CN116389043A - Data processing quality control method, system and medium based on Xinchuang national encryption algorithm - Google Patents
Data processing quality control method, system and medium based on Xinchuang national encryption algorithm Download PDFInfo
- Publication number
- CN116389043A CN116389043A CN202310110856.3A CN202310110856A CN116389043A CN 116389043 A CN116389043 A CN 116389043A CN 202310110856 A CN202310110856 A CN 202310110856A CN 116389043 A CN116389043 A CN 116389043A
- Authority
- CN
- China
- Prior art keywords
- data
- quality control
- encryption
- algorithm
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003908 quality control method Methods 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 11
- 238000004458 analytical method Methods 0.000 claims description 9
- 238000007405 data analysis Methods 0.000 claims description 6
- 238000000586 desensitisation Methods 0.000 claims description 6
- 238000003672 processing method Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention relates to the technical field of data processing and discloses a data processing quality control method based on a Xinchuang national encryption algorithm. The data processing quality control method, system and medium based on the information creation country encryption algorithm are characterized in that collected data information is integrated and stored in a folder so as to avoid losing, the data information in the folder is analyzed, a data set is stored after an input program is operated, encryption is performed at the same time, whether data is readable or not is checked, whether sensitive information is desensitized or not is checked, the newly analyzed data is stored in a server side, meanwhile, a secret key in a data information base is obtained from a management system, the secret key can be entered into a relational system only through the secret key, the secret key comprises identity information authentication, face fingerprint identification and the like, an encryption and decryption algorithm module performs encryption operation, an encryption result is fed back, the quality control module triggers a data decryption requirement, and a decryption engine is called for an encryption and decryption algorithm module to obtain the secret key and perform identity authentication and authentication.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a data processing quality control method, a data processing quality control system and a data processing quality control medium based on a Xinchuang national encryption algorithm.
Background
In the process of software development, important data or sensitive data such as an identity card number, a bank card number and a password are frequently encountered, encryption processing is needed, and anyone, including a salesman, a system maintainer and a hacker, is prevented from acquiring and modifying the data in the process of data transmission and storage. The national cipher is a commercial encryption algorithm and a domestic cipher algorithm identified by the national cipher bureau.
However, most of the existing data processing methods based on the national encryption algorithm only use one national encryption algorithm, the security of data is not high, the situation of important data loss is easy to occur, and meanwhile, the data access security problem, the transmission security problem and the privacy security in the process of collecting, uploading and using the data are also low, so that a data processing quality control method based on the information creation national encryption algorithm is provided to solve the problems.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects of the prior art, the invention provides a data processing quality control method, a system and a medium based on a Xinchuang national cryptographic algorithm, which have the advantages of high safety, good data access effect and the like, and solve the problem of lower safety of the data processing method of the traditional national cryptographic algorithm.
(II) technical scheme
In order to achieve the purposes of high safety and good data access effect, the invention provides the following technical scheme: a data processing quality control method based on a letter-creation national encryption algorithm comprises the following steps:
s1, uploading data, and inputting a file or folder path where a data set is located;
the collected data information is integrated and stored in the folder so as to avoid losing;
s2, data analysis, namely inputting a storage path of a data set after program operation;
preferably, the data information in the folder is analyzed, and the data set is stored and encrypted after the input program is run.
Preferably, S3, data analysis, namely selecting a desensitization algorithm or a decryption algorithm;
the key decryption in the folder is re-analyzed, and a proper algorithm, a desensitization algorithm or a decryption algorithm is selected through different data.
S4, checking whether the data is readable or not, and checking whether the sensitive information is desensitized or not;
when readable, it indicates that the ciphertext has not been modified during transmission,
when unreadable, this indicates that the ciphertext has been modified during transmission.
Preferably, S5, storing new data to delete original data;
and storing the newly analyzed data to a server, and deleting the data.
And S6, triggering encryption requirements by big data, and calling an encryption engine to an encryption and decryption algorithm module.
Preferably, S7, the encryption and decryption algorithm acquires a secret key from the management system, acquires the secret key and performs identity authentication and authentication;
the key in the data information base is obtained from the management system, and the key can only enter the relation system, including identity information authentication, face fingerprint identification and the like.
And S8, returning a secret key if the request is successful, otherwise, failing the request.
Preferably, S9: the encryption and decryption algorithm module performs encryption operation and feeds back an encryption result;
the encryption operation is further carried out by using the decryption algorithm module, so that the security is improved again. S10: the quality control module triggers the data decryption requirement and calls a decryption engine to the encryption and decryption algorithm module;
the quality control system triggers a decryption request of the data, and further analyzes the request to the decryption algorithm module.
Preferably, S11, obtaining a secret key, carrying out identity authentication and authentication, and carrying out quality control analysis on decrypted data;
the method comprises the steps of performing authorized access by using a secret key and various information identity authentications, controlling and analyzing data after decryption, and observing whether file data is modified in a transmission direction.
S12, the quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned;
if the quality control is passed, the quality control can be achieved at night, and the report is sent, if the quality control is not passed, the steps are re-read and analyzed, the quality control is carried out, and the like.
Preferably, the server side comprises an encryption module, an analysis module, a database module, a backup database module, a ciphertext replacement module and a ciphertext loss warning.
Preferably, the encryption module may encrypt the data before and after analysis, the ciphertext replacing module is configured to replace a final ciphertext in the backup database with a final ciphertext in the backup database when the data stored in the backup database in an encrypted manner is not tampered, and the ciphertext loss warning module is configured to notify a user that the correct final ciphertext is lost when the data stored in the backup database in an encrypted manner is tampered.
(III) beneficial effects
Compared with the prior art, the invention provides a data processing quality control method, a system and a medium based on a Xinchuangguo secret algorithm, which have the following beneficial effects:
the data processing quality control method, system and medium based on the information creation country encryption algorithm are characterized in that collected data information is integrated and stored in a folder so as to avoid losing, the data information in the folder is analyzed, a data set is stored after an input program is operated, encryption is performed at the same time, whether data is readable or not is checked, whether sensitive information is desensitized or not is checked, the newly analyzed data is stored in a server side, meanwhile, a secret key in a data information base is obtained from a management system, the secret key can be entered into a relational system only through the secret key, the secret key comprises identity information authentication, face fingerprint identification and the like, an encryption and decryption algorithm module performs encryption operation, an encryption result is fed back, the quality control module triggers a data decryption requirement, and a decryption engine is called for an encryption and decryption algorithm module to obtain the secret key and perform identity authentication and authentication.
Drawings
FIG. 1 is a diagram showing the steps of a data processing quality control method, system and medium based on the secret algorithm of the country of creation;
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a data processing quality control method based on a secret key algorithm of a trusted country,
s1, uploading data, and inputting a file or folder path where a data set is located;
the collected data information is integrated and stored in the folder so as to avoid losing;
s2, data analysis, namely inputting a storage path of a data set after program operation;
the data information in the folder is analyzed, and the data set is stored and encrypted after the input program is run.
S3, data analysis, namely selecting a desensitization algorithm or a decryption algorithm;
the key decryption in the folder is re-analyzed, and a proper algorithm, a desensitization algorithm or a decryption algorithm is selected through different data.
S4, checking whether the data is readable or not, and checking whether the sensitive information is desensitized or not;
when readable, it indicates that the ciphertext has not been modified during transmission,
when unreadable, this indicates that the ciphertext has been modified during transmission.
S5, storing new data to delete original data;
and storing the newly analyzed data to a server, and deleting the data.
And S6, triggering encryption requirements by big data, and calling an encryption engine to an encryption and decryption algorithm module.
S7, the encryption and decryption algorithm acquires a secret key from the management system, acquires the secret key and performs identity authentication and authentication; the key in the data information base is obtained from the management system, and the key can only enter the relation system, including identity information authentication, face fingerprint identification and the like.
And S8, returning a secret key if the request is successful, otherwise, failing the request.
S9: the encryption and decryption algorithm module performs encryption operation and feeds back an encryption result;
the encryption operation is further carried out by using the decryption algorithm module, so that the security is improved again.
S10: the quality control module triggers the data decryption requirement and calls a decryption engine to the encryption and decryption algorithm module;
the quality control system triggers a decryption request of the data, and further analyzes the request to the decryption algorithm module.
S11, acquiring a secret key, carrying out identity authentication and authentication, and carrying out quality control analysis on decrypted data;
the method comprises the steps of performing authorized access by using a secret key and various information identity authentications, controlling and analyzing data after decryption, and observing whether file data is modified in a transmission direction.
S12, the quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned;
if the quality control is passed, the quality control can be achieved at night, and the report is sent, if the quality control is not passed, the steps are re-read and analyzed, the quality control is carried out, and the like.
10. And secondly, the encryption module can encrypt the data before and after analysis, the ciphertext replacing module is used for replacing the final ciphertext in the backup database with the final ciphertext in the backup database when the data stored in the backup database in an encrypted manner is not tampered, and the ciphertext loss warning module is used for notifying a user of correct final ciphertext loss when the data stored in the backup database in an encrypted manner is tampered. A computer program which when executed by a processor implements a data processing method based on a cryptographic algorithm as in any of the steps of claims S1 to S12.
In summary, the data processing quality control method, system and medium based on the information creation country encryption algorithm are characterized in that internal data information is analyzed, a data set is stored after an input program is operated, encryption is performed, whether data is readable or not is checked, whether sensitive information is desensitized or not is checked, newly analyzed data is stored in a server, meanwhile, a key in a data information base is deleted, the key is acquired from a management system, the data can enter a relational system only through the key, the key comprises identity information authentication, face fingerprint identification and the like, an encryption and decryption algorithm module performs encryption operation, an encryption result is fed back, a quality control module triggers a data decryption requirement, a decryption engine is called for the encryption and decryption algorithm module, the key is acquired, identity authentication and authentication are performed, the decrypted data is subjected to quality control analysis, quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned.
It should be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (9)
1. A data processing quality control method based on a letter-creation national encryption algorithm comprises the following steps:
s1, uploading data, and inputting a file or folder path where a data set is located;
the collected data information is integrated and stored in the folder so as to avoid losing;
s2, data analysis, namely inputting a storage path of a data set after program operation;
the data information in the folder is analyzed, and the data set is stored and encrypted after the input program is run.
2. The data processing quality control method based on the information-based national encryption algorithm of claim 1, comprising
S3, data analysis, namely selecting a desensitization algorithm or a decryption algorithm;
the key decryption in the folder is re-analyzed, and a proper algorithm, a desensitization algorithm or a decryption algorithm is selected through different data.
S4, checking whether the data is readable or not, and checking whether the sensitive information is desensitized or not;
when readable, it indicates that the ciphertext has not been modified during transmission,
when unreadable, this indicates that the ciphertext has been modified during transmission.
3. The data processing quality control method based on the information-based national encryption algorithm of claim 1, comprising
S5, storing new data to delete original data;
and storing the newly analyzed data to a server, and deleting the data.
And S6, triggering encryption requirements by big data, and calling an encryption engine to an encryption and decryption algorithm module.
4. The data processing quality control method based on the secret algorithm of the creation country as claimed in claim 1, comprising:
s7, the encryption and decryption algorithm acquires a secret key from the management system, acquires the secret key and performs identity authentication and authentication;
the key in the data information base is obtained from the management system, and the key can only enter the relation system, including identity information authentication, face fingerprint identification and the like.
And S8, returning a secret key if the request is successful, otherwise, failing the request.
5. The data processing quality control method based on the secret algorithm of the creation country as claimed in claim 1, comprising:
s9: the encryption and decryption algorithm module performs encryption operation and feeds back an encryption result;
the encryption operation is further carried out by using the decryption algorithm module, so that the security is improved again.
S10: the quality control module triggers the data decryption requirement and calls a decryption engine to the encryption and decryption algorithm module;
the quality control system triggers a decryption request of the data, and further analyzes the request to the decryption algorithm module.
6. The data processing quality control method based on the secret algorithm of the creation country as claimed in claim 1, comprising:
s11, acquiring a secret key, carrying out identity authentication and authentication, and carrying out quality control analysis on decrypted data;
the method comprises the steps of performing authorized access by using a secret key and various information identity authentications, controlling and analyzing data after decryption, and observing whether file data is modified in a transmission direction.
S12, the quality control is passed, a quality control report is returned, and a non-passing quality control report is not returned;
if the quality control is passed, the quality control can be achieved at night, and the report is sent, if the quality control is not passed, the steps are re-read and analyzed, the quality control is carried out, and the like.
7. The data processing quality control system based on the information creation country secret algorithm according to claim 1, comprising a server, an encryption module, an analysis module, a database module, a backup database module, a ciphertext replacement module and a ciphertext loss warning.
8. The data processing quality control system and medium based on the secret algorithm of the creation country as claimed in claim 7, wherein: the encryption module can encrypt the data before and after analysis, the ciphertext replacing module is used for replacing the final ciphertext in the database with the final ciphertext in the backup database when the data stored in the backup database in an encrypted mode is not tampered, and the ciphertext loss warning module is used for notifying a user of correct final ciphertext loss when the data stored in the backup database in an encrypted mode is tampered.
9. The data processing quality control medium based on the secret algorithm of the creation country according to claim 1, wherein: the computer program, when executed by a processor, implements a data processing method based on a cryptographic algorithm as defined in any one of the steps S1 to S12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310110856.3A CN116389043A (en) | 2023-02-14 | 2023-02-14 | Data processing quality control method, system and medium based on Xinchuang national encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310110856.3A CN116389043A (en) | 2023-02-14 | 2023-02-14 | Data processing quality control method, system and medium based on Xinchuang national encryption algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116389043A true CN116389043A (en) | 2023-07-04 |
Family
ID=86979517
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310110856.3A Pending CN116389043A (en) | 2023-02-14 | 2023-02-14 | Data processing quality control method, system and medium based on Xinchuang national encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116389043A (en) |
-
2023
- 2023-02-14 CN CN202310110856.3A patent/CN116389043A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9875376B1 (en) | Sensitive data aliasing | |
US20070136202A1 (en) | Personal-information managing apparatus, method of providing personal information, computer product, and personal-information-providing system | |
CN108073821B (en) | Data security processing method and device | |
JP2016531508A (en) | Data secure storage | |
CN109308421B (en) | Information tamper-proofing method and device, server and computer storage medium | |
EP0849658A2 (en) | Secure data processing method and system | |
CN115238286A (en) | Data protection method and device, computer equipment and storage medium | |
CN111461731A (en) | Block chain monitoring system and method applied to financial transactions | |
JPH11272681A (en) | Recording method for individual information and record medium thereof | |
CN111539042B (en) | Safe operation method based on trusted storage of core data files | |
CN116389043A (en) | Data processing quality control method, system and medium based on Xinchuang national encryption algorithm | |
JPH1124997A (en) | Security method for recording computer generated file and computer readable recording medium to store security program | |
US11853451B2 (en) | Controlled data access | |
CN114500104A (en) | Data desensitization method, system, computer device and storage medium | |
CN114218593A (en) | Information security detection method based on office equipment | |
CN113792312A (en) | Database data encryption processing method | |
CN113904822A (en) | Laboratory management system based on block chain | |
TWI444849B (en) | System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof | |
CN109858217B (en) | Method and system for verifying authenticity of electronic file | |
KR100224756B1 (en) | Method of maintaining the password in the financial on-line transaction system | |
CN115168907B (en) | Data matching method, system, equipment and storage medium for protecting data privacy | |
CN111680329B (en) | Data processing method for improving data security | |
JP4710232B2 (en) | Electronic data storage system that stores electronic data while guaranteeing the evidence | |
CN116798153B (en) | Access control authorization opening method and device | |
JP2005318299A (en) | Electronic data storage system for storing electronic data while securing evidentiality of electronic data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |