CN116644468A - Intelligent information storage system for fault monitoring of mine ventilator - Google Patents
Intelligent information storage system for fault monitoring of mine ventilator Download PDFInfo
- Publication number
- CN116644468A CN116644468A CN202310539690.7A CN202310539690A CN116644468A CN 116644468 A CN116644468 A CN 116644468A CN 202310539690 A CN202310539690 A CN 202310539690A CN 116644468 A CN116644468 A CN 116644468A
- Authority
- CN
- China
- Prior art keywords
- value
- access
- sequence
- ciphertext
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 16
- 230000002159 abnormal effect Effects 0.000 claims description 22
- 238000000034 method Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 16
- 238000004364 calculation method Methods 0.000 claims description 14
- 238000012550 audit Methods 0.000 claims description 8
- 238000006243 chemical reaction Methods 0.000 claims description 8
- 125000004122 cyclic group Chemical group 0.000 claims description 4
- 230000008569 process Effects 0.000 claims description 4
- 230000036962 time dependent Effects 0.000 claims description 4
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000012948 formulation analysis Methods 0.000 claims 1
- 238000005065 mining Methods 0.000 claims 1
- 238000010606 normalization Methods 0.000 claims 1
- 206010000117 Abnormal behaviour Diseases 0.000 abstract description 3
- 238000004891 communication Methods 0.000 abstract description 2
- 238000013500 data storage Methods 0.000 abstract description 2
- 230000005856 abnormality Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 239000003086 colorant Substances 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 238000009423 ventilation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an intelligent information storage system for monitoring faults of a mine ventilator, which relates to the technical field of information storage and is used for solving the problems of safety in data storage and safety in access, and comprises a server, a data acquisition unit, a database, an encryption module and a permission module, wherein the data acquisition unit, the database, the encryption module and the permission module are in communication connection with the server; the data information is encrypted and stored by a specific data encryption mode, so that the integrity and the safety of the data are effectively protected, and unauthorized personnel are prevented from accessing, stealing or tampering the data; meanwhile, by analyzing the access information of the access user, whether the user has abnormality or not can be judged, and the abnormal behavior of the user can be found and processed in time so as to ensure the safety and stability of the database system.
Description
Technical Field
The invention relates to the technical field of information storage, in particular to an intelligent information storage system for fault monitoring of a mine ventilator.
Background
The intelligent information storage system for monitoring the faults of the mine ventilator is an intelligent monitoring system applied to the mine ventilation system; the information is stored in the corresponding memory to be conveniently called when the data is analyzed.
The prior art has the following problems:
1. various information security threats and risks faced by ventilator information in the processes of data transmission, storage, processing and the like, and various adverse consequences can be caused by data security problems, such as data leakage, data loss, data tampering, malicious attack, privacy invasion and the like;
2. at present, data encryption information and a secret key are sent to corresponding staff to perform corresponding data operation, but potential safety hazards still exist in the mode, and when an account of the staff is stolen or malicious operation is performed on the data information, data leakage, tampering and abuse are caused;
in order to solve the defects, an intelligent information storage system for fault monitoring of a mine ventilator is provided.
Disclosure of Invention
The invention aims to solve the problems of safety in data storage and safety in access, and provides an intelligent information storage system for monitoring faults of a mine ventilator.
The aim of the invention can be achieved by the following technical scheme: the intelligent information storage system for monitoring faults of the mine ventilator comprises a database and a data acquisition unit, wherein the data acquisition unit acquires data information and stores the data information into the database, and the intelligent information storage system also comprises an encryption module and a permission module;
the encryption module respectively carries out numerical treatment on the data information to obtain a character sequence value, an audio frequency value sequence and an image value sequence, and substitutes the three into a ternary primary equation set to carry out calculation to obtain a preliminary ciphertext value sequence; performing value-added calculation on a value '0' in the primary ciphertext value sequence to obtain a secondary ciphertext value-added sequence, performing graph encryption conversion on the secondary ciphertext value-added sequence to obtain a tertiary ciphertext value sequence, performing year encryption processing on the tertiary ciphertext value sequence to obtain a quaternary year sequence ciphertext, and marking the quaternary year sequence ciphertext as an encrypted ciphertext for output storage;
the auditing module distributes the data information to the access users of the corresponding positions according to the preset important coefficients of the data information, and simultaneously carries out comprehensive analysis processing on the access data of the access users to judge the state of the access users and implement the corresponding strategies, wherein the strategies comprise a specific list pulling operation and an access right locking operation.
As a preferred implementation mode of the invention, the value of 0 in the primary ciphertext value sequence is added to calculate to obtain a secondary ciphertext value sequence, wherein the specific steps of value calculation are as follows:
s1: counting the number of 0's in the initial ciphertext numerical sequence and the corresponding serial numbers respectively;
s2: the value on the left side of 0 minus the value on the right side is recorded as a symbol difference value, when the symbol difference value is greater than or equal to zero, the value of m is output as an odd number, and when the symbol difference value is less than zero, the value of m is output as an even number;
s3: substituting the symbol difference value fu1, the sequence number fu2 and the sequence number m into a set formulaAnd calculating to obtain a value Fu, and replacing the value Fu with '0' of the corresponding sequence number position to obtain a secondary ciphertext value added sequence, wherein f1 and f2 are set proportionality coefficients.
As a preferred implementation mode of the invention, the secondary ciphertext value-added value sequence is converted into the tertiary ciphertext value sequence through graph encryption, wherein the specific steps of the graph encryption conversion are as follows:
taking the value in the secondary ciphertext value-added sequence as the diameter R, and taking a semicircle on a straight line, and converting all the values into an initial pattern by taking the semicircle on the straight line according to the secondary ciphertext value-added sequence; substituting the diameter R of the semicircle into a set function h=g (R) to calculate a height h, making a height line segment perpendicular to the diameter at the center of the semicircle, wherein the height of the line segment is h, and then cutting the upper part of the semicircle by a cutting line segment L perpendicular to the h to obtain the area of a shadow part; and sequencing the shadow areas according to the corresponding positions to obtain a three-time ciphertext numerical sequence.
As a preferred embodiment of the present invention, the year encryption processing is performed on the three-time ciphertext numerical sequence to obtain four-time year sequence ciphertext, wherein the specific steps of the year encryption processing are as follows:
the current year is marked as the first year, the first value in the three-time ciphertext value sequence corresponds to the first year, and the first value is marked as the first value; and calculating the distance between the second numerical value and the first numerical value according to a cyclic relation, adding the first year with the distance between the second numerical value and the first numerical value to obtain the year corresponding to the second numerical value, and pushing the year to obtain the four-year sequence ciphertext from all the numerical values in the three-time ciphertext numerical sequence according to the method.
As a preferred embodiment of the invention, the authority module comprises a registration login unit, an authority setting unit and an access auditing unit;
the registration login unit is used for accessing the user registration login uploading personal information, accessing the data information and performing data operation;
the authority setting unit classifies the data information through preset important coefficients of the data information to obtain data information with different levels, distributes the data information with different levels to the visiting users of the corresponding company positions according to the company positions of the visiting users, and sends encrypted ciphertext of the data information and the corresponding secret key to the corresponding visiting users;
the access auditing unit matches the IP address of the future access user with the IP address of the historical visitor in the database, and the successfully matched access user is marked as the user to be audited and carries out the access auditing operation.
As a preferred embodiment of the invention, the specific steps of the access audit operation are: the data of the operation of the users to be examined is called and summed up every day for about one monthDividing the total operation times by the total days in the last month to obtain the average frequency of the operation data of the users to be checked, and taking the day in the middle in the last month as the middle time; the coordinates of the operation data times in the time-dependent relationship line graph of the operation data times of the pending users are called and recorded as (Xi, yi), wherein i=1, 2,3 … … n1, n1 represents the total number of days in the last month, and the formula is setCalculating to obtain a correlation coefficient, wherein->For intermediate time->Is the average frequency; comparing the correlation coefficient of each day in nearly one month with a set coefficient interval, and marking the correlation coefficient as a serious abnormal operation day when the correlation coefficient is larger than the maximum value in the set coefficient interval; when the associated coefficient is within the set coefficient interval, the method is marked as a moderate abnormal operation day; when the associated coefficient is smaller than the minimum value in the set coefficient interval, marking the day as a slight supernormal operation day; counting the corresponding days marked as severe supernormal operation days, moderate supernormal operation days and light supernormal operation days respectively, and marking the days as Au1, au2 and Au3 respectively;
the method comprises the steps of retrieving operation duration of operation data of a user to be checked each time, comparing the operation duration with a set duration interval, and generating a high overtime access, a medium overtime access and a low overtime access; counting the number of the high overtime accesses, the medium overtime accesses and the low overtime accesses of the to-be-examined user respectively, and marking the number as Bu1, bu2 and Bu3 respectively;
substituting Au1, au2, au3, bu1, bu2 and Bu3 into the set formula ABu =a1×au1+a2×au2+a3×au3+b1×bu1+b2×bu2+b3×bu3 to calculate an operation coefficient ABu, wherein a1, a2, a3, b1, b2 and b3 are set proportionality coefficients, respectively; comparing the operation coefficient with a set operation coefficient interval, and when the operation coefficient is larger than the maximum value in the set operation coefficient interval, marking the access user as a highly abnormal user and pulling the highly abnormal user into a specific list for operation; when the operation coefficient is within the set operation coefficient interval, the access user is marked as a moderate abnormal user, and access authority locking operation of the access user is carried out; counting the number of access authority locking operations of all access users, recording the number as locking times, and when the locking times reach a set locking threshold value, pulling the account number of the corresponding access user into a specific list for operation.
