyzing the validity of the data call by the access verification module comprises the following steps: marking the system time of receiving the original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, and comparing the calling duration with the calling range: if the calling duration is within the calling range, judging that the data calling legitimacy meets the requirement, and sending the original data to a server by the access verification module; if the calling duration is outside the calling range, judging that the data calling legitimacy does not meet the requirement, deleting the original data by the access verification module and sending an illegal calling signal to the server.
As a preferred embodiment of the present invention, the specific process of monitoring and analyzing the external influence data of the computer data transmission by the external monitoring unit includes: acquiring temperature data WD, humidity data SD and magnetic field data CC of a computer, and obtaining an external coefficient WB of the computer by carrying out numerical calculation on the temperature data WD, the humidity data SD and the magnetic field data CC of the computer; the external threshold value WBmax is acquired through the storage module, and the external coefficient WB of the computer is compared with the external threshold value WBmax: if the external coefficient WB is smaller than the external threshold WBmax, judging that the external environment of the computer meets the requirement; if the external coefficient WB is larger than or equal to an external threshold WBmax, the external environment of the computer is judged to not meet the requirement, the external monitoring unit sends an external abnormal signal to the server, and the server sends the external abnormal signal to the mobile phone terminal of the manager after receiving the external abnormal signal.
As a preferred embodiment of the present invention, the process of acquiring the temperature data WD includes: the temperature values of all sides of the computer host are obtained, summation and average value obtaining are carried out, and the obtaining process of the temperature data WD and the humidity data SD comprises the following steps: acquiring a humidity value and a humidity range of air in a computer host, marking an average value of a maximum value and a minimum value of the humidity range as a humidity average value, marking an absolute value of a difference value between the air humidity value and the humidity average value as humidity data SD, and acquiring magnetic field data CC, wherein the acquiring process comprises: and acquiring the magnetic field radiation quantity and the coupling degree of the environment where the computer host is located, and marking the product of the magnetic field radiation quantity and the coupling degree as magnetic field data CC.
As a preferred embodiment of the present invention, the specific process of the user monitoring unit for monitoring and analyzing the password habit of the user includes: the login password of the user is obtained and marked as a comparison character, the historical login password of the user is obtained and marked as a historical character set, and the comparison character and the historical character set are subjected to comparison analysis: randomly selecting a history character group as a marking character, if each character in the comparison characters has a character corresponding to the character in the marking characters, judging that the marking characters are unqualified in comparison with the comparison characters, and the user password needs to be adjusted, wherein the user monitoring unit sends a password adjustment signal to the server; otherwise, judging that the marked character is qualified by contrast with the contrast character, re-selecting the history character as the marked character for comparison until all the history characters are completely compared with the contrast character and the contrast is qualified, obtaining the time of the last time of user modification of the password, marking the time difference value between the current system time and the last time of user modification of the password as a password continuous value, obtaining a password continuous threshold value through a storage module, and comparing the password continuous value with the password continuous threshold value: if the password persistence value is smaller than the password persistence threshold value, judging that the password habit of the user meets the requirement; if the password duration value is greater than or equal to the password duration threshold, judging that the password habit of the user does not meet the requirement, and sending a password adjustment signal to the server by the user monitoring unit.
The working method of the data security transmission system of the computer comprises the following steps:
step one: encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, and sending the key and a data packet to a server for data encryption transmission;
step two: and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data;
step three: and verifying and analyzing the validity of the data call: marking the system time of the received original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, comparing the calling duration with the calling range, and judging the validity of the data calling through a comparison result;
step four: and carrying out auxiliary monitoring analysis on the data transmission process of the computer, obtaining an external coefficient and a password continuous value, and respectively judging whether the external environment and the password habit of the user meet the requirements or not according to the numerical values of the external coefficient and the password continuous value.
The invention has the following beneficial effects:
1. the data encryption module can encrypt the data transmitted by the computer, the data packet is generated in a data reorganization mode, the corresponding secret key is generated according to reorganization logic, the data encryption process is simplified, the data security in the process of grabbing the packet is improved in a data reorganization mode, the validity of data retrieval is verified in a time stamp adding mode, the safety of data transmission is further guaranteed, and the data decryption module is combined for data decryption and reorganization;
2. the external influence data of the computer data transmission can be monitored and analyzed through the external monitoring unit, the external coefficient is obtained through calculation of various environmental parameters of the computer hardware, the external environment of the computer is monitored through the numerical value of the external coefficient, early warning is timely carried out when the external environment of the computer does not meet the requirement, and the influence degree of the external factors on the computer data transmission is reduced to the minimum;
3. the user monitoring unit can monitor and analyze the password habit of the user, and monitor the password safety through the password setting habit and the password modification habit of the user, so that the user is timely reminded of password adjustment, and the password cracking difficulty of the user is further improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a system block diagram of a first embodiment of the present invention;
fig. 2 is a flowchart of a method according to a second embodiment of the invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
As shown in FIG. 1, the data security transmission system of the computer comprises a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module.
The data encryption module is used for encrypting data transmitted by the computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, wherein n is a positive integer which can be divided by the number of characters of the encryption object, carrying out character sequencing on the encryption object, forming a first group of transmission data by characters corresponding to character numbers 1,1+n,1+2n, … and 1+xn, forming a second group of transmission data by characters corresponding to characters 2,2+n,2+2n, … and 2+xn, and so on until the encryption object is decomposed into n groups of transmission data, obtaining a data memory value of each group of transmission data, combining the data memory values according to the arrangement mode of the transmission data to obtain a key, generating a data packet by the n groups of transmission data according to a random arrangement sequence, adding a timestamp to the generation time of the data packet, and transmitting the key and the data packet to a server for data encryption transmission; the data transmitted by the computer is encrypted, a data packet is generated in a data reorganization mode, a corresponding secret key is generated according to reorganization logic, the data encryption process is simplified, the data security in the process of grabbing the packet is improved in the data reorganization mode, the validity of data calling is verified in a time stamping mode, the safety of data transmission is further guaranteed, and data decryption and reorganization are carried out in combination with a data decryption module.
The data decryption module is used for decrypting the data when the data is called: the method comprises the steps of sequentially arranging n groups of transmission data in a data packet according to data memory values in a secret key to obtain new data, wherein the sequential arrangement process comprises the following steps: arranging transmission data of which the memory value corresponds to a first data memory value in the secret key to a first bit, arranging transmission data of which the memory value corresponds to a second data memory value in the secret key to a second bit, and so on until transmission data of which the memory value corresponds to an nth data memory value in the secret key to a last bit, arranging characters in new sequence data according to (1, 1), (2, 1), …, (n, 1), (2, 2), …, (n, 1), (n, 2), …, (1, x), (2, x), …, (n, x) to perform sorting reduction to obtain original data, wherein (1, 1) represents a first character of the first transmission data and (n, x) represents an xth character of the nth transmission data; the data decryption module sends the original data to the server, and the server sends the original data to the access verification module after receiving the original data.
The access verification module is used for verifying and analyzing the validity of the data call: marking the system time of receiving the original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, and comparing the calling duration with the calling range: if the calling duration is within the calling range, judging that the data calling legitimacy meets the requirement, and sending the original data to a server by the access verification module; if the calling duration is outside the calling range, judging that the data calling legitimacy does not meet the requirement, deleting the original data by the access verification module and sending an illegal calling signal to the server.
The auxiliary monitoring module is used for carrying out auxiliary monitoring analysis on the data transmission process of the computer and comprises an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing external influence data of computer data transmission: acquiring temperature data WD, humidity data SD and magnetic field data CC of a computer, wherein the acquiring process of the temperature data WD includes: the temperature values of all sides of the computer host are obtained, summation and average value obtaining are carried out, and the obtaining process of the temperature data WD and the humidity data SD comprises the following steps: acquiring a humidity value and a humidity range of air in a computer host, marking an average value of a maximum value and a minimum value of the humidity range as a humidity average value, marking an absolute value of a difference value between the air humidity value and the humidity average value as humidity data SD, and acquiring magnetic field data CC, wherein the acquiring process comprises: acquiring the magnetic field radiation quantity and the coupling degree of an environment where a host computer is located, marking the product of the magnetic field radiation quantity and the coupling degree as magnetic field data CC, and obtaining an external coefficient WB of the computer through a formula WB=α1WD+α2SD+α3xCC, wherein α1, α2 and α3 are proportionality coefficients, and α3 is larger than α2 and larger than α1; the external threshold value WBmax is acquired through the storage module, and the external coefficient WB of the computer is compared with the external threshold value WBmax: if the external coefficient WB is smaller than the external threshold WBmax, judging that the external environment of the computer meets the requirement; if the external coefficient WB is larger than or equal to an external threshold WBmax, judging that the external environment of the computer does not meet the requirement, sending an external abnormal signal to a server by an external monitoring unit, and sending the external abnormal signal to a mobile phone terminal of a manager after the server receives the external abnormal signal; the method comprises the steps of monitoring and analyzing external influence data of computer data transmission, calculating various environmental parameters of computer hardware to obtain external coefficients, monitoring the external environment of the computer according to the numerical value of the external coefficients, and early warning in time when the external environment of the computer does not meet the requirements, so that the influence degree of the external factors on the computer data transmission is reduced to the minimum.
The user monitoring unit is used for monitoring and analyzing the password habit of the user: the login password of the user is obtained and marked as a comparison character, the historical login password of the user is obtained and marked as a historical character set, and the comparison character and the historical character set are subjected to comparison analysis: randomly selecting a history character group as a marking character, if each character in the comparison characters has a character corresponding to the character in the marking characters, judging that the marking characters are unqualified in comparison with the comparison characters, and the user password needs to be adjusted, wherein the user monitoring unit sends a password adjustment signal to the server; otherwise, judging that the marked character is qualified by contrast with the contrast character, re-selecting the history character as the marked character for comparison until all the history characters are completely compared with the contrast character and the contrast is qualified, obtaining the time of the last time of user modification of the password, marking the time difference value between the current system time and the last time of user modification of the password as a password continuous value, obtaining a password continuous threshold value through a storage module, and comparing the password continuous value with the password continuous threshold value: if the password persistence value is smaller than the password persistence threshold value, judging that the password habit of the user meets the requirement; if the password duration value is greater than or equal to the password duration threshold value, judging that the password habit of the user does not meet the requirement, and sending a password adjustment signal to a server by the user monitoring unit; the password habit of the user is monitored and analyzed, and the password safety is monitored through the password setting habit and the password modifying habit of the user, so that the user is timely reminded of password adjustment, and the password cracking difficulty of the user is further improved.
Example two
As shown in fig. 2, the data security transmission method of the computer includes the following steps:
step one: encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, sending the key and a data packet to a server for data encryption transmission, simplifying a data encryption process, and improving data security in packet grabbing in a data reorganization mode;
step two: and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data;
step three: and verifying and analyzing the validity of the data call: marking the system time of receiving the original data as a calling time, obtaining a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling time length, obtaining a calling range through a storage module, comparing the calling time length with the calling range, judging the data calling validity through a comparison result, and timely carrying out early warning when the external environment of the computer does not meet the requirement, so that the influence degree of external factors on the data transmission of the computer is reduced to the minimum;
step four: and carrying out auxiliary monitoring analysis on the data transmission process of the computer, obtaining an external coefficient and a password continuous value, judging whether the external environment and the password habit of the user meet the requirements or not respectively according to the numerical values of the external coefficient and the password continuous value, and carrying out password adjustment reminding on the user when the password habit of the user does not meet the requirements, so that the password cracking difficulty of the user is improved.
And the data security transmission system of the computer is used for encrypting data transmitted by the computer when in operation: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, and sending the key and a data packet to a server for data encryption transmission; and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data; and verifying and analyzing the validity of the data call: the system time of receiving the original data is marked as the calling time, the time stamp in the original data is obtained, the time difference value between the calling time and the time stamp is marked as the calling time length, and the data calling validity is fed back through the calling time length.
The foregoing is merely illustrative of the structures of this invention and various modifications, additions and substitutions for those skilled in the art can be made to the described embodiments without departing from the scope of the invention or from the scope of the invention as defined in the accompanying claims.
The formulas are all formulas obtained by collecting a large amount of data for software simulation and selecting a formula close to a true value, and coefficients in the formulas are set by a person skilled in the art according to actual conditions; such as: formula wb=α1×wd+α2×sd+α3×cc; collecting a plurality of groups of sample data by a person skilled in the art and setting corresponding external coefficients for each group of sample data; substituting the set external coefficient and the acquired sample data into a formula, forming a ternary one-time equation set by any three formulas, screening the calculated coefficient, and taking an average value to obtain values of alpha 1, alpha 2 and alpha 3 which are 2.35, 3.68 and 5.79 respectively;
the size of the coefficient is a specific numerical value obtained by quantizing each parameter, so that the subsequent comparison is convenient, and the size of the coefficient depends on the number of sample data and the corresponding external coefficient is preliminarily set for each group of sample data by a person skilled in the art; as long as the proportional relation between the parameter and the quantized value is not affected, for example, the external coefficient is directly proportional to the value of the magnetic field data.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (6)

1. The data security transmission system of the computer is characterized by comprising a server, wherein the server is in communication connection with a data encryption module, a data decryption module, an access verification module, an auxiliary monitoring module and a storage module;
the data encryption module is used for encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number in a number set and marking the number as a group value n, carrying out character sequencing on the encryption object, forming a first group of transmission data by characters corresponding to character numbers 1,1+n,1+2n, … and 1+xn, forming a second group of transmission data by characters corresponding to characters 2,2+n,2+2n, … and 2+xn, and so on until the encryption object is decomposed into n groups of transmission data, acquiring a data memory value of each group of transmission data, combining the data memory values according to the arrangement mode of the transmission data to obtain a secret key, generating a data packet by the n groups of transmission data according to the random arrangement sequence, carrying out time stamping on the generation time of the data packet, and sending the secret key and the data packet to a server for data encryption transmission;
the data decryption module is used for decrypting the data to obtain original data when the data is called, the original data is sent to the server, and the server sends the original data to the access verification module after receiving the original data;
the access verification module is used for verifying and analyzing the validity of the data access;
the auxiliary monitoring module is used for carrying out auxiliary monitoring analysis on the data transmission process of the computer and comprises an external monitoring unit and a user monitoring unit; the external monitoring unit is used for monitoring and analyzing external influence data of computer data transmission; the user monitoring unit is used for monitoring and analyzing the password habit of the user;
the specific process of the external monitoring unit for monitoring and analyzing the external influence data of the computer data transmission comprises the following steps: acquiring temperature data WD, humidity data SD and magnetic field data CC of a computer, and obtaining an external coefficient WB of the computer by carrying out numerical calculation on the temperature data WD, the humidity data SD and the magnetic field data CC of the computer; the external threshold value WBmax is acquired through the storage module, and the external coefficient WB of the computer is compared with the external threshold value WBmax: if the external coefficient WB is smaller than the external threshold WBmax, judging that the external environment of the computer meets the requirement; if the external coefficient WB is larger than or equal to an external threshold WBmax, the external environment of the computer is judged to not meet the requirement, the external monitoring unit sends an external abnormal signal to the server, and the server sends the external abnormal signal to the mobile phone terminal of the manager after receiving the external abnormal signal.
2. The system for securely transmitting data of a computer according to claim 1, wherein the data decryption module decrypts the data when the data is retrieved, comprising: the method comprises the steps of sequentially arranging n groups of transmission data in a data packet according to data memory values in a secret key to obtain new data, wherein the sequential arrangement process comprises the following steps: and (3) arranging the transmission data of which the memory value corresponds to the first data memory value in the key to the first bit, arranging the transmission data of which the memory value corresponds to the second data memory value in the key to the second bit, and so on until the transmission data of which the memory value corresponds to the nth data memory value in the key to the last bit, and arranging the characters in the new sequence data according to (1, 1), (2, 1), …, (n, 1), (2, 2), …, (n, 1), (n, 2), …, (1, x), (2, x), …, (n, x) to perform sorting and restoring to obtain original data, wherein (1, 1) represents the first character of the first transmission data and (n, x) represents the xth character of the nth transmission data.
3. The system for securely transmitting data of a computer according to claim 1, wherein the specific process of verifying and analyzing the validity of the data call by the access verification module comprises: marking the system time of receiving the original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, and comparing the calling duration with the calling range: if the calling duration is within the calling range, judging that the data calling legitimacy meets the requirement, and sending the original data to a server by the access verification module; if the calling duration is outside the calling range, judging that the data calling legitimacy does not meet the requirement, deleting the original data by the access verification module and sending an illegal calling signal to the server.
4. The data security transmission system of a computer according to claim 1, wherein the process of acquiring the temperature data WD comprises: the temperature values of all sides of the computer host are obtained, summation and average value obtaining are carried out, and the obtaining process of the temperature data WD and the humidity data SD comprises the following steps: acquiring a humidity value and a humidity range of air in a computer host, marking an average value of a maximum value and a minimum value of the humidity range as a humidity average value, marking an absolute value of a difference value between the air humidity value and the humidity average value as humidity data SD, and acquiring magnetic field data CC, wherein the acquiring process comprises: and acquiring the magnetic field radiation quantity and the coupling degree of the environment where the computer host is located, and marking the product of the magnetic field radiation quantity and the coupling degree as magnetic field data CC.
5. The system for securely transmitting data of a computer according to claim 1, wherein the specific process of monitoring and analyzing the cryptographic habit of the user by the user monitoring unit comprises: the login password of the user is obtained and marked as a comparison character, the historical login password of the user is obtained and marked as a historical character set, and the comparison character and the historical character set are subjected to comparison analysis: randomly selecting a history character group as a marking character, if each character in the comparison characters has a character corresponding to the character in the marking characters, judging that the marking characters are unqualified in comparison with the comparison characters, and the user password needs to be adjusted, wherein the user monitoring unit sends a password adjustment signal to the server; otherwise, judging that the marked character is qualified by contrast with the contrast character, re-selecting the history character as the marked character for comparison until all the history characters are completely compared with the contrast character and the contrast is qualified, obtaining the time of the last time of user modification of the password, marking the time difference value between the current system time and the last time of user modification of the password as a password continuous value, obtaining a password continuous threshold value through a storage module, and comparing the password continuous value with the password continuous threshold value: if the password persistence value is smaller than the password persistence threshold value, judging that the password habit of the user meets the requirement; if the password duration value is greater than or equal to the password duration threshold, judging that the password habit of the user does not meet the requirement, and sending a password adjustment signal to the server by the user monitoring unit.
6. A data security transmission system of a computer according to any one of claims 1-5, characterized in that the method of operating the data security transmission system of the computer comprises the steps of:
step one: encrypting data transmitted by a computer: marking data to be transmitted as an encryption object, randomly extracting a number from a number set and marking the number as a group value n, performing character sequencing on the encryption object to obtain n groups of transmission data, generating a key through a memory value of the transmission data, and sending the key and a data packet to a server for data encryption transmission;
step two: and carrying out decryption processing on the data when the data is called: sequentially arranging n groups of transmission data in the data packet according to the data memory value in the secret key to obtain new sequence data, and sequencing and restoring characters in the new sequence data to obtain original data;
step three: and verifying and analyzing the validity of the data call: marking the system time of the received original data as a calling time, acquiring a time stamp in the original data, marking a time difference value between the calling time and the time stamp as a calling duration, acquiring a calling range through a storage module, comparing the calling duration with the calling range, and judging the validity of the data calling through a comparison result;
step four: and carrying out auxiliary monitoring analysis on the data transmission process of the computer, obtaining an external coefficient and a password continuous value, and respectively judging whether the external environment and the password habit of the user meet the requirements or not according to the numerical values of the external coefficient and the password continuous value.
CN202211585276.1A 2022-12-09 2022-12-09 Data safety transmission system for computer Active CN116015766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211585276.1A CN116015766B (en) 2022-12-09 2022-12-09 Data safety transmission system for computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211585276.1A CN116015766B (en) 2022-12-09 2022-12-09 Data safety transmission system for computer

Publications (2)

Publication Number Publication Date
CN116015766A CN116015766A (en) 2023-04-25
CN116015766B true CN116015766B (en) 2023-06-27

Family

ID=86020060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211585276.1A Active CN116015766B (en) 2022-12-09 2022-12-09 Data safety transmission system for computer

Country Status (1)

Country Link
CN (1) CN116015766B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760935B (en) * 2023-08-21 2023-10-17 湖南马栏山视频先进技术研究院有限公司 Data fence system based on image data transmission
CN117395277B (en) * 2023-10-13 2024-04-12 广州锡杨电子股份有限公司 Industrial computer and data monitoring system
CN118300865A (en) * 2024-01-22 2024-07-05 北京天空卫士网络安全技术有限公司 Data transmission safety monitoring system based on internet

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN113254978A (en) * 2021-06-24 2021-08-13 国能大渡河大数据服务有限公司 Data security management system based on machine learning

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008745B (en) * 2019-03-29 2024-01-16 深圳供电局有限公司 Encryption method, computer equipment and computer storage medium
CN112751855B (en) * 2020-12-30 2022-09-06 合肥大多数信息科技有限公司 Cross-browser user data security management system based on encryption technology
CN113918977A (en) * 2021-10-27 2022-01-11 宜兴感知金服物联网技术有限公司 User information transmission device based on Internet of things and big data analysis

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN113254978A (en) * 2021-06-24 2021-08-13 国能大渡河大数据服务有限公司 Data security management system based on machine learning

Also Published As

Publication number Publication date
CN116015766A (en) 2023-04-25

Similar Documents

Publication Publication Date Title
CN116015766B (en) Data safety transmission system for computer
CN112751855B (en) Cross-browser user data security management system based on encryption technology
Buriachok et al. Invasion detection model using two-stage criterion of detection of network anomalies
CN117692257B (en) High-speed encryption method and device for service data of electric power Internet of things
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN116881948A (en) Data encryption management system and method based on general database
CN117725619B (en) Data sharing method, device, computer equipment, chip and readable storage medium
CN113746629B (en) Secret communication method based on polymer simulation
CN118349979A (en) User information safety processing control system applied to intelligent medical treatment
CN111934437B (en) Active power distribution network big data transmission method based on behavior mark and lightweight encryption
CN117439799A (en) Anti-tampering method for http request data
CN112288317A (en) Industrial big data analysis platform and method based on multi-source heterogeneous data governance
CN113259122B (en) Full-scene network security intelligent decision handling method based on artificial intelligence
CN115378680A (en) Electronic chip information encryption system and method based on big data
CN113114474B (en) Quantum time-frequency password generation and identification method based on chip atomic clock
CN115567191A (en) Production line network safety protection method based on equipment fingerprint and state secret algorithm
CN114615065A (en) Computer network security defense method and system based on big data
CN113438079A (en) Hybrid encryption method for low-voltage Internet of things sensing terminal and intelligent electric meter
CN117955751B (en) Electronic equipment abnormal data detection method and system based on Internet of things
CN117201205B (en) Mobile terminal data encryption management system and method based on big data
CN117527445B (en) Data sharing system based on re-encryption and distributed digital identity
CN118394285B (en) Data block storage method and system combined with security level analysis
CN117240610B (en) PLC module operation data transmission method and system based on data encryption
CN112491904B (en) Big data privacy protection sharing method and system
CN118551416B (en) Protection method and system for preventing file tampering based on self-adaptive security mechanism

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant