CN116389043A - Data processing quality control method, system and medium based on Xinchuang national encryption algorithm - Google Patents

Data processing quality control method, system and medium based on Xinchuang national encryption algorithm Download PDF

Info

Publication number
CN116389043A
CN116389043A CN202310110856.3A CN202310110856A CN116389043A CN 116389043 A CN116389043 A CN 116389043A CN 202310110856 A CN202310110856 A CN 202310110856A CN 116389043 A CN116389043 A CN 116389043A
Authority
CN
China
Prior art keywords
data
quality control
encryption
algorithm
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310110856.3A
Other languages
Chinese (zh)
Inventor
李军云
李岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huayuanke Beijing Information Technology Co ltd
Original Assignee
Huayuanke Beijing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huayuanke Beijing Information Technology Co ltd filed Critical Huayuanke Beijing Information Technology Co ltd
Priority to CN202310110856.3A priority Critical patent/CN116389043A/en
Publication of CN116389043A publication Critical patent/CN116389043A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention relates to the technical field of data processing and discloses a data processing quality control method based on a Xinchuang national encryption algorithm. The data processing quality control method, system and medium based on the information creation country encryption algorithm are characterized in that collected data information is integrated and stored in a folder so as to avoid losing, the data information in the folder is analyzed, a data set is stored after an input program is operated, encryption is performed at the same time, whether data is readable or not is checked, whether sensitive information is desensitized or not is checked, the newly analyzed data is stored in a server side, meanwhile, a secret key in a data information base is obtained from a management system, the secret key can be entered into a relational system only through the secret key, the secret key comprises identity information authentication, face fingerprint identification and the like, an encryption and decryption algorithm module performs encryption operation, an encryption result is fed back, the quality control module triggers a data decryption requirement, and a decryption engine is called for an encryption and decryption algorithm module to obtain the secret key and perform identity authentication and authentication.

Description

Data processing quality control method, system and medium based on Xinchuang national encryption algorithm
Technical Field
The invention relates to the technical field of data processing, in particular to a data processing quality control method, a data processing quality control system and a data processing quality control medium based on a Xinchuang national encryption algorithm.
Background
In the process of software development, important data or sensitive data such as an identity card number, a bank card number and a password are frequently encountered, encryption processing is needed, and anyone, including a salesman, a system maintainer and a hacker, is prevented from acquiring and modifying the data in the process of data transmission and storage. The national cipher is a commercial encryption algorithm and a domestic cipher algorithm identified by the national cipher bureau.
However, most of the existing data processing methods based on the national encryption algorithm only use one national encryption algorithm, the security of data is not high, the situation of important data loss is easy to occur, and meanwhile, the data access security problem, the transmission security problem and the privacy security in the process of collecting, uploading and using the data are also low, so that a data processing quality control method based on the information creation national encryption algorithm is provided to solve the problems.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects of the prior art, the invention provides a data processing quality control method, a system and a medium based on a Xinchuang national cryptographic algorithm, which have the advantages of high safety, good data access effect and the like, and solve the problem of lower safety of the data processing method of the traditional national cryptographic algorithm.
(II) technical scheme
In order to achieve the purposes of high safety and good data access effect, the invention provides the following technical scheme: a data processing quality control method based on a letter-creation national encryption algorithm comprises the following steps:
s1, uploading data, and inputting a file or folder path where a data set is located;
the collected data information is integrated and stored in the folder so as to avoid losing;
s2, data analysis, namely inputting a storage path of a data set after program operation;
preferably, the data information in the folder is analyzed, and the data set is stored and encrypted after the input program is run.
Preferably, S3, data analysis, namely selecting a desensitization algorithm or a decryption algorithm;
the key decryption in the folder is re-analyzed, and a proper algorithm, a desensitization algorithm or a decryption algorithm is selected through different data.
S4, checking whether the data is readable or not, and checking whether the sensitive information is desensitized or not;
when readable, it indicates that the ciphertext has not been modified during transmission,
when unreadable, this indicates that the ciphertext has been modified during transmission.
Preferably, S5, storing new data to delete original data;
and storing the newly analyzed data to a server, and deleting the data.
And S6, triggering encryption requirements by big data, and calling an encryption engine to an encryption and decryption algorithm module.
Preferably, S7, the encryption and decryption algorithm acquires a secret key from the management system, acquires the secret key and performs identity authentication and authentication;
the key in the data information base is obtained from the management system, and the key can only enter the relation system, including identity information authentication, face fingerprint identification and the like.
And S8, returning a secret key if the request is successful, otherwise, failing the request.
Preferably, S9: the encryption and decryption algorithm module performs encryption operation and feeds back an encryption result;
the encryption operation is further carried out by using the decryption algorithm module, so that the security is improved again. S10: the quality control module triggers the data decryption requirement and calls a decryption engine to the encryption and decryption algorithm module;
the quality control system triggers a decryption request of the data, and further analyzes the request to the decryption algorithm module.
Preferably, S11, obtaining a secret key, carrying out identity authentication and authentication, and carrying out quality control analysis on decrypted data;
the method comprises the steps of performing authorized access by using a secret key and various information identity authentications, controlling and analyzing data after decryption, and observing whether file data is modified in a transmission direction.
S12, the quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned;
if the quality control is passed, the quality control can be achieved at night, and the report is sent, if the quality control is not passed, the steps are re-read and analyzed, the quality control is carried out, and the like.
Preferably, the server side comprises an encryption module, an analysis module, a database module, a backup database module, a ciphertext replacement module and a ciphertext loss warning.
Preferably, the encryption module may encrypt the data before and after analysis, the ciphertext replacing module is configured to replace a final ciphertext in the backup database with a final ciphertext in the backup database when the data stored in the backup database in an encrypted manner is not tampered, and the ciphertext loss warning module is configured to notify a user that the correct final ciphertext is lost when the data stored in the backup database in an encrypted manner is tampered.
(III) beneficial effects
Compared with the prior art, the invention provides a data processing quality control method, a system and a medium based on a Xinchuangguo secret algorithm, which have the following beneficial effects:
the data processing quality control method, system and medium based on the information creation country encryption algorithm are characterized in that collected data information is integrated and stored in a folder so as to avoid losing, the data information in the folder is analyzed, a data set is stored after an input program is operated, encryption is performed at the same time, whether data is readable or not is checked, whether sensitive information is desensitized or not is checked, the newly analyzed data is stored in a server side, meanwhile, a secret key in a data information base is obtained from a management system, the secret key can be entered into a relational system only through the secret key, the secret key comprises identity information authentication, face fingerprint identification and the like, an encryption and decryption algorithm module performs encryption operation, an encryption result is fed back, the quality control module triggers a data decryption requirement, and a decryption engine is called for an encryption and decryption algorithm module to obtain the secret key and perform identity authentication and authentication.
Drawings
FIG. 1 is a diagram showing the steps of a data processing quality control method, system and medium based on the secret algorithm of the country of creation;
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a data processing quality control method based on a secret key algorithm of a trusted country,
s1, uploading data, and inputting a file or folder path where a data set is located;
the collected data information is integrated and stored in the folder so as to avoid losing;
s2, data analysis, namely inputting a storage path of a data set after program operation;
the data information in the folder is analyzed, and the data set is stored and encrypted after the input program is run.
S3, data analysis, namely selecting a desensitization algorithm or a decryption algorithm;
the key decryption in the folder is re-analyzed, and a proper algorithm, a desensitization algorithm or a decryption algorithm is selected through different data.
S4, checking whether the data is readable or not, and checking whether the sensitive information is desensitized or not;
when readable, it indicates that the ciphertext has not been modified during transmission,
when unreadable, this indicates that the ciphertext has been modified during transmission.
S5, storing new data to delete original data;
and storing the newly analyzed data to a server, and deleting the data.
And S6, triggering encryption requirements by big data, and calling an encryption engine to an encryption and decryption algorithm module.
S7, the encryption and decryption algorithm acquires a secret key from the management system, acquires the secret key and performs identity authentication and authentication; the key in the data information base is obtained from the management system, and the key can only enter the relation system, including identity information authentication, face fingerprint identification and the like.
And S8, returning a secret key if the request is successful, otherwise, failing the request.
S9: the encryption and decryption algorithm module performs encryption operation and feeds back an encryption result;
the encryption operation is further carried out by using the decryption algorithm module, so that the security is improved again.
S10: the quality control module triggers the data decryption requirement and calls a decryption engine to the encryption and decryption algorithm module;
the quality control system triggers a decryption request of the data, and further analyzes the request to the decryption algorithm module.
S11, acquiring a secret key, carrying out identity authentication and authentication, and carrying out quality control analysis on decrypted data;
the method comprises the steps of performing authorized access by using a secret key and various information identity authentications, controlling and analyzing data after decryption, and observing whether file data is modified in a transmission direction.
S12, the quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned;
if the quality control is passed, the quality control can be achieved at night, and the report is sent, if the quality control is not passed, the steps are re-read and analyzed, the quality control is carried out, and the like.
10. And secondly, the encryption module can encrypt the data before and after analysis, the ciphertext replacing module is used for replacing the final ciphertext in the backup database with the final ciphertext in the backup database when the data stored in the backup database in an encrypted manner is not tampered, and the ciphertext loss warning module is used for notifying a user of correct final ciphertext loss when the data stored in the backup database in an encrypted manner is tampered. A computer program which when executed by a processor implements a data processing method based on a cryptographic algorithm as in any of the steps of claims S1 to S12.
In summary, the data processing quality control method, system and medium based on the information creation country encryption algorithm are characterized in that internal data information is analyzed, a data set is stored after an input program is operated, encryption is performed, whether data is readable or not is checked, whether sensitive information is desensitized or not is checked, newly analyzed data is stored in a server, meanwhile, a key in a data information base is deleted, the key is acquired from a management system, the data can enter a relational system only through the key, the key comprises identity information authentication, face fingerprint identification and the like, an encryption and decryption algorithm module performs encryption operation, an encryption result is fed back, a quality control module triggers a data decryption requirement, a decryption engine is called for the encryption and decryption algorithm module, the key is acquired, identity authentication and authentication are performed, the decrypted data is subjected to quality control analysis, quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned.
It should be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (9)

1. A data processing quality control method based on a letter-creation national encryption algorithm comprises the following steps:
s1, uploading data, and inputting a file or folder path where a data set is located;
the collected data information is integrated and stored in the folder so as to avoid losing;
s2, data analysis, namely inputting a storage path of a data set after program operation;
the data information in the folder is analyzed, and the data set is stored and encrypted after the input program is run.
2. The data processing quality control method based on the information-based national encryption algorithm of claim 1, comprising
S3, data analysis, namely selecting a desensitization algorithm or a decryption algorithm;
the key decryption in the folder is re-analyzed, and a proper algorithm, a desensitization algorithm or a decryption algorithm is selected through different data.
S4, checking whether the data is readable or not, and checking whether the sensitive information is desensitized or not;
when readable, it indicates that the ciphertext has not been modified during transmission,
when unreadable, this indicates that the ciphertext has been modified during transmission.
3. The data processing quality control method based on the information-based national encryption algorithm of claim 1, comprising
S5, storing new data to delete original data;
and storing the newly analyzed data to a server, and deleting the data.
And S6, triggering encryption requirements by big data, and calling an encryption engine to an encryption and decryption algorithm module.
4. The data processing quality control method based on the secret algorithm of the creation country as claimed in claim 1, comprising:
s7, the encryption and decryption algorithm acquires a secret key from the management system, acquires the secret key and performs identity authentication and authentication;
the key in the data information base is obtained from the management system, and the key can only enter the relation system, including identity information authentication, face fingerprint identification and the like.
And S8, returning a secret key if the request is successful, otherwise, failing the request.
5. The data processing quality control method based on the secret algorithm of the creation country as claimed in claim 1, comprising:
s9: the encryption and decryption algorithm module performs encryption operation and feeds back an encryption result;
the encryption operation is further carried out by using the decryption algorithm module, so that the security is improved again.
S10: the quality control module triggers the data decryption requirement and calls a decryption engine to the encryption and decryption algorithm module;
the quality control system triggers a decryption request of the data, and further analyzes the request to the decryption algorithm module.
6. The data processing quality control method based on the secret algorithm of the creation country as claimed in claim 1, comprising:
s11, acquiring a secret key, carrying out identity authentication and authentication, and carrying out quality control analysis on decrypted data;
the method comprises the steps of performing authorized access by using a secret key and various information identity authentications, controlling and analyzing data after decryption, and observing whether file data is modified in a transmission direction.
S12, the quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned;
if the quality control is passed, the quality control can be achieved at night, and the report is sent, if the quality control is not passed, the steps are re-read and analyzed, the quality control is carried out, and the like.
7. The data processing quality control system based on the information creation country secret algorithm according to claim 1, comprising a server, an encryption module, an analysis module, a database module, a backup database module, a ciphertext replacement module and a ciphertext loss warning.
8. The data processing quality control system and medium based on the secret algorithm of the creation country as claimed in claim 7, wherein: the encryption module can encrypt the data before and after analysis, the ciphertext replacing module is used for replacing the final ciphertext in the database with the final ciphertext in the backup database when the data stored in the backup database in an encrypted mode is not tampered, and the ciphertext loss warning module is used for notifying a user of correct final ciphertext loss when the data stored in the backup database in an encrypted mode is tampered.
9. The data processing quality control medium based on the secret algorithm of the creation country according to claim 1, wherein: the computer program, when executed by a processor, implements a data processing method based on a cryptographic algorithm as defined in any one of the steps S1 to S12.
CN202310110856.3A 2023-02-14 2023-02-14 Data processing quality control method, system and medium based on Xinchuang national encryption algorithm Pending CN116389043A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310110856.3A CN116389043A (en) 2023-02-14 2023-02-14 Data processing quality control method, system and medium based on Xinchuang national encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310110856.3A CN116389043A (en) 2023-02-14 2023-02-14 Data processing quality control method, system and medium based on Xinchuang national encryption algorithm

Publications (1)

Publication Number Publication Date
CN116389043A true CN116389043A (en) 2023-07-04

Family

ID=86979517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310110856.3A Pending CN116389043A (en) 2023-02-14 2023-02-14 Data processing quality control method, system and medium based on Xinchuang national encryption algorithm

Country Status (1)

Country Link
CN (1) CN116389043A (en)

Similar Documents

Publication Publication Date Title
US9875376B1 (en) Sensitive data aliasing
US20070136202A1 (en) Personal-information managing apparatus, method of providing personal information, computer product, and personal-information-providing system
CN108073821B (en) Data security processing method and device
JP2016531508A (en) Data secure storage
CN109308421B (en) Information tamper-proofing method and device, server and computer storage medium
EP0849658A2 (en) Secure data processing method and system
CN115238286A (en) Data protection method and device, computer equipment and storage medium
CN111461731A (en) Block chain monitoring system and method applied to financial transactions
JPH11272681A (en) Recording method for individual information and record medium thereof
CN111539042B (en) Safe operation method based on trusted storage of core data files
CN116389043A (en) Data processing quality control method, system and medium based on Xinchuang national encryption algorithm
JPH1124997A (en) Security method for recording computer generated file and computer readable recording medium to store security program
US11853451B2 (en) Controlled data access
CN114500104A (en) Data desensitization method, system, computer device and storage medium
CN114218593A (en) Information security detection method based on office equipment
CN113792312A (en) Database data encryption processing method
CN113904822A (en) Laboratory management system based on block chain
TWI444849B (en) System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof
CN109858217B (en) Method and system for verifying authenticity of electronic file
KR100224756B1 (en) Method of maintaining the password in the financial on-line transaction system
CN115168907B (en) Data matching method, system, equipment and storage medium for protecting data privacy
CN111680329B (en) Data processing method for improving data security
JP4710232B2 (en) Electronic data storage system that stores electronic data while guaranteeing the evidence
CN116798153B (en) Access control authorization opening method and device
JP2005318299A (en) Electronic data storage system for storing electronic data while securing evidentiality of electronic data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination