CN116261139A - Online data security transmission method and system based on 5G message and electronic equipment - Google Patents

Online data security transmission method and system based on 5G message and electronic equipment Download PDF

Info

Publication number
CN116261139A
CN116261139A CN202310246634.4A CN202310246634A CN116261139A CN 116261139 A CN116261139 A CN 116261139A CN 202310246634 A CN202310246634 A CN 202310246634A CN 116261139 A CN116261139 A CN 116261139A
Authority
CN
China
Prior art keywords
data
transmission
message
online
encrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310246634.4A
Other languages
Chinese (zh)
Other versions
CN116261139B (en
Inventor
王亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yitongdao Technology Co ltd
Original Assignee
Shenzhen Yitongdao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yitongdao Technology Co ltd filed Critical Shenzhen Yitongdao Technology Co ltd
Priority to CN202310246634.4A priority Critical patent/CN116261139B/en
Publication of CN116261139A publication Critical patent/CN116261139A/en
Application granted granted Critical
Publication of CN116261139B publication Critical patent/CN116261139B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a data transmission technology, and discloses an online data security transmission method, a system and electronic equipment based on 5G information, wherein the method comprises the following steps: acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information; when the user information authentication is successful, acquiring online message data corresponding to the 5G message, and performing differential encoding and encryption processing on the online message data to obtain encrypted data; transmitting the encrypted data on a preset transmission data line, and performing frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value; if the offset occurs, stopping the transmission of the encrypted data and prompting abnormality; if no offset occurs, carrying out quality evaluation on the transmitted encrypted data, and generating an online data transmission result according to the quality evaluation result. The invention can improve the security when data transmission is carried out based on the 5G message.

Description

Online data security transmission method and system based on 5G message and electronic equipment
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to an online data security transmission method, system and electronic device based on 5G messages.
Background
The fifth generation mobile communication (5G) is used as a new generation cellular mobile communication technology, integrates the front edge technology of various communication fields such as millimeter waves, large-scale multiple input multiple output, beam forming and the like on the basis of the 4G technology, and has the characteristics of high transmission rate, low delay, high speed and wide connection. At present, when a large number of users receive and transmit data information through 5G messages, due to the characteristic of certain complexity of a computer network environment, data security threats from various aspects and different forms can be encountered in the process of data transmission, so that the data security in the transmission process is not guaranteed. Factors affecting the secure transmission of data include network protocol damage, transmission line damage, computer software damage, etc.
Meanwhile, the online data mainly depend on the running of the internal program of the computer in the transmission process, once the situation that the security encryption key is cracked occurs in the running, the user can have the problems of being monitored and information being tampered in the communication process, so that the problem that illegal attackers steal part of private information of the user can be caused, and personal property security of the user is seriously threatened. In summary, the existing technology has the problem of low security when data transmission is performed based on the 5G message.
Disclosure of Invention
The invention provides an online data security transmission method, system and electronic equipment based on 5G information, and mainly aims to solve the problem of low security in data transmission based on the 5G information.
In order to achieve the above object, the present invention provides an online data security transmission method based on 5G messages, including:
acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information;
when the user information authentication is successful, acquiring online message data corresponding to the 5G message, and performing differential encoding and encryption processing on the online message data to obtain encrypted data;
transmitting the encrypted data on a preset transmission data line, and performing frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value;
if the offset occurs, stopping the transmission of the encrypted data and prompting abnormality;
and if the deviation does not occur, carrying out quality evaluation on the transmitted encrypted data, and generating an online data transmission result according to the quality evaluation result.
Optionally, the authenticating the user information based on the 5G message includes:
acquiring a user trigger trace, and receiving an authentication ID and a corresponding authentication code of the user information according to the user trigger trace;
acquiring a message authentication card of the 5G message, and judging whether a message authentication code carried by the message authentication card is consistent with the authentication code;
when the message authentication code is consistent with the authentication code, the user information is successfully authenticated;
and when the message authentication code is inconsistent with the authentication code, the authentication of the user information is unsuccessful.
Optionally, the performing differential encoding and encryption processing on the online message data to obtain encrypted data includes:
encoding the online message data to obtain a message code;
the message encoding is expressed as:
Figure BDA0004126207890000021
wherein b 1 (n) represents the nth message code, b 1 (n-1) represents an n-1 th message code, and b (n) represents an n-th online message data;
and generating an encryption public key and a decryption private key by using a preset encryption algorithm, and asymmetrically encrypting the online message data and the corresponding message codes by using the encryption public key to obtain encrypted data.
Optionally, the performing frequency offset estimation on the encrypted data to obtain a frequency offset value includes:
acquiring a data signal of the encrypted data, performing wavelet transformation on the data signal to obtain a wavelet coefficient, and performing normalization calculation on the wavelet coefficient to obtain a normalization coefficient;
the normalization coefficient is calculated using the following formula:
t j =(w k -M)/D
wherein t is j Represents the j-th normalization coefficient, w k Representing the kth wavelet coefficient, D representing a preset calculation parameter, M representing a reference value of the encrypted data;
acquiring the data length of the encrypted data, and calculating a scale parameter according to the data length;
the scale parameters were calculated using the following formula:
a y =c×(f/l)
wherein a is y Representing a y-th scale parameter, f representing the interval between the encrypted data, l representing the data length, and c representing a preset calculation parameter;
and calculating the frequency offset value of the encrypted data by utilizing the normalization coefficient and the scale parameter.
Optionally, the calculating the frequency offset value of the encrypted data by using the normalization coefficient and the scale parameter includes:
calculating the frequency offset value of the encrypted data by using the following formula:
Figure BDA0004126207890000031
wherein Y represents the frequency offset value, g represents the total number of the encrypted data, a y Represents the y-th scale parameter, t j Represents the J-th normalization coefficient, J represents the total number of normalization coefficients, and M represents the reference value of the encrypted data.
Optionally, the performing quality evaluation on the encrypted data after transmission includes:
decrypting the transmitted encrypted data by using the decryption private key to obtain decrypted data;
acquiring original data, calculating a data integrity rate according to the decrypted data and the original data, and calculating a data accuracy rate according to the original data and the decrypted data;
the data integrity rate was calculated using the following formula:
Figure BDA0004126207890000032
wherein B represents the data integrity rate, x i Represents the ith decrypted data, r m Representing the mth original data, wherein I represents the total number of the decrypted data, and M represents the total number of the original data;
calculating the data accuracy using the following formula:
Figure BDA0004126207890000033
wherein A represents the data accuracy and X x Representing the total data amount of the decrypted data x, R r Representing the total data amount of the original data r;
acquiring the transmission time of the decrypted data, and calculating the time delay standard deviation of the decrypted data according to the transmission time;
and generating a quality evaluation result according to the data integrity rate, the data accuracy rate and the time delay standard deviation.
Optionally, the calculating the delay standard deviation of the decrypted data according to the transmission time includes:
calculating the time delay standard deviation of the decrypted data by using the following formula:
Figure BDA0004126207890000041
wherein t represents the standard deviation of time delay, t s Represents the s-th transmission time, t 0 Representing the average value of the transmission times, S representing the total number of transmission times.
Optionally, the determining whether the encrypted data is offset on the transmission data line according to the frequency offset value includes:
judging whether the frequency offset value exceeds a preset frequency offset target value or not;
when the frequency offset value exceeds the frequency offset target value, the encrypted data is represented to deviate on the transmission data line;
and when the frequency offset value does not exceed the frequency offset target value, indicating that the encrypted data is not offset on the transmission data line.
In order to solve the above problems, the present invention further provides an online data secure transmission system based on 5G messages, the system comprising:
the information authentication module is used for acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information;
the data encryption module is used for acquiring online message data corresponding to the 5G message when the user information authentication is successful, and performing differential encoding and encryption processing on the online message data to obtain encrypted data;
the data transmission module is used for transmitting the encrypted data on a preset transmission data line, carrying out frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value;
the data suspension module is used for stopping the transmission of the encrypted data and prompting abnormality if the offset occurs;
and the data evaluation module is used for carrying out quality evaluation on the transmitted encrypted data if no offset occurs, and generating an online data transmission result according to the quality evaluation result.
In order to solve the above-mentioned problems, the present invention also provides an electronic apparatus including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the above-described 5G message-based online data secure transfer method.
According to the embodiment of the invention, the user information is authenticated based on the 5G message, so that the accuracy of the user information can be ensured, and the safety of subsequent data transmission is improved; when the user information authentication is successful, the security in the online message data transmission process can be improved by carrying out differential encoding and encryption processing on the online message data; the transmission efficiency of the encrypted data can be accelerated by transmitting the encrypted data on the transmission data line; by carrying out frequency offset estimation on the encrypted data, judging whether the encrypted data is offset on a transmission data line according to the frequency offset value, the occurrence of abnormality in the transmission process can be avoided, and the processing efficiency of a computer is accelerated; by carrying out quality evaluation on the encrypted data and generating an online data transmission result according to the quality evaluation result, the quality of online data transmission can be ensured and the online data transmission efficiency can be improved. Therefore, the online data security transmission method, the online data security transmission system and the electronic equipment based on the 5G message can solve the problem of low security when data transmission is performed based on the 5G message.
Drawings
Fig. 1 is a flow chart of an online data security transmission method based on a 5G message according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of performing frequency offset estimation on encrypted data to obtain a frequency offset value according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart of performing quality evaluation on transmitted encrypted data according to an embodiment of the present invention;
FIG. 4 is a functional block diagram of an online data security transmission system based on 5G messages according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device implementing the online data security transmission method based on 5G messages according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment of the application provides an online data security transmission method based on 5G messages. The execution main body of the online data security transmission method based on the 5G message comprises at least one of a server, a terminal and the like which can be configured to execute the method provided by the embodiment of the application. In other words, the online data security transmission method based on the 5G message may be performed by software or hardware installed in a terminal device or a server device, and the software may be a blockchain platform. The service end includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Referring to fig. 1, a flow chart of an online data security transmission method based on 5G messages according to an embodiment of the invention is shown. In this embodiment, the online data security transmission method based on the 5G message includes:
s1, acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information.
In the embodiment of the invention, the user information comprises name, gender, identification card number, contact telephone, track information, communication content, property information, communication record, bank card information, social platform account number and the like; the 5G message corresponding to the user information comprises a 5G short message, a 5G rich media message and a 5G Internet of things message, wherein the 5G short message comprises a short message and the like; the 5G rich media message comprises text, pictures, audio, video, documents, business cards, geographic positions and the like; the 5G Internet of things message refers to communication between an object and an object, between an object and a person, between an application and an object, such as an intelligent water meter, an intelligent well lid and the like.
In the embodiment of the present invention, the authenticating the user information based on the 5G message includes:
acquiring a user trigger trace, and receiving an authentication ID and a corresponding authentication code of the user information according to the user trigger trace;
acquiring a message authentication card of the 5G message, and judging whether a message authentication code carried by the message authentication card is consistent with the authentication code;
when the message authentication code is consistent with the authentication code, the user information is successfully authenticated;
and when the message authentication code is inconsistent with the authentication code, the authentication of the user information is unsuccessful.
In the embodiment of the invention, the user trigger trace refers to the recommended operation triggered by clicking a confirm login or confirm verification button when a user initiates login, verification and other scenes on a Web page and an APP page of an application system; when the system receives the user trigger trace, the system receives the authentication ID of the user and the corresponding authentication code, wherein the authentication ID comprises but is not limited to a user name; the authentication code includes, but is not limited to, a user password.
In the embodiment of the invention, the message authentication card of the 5G message comprises but is not limited to card content, postBack_data value and the like; the card content comprises user history authentication information and the like, the PostBack_data value refers to a reply to the suggested operation, and a hidden text message is sent to the system, wherein the PostBack_data value carries a message authentication code.
In the embodiment of the invention, the message authentication code is compared with the authentication code, whether the message authentication code is consistent with the authentication code or not is judged according to the comparison result, and when the message authentication code is consistent with the authentication code, the user information authentication is successful, namely, the user can log in a system to transmit the message; when the message authentication code is inconsistent with the authentication code, the user information authentication is unsuccessful, that is, the user cannot log into the system for message transmission, and an error flag is returned, for example, the error flag may be: "the entered password is incorrect".
And when the user information authentication is unsuccessful, executing S2, and returning an error identification.
And when the user information authentication is successful, executing S3, acquiring online message data corresponding to the 5G message, and performing differential encoding and encryption processing on the online message data to obtain encrypted data.
In the embodiment of the invention, when the authentication of the user information is successful, online message data corresponding to the 5G information is extracted from the 5G information, wherein the online message data comprises online data such as text of a short message, dialog box content, position information record, document content, watching video and the like.
In the embodiment of the present invention, the performing differential encoding and encryption processing on the online message data to obtain encrypted data includes:
encoding the online message data to obtain a message code;
and generating an encryption public key and a decryption private key by using a preset encryption algorithm, and asymmetrically encrypting the online message data and the corresponding message codes by using the encryption public key to obtain encrypted data.
In the embodiment of the invention, the message code is expressed as:
Figure BDA0004126207890000071
wherein b 1 (n) represents the nth message code, b 1 (n-1) represents the n-1 th message code, and b (n) represents the n-th online message data.
In the embodiment of the invention, the encryption algorithm can adopt an RSA encryption algorithm; generating an encryption public key and a decryption private key by using the encryption algorithm refers to randomly selecting two prime numbers, calculating the product N of the two prime numbers, calculating an integer number (p-1) (q-1) which is not more than N and is mutually prime with N, selecting an integer e which is less than and mutually prime with (p-1) (q-1), and calculating d: dXe≡1 (mod (p-1) (q-1)), wherein the encrypted public key refers to (N, e); the decryption private key refers to (N, d).
In the embodiment of the invention, the RSA encryption algorithm is utilized to encrypt the online message data and the corresponding message codes, and the RSA encryption algorithm has high complexity and high processing speed, thereby being beneficial to protecting the passwords from being leaked; further, adding the message code plays a role of interference and confusion, thereby protecting the encrypted data.
S4, transmitting the encrypted data on a preset transmission data line, performing frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value.
In the embodiment of the invention, the transmission data line refers to a transmission channel for data transmission; and acquiring a data interface of the transmission data line, and transmitting the encrypted data by utilizing a preset TCP (transmission control protocol) based on the data interface, wherein the data transmission mode can be half-duplex data transmission.
Referring to fig. 2, in the embodiment of the present invention, the performing frequency offset estimation on the encrypted data to obtain a frequency offset value includes:
s21, acquiring a data signal of the encrypted data, performing wavelet transformation on the data signal to obtain a wavelet coefficient, and performing normalization calculation on the wavelet coefficient to obtain a normalization coefficient;
s22, acquiring the data length of the encrypted data, and calculating a scale parameter according to the data length;
s23, calculating the frequency offset value of the encrypted data by using the normalization coefficient and the scale parameter.
In the embodiment of the invention, the data signal of the encrypted data refers to a digital signal received in a transmission channel when the encrypted data is transmitted; performing wavelet transformation on the data signal means performing time-frequency analysis on the data signal, namely that a low-frequency part has lower time resolution and higher frequency resolution, and a high-frequency part has higher time resolution and lower frequency resolution, and extracting local features in the data signal of the encrypted data to obtain wavelet coefficients; the data length refers to the length of the data (bytes occupied by the data) transmitted.
In the embodiment of the invention, the normalization coefficient is calculated by using the following formula:
t j =(w k -M)/D
wherein t is j Represents the j-th normalization coefficient, w k Represents the kth wavelet coefficient, D represents a preset calculation parameter, and M represents a reference value of the encrypted data.
In the embodiment of the invention, the following formula is used for calculating the scale parameter:
a y =c×(f/l)
wherein a is y Representing the y-th scale parameter, f representing the interval between the encrypted data, l representing the data length, and c representing a preset calculation parameter.
In the embodiment of the invention, the frequency offset value of the encrypted data is calculated by using the following formula:
Figure BDA0004126207890000091
wherein Y represents the frequency offset value, g represents the total number of the encrypted data, a y Represents the y-th scale parameter, t j Represents the J-th normalization coefficient, J represents the total number of normalization coefficients, and M represents the reference value of the encrypted data.
In the embodiment of the present invention, the reference value of the encrypted data refers to a standard value of data during data transmission.
In the embodiment of the present invention, the determining whether the encrypted data is offset on the transmission data line according to the frequency offset value includes:
judging whether the frequency offset value exceeds a preset frequency offset target value or not;
when the frequency offset value exceeds the frequency offset target value, the encrypted data is represented to deviate on the transmission data line;
and when the frequency offset value does not exceed the frequency offset target value, indicating that the encrypted data is not offset on the transmission data line.
In the embodiment of the present invention, the frequency offset target value refers to a preset maximum value of a frequency offset value range that ensures that the encrypted data is not offset on the transmission data line.
And if the offset occurs, executing S5, stopping the transmission of the encrypted data and prompting abnormality.
In the embodiment of the invention, when the encrypted data is shifted, the system automatically stops transmitting the encrypted data, and the encrypted data can be visually displayed at the terminal, and the abnormal form can be represented as a red exclamation mark and the like.
And if no deviation occurs, performing S6, performing quality evaluation on the transmitted encrypted data, and generating an online data transmission result according to the quality evaluation result.
Referring to fig. 3, in an embodiment of the present invention, the quality evaluation of the encrypted data after transmission includes:
s31, decrypting the transmitted encrypted data by using the decryption private key to obtain decrypted data;
s32, obtaining original data, calculating a data integrity rate according to the decrypted data and the original data, and calculating a data accuracy rate according to the original data and the decrypted data;
s33, acquiring transmission time of the decrypted data, and calculating the time delay standard deviation of the decrypted data according to the transmission time;
and S34, generating a quality evaluation result according to the data integrity rate, the data accuracy rate and the time delay standard deviation.
In the embodiment of the invention, the original data refers to online message data before encryption.
In the embodiment of the invention, the data integrity rate is calculated by using the following formula:
Figure BDA0004126207890000101
wherein B represents the data integrity rate, x i Represents the ith decrypted data, r m Represents the mth original data, I represents the total number of the decrypted data, and M represents the total number of the original data.
In the embodiment of the invention, the data accuracy is calculated by using the following formula:
Figure BDA0004126207890000102
wherein A represents the data accuracy and X x Representing the total data amount of the decrypted data x, R r Representing the total data amount of said original data r.
In the embodiment of the invention, the following formula is used for calculating the time delay standard deviation of the decrypted data:
Figure BDA0004126207890000103
wherein t represents the standard deviation of time delay, t s Represents the s-th transmission time, t 0 Representing the average value of the transmission times, S representing the total number of transmission times.
In the embodiment of the invention, the data integrity rate refers to judging whether the packet loss phenomenon exists in the data per se in the decryption data transmission process, and the higher the data integrity rate is, the higher the data transmission quality is; the data accuracy rate refers to the anti-interference capability of the decrypted data in the data transmission process, and the higher the data accuracy rate is, the stronger the anti-interference capability in the data transmission process is indicated; the time delay standard deviation refers to the deviation of the time delay of transmitting single data from the average time delay degree in the transmission process of the decrypted data, and the smaller the time delay standard deviation is, the better the transmission stability of the decrypted data is; and when the data integrity rate, the data accuracy rate and the time delay standard deviation are all in a preset target range, the quality of the decrypted data transmission is high.
In the embodiment of the invention, the data integrity rate, the data accuracy rate and the time delay standard deviation are subjected to weight assignment according to preset weights to obtain a plurality of weights, four arithmetic operations are performed according to the plurality of weights, the data integrity rate, the data accuracy rate and the time delay standard deviation to obtain a data value, and the data value is used as a quality evaluation result.
In the embodiment of the present invention, the transmission of the encrypted data is classified into a plurality of classes according to the result of the quality evaluation, for example, the transmission of the encrypted data is classified into 5 classes: 0-2, 2-4, 4-6, 6-8, 8-10; the higher the level, the higher the quality of the encrypted data transmission, and the level is taken as an online data transmission result.
According to the embodiment of the invention, the user information is authenticated based on the 5G message, so that the accuracy of the user information can be ensured, and the safety of subsequent data transmission is improved; when the user information authentication is successful, the security in the online message data transmission process can be improved by carrying out differential encoding and encryption processing on the online message data; the transmission efficiency of the encrypted data can be accelerated by transmitting the encrypted data on the transmission data line; by carrying out frequency offset estimation on the encrypted data, judging whether the encrypted data is offset on a transmission data line according to the frequency offset value, the occurrence of abnormality in the transmission process can be avoided, and the processing efficiency of a computer is accelerated; by carrying out quality evaluation on the encrypted data and generating an online data transmission result according to the quality evaluation result, the quality of online data transmission can be ensured and the online data transmission efficiency can be improved. Therefore, the online data security transmission method based on the 5G message can solve the problem of low security when data transmission is performed based on the 5G message.
Fig. 4 is a functional block diagram of an online data secure transmission system based on 5G messages according to an embodiment of the present invention.
The online data security transmission system 400 based on 5G messages according to the present invention may be installed in an electronic device. The 5G message-based online data security transmission system 400 may include an information authentication module 401, a data encryption module 402, a data transmission module 403, a data suspension module 404, and a data evaluation module 405, depending on the implemented functions. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
the information authentication module 401 is configured to obtain user information and a 5G message corresponding to the user information, and authenticate the user information based on the 5G message;
the data encryption module 402 is configured to obtain online message data corresponding to the 5G message when the user information authentication is successful, and perform differential encoding and encryption processing on the online message data to obtain encrypted data;
the data transmission module 403 is configured to transmit the encrypted data on a preset transmission data line, perform frequency offset estimation on the encrypted data to obtain a frequency offset value, and determine whether the encrypted data is offset on the transmission data line according to the frequency offset value;
the data suspension module 404 is configured to stop transmission of the encrypted data and prompt an exception if an offset occurs;
the data evaluation module 405 is configured to perform quality evaluation on the encrypted data after transmission if no offset occurs, and generate an online data transmission result according to a result of the quality evaluation.
In detail, each module in the online data security transmission system 400 based on 5G messages in the embodiment of the present invention adopts the same technical means as the online data security transmission method based on 5G messages in the drawings, and can generate the same technical effects, which is not described herein.
Fig. 5 is a schematic structural diagram of an electronic device for implementing an online data secure transmission method based on a 5G message according to an embodiment of the present invention.
The electronic device 500 may comprise a processor 501, a memory 502, a communication bus 503 and a communication interface 504, and may further comprise a computer program stored in the memory 502 and executable on the processor 501, such as an online data security transmission program based on 5G messages.
The processor 501 may be formed by an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be formed by a plurality of integrated circuits packaged with the same function or different functions, including one or more central processing units (Central Processing Unit, CPU), a microprocessor, a digital processing chip, a graphics processor, a combination of various control chips, and so on. The processor 501 is a Control Unit (Control Unit) of the electronic device, connects various components of the entire electronic device using various interfaces and lines, executes or executes programs or modules stored in the memory 502 (e.g., executes an online data security transmission program based on 5G messages, etc.), and invokes data stored in the memory 502 to perform various functions of the electronic device and process data.
The memory 502 includes at least one type of readable storage medium including flash memory, a removable hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 502 may in some embodiments be an internal storage unit of the electronic device, such as a mobile hard disk of the electronic device. The memory 502 may also be an external storage device of the electronic device in other embodiments, for example, a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like. Further, the memory 502 may also include both internal storage units and external storage devices of the electronic device. The memory 502 may be used not only to store application software installed in an electronic device and various data, such as codes of an online data security transmission program based on 5G messages, but also to temporarily store data that has been output or is to be output.
The communication bus 503 may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. The bus is arranged to enable connected communication between the memory 502 and the at least one processor 501 etc.
The communication interface 504 is used for communication between the electronic device and other devices, including network interfaces and user interfaces. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), or alternatively a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device and for displaying a visual user interface.
Fig. 5 illustrates only an electronic device having components, and it will be appreciated by those skilled in the art that the configuration illustrated in fig. 5 is not limiting of the electronic device 500 and may include fewer or more components than illustrated, or may combine certain components, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power source (such as a battery) for powering the respective components, and the power source may be logically connected to the at least one processor 501 through a power management system, so as to perform functions of charge management, discharge management, and power consumption management through the power management system. The power supply may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like. The electronic device may further include various sensors, bluetooth modules, wi-Fi modules, etc., which are not described herein.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
The online data secure transfer program based on 5G messages stored in the memory 502 in the electronic device 500 is a combination of instructions that, when executed in the processor 501, may implement:
acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information;
when the user information authentication is successful, acquiring online message data corresponding to the 5G message, and performing differential encoding and encryption processing on the online message data to obtain encrypted data;
transmitting the encrypted data on a preset transmission data line, and performing frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value;
if the offset occurs, stopping the transmission of the encrypted data and prompting abnormality;
and if the deviation does not occur, carrying out quality evaluation on the transmitted encrypted data, and generating an online data transmission result according to the quality evaluation result.
In particular, the specific implementation method of the above instruction by the processor 501 may refer to the description of the relevant steps in the corresponding embodiment of the drawings, which is not repeated herein.
Further, the modules/units integrated with the electronic device 500 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as a stand alone product. The computer readable storage medium may be volatile or nonvolatile. For example, the computer readable medium may include: any entity or system capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
The present invention also provides a computer readable storage medium storing a computer program which, when executed by a processor of an electronic device, can implement:
acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information;
when the user information authentication is successful, acquiring online message data corresponding to the 5G message, and performing differential encoding and encryption processing on the online message data to obtain encrypted data;
transmitting the encrypted data on a preset transmission data line, and performing frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value;
if the offset occurs, stopping the transmission of the encrypted data and prompting abnormality;
and if the deviation does not occur, carrying out quality evaluation on the transmitted encrypted data, and generating an online data transmission result according to the quality evaluation result.
In the several embodiments provided by the present invention, it should be understood that the disclosed apparatus, system and method may be implemented in other manners. For example, the system embodiments described above are merely illustrative, e.g., the division of the modules is merely a logical function division, and other manners of division may be implemented in practice.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. Multiple units or systems as set forth in the system claims may also be implemented by means of one unit or system in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1. An online data security transmission method based on 5G messages, the method comprising:
acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information;
when the user information authentication is successful, acquiring online message data corresponding to the 5G message, and performing differential encoding and encryption processing on the online message data to obtain encrypted data;
transmitting the encrypted data on a preset transmission data line, and performing frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value;
if the offset occurs, stopping the transmission of the encrypted data and prompting abnormality;
and if the deviation does not occur, carrying out quality evaluation on the transmitted encrypted data, and generating an online data transmission result according to the quality evaluation result.
2. The online data security transmission method based on the 5G message according to claim 1, wherein the authenticating the user information based on the 5G message comprises:
acquiring a user trigger trace, and receiving an authentication ID and a corresponding authentication code of the user information according to the user trigger trace;
acquiring a message authentication card of the 5G message, and judging whether a message authentication code carried by the message authentication card is consistent with the authentication code;
when the message authentication code is consistent with the authentication code, the user information is successfully authenticated;
and when the message authentication code is inconsistent with the authentication code, the authentication of the user information is unsuccessful.
3. The online data secure transmission method based on 5G messages according to claim 1, wherein the performing differential encoding and encryption processing on the online message data to obtain encrypted data comprises:
encoding the online message data to obtain a message code;
the message encoding is expressed as:
Figure FDA0004126207860000011
wherein b 1 (n) represents the nth message code, b 1 (n-1) represents an n-1 th message code, and b (n) represents an n-th online message data;
and generating an encryption public key and a decryption private key by using a preset encryption algorithm, and asymmetrically encrypting the online message data and the corresponding message codes by using the encryption public key to obtain encrypted data.
4. The method for online data security transmission based on 5G messages according to claim 1, wherein the performing frequency offset estimation on the encrypted data to obtain a frequency offset value comprises:
acquiring a data signal of the encrypted data, performing wavelet transformation on the data signal to obtain a wavelet coefficient, and performing normalization calculation on the wavelet coefficient to obtain a normalization coefficient;
the normalization coefficient is calculated using the following formula:
t j =(w k -M)/D
wherein t is j Represents the j-th normalization coefficient, w k Representing the kth wavelet coefficient, D representing a preset calculation parameter, M representing a reference value of the encrypted data;
acquiring the data length of the encrypted data, and calculating a scale parameter according to the data length;
the scale parameters were calculated using the following formula:
a y =c×(f/l)
wherein a is y Representing a y-th scale parameter, f representing the interval between the encrypted data, l representing the data length, and c representing a preset calculation parameter;
and calculating the frequency offset value of the encrypted data by utilizing the normalization coefficient and the scale parameter.
5. The method for online data security transmission based on 5G messages according to claim 4, wherein said calculating a frequency offset value of the encrypted data using the normalization coefficient and the scale parameter comprises:
calculating the frequency offset value of the encrypted data by using the following formula:
Figure FDA0004126207860000021
wherein Y represents the frequency offset value, g represents the total number of the encrypted data, a y Represents the y-th scale parameter, t j Represents the J-th normalization coefficient, J represents the total number of normalization coefficients, and M represents the reference value of the encrypted data.
6. The method for online data security transmission based on 5G messages according to claim 1, wherein said performing quality evaluation on the encrypted data after transmission comprises:
decrypting the transmitted encrypted data by using the decryption private key to obtain decrypted data;
acquiring original data, calculating a data integrity rate according to the decrypted data and the original data, and calculating a data accuracy rate according to the original data and the decrypted data;
the data integrity rate was calculated using the following formula:
Figure FDA0004126207860000031
wherein B represents the data integrity rate, x i Represents the ith decrypted data, r m Representing the mth original data, wherein I represents the total number of the decrypted data, and M represents the total number of the original data;
calculating the data accuracy using the following formula:
Figure FDA0004126207860000032
wherein A represents the data accuracy and X x Representing the total data amount of the decrypted data x, R r Representing the total data amount of the original data r;
acquiring the transmission time of the decrypted data, and calculating the time delay standard deviation of the decrypted data according to the transmission time;
and generating a quality evaluation result according to the data integrity rate, the data accuracy rate and the time delay standard deviation.
7. The method for securely transmitting online data based on 5G messages according to claim 6, wherein said calculating a standard deviation of a delay of said decrypted data based on said transmission time comprises:
calculating the time delay standard deviation of the decrypted data by using the following formula:
Figure FDA0004126207860000033
wherein t represents the standard deviation of time delay, t s Represents the s-th transmission time, t 0 Representing the average value of the transmission times, S representing the total number of transmission times.
8. The method for online data secure transmission based on 5G messages according to claim 1, wherein said determining whether the encrypted data is shifted on the transmission data line according to the frequency offset value comprises:
judging whether the frequency offset value exceeds a preset frequency offset target value or not;
when the frequency offset value exceeds the frequency offset target value, the encrypted data is represented to deviate on the transmission data line;
and when the frequency offset value does not exceed the frequency offset target value, indicating that the encrypted data is not offset on the transmission data line.
9. An online data secure transmission system based on 5G messages, the system comprising:
the information authentication module is used for acquiring user information and 5G information corresponding to the user information, and authenticating the user information based on the 5G information;
the data encryption module is used for acquiring online message data corresponding to the 5G message when the user information authentication is successful, and performing differential encoding and encryption processing on the online message data to obtain encrypted data;
the data transmission module is used for transmitting the encrypted data on a preset transmission data line, carrying out frequency offset estimation on the encrypted data to obtain a frequency offset value, and judging whether the encrypted data is offset on the transmission data line according to the frequency offset value;
the data suspension module is used for stopping the transmission of the encrypted data and prompting abnormality if the offset occurs;
and the data evaluation module is used for carrying out quality evaluation on the transmitted encrypted data if no offset occurs, and generating an online data transmission result according to the quality evaluation result.
10. An electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the 5G message based online data secure transmission method of any one of claims 1 to 8.
CN202310246634.4A 2023-03-06 2023-03-06 Online data security transmission method and system based on 5G message and electronic equipment Active CN116261139B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310246634.4A CN116261139B (en) 2023-03-06 2023-03-06 Online data security transmission method and system based on 5G message and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310246634.4A CN116261139B (en) 2023-03-06 2023-03-06 Online data security transmission method and system based on 5G message and electronic equipment

Publications (2)

Publication Number Publication Date
CN116261139A true CN116261139A (en) 2023-06-13
CN116261139B CN116261139B (en) 2023-09-15

Family

ID=86679118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310246634.4A Active CN116261139B (en) 2023-03-06 2023-03-06 Online data security transmission method and system based on 5G message and electronic equipment

Country Status (1)

Country Link
CN (1) CN116261139B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050030807A (en) * 2003-09-26 2005-03-31 엘지전자 주식회사 A method and a apparatus of frequency offset estimation for mobile phone
CN101959191A (en) * 2010-09-25 2011-01-26 华中科技大学 Safety authentication method and system for wireless network
CN111866876A (en) * 2020-06-02 2020-10-30 东南大学 Wireless equipment identification method and device based on frequency offset preprocessing and storage medium
CN114025350A (en) * 2021-12-09 2022-02-08 湖南大学 Double authentication method based on password and frequency offset
CN114727293A (en) * 2022-03-09 2022-07-08 江苏电力信息技术有限公司 Identity counterfeit attack identification method based on radio frequency fingerprint and unsupervised learning
CN114867018A (en) * 2022-06-06 2022-08-05 西安交通大学 Device identification authentication method, system and storage medium using carrier frequency offset

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050030807A (en) * 2003-09-26 2005-03-31 엘지전자 주식회사 A method and a apparatus of frequency offset estimation for mobile phone
CN101959191A (en) * 2010-09-25 2011-01-26 华中科技大学 Safety authentication method and system for wireless network
CN111866876A (en) * 2020-06-02 2020-10-30 东南大学 Wireless equipment identification method and device based on frequency offset preprocessing and storage medium
CN114025350A (en) * 2021-12-09 2022-02-08 湖南大学 Double authentication method based on password and frequency offset
CN114727293A (en) * 2022-03-09 2022-07-08 江苏电力信息技术有限公司 Identity counterfeit attack identification method based on radio frequency fingerprint and unsupervised learning
CN114867018A (en) * 2022-06-06 2022-08-05 西安交通大学 Device identification authentication method, system and storage medium using carrier frequency offset

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
缪刚;周志中;: "MIMO OFDM短波无线通信的频率同步技术研究", 信息安全与通信保密, no. 03 *

Also Published As

Publication number Publication date
CN116261139B (en) 2023-09-15

Similar Documents

Publication Publication Date Title
CN110113167B (en) Information protection method and system of intelligent terminal and readable storage medium
CN109657450B (en) Method, device, medium, and electronic device for evaluation based on block chain
CN111191284B (en) Processing method, device and system for judicial evidence storage of sensitive information based on block chain technology
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN104008351B (en) Window application completeness check system, method and device
US20080083039A1 (en) Method for integrity attestation of a computing platform hiding its configuration information
EP2916484A1 (en) User authentication using elliptic curve based OTP
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN111859431A (en) Electronic file signature method and device, electronic equipment and storage medium
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN114499859A (en) Password verification method, device, equipment and storage medium
CN116910816B (en) Multiparty asset collaborative management method and device for improving privacy protection
CN112862484A (en) Secure payment method and device based on multi-terminal interaction
CN116261139B (en) Online data security transmission method and system based on 5G message and electronic equipment
CN116401718A (en) Block chain-based data protection method and device, electronic equipment and storage medium
CN114125158B (en) Anti-harassment method, device, equipment and storage medium based on trusted telephone
CN114697132B (en) Method, device, equipment and storage medium for intercepting repeated access request attack
CN115119197B (en) Wireless network risk analysis method, device, equipment and medium based on big data
CN114884714B (en) Task processing method, device, equipment and storage medium
CN116112216A (en) Cloud data verification method and device, electronic equipment and nonvolatile storage medium
CN107277054A (en) A kind of method and system of data integrity validation
CN114095220A (en) Telephone communication verification method, device, equipment and storage medium
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN113344598A (en) Data verification method, device, medium and electronic equipment
CN110690973A (en) Identity verification method, identity verification device, identity verification medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant