CN116383857B - Cross-platform authentication-based storage method, device and storage medium - Google Patents

Cross-platform authentication-based storage method, device and storage medium Download PDF

Info

Publication number
CN116383857B
CN116383857B CN202310655145.4A CN202310655145A CN116383857B CN 116383857 B CN116383857 B CN 116383857B CN 202310655145 A CN202310655145 A CN 202310655145A CN 116383857 B CN116383857 B CN 116383857B
Authority
CN
China
Prior art keywords
information
authentication
different
encryption
data streams
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310655145.4A
Other languages
Chinese (zh)
Other versions
CN116383857A (en
Inventor
周菊
刘兴梦
刘昱廷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Jichuan Iot Technology Co ltd
Original Assignee
Guanwen Testing Suzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guanwen Testing Suzhou Co ltd filed Critical Guanwen Testing Suzhou Co ltd
Priority to CN202310655145.4A priority Critical patent/CN116383857B/en
Publication of CN116383857A publication Critical patent/CN116383857A/en
Application granted granted Critical
Publication of CN116383857B publication Critical patent/CN116383857B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a storage method, a storage device and a storage medium based on cross-platform authentication, which relate to the technical field of information storage and solve the technical problems that an original encryption mode is too single, encryption is not carried out on stored authentication information, so that after a secret key is cracked, the authentication information has a theft risk, the encryption safety is not high, redundant data are replaced according to a redundant data matching table, the whole capacity of corresponding storage information is reduced, and the storage space is reasonably utilized and allocated; and then, according to the confirmed capacity value, different encryption templates are adopted, wherein the different encryption templates are provided with different encryption modes, when an external person steals one encryption mode, the other group of templates are the other group of encryption modes, the encryption safety of the whole information is higher, and the whole information cannot be easily stolen by an external illegal person, so that the storage effect of the whole authentication information is improved, and the encryption safety is improved.

Description

Cross-platform authentication-based storage method, device and storage medium
Technical Field
The application belongs to the technical field of information storage, and particularly relates to a storage method, a storage device and a storage medium based on cross-platform authentication.
Background
The cross-platform generalized program language, software or hardware equipment can operate on computers with various operating systems or different hardware architectures, and along with the development of the era, both transaction parties or both operation parties can adopt a cross-platform authentication mode to authenticate information of both parties.
Patent publication number CN112131026a relates to an information processing method, device, computer equipment and storage medium based on a cross-platform framework. The method comprises the following steps: intercepting communication data when the cross-platform frame end and the client end carry out data communication; processing the intercepted communication data to generate log data in a preset log data format corresponding to the communication data; and transmitting the communication data to an target receiver of the communication data, and uploading the log data to a log system server for storage. By adopting the method, the working efficiency of the developer can be improved.
For the authentication information generated by both transaction sides or both operation sides, the designated storage space is required to store the authentication information, and generally, before the storage, the operation sides set the encryption key to encrypt the authentication information, but in the actual encryption operation process, the original encryption mode is too single, the stored authentication information is not encrypted, so that after the key is cracked, the authentication information has a theft risk, and the encryption security is not high.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the prior art; therefore, the application provides a storage method, a device and a storage medium based on cross-platform authentication, which are used for solving the technical problems that the original encryption mode is too single, the stored authentication information is not encrypted, so that after a key is cracked, the authentication information has a theft risk, and the encryption security is not high.
To achieve the above object, an embodiment according to a first aspect of the present application proposes a storage method based on cross-platform authentication, comprising the steps of:
s1, an authentication terminal which performs cross-platform authentication is predetermined, an IP address of the authentication terminal is confirmed, authentication information is confirmed and extracted according to the confirmed IP address, and the confirmed and extracted authentication information is stored in the next step, wherein the specific mode is as follows:
s11, after the IP addresses of the authentication terminals are confirmed, the IP addresses of the two parties are recorded, and the two parties authenticated mutually are marked as a round-trip authentication ring according to the IP addresses;
s12, extracting and marking the authentication information of each different phase of each group of different round-trip authentication rings, wherein one phase is from the start to the end of the authentication link, and a plurality of authentication information are present in one phaseCalibrating a plurality of authentication information belonging to different stages into information packets, and marking different information packets as B i-k Wherein i represents different round-trip authentication loops and k represents different phases;
s13, the information packet B after calibration processing i-k Carrying out next storage processing;
s2, carrying out redundant data analysis on a plurality of groups of different information packets of different round-trip authentication rings, replacing the redundant data by adopting a redundant mark, and carrying out next processing on the information packets subjected to the replacement processing, wherein the specific mode is as follows:
s21, different information packets B belonging to the same round-trip authentication ring i-k Performing comparison and analysis to confirm redundant data, namely repeated data, and after the redundant data is confirmed, adopting a redundant mark RL t Replacing the designated redundant data, wherein t represents different redundant data;
s22, after the redundant data is extracted, confirming the corresponding redundant mark RL t And marks the redundancy RL t Binding the redundant data with the replaced redundant data to obtain a redundant data matching table belonging to the corresponding round-trip authentication ring;
s23, replacing the information packet B with the redundant mark i-k Carrying out the next treatment;
s3, receiving and confirming the processed information packets, classifying the information packets belonging to the same round-trip authentication ring, encrypting and storing each group of different information packets, and adopting different encryption and storage modes for the information packets with different capacity forms, wherein the specific modes are as follows:
s31, according to the received large number of information packets B i-k Confirming a specific mark i, and confirming the information packets belonging to the same round-trip authentication ring according to the mark i;
s32, confirming the corresponding information packet B i-k And marking the confirmed capacity parameter as RC i-k Dividing the corresponding information packet into nine groups of data streams, dividing the nine groups of data streams into trisections, sequentially carrying out halving processing according to the front-to-back arrangement sequence, marking the data streams belonging to different halving, and markingThe record form is as follows: O-J, wherein O represents different aliquots and o=1, 2, 3, wherein J represents different data streams and j=1, 2, 3;
s33, confirming the capacity parameter RC i-k Whether the last group of digits is odd or even:
s331, if the number of the data streams is odd, an odd encryption template is adopted, an inner circle, a middle circle and an outer circle are arranged in the odd encryption template, each group of circles are equally divided into trisections, one equally divided three groups of data streams 1-1, 1-2 and 1-3 are filled into the inner circle of the odd encryption template, the inner circle is provided with three groups of areas, the data stream of O-1 is sequentially filled into the left area corresponding to the odd encryption template, and then the subsequent O-2 and O-3 are sequentially filled into the corresponding equal areas according to the anticlockwise direction, wherein 2-1, 2-2 and 2-3 are positioned in the middle circle, and 3-1, 3-2 and 3-3 are positioned in the outer circle;
s332, if the number is even, an even encryption template is adopted, wherein an inner circle, a middle circle and an outer circle are also arranged in the even encryption template, each group of circles are equally divided into three equal parts, an equal part of three groups of data streams 1-1, 1-2 and 1-3 are filled into the outer circle of the even encryption template, the data stream of O-1 is sequentially filled into the left area of the corresponding even encryption template, the subsequent O-2 and O-3 are sequentially filled into the corresponding equal area according to the anticlockwise direction, 2-1, 2-2 and 2-3 are positioned in the middle circle, and 3-1, 3-2 and 3-3 are positioned in the inner circle;
s34, after the encryption of different encryption templates is completed, storing the processed encryption templates in the designated partition positions, carrying out information storage processing, wherein the authentication information of different back-and-forth authentication rings is stored in different partitions, and the different authentication information of the same back-and-forth authentication ring is stored in different storage spaces of the corresponding partitions;
s4, after the storage of the information packages of the different round-trip authentication rings is finished, when the information packages are extracted subsequently, decrypting in advance, and displaying the decrypted information package files for an extraction person to check, wherein the specific mode is as follows:
s41, extracting a template corresponding to the corresponding information packet according to the determined instruction, extracting a corresponding encryption template, extracting data streams at different positions in the encryption template in advance, obtaining a total capacity value of a plurality of data streams, and analyzing whether the last group of numbers of the capacity value are odd numbers or even numbers;
s42, if the capacity value is odd, extracting three groups of data streams of the inner circle of the template preferentially, taking the data stream of the left area as a first group of data streams, sequentially confirming and merging subsequent data streams according to a anticlockwise confirmation mode, sequentially confirming and merging the data streams of the middle circle and the outer circle, and obtaining an original information packet;
and S43, if the capacity value is even, preferentially extracting three groups of data streams of the outer circle of the template, taking the data stream of the left area as the first group of data streams, sequentially confirming and merging subsequent data streams according to a anticlockwise confirmation mode, sequentially confirming and merging the data streams of the middle circle and the inner circle to obtain an original information packet, and displaying the obtained information packet.
Compared with the prior art, the application has the beneficial effects that: the redundant data is replaced in advance according to the redundant data matching table, so that the whole capacity of corresponding storage information is reduced, too much storage space is prevented from being wasted in the storage process, and the storage space is reasonably utilized and allocated;
and then, according to the confirmed capacity value, different encryption templates are adopted, wherein the different encryption templates are provided with different encryption modes, when an external person steals one encryption mode, the other group of templates are the other group of encryption modes, the encryption safety of the whole information is higher, and the whole information cannot be easily stolen by an external illegal person, so that the storage effect of the whole authentication information is improved, and the encryption safety is improved.
Drawings
FIG. 1 is a schematic flow chart of the method of the present application;
FIG. 2 is a schematic diagram of an odd encryption template according to the present application;
FIG. 3 is a schematic diagram of an even-numbered encryption template according to the present application.
Detailed Description
The technical solutions of the present application will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Example 1
Referring to fig. 1, the application provides a storage method based on cross-platform authentication, which comprises the following steps:
s1, an authentication terminal which performs cross-platform authentication is predetermined, an IP address of the authentication terminal is confirmed, authentication information is confirmed and extracted according to the confirmed IP address, and the confirmed and extracted authentication information is stored and processed in the next step, wherein the specific mode for confirming and extracting the authentication information is as follows:
s11, after the IP addresses of the authentication terminals are confirmed, the IP addresses of the two parties are recorded, the two parties authenticated mutually are marked as a round-trip authentication ring according to the IP addresses, and concretely, three groups of authentication terminals, namely A, B and C, exist, wherein AB mutually authenticates and BC mutually authenticates, then AB is a set of round-trip authentication rings, and BC is a set of round-trip authentication rings;
s12, extracting and marking the authentication information of each different stage of each group of different round-trip authentication rings, wherein one stage is from the beginning to the end of the authentication link, so that a plurality of authentication information exists in one stage, calibrating the plurality of authentication information belonging to the different stages into information packets, and marking the different information packets as B i-k Wherein i represents different round-trip authentication loops and k represents different phases;
s13, the information packet B after calibration processing i-k Carrying out next storage processing;
s2, carrying out redundant data analysis on a plurality of groups of different information packets of different round-trip authentication rings, replacing the redundant data by adopting a redundant mark, and carrying out next processing on the information packets subjected to replacement processing, wherein the specific mode for replacing the redundant data is as follows:
s21, different information packets B belonging to the same round-trip authentication ring i-k Performing comparison and analysis to confirm redundant data, namely repeated data, and after the redundant data is confirmed, adopting a redundant mark RL t Replacing the designated redundant data, wherein t represents different redundant data;
s22, after the redundant data is extracted, confirming the corresponding redundant mark RL t And marks the redundancy RL t Binding the data with the replaced redundant data to obtain a redundant data matching table belonging to a corresponding round-trip authentication ring, specifically, in the redundant data matching table, different redundant marks correspond to different redundant data, wherein in the same round-trip authentication ring, because both authentication sides are in a constant state, in the actual authentication process, a large amount of redundant data, such as identity information, account information and the like, are generated in each authentication, and a large amount of redundant data is caused because the identity information, the account information and the like are repeated information, and the redundant data in the original information packet is replaced by adopting the form of replacing the redundant data by the redundant marks;
s23, replacing the information packet B with the redundant mark i-k Carrying out the next treatment;
s3, receiving and confirming the processed information packets, classifying the information packets belonging to the same round-trip authentication ring, and encrypting and storing each group of different information packets, wherein the information packets in different capacity forms adopt different encryption and storage modes, and the specific mode for encrypting and storing is as follows:
s31, according to the received large number of information packets B i-k Confirming a specific mark i, and confirming the information packets belonging to the same round-trip authentication ring according to the mark i;
s32, confirming the corresponding information packet B i-k And marking the confirmed capacity parameter as RC i-k Dividing the corresponding information packet into nine groups of data streams, dividing the nine groups of data streams into trisections, sequentially carrying out halving processing according to the front-to-back arrangement sequence, and marking the data streams belonging to different halving modes as follows: O-J, wherein O represents different aliquots and o=1, 2, 3, wherein J represents different aliquotsJ=1, 2, 3, J being equal to only 3 at maximum because three sets of data streams are covered in each set of equal parts, when O-J is 1-2, it represents a second set of data streams that is one equal part, and when O-J is 2-1, it represents a first set of data streams that is one equal part;
s33, confirming the capacity parameter RC i-k Whether the last group of digits is odd or even:
s331, if the number is odd, an odd encryption template is adopted, an inner circle, a middle circle and an outer circle are arranged in the odd encryption template, each group of circles are equally divided into trisections, one equally divided three groups of data streams 1-1, 1-2 and 1-3 are filled into the inner circle of the odd encryption template, the inner circle is provided with three groups of subareas, the data stream of O-1 is sequentially filled into the left area corresponding to the odd encryption template in combination with FIG. 2, and then the subsequent O-2 and O-3 are sequentially filled into the corresponding equal subareas in a anticlockwise direction, wherein 2-1, 2-2 and 2-3 are positioned in the middle circle, and 3-1, 3-2 and 3-3 are positioned in the outer circle;
s332, if the number is even, an even encryption template is adopted, wherein an inner circle, a middle circle and an outer circle are also arranged in the even encryption template, each group of circles are equally divided into three equal parts, three groups of data streams 1-1, 1-2 and 1-3 which are equally divided are filled into the outer circle of the even encryption template, with reference to FIG. 3, the data stream of O-1 is sequentially filled into the left area corresponding to the even encryption template, and then the subsequent O-2 and O-3 are sequentially filled into the corresponding equal areas according to the anticlockwise direction, wherein 2-1, 2-2 and 2-3 are positioned in the middle circle, and 3-1, 3-2 and 3-3 are positioned in the inner circle;
s34, after the encryption of different encryption templates is finished, the processed encryption templates are stored in the appointed partition positions for information storage processing, authentication information of different round-trip authentication rings is stored in different partitions, different authentication information of the same round-trip authentication ring is stored in different storage spaces of corresponding partitions, and specifically, different information packages are firstly subjected to different encryption templates according to confirmed capacity values, wherein the different encryption templates are provided with different encryption modes, when an external person steals one encryption mode, the other group of templates is the other group of encryption modes, the encryption safety degree of the whole information is higher, the whole authentication information cannot be easily stolen by an external person, the storage effect of the whole authentication information is improved, the encryption safety degree is improved, the encryption modes of odd-numbered encryption templates and even-numbered encryption templates are different, the adopted templates are all confirmed by the whole capacity values of corresponding data, the capacity values of the corresponding encryption templates are not changed when the corresponding encryption templates are subsequently decrypted, the encryption effect of the corresponding encryption templates is confirmed, and the encryption effect is improved according to encryption logic;
s4, after the information packages of different round-trip authentication rings are stored, decrypting in advance when the information packages are extracted, and displaying the decrypted information package files for an extraction person to check, wherein the specific mode of decrypting is as follows:
s41, extracting a template corresponding to the corresponding information packet according to the determined instruction, extracting a corresponding encryption template, extracting data streams at different positions in the encryption template in advance, obtaining a total capacity value of a plurality of data streams, and analyzing whether the last group of numbers of the capacity value are odd numbers or even numbers;
if the capacity value is odd, extracting the three groups of data streams of the inner circle of the template preferentially, sequentially confirming and merging the subsequent data streams according to a counterclockwise confirmation mode by taking the data stream of the left area as the first group of data streams, sequentially confirming and merging the data streams of the middle circle and the outer circle to obtain an original information packet, wherein the merged data stream has the following expression form as shown in fig. 2: 1-1, 1-2, 1-3, 2-1, 2-2, 2-3, 3-1, 3-2, 3-3;
and S43, if the capacity value is even, preferentially extracting three groups of data streams of the outer circle of the template, sequentially confirming and merging subsequent data streams according to a anticlockwise confirmation mode by taking the data stream of the left area as a first group of data streams, sequentially confirming and merging the data streams of the middle circle and the inner circle to obtain a packet, and subsequently supplementing the redundant data in the packet according to the redundant mark and the redundant data matching table, and displaying the obtained packet for external personnel to check.
Example two
The storage device based on cross-platform authentication comprises at least one group of processors and at least one group of decoders, wherein the processors are used for dividing the information packet according to the specific capacity of the information packet, and encrypting the information packet according to a plurality of divided data streams after the division is finished;
the decoder is used for decrypting the information data stored in the encryption template according to the encryption logic originally set by the processor when information extraction is carried out;
example III
Based on the storage medium of cross-platform authentication, a plurality of storage partitions are arranged inside, different storage partitions are used for storing information packages of different round-trip authentication rings, a plurality of storage spaces are arranged in the storage partitions, and different storage spaces store different information packages.
The partial data in the formula are all obtained by removing dimension and taking the numerical value for calculation, and the formula is a formula closest to the real situation obtained by simulating a large amount of collected data through software; the preset parameters and the preset threshold values in the formula are set by those skilled in the art according to actual conditions or are obtained through mass data simulation.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.

Claims (2)

1. The storage method based on the cross-platform authentication is characterized by comprising the following steps of:
s1, an authentication terminal which performs cross-platform authentication is predetermined, an IP address of the authentication terminal is confirmed, authentication information is confirmed and extracted according to the confirmed IP address, and the confirmed and extracted authentication information is subjected to next storage processing;
s2, carrying out redundant data analysis on a plurality of groups of different information packets of different round-trip authentication rings, replacing the redundant data by adopting a redundant mark, and carrying out next processing on the information packets subjected to replacement processing;
s3, receiving and confirming the processed information packets, classifying the information packets belonging to the same round-trip authentication ring, and encrypting and storing each group of different information packets, wherein the information packets in different capacity forms adopt different encryption and storage modes;
s4, after the information packages of different round-trip authentication rings are stored, decrypting in advance when the information packages are extracted later, and displaying the decrypted information package files for an extraction person to check;
in the step S1, the specific method for identifying and extracting the authentication information is as follows:
s11, after the IP addresses of the authentication terminals are confirmed, the IP addresses of the two parties are recorded, and the two parties authenticated mutually are marked as a round-trip authentication ring according to the IP addresses;
s12, extracting and marking the authentication information of each different phase of each group of different round-trip authentication rings, wherein one phase is from the beginning to the end of the authentication link, calibrating a plurality of authentication information belonging to different phases into information packets, and marking different information packets as B i-k Wherein i represents different round-trip authentication loops and k represents different phases;
s13, the information packet B after calibration processing i-k Carrying out next storage processing;
in the step S2, the specific way to replace the redundant data is as follows:
s21, different information packets B belonging to the same round-trip authentication ring i-k Performing comparison and analysis to confirm redundant data, and using a redundancy flag RL t Replacing the designated redundant data, wherein t represents different redundant data;
s22, after the redundant data is extracted, confirming the corresponding redundant mark RL t And marks the redundancy RL t Binding the redundant data with the replaced redundant data to obtain a redundant data matching table belonging to the corresponding round-trip authentication ring;
s23, replacing the information packet B with the redundant mark i-k Carrying out the next treatment;
in the step S3, the specific way of encrypting and storing each group of different information packets is as follows:
s31, according to the received large number of information packets B i-k Confirming a specific mark i, and confirming the information packets belonging to the same round-trip authentication ring according to the mark i;
s32, confirming the corresponding information packet B i-k And marking the confirmed capacity parameter as RC i-k Dividing the corresponding information packet into nine groups of data streams, dividing the nine groups of data streams into trisections, sequentially carrying out halving processing according to the front-to-back arrangement sequence, and marking the data streams belonging to different halving modes as follows: O-J, wherein O represents different aliquots and o=1, 2, 3, wherein J represents different data streams and j=1, 2, 3;
s33, confirming the capacity parameter RC i-k Whether the last group of digits is odd or even:
s331, if the number of the data streams is odd, an odd encryption template is adopted, an inner circle, a middle circle and an outer circle are arranged in the odd encryption template, each group of circles are equally divided into trisections, one equally divided three groups of data streams 1-1, 1-2 and 1-3 are filled into the inner circle of the odd encryption template, the inner circle is provided with three groups of areas, the data stream of O-1 is sequentially filled into the left area corresponding to the odd encryption template, and then the subsequent O-2 and O-3 are sequentially filled into the corresponding equal areas according to the anticlockwise direction, wherein 2-1, 2-2 and 2-3 are positioned in the middle circle, and 3-1, 3-2 and 3-3 are positioned in the outer circle;
s332, if the number is even, an even encryption template is adopted, wherein an inner circle, a middle circle and an outer circle are also arranged in the even encryption template, each group of circles are equally divided into three equal parts, an equal part of three groups of data streams 1-1, 1-2 and 1-3 are filled into the outer circle of the even encryption template, the data stream of O-1 is sequentially filled into the left area of the corresponding even encryption template, the subsequent O-2 and O-3 are sequentially filled into the corresponding equal area according to the anticlockwise direction, 2-1, 2-2 and 2-3 are positioned in the middle circle, and 3-1, 3-2 and 3-3 are positioned in the inner circle;
s34, after the encryption of different encryption templates is completed, the processed encryption templates are stored in the designated partition positions, information storage processing is carried out, authentication information of different back-and-forth authentication rings is stored in different partitions, and different authentication information of the same back-and-forth authentication ring is stored in different storage spaces of the corresponding partitions.
2. The storage method based on cross-platform authentication according to claim 1, wherein in the step S4, the specific manner of decryption is as follows:
s41, extracting a template corresponding to the corresponding information packet according to the determined instruction, extracting a corresponding encryption template, extracting data streams at different positions in the encryption template in advance, obtaining a total capacity value of a plurality of data streams, and analyzing whether the last group of numbers of the capacity value are odd numbers or even numbers;
s42, if the capacity value is odd, extracting three groups of data streams of the inner circle of the template preferentially, taking the data stream of the left area as a first group of data streams, sequentially confirming and merging subsequent data streams according to a anticlockwise confirmation mode, sequentially confirming and merging the data streams of the middle circle and the outer circle, and obtaining an original information packet;
and S43, if the capacity value is even, preferentially extracting three groups of data streams of the outer circle of the template, sequentially confirming and combining subsequent data streams according to a anticlockwise confirmation mode by taking the data stream of the left area as a first group of data streams, sequentially confirming and combining the data streams of the middle circle and the inner circle to obtain an original information packet, and then supplementing the redundant data in the information packet according to a redundant mark and a redundant data matching table to display the obtained information packet.
CN202310655145.4A 2023-06-05 2023-06-05 Cross-platform authentication-based storage method, device and storage medium Active CN116383857B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310655145.4A CN116383857B (en) 2023-06-05 2023-06-05 Cross-platform authentication-based storage method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310655145.4A CN116383857B (en) 2023-06-05 2023-06-05 Cross-platform authentication-based storage method, device and storage medium

Publications (2)

Publication Number Publication Date
CN116383857A CN116383857A (en) 2023-07-04
CN116383857B true CN116383857B (en) 2023-08-22

Family

ID=86971667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310655145.4A Active CN116383857B (en) 2023-06-05 2023-06-05 Cross-platform authentication-based storage method, device and storage medium

Country Status (1)

Country Link
CN (1) CN116383857B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117131528B (en) * 2023-09-04 2024-03-08 苏州派博思生物技术有限公司 OEM information customization method and system
CN117675206B (en) * 2024-02-01 2024-04-05 长沙数智科技集团有限公司 Comprehensive management service platform based on smart city government affair data and data management method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314274A (en) * 2019-07-30 2020-06-19 厦门雅迅网络股份有限公司 Vehicle-mounted terminal and center platform bidirectional authentication method and system
CN112149076A (en) * 2020-10-10 2020-12-29 上海威固信息技术股份有限公司 Safe computer storage system
CN116127524A (en) * 2023-04-18 2023-05-16 智慧(东营)大数据有限公司 Enterprise information security management system based on big data analysis

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2509709A (en) * 2013-01-09 2014-07-16 Ibm Transparent encryption/decryption gateway for cloud storage services
US9439072B2 (en) * 2013-11-08 2016-09-06 Teamblind Inc. System and method for authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314274A (en) * 2019-07-30 2020-06-19 厦门雅迅网络股份有限公司 Vehicle-mounted terminal and center platform bidirectional authentication method and system
CN112149076A (en) * 2020-10-10 2020-12-29 上海威固信息技术股份有限公司 Safe computer storage system
CN116127524A (en) * 2023-04-18 2023-05-16 智慧(东营)大数据有限公司 Enterprise information security management system based on big data analysis

Also Published As

Publication number Publication date
CN116383857A (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN116383857B (en) Cross-platform authentication-based storage method, device and storage medium
CN110493261B (en) Verification code obtaining method based on block chain, client, server and storage medium
US10148437B2 (en) Encryption system with key recovery
CN102484638B (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
CN109040090A (en) A kind of data ciphering method and device
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN105637801A (en) Polymorphic encryption key matrices
CN114640523B (en) Computer data security encryption method and system
CN111062045A (en) Information encryption and decryption method and device, electronic equipment and storage medium
CN115348107A (en) Internet of things equipment secure login method and device, computer equipment and storage medium
CN113489710B (en) File sharing method, device, equipment and storage medium
CN116455572B (en) Data encryption method, device and equipment
CN117240625A (en) Tamper-resistant data processing method and device and electronic equipment
KR101817424B1 (en) encryption method, decryption method and apparatus thereof
CN116170157A (en) User password encryption and decryption method and device based on national encryption algorithm
US20210035018A1 (en) Apparatus for verifying integrity of AI learning data and method therefor
CN111553686A (en) Data processing method and device, computer equipment and storage medium
US11720693B2 (en) System and method for securely transferring data
CN116132041A (en) Key processing method and device, storage medium and electronic equipment
CN114244635B (en) Encryption type data coding method of communication equipment
CN116366289A (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN113282939B (en) Data unloading encryption and decryption method and system based on PowerPC and detachable storage equipment
CN115422579A (en) Data encryption storage and query method and system after storage
CN114611129A (en) Data privacy protection method and system
US11522707B2 (en) System and method for detecting compromised devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231213

Address after: Room 229, Building 1, No. 333 Xingpu Road, Suzhou Industrial Park, Suzhou Area, China (Jiangsu) Pilot Free Trade Zone, Suzhou City, Jiangsu Province, 215000

Patentee after: Suzhou Jichuan IoT Technology Co.,Ltd.

Address before: Unit 6C-001, International Science Park, No. 1355, Jinji Lake Avenue, Suzhou Industrial Park, Jiangsu Province, 215000

Patentee before: Guanwen Testing (Suzhou) Co.,Ltd.

TR01 Transfer of patent right