Compared with the prior art, the invention has the beneficial effects that:
1. character processing, audio processing and video processing are respectively carried out on character information, video information and audio information of the data information to obtain character sequence values, picture value sequences and audio sequence values, the character sequence values, the picture value sequences and the audio sequence values are substituted into a unitary primary equation to carry out calculation to obtain a primary ciphertext value sequence, and value adding processing is carried out on the primary ciphertext value sequence to obtain a secondary ciphertext value adding sequence; the value of 0 does not exist in the obtained value of the added value, which is equivalent to the replacement operation of all 0 s in the primary ciphertext value sequence, so that the obtained secondary ciphertext value added value sequence does not exist in the value of 0, and a foundation is laid for the next step of image encryption conversion; converting the values in the secondary ciphertext value-added value sequence through a encryption conversion chart to obtain a tertiary ciphertext value sequence; encrypting the three-time ciphertext numerical sequence through year to obtain an encrypted ciphertext for output storage; when the two first values are different and then all values are the same, the three-time ciphertext value sequence is obtained after the year encryption, and the two different four-time year sequence ciphertexts are obtained, so that the integrity and the safety of the data are effectively protected, and unauthorized personnel are prevented from accessing, stealing or tampering the data.
2. Dividing the data information into data information with different levels according to the importance degree of the data information, simultaneously distributing encrypted ciphertext and corresponding keys of the data information with different levels according to company positions corresponding to the access users, and carrying out data operation by different access users; matching the IP address of the visiting user with the IP address of the historical visitor in the database, marking the successfully matched visiting user as a to-be-checked user, and performing access audit operation to verify the security of operation data of the visiting user; the method comprises the steps of initially judging whether an access user is abnormal or not according to an IP address of the access user, further obtaining an operation coefficient through numerical analysis according to the number of times of historical operation data of the access user and the time length of each operation data, comparing, analyzing and judging the state of the access user with a set operation coefficient interval, and implementing a corresponding strategy, so that the analysis of access information of the access user is realized, whether the access user is abnormal or not can be judged, and abnormal behaviors of the user can be found and processed in time, so that safety and stability of a database system are ensured; the data encryption and the access audit are mutually complemented, and meanwhile, double guarantees are provided for the integrity and the safety of the data, so that important effects of guaranteeing the safety of the data, protecting the privacy of the data, improving the working efficiency and the like are achieved.
Drawings
The present invention is further described below with reference to the accompanying drawings for the convenience of understanding by those skilled in the art.
FIG. 1 is a general block diagram of a system of the present invention;
FIG. 2 is a cryptographic transition diagram of the present invention;
fig. 3 is a graph of a numerical cycle relationship dial of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1:
referring to fig. 1, an intelligent information storage system for monitoring faults of a mine ventilator comprises a server, a data acquisition unit, a database, an encryption module and a permission module, wherein the data acquisition unit is in communication connection with the server; the data acquisition unit is connected with a plurality of data acquisition equipment ends and used for acquiring data information and access information, and storing the data information and the access information into a database; wherein the data information includes characters, audio, and video; the access information comprises operation data times, operation data time length and access IP addresses;
retrieving data information, wherein the data information includes characters, audio and video; converting the audio frequency into a voltage value sequence through a sound collector; setting a numerical value corresponding to each character, and comparing and matching the characters with all the set characters to obtain corresponding character sequence values;
dividing the video into a plurality of frames of pictures according to a time sequence, amplifying the pictures by a plurality of times to form pixel grid pictures, and establishing a plane rectangular coordinate system for the pixel grids to obtain coordinates of each pixel grid in each pixel grid picture, wherein the coordinates comprise horizontal coordinates and vertical coordinates; identifying colors in the pixel grid picture, setting a corresponding color value for each color, and comparing and matching the colors of the pixel grid picture with all the set colors to obtain the corresponding color value; sequentially arranging the color values of the pixel grids according to the coordinates of the pixel grids to obtain a pixel grid value sequence; all pixel grid value sequences in the picture form a picture value sequence;
calculating a character sequence value, an audio sequence value and a video sequence value through a ternary one-time equation set, and arranging the results according to the sequence of the character sequence, the audio sequence and the video sequence to obtain a preliminary ciphertext numerical sequence; recording the position of a value '0' in the initial ciphertext value sequence as a repeated calculation position; and performing value-added calculation on the repeated calculation positions in the preliminary ciphertext numerical sequence to obtain a secondary ciphertext value-added sequence, wherein the specific steps of value-added calculation are as follows:
s1: counting the number of 0's in the initial ciphertext numerical sequence and the corresponding serial numbers respectively; wherein the sequence number refers to the sequence number from the first digit on the left to the position of 0 in the initial ciphertext numerical sequence;
s2: the value on the left side of 0 minus the value on the right side is recorded as a symbol difference value, when the symbol difference value is greater than or equal to zero, the value of m is output as an odd number, and when the symbol difference value is less than zero, the value of m is output as an even number;
s3: substituting the symbol difference value fu1, the sequence number fu2 and the sequence number m into a set formulaCalculating to obtain a value Fu, replacing the value Fu with 0 corresponding to the sequence number position to obtain a secondary ciphertext value sequence, wherein f1 and f2 are set proportionality coefficients, and the formula shows that 0 does not exist in the value of the obtained value, which is equivalent to replacing all 0 in the preliminary ciphertext value sequence, so that the fact that 0 does not exist in the obtained secondary ciphertext value sequence is ensured, and a foundation is laid for the next image encryption conversion.
Referring to fig. 2, the values in the secondary ciphertext value-added sequence are semicircular on a straight line with the diameter R, and all the values are semicircular on a straight line according to the secondary ciphertext value-added sequence to be converted into a pattern 1 in fig. 2; substituting the diameter R of the semicircle into a set function h=g (R) to calculate a height h, making a height line segment perpendicular to the diameter at the center of the semicircle, wherein the height of the line segment is h, and then cutting the upper part of the semicircle by a cutting line segment L perpendicular to the h to obtain the area of a shadow part; sequencing the shadow areas according to the corresponding positions to obtain a three-time ciphertext numerical sequence; wherein the value range of the height h is (0, R/2) and R and h are in a proportional relation, namely when R is larger, h is larger;
referring to fig. 3, the current year is obtained and recorded as the first year, the first value in the three-time ciphertext value sequence corresponds to the first year, the first value is recorded as the first value, and the second value calculates the distance from the first value according to the cyclic relation of the dial, wherein the distance represents the number of intervals between the values (for example, the distances between 0 and 9 in the dial are 9 intervals; the distance between 9 and 0 is 1 interval); adding the first year with the second value and the distance between the first value to obtain the year corresponding to the second value, so as to push the year corresponding to the second value, obtaining a fourth year sequence ciphertext from all values in the third ciphertext value sequence according to the method, and recording the fourth year sequence ciphertext as an encrypted ciphertext for output storage; therefore, when the three-time ciphertext value sequences with the same values after the two first-digit values are different are obtained after the year encryption, the two different four-time year sequence ciphertexts are obtained, so that the safety of the data is effectively protected, and unauthorized personnel are prevented from accessing, stealing or tampering the data.
Example 2:
on the basis of the embodiment 1, the authority module comprises an authority setting unit, a registration login unit and an access audit unit;
the access user registers and logs in through a registration login unit and uploads personal information, wherein the personal information comprises the name, the time of entering the job, the job position of a company and the level data information responsible for processing of the access user; the method comprises the steps of presetting a importance coefficient corresponding to each data information according to the importance degree of the data information, dividing the data information into primary data information, secondary data information and tertiary data information according to the importance coefficient, setting different levels of data information to respectively correspond to one company position, comparing and matching the levels of the data information with the levels of all the set data information to obtain corresponding company positions, and respectively sending encrypted ciphertext of the data information of the level and a corresponding secret key to an account of an access user of the corresponding company position, and carrying out data operation by different access users;
acquiring the IP address of the access user, retrieving all historical visitor IP addresses of the database and matching the visitor IP addresses with the IP address of the access user, and when the matching is successful, marking the access user as a to-be-checked user and performing access audit operation; when the matching fails, the geographic position of the access user is abnormal, the access user is marked as an abnormal user, and the access authority locking operation of the access user is carried out, namely, the account of the access user is locked, and the access user is not given the authority of data access;
the specific steps of the access audit are as follows:
the method comprises the steps of calling the number of times of daily operation data of a user to be examined in a month, wherein the operation data specifically refer to the operation of modifying or deleting the data; drawing points on the corresponding time transverse axes according to the time sequence of the operation data times of the user to be checked in the period of nearly one month, and connecting according to the time sequence to obtain a time-dependent change relation line graph of the operation data times of the user to be checked in the period of nearly one month; summing all operation data times in a month to obtain total operation times, dividing the total operation times by total days in the month to obtain average frequency of operation data of the user to be checked, and taking the middle day in the month as the middle time; the coordinates of the operation data times in the time-dependent relationship line graph of the operation data times of the pending users are called and recorded as (Xi, yi), wherein i=1, 2,3 … … n1, n1 represents the total number of days in the last month;
through a set formulaCalculating to obtain a correlation coefficient, wherein->For intermediate time->Is the average frequency; comparing the correlation coefficient of each day in nearly one month with a set coefficient interval, when the correlation coefficient is larger than the maximum value in the set coefficient interval, indicating that the number of times of operation data corresponding to the day is far larger than the number of times of ordinary operation data, and marking the day as a serious abnormal operation day if the potential risk of the operation data of the day is very large; when the associated coefficient is within the set coefficient interval, the potential risk of the operation data corresponding to the day is larger, and the day is marked as a moderate abnormal operation day; when the associated coefficient is smaller than the minimum value in the set coefficient interval, marking the day as a slight supernormal operation day; counting the corresponding days marked as severe supernormal operation days, moderate supernormal operation days and light supernormal operation days respectively, and marking the days as Au1, au2 and Au3 respectively;
retrieving the operation duration of each operation data of the to-be-checked user, wherein the operation duration is the duration from the time when the to-be-checked user opens one data to the time when the data is closed; comparing the operation time length with a set time length interval, and when the operation time length is larger than the maximum value in the set time length interval, indicating that the operation time length of the operation data is far longer than the operation time length of the normal operation data, and marking the operation time length as the high overtime access; when the operation time is within the set time interval, the operation time is recorded as a moderate overtime access; when the operation time length is smaller than the minimum value in the set time length interval, the operation time length is recorded as low-degree overtime access; counting the number of the high overtime accesses, the medium overtime accesses and the low overtime accesses of the to-be-examined user respectively, and marking the number as Bu1, bu2 and Bu3 respectively;
substituting Au1, au2, au3, bu1, bu2 and Bu3 into the set formula ABu =a1×au1+a2×au2+a3×au3+b1×bu1+b2×bu2+b3×bu3 to calculate an operation coefficient ABu, wherein a1, a2, a3, b1, b2 and b3 are set proportionality coefficients, respectively; comparing the operation coefficient with a set operation coefficient interval, when the operation coefficient is larger than the maximum value in the set operation coefficient interval, indicating that the accumulated operation data of the current access user in the last month belongs to a highly abnormal state, marking the access user as a highly abnormal user, and pulling the highly abnormal user into a specific list for operation; when the operation coefficient is within the set operation coefficient interval, the accumulated operation data of the current access user belongs to a moderate abnormal state in a month, the access user is marked as a moderate abnormal user, and access authority locking operation of the access user is carried out, namely, the account of the access user is locked, and the authority of the access user for accessing the data is not given; when the operation coefficient is smaller than the minimum value in the set operation coefficient interval, the operation data in the last month of the access account is in a low risk state, and the operation data is marked as a conventional user and is not operated; counting the number of access authority locking operations of all access users, recording the number as locking times, and when the locking times reach a set locking threshold value, pulling the account number of the corresponding access user into a specific list for operation.
Example 3:
on the basis of embodiment 2, the database is further configured to collect access time data of related information and perform preset important coefficient analysis, specifically:
the method comprises the steps of calling the access times of data information and the access initial time and the access end time corresponding to each access time, calculating the time difference value of the access times and the access initial time to obtain single access time length, marking the access initial time of the single access time length as the access time of the single access time length, and arranging all the single access time lengths of the data information according to the sequence of the access time length to obtain a change relation diagram of the single access time length of the data information along with time; performing difference operation on adjacent single access time lengths to obtain access interval differences, and performing time difference calculation on corresponding adjacent access time to obtain access interval lengths;
drawing rectangular coordinate systems of the access interval duration and the access interval difference in an equidistant form to respectively obtain a fold line relation diagram of the access interval duration and the access interval difference, respectively calculating to obtain fold line slopes by adopting a least square method, and respectively marking the fold line slopes as interval duration slopes and interval difference slopes;
the access times j and the access interval duration are calculatedAccess interval difference +.>The interval duration slope k1 and the interval difference slope k2 are substituted into a set formula +.>Calculating an important coefficient PTu, and feeding the important coefficient PTu back to the authority module, wherein j=1, 2,3 … … n2, n2 is a positive integer, n2 represents the total number of accesses, and d1, d2, d3 and d4 are set proportionality coefficients respectively;
the important coefficients are obtained by analyzing the access times of the data information and the access initial time and the access end time corresponding to each access time, so that the intelligent classification is carried out according to the access conditions, and the high-frequency access data can be reasonably distributed.
When the method is used, character processing, audio processing and video processing are respectively carried out on character information, video information and audio information of data information to obtain character sequence values, picture numerical value sequences and audio sequence values, and the character sequence values, the picture numerical value sequences and the audio sequence values are substituted into a unitary one-time equation to carry out calculation to obtain a preliminary ciphertext numerical sequence; identifying the position of 0 and the serial number of the position in the preliminary ciphertext numerical sequence, calculating the difference value of the front and rear position numerical values of the position in which 0 is positioned to obtain a symbol difference value, and comparing the symbol difference value with zero to output m; normalizing the symbol difference value, the sequence number and m, taking the numerical value, carrying out formula calculation analysis on the numerical value to obtain a value added, and replacing the value added with '0' corresponding to the sequence number to obtain a secondary ciphertext value added sequence; therefore, the value of 0 does not exist in the value of the obtained value-added value, which is equivalent to the replacement operation of all 0 s in the primary ciphertext value sequence, so that the value of 0 does not exist in the obtained secondary ciphertext value-added value sequence, and a foundation is laid for the next step of image encryption conversion; the numerical value in the secondary ciphertext value-added sequence is a diameter R, a semicircle is formed on a straight line, the height h is obtained according to the set function relation between R and h, a height line segment perpendicular to the diameter is formed at the center of the semicircle, the height of the line segment is h, a cutting line segment L perpendicular to the h is formed, the upper part of the semicircle is cut off to obtain the area of a shadow part, and the shadow area is sequenced according to the corresponding position to obtain the tertiary ciphertext numerical value sequence; the first value in the three-time ciphertext value sequence corresponds to the first year, the distance between the first year and the first value is calculated according to the cyclic relation of the dial, the first year is added with the distance between the second value and the first value to obtain the year corresponding to the second value, and accordingly all values in the three-time ciphertext value sequence are output and stored after the ciphertext is encrypted according to the method; therefore, when the three-time ciphertext numerical sequence with the same numerical value after the two first numerical values are different, two different four-time year sequence ciphertexts are obtained after the two first numerical values are encrypted in the year, so that the safety of the data is effectively protected, and unauthorized personnel are prevented from accessing, stealing or tampering the data;
dividing the data information into data information with different levels according to the importance degree of the data information, simultaneously distributing encrypted ciphertext and corresponding keys of the data information with different levels according to company positions corresponding to the access users, and carrying out data operation by different access users; matching the IP address of the visiting user with the IP address of the historical visitor in the database, marking the successfully matched visiting user as a to-be-checked user, and performing access audit operation to verify the security of operation data of the visiting user; otherwise, recording as an abnormal user and locking an account of the access user; the method comprises the steps of initially judging whether an access user is abnormal or not according to the IP address of the access user, further obtaining an operation coefficient through numerical analysis according to the historical operation data times and time length of each operation data of the to-be-examined user, comparing, analyzing and judging the state of the to-be-examined user with a set operation coefficient interval, and implementing a corresponding strategy, so that the analysis of access information of the access user is realized, whether the user is abnormal or not can be judged, and abnormal behaviors of the user can be found and processed in time, so that safety and stability of a database system are ensured.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (6)
1. The intelligent information storage system for monitoring faults of the mine ventilator comprises a database and a data acquisition unit, wherein the data acquisition unit is used for acquiring data information and access information and storing the data information and the access information into the database; the system is characterized by further comprising an encryption module and a permission module;
the encryption module respectively carries out numerical treatment on the data information to obtain a character sequence value, an audio frequency value sequence and an image value sequence, and substitutes the three into a ternary primary equation set to carry out calculation to obtain a preliminary ciphertext value sequence; performing value-added calculation on a value '0' in the primary ciphertext value sequence to obtain a secondary ciphertext value-added sequence, performing graph encryption conversion on the secondary ciphertext value-added sequence to obtain a tertiary ciphertext value sequence, performing year encryption processing on the tertiary ciphertext value sequence to obtain a quaternary year sequence ciphertext, and marking the quaternary year sequence ciphertext as an encrypted ciphertext for output storage;
the specific process of the graphic encryption conversion is as follows: taking the value in the secondary ciphertext value-added sequence as the diameter R, and taking a semicircle on a straight line, and converting all the values into an initial pattern by taking the semicircle on the straight line according to the secondary ciphertext value-added sequence; substituting the diameter of the semicircle into a set functional relation to calculate the height, making a height line segment perpendicular to the diameter at the center of the semicircle, and then making a cutting line segment perpendicular to the height line segment, wherein the cutting line segment cuts the upper part of the semicircle to obtain the area of the shadow part; and sequencing the shadow areas according to the corresponding positions to obtain a three-time ciphertext numerical sequence.
The specific process of the year encryption treatment is as follows: the current year is marked as the first year, the first value in the three-time ciphertext value sequence corresponds to the first year, and the first value is marked as the first value; calculating the distance between the second numerical value and the first numerical value according to a cyclic relation, adding the first year with the distance between the second numerical value and the first numerical value to obtain the year corresponding to the second numerical value, and pushing the year to obtain a fourth year sequence ciphertext from all the numerical values in the third ciphertext numerical sequence according to the method;
the permission module distributes the data information to the access users corresponding to the company positions through the important coefficients of the data information, and meanwhile, comprehensively analyzes and processes the access information of the access users to judge the state of the access users and implement the corresponding strategies.
2. The intelligent information storage system for monitoring faults of a mine ventilator according to claim 1, wherein the value "0" in the primary ciphertext value sequence is added to calculate to obtain a secondary ciphertext value sequence, and the specific steps of value calculation are as follows:
s1: counting the number of 0's in the initial ciphertext numerical sequence and the corresponding serial numbers respectively;
s2: the value on the left side of 0 minus the value on the right side is recorded as a symbol difference value, when the symbol difference value is greater than or equal to zero, the value of m is output as an odd number, and when the symbol difference value is less than zero, the value of m is output as an even number;
s3: and carrying out normalization processing on the symbol difference value, the serial number and the m, taking the numerical value, carrying out formulation analysis processing on the numerical value to obtain a value added, and replacing the value added with '0' corresponding to the serial number position to obtain a secondary ciphertext value added sequence.
3. The intelligent information storage system for monitoring faults of a mine ventilator according to claim 1, wherein the authority module comprises a registration and login unit, an authority setting unit and an access auditing unit;
the registration login unit is used for accessing the user registration login uploading personal information, accessing the data information and performing data operation;
the authority setting unit classifies the data information through preset important coefficients of the data information to obtain data information with different levels, distributes the data information with different levels to the visiting users of the corresponding company positions according to the company positions of the visiting users, and sends encrypted ciphertext of the data information and the corresponding secret key to the corresponding visiting users;
the access auditing unit matches the IP address of the future access user with the IP address of the historical visitor in the database, and the successfully matched access user is marked as the user to be audited and carries out the access auditing operation.
4. An intelligent information storage system for monitoring faults of a mine ventilator as claimed in claim 3, wherein the specific steps of accessing the audit operation are:
the method comprises the steps of acquiring the number of times of daily operation data of a user to be checked in a month, summing the number of times to obtain the total number of times of operation, dividing the total number of times of operation by the total number of days in the month to obtain the average frequency of the operation data of the user to be checked, and taking the day in the middle in the month as the middle time; the method comprises the steps of calling coordinates of operation data times in a time-dependent relationship line graph of the operation data times of a user to be checked, substituting the coordinates into a set formula, and calculating to obtain a correlation coefficient; comparing the correlation coefficient of each day in nearly one month with a set coefficient interval to generate a serious supernormal operation day, a moderate supernormal operation day and a light supernormal operation day, and counting the corresponding days marked as the serious supernormal operation day, the moderate supernormal operation day and the light supernormal operation day respectively;
the method comprises the steps of retrieving operation duration of operation data of a user to be checked each time, comparing the operation duration with a set duration interval, and generating a high overtime access, a medium overtime access and a low overtime access; counting the number of the high overtime accesses, the medium overtime accesses and the low overtime accesses of the to-be-examined user respectively, and calculating to obtain an operation coefficient;
comparing the operation coefficient with a set operation coefficient section: when the operation coefficient is larger than the maximum value in the set operation coefficient interval, marking the access user as a highly abnormal user, and pulling the highly abnormal user into a specific list for operation; when the operation coefficient is within the set operation coefficient interval, the access user is marked as a moderate abnormal user, and access authority locking operation of the access user is carried out; counting the number of access authority locking operations of all access users, recording the number as locking times, and when the locking times reach a set locking threshold value, pulling the account number of the corresponding access user into a specific list for operation.
5. The intelligent information storage system for monitoring faults of a mine ventilator according to claim 1, wherein the database is further used for analyzing the access times of data information and the access initial time and the access end time corresponding to each access time to obtain an importance coefficient.
6. The intelligent information storage system for monitoring faults of a mining ventilator according to claim 5, wherein the data information comprises characters, audio and video; the access information includes the number of times of operation data, the duration of operation data, and the access IP address.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310539690.7A CN116644468B (en) | 2023-05-12 | 2023-05-12 | Intelligent information storage system for fault monitoring of mine ventilator |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310539690.7A CN116644468B (en) | 2023-05-12 | 2023-05-12 | Intelligent information storage system for fault monitoring of mine ventilator |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116644468A true CN116644468A (en) | 2023-08-25 |
CN116644468B CN116644468B (en) | 2023-11-21 |
Family
ID=87622281
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310539690.7A Active CN116644468B (en) | 2023-05-12 | 2023-05-12 | Intelligent information storage system for fault monitoring of mine ventilator |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116644468B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117097572A (en) * | 2023-10-19 | 2023-11-21 | 吉林省东启铭网络科技有限公司 | Household Internet of things terminal and operation method thereof |
CN117454410A (en) * | 2023-12-25 | 2024-01-26 | 北京中微盛鼎科技有限公司 | Enterprise knowledge brain data storage method based on privacy calculation |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143468A1 (en) * | 2002-02-22 | 2006-06-29 | Richards Patrick J Jr | Method for providing secure access to information held in a shared repository |
CN112507364A (en) * | 2020-12-16 | 2021-03-16 | 合肥执念网络科技有限公司 | Data encryption system based on cloud computing |
-
2023
- 2023-05-12 CN CN202310539690.7A patent/CN116644468B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143468A1 (en) * | 2002-02-22 | 2006-06-29 | Richards Patrick J Jr | Method for providing secure access to information held in a shared repository |
CN112507364A (en) * | 2020-12-16 | 2021-03-16 | 合肥执念网络科技有限公司 | Data encryption system based on cloud computing |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117097572A (en) * | 2023-10-19 | 2023-11-21 | 吉林省东启铭网络科技有限公司 | Household Internet of things terminal and operation method thereof |
CN117454410A (en) * | 2023-12-25 | 2024-01-26 | 北京中微盛鼎科技有限公司 | Enterprise knowledge brain data storage method based on privacy calculation |
CN117454410B (en) * | 2023-12-25 | 2024-03-12 | 北京中微盛鼎科技有限公司 | Enterprise knowledge brain data storage method based on privacy calculation |
Also Published As
Publication number | Publication date |
---|---|
CN116644468B (en) | 2023-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116644468B (en) | Intelligent information storage system for fault monitoring of mine ventilator | |
CN110764969A (en) | Network attack tracing method and device | |
Ji et al. | Attack-defense trees based cyber security analysis for CPSs | |
CN114157484A (en) | Data security storage system based on cloud computing | |
CN116861697A (en) | Big data-based power data processing system and processing method | |
CN117201131A (en) | Safety management platform for informationized data transmission | |
CN117725626A (en) | Real estate information security protection method and system based on security audit mechanism | |
CN116933323B (en) | Code auditing method, system and computer equipment based on privacy protection | |
Hong et al. | Data Auditing for Intelligent Network Security Monitoring | |
CN117292054A (en) | Three-dimensional digital-based intelligent operation and maintenance method and system for power grid | |
CN114785609B (en) | System and method for detecting data transmission safety in block chain scene | |
CN115600189A (en) | Commercial password application security evaluation system | |
CN113259390B (en) | Account safety protection system for recruitment platform | |
CN115455411A (en) | Data security monitoring system | |
CN114338007A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN112632592A (en) | Block chain credible privacy computing power improving system based on TEE technology | |
CN118101269B (en) | Network security defense method and system based on data analysis | |
CN117202176B (en) | Information safety control system for unmanned forklift | |
CN117094021B (en) | Electronic signature encryption protection system and method based on Internet | |
CN117633881B (en) | Power data optimization processing method | |
CN115632876B (en) | Safety auxiliary identification method, device and system for meta-universe conference | |
CN111814076B (en) | Power station position mark query method, system, equipment and readable storage medium | |
Han | Non-technical loss fraud detection in smart grid | |
Adebayo | Cyber-attacks and Impacts on the Educational Cyber Infrastructures | |
EP1306820A2 (en) | Document signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